Data processing: financial – business practice – management – or co – Business processing using cryptography – Usage protection of distributed data files
Patent
1997-08-15
2000-06-06
Trammell, James P.
Data processing: financial, business practice, management, or co
Business processing using cryptography
Usage protection of distributed data files
705 57, 705 58, 380201, 380202, 380278, G06F 1760
Patent
active
060731222
ABSTRACT:
A system for restricting access to transmitted programming content is disclosed, which transmits the encryption key used to encrypt the program to the customer with the encrypted programming content. A set-top terminal or similar mechanism restricts access to the transmitted multimedia information using stored decryption keys. The set-top terminal preferably receives one or more package keys, S.sub.J, periodically from the service provider, each corresponding to a package of programs that the customer is entitled to for a given period. Each program is preferably encrypted by the head-end server prior to transmission using a program key, K.sub.P, which may be unique to the program. Header information is transmitted with the encrypted program to the customers, containing a package pair for each package to which the program belongs. A package pair preferably includes an identifier of the package, as well as the program key, K.sub.P, encrypted by the corresponding package key, S.sub.J. The broadcast of a given program, p, preferably consists of a header portion containing a package pair for each package that the program belongs to, and a program portion containing the program encrypted with the program key, K.sub.P. If a customer is entitled to a particular program, the set-top terminal will be able to decrypt the encrypted program key, K.sub.P, using an appropriate stored package key, S.sub.J, and thereafter use the program key, K.sub.P, to decrypt the encrypted program. The header information can be interleaved with the program portion or transmitted on a separate dedicated control channel.
REFERENCES:
patent: 4388643 (1983-06-01), Aminetzah
patent: 4866770 (1989-09-01), Seth-Smith et al.
patent: 5263159 (1993-11-01), Mitsui
patent: 5481609 (1996-01-01), Cohen et al.
patent: 5502767 (1996-03-01), Sasuta et al.
patent: 5615265 (1997-03-01), Coutrot
patent: 5619274 (1997-04-01), Roop et al.
patent: 5671276 (1997-09-01), Eyer et al.
patent: 5708709 (1998-01-01), Rose
patent: 5757907 (1998-05-01), Cooper et al.
patent: 5805204 (1998-09-01), Thompson et al.
J. McCormac, European Scrambling Systems, Circuits Tactics and Techniques ("The Black Book"), Waterford University Press, pp. 2-79, 4-10 and 4-11 (1996).
Guillou et al., "Encipherment and Conditional Access" SMPTE Journal, US, SMPTE Inc. Scarsdale, NY, vol. 103, No. 6, pp. 398-406.
Lucent Technologies - Inc.
Retta Yehdega
Trammell James P.
LandOfFree
Cryptographic method and apparatus for restricting access to tra does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Cryptographic method and apparatus for restricting access to tra, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Cryptographic method and apparatus for restricting access to tra will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2223099