Method for securing encrypted content broadcast by a broadcaster
A technology for broadcasters and content, applied in selective content distribution, television, electrical components, etc., can solve the problem of inability to eliminate clone modules, and achieve the effect of reducing bandwidth
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0046] Figures 1 to 3 Process implementations of the encryption side and the decryption side according to the invention are shown. The encryption is performed at the level of the management center CG, which sends the stream to the decoder STB associated with the security module SC that manages the decryption of the data.
[0047] Such as figure 1 As shown in , the Manager produces three streams that are detailed below.
[0048] The management center first generates a control word cw in a control word generator cwg, and first uses cw to encrypt the content CT to be disseminated in a conventional manner. exist figure 1 Encrypt the content CT during the step marked with Scramb in . These are sent as encrypted data stream CT'=cw(CT). As is known, the control word is changed at regular intervals, eg every 2 to 10 seconds, although other intervals are also contemplated.
[0049] When the control words are generated, they are also encrypted by the generator MCWG with a randoml...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 