Method and device for authorising conditional access
A technology for conditional access and authorization devices, applied in user identity/authority verification, electrical components, digital computer components, etc., can solve problems such as shutdown
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0048] exist figure 1 The head-end system 1 shown above as an example is adapted to generate an encrypted digital data product and an entitlement message for use in decrypting the encrypted digital data product. In one embodiment, an encrypted digital data product is a file provided with separate information implementing a digital rights management (DRM) system. Such information specifies the types of uses that may consist of encrypted data products. The files may be recorded on a data carrier such as an optical or magnetic disk. Alternatively, they may be downloaded by the receiver via a communications network including, for example, a cellular mobile telephone network, a satellite network and / or a cable or terrestrial broadcast network. In another embodiment, such as figure 1 As shown, an encrypted digital data product includes a set of one or more digital data streams consisting of digital data packets including a header and a payload. The header contains an identificat...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com