Unlock instant, AI-driven research and patent intelligence for your innovation.

Systems and methods for providing authorized access to digital content

A technology for authorizing access and content, applied in the direction of broadcasting system control, selective content distribution, analog security/charging system, etc., can solve the problem of slow public key encryption

Active Publication Date: 2014-10-15
GOOGLE TECHNOLOGY HOLDINGS LLC
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This is because the public key cryptography used to communicate the content decryption key to each user is too slow and would require the operator to invest in a lot of expensive hardware

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Systems and methods for providing authorized access to digital content
  • Systems and methods for providing authorized access to digital content
  • Systems and methods for providing authorized access to digital content

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0015] For simplicity and illustrative purposes, the principles are described by referring primarily to examples of embodiments. In the following description, numerous specific details are set forth in order to provide a thorough understanding of the embodiments. It will be apparent, however, to one of ordinary skill in the art that the embodiments may be practiced without limitation to these specific details. In other instances, well-known methods and structures have not been described in detail so as not to unnecessarily obscure the embodiments.

[0016] figure 1 According to one embodiment, a high-level view of content distribution system 100 is illustrated. The system 100 includes a service provider 110, a wireless transmission network 120 (such as a satellite transmission network), a landline transmission network 130 (such as a land area network or a cable network), and a system for receiving content from the service provider 110 for users via the satellite transmission...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Described herein are embodiments that provide an approach to cryptographic key management for a digital rights management (DRM) architecture that includes multiple levels of key management for minimizing bandwidth usage while maximizing security for the DRM architecture. In one embodiment, there is provided a data structure for cryptographic key management that includes a public / private key pair and three additional layers of symmetric keys for authorizing access to a plurality of contents.

Description

[0001] priority [0002] This application claims priority to U.S. Provisional Patent Application No. 60 / 628,786, filed 11 / 17 / 2004, entitled "DVB TM-CBMS-CALL FORTECHNOLOGIES" (Docket No. P5000), which is hereby incorporated by reference in its entirety , this application is also a continuation-in-part of U.S. Utility Patent Application No. 11 / 228,180, filed September 16, 2005, entitled "SYSTEM AND METHOD FORPROVIDING AUTHORIZED ACCESS TO DIGITAL CONTENT," which is hereby incorporated by reference in its entirety. Background technique [0003] Digital pay TV programming delivered to cable and satellite set-top boxes (STBs) has long been equipped with conditional access and digital rights management (DRM). Conditional access, as conventionally understood, refers to the control of access to particular transmissions or broadcasts, regardless of the specific content in such transmissions or broadcasts. Scientific Atlanta's PowerKEY and Motorola's MediaCipher are common examples of...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04N7/167H04N21/2343H04N21/835H04N21/266H04N21/472H04N21/2347H04N21/4623H04N21/6334H04H60/23H04N7/16
CPCH04N21/4623H04N21/26613H04N21/835H04N21/47211H04N21/26606H04N21/63345H04H60/23H04N7/162H04N7/1675
Inventor 亚历山大·麦德温斯盖
Owner GOOGLE TECHNOLOGY HOLDINGS LLC