Recording of protected broadcast content with selectable user rights
A permission and content technology, applied in selective content distribution, program/content distribution protection, internal/peripheral computer component protection, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0026] figure 1 The physical key shown in FIG. 2 includes a cryptographic processor 10 capable of communicating directly or through a secure channel 12 with a physical key interface 11 of the physical key. The physical key has a built-in main storage body 13 and an access information processing module 18, the access information processing module 18 has a safe storage body, and the safe storage body has a safe volatile storage body 14 and a safe Non-volatile memory bank 15.
[0027] Such as figure 1 The physical key described in the figure 2 The security subsystem illustrated in has a cryptographic processor 20 capable of communicating directly or through a security channel 22 with a physical key interface 21 of the security subsystem. The security subsystem also has an access information processing module 28 , the access information processing module 28 has a secure storage body, and the secure storage body has a secure volatile storage body 24 and a secure non-volatile st...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 