Tracing copies of an implementation
A look-up table and version technology, which is applied in the field of copying systems, can solve problems such as the difficulty of extracting and distributing keys
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0059] White-box cryptography is about implementing a block cipher on a fixed key K such that it is difficult for an attacker to extract the key K from said implementation. The attack mode identified in white-box cryptography is the white-box attack mode. With this attack model, the attacker is assumed to have sufficient access to the software and sufficient control over the implementation environment.
[0060] One embodiment relates to a conditional access system for pay TV. The content provider distributes the content encrypted by AES and content key K. One of the problems that have to be solved with respect to conditional access systems is how to distribute the content key K for decrypting the content for the subscriber and not for others. Two methods are described below. First, a simple approach is to keep the content key K fixed over time and provide the key K only to subscribers. However, this implementation has the following two disadvantages. The first disadvantag...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com