Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and device for authorising access to data

A technology for authorized access and equipment, applied in the field of conditional access systems and digital rights management solutions, which can solve problems such as complex business models and lack of local judgment capabilities

Inactive Publication Date: 2010-05-26
ALCATEL LUCENT SAS
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This solution is as secure as a smart card (or even more secure since there is no physical device to attack other than the STB), but lacks local decision making and a complex business model

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for authorising access to data
  • Method and device for authorising access to data
  • Method and device for authorising access to data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] The present invention proposes to implement a security client with complex functionality on the device in the access network, which cannot be physically reached by the terminal user, but is close enough to the terminal to realize fast and secure data exchange with the terminal, thereby realizing The type of local decision provided by the smart card or equivalent solution. These local decisions enable business models that would otherwise be impossible, such as pulse-based pay-per-view (purchasing content locally without real-time communication with a call center or central computer), pay-per-view (consumed minutes of content), etc.

[0019] According to one embodiment of the invention, the terminal handling of the conditional access system (CAS) and DRM is moved into the access node. This will not affect the CAS system, such as figure 2 shown. Usually, the video head-end uses randomly generated Control Words (CW) to scramble the AV stream. The scrambled AV stream is...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention is related to a device for authorising access to data content protected by a control signal (CW) and delivered to a terminal over a network comprising an access network. The device is arranged for receiving a version of the control signal and further comprises processing means for processing the received version of the control signal and arranged for sending to the terminal an output signal derived from that processed version of the control signal. Said output signal enables the terminal to get access to the delivered data content protected by the control signal. The device is characterised in that it is operable in the access network.

Description

technical field [0001] The present invention relates generally to the field of conditional access systems and digital rights management solutions. Background technique [0002] All mechanisms for securing multimedia content delivery based on content encryption (conditional access systems and digital rights management) require a terminal-side security client, which is usually the least secure link in the chain. For a rich and scalable set of components, it is desirable that this secure client include a good level of intelligence, but the complexity introduced often leads to insecurity in the implementation. [0003] Prior art solutions implement secure clients on specific types of specialized hardware (eg smart cards) that are designed to be tamper-resistant. A significant drawback of this approach is the cost of additional hardware (ie CAPEX) and smart card allocation management (which results in OPEX). Additionally, the solution is exposed to security attacks due to its r...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04N7/167H04N7/173G06F21/60G06F21/62
CPCH04N21/4623H04N21/26613H04N7/1675H04N21/4405H04N21/2541H04N21/4367H04N7/16
Inventor A·维勒加斯努涅斯D·C·罗宾逊
Owner ALCATEL LUCENT SAS