Terminal equipment for realizing content protection and transmission method thereof
A technology of terminal equipment and equipment, applied in transmission systems, key distribution
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
example 1
[0078] When the rights table only allows the receiver device to have the function of playing content, the design of the rights information table is shown in Table 1, and the value of the Mask identification field is:
[0079] 11010011100000000000000000000000000000000000000000000001.
[0080] See Table 3. By analyzing the Mask field, the system knows that the entitlement table has table field numbers 4, 5, 7, 10, 11, 12, and 59, and the corresponding contents are Table Length, Content ID, Device ID, Content Encryption Key Length, Play Limit, Signature Data and other fields, analysis shows that the device with the Device ID has the Play Limit to play the content of the Content ID. The total length of Table 3 is only 504 bits, which does not involve rights information irrelevant to the playback function, effectively reducing the length of the rights table.
[0081] Table 3 Entitlement table with only playback function
[0082]
[0083]
example 2
[0085] When the rights table only allows the receiver device to have some functions such as playing, recording, playing and storing the content, the rights information table can be designed as shown in Table 2, and the value of the Mask field is:
[0086] 11110011110011010001101000000000000000000000000000000001.
[0087] See Table 4. By analyzing the Mask field, the system knows that the entitlement table has table field numbers 4, 5, 6, 7, 10, 11, 12, 13, 16, 17, 19, 23, 24, 26, and 59, and the corresponding The device with DeviceID or Domain ID has the right to use the content of Content ID, including: play right according to absolute time, record programs according to accumulated time and play recorded programs according to the number of times. The total length of Table 4 is 624 bits.
[0088] Table 4. Table of rights with functions of playback, recording and storage rights
[0089]
[0090]
example 3
[0092] When the rights table describes the rights information of the device to the content, the rights information table can be designed as shown in Table 5, and the value of the Mask field is:
[0093] 111111111111111111111111111111111111111111111111.
[0094] See Table 5. By analyzing the Mask field, the system knows that it has all the fields in the table, and the receiving device has all the usage rights to the content. The total length of Table 5 is 1872 bits, which is the maximum length of the entitlement table.
[0095] Table 5 Entitlement table with all entitlement information
[0096]
[0097]
[0098]
[0099]
[0100] It can be seen that, according to different device rights, it is not necessary to list all rights information options in each rights table, and the design of the rights table can have various combinations. Through the setting of the MASK flag, all rights information options of this rights table are clearly indicated, and irrelevant rights...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com