Terminal equipment for realizing content protection and transmission method thereof

A technology of terminal equipment and equipment, applied in transmission systems, key distribution

Active Publication Date: 2010-06-02
UNITEND TECH +1
View PDF4 Cites 29 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Therefore, it is necessary to protect the content inside the terminal device, control the operation authority of the terminal device, and enable it

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Terminal equipment for realizing content protection and transmission method thereof
  • Terminal equipment for realizing content protection and transmission method thereof
  • Terminal equipment for realizing content protection and transmission method thereof

Examples

Experimental program
Comparison scheme
Effect test

example 1

[0078] When the rights table only allows the receiver device to have the function of playing content, the design of the rights information table is shown in Table 1, and the value of the Mask identification field is:

[0079] 11010011100000000000000000000000000000000000000000000001.

[0080] See Table 3. By analyzing the Mask field, the system knows that the entitlement table has table field numbers 4, 5, 7, 10, 11, 12, and 59, and the corresponding contents are Table Length, Content ID, Device ID, Content Encryption Key Length, Play Limit, Signature Data and other fields, analysis shows that the device with the Device ID has the Play Limit to play the content of the Content ID. The total length of Table 3 is only 504 bits, which does not involve rights information irrelevant to the playback function, effectively reducing the length of the rights table.

[0081] Table 3 Entitlement table with only playback function

[0082]

[0083]

example 2

[0085] When the rights table only allows the receiver device to have some functions such as playing, recording, playing and storing the content, the rights information table can be designed as shown in Table 2, and the value of the Mask field is:

[0086] 11110011110011010001101000000000000000000000000000000001.

[0087] See Table 4. By analyzing the Mask field, the system knows that the entitlement table has table field numbers 4, 5, 6, 7, 10, 11, 12, 13, 16, 17, 19, 23, 24, 26, and 59, and the corresponding The device with DeviceID or Domain ID has the right to use the content of Content ID, including: play right according to absolute time, record programs according to accumulated time and play recorded programs according to the number of times. The total length of Table 4 is 624 bits.

[0088] Table 4. Table of rights with functions of playback, recording and storage rights

[0089]

[0090]

example 3

[0092] When the rights table describes the rights information of the device to the content, the rights information table can be designed as shown in Table 5, and the value of the Mask field is:

[0093] 111111111111111111111111111111111111111111111111.

[0094] See Table 5. By analyzing the Mask field, the system knows that it has all the fields in the table, and the receiving device has all the usage rights to the content. The total length of Table 5 is 1872 bits, which is the maximum length of the entitlement table.

[0095] Table 5 Entitlement table with all entitlement information

[0096]

[0097]

[0098]

[0099]

[0100] It can be seen that, according to different device rights, it is not necessary to list all rights information options in each rights table, and the design of the rights table can have various combinations. Through the setting of the MASK flag, all rights information options of this rights table are clearly indicated, and irrelevant rights...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses terminal equipment for realizing content protection, which receives first authentication information, first right information and content data from the network side or other terminal devices. An authentication information processor generates second authentication information of the terminal equipment and calculates the first authentication information and the second authentication information to obtain a first shared session key; a right information processor uses the first shared session key to decrypt first right information; a content processor uses the first shared session key for decryption to obtain content data and uses the content data according to the right information; and during transmitting data, the authentication information processor determines the legality of opposite equipment and obtains a second shared session key; and the right information processor generates second right information, encrypts the second right information and the content data by using the second shared session key and transmits the encrypted second right information and the encrypted content data. The invention also discloses a transmission method for realizing content protection. By applying the terminal equipment and the transmission method, the protection and the transmission of the content of a family digital network can be realized.

Description

technical field [0001] The invention relates to digital home network technology, in particular to a digital home network terminal device and a transmission method thereof. Background technique [0002] With the rapid development of digital home network multimedia, the requirement for data content protection is becoming more and more urgent. Since the digital video signal adopts a transmission connection in a purely digital format, it may be illegally copied when the signal is transmitted. The copied data is lossless, and users can perform any number of lossless copying, playback and even editing of these data, which seriously damages the interests of video providers and video publishers. Therefore, in order to prevent illegal copying, a safe and reliable protection measure is needed to ensure that every interface where digital video signals are produced, transmitted, and played can safely pass through. [0003] In the existing digital home network, the content has been enc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/08
Inventor 王兴军雷大明闫峰冰陈晨梅红兵
Owner UNITEND TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products