Unlock instant, AI-driven research and patent intelligence for your innovation.
Terminal equipment for realizing content protection and transmission method thereof
What is Al technical title?
Al technical title is built by PatSnap Al team. It summarizes the technical point description of the patent document.
A technology of terminal equipment and equipment, applied in transmission systems, key distribution
Active Publication Date: 2010-06-02
UNITEND TECH +1
View PDF4 Cites 29 Cited by
Summary
Abstract
Description
Claims
Application Information
AI Technical Summary
This helps you quickly interpret patents by identifying the three key elements:
Problems solved by technology
Method used
Benefits of technology
Problems solved by technology
[0004] Therefore, it is necessary to protect the content inside the terminal device, control the operation authority of the terminal device, and enable it to perform protected data transmission when connecting to other terminal devices, so as to solve the content security problem of the digital home network
Method used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more
Image
Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
Click on the blue label to locate the original text in one second.
Reading with bidirectional positioning of images and text.
Smart Image
Examples
Experimental program
Comparison scheme
Effect test
example 1
[0078] When the rights table only allows the receiver device to have the function of playing content, the design of the rights information table is shown in Table 1, and the value of the Mask identification field is:
[0080] See Table 3. By analyzing the Mask field, the system knows that the entitlement table has table field numbers 4, 5, 7, 10, 11, 12, and 59, and the corresponding contents are Table Length, Content ID, Device ID, Content Encryption Key Length, Play Limit, Signature Data and other fields, analysis shows that the device with the Device ID has the Play Limit to play the content of the Content ID. The total length of Table 3 is only 504 bits, which does not involve rights information irrelevant to the playback function, effectively reducing the length of the rights table.
[0081] Table 3 Entitlement table with only playback function
[0082]
[0083]
example 2
[0085] When the rights table only allows the receiver device to have some functions such as playing, recording, playing and storing the content, the rights information table can be designed as shown in Table 2, and the value of the Mask field is:
[0087] See Table 4. By analyzing the Mask field, the system knows that the entitlement table has table field numbers 4, 5, 6, 7, 10, 11, 12, 13, 16, 17, 19, 23, 24, 26, and 59, and the corresponding The device with DeviceID or Domain ID has the right to use the content of Content ID, including: play right according to absolute time, record programs according to accumulated time and play recorded programs according to the number of times. The total length of Table 4 is 624 bits.
[0088] Table 4. Table of rights with functions of playback, recording and storage rights
[0089]
[0090]
example 3
[0092] When the rights table describes the rights information of the device to the content, the rights information table can be designed as shown in Table 5, and the value of the Mask field is:
[0094] See Table 5. By analyzing the Mask field, the system knows that it has all the fields in the table, and the receiving device has all the usage rights to the content. The total length of Table 5 is 1872 bits, which is the maximum length of the entitlement table.
[0095] Table 5 Entitlement table with all entitlement information
[0096]
[0097]
[0098]
[0099]
[0100] It can be seen that, according to different device rights, it is not necessary to list all rights information options in each rights table, and the design of the rights table can have various combinations. Through the setting of the MASK flag, all rights information options of this rights table are clearly indicated, and irrelevant rights...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
PUM
Login to View More
Abstract
The invention discloses terminal equipment for realizing content protection, which receives first authentication information, first right information and content data from the network side or other terminal devices. An authenticationinformation processor generates second authentication information of the terminal equipment and calculates the first authentication information and the second authentication information to obtain a first shared session key; a right information processor uses the first shared session key to decrypt first right information; a content processor uses the first shared session key for decryption to obtain content data and uses the content data according to the right information; and during transmitting data, the authentication information processor determines the legality of opposite equipment and obtains a second shared session key; and the right information processor generates second right information, encrypts the second right information and the content data by using the second shared session key and transmits the encrypted second right information and the encrypted content data. The invention also discloses a transmission method for realizing content protection. By applying the terminal equipment and the transmission method, the protection and the transmission of the content of a family digital network can be realized.
Description
technical field [0001] The invention relates to digital home network technology, in particular to a digital home network terminal device and a transmission method thereof. Background technique [0002] With the rapid development of digital home network multimedia, the requirement for data content protection is becoming more and more urgent. Since the digital videosignal adopts a transmission connection in a purely digital format, it may be illegally copied when the signal is transmitted. The copied data is lossless, and users can perform any number of lossless copying, playback and even editing of these data, which seriously damages the interests of video providers and video publishers. Therefore, in order to prevent illegal copying, a safe and reliable protection measure is needed to ensure that every interface where digital video signals are produced, transmitted, and played can safely pass through. [0003] In the existing digital home network, the content has been enc...
Claims
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
Application Information
Patent Timeline
Application Date:The date an application was filed.
Publication Date:The date a patent or application was officially published.
First Publication Date:The earliest publication date of a patent with the same application number.
Issue Date:Publication date of the patent grant document.
PCT Entry Date:The Entry date of PCT National Phase.
Estimated Expiry Date:The statutory expiry date of a patent right according to the Patent Law, and it is the longest term of protection that the patent right can achieve without the termination of the patent right due to other reasons(Term extension factor has been taken into account ).
Invalid Date:Actual expiry date is based on effective date or publication date of legal transaction data of invalid patent.