Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and device for generating control words

A technology for controlling words and equipment, applied in the usage of multiple keys/algorithms, digital transmission systems, electronic digital data processing, etc., can solve other problems

Inactive Publication Date: 2012-08-15
THOMSON LICENSING SA
View PDF7 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This solution makes it impossible to generate additional keys from the received key

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for generating control words
  • Method and device for generating control words
  • Method and device for generating control words

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The main idea of ​​the invention is to generate at least one scrambling key (i.e. an encryption and decryption key) that can be communicated to a recipient while ensuring that the recipient cannot use said at least one scrambling key to generate additional scrambling key.

[0033] figure 1 An example use case is shown. The content item is divided into a number of chunks 110 . Each block (U j ) 110, advantageously but not necessarily, said block index (j) may be sequential. Therefore, the content 100 includes a set of chunks {U 0 , U 1 , U 2 ,...,U n}.

[0034] In addition, refer to figure 2 describes the scrambling (also called encryption) of content 100, where figure 2 A scrambling device 200 comprising a key generator 210 and a scrambler 220 is shown. Scrambling device 200 may be implemented as one or more processors. Those skilled in the art will appreciate that for symmetric encryption algorithms, encryption and decryption are essentially the same; the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Generation of n control words for encryption of a content item. A device (200) obtains a first key K start and a second key K end ; generates (S42) the n control words using the formula: CW i = h 1 i (K start ) h2 n-i (K End ) , i= 0 ... n -1, wherein CW i denotes control word i, h 1 and h 2 denote one-way functions, and denotes a combination operation; and outputs the n generated control words. At least one one-way function is preferably a hash function and the combination operation is preferably XOR. In an embodiment, a license is generated (S43) for the content item encrypted using the generated control words, the license comprising the first key K start , the second key K end and the integer n; and the license is transmitted (S44) to a receiver. A method and a device (200) are provided. An advantage is that it is possible to send to a receiver a third key and a fourth key that lie between the first and the second key and that the receiver is unable to generate key words lying 'outside' the third and fourth key.

Description

technical field [0001] The present invention relates generally to digital rights management (DRM), and more particularly to the generation of control words for DRM protected digital content. Background technique [0002] This section is intended to introduce the reader to various aspects of art that may be related to various aspects of the invention that are described and / or claimed below. This discussion is considered helpful in providing the reader with background information to facilitate a better understanding of various aspects of the invention. Therefore, it should be understood that reading these records from the above aspects should not be regarded as an admission of prior art. [0003] DRM solutions are often considered user-unfriendly, a common complaint is that DRM prohibits fair use as defined by the Digital Millennium Copyright Act of 1998 [see http: / / www.copyright.gov / legislation / dmca.pdf] . The right of an end user to quote or use an excerpt of a work (i.e....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/00H04L9/32H04L9/08G06F21/10G06F21/60G06F21/62
CPCH04L9/0836H04L9/3236H04L2209/603H04L9/14
Inventor 穆罕默德·卡罗米
Owner THOMSON LICENSING SA
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More