polymorphic encryption key matrix
A technology of encryption key and cipher key, applied in the field of broadcast encryption
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0010] The key matrix can be used for space-efficient key distribution in broadcast encryption systems. In the key matrix approach, an authorized content consumer (eg, a digital media player) applies a one-way encryption function to traverse the key matrix from column to column. At each step of the traversal, the encryption key is derived, and the process is repeated until the target key is obtained. Authorized clients are assigned a unique smaller set of device keys associated with specific rows in specific columns of the key matrix. When an authorized client applies an encryption function with one of its device keys, a new key is generated. This new key applies to cells in subsequent columns. Repeating this process eventually yields a final decryption key that can be used to decrypt protected content. The key matrix approach allows key combinations to be revoked by modifying data included in subsequently distributed protected content (the media key block discussed below)....
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


