System and method for reduced hierarchy key management

a hierarchy key and key management technology, applied in the field of system and method for can solve the problems of unwieldy and expensive implementation and use of conventional products that provide management of encryption/decryption keys, and achieve the effects of reducing hierarchy key management, reducing cost, and being easy to implemen

Inactive Publication Date: 2006-02-09
COMCAST CABLE COMM LLC
View PDF41 Cites 87 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0007] The present invention generally provides a system and a method for a reduced hierarchy key management that is lower in cost and easier to implement and easier to use than conventional approaches. The pres

Problems solved by technology

Conventional products that are used to provide management of the encryption

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for reduced hierarchy key management
  • System and method for reduced hierarchy key management
  • System and method for reduced hierarchy key management

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

)

[0014] Terms used to describe the present invention are defined as follows:

[0015] AES: Advanced Encryption Standard. AES is generally a much more secure algorithm to use for the storing of digital content in a digital video recording when compared to DES. The standard key length used for AES is 128 bits.

[0016] DES: Data Encryption Standard. A fixed-key-length security algorithm that employs 56-bit length keys. Any 56-bit number can be implemented as a DES key. The relatively short key length renders DES vulnerable to brute-force attack wherein all possible keys are tried one by one until the correct key is encountered (i.e., the key is “broken”).

[0017] Electronic Code Block (Mode): ECB, In ECB the message is divided into 64-bit blocks, and each block is encrypt separately. Encryption is independent for each block.

[0018] Entitlement Control Message (Stream): ECM, Messages that generally define access requirements of a program, specify the tiers required for subscription, and the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A controller for managing media stream decryption keys includes a media decryption engine, a table, and a content key list. The media decryption engine receives an encrypted media stream from a headend and presents a decrypted media stream to a receiving device in response to a decryption key, wherein the decryption key is a function of a content key. The table contains a content key index and a plurality of corresponding content keys. Content keys that correspond to a particular encrypted media stream are selected from the content key list using an index from the content key table, and that is referenced by an identifier received from a headend in connection with the encrypted media stream.

Description

BACKGROUND OF THE INVENTION [0001] 1. Field of the Invention [0002] The present invention relates to a system and method for reduced hierarchy key management. [0003] 2. Background Art [0004] Media (e.g., digital video, audio, combination video and audio, and the like) stream generation and distribution systems (e.g., cable systems) use keyed encryption and decryption to provide security to the media stream content (e.g., to reduce or prevent unauthorized use of or intrusion upon the media streams). Conventional products that are used to provide management of the encryption / decryption keys are generally unwieldy and expensive to implement and use. [0005] In a typical, conventional media stream conditional access system (CAS), Category Keys or Session Keys are used to decrypt Entitlement Control Messages (ECMs) to obtain a Content Key or Control Word in the media stream. Each media program stream has a unique Content Key or Control Word. [0006] Therefore, it would be desirable to have...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04N7/167
CPCH04N7/162H04N7/1675H04N7/17309H04N21/2347H04N21/26613H04L2209/60H04N21/4623H04N21/835H04L9/0836H04L9/0897H04N21/4405
Inventor FAHRNY, JAMES WILLIAMCOMPTON, CHARLES L.
Owner COMCAST CABLE COMM LLC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products