DE19511298B4 - Procedure for issuing and revoking the authorization to receive broadcasts and decoders - Google Patents
Procedure for issuing and revoking the authorization to receive broadcasts and decoders Download PDFInfo
- Publication number
- DE19511298B4 DE19511298B4 DE1995111298 DE19511298A DE19511298B4 DE 19511298 B4 DE19511298 B4 DE 19511298B4 DE 1995111298 DE1995111298 DE 1995111298 DE 19511298 A DE19511298 A DE 19511298A DE 19511298 B4 DE19511298 B4 DE 19511298B4
- Authority
- DE
- Germany
- Prior art keywords
- decoder
- key
- keys
- node
- assigned
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Lifetime
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04H—BROADCAST COMMUNICATION
- H04H60/00—Arrangements for broadcast applications with a direct linking to broadcast information or broadcast space-time; Broadcast-related systems
- H04H60/09—Arrangements for device control with a direct linkage to broadcast information or to broadcast space-time; Arrangements for control of broadcast-related services
- H04H60/14—Arrangements for conditional access to broadcast information or to broadcast-related services
- H04H60/23—Arrangements for conditional access to broadcast information or to broadcast-related services using cryptography, e.g. encryption, authentication, key distribution
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/083—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
- H04L9/0833—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key
- H04L9/0836—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key using tree structure or hierarchical structure
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/16—Analogue secrecy systems; Analogue subscription systems
- H04N7/162—Authorising the user terminal, e.g. by paying; Registering the use of a subscription channel, e.g. billing
- H04N7/163—Authorising the user terminal, e.g. by paying; Registering the use of a subscription channel, e.g. billing by receiver means only
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/16—Analogue secrecy systems; Analogue subscription systems
- H04N7/167—Systems rendering the television signal unintelligible and subsequently intelligible
- H04N7/1675—Providing digital key or authorisation information for generation or regeneration of the scrambling sequence
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04H—BROADCAST COMMUNICATION
- H04H2201/00—Aspects of broadcast communication
- H04H2201/70—Aspects of broadcast communication characterised in that receivers can be addressed
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Multimedia (AREA)
- Theoretical Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
Abstract
Verfahren
zur Erteilung und zum Entzug der Berechtigung zum Empfang von Rundfunksendungen,
die durch Verschlüsselung
geschützt
sind, mit einem Decoder,
– wobei
die Schlüssel
aller betroffenen Decoder eine Baumstruktur bilden,
– wobei
den der Wurzel und den einzelnen Knoten nachfolgenden Knoten Schlüssel zugeordnet
sind,
– wobei
den Blättern
dieses Baumes feste Schlüssel
zugeordnet sind, die eindeutig einem Decoder oder einem Teil eines
Decoders (z.B. einer Chipkarte) zugeordnet sind,
– wobei
die Schlüssel,
die jeweils einen Ast der Baumstruktur bilden, in jeweils einem
Decoder gespeichert werden und
– wobei die in jeweils einem
Decoder gespeicherten Schlüssel
zur Entschlüsselung
von empfangenen Kryptogrammen dienen, welche Änderungen der gespeicherten Schlüssel und
eines gespeicherten Systemschlüssels
bewirken,
– wobei
der Wurzel der Baumstruktur der Systemschlüssel zugeordnet ist, der zur
Entschlüsselung
eines mit der jeweiligen Rundfunksendung empfangenen Kontrollwortes
dient und
– wobei
diejenigen Schlüssel,
die solchen Knoten zugeordnet sind, welche...Procedure for issuing and revoking the authorization to receive broadcasts protected by encryption with a decoder,
The keys of all the decoders concerned form a tree structure,
- where the nodes following the root and the individual nodes are assigned keys,
Wherein the leaves of this tree are assigned fixed keys which are uniquely associated with a decoder or part of a decoder (eg a chip card),
- Wherein the keys, each forming a branch of the tree structure, are stored in a respective decoder, and
The keys stored in a respective decoder serve to decrypt received cryptograms which cause changes to the stored keys and a stored system key,
- Wherein the root of the tree structure of the system key is assigned, which is used to decrypt a control word received with the respective broadcast and
- where those keys that are assigned to such nodes, which ...
Description
Die Erfindung betrifft ein Verfahren zur Erteilung und zum Entzug der Berechtigung zum Empfang von Rundfunksendungen, die durch Verschlüsselung geschützt sind, mit einem Decoder und einen zur Durchführung des Verfahrens geeigneten Decoder.The The invention relates to a method for issuing and withdrawing the Authorization to receive broadcasts protected by encryption, with a decoder and one suitable for carrying out the method Decoder.
Gebührenpflichtige Rundfunksendungen, die auch unter den Stichworten Pay-TV, Pay-Radio, bekanntgeworden sind, werden mit einem Schlüssel CW verschlüsselt. Benutzer werden dadurch zum Empfang berechtigt, daß man ihnen den Schlüssel (Kontrollwort) CW vertraulich zukommenläßt. Dazu wird im allgemeinen dem Benutzer ein persönlicher Schlüssel PK zur Verfügung gestellt, der meist physikalisch gegen Vervielfältigung gesichert, beispielsweise auf einer Chip-Karte gespeichert ist.Paid Broadcasts, which also include the keywords pay-TV, pay-radio, become known are encrypted with a key CW. user are thereby authorized to receive that one gives them the key (control word) CW confidentially. This will be in general, the user a personal key PK to disposal usually physically secured against duplication, for example stored on a chip card.
Das Kontrollwort CW wird verschlüsselt als Kryptogramm ECM (Entitlement Control Message) über einen Datenkanal des Rundfunksenders vom Empfänger bzw. Decoder empfangen. Durch Entschlüsselung dieses Kryptogramms mit Hilfe des persönlichen Schlüssels PK wird das Kontrollwort CW wiedergewonnen. Bei dem unter dem Namen EuroCrypt bekanntgewordenen System wird ein weiteres Kryptogramm EMM (Entitlement Management Message) eines Schlüssels SK gesendet. Dieses Kryptogramm kann mit Hilfe von PK entschlüsselt werden. Der so erhaltene Schlüssel SK dient zur Berechnung von CW aus dem Kryptogramm ECM. Dieses Zugangskontrollsystem ist in DIN EN 50094 beschrieben. Sicherheitshalber wird der Schlüssel CW häufig gewechselt.The Control word CW is encrypted as a cryptogram ECM (Entitlement Control Message) over a Data channel of the radio station from the receiver or decoder received. By decryption this cryptogram by means of the personal key PK the control word CW is retrieved. When under the name EuroCrypt became known system becomes another cryptogram EMM (Entitlement Management Message) of a SK key sent. This cryptogram can be decrypted with the help of PK become. The key thus obtained SK is used to calculate CW from the cryptogram ECM. This access control system is described in DIN EN 50094. For safety's sake, the key is CW changed frequently.
Eine wichtige Aufgabe des Zugangskontrollsystems besteht darin, Benutzern, die ihre Gebühren nicht bezahlt haben, die Berechtigung zum Empfang der Rundfunksendung zu entziehen. Dieses kann einerseits durch eine negative Adressierung geschehen, bei welchem an den Decoder eine Nachricht geschickt wird, in welcher dieser aufgefordert wird, seine Tätigkeit einzustellen. Diese Möglichkeit ist jedoch grundsätzlich unsicher, da derartige Nachrichten von einem betrügerischen Benutzer abgefangen werden können und damit unwirksam sind.A important task of the access control system is to provide users, not their fees have paid the permission to receive the broadcast to withdraw. This can on the one hand by a negative addressing happen at which a message is sent to the decoder, in which he is asked to cease his activity. These possibility is however basically unsure, as such news of a fraudulent Users can be intercepted and thus ineffective.
Bei der positiven Adressierung wird eine Abschaltung des Decoders dadurch bewirkt, daß die in ihm enthaltene Information wertlos gemacht wird. Das geschieht dadurch, daß alle anderen Decoder neue Informationen erhalten, die zum Entschlüsseln zukünftiger Rundfunksendungen unbedingt gebraucht werden, nur der abzuschaltende Decoder nicht.at the positive addressing will disable the decoder causes the information contained in it is made worthless. This happens in that all other decoders receive new information that will help decipher future ones It is absolutely necessary to use radio broadcasts, only the one to be switched off Decoder not.
Das Verfahren der positiven Adressierung führt zwar mit Sicherheit zur Abschaltung des Decoders des jeweiligen Benutzers, es ist allerdings mit großem Aufwand verbunden, da zum Abschalten eines Decoders Nachrichten an alle anderen Decoder gesendet werden müssen.The Although the method of positive addressing certainly leads to Disconnecting the decoder of each user, it is, however with big Expenses connected because to turn off a decoder messages must be sent to all other decoders.
Durch
Der Erfindung liegt die Aufgabe zugrunde, ein Verfahren zur Erteilung und zum Entzug der Berechtigung zum Empfang von Rundfunksendungen vorzuschlagen, bei welchem die zur Entschlüsselung erforderlichen Informationen in einem bestimmten Decoder wertlos gemacht werden können, ohne daß alle anderen Decoder einzeln adressiert werden müssen.Of the Invention is based on the object, a method for issuing and to propose the withdrawal of the right to receive broadcasts, where required for decryption Information in a particular decoder be made worthless can, without all other decoders must be addressed individually.
Diese Aufgabe wird mit dem erfindungsgemäßen Verfahren gelöst,
- – wobei die Schlüssel aller betroffenen Decoder eine Baumstruktur bilden,
- – wobei den der Wurzel und den einzelnen Knoten nachfolgenden Knoten Schlüssel zugeordnet sind,
- – wobei den Blättern dieses Baumes feste Schlüssel zugeordnet sind, die eindeutig einem Decoder oder einem Teil eines Decoders (z.B. einer Chipkarte) zugeordnet sind,
- – wobei die Schlüssel, die jeweils einen Ast der Baumstruktur bilden, in jeweils einem Decoder gespeichert werden und
- – wobei die in jeweils einem Decoder gespeicherten Schlüssel zur Entschlüsselung von empfangenen Kryptogrammen dienen, welche Änderungen der gespeicherten Schlüssel und eines gespeicherten Systemschlüssels bewirken,
- – wobei der Wurzel der Baumstruktur der Systemschlüssel zugeordnet ist, der zur Entschlüsselung eines mit der jeweiligen Rundfunksendung empfangenen Kontrollwortes dient und
- – wobei diejenigen Schlüssel, die solchen Knoten zugeordnet sind, welche einem bestimmten Knoten unmittelbar nachfolgen, dazu dienen, Kryptogramme zu entschlüsseln, die einen Schlüssel enthalten, der dem bestimmten Knoten neu zugeordnet werden soll.
- The keys of all the decoders concerned form a tree structure,
- - where the nodes following the root and the individual nodes are assigned keys,
- Wherein the leaves of this tree are assigned fixed keys which are uniquely associated with a decoder or part of a decoder (eg a chip card),
- - Wherein the keys, each forming a branch of the tree structure, are stored in a respective decoder, and
- The keys stored in a respective decoder serve to decrypt received cryptograms which cause changes to the stored keys and a stored system key,
- - Wherein the root of the tree structure of the system key is assigned, which is used to decrypt a control word received with the respective broadcast and
- - wherein the keys associated with such nodes immediately following a particular node serve to decrypt cryptograms containing a key to be reassigned to the particular node.
Bei 1.000.000 Decodern müßten bei dem eingangs erwähnten Verfahren 999.999 Nachrichten übertragen werden, um einen der Decoder zu deaktivieren. Bei dem erfindungsgemäßen Verfahren mit beispielsweise einem 2-ären Baum der Tiefe 20 sind etwa nur 40 Nachrichten notwendig.With 1,000,000 decoders 999,999 messages would have to be transmitted in the process mentioned above to deactivate one of the decoders four. In the method according to the invention with, for example, a 2-ary tree of depth 20, only about 40 messages are necessary.
Zur Verschlüsselung der Daten können bei dem erfindungsgemäßen Verfahren sowohl symmetrische als auch asymmetrische Verfahren angewendet werden.to encoding the data can in the method according to the invention Both symmetric and asymmetric methods are used become.
Eine vorteilhafte Ausführungsform des erfindungsgemäßen Verfahrens besteht darin, daß die Baumstruktur m-regulär ist, wobei mt ≥ n gilt mit m = Zahl der einem Knoten oder der Wurzel nachfolgenden Knoten, t = Zahl der von Knoten gebildeten Ebenen und n = Zahl der Decoder. Dadurch ist eine einfache Zuordnung der Kryptogramme, welche Änderungen der gespeicherten Schlüssel bewirken, möglich.An advantageous embodiment of the method according to the invention is that the tree structure is m-regular, where m t ≥ n with m = number of nodes following a node or root, t = number of levels formed by nodes, and n = number of decoders , As a result, a simple assignment of the cryptograms, which cause changes to the stored keys, possible.
Zum Entzug der Berechtigung eines bestimmten Decoders kann bei dem erfindungsgemäßen Verfahren vorgesehen sein, daß
- – für jeden Decoder außer dem bestimmten Decoder, der zusammen mit dem bestimmten Decoder demselben Knoten nachfolgt, ein Kryptogramm gesendet wird, das den mit dem festen Schlüssel des Decoders verschlüsselten Schlüssel enthält, der dem gemeinsamen Knoten neu zugeordnet wird,
- – beginnend mit dem Knoten, der dem gemeinsamen Knoten vorausgeht, bis zur Wurzel für jeweils alle nachfolgenden Knoten aller dem bestimmten Decoder mittelbar vorausgehenden Knoten jeweils ein Kryptogramm gesendet wird, das den mit dem Schlüssel des jeweils nachfolgenden Knotens verschlüsselten Schlüssel enthält, der dem dem bestimmten Decoder mittelbar vorausgehenden Knoten neu zugeordnet wird.
- For each decoder other than the particular decoder which follows the same node together with the particular decoder, a cryptogram containing the key coded with the decoder's fixed key, which is reassigned to the common node, is sent;
- Starting with the node preceding the common node, until the root for each subsequent node of all the node indirectly preceding the particular decoder, a cryptogram containing, respectively, the key encrypted with the key of the respective subsequent node is sent Decoder is indirectly remapped to the preceding node.
Ein vorteilhafter Decoder zur Durchführung des Verfahrens nach einem der vorhergehenden Ansprüche ist dadurch gekennzeichnet, daß mehrere Schlüssel speicherbar sind, wobei mindestens ein Teil der Schlüssel durch mit den Rundfunksendungen empfangene Kryptogramme, die mit Hilfe eines der gespeicherten Schlüssel entschlüsselbar sind, veränderbar sind.One advantageous decoder for carrying out the Method according to one of the preceding claims, characterized that several keys storable where at least part of the keys are received by the broadcasts Cryptograms that can be decrypted using one of the stored keys are, changeable are.
Ein Ausführungsbeispiel der Erfindung ist in der Zeichnung anhand mehrerer Figuren dargestellt und in der nachfolgenden Beschreibung näher erläutert. Es zeigt:One embodiment the invention is illustrated in the drawing with reference to several figures and explained in more detail in the following description. It shows:
Einem
Decoder mit dem Schlüssel
K(m, x) – beim
in
Zeile
a der
Claims (4)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE1995111298 DE19511298B4 (en) | 1995-03-28 | 1995-03-28 | Procedure for issuing and revoking the authorization to receive broadcasts and decoders |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE1995111298 DE19511298B4 (en) | 1995-03-28 | 1995-03-28 | Procedure for issuing and revoking the authorization to receive broadcasts and decoders |
Publications (2)
Publication Number | Publication Date |
---|---|
DE19511298A1 DE19511298A1 (en) | 1996-10-02 |
DE19511298B4 true DE19511298B4 (en) | 2005-08-18 |
Family
ID=7757929
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
DE1995111298 Expired - Lifetime DE19511298B4 (en) | 1995-03-28 | 1995-03-28 | Procedure for issuing and revoking the authorization to receive broadcasts and decoders |
Country Status (1)
Country | Link |
---|---|
DE (1) | DE19511298B4 (en) |
Families Citing this family (26)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE19630707A1 (en) * | 1996-07-30 | 1998-02-05 | Deutsche Telekom Ag | Procedures and arrangements to avoid unauthorized use of distribution networks |
DE19649292A1 (en) * | 1996-11-28 | 1998-06-04 | Deutsche Telekom Ag | Access protection method for pay television |
US7587044B2 (en) | 1998-01-02 | 2009-09-08 | Cryptography Research, Inc. | Differential power analysis method and apparatus |
ATE325478T1 (en) | 1998-01-02 | 2006-06-15 | Cryptography Res Inc | LEAK RESISTANT CRYPTOGRAPHIC METHOD AND APPARATUS |
AU6381699A (en) | 1998-06-03 | 2000-01-10 | Cryptography Research, Inc. | Improved des and other cryptographic processes with leak minimization for smartcards and other cryptosystems |
US6539092B1 (en) | 1998-07-02 | 2003-03-25 | Cryptography Research, Inc. | Leak-resistant cryptographic indexed key update |
EP0987893A1 (en) * | 1998-09-16 | 2000-03-22 | CANAL+ Société Anonyme | Management of data in a receiver/decoder |
DE19847941A1 (en) * | 1998-10-09 | 2000-04-13 | Deutsche Telekom Ag | Common cryptographic key establishment method for subscribers involves successively combining two known secret values into a new common value throughout using Diffie-Hellmann technique |
EP1075108A1 (en) * | 1999-07-23 | 2001-02-07 | BRITISH TELECOMMUNICATIONS public limited company | Cryptographic data distribution |
JP4622064B2 (en) * | 2000-04-06 | 2011-02-02 | ソニー株式会社 | Information recording apparatus, information reproducing apparatus, information recording method, information reproducing method, information recording medium, and program providing medium |
JP2001352321A (en) * | 2000-04-06 | 2001-12-21 | Sony Corp | Information processing system, information processing method, and information recording medium, and program providing medium |
JP4370721B2 (en) * | 2000-04-06 | 2009-11-25 | ソニー株式会社 | Information recording apparatus, information reproducing apparatus, information recording method, information reproducing method, key update terminal apparatus, generation management key update method, information recording medium, and program providing medium |
JP4023083B2 (en) * | 2000-04-06 | 2007-12-19 | ソニー株式会社 | Information processing system, information processing method, information recording medium, and program providing medium |
HU229298B1 (en) * | 2000-06-21 | 2013-10-28 | Sony Corp | Information recording/reproducing apparatus and method |
KR100763693B1 (en) | 2000-06-21 | 2007-10-04 | 소니 가부시끼 가이샤 | Information processing device and processing method |
JP4608749B2 (en) * | 2000-07-24 | 2011-01-12 | ソニー株式会社 | Data processing apparatus, data processing method, license system, and program providing medium |
JP4660899B2 (en) * | 2000-07-24 | 2011-03-30 | ソニー株式会社 | Data processing apparatus, data processing method, and program providing medium |
DE10038068A1 (en) * | 2000-08-04 | 2002-02-14 | Deutsche Telekom Ag | Process for the transmission of data |
US20020076204A1 (en) * | 2000-12-18 | 2002-06-20 | Toshihisa Nakano | Key management device/method/program, recording medium, reproducing device/method, recording device, and computer-readable, second recording medium storing the key management program for copyright protection |
JP2002319932A (en) | 2001-04-19 | 2002-10-31 | Sony Corp | Device and method for recording information, device and method for reproducing information, and program |
BR0305073A (en) * | 2002-06-17 | 2004-09-21 | Koninkl Philips Electronics Nv | System including a plurality of devices, and first device being designated with a device identifier. |
EP1575292A1 (en) * | 2004-03-10 | 2005-09-14 | Nagracard S.A. | Method of securing a scrambled content sent by a broadcaster |
DE102004042094B3 (en) * | 2004-08-30 | 2005-09-22 | RUHR-UNIVERSITäT BOCHUM | Digital data transmission method such as for pay TV using a single use code |
WO2007059807A1 (en) * | 2005-11-22 | 2007-05-31 | Nero Ag | Apparatus and method for retrieving a decryption key, license server and media player |
FR2905217B1 (en) * | 2006-08-23 | 2008-12-19 | Thales Sa | SYSTEM AND METHOD FOR DECENTRALIZED MANAGEMENT OF A SECURE SYSTEM DELIVERING DIFFERENT SERVICES |
JP2009118529A (en) * | 2009-02-25 | 2009-05-28 | Deutsche Telekom Ag | Method of securely protecting system protected by key layer |
Citations (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4309569A (en) * | 1979-09-05 | 1982-01-05 | The Board Of Trustees Of The Leland Stanford Junior University | Method of providing digital signatures |
DE3325858A1 (en) * | 1982-07-23 | 1984-01-26 | Oak Industries Inc., Rancho Bernardo, Calif. | MULTI-LAYER ENCRYPTION SYSTEM FOR SENDING ENCRYPTED INFORMATION |
EP0132401A2 (en) * | 1983-07-21 | 1985-01-30 | Kabushiki Kaisha Toshiba | Information transmission system |
DE3524472A1 (en) * | 1984-07-09 | 1986-01-16 | Kabushiki Kaisha Toshiba, Kawasaki, Kanagawa | TRANSMITTER / RECEIVER FOR ENCRYPTED SIGNALS |
US4661658A (en) * | 1985-02-12 | 1987-04-28 | International Business Machines Corporation | Offline PIN validation with DES |
DE3717022A1 (en) * | 1987-05-21 | 1988-12-15 | Thomson Brandt Gmbh | DATA TRANSFER SYSTEM |
DE3802612C1 (en) * | 1988-01-29 | 1989-08-17 | Prof. Dr. Bruckschen & Partner Gmbh, 4130 Moers, De | System for charging for television programmes and the like |
US4881264A (en) * | 1987-07-30 | 1989-11-14 | Merkle Ralph C | Digital signature system and method based on a conventional encryption function |
JPH0288859A (en) * | 1988-09-26 | 1990-03-29 | Hitachi Maxell Ltd | IC card entry/exit management system |
DE3827172C2 (en) * | 1987-08-13 | 1990-05-03 | Peter 8000 Muenchen De Elsner | |
EP0287720B1 (en) * | 1987-04-22 | 1992-01-08 | International Business Machines Corporation | Management of cryptographic keys |
US5202921A (en) * | 1991-04-01 | 1993-04-13 | International Business Machines Corporation | Method and apparatus for authenticating users of a communication system to each other |
US5231666A (en) * | 1992-04-20 | 1993-07-27 | International Business Machines Corporation | Cryptographic method for updating financial records |
JPH05327748A (en) * | 1992-05-27 | 1993-12-10 | Fujitsu Ltd | Multi-address communication system |
FR2696567A1 (en) * | 1992-10-02 | 1994-04-08 | Gemplus Card Int | Encryption and processing of signals from smart card - using value determined by traversal of tree determined by repeated processing of original data, as key |
JPH06274398A (en) * | 1993-03-24 | 1994-09-30 | Toshiba Corp | File control system |
EP0641103A2 (en) * | 1993-08-25 | 1995-03-01 | ALGORITHMIC RESEARCH Ltd. | Method and apparatus for key distribution in a selective braodcasting system |
-
1995
- 1995-03-28 DE DE1995111298 patent/DE19511298B4/en not_active Expired - Lifetime
Patent Citations (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4309569A (en) * | 1979-09-05 | 1982-01-05 | The Board Of Trustees Of The Leland Stanford Junior University | Method of providing digital signatures |
DE3325858A1 (en) * | 1982-07-23 | 1984-01-26 | Oak Industries Inc., Rancho Bernardo, Calif. | MULTI-LAYER ENCRYPTION SYSTEM FOR SENDING ENCRYPTED INFORMATION |
EP0132401A2 (en) * | 1983-07-21 | 1985-01-30 | Kabushiki Kaisha Toshiba | Information transmission system |
DE3524472A1 (en) * | 1984-07-09 | 1986-01-16 | Kabushiki Kaisha Toshiba, Kawasaki, Kanagawa | TRANSMITTER / RECEIVER FOR ENCRYPTED SIGNALS |
US4661658A (en) * | 1985-02-12 | 1987-04-28 | International Business Machines Corporation | Offline PIN validation with DES |
EP0287720B1 (en) * | 1987-04-22 | 1992-01-08 | International Business Machines Corporation | Management of cryptographic keys |
DE3717022A1 (en) * | 1987-05-21 | 1988-12-15 | Thomson Brandt Gmbh | DATA TRANSFER SYSTEM |
US4881264A (en) * | 1987-07-30 | 1989-11-14 | Merkle Ralph C | Digital signature system and method based on a conventional encryption function |
DE3827172C2 (en) * | 1987-08-13 | 1990-05-03 | Peter 8000 Muenchen De Elsner | |
DE3802612C1 (en) * | 1988-01-29 | 1989-08-17 | Prof. Dr. Bruckschen & Partner Gmbh, 4130 Moers, De | System for charging for television programmes and the like |
JPH0288859A (en) * | 1988-09-26 | 1990-03-29 | Hitachi Maxell Ltd | IC card entry/exit management system |
US5202921A (en) * | 1991-04-01 | 1993-04-13 | International Business Machines Corporation | Method and apparatus for authenticating users of a communication system to each other |
US5231666A (en) * | 1992-04-20 | 1993-07-27 | International Business Machines Corporation | Cryptographic method for updating financial records |
JPH05327748A (en) * | 1992-05-27 | 1993-12-10 | Fujitsu Ltd | Multi-address communication system |
FR2696567A1 (en) * | 1992-10-02 | 1994-04-08 | Gemplus Card Int | Encryption and processing of signals from smart card - using value determined by traversal of tree determined by repeated processing of original data, as key |
JPH06274398A (en) * | 1993-03-24 | 1994-09-30 | Toshiba Corp | File control system |
EP0641103A2 (en) * | 1993-08-25 | 1995-03-01 | ALGORITHMIC RESEARCH Ltd. | Method and apparatus for key distribution in a selective braodcasting system |
Non-Patent Citations (1)
Title |
---|
SANTOSH,CHOKHANI: Toward a National Public Key Infrastructure. In: IEEE Communications Magazine, Sept. 1994, S.70-74 * |
Also Published As
Publication number | Publication date |
---|---|
DE19511298A1 (en) | 1996-10-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
DE19511298B4 (en) | Procedure for issuing and revoking the authorization to receive broadcasts and decoders | |
DE69715535T2 (en) | Conditional access system and associated card | |
DE69312828T2 (en) | Access control procedures | |
DE69610343T2 (en) | Pay TV procedure | |
DE69019203T2 (en) | Controlled decryption of encrypted programs that are transferred between different areas of responsibility. | |
EP1040662B1 (en) | Method for securing a system protected by key hierarchy | |
DE69902527T3 (en) | ADJUSTMENT DEVICE BETWEEN A RECEIVER AND A SAFETY MODULE | |
DE69719803T2 (en) | PREVENTING REPEAT ATTACKS ON DIGITAL INFORMATION DISTRIBUTED BY NETWORK SERVICE PROVIDERS | |
DE60131270T2 (en) | Time Valid reasoning system | |
DE68928355T2 (en) | Reproduction of protected keys using generation data from distributed keys | |
DE69702310T2 (en) | METHOD FOR SECURE TRANSFER BETWEEN TWO DEVICES AND THE USE THEREOF | |
DE69737804T2 (en) | Conditional access system using messages with multiple encryption keys | |
DE3124150C2 (en) | Method for encrypting and transmitting information and decrypting the same | |
DE3325858A1 (en) | MULTI-LAYER ENCRYPTION SYSTEM FOR SENDING ENCRYPTED INFORMATION | |
DE2439116A1 (en) | METHOD AND DEVICE FOR DISTORTING AND EQUALIZING TRANSMISSION SIGNALS | |
EP0835564B1 (en) | Method and arrangement for the transmitter-related detection of listener-related data | |
DE69912550T2 (en) | Method and system for the controlled delivery of digital multimedia services | |
DE69910786T2 (en) | Methods of distributing keys to a number of secured devices, methods of communication between a number of secured devices, security system, and set of secured devices | |
DE68903995T2 (en) | METHOD FOR SENDING AND RECEIVING REPORTS FOR MANAGING ENTRY NAMES. | |
DE602004003346T2 (en) | PAY TELEVISION, METHOD FOR REMOVING RIGHTS IN SUCH A SYSTEM, ASSOCIATED DECODER AND CHIP CARD, AND MESSAGE TRANSMITTED TO SUCH A DECODER | |
DE68921316T2 (en) | Method for encrypting and decrypting composite video signals and device for carrying out this method. | |
DE2550624B2 (en) | Transmission method for interactive message or data services of a broadband communication system | |
EP0187973A2 (en) | Method and circuit arrangement for the prevention of unauthorised reception of scrambled television signals | |
EP0027572A1 (en) | Method and apparatus for ciphered transmission of information | |
WO2002013453A2 (en) | Method for data transmission using a tree structure having associated keys |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
OM8 | Search report available as to paragraph 43 lit. 1 sentence 1 patent law | ||
8110 | Request for examination paragraph 44 | ||
8364 | No opposition during term of opposition | ||
R071 | Expiry of right | ||
R071 | Expiry of right |