Method and device for authorising conditional access

A technology for conditional access and authorization devices, applied in user identity/authority verification, electrical components, digital computer components, etc., can solve problems such as shutdown

Inactive Publication Date: 2007-10-03
IRDETO ACCESS
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This problem becomes even more serious as broadcast services in mobile phone handsets begin to be deployed, as these devices are often turned off for relatively long periods of time in order to conserve battery power

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for authorising conditional access
  • Method and device for authorising conditional access
  • Method and device for authorising conditional access

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] The head-end system 1 shown as an example in FIG. 1 is suitable for generating an encrypted digital data product and a right message used when decrypting the encrypted digital data product. In one embodiment, the encrypted digital data product is a file equipped with separate information implementing a digital rights management (DRM) system. Such information specifies the type of use that can be composed of encrypted data products. The file can be recorded on a data carrier such as an optical or magnetic disk. Alternatively, they can be downloaded by the receiver via a communication network including, for example, a cellular mobile telephone network, a satellite network, and / or a wired or terrestrial broadcasting network. In another embodiment, as shown in FIG. 1, the encrypted digital data product includes a set of one or more digital data streams composed of digital data packets including a header and a payload. The header contains an identification number indicating the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A method of authorising conditional access to an encrypted digital data product, includes storing at least one set (23) of entitlements in a secure device (19,21), each entitlement including a product identifier and expiry information, receiving entitlement control messages from a decoder system (13) including a device (25) for decrypting encrypted digital data products using control words, each entitlement control message including a product identifier, and in a first mode, returning at least one control word in response to an entitlement control message including a product identifier if the product identifier corresponds to a product identifier in a stored entitlement including expiry information indicating the entitlement to be valid, and, in a second mode, progressively adjusting a counter (31) to a pre-determined value and returning at least one control word in response also to entitlement control messages including a product identifier if the product identifier corresponds to a product identifier in a stored entitlement including expiry information indicating expiry of the entitlement and if the counter (31) is at a value between an initial value and the pre-determined value. The counter (31) is set to an initial value to commence operation in the second mode upon receiving an entitlement control message including a product identifier corresponding to a product identifier in a stored entitlement that includes expiry information indicating expiry of the entitlement.

Description

Technical field [0001] The invention relates to a method for accessing an encrypted digital data product under authorization conditions, including: [0002] Store at least one set of entitlements in the security device, each entitlement includes a product identification number and expiration information, [0003] Use the control word to receive right control messages from a decoder system including a device for decrypting encrypted digital data products, each right control message including a product identification number, and [0004] In the first mode, in response to the rights control message including the product identification number, if the product identification number corresponds to the product identification number in the stored rights including expiration information indicating that the rights are valid, at least one control word is returned, and [0005] In the second mode, also in response to the right control message including the product identification number, if the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04N7/16H04N7/167G06F21/10H04L9/36H04N7/173H04N21/266H04N21/4623H04N21/6334
CPCG06F21/10H04N21/26606H04N21/442H04N21/4627H04N21/4181G06F15/00H04L9/32G06F21/00
Inventor 杰拉尔德·J·德克沃纳·S·斯特里登阿尔伯特-詹·波斯查
Owner IRDETO ACCESS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products