【発明の詳細な説明】[産業上の利用分野]本発明は送信側で鍵によってスクランブルされた放送番
組データを受信側で1スクランブルするための暗号化鍵
配送方式に関する。DETAILED DESCRIPTION OF THE INVENTION [Field of Industrial Application] The present invention relates to an encryption key distribution system for scrambling broadcast program data scrambled by a key on the transmitting side once on the receiving side.
8[従来の技術]第2図は従来のスクランブル用暗号化鍵の配送方式を示
している。第2図中、左側は送信側を示し、右側は受信
側を示している。8 [Prior Art] FIG. 2 shows a conventional scrambling encryption key distribution system. In FIG. 2, the left side shows the transmitting side, and the right side shows the receiving side.
送信側において暗号化のための鍵はスクランブル鍵KS
とワーク鍵Kwと固有11Kmpの3種類の鍵が存在す
る。番組データBDは、受信者共通の放送番組データで
あり、スクランブラ101においてスクランブル鍵KS
でスクランブルされ信号eBDに変換される。BJは受
信者共通の番組に付随した番組情報であり、この番組情
報BJは視聴許可条件(例えば番組価格、視聴条件のコ
ード等)とスクランブル鍵KS等で構成される。番組情
報BJは暗号器102においてワーク鍵KWによって略
号化され信号eBJに変換される。上記スクランブル鍵
KSは通常約1秒位で更新される短周期の鍵である。ま
た、個別情報(KJ)群の中のKJpは、特定の受信者
p(例えばpさん)固有の個別情報であり、この個別情
報KJpは、契約条件(支払い金額、有効日数、視聴条
件のコード等)とワーク鍵KW等で構成され、暗号器1
03において受信者pの固有鍵Kmt)で暗号化され信
号eKJ pに変換される。上記ワーク鍵KWは通常約
1カ月位で更新される長周期の鍵である。The key for encryption on the sending side is the scramble key KS.
There are three types of keys: 1, a work key Kw, and a unique 11Kmp. The program data BD is broadcast program data common to all receivers, and the scrambler 101 uses the scramble key KS.
The signal is scrambled and converted into a signal eBD. BJ is program information attached to a program common to all recipients, and this program information BJ is composed of viewing permission conditions (for example, program price, viewing condition code, etc.), a scramble key KS, and the like. Program information BJ is abbreviated in encoder 102 using work key KW and converted into signal eBJ. The scramble key KS is a short-cycle key that is normally updated every about 1 second. In addition, KJp in the individual information (KJ) group is individual information unique to a specific recipient p (for example, Mr. etc.) and a work key KW, etc., and the encryptor 1
03, the signal is encrypted using the unique key Kmt of the receiver p and converted into a signal eKJp. The work key KW is a long-period key that is normally updated every about one month.
第2図中個別情報(KJ)群はKJl、KJ2゜・・・
・・・KJnで構成され(nは受信者数)、KJI)は
KJ群のいずれか一つを表わす。KJ群のすべてはそれ
ぞれ暗号器103で固有鍵(Km)群の対応する固有鍵
で暗号化されekJ群となる。受信者固有の鍵群は、各
受信者が1個ずつ保有しているI!Km l 、 Km
2 、 ””’−,Km O,”””。In Fig. 2, the individual information (KJ) group is KJl, KJ2゜...
...KJn (n is the number of recipients), and KJI) represents any one of the KJ groups. All of the KJ groups are each encrypted by the encoder 103 with the corresponding unique keys of the unique key (Km) group to form the ekJ group. The receiver-specific key group is I!, which each receiver owns one key group. Km l, Km
2, ``”'-, Km O, ``''''.
Kmnで構成される。It consists of Kmn.
上記の信号eBD、eBJの多数(7) e K J
ハ、合成1104で合成された後、各受信6宛に配送さ
れる。Many of the above signals eBD, eBJ (7) e K J
c. After being combined in the combining step 1104, the signals are delivered to each receiver 6.
一方、受信側においては、各受信考究に配送された信号
eBD、eBJと多数のekJは、分離器105で選択
分離され、信号eBD、eBJ及び自分宛の情報eKJ
pのみを抽出する。最初にeKJpが復号器106で受
信者pの固有鍵kmpで元のKJpに復号化される。次
に(3BJが、復号器107において、KJpの中に含
まれる受信者共通のワークIIKwを用いて元のBJに
復号化される。最後に、前記KJに含まれた契約条件と
BJに含まれた視聴許可条件とが比較照合器108にお
いて一致すると判定された場合にのみ切替器109が導
通状態になり、デスクランブラ110においてeBDが
BJの中に含まれるスクランブル鍵によって1スクラン
ブルされる。このようにして受信者側にて元の番組デー
タBDが取り出され、視聴される。On the other hand, on the receiving side, the signals eBD, eBJ and a large number of ekJs delivered to each receiving study are selectively separated by a separator 105, and the signals eBD, eBJ and information eKJ addressed to itself are separated by a separator 105.
Extract only p. First, eKJp is decrypted by the decryptor 106 to the original KJp using the unique key kmp of the recipient p. Next, (3BJ is decoded into the original BJ in the decoder 107 using the work IIKw that is common to the recipients and is included in KJp.Finally, the contract conditions included in the KJ and the Only when the comparator 108 determines that the viewing permission conditions match the selected viewing permission conditions, the switch 109 becomes conductive, and the descrambler 110 scrambles the eBD using the scramble key contained in the BJ. In this way, the original program data BD is taken out and viewed on the recipient side.
[発明が解決しようとする問題点]前述した従来の鍵配送方式では、例えば受信者が100
0万人であるとすると、仮に1つの伝送路でのワークR
Kwの配送能力が1時間に100万人であったとしても
、ワーク鍵を各受信者の固有鍵で暗号化して各受信者ご
とに個別に配送しているので、すべての受信者にワーク
鍵Kwを配送するには最低でも10IiFlを必要とす
る。また、受信者が常時受信待機をすることができない
場合や伝送路で生じるエラーを考慮してワーク鍵を数回
送出する場合にはワークIIKWの配送時間として数+
R11以上の時間が必要となる。このように従来の鍵配
送方式では、受信者が多数の場合ワーク鍵を送出するた
めの時間が問題となり、−伝送路だけではり−クIIK
wをすべての受信者に短時間で配送することができない
という欠点を有している。[Problems to be Solved by the Invention] In the conventional key distribution method described above, for example, if the recipient is 100
Assuming that there are 00,000 people, if the work R on one transmission line is
Even if Kw's delivery capacity is 1 million people per hour, the work key is encrypted with each recipient's unique key and delivered individually to each recipient, so the work key cannot be sent to all recipients. Delivery of Kw requires at least 10IiFl. In addition, if the recipient cannot always wait for reception or if the work key is sent several times in consideration of errors that occur on the transmission path, the delivery time of the work IIKW is set to several +
A time longer than R11 is required. In this way, in the conventional key distribution method, when there are many recipients, the time required to send out the work key becomes a problem, and the transmission path alone is insufficient.
It has the disadvantage that w cannot be delivered to all recipients in a short time.
本発明の目的は、受信珈が多数であってもワークI!K
Wを短時間で配送することのできる暗号化鍵配送方式を
提供することにある。An object of the present invention is to provide a work I! K
The purpose of the present invention is to provide an encryption key distribution method that can deliver W in a short time.
E問題点を解決するための手段]本発明に係る暗号化鍵配送方式は、受信側では個別情報
の契約条件と番組情報の視聴許可条件とが一致するとい
う条件の下でスクランブル鍵が取り出されることを考慮
して、固有鍵を受信者共通の鍵と受信者ごと異なる鍵で
構成し、ワーク鍵を受信者共通の鍵で暗号化して受信者
全員に与えることとし、ワーク鍵以外の個別情報は受信
者ごと異なる鍵で暗号化し伝送するように構成される。Means for Solving Problem E] In the encryption key distribution method according to the present invention, the scramble key is extracted on the receiving side under the condition that the contract conditions of individual information and the viewing permission conditions of program information match. Taking this into consideration, the unique key consists of a key common to all recipients and a different key for each recipient, and the work key is encrypted with a key common to all recipients and given to all recipients, and individual information other than the work key is is configured to be encrypted and transmitted using a different key for each recipient.
[実施例]以下に本発明の実施例を添付図面に従って説明する。[Example]Embodiments of the present invention will be described below with reference to the accompanying drawings.
第1図は本発明に係る暗号化鍵配送方式を示すプロツク
図であり、第1図中左側に送信側装置を、右側に受信側
装置を示す。第1図において、経木的構成は第2図で示
した従来のものと同じであるので、第1図中第2図で示
した同一要素には同一符号を付し、その詳細な説明を省
略する。すなゎち、101は番組データBDをスクラン
ブルするスクランブラ、102は番組情報BJを暗号化
する暗号器、103は個別情報を暗号化する暗号器、1
04は合成器、105は分離器、106は個別情報を復
号する復号器、107は番組情報を復号する復号器、1
08は比較照合器、109は切替器、110はデスクラ
ンブラである。L記の各構成要素の機能は従来技術の箇
所で説明した通りである。FIG. 1 is a block diagram showing an encryption key distribution system according to the present invention. In FIG. 1, the left side shows a transmitting side device, and the right side shows a receiving side device. In Fig. 1, the structural structure is the same as the conventional one shown in Fig. 2, so the same elements shown in Fig. 1 and Fig. 2 are denoted by the same reference numerals, and detailed explanation thereof will be omitted. do. That is, 101 is a scrambler that scrambles the program data BD, 102 is an encoder that encrypts the program information BJ, 103 is an encoder that encodes individual information, 1
04 is a combiner, 105 is a separator, 106 is a decoder that decodes individual information, 107 is a decoder that decodes program information, 1
08 is a comparison/verification device, 109 is a switch, and 110 is a descrambler. The functions of each component listed in L are as explained in the prior art section.
次に本発明の特徴的部分を説明する。送信側の固有鍵(
Km)群には、各受信者ごとに異ならせた固有IKml
、Km2.−−−−−−Kmp、−−−−−−Kmn
と受信者のすべてに共通するlIKmOとが含まれる。Next, characteristic parts of the present invention will be explained. Sender's unique key (
Km) group has a unique IKml that is different for each recipient.
, Km2. -------Kmp, ------Kmn
and lIKmO common to all recipients.
上記においてnは整数で受信者の数を表わし、pは任意
の受信賃を表わす符号である。In the above, n is an integer representing the number of recipients, and p is a code representing an arbitrary reception fee.
暗号器103は個別情報(KJ)群の中に含まれる個別
情報KJpの暗号化を行うが、この場合にはワークI!
Kwを含む共通の個別情報KJOとそれ以外の個別情報
KJDとを別々に暗号化する。The encoder 103 encrypts the individual information KJp included in the individual information (KJ) group, but in this case, the work I!
Common individual information KJO including Kw and other individual information KJD are separately encrypted.
すなわち、暗号!103においてワーク鍵KWを含む共
通の個別情報KJOは鍵KmOで暗号化されて信号eK
Joに変換され、他の゛受診者ごとに異なる個別情報K
Jpは受信者ごとに異なる鍵Kmpによって暗号化され
信号eKJpに変換される。In other words, cryptography! In 103, the common individual information KJO including the work key KW is encrypted with the key KmO and sent as a signal eK.
This information is converted into JO and other individual information K that differs for each patient.
Jp is encrypted using a different key Kmp for each recipient and converted into a signal eKJp.
一方、受信側においては、復号器106で、伝送されて
きた上記信号eKJoとeK、JDとを、各受信者に設
けられた共通のIIKmOと受信者ごとに異なる鍵Km
pとでそれぞれ復号化し、KJpとKJOを取り出す。On the other hand, on the receiving side, the decoder 106 converts the transmitted signals eKJo, eK, and JD into a common IIKmO provided for each receiver and a key Km, which is different for each receiver.
p and extract KJp and KJO.
そして個別情報KJOのワークI!Kwを用いて復j3
器107で番組情報BJを取り出し、比較照合器108
で個別情報KJpと番組情報BJを比較し、契約条件と
視聴許可条件が一致したときにのみ切替器109を導通
させ、スクランブラ鍵Ksを出力させる。And individual information KJO's work I! revenge using Kw
The program information BJ is taken out by the device 107 and compared and verified by the comparison device 108.
The individual information KJp and the program information BJ are compared, and only when the contract conditions and the viewing permission conditions match, the switch 109 is made conductive and the scrambler key Ks is output.
上記の実施例において、受信者に共通の鍵KmOは全受
信者に対して共通としたが、全受信者を複数のブロック
に分け、ブロックごとに異なる鍵を設け、゛複数の鍵と
して構成できる。このように必要に応じて受信者に共通
な鍵を数個以上使用することもできる。In the above embodiment, the key KmO common to all recipients is common to all recipients, but it is also possible to divide all recipients into multiple blocks and provide a different key for each block, thereby configuring the key KmO as multiple keys. . In this way, several or more keys common to recipients can be used if necessary.
[発明の効果1以上の説明で明らかなように本発明によれば、固有鍵の
中に受信者に共通な鍵を用意し、この鍵でワーク鍵を暗
号化するようにしたため、ワーク鍵を瞬時に全受信者に
配送でき、長周期のワーク鍵の配送時間を大幅に短縮で
きる。また、受信者が1力月単位の短期契約であっても
、必要な時期に随時ワーク鍵を変更できるという効果も
発揮される。[Effect of the invention 1] As is clear from the above explanation, according to the present invention, a key common to recipients is prepared in the unique key, and the work key is encrypted with this key. It can be delivered to all recipients instantly, greatly reducing the delivery time for long-cycle work keys. Furthermore, even if the recipient has a short-term contract of one month, the work key can be changed at any time as needed.
第1図は本発明に係る暗号化鍵配送方式を説明するため
のプ【コック図、第2図は従来の暗号化鍵配送方式を説明するためのブロ
ック図である。[符号の説明]101・・・・・・スクランブラ102.103・・・・・・暗号器104・・・・・・合成器105・・・・・・分離器108.107・・・−復号器108・・・・・・比較照合器110・・・・・・デスクランブラFIG. 1 is a block diagram for explaining the encryption key distribution method according to the present invention, and FIG. 2 is a block diagram for explaining the conventional encryption key distribution method. [Explanation of codes] 101...Scrambler 102.103...Encryptor 104...Synthesizer 105...Separator 108.107...- Decoder 108... Comparison/verifier 110... Descrambler
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| JP63077296AJPH01248891A (en) | 1988-03-30 | 1988-03-30 | Encipherment key delivery system |
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| JP63077296AJPH01248891A (en) | 1988-03-30 | 1988-03-30 | Encipherment key delivery system |
| Publication Number | Publication Date |
|---|---|
| JPH01248891Atrue JPH01248891A (en) | 1989-10-04 |
| JPH0468836B2 JPH0468836B2 (en) | 1992-11-04 |
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| JP63077296AGrantedJPH01248891A (en) | 1988-03-30 | 1988-03-30 | Encipherment key delivery system |
| Country | Link |
|---|---|
| JP (1) | JPH01248891A (en) |
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JPH099241A (en)* | 1995-06-15 | 1997-01-10 | Sony Corp | Scramble broadcasting system, scrambling method, scrambling device and descrambling device |
| JPH11243536A (en)* | 1997-12-26 | 1999-09-07 | Toshiba Corp | Broadcast receiving device and contract management device |
| JP2003115832A (en)* | 2001-10-03 | 2003-04-18 | Nippon Hoso Kyokai <Nhk> | Content transmission device, content reception device, content transmission program, content reception program |
| JP2003152698A (en)* | 2001-11-15 | 2003-05-23 | Nippon Hoso Kyokai <Nhk> | Content usage control transmission method, content usage control reception method, content usage control transmission device, content usage control reception device, content usage control transmission program, content usage control reception program |
| USRE38529E1 (en) | 1994-06-24 | 2004-06-08 | Sony Corporation | Scramble/descramble method and apparatus for data broadcasting |
| US7051212B2 (en) | 1995-02-13 | 2006-05-23 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
| US7062500B1 (en) | 1997-02-25 | 2006-06-13 | Intertrust Technologies Corp. | Techniques for defining, using and manipulating rights management data structures |
| US7069451B1 (en) | 1995-02-13 | 2006-06-27 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
| US7092914B1 (en) | 1997-11-06 | 2006-08-15 | Intertrust Technologies Corporation | Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information |
| JP2006217645A (en)* | 2006-03-13 | 2006-08-17 | Nippon Hoso Kyokai <Nhk> | Content usage control transmission method, content usage control transmission device, and content usage control transmission program |
| US7095854B1 (en) | 1995-02-13 | 2006-08-22 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
| US7120802B2 (en) | 1996-08-12 | 2006-10-10 | Intertrust Technologies Corp. | Systems and methods for using cryptography to protect secure computing environments |
| US7133846B1 (en) | 1995-02-13 | 2006-11-07 | Intertrust Technologies Corp. | Digital certificate support system, methods and techniques for secure electronic commerce transaction and rights management |
| US7143290B1 (en) | 1995-02-13 | 2006-11-28 | Intertrust Technologies Corporation | Trusted and secure techniques, systems and methods for item delivery and execution |
| US7165174B1 (en) | 1995-02-13 | 2007-01-16 | Intertrust Technologies Corp. | Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management |
| JP2008035534A (en)* | 2007-09-03 | 2008-02-14 | Fujitsu Ltd | Terrestrial digital broadcasting system and terrestrial digital broadcasting rights protection device |
| US7401232B2 (en) | 2002-03-20 | 2008-07-15 | Matsushita Electric Industrial Co., Ltd. | Content playback apparatus method and program and key management apparatus and system |
| JP2009153122A (en)* | 2008-12-08 | 2009-07-09 | Fujitsu Ltd | Terrestrial digital broadcasting system and terrestrial digital broadcasting rights protection device |
| JP2010178366A (en)* | 2010-03-26 | 2010-08-12 | Fujitsu Ltd | Digital terrestrial broadcasting system and digital terrestrial broadcasting right protection device |
| JP2010233222A (en)* | 2010-03-26 | 2010-10-14 | Fujitsu Ltd | Terrestrial digital broadcasting system and terrestrial digital broadcasting rights protection device |
| JP2010233223A (en)* | 2010-03-26 | 2010-10-14 | Fujitsu Ltd | Terrestrial digital broadcasting system and terrestrial digital broadcasting rights protection device |
| JP2011041293A (en)* | 2010-09-06 | 2011-02-24 | Fujitsu Ltd | Receiver and communication method |
| JP2012054979A (en)* | 2011-10-12 | 2012-03-15 | Fujitsu Ltd | Transmitter and method performed by transmitter |
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| USRE38529E1 (en) | 1994-06-24 | 2004-06-08 | Sony Corporation | Scramble/descramble method and apparatus for data broadcasting |
| US7120800B2 (en) | 1995-02-13 | 2006-10-10 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
| US7133846B1 (en) | 1995-02-13 | 2006-11-07 | Intertrust Technologies Corp. | Digital certificate support system, methods and techniques for secure electronic commerce transaction and rights management |
| US7392395B2 (en) | 1995-02-13 | 2008-06-24 | Intertrust Technologies Corp. | Trusted and secure techniques, systems and methods for item delivery and execution |
| US7281133B2 (en) | 1995-02-13 | 2007-10-09 | Intertrust Technologies Corp. | Trusted and secure techniques, systems and methods for item delivery and execution |
| US7051212B2 (en) | 1995-02-13 | 2006-05-23 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
| US7165174B1 (en) | 1995-02-13 | 2007-01-16 | Intertrust Technologies Corp. | Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management |
| US7069451B1 (en) | 1995-02-13 | 2006-06-27 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
| US7415617B2 (en) | 1995-02-13 | 2008-08-19 | Intertrust Technologies Corp. | Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management |
| US7143290B1 (en) | 1995-02-13 | 2006-11-28 | Intertrust Technologies Corporation | Trusted and secure techniques, systems and methods for item delivery and execution |
| US7095854B1 (en) | 1995-02-13 | 2006-08-22 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
| US7100199B2 (en) | 1995-02-13 | 2006-08-29 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
| JPH099241A (en)* | 1995-06-15 | 1997-01-10 | Sony Corp | Scramble broadcasting system, scrambling method, scrambling device and descrambling device |
| US7120802B2 (en) | 1996-08-12 | 2006-10-10 | Intertrust Technologies Corp. | Systems and methods for using cryptography to protect secure computing environments |
| US7062500B1 (en) | 1997-02-25 | 2006-06-13 | Intertrust Technologies Corp. | Techniques for defining, using and manipulating rights management data structures |
| US7110983B2 (en) | 1997-11-06 | 2006-09-19 | Intertrust Technologies Corporation | Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information |
| US7092914B1 (en) | 1997-11-06 | 2006-08-15 | Intertrust Technologies Corporation | Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information |
| US7143066B2 (en) | 1997-11-06 | 2006-11-28 | Intertrust Technologies Corp. | Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information |
| JPH11243536A (en)* | 1997-12-26 | 1999-09-07 | Toshiba Corp | Broadcast receiving device and contract management device |
| JP2003115832A (en)* | 2001-10-03 | 2003-04-18 | Nippon Hoso Kyokai <Nhk> | Content transmission device, content reception device, content transmission program, content reception program |
| JP2003152698A (en)* | 2001-11-15 | 2003-05-23 | Nippon Hoso Kyokai <Nhk> | Content usage control transmission method, content usage control reception method, content usage control transmission device, content usage control reception device, content usage control transmission program, content usage control reception program |
| US7401232B2 (en) | 2002-03-20 | 2008-07-15 | Matsushita Electric Industrial Co., Ltd. | Content playback apparatus method and program and key management apparatus and system |
| JP2006217645A (en)* | 2006-03-13 | 2006-08-17 | Nippon Hoso Kyokai <Nhk> | Content usage control transmission method, content usage control transmission device, and content usage control transmission program |
| JP2008035534A (en)* | 2007-09-03 | 2008-02-14 | Fujitsu Ltd | Terrestrial digital broadcasting system and terrestrial digital broadcasting rights protection device |
| JP2009153122A (en)* | 2008-12-08 | 2009-07-09 | Fujitsu Ltd | Terrestrial digital broadcasting system and terrestrial digital broadcasting rights protection device |
| JP2010178366A (en)* | 2010-03-26 | 2010-08-12 | Fujitsu Ltd | Digital terrestrial broadcasting system and digital terrestrial broadcasting right protection device |
| JP2010233222A (en)* | 2010-03-26 | 2010-10-14 | Fujitsu Ltd | Terrestrial digital broadcasting system and terrestrial digital broadcasting rights protection device |
| JP2010233223A (en)* | 2010-03-26 | 2010-10-14 | Fujitsu Ltd | Terrestrial digital broadcasting system and terrestrial digital broadcasting rights protection device |
| JP2011041293A (en)* | 2010-09-06 | 2011-02-24 | Fujitsu Ltd | Receiver and communication method |
| JP2012054979A (en)* | 2011-10-12 | 2012-03-15 | Fujitsu Ltd | Transmitter and method performed by transmitter |
| Publication number | Publication date |
|---|---|
| JPH0468836B2 (en) | 1992-11-04 |
| Publication | Publication Date | Title |
|---|---|---|
| JPH01248891A (en) | Encipherment key delivery system | |
| US6782475B1 (en) | Method and apparatus for conveying a private message to selected members | |
| JP3655921B2 (en) | Method and apparatus for uniquely encrypting multiple services at a transmission point | |
| KR100863748B1 (en) | Method for generating the counter block value | |
| US6504930B2 (en) | Encryption and decryption method and apparatus using a work key which is generated by executing a decryption algorithm | |
| JP4976107B2 (en) | Method for scrambling and descrambling a unit of data | |
| JP2004320819A (en) | Method and apparatus for uniquely enciphering data for terminal office | |
| JPH06125554A (en) | Protective method for encoding of sunscribed satellite television | |
| KR920702158A (en) | External security module for television signal decoder | |
| RU2006147370A (en) | METHOD FOR DECRAMBLING A SCRUMBED CONTENT INFORMATION OBJECT | |
| AU750042B2 (en) | Method and apparatus for conveying a private message to selected members | |
| JPH10164053A (en) | Verification method/system for data by scrambling | |
| JP4043669B2 (en) | Related information processing device in conditional access system | |
| JPH0225186B2 (en) | ||
| JPH10107832A (en) | Cipher multi-address mail system | |
| JPH09130374A (en) | Encipherment system | |
| JPH0550172B2 (en) | ||
| JP4536092B2 (en) | Conditional reception processing device | |
| JP7174633B2 (en) | Content distribution device, mobile terminal, receiving device and their programs | |
| JP4692070B2 (en) | Information processing system, information processing apparatus, information processing method, and program | |
| JPH03179839A (en) | Encrypted digital broadcasting equipment | |
| CN101500147B (en) | A digital TV viewing control method and device based on two-way network | |
| JPH03179842A (en) | Encrypted digital broadcasting equipment | |
| JPS63219244A (en) | Encrypted information processing method | |
| NL1000964C2 (en) | Method for providing access to information via encryption / decryption of messages, as well as transmitting device and receiving device. |