摘要:
Sets of encryption keys useful by devices for decrypting encrypted content are defined using an error-correcting code such as a Reed-Solomon code to define vectors of length “n” over an alphabet of (0, . . . , N−1), wherein “n” is the number of columns in a key matrix and “N” is the number of rows in the matrix. Each vector represents a set of keys that can be assigned to a device. With this invention, overlap between sets of keys can be minimized to minimize the possibility that the key set of an innocent device might be inadvertently revoked when the key set of a compromised device is revoked. Also, only the generating matrix of the error-correcting code and the index of one set of keys need be stored in memory, since all previously defined key sets can be regenerated if need be from just the generating matrix and index.
摘要:
A system and method for permitting the rental of digitized content such as music from a kiosk includes a flash memory device that is insertable into the kiosk. The kiosk derives a content key from a media key block and a media ID on the flash memory device, and then encrypts the content using the content key and records the content on the flash memory device. The flash memory device can then be removed and engaged with a player-recorder which decrypts the content and plays the content. When it is desired to check the content back in, the flash memory device is engaged with the kiosk and the content is erased. Importantly, the media ID of the flash memory device is altered during check in, such that if the user saved the content prior to check in, the content, if recorded back onto the flash memory device after check in, could not be decrypted.
摘要:
A digital broadcast system provides secure transmission of digital programs to in-home digital devices even when some of the devices are unauthorized. A matrix of device keys Sj,i is provided, wherein “i” is a key index variable indicating a position in a key dimension of the matrix and “j” is a sets index variable indicating a position in a sets dimension of the matrix. Each in-home device is assigned plural dev ice keys from the matrix, with one and only one device key for each key index variable “i” being assigned to a device. To generate a session key for a broadcast program, session numbers xi are encrypted with all device keys Sj,i to generate a session key block which is decrypted by the in-home devices and used to generate a session key for decrypting the program. If one of the devices is a compromised device, at least one of the session numbers is a dummy number that is encrypted and decrypted by the corresponding compromised device key, with the resulting session key being useless in decrypting the program.