Conditional access system
First Claim
1. An access control processor for a conditional access system in which encrusted information segments provided by a plurality of information service providers are encrypted for transmission in accordance with different conditional access processes respectively utilizing different algorithms for encrypting the information segments, the processor comprisinga decryptor in an information receiver for decrypting encrypted information segments received by the information receiver by processing the received encrypted information segments with a session key used for encrypting the information segments in accordance with an algorithm utilized in one of said conditional access processes;
- anda conditional access controller in the information receiver for selectively enabling the decryptor to decrypt received information segments encrypted in accordance with any of said different conditional access processes by providing to the decryptor cryptographic information for defining the algorithm utilized in said one of said different conditional access processes for use by the decryptor to decrypt the received information segment encrypted in accordance with said algorithm.
6 Assignments
0 Petitions
Accused Products
Abstract
An access control processor for a conditional access system in which encrypted information segments provided by a plurality of information service providers are encrypted for transmission in accordance with different conditional access processes respectively utilizing different algorithms for encrypting the information segments. The processor includes a decryptor in an information receiver by decrypting encrypted information segmets received by the information receiver by processing the received encrypted information segments with a session key used for encrypting the information segments in accordance with an algorithm utilized in one of said conditional access processes; and a conditional access controller in the information receiver for selectively enabling the decryptor to decrypt received information segments encrypted in accordance with any of said different conditional access processes by providing to the decryptor cryptographic information for defining the algorithm utilized in said one of said different conditional access processes for use by the decryptor to decrypt the received information segment encrypted in accordance with said algorithm. Algorithm-defining cryptographic information is downloaded from an information stream received by the information receiver. Transmission of the cryptographic information for enabling the conditional access controller to enable the decryptor to decrypt a selected information segment may be requested by the conditional access controller and downloaded to the conditional access controller from an information stream received by the information receiver. A message related to an authorization status of the information receiver is retrieved for display from a plurality of different possible authorization status messages within an information stream received by the information receiver. Computer readable storage media are so configured as to cause the access control processor to perform its various functions.
-
Citations
28 Claims
-
1. An access control processor for a conditional access system in which encrusted information segments provided by a plurality of information service providers are encrypted for transmission in accordance with different conditional access processes respectively utilizing different algorithms for encrypting the information segments, the processor comprising
a decryptor in an information receiver for decrypting encrypted information segments received by the information receiver by processing the received encrypted information segments with a session key used for encrypting the information segments in accordance with an algorithm utilized in one of said conditional access processes; - and
a conditional access controller in the information receiver for selectively enabling the decryptor to decrypt received information segments encrypted in accordance with any of said different conditional access processes by providing to the decryptor cryptographic information for defining the algorithm utilized in said one of said different conditional access processes for use by the decryptor to decrypt the received information segment encrypted in accordance with said algorithm. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
- and
-
10. A conditional access system in which encrypted information is provided by a plurality of information service providers in accordance with different conditional access processes respectively utilizing different algorithms for encrypting the information, comprising
encryption means for encrypting information segments for transmission in accordance with different conditional access processes respectively utilizing different algorithms for encrypting the information segments; -
a decryptor in an information receiver for decrypting encrypted information segments received by the information receiver by processing the received encrypted information segments with a session key used for encrypting the information segments in accordance with an algorithm utilized in one of said conditional access processes; and a conditional access controller in the information receiver for selectively enabling the decryptor to decrypt received information segments encrypted in accordance with any of said different conditional access processes by providing to the decryptor cryptographic information for defining the algorithm utilized in said one of said different conditional access processes for use by the decryptor to decrypt the received information segment encrypted in accordance with said algorithm. - View Dependent Claims (11, 12, 13, 14, 15)
-
-
16. A computer readable storage medium for use in an access control processor included in an information receiver of a conditional access system in which encrypted information segments provided by a plurality of information service providers are encrypted for transmission in accordance with different conditional access processes respectively utilizing different algorithms for encrypting the information segments, and including a decryptor for decrypting encrypted information segments received by the information receiver by processing the received encrypted information segments with a session key used for encrypting the information segments in accordance with an algorithm utilized in one of said conditional access processes;
- and a conditional access controller,
wherein the storage medium is configured so as the cause the conditional access controller to selectively enable the decryptor to decrypt received information segments encrypted in accordance with any of said different conditional access processes, by providing to the decryptor cryptographic information for defining the algorithm utilized in said one of said different conditional access processes for use by the decryptor to decrypt the received information segment encrypted in accordance with said algorithm. - View Dependent Claims (17)
- and a conditional access controller,
-
18. A conditional access method in which encrypted information is provided by a plurality of information service providers in accordance with different conditional access processes respectively utilizing different algorithms for encrypting the information, comprising the steps of:
-
(a) encrypting information segments for transmission in accordance with different conditional access processes respectively utilizing different algorithms for encrypting the information segments; (b) using a decryptor in an information receiver to decrypt encrypted information segments received by the information receiver by processing the received encrypted information segments with a session key used for encrypting the information segments in accordance with an algorithm utilized in one of said conditional access processes; and (c) in the information receiver, selectively enabling the decryptor to decrypt received information segments encrypted in accordance with any of said different conditional access processes by providing to the decryptor cryptographic information for defining the algorithm utilized in said one of said different conditional access processes for use by the decryptor to decrypt the received information segment encrypted in accordance with said algorithm. - View Dependent Claims (19, 20, 21, 22, 23, 24, 25, 26, 27, 28)
-
Specification