Broadcast data access controller communication system
First Claim
1. A method for enabling only authorized ones of a plurality of receiver stations to obtain access to first information transmitted by a transmitter station, the method comprising the steps of:
- at the transmitter station, performing a first predefined algorithm to generate Subscription Key values for individual ones of the respective authorized receiver stations, wherein the first predefined algorithm is a function of a predetermined Decryption Key value;
providing the Subscription Key values to the individual ones of the respective authorized receiver stations;
at each of the authorized receiver stations, performing a second predefined algorithm using the Subscription Key value provided to the authorized receiver station, and generating a resultant value that equals the predetermined Decryption Key value;
transmitting a first signal from the transmitter station, the first signal including an encrypted version of the first information;
receiving the first signal at each of the receiver stations, and within each individual one of the authorized receiver stations, performing a third predefined algorithm using the resultant value to decrypt the encrypted version of the first information, thereby enabling the authorized receiver station to obtain access to the first information in decrypted form.
8 Assignments
0 Petitions
Accused Products
Abstract
Disclosed is a method and apparatus for enabling an authorized receiver station to decrypt encrypted information broadcast by a transmitter station, and for decrypting the information within the authorized receiver station. The method includes steps of storing a predetermined Subscription Key value in the authorized receiver station and, using the predetermined Subscription Key value, generating a Decryption Key value. In a next step the transmitter station broadcasts a signal which includes the encrypted information. After the broadcasted signal is received at the authorized receiver station, the authorized receiver station performs a predefined algorithm. The predefined algorithm uses the generated Decryption Key value to decrypt the encrypted information from the received signal.
-
Citations
43 Claims
-
1. A method for enabling only authorized ones of a plurality of receiver stations to obtain access to first information transmitted by a transmitter station, the method comprising the steps of:
-
at the transmitter station, performing a first predefined algorithm to generate Subscription Key values for individual ones of the respective authorized receiver stations, wherein the first predefined algorithm is a function of a predetermined Decryption Key value; providing the Subscription Key values to the individual ones of the respective authorized receiver stations; at each of the authorized receiver stations, performing a second predefined algorithm using the Subscription Key value provided to the authorized receiver station, and generating a resultant value that equals the predetermined Decryption Key value; transmitting a first signal from the transmitter station, the first signal including an encrypted version of the first information; receiving the first signal at each of the receiver stations, and within each individual one of the authorized receiver stations, performing a third predefined algorithm using the resultant value to decrypt the encrypted version of the first information, thereby enabling the authorized receiver station to obtain access to the first information in decrypted form. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 10, 29)
-
-
9. A method for enabling only authorized ones of a plurality of receiver stations to obtain access to first information transmitted by a transmitter station, the method comprising the steps of:
-
at the transmitter station, performing a first redefined algorithm to generate Subscription Key values for the respective authorized receiver stations, wherein the first predefined algorithm is a function of a predetermined Decryption Key value; providing the Subscription Key values to the respective authorized receiver stations; at each of the authorized receiver stations, performing a second predefined algorithm using the Subscription Key value provided to the authorized receiver station, and generating a resultant value that equals the predetermined Decryption Key value; transmitting a first signal from the transmitter station, the first signal including an encrypted version of the first information; receiving the first signal at each of the receiver stations, and within each individual one of the authorized receiver stations, performing a third predefined algorithm using the resultant value to decrypt the encrypted version of the first information, thereby enabling the authorized receiver station to obtain access to the first information in decrypted form, wherein the provided Subscription Key values are stored in the respective authorized receiver stations at storage locations identified by Tag values, the step of performing the second predetermined algorithm further includes the steps of; prior to performing the second predetermined algorithm and in response to an expiration of a predetermined time period, retrieving the stored Subscription key value associated with the Tag value corresponding to the predetermined time period; and performing the second predetermined algorithm with the retrieved Subscription Key value.
-
-
11. A method for enabling only authorized ones of a plurality of receiver stations to obtain access to first information transmitted by a transmitter station, the method comprising the steps of:
-
at the transmitter station, performing a first predefined algorithm to generate Subscription Key values for the respective authorized receiver stations, wherein the first predefined algorithm is a function of a predetermined Decryption Key value; providing the Subscription Key values to the respective authorized receiver stations; at each of the authorized receiver stations, performing a second predefined algorithm using the Subscription Key value provided to the authorized receiver station, and generating a resultant value that equals the predetermined Decryption Key value; transmitting a first signal from the transmitter station, the first signal including an encrypted version of the first information; receiving the first signal at each of the receiver stations, and within each individual one of the authorized receiver stations, performing a third predefined algorithm using the resultant value to decrypt the encrypted version of the first information, thereby enabling the authorized receiver station to obtain access to the first information in decrypted form, wherein the step of providing includes providing the Subscription Key values and respective Tag values to the respective authorized receiver stations, and the step of generating the resultant value further includes the step of; storing in the authorized receiver station the resultant value and the Tag value corresponding to the Subscription Key value provided to the authorized receiver station at a storage location identified by the Tag value. - View Dependent Claims (30, 31)
-
-
12. A method for enabling only authorized ones of a plurality of receiver stations to obtain access to first information transmitted by a transmitter station, the method comprising the steps of:
-
at the transmitter station, performing a first predefined algorithm to generate Subscription Key values for the respective authorized receiver stations, wherein the first predefined algorithm is a function of a predetermined Decryption Key value; providing the Subscription Key values to the respective authorized receiver stations; at each of the authorized receiver stations, performing a second predefined algorithm using the Subscription Key value provided to the authorized receiver station, and generating a resultant value that equals the predetermined Decryption Key value; transmitting a first signal from the transmitter station, the first signal including an encrypted version of the first information; receiving the first signal at each of the receiver stations, and within each individual one of the authorized receiver stations, performing a third predefined algorithm using the resultant value to decrypt the encrypted version of the first information, thereby enabling the authorized receiver station to obtain access to the first information in decrypted form, wherein the third predefined algorithm is performed in response to an occurrence of a triggering event, the triggering event being an occurrence of a predetermined time.
-
-
13. A method for enabling only authorized ones of a plurality of receiver stations to obtain access to first information transmitted by a transmitter station, the method comprising the steps of:
-
at the transmitter station, performing a first predefined algorithm to generate Subscription Key values for the respective authorized receiver stations, wherein the first predefined algorithm is a function of a predetermined Decryption Key value; providing the Subscription Key values to the respective authorized receiver stations; at each of the authorized receiver stations, performing a second predefined algorithm using the Subscription Key value provided to the authorized receiver station, and generating a resultant value that equals the predetermined Decryption Key value; transmitting a first signal from the transmitter station, the first signal including an encrypted version of the first information; receiving the first signal at each of the receiver stations, and within each individual one of the authorized receiver stations, performing a third predefined algorithm using the resultant value to decrypt the encrypted version of the first information, thereby enabling the authorized receiver station to obtain access to the first information in decrypted form, wherein the third predefined algorithm is performed in response to an occurrence of a triggering event, the triggering event being an occurrence of a predetermined time-of-day. - View Dependent Claims (14)
-
-
15. A method for enabling an authorized receiver station to decrypt encrypted information transmitted by a transmitter station, and for decrypting the encrypted information with the authorized receiver station, the method comprising the steps of:
-
storing a predetermined Subscription Key value in the authorized receiver station; retrieving the predetermined Subscription Key value stored in the authorized receiver station; performing a first predefined algorithm within the authorized receiver station using the predetermined Subscription Key value and a unique non-public value that is prestored in the authorized receiver station, to generate a Decryption Key value; transmitting a signal from the transmitter station, the signal including the encrypted information; receiving the signal at the authorized receiver station; and within the authorized receiver station, performing a second predefined algorithm using the Decryption key value to decrypt the encrypted information. - View Dependent Claims (18, 20, 21)
-
-
16. A method for enabling an authorized receiver station to decrypt encrypted information transmitted by a transmitter station, and for decrypting the encrypted information with the authorized receiver station, the method comprising the steps of:
-
storing a predetermined Subscription Key value in the authorized receiver station; retrieving the predetermined Subscription Key value stored in the authorized receiver station; performing a first predefined algorithm within the authorized receiver station using the predetermined Subscription Key value, to generate a Decryption Key value; transmitting a signal from the transmitter station, the signal including the encrypted information; receiving the signal at the authorized receiver station; and within the authorized receiver station, performing a second predefined algorithm using the Decryption key value to decrypt the encrypted information, wherein the second predefined algorithm is performed in response to an occurrence of a triggering event, the triggering event being an occurrence of a predetermined time. - View Dependent Claims (17)
-
-
19. A method for enabling an authorized receiver station to decrypt encrypted information transmitted by a transmitter station, and for decrypting the encryted information with the authorized receiver station, the method comprising the steps of:
-
storing a predetermined Subscription Key value in the authorized receiver station; retrieving the predetermined Subscription Key value stored in the authorized receiver station; performing a first predefined algorithm within the authorized receiver station using the predetermined Subscription Key value, to generate a Decryption Key value; transmitting a signal from the transmitter station, the signal including the encrypted information; receiving the signal at the authorized receiver station; and within the authorized receiver station, performing a second predefined algorithm using the Decryption key value to decrypt the encrypted information, wherein the first predefined algorithm is a function of (a) the predetermined Subscription Key value and (b) a User Key value stored in the authorized receiver station, and wherein prior to the performance of the step of storing, the predetermined Subscription Key value is determined by performing the first predefined algorithm using a first value that is predetermined to be equal to the Decryption Key value and a second value that equals the User Key value.
-
-
22. A Broadcast Data Access Controller (BDAC) communication system, comprising:
-
at least one transmitter station; at least one authorized receiver station, said at least one authorized receiver station including storage means for storing at least one predetermined Subscription Key value and a unique, non-public value; first control means coupled to said transmitter station, said first control means for transmitting a first signal from said transmitter station to said authorized receiver station, said first signal including first information encrypted in accordance with a predefined encryption algorithm and second information specifying that said predetermined Subscription Key value be accessed within said authorized receiver station; second control means coupled to said receiving station, said second control means being responsive to said second information for accessing said Subscription Key value and said unique, non-public value stored in said storage means and for performing a first predefined algorithm based on said accessed Subscription Key value and on said unique, non-public value to generate a Decryption Key value; and means coupled to said second control means for performing a second predefined algorithm based on said Decryption Key value to decrypt said encrypted first information of said first signal. - View Dependent Claims (23, 24, 25, 26, 27)
-
-
28. A method for enabling only authorized ones of a plurality of receiver stations to obtain access to first information transmitted by a transmitter station, the method comprising the steps of:
-
performing a first predefined algorithm to generate Subscription Key values for the respective authorized receiver stations, wherein the first predefined algorithm is function of a predetermined Decryption Key value; providing the Subscription Key values to the respective authorized receiver stations; transmitting a signal from the transmitter station, the signal including an encrypted version of the first information, the signal also including second information; receiving the signal at each of the receiver stations; and
within each individual one of the authorized receiver stations;performing a second predefined algorithm using the Subscription Key value provided to the authorized receiver station in combination with a unique, non-public value that is prestored in the authorized receiver station, and generating a resultant value that equals the predetermined Decryption Key value, and performing a third predefined algorithm using the resultant value to decrypt the encrypted version of the first information, thereby enabling the authorized receiver station to obtain access to the first information in decrypted form. - View Dependent Claims (35, 36)
-
-
32. A method for enabling an authorized receiver station to decrypt encrypted information transmitted by a transmitter station, and for decrypting the encrypted information with the authorized receiver station, the method comprising the steps of:
-
storing a predetermined Subscription Key value in the authorized receiver station; retrieving the predetermined Subscription Key value stored in the authorized receiver station; performing a first predefined algorithm within the authorized receiver station using the predetermined Subscription Key value, to generate a Decryption Key value; transmitting a signal from the transmitter station, the signal including the encrypted information; receiving the signal at the authorized receiver station; and within the authorized receiver station, performing a second predefined algorithm using the Decryption key value to decrypt the encrypted information, wherein prior to the storing step, steps are performed of; transmitting an information signal from the transmitter station, the information signal including first and second information, the first information specifying that the predetermined Subscription Key value is being transmitted, the second information including the predetermined Subscription Key value; receiving the information signal at the authorized receiver station; and
within the authorized receiver station, performing steps of;recognizing that the predetermined Subscription Key value is included in the received information signal, based on the first information included in the information signal, and then performing the step of storing the predetermined Subscription Key value in the authorized receiver station.
-
-
33. A method for enabling an authorized receiver station to decrypt encrypted information transmitted by a transmitter station, and for decrypting the encrypted information with the authorized receiver station, the method comprising the steps of:
-
storing a predetermined Subscription Key value in the authorized receiver station; retrieving the predetermined Subscription Key value stored in the authorized receiver station; performing a first predefined algorithm within the authorized receiver station using the predetermined Subscription Key value, to generate a Decryption Key value; transmitting a signal from the transmitter station, the signal including the encrypted information; receiving the signal at the authorized receiver station; and within the authorized receiver station, performing a second predefined algorithm using the Decryption key value to decrypt the encrypted information, wherein prior to the performance of the retrieving step, the authorized receiver station performs a step of recognizing an occurrence of a particular time, wherein the retrieving step is performed in response to the recognizing step, and wherein the first predefined algorithm is performed in response to the retrieving step. - View Dependent Claims (34)
-
-
37. A method for enabling only authorized ones of a plurality of receiver stations to obtain access to first information transmitted by a transmitter station, the method comprising the steps of:
-
performing a first predefined algorithm to generate Subscription Key values for the respective authorized receiver stations, wherein the first predefined algorithm is function of a predetermined Decryption Key value; providing the Subscription Key values to the respective authorized receiver stations; transmitting a signal from the transmitter station, the signal including an encrypted version of the first information, the signal also including second information; receiving the signal at each of the receiver stations; and within each individual one of the authorized receiver stations; performing a second predefined algorithm using the Subscription Key value provided to the authorized receiver station, and generating a resultant value that equals the predetermined Decryption Key value, and performing a third predefined algorithm using the resultant value to decrypt the encrypted version of the first information, thereby enabling the authorized receiver station to obtain access to the first information in decrypted form, wherein in response to the resultant value being generated, the resultant value is stored at a storage location identified by a respective Tag value, wherein the receiving step is performed after the performance of the second predefined algorithm, wherein the second information specifies Tag values, and wherein in response to receiving the signal, the authorized receiver station performs steps of; comparing the Tag values from the second information to the respective Tag value stored in the authorized receiver station, and, if any of the Tag values from the second information signal are equal to the respective Tag value stored in the authorized receiver station, retrieving the resultant value stored at the storage location identified by the Tag value stored in the authorized receiver station, and wherein the third predefined algorithm is performed in response to the retrieving step.
-
-
38. A decryption module, comprising:
-
a memory, said memory storing at least one first predetermined value and a second predetermined value that comprises a unique, non-public value; a controller, said controller being bidirectionally coupled to said memory, said controller for retrieving the at least one first predetermined value and said second predetermined value that comprises said unique, non-public value from said memory for performing a first predefined algorithm based on the at least one first predetermined value and said second predetermined value to generate a resultant value; and a decryption processor, said decryption processor being bidirectionally coupled to said controller, said decryption processor also for being bidirectionally coupled to a front end block of a receiver station that is in communication with a transmitter station which broadcasts encrypted information, said decryption processor for performing a second predefined algorithm using the resultant value generated by said controller to decrypt the encrypted information after the encrypted information is received by said front end block and provided to said decryption processor. - View Dependent Claims (40, 42)
-
-
39. A decryption module, comprising:
-
a memory, said memory storing at least one first predetermined value; a controller, said controller being bidirectionally coupled to said memory, said controller for retrieving the at least one first predetermined value from said memory for performing a first predefined algorithm based on the at least one first predetermined value to generate a resultant value; and a decryption processor, said decryption processor being bidirectionally coupled to said controller, said decryption processor also for being bidirectionally coupled to a front end block of a receiver station that is in communication with a transmitter station which broadcasts encrypted information, said decryption processor for performing a second predefined algorithm using the resultant value generated by said controller to decrypt the encrypted information after the encrypted information is received by said front end block and provided to said decryption processor, wherein the at least one first predetermined value is stored in the memory at a storage location identified by a respective Tag value, the respective Tag value specifying a particular time, wherein the controller includes means for recognizing an occurrence of the particular time specified by the Tag value, and wherein the controller retrieves the at least one first predetermined value from said memory for performing the first predefined algorithm in response to said recognizing means recognizing the occurrence of the particular time specified by the Tag value.
-
-
41. A decryption module, comprising:
-
a memory, said memory storing at least one first predetermined value; a controller, said controller being bidirectionally coupled to said memory, said controller for retrieving the at least one first predetermined value from said memory for performing a first predefined algorithm based on the at least one first predetermined value to generate a resultant value; and a decryption processor, said decryption processor being bidirectionally coupled to said controller, said decryption processor also for being bidirectionally coupled to a front end block of a receiver station that is in communication with a transmitter station which broadcasts encrypted information, said decryption processor for performing a second predefined algorithm using the resultant value generated by said controller to decrypt the encrypted information after the encrypted information is received by said front end block and provided to said decryption processor, wherein after said controller generates said resultant value said controller stores said resultant value in said memory at a storage location identified by a respective Tag value, wherein said transmitter station broadcasts information specifying the Tag value along with the encrypted information, wherein the controller is bidirectionally coupled to said front end block for receiving the information specifying the Tag value from the front end block after the information is received by the front end block from the transmitter station, said controller being responsive to receiving the information for associating the information with the Tag value stored said memory, for subsequently retrieving the resultant value from said memory, and for then providing said resultant value to said decryption processor, said decryption processor being responsive to receiving said resultant value for performing said second predefined algorithm.
-
-
43. A communication system, comprising:
-
a transmitter station for broadcasting a signal that includes encrypted information; at least one receiver station for receiving said signal, said at least one receiver station storing at least one first predetermined value that is input to said at least one receiver station and further storing a non-public value, related to an identification of the receiver station, that is prestored in said at least one receiver station, said at least one receiver station for performing a first predefined algorithm using the at least one predetermined value and the non-public value to generate a resultant value, said at least one receiver station also for performing a second predefined algorithm using the resultant value to decrypt the encrypted information included in the received signal.
-
Specification