Authentification of data in a digital transmission system
First Claim
1. A method of authenticating data, comprising:
- organizing the data into a hierarchical structure comprising a root directory unit, at least one subdirectory unit, and at least one file unit;
authenticating data in the at least one file unit using a first authentication algorithm, resulting in an associated file authentication value being stored in a referring subdirectory, wherein the referring subdirectory is a subdirectory hierarchically above the at least one file unit; and
authenticating the associated file authentication value using a second authentication algorithm, resulting in an associated subdirectory authentication value being stored in the root directory unit,transmitting the data as digital data in a digital transmission system, wherein the data includes the at least one file unit and the hierarchical structure comprising the file authentication value and the subdirectory authentication value.
6 Assignments
0 Petitions
Accused Products
Abstract
A method of authentification of data sent in a digital transmission characterized by the organization and authentification of the data prior to transmission into a hierarchy of at least one root directory unit (75), subdirectory unit (76) and file unit (77), data in a file (77) being acted upon by an authentification algorithm and an associated file authentification value (82) stored in the referring subdirectory unit (77), this file authentification value (82) being in turn acted upon by an authentification algorithm and an associated subdirectory authentification value (79) stored in the referring root directory. Other aspects of the invention relate to the authentification of a second root directory (78) by generation of a second authentification value (83) and the authentification of data before encapsulation in tables or sections of a transport stream.
7 Citations
19 Claims
-
1. A method of authenticating data, comprising:
-
organizing the data into a hierarchical structure comprising a root directory unit, at least one subdirectory unit, and at least one file unit; authenticating data in the at least one file unit using a first authentication algorithm, resulting in an associated file authentication value being stored in a referring subdirectory, wherein the referring subdirectory is a subdirectory hierarchically above the at least one file unit; and authenticating the associated file authentication value using a second authentication algorithm, resulting in an associated subdirectory authentication value being stored in the root directory unit, transmitting the data as digital data in a digital transmission system, wherein the data includes the at least one file unit and the hierarchical structure comprising the file authentication value and the subdirectory authentication value. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A method for verification of received data sent in a digital transmission system, comprising:
-
receiving the data organized into a hierarchical structure comprising a root directory unit, at least one subdirectory unit, and at least one file unit, wherein the received data comprises a file authentication value resulting from applying a first authentication algorithm to data in the at least one file unit, wherein the file authentication value is stored in a referring subdirectory, and wherein the received data further comprises a subdirectory authentication value resulting from a second authentication algorithm applied to the file authentication value, wherein the subdirectory authentication value is stored in the root directory unit; authenticating the received data in a file using the first authentication algorithm to obtain a first resulting value; comparing the first resulting value with the file authentication value stored in the referring subdirectory, wherein the referring subdirectory is a subdirectory hierarchically above the file; authenticating the file authentication value stored in the referring subdirectory using the second authentication algorithm to obtain a second resulting value; and comparing the second resulting value with the subdirectory authentication value stored in the root directory unit to verify the received data.
-
-
18. An apparatus for authenticating data, configured to:
-
organize the data into a hierarchical structure comprising a root directory unit, at least one subdirectory unit, and at least one file unit; authenticate data in the at least one file unit using a first authentication algorithm, resulting in an associated file authentication value being stored in a referring subdirectory, wherein the referring subdirectory is a subdirectory hierarchically above the at least one file unit; and authenticate the associated file authentication value using a second authentication algorithm, resulting in an associated subdirectory authentication value being stored in the root directory unit, transmitting the data as digital data in a digital transmission system, wherein the data includes the at least one file unit and the hierarchical structure comprising the file authentication value and the subdirectory authentication value.
-
-
19. A receiver/decoder for verification of received data sent in a digital transmission system, wherein the receiver/decoder is configured to:
-
receive the data organized into a hierarchical structure comprising a root directory unit, at least one subdirectory unit, and at least one file unit, wherein the received data comprises a file authentication value resulting from applying a first authentication algorithm to data in the at least one file unit, wherein the file authentication value is stored in a referring subdirectory, and wherein the received data further comprises a subdirectory authentication value resulting from a second authentication algorithm applied to the file authentication value, wherein the subdirectory authentication value is stored in the root directory unit; authenticate the received data in a file using the first authentication algorithm to obtain a first resulting value; compare the first resulting value with the file authentication value stored in the referring subdirectory, wherein the referring subdirectory is a subdirectory hierarchically above the file; authenticate the file authentication value stored in the referring subdirectory using the second authentication algorithm to obtain a second resulting value; and compare the second resulting value with the subdirectory authentication value stored in the root directory unit to verify the received data.
-
Specification