Simulcrypt key sharing with hashed keys
First Claim
1. A method of deriving a content key that is shared among a plurality of conditional access (CA) vendors having independent CA systems with each CA system using independent key generation methods, the shared content key used at an encrypter as a control word to encrypt content, the method comprising:
- receiving a CA Value contribution from each of the plurality of CA vendors at the encrypter, where each CA Value contribution comprises a code word that is independently generated by each of the CA vendors;
hashing the CA Values from each of the plurality of CA vendors together using a hashing function to produce an output control word for encryption of the content;
at the encrypter using the output control word as a shared content key, wherein the shared content key is used as an encryption key to encrypt content provided to a plurality of receivers that decrypt the content using any of the independent conditional access systems;
wherein there are at least two CA Value contributions CAV1 and CAV2 and wherein CAV1 is used as an encryption key to encrypt CAV2 to produce an encrypted output; and
wherein one of CAV1 and CAV2 is combined with the encrypted output in an Exclusive OR process.
1 Assignment
0 Petitions
Accused Products
Abstract
A method of sharing keys among a plurality of conditional access (CA) vendors having differing CA systems used at a distribution headend involves receiving a CA Value contribution from each of the plurality of CA vendors at the headend; hashing the CA Values from each of the plurality of CA vendors together using a hashing function to produce an output control word; and at an encrypter at the headend, using the output control word as a content key, wherein the content key is used as an encryption key to encrypt content provided to a plurality of receivers that decrypt the content using any of the conditional access systems. This abstract is not to be considered limiting, since other embodiments may deviate from the features described in this abstract.
-
Citations
21 Claims
-
1. A method of deriving a content key that is shared among a plurality of conditional access (CA) vendors having independent CA systems with each CA system using independent key generation methods, the shared content key used at an encrypter as a control word to encrypt content, the method comprising:
-
receiving a CA Value contribution from each of the plurality of CA vendors at the encrypter, where each CA Value contribution comprises a code word that is independently generated by each of the CA vendors; hashing the CA Values from each of the plurality of CA vendors together using a hashing function to produce an output control word for encryption of the content; at the encrypter using the output control word as a shared content key, wherein the shared content key is used as an encryption key to encrypt content provided to a plurality of receivers that decrypt the content using any of the independent conditional access systems; wherein there are at least two CA Value contributions CAV1 and CAV2 and wherein CAV1 is used as an encryption key to encrypt CAV2 to produce an encrypted output; and wherein one of CAV1 and CAV2 is combined with the encrypted output in an Exclusive OR process. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A SimulCrypt apparatus that shares keys among a plurality of conditional access (CA) vendors having independent CA systems using independent key generation methods, comprising:
-
A synchronizer adapted to receive a CA Value contribution from each of the plurality of CA vendors, where each CA Value contribution comprises a code word that is independently generated by each of the CA vendors; A hashing processor configured to hash the CA Values contributions from each of the plurality of CA vendors together using a hashing function to produce an output control word for encryption of the content; an encrypter configured to use the output control word as a shared content key to encrypt content provided to a plurality of receivers that decrypt the content using any of the independent conditional access systems; wherein there are at least two CA Value contributions CAV1 and CAV2 and wherein CAV1 is used as an encryption key to encrypt CAV2 to produce an encrypted output; and
wherein one of CAV1 and CAV2 is combined with the encrypted output in an Exclusive OR process. - View Dependent Claims (11, 12, 13, 14, 15, 16)
-
-
17. A method of receiving encrypted content with shared keys at a receiver, the shared keys being keys shared among a plurality of independent Conditional Access (CA) vendors having independent CA systems, the method comprising:
-
receiving a plurality of Conditional Access (CA) Value contributions, where each CA Value contribution comprises a code word that is independently generated by each of the CA vendors; hashing the CA Value contributions to re-derive a control word (CW) used as a content encryption key for use in the receiver; receiving content at the receiver, the content being encrypted using the CW; decrypting the content at the receiver using the re-derived CW; wherein there are at least two CA Value contributions CAV1 and CAV2 and wherein CAV1 is used as an encryption key to encrypt CAV2 to produce an encrypted output; and
wherein one of CAV1 and CAV2 is combined with the encrypted output in an Exclusive OR process. - View Dependent Claims (18, 19, 20, 21)
-
Specification