会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 5. 发明授权
    • Apparatus and method for multi-service transport multiplexing
    • 多业务传输复用的装置和方法
    • US06421359B1
    • 2002-07-16
    • US09679957
    • 2000-10-05
    • Christopher J. BennettMaximilien d'Oreye de Lantremange
    • Christopher J. BennettMaximilien d'Oreye de Lantremange
    • H04J302
    • H04N21/23608H04N21/23655
    • An elementary two-stream transport multiplexer provides for the addition of services contained in a transport stream to a pre-existing transport stream. The elementary multiplexer includes a pair of transport demultiplexers, a processor and a transport remultiplexer. The demultiplexers demultiplex a pair of input transport streams to their constituent service components and service control information tables. The service control information tables are routed to the processor which combines and reconfigures the information within the tables to provide a single set of output service control information tables. The demultiplexers filter the service components based on the output service control tables. The transport remultiplexer multiplexes the output tables with the filtered streams to provide an output transport stream.
    • 基本的双流传输多路复用器提供将包含在传输流中的服务添加到预先存在的传输流中。 基本多路复用器包括一对传输解复用器,处理器和传输再多路复用器。 解复用器将一对输入传输流解复用于其组成的服务组件和服务控制信息表。 服务控制信息表被路由到处理器,其结合并重新配置表内的信息以提供单组输出服务控制信息表。 多路分解器基于输出服务控制表过滤服务组件。 传输再多路复用器将输出表与经过滤的流复用以提供输出传输流。
    • 10. 发明授权
    • Reproduction of secure keys by using distributed key generation data
    • 使用分布式密钥生成数据复制安全密钥
    • US4864615A
    • 1989-09-05
    • US200111
    • 1988-05-27
    • Christopher J. BennettMichael V. HardingPaul Moroney
    • Christopher J. BennettMichael V. HardingPaul Moroney
    • G09C1/00H04K1/02H04L9/08H04N7/167
    • H04N7/1675H04L9/0822H04L9/0891H04N21/26613H04L2209/20
    • A key security system provides for the reproduction of secure keys by using distributed key generation data and a distributed encrypted prekey. The system encrypts program key generation data with a program key prekey in accordance with a first encryption algorithm to produce the program key; processes the program key to produce a keystream; and processes an information signal with the keystream to produce a scrambled information signal. The program key prekey is encrypted with a category key in accordance with a second encryption algorithm to produce an encrypted program key prekey. The scrambled information signal, the program key generation data and the encrypted program key prekey are distributed to descramblers. The descrambler within the key security system decrypts the distributed encrypted program key prekey with the category key in accordance with the second encryption algorithm to reproduce the program key prekey; encrypts the distributed program key generation data with the reproduced program key prekey in accordance with the first encryption algorithm to produce the program key; processes the reproduced program key to reproduce the keystream; and processes the distributed scrambled information signal with the reproduced keystream to descramble the distributed scrambled information signal. The key generation data incudes authorization data that must be processed by the authorization processor in the descrambler in order to enable the descrambler. The use of authorization data as key generation data protects the authorization data from spoofing attacks. When more data must be protected than a single operation of the encryption algorithm can support, then additional data blocks are protected by chaining the system, wherein the output from one stage forms part of the input to the next. The key generation data for the program key includes a sequence number securely associated with the category key to thereby "timelock" program key reproduction to the use of a current category key and thus prevent an attack based upon the use of an obsolete category key.