Abstract:
PURPOSE:To prevent degradation in picture quality by placing a scanning line of an odd-numbered order into an odd-numbered order even after the replacement and placing a scanning line of an even-numbered order into an even-numbered order even after replacement in replacing the scanning line. CONSTITUTION:An analog video signal to be scrambled is inputted to a terminal 1 in a scrambler at the broadcast station side, and after this signal passes through an LPF2, it is fed to an A/D converting circuit 3 and a master clock oscillator 4. Then the oscillator 4 produces a master clock having subcarrier frequencies fSC-3fSC based on a color burst signal of the video signal, and the clock is fed to an A/D converter 3, a synchronizing separator circuit 5 and a timing clock generating circuit 6. This converter 3 samples the input video signal by using the master clock and converts it into a digital video signal. This signal is fed to a frame memory 7, written in a ROM8, read from a ROM9 based on the scanning designation signal from a computer 10 and the scanning lines are replaced.
Abstract:
PURPOSE:To increase the secrecy by reversing the sequence of scanning lines of each block within the said block and replacing optionally the arrangement of the block to obtain scramble effect with a few number of blocks. CONSTITUTION:An analog video signal is inputted from a terminal 1, led to an A/D converter 3 and a master clock generator 4 through an LPF2, the generator 4 forms master clock having subcarrier frequencies fSC-3fSC based on a color burst signal and the result is fed to the A/D converter 3, a synchronizing separator 5 and a timing clock generating circuit 6. The converter 3 samples the input by using a master clock, converts it into a digital video signal, which is fed to a frame memory 7. Then the memory 7 has a capacity storing one frame of the video signal, written by a write address signal obtained from a ROM8, read by a read signal obtained from the ROM9 designated by a computer 10 and transmitted on a replaced scanning line.
Abstract:
PROBLEM TO BE SOLVED: To make contract change easily. SOLUTION: The contract change information, such a channel number wanted to make a new flat contract, is input, and when it is reserved in an EEPROM 24 of a security module 9, a decoder 8 transmits the contract change information to a transmission-side system. Whereby the transmission side system transmits separate information to the security module 9 making the new flat contract. In a first decoder 23, a contract key is extracted from the separate information on the basis of a contract key, and in a second decoder 22, a scramble key is extracted from the program information on the basis of the contract key and is supplied to a descrambler 21, and the predetermined program of the channel making the flat contract is descrambled. COPYRIGHT: (C)2010,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To suppress an unauthorized use of descrambling keys for descrambling scramble broadcast. SOLUTION: A maker discrimination section 81 determines the maker of a receiving device 30. A GK acquisition section 82 reads GK seed and GK corresponding to the maker from a memory. A UK generation section 83 generates random numbers for UK. A UK encryption section 84 uses the GK to encrypt the UK. A descrambling key encryption section 85 uses the UK and GK to encrypt the descrambling keys. An encryption section 92 encrypts the GK seed from the GK acquisition section 82 to obtain the GK. A UK decoding section 93 uses the GK to decode the encrypted UK. A descrambling key decoding section 94 uses the GK and the UK to decode the encrypted descrambling keys. The present invention can be applied to the receiving device. COPYRIGHT: (C)2010,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To easily identify an information processing device for an illegally utilized IC card, or the like. SOLUTION: A decoder 62 extracts a scramble key from information that is received and supplied by an unauthorized server 82 and includes the scramble key. A comparison section 161 compares ID information for identifying an IC card 142 held in advance with time information indicating clock time based on key output control data for controlling the output of the scramble key received and supplied by the unauthorized server 82. An output control section 162 controls the output of the scramble key, based on a comparison result by the comparison section 161. The present invention can be applied to, for example, the security module of the IC card, or the like for decoding an encrypted scramble key. COPYRIGHT: (C)2010,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To surely prevent skimming by simple constitution. SOLUTION: In a dummy non-contact IC card 4 to be operated by induced electromotive power, when a magnetic field supplied from the outside is detected, a meaningless noise signal NS is generated and output independently of whether a signal is to be received from a reader/writer 2 or not, so that when the magnetic field is detected, communication between the reader/writer 2 and a non-contact IC card 3 can be interrupted by the noise signal NS and skimming to information stored in the non-contact IC card 3 can be surely prevented. COPYRIGHT: (C)2007,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To provide a technology capable of easily realizing a system that is securer against information leakage without decreasing the convenience. SOLUTION: When an IC card 22 approaches a reception terminal 31, the reception terminal 31 detects the IC card 22, acquires card information 51, and supplies the information to an electronic money server 32. The electronic money server 32 applies preliminary authentication processing to the IC card 22, particularizes a dedicated object key 62 corresponding to the IC card 22, and supplies preliminary authentication result information 52 to a settlement terminal 33 in a secure state. The settlement terminal 33 uses the dedicated object key 62 included in the approached IC card 22 and the preliminary authentication result information 52 to carry out mutual authentication processing. When the IC card 22 and the settlement terminal 33 carry out the mutual authentication, the IC card 22 and the settlement terminal 33 succeedingly execute payment processing and complete the settlement. The technology above can be applied to authentication processing systems. COPYRIGHT: (C)2007,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To realize restricted reproduction corresponding to contents of a plurality of kinds in a server type broadcast. SOLUTION: A restricted reproducing system and a server type CAS module can be realized corresponding not only to distribution of contents by the broadcast from a transmitter 1, but also to download contents and streaming contents through communication with a content server 9. Accordingly, a hybrid type charging can also be realized in the distribution profile of various contents. Moreover, a plurality of receivers provided in each household can use in common various contents. Meanwhile, it is possible for the receivers outside of household that contents cannot be used even under the same service contract, if contents are copied. COPYRIGHT: (C)2007,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To facilitate management of master keys in a broadcast system. SOLUTION: Key management systems 2A to 2D of the makers of receiving sets 31A to 31D form master keys consisting of their own private keys, and public keys which form pairs with the private keys respectively, and transmit the master keys (public keys) and master key IDs to the key management equipment 21 of a key management center 11 to perform their registration. In the receiving sets 31A to 31D of the individual makers, the master keys (private keys) are kept. The broadcast equipment 22 of a broadcasting station 12 encrypts work keys on the basis of the master keys (public keys) having been registered in the management equipment 21, and broadcasts them as separate information. The individual receiving sets 31A to 31D decode the work keys by the use of the master keys (private keys). This can be applied to broadcast systems. COPYRIGHT: (C)2004,JPO&NCIPI
Abstract:
PROBLEM TO BE SOLVED: To provide a broadcast system that allows a user to easily view a program with a tentative contract. SOLUTION: A security module 22 in the contract information storage section 42 of which a program ID by which a viewer can view a program at tentative contract, a work key, number of days of an advanced tentative contract period, and an advanced tentative contract flag are stored in advance, is sold for viewers. A common individual information analysis section 41 extracts the current time included in common information supplied by a demultiplexer 31, adds the current time to the advanced tentative contract period stored in the contract information storage section 42 to calculate the validity limit of the work key. The common individual information analysis section 41 uses the work key to decode the common information and extracts a descramble key and gives it to a descrambler 32. The descrambler 32 uses the descramble key to descramble a video signal and an audio signal.