Claims
- 1. A method for distributing information to a plurality of conditional access receivers with a plurality of different signature checking capabilities, the method comprising:
generating a first signature over the information; generating a second signature over the information; sending the first and second signatures to the plurality of conditional access receivers; and sending the information to the plurality of conditional access receivers.
- 2. The method for distributing information to the plurality of conditional access receivers with the plurality of different signature checking capabilities as recited in claim 1, further comprising:
receiving the first signature associated with the information at a conditional access receiver; receiving the second signature associated with the information at the conditional access receiver; determining a signature checking capability of the conditional access receiver; choosing one of the first and second signatures; calculating a third signature over the information; and comparing the third signature to one of the first and second signatures.
- 3. The method for distributing information to the plurality of conditional access receivers with the plurality of different signature checking capabilities as recited in claim 1, further comprising:
generating a checksum over at least the information; and sending the checksum to the plurality of conditional access receivers.
- 4. The method for distributing information to the plurality of conditional access receivers with the plurality of different signature checking capabilities as recited in claim 1, wherein the sending the first and second signatures and sending the information comprise sending the same message.
- 5. The method for distributing information to the plurality of conditional access receivers with the plurality of different signature checking capabilities as recited in claim 1, wherein:
the plurality of conditional access receivers includes a first and second conditional access receivers; the first conditional access receiver uses a first signature algorithm different from a second signature algorithm used by the second conditional access receiver.
- 6. The method for distributing information to the plurality of conditional access receivers with the plurality of different signature checking capabilities as recited in claim 1, wherein the information comprises a software object.
- 7. The method for distributing information to the plurality of conditional access receivers with the plurality of different signature checking capabilities as recited in claim 1, wherein the information comprises authorization information.
- 8. A method for distributing information to a plurality of conditional access receivers with a plurality of different signature checking capabilities, comprising:
receiving a first signature associated with a message at a conditional access receiver; receiving a second signature associated with the message at the conditional access receiver; choosing one of the first and second signatures; calculating a third signature over the message; and comparing the third signature to one of the first and second signatures.
- 9. The method for distributing information to the plurality of conditional access receivers with the plurality of different signature checking capabilities as recited in claim 8, farther comprising:
generating the first signature over the message at a location remote to the conditional access receiver; generating the second signature over the message at the location remote to the conditional access receiver; sending the first and second signatures to the plurality of conditional access receivers; and sending the message to the plurality of conditional access receivers.
- 10. The method for distributing information to the plurality of conditional access receivers with the plurality of different signature checking capabilities as recited in claim 8, further comprising determining a signature checking capability of the conditional access receiver.
- 11. The method for distributing information to the plurality of conditional access receivers with the plurality of different signature checking capabilities as recited in claim 8, wherein the third signature corresponds to a security level that excludes one or more of the plurality of conditional access receivers from the security level.
- 12. The method for distributing information to the plurality of conditional access receivers with the plurality of different signature checking capabilities as recited in claim 8, further comprising generating a checksum over at least the message.
- 13. The method for distributing information to the plurality of conditional access receivers with the plurality of different signature checking capabilities as recited in claim 8, further comprising:
calculating a fourth signature over the message; and comparing the fourth signature to one of the first and second signatures.
- 14. A computer message stream embodied in at least one carrier wave for providing for authentication of the computer message stream, comprising:
a data segment comprising an object; a first signature segment comprising a first signature over the data segment; and a second signature segment comprising a second signature over the data code segment.
- 15. The computer message stream embodied in at least one carrier wave for providing for authentication of the computer message stream as recited in claim 14, further comprising an authorization segment comprising authorization information for the object.
- 16. The computer message stream embodied in at least one carrier wave for providing for authentication of the computer message stream as recited in claim 14, further comprising an integrity segment comprising a string characteristic of the object and other portions of the computer message stream.
- 17. The computer message stream embodied in at least one carrier wave for providing for authentication of the computer message stream as recited in claim 14, wherein the data segment is sent at a different time than at least one of the first and second signature segments.
- 18. The computer message stream embodied in at least one carrier wave for providing for authentication of the computer message stream as recited in claim 14, wherein the data segment is coupled to a first carrier wave and at least one of the first and second signature segments is coupled to a second carrier wave.
Parent Case Info
[0001] This application claims the benefit of U.S. Application No. 09/493,984 filed on Jan. 28, 2000.
Provisional Applications (2)
|
Number |
Date |
Country |
|
60165095 |
Nov 1999 |
US |
|
60173963 |
Dec 1999 |
US |
Continuation in Parts (1)
|
Number |
Date |
Country |
Parent |
09493984 |
Jan 2000 |
US |
Child |
09739982 |
Dec 2000 |
US |