Number | Date | Country | Kind |
---|---|---|---|
10-201090 | Jul 1998 | JP |
Number | Name | Date | Kind |
---|---|---|---|
4533949 | Fujimura et al. | Aug 1985 | A |
4613901 | Gilhousen et al. | Sep 1986 | A |
4658292 | Okamoto et al. | Apr 1987 | A |
4712238 | Gilhousen et al. | Dec 1987 | A |
4799061 | Abraham et al. | Jan 1989 | A |
4864615 | Bennett et al. | Sep 1989 | A |
4887296 | Horne | Dec 1989 | A |
5615265 | Coutrot | Mar 1997 | A |
5642420 | Kuroda et al. | Jun 1997 | A |
5754651 | Blatter et al. | May 1998 | A |
6067121 | Shigihara | May 2000 | A |
6460137 | Akiyama et al. | Oct 2002 | B1 |
6594758 | Okui | Jul 2003 | B1 |
Number | Date | Country |
---|---|---|
0 179 612 | Apr 1986 | EP |
0704785 | Apr 1996 | EP |
0817185 | Jan 1998 | EP |
0822720 | Feb 1998 | EP |
8-32530 | Feb 1996 | JP |
8-149449 | Jun 1996 | JP |
10-11894 | Jan 1998 | JP |
10-106148 | Apr 1998 | JP |
Entry |
---|
Kent, Security Requirements and Protocols for a Broadcast Scenario, IEEE COM-29. No. 6 Jun. 1981.* |
Guillou, Encipherment and Conditional Access, SMPTE Journal Jun. 1994.* |
Macq, Cryptology for Digital TV Broadcasting, IEEE 83(6) Jun. 1995.* |
Tung, Research and Implementation of key Distribution and Management on ITV, 1998.* |
Mooij, Advances In conditional Access Technology, IEE 1997.* |
Saini, VideoCrypt An Open Architecture Pay TV System, IEEE 1991Langelaar, Overview of Protection Methods in Existing TV and Storage Devices, Feb., 1996.* |
Handbook of Applied Cryptography by Menezes Vanstone, Oorschot 1997, CRC Press LLC, US p. 36, pp. 551-553. |