PROCEDE DE DETECTION D'UNE ERREUR DE LECTURE D'UNE DONNEE
    101.
    发明公开
    PROCEDE DE DETECTION D'UNE ERREUR DE LECTURE D'UNE DONNEE 有权
    FEHLERERKENNUNGSVERFAHREN BEIM LESEN EINES DATUMS

    公开(公告)号:EP2786253A1

    公开(公告)日:2014-10-08

    申请号:EP12791783.9

    申请日:2012-11-29

    申请人: Viaccess

    IPC分类号: G06F11/16 G06F21/55 G06F21/79

    摘要: The invention relates to a datum reading error detection method, comprising: a) recording a first copy of the datum in a first area of an electronic storage and recording a second copy of the datum in a second area of an electronic storage; b) reading (68) the values of the first and second copies of the datum in, respectively, the first and second areas; c) comparing (74) the values read from the first and second copies of the datum; e) if the values read from the first and second copies are different, then the preceding Steps b) and c) are repeated (78, 80); f) if the values read during step e) are identical, then an error in reading said datum is detected (82), and if the values are not identical, then no error in reading said datum is detected.

    摘要翻译: 公开了一种用于检测数据项的读取中的错误的方法,该方法包括:a)将数据项的第一副本存储在电子存储器的第一区域中,并将数据项的第二副本存储在 电子存储器的第二区域。 在步骤b中,还包括分别读取第一和第二区域中的数据项的第一和第二副本的值。在步骤c)中,这里是第一和第二副本的读取值的比较 数据项,如果第一和第二副本的读取值不同,则重复上述步骤b)和c)(78,80),然后f)如果在步骤e)中读取的值相同,则错误 检测到该数据项的读取(82),否则检测到该数据项的读取中没有错误。

    PROCEDE DE DETECTION D'UNE UNTILISATION ILLICITE D'UN PROCESSEUR DE SECURITE
    103.
    发明公开
    PROCEDE DE DETECTION D'UNE UNTILISATION ILLICITE D'UN PROCESSEUR DE SECURITE 审中-公开
    检测方法的安全处理器的未经授权的使用

    公开(公告)号:EP2596623A1

    公开(公告)日:2013-05-29

    申请号:EP11734159.4

    申请日:2011-07-22

    申请人: Viaccess

    IPC分类号: H04N5/00 H04N7/167

    摘要: This method for detecting illegal use of a security processor used for descrambling various multimedia contents broadcast on a plurality of respective channels involves: - incrementing (153) a counter Kch
    i by a predetermined step each time that, following the verification, a message ECM
    i,c is received within a time window immediately following a message ECM
    i,p and, in a converse case, reinitializing (158) the counter Kch
    i to its initial value, - detecting (162) illegal use as soon as the counter Kch
    i reaches a predetermined threshold.

    PROCEDE DE SECURISATION D'UN BRANCHEMENT CONDITIONNEL, SUPPORT D'INFORMATIONS, PROGRAMME ET SYSTEME SECURISE POUR CE PROCEDE
    104.
    发明授权
    PROCEDE DE SECURISATION D'UN BRANCHEMENT CONDITIONNEL, SUPPORT D'INFORMATIONS, PROGRAMME ET SYSTEME SECURISE POUR CE PROCEDE 有权
    方法用于保护的条件连接器,信息载体,软件和安全系统这个过程

    公开(公告)号:EP2225693B1

    公开(公告)日:2012-03-28

    申请号:EP08867595.4

    申请日:2008-12-02

    申请人: Viaccess

    IPC分类号: G06F21/00 G06F21/02 G06F21/24

    摘要: The invention relates to a conditional connection that permits the execution of a specific processing of a datum D if the Boolean expression between one or more operands is satisfied, or otherwise prohibits the execution of said processing. The method for securing the conditional connection comprises: a) calculating (36, 48, 50) a datum D' from the datum D and the operands of the Boolean expression so that the datum D' is identical to the datum D if and only if the Boolean expression is satisfied and so that the datum D' has another so-called invalid value if the Boolean expression is not satisfied, the datum D' being coded over a plurality of bits; and b) using the datum D' in place of the datum D upon each execution of the specific processing.

    PROCEDE DE DISTRIBUTION DE DONNEES ET/OU SERVICES EMBROUILLES.
    109.
    发明授权
    PROCEDE DE DISTRIBUTION DE DONNEES ET/OU SERVICES EMBROUILLES. 有权
    方法用于分发二手RFELTER服务和/或数据

    公开(公告)号:EP1570662B1

    公开(公告)日:2007-04-04

    申请号:EP03799717.8

    申请日:2003-12-11

    申请人: Viaccess

    IPC分类号: H04N7/16

    摘要: The invention relates to a method of distributing scrambled services and/or data to at least one master terminal and at least one slave terminal which is connected to the master terminal station. The inventive method comprises the following steps consisting in: transmitting a first secret code SM to the master terminal and a second secret code SS, having a one-to-one correspondence with said first secret code SM, to the slave terminal; and authorising the receipt of data and/or services by the slave terminal only if the first secret code, SM, has already been saved in the slave terminal.