摘要:
A method for accessing multimedia contents within a household via a network includes causing a master to build a contents log associating each content with a server, seeking a multimedia content in the log, and setting up a unicast channel between the client and a server associated with the contents sought in the log, causing the client to receive, using the channel, the content, and to play back the content, in response to connection of a new client or server to the home network or disconnection of a master from the home network, causing different apparatuses capable of functioning as a referencing server to exchange criteria for electing an apparatus to function as a referencing server, and based on the criteria, electing a new master from among the apparatuses capable of fulfilling the referencing server function, wherein in response to election, the new master functions as a reference server.
摘要:
The invention relates to a method of transmitting and receiving a multimedia content scrabbled with the aid of a control word CW t comprising: - the encryption (216) of the control word CW t with the aid of a mother virtual card so as to obtain a cryptogram CW* t , - the generation (220) of a message ECM incorporating the cryptogram CW* t , - the decryption of the cryptogram with the aid of a daughter virtual card associated with the mother virtual card, - the changing of the minimum every two hours, by the sender, of a mother virtual card used to obtain the cryptogram CW* t+n of a following cryptoperiod CP t+n of the same multimedia content, the new mother virtual card used differing from the previous mother virtual card used by its utilization key and at least the executable code of its encryption algorithm or of the syntactic constructor - in response, the selection by the terminal of a new daughter virtual card to be used to decrypt the cryptogram CW* t+n .
摘要:
The invention relates to a method of protecting a content to be distributed to a pool of receiving terminals connected to a content distribution network and each having a specific level of security dependent on the technical security means used, method comprising the following steps: at the sending end, - generating a scrambling key for said content, - transforming said scrambling key by a first calculation module 26 arranged at the head of said content distribution network, - scrambling the content by the transformed key, - transmitting the scrambled content and the scrambling key to the terminals, and, - on receipt of said content and the scrambling key by a terminal, - transforming said scrambling key by a second calculation module arranged in said terminal, - descrambling the content with the transformed scrambling key, method characterized moreover by the steps consisting in, at the sending end, - applying to said scrambling key, by means of said first calculation module, a function F defined as a function of said specific security level, and on receipt, - applying to said scrambling key, by means of said second calculation module, a function F defined as a function of said specific security level.
摘要:
The invention relates to a method for protecting the transmission of multimedia content or of a check word between a security processor and a terminal, including: the prior recording of a plurality of secret codes C i -1 in the terminal, enabling the decryption of the multimedia content or of the encrypted check word by means of a respective session key SK i obtained by diversifying a root key SK_root with a parameter P i , one of said parameters P i being a parameter P c ; the reception (122) of the parameter P c by the terminal in a message which also contains multimedia content or a check word to be decrypted by the security processor; and the selection (132) by the terminal, from among all of the recorded secret codes, of the secret code C c -1 to be used, depending on the parameter P c or on another parameter contained in the same message.
摘要:
The invention relates to a method for protecting content (6) scrambled by a content key (CW) transmitted in an encrypted form using a content-access key (K), said content being provided by a transmission system to at least one reception terminal (4) using a locally configured service at said reception terminal according to a set of properties Pi, where i = 1 to N, known by the transmission system, each of said properties Pi being represented by a piece of data X i stored in said transmission system and by a local piece of data Y1 that is read-accessible by said terminal, characterized in that it comprises upon transmission a step of over-encrypting said content key CW using at least one reversible over-encrypting function f i (X i ) that is dependent on at least one of the properties Pi, where i = 1 to n.
摘要:
A method for deciphering control words for mechanically and electronically independent terminals includes causing first and second terminals to transmit a first and second cryptograms to a control-word server, causing that server to decipher them to obtain first and second control words for enabling descrambling of first and second multimedia content broadcast simultaneously on respective first and second channels, causing the server to transmit the control word to the respective terminals, the second control word obtained by deciphering the second cryptogram before the first terminal executes a channel change, and in response to the channel change, causing the first terminal to search to determine whether the second control word has already been transmitted in advance by the server before the channel change, and if the control word has been transmitted in advance, causing the first terminal to immediately start descrambling the second multimedia content with the second control word.
摘要:
The method of the invention comprises: a) determining (64, 68) at least one limit based on N already received identifiers, where N is strictly higher than the number of identifiers that can be contained in an anti-replay memory, the limit being determined so as to define, on the one hand, a range of identifiers that have not yet been received and, on the other hand, a range of identifiers containing the N already received identifiers; b) comparing (58) the newly received identifier to said limit; c) if the newly received identifier belongs to the range identifiers that have not yet been received, diagnosing (60) a first reception of the newly received identifier; and d) if the newly received identifier belongs to the range of identifiers containing the N already received identifiers, searching (73) the newly received identifier among those contained in the anti-replay memory.
摘要:
The invention relates to a remote control protocol for a local action to generate a command message (OM), which permits a broadcaster to control a local action in at least one receiving station comprising: a step for transmission of an authorisation message (HM) from the broadcaster to the receiving station(s) and a verification step (4) in said receiving station(s), for transmitted authenticity parameters and addresses, with regard to parameters memorised in each of said receiving stations. The invention is characterised in that the authorisation message (HM) comprises a generation action (CM), at the level of the receiving station(s), a command message (OM), calculated locally and said protocol also comprises, conditional on the verification step (4), an interpretation step (10) of said action (CM) transmitted with said authorisation message (HM) and a local generation step (20) for a command message (OM) in response to said interpretation step (10). The above finds application particularly in transmission of encoded television information (I*).
摘要:
A remote control method enabling a user to control the operation of a receiving unit in a digital data distribution network. The method comprises the steps of (a) defining a set of remotely actuatable tests in said receiving unit, such that the respective results of said tests enable at least one special use of at least one portion of the receiving unit to be identified; (b) defining a set of actions executable in said receiving unit, which actions are intended to control the operation of said unit; (c) combining at least one action defined in step (b) with each of the tests defined in step (a); and (d) remotely actuating at least one test among the tests defined in step (a).