摘要:
The invention relates to a method for detecting an attempted attack of a security processor by the security processor itself, including: measuring (50) a plurality of separate events taking place independently of one another in the absence of an attempted attack; constructing (52) the value of at least one attack indicator in accordance with at least one concomitance index between at least two separate measured events, the concomitance index representing the proximity in time of the two separate measured events; and detecting (54) an attempted attack if the value of the attack indicator exceeds a predetermined threshold.
摘要:
The invention relates to a reception method that includes: each time a second piece of multimedia content is displayed using an electronic receiver, changing (114) the value of a counter on the basis of progression instructions associated with said second piece of multimedia content; each time the display of the first piece of multimedia content using the electronic receiver is authorised, changing (120; 164) the value of the counter in a direction opposite to the progression instructions.
摘要:
The invention relates to a method for protecting security data transmitted by a sender to a receiver involving the periodic transmission to said receiver, and in turn to said security data, of neutral data for preventing the filtering of said security data.
摘要:
The invention relates to a conditional connection that permits the execution of a specific processing of a datum D if the Boolean expression between one or more operands is satisfied, or otherwise prohibits the execution of said processing. The method for securing the conditional connection comprises: a) calculating (36, 48, 50) a datum D' from the datum D and the operands of the Boolean expression so that the datum D' is identical to the datum D if and only if the Boolean expression is satisfied and so that the datum D' has another so-called invalid value if the Boolean expression is not satisfied, the datum D' being coded over a plurality of bits; and b) using the datum D' in place of the datum D upon each execution of the specific processing.
摘要:
The invention relates to a method for hierarchical access control, that comprises: receiving (100) and transmitting (106) to a security processor second cryptograms (CWi)Ki, with i between 1 and k-1, obtained by ciphering control words CW1 to CWk-1 with respective keys K1 to Kk-1 created with at least a portion of the set including the information present in the ECMk and of the exploitation key CEk; deciphering the second cryptograms (CWi)Ki only if the access conditions CAk received in a message ECMk correspond to access titles TA and without previously comparing the access conditions CAi to the access titles TA for i strictly lower than k and, in the opposite case; forbidding (100) the deciphering of the second cryptograms (CWi)Ki if the access conditions CAk do not correspond to the access titles TA.
摘要:
The invention relates to a method for matching a number N of receiver units (2) to a number M of external security modules (6, 8), each receiver unit (2) being provided with a unique identifier and each external security module (6, 8) has a unique identifier and comprises information relating to the access rights of a user to the digital data provided by an operator. Said method includes a configuration step with the following steps: memorizing a list of identifiers for receiver units (2) in each external security module (6, 8), memorizing a list of identifiers for external security modules (6, 8) in each receiver unit (2) and a control phase, consisting of authorizing access to the data if the identifier of an external security module (6, 8), connected to a receiver unit (2) is present in the list memorised in said receiver unit (2) and if the identifier for said receiver unit (2) is present in the memorised list in said external security module (6, 8), otherwise access to said data is denied.
摘要:
The invention relates to a method of controlling access to a digital content scrambled with a secret key K and distributed, together with security data D(K) calculated as a function of K, by an operator furnished with a content server and with a server of access rights to at least one reception terminal comprising a plurality of access control modules (10, 46), each access control module implementing a specific technique for determining the secret key K. According to the invention, prior to distribution, the rights server incorporates into said security data D(K) a criterion for selecting an access control module from among the plurality of access control modules for the terminal so as to process said security data D(K), next, on receipt of said security data D(K) by one of said access control modules, said access control module analyses the data D(K) to obtain said selection criterion and, as a function of its value, terminates the processing of the data D(K) so as to attempt to obtain the secret key K, or transmits a part or all of the said security data D(K) to one at least of the other access control modules.
摘要:
The invention relates to a method for receiving a scrambled multimedia signal by means of a control word. Said method uses a first cryptographic entity that can be connected to any one of P second cryptographic entities in order to form part of a device for receiving the scrambled multimedia signal. Only the second cryptographic entities of a group of N second cryptographic entities selected from a wider set of P second cryptographic entities use a session key obtained by diversification of a root key identical to the root key used to obtain the session key of the first cryptographic entity.
摘要:
The invention relates to a method for matching a receiver unit (2) to a number of security modules (6, 8), each having a unique identifier. According to the invention, said method comprises the following steps: connection of a security module (6, 8) to the receiver unit (2), storage on the fly of the unique identifier for the connected security module (6, 8) in the receiver unit (2).
摘要:
The method involves subdividing data of file into families with blocks, assigning a specific identification parameter related to a descrambling module (Mj) to each family, and scrambling each block, during encryption phase, where j is a integer. The family of each block is identified and each block is descrambled by the module using a key (Kj), during descrambling phase. The module has a processing capacity and a specific level of security. An Independent claim is also included for a system for protecting scrambled data provided to a receiver terminal.