PROCEDE DE DETECTION D'UNE TENTATIVE D'ATTAQUE, SUPPORT D'ENREGISTREMENT ET PROCESSEUR DE SECURITE POUR CE PROCEDE
    11.
    发明公开
    PROCEDE DE DETECTION D'UNE TENTATIVE D'ATTAQUE, SUPPORT D'ENREGISTREMENT ET PROCESSEUR DE SECURITE POUR CE PROCEDE 审中-公开
    方法为这个进程检测攻击企图的,记录介质与安全处理器

    公开(公告)号:EP2449497A1

    公开(公告)日:2012-05-09

    申请号:EP10731487.4

    申请日:2010-06-23

    申请人: Viaccess

    IPC分类号: G06F21/00 G06F21/02

    CPC分类号: G06F21/554 G06F21/71

    摘要: The invention relates to a method for detecting an attempted attack of a security processor by the security processor itself, including: measuring (50) a plurality of separate events taking place independently of one another in the absence of an attempted attack; constructing (52) the value of at least one attack indicator in accordance with at least one concomitance index between at least two separate measured events, the concomitance index representing the proximity in time of the two separate measured events; and detecting (54) an attempted attack if the value of the attack indicator exceeds a predetermined threshold.

    摘要翻译: 几个不同的事件发生的彼此的unabhängig在没有攻击尝试的测量(50),建筑物(52)的至少一个的值:其中此方法以试图攻击安全处理器通过安全处理器本身包括检测 攻击指示符测量的至少两个不同的事件之间concomitance中的至少一个索引的函数,concomitance的代表两个不同的事件之间的时间接近度的指标来衡量,并检测(54)的攻击企图如果攻击指标的值 跨越预定阈值。

    PROCEDE DE SECURISATION D'UN BRANCHEMENT CONDITIONNEL, SUPPORT D'INFORMATIONS, PROGRAMME, SYSTEME SECURISE ET PROCESSEUR DE SECURITE POUR CE PROCEDE
    14.
    发明公开
    PROCEDE DE SECURISATION D'UN BRANCHEMENT CONDITIONNEL, SUPPORT D'INFORMATIONS, PROGRAMME, SYSTEME SECURISE ET PROCESSEUR DE SECURITE POUR CE PROCEDE 有权
    方法用于保护的条件连接器,信息载体,软件和安全系统这个过程

    公开(公告)号:EP2225693A1

    公开(公告)日:2010-09-08

    申请号:EP08867595.4

    申请日:2008-12-02

    申请人: Viaccess

    IPC分类号: G06F21/00 G06F21/02 G06F21/24

    摘要: The invention relates to a conditional connection that permits the execution of a specific processing of a datum D if the Boolean expression between one or more operands is satisfied, or otherwise prohibits the execution of said processing. The method for securing the conditional connection comprises: a) calculating (36, 48, 50) a datum D' from the datum D and the operands of the Boolean expression so that the datum D' is identical to the datum D if and only if the Boolean expression is satisfied and so that the datum D' has another so-called invalid value if the Boolean expression is not satisfied, the datum D' being coded over a plurality of bits; and b) using the datum D' in place of the datum D upon each execution of the specific processing.

    PROCÉDÉ DE CONDITIONNEMENT ET DE CONTRÔLE D'ACCÈS À DES CONTENUS EN CODAGE HIÉRARCHIQUE, PROCESSEUR ET ÉMETTEUR POUR CE PROCÉDÉ
    15.
    发明公开
    PROCÉDÉ DE CONDITIONNEMENT ET DE CONTRÔLE D'ACCÈS À DES CONTENUS EN CODAGE HIÉRARCHIQUE, PROCESSEUR ET ÉMETTEUR POUR CE PROCÉDÉ 有权
    方法调节和控制对分层编码内容和处理器和发射的程序的访问

    公开(公告)号:EP2223524A1

    公开(公告)日:2010-09-01

    申请号:EP08853689.1

    申请日:2008-11-05

    申请人: Viaccess

    发明人: DUBROEUCQ, Gilles

    IPC分类号: H04N5/00 H04N7/24

    摘要: The invention relates to a method for hierarchical access control, that comprises: receiving (100) and transmitting (106) to a security processor second cryptograms (CWi)Ki, with i between 1 and k-1, obtained by ciphering control words CW1 to CWk-1 with respective keys K1 to Kk-1 created with at least a portion of the set including the information present in the ECMk and of the exploitation key CEk; deciphering the second cryptograms (CWi)Ki only if the access conditions CAk received in a message ECMk correspond to access titles TA and without previously comparing the access conditions CAi to the access titles TA for i strictly lower than k and, in the opposite case; forbidding (100) the deciphering of the second cryptograms (CWi)Ki if the access conditions CAk do not correspond to the access titles TA.

    PROCEDE D APPARIEMENT D UN NOMBRE N DE TERMINAUX RECEPT EURS AVEC UN NOMBRE M DE CARTES DE CONTROLE D ACCES CONDITIO NNEL
    16.
    发明授权
    PROCEDE D APPARIEMENT D UN NOMBRE N DE TERMINAUX RECEPT EURS AVEC UN NOMBRE M DE CARTES DE CONTROLE D ACCES CONDITIO NNEL 有权
    METHOD FOR ADJUSTING RECEIVER端子的编号n设置为有条件接收控制板数量M

    公开(公告)号:EP1716705B1

    公开(公告)日:2010-01-06

    申请号:EP05728066.1

    申请日:2005-02-17

    申请人: Viaccess

    IPC分类号: H04N7/167 H04N5/00 H04N7/16

    摘要: The invention relates to a method for matching a number N of receiver units (2) to a number M of external security modules (6, 8), each receiver unit (2) being provided with a unique identifier and each external security module (6, 8) has a unique identifier and comprises information relating to the access rights of a user to the digital data provided by an operator. Said method includes a configuration step with the following steps: memorizing a list of identifiers for receiver units (2) in each external security module (6, 8), memorizing a list of identifiers for external security modules (6, 8) in each receiver unit (2) and a control phase, consisting of authorizing access to the data if the identifier of an external security module (6, 8), connected to a receiver unit (2) is present in the list memorised in said receiver unit (2) and if the identifier for said receiver unit (2) is present in the memorised list in said external security module (6, 8), otherwise access to said data is denied.

    PROCEDE DE CONTROLE D'ACCES A UN CONTENU NUMERIQUE EMBROUILLE
    17.
    发明公开
    PROCEDE DE CONTROLE D'ACCES A UN CONTENU NUMERIQUE EMBROUILLE 有权
    用于控制访问的方法,扰码数字内容

    公开(公告)号:EP2103123A1

    公开(公告)日:2009-09-23

    申请号:EP07857697.2

    申请日:2007-12-17

    申请人: Viaccess

    发明人: NEAU, Louis

    IPC分类号: H04N7/167

    摘要: The invention relates to a method of controlling access to a digital content scrambled with a secret key K and distributed, together with security data D(K) calculated as a function of K, by an operator furnished with a content server and with a server of access rights to at least one reception terminal comprising a plurality of access control modules (10, 46), each access control module implementing a specific technique for determining the secret key K. According to the invention, prior to distribution, the rights server incorporates into said security data D(K) a criterion for selecting an access control module from among the plurality of access control modules for the terminal so as to process said security data D(K), next, on receipt of said security data D(K) by one of said access control modules, said access control module analyses the data D(K) to obtain said selection criterion and, as a function of its value, terminates the processing of the data D(K) so as to attempt to obtain the secret key K, or transmits a part or all of the said security data D(K) to one at least of the other access control modules.

    PROCEDE ET SYSTEME DE SECURISATION DE DONNEES EMBROUILLEES
    20.
    发明公开
    PROCEDE ET SYSTEME DE SECURISATION DE DONNEES EMBROUILLEES 有权
    方法和系统用于保护加密数据

    公开(公告)号:EP1576820A2

    公开(公告)日:2005-09-21

    申请号:EP03810011.1

    申请日:2003-12-22

    申请人: Viaccess

    IPC分类号: H04N7/167 H04L9/08

    摘要: The method involves subdividing data of file into families with blocks, assigning a specific identification parameter related to a descrambling module (Mj) to each family, and scrambling each block, during encryption phase, where j is a integer. The family of each block is identified and each block is descrambled by the module using a key (Kj), during descrambling phase. The module has a processing capacity and a specific level of security. An Independent claim is also included for a system for protecting scrambled data provided to a receiver terminal.