摘要:
Les cellules de mémorisation sont groupées en éléments groupant au moins deux cellules, chaque élément étant repérable par une adresse et ayant une parité. Le solde de la carte est le nombre d'éléments non nuls pairs d'adresse inférieure à l'adresse de l'élément impair qui a la plus faible adresse et qui est appelée "borne". Pour débiter la carte et réduire ce solde, on déplace la borne vers une adresse plus basse en créant un nouvel élément impair d'adresse plus faible que la borne à déplacer. Pour créditer la carte et augmenter ce solde, on déplace la borne vers une adresse plus haute, en redonnant aux éventuels éléments impairs d'adresse supérieure à la borne à déplacer un caractère pair et en créant un nouvel élément impair d'adresse plus haute que la borne à déplacer. Application au paiement électronique.
摘要:
A method for broadcasting gradual conditional access programmes with data flow separation, and a receiver therefor. A basic flow is formed by providing groups of m successive multiplex elements and a complementary flow is formed by providing groups of p successive multiplex elements. The method is useful in pay television.
摘要:
The invention concerns a method enabling a personal computer (1) to be authenticated by a server (2). The method comprises the step, which consists for the user in launching the execution of a log-on procedure software, by introducing personal identifiers (21) providing access to a signature private key (14) for long-term use relative to the duration of the session. The log-on procedure software produces: identification data of the session Id, a public ephemeral module n (9), a public exponent v and at least a pair of ephemeral public numbers G (11) and ephemeral private numbers Q (12) related by a generic equation of the type: G Qv (mod n) or GxQv 1 (mod n), an ephemeral certificate (13) linking, by means of said signature private key (14), Id (8) and n (9). The public ephemeral module n (9) is of reduced size relative to the signature private key (14). The method comprises the step which consists for said user (5) to launch the execution of an evidence software, the step which consists for the server (2) in launching the execution of a control software.
摘要:
A conditional access programme broadcasting method enabling gradual access, and a gradual programme access method, wherein partial access control messages are transmitted to enable a programme to be unscrambled and partially restored by receivers having partial access rights. The method is useful for broadcasting television pictures, radio programmes, sound or data.
摘要:
The invention concerns a method whereby the proof is established by: m (≥ 1) pairs of private Qi and public Gi = gi2 values; a public module n formed by the product of f(≥2) prime factors; an exponent v = 2k (k > 1), linked by the relationships of the type: G¿i .Qi?v 1. mod n or G¿i? Qi?v¿ mod n. Among the m numbers obtained by increasing Q¿i? or its inverse modulo n to modulo n square, k-1 times rank, at least one of them is different from ± gi. Among the 2m equations: x?2¿ g¿i? mod n, x?2¿ -g¿i? mod n, at least one of them has solutions in x in the ring of modulo n integers.
摘要:
The proof is provided by means of the following parameters: a public module n formed by the product of f prime factors pi, f⊃2; a public superscript v; m base numbers gi, m⊃1. The base numbers gi are such that the two equations: x2 g¿i? mod n and x?2¿ -g¿i? mod n cannot de solved in x in the ring of integers modulo n, and such that the equation x?v¿ g¿i?2 mod n can be solved in x in the ring of integers modulo n in the case where the public superscript v is in the form v = 2k, wherein k is a security parameter.
摘要:
The invention concerns a set of particular keys designed to prove the authenticity of an entity or the integrity of a message. The proof is established by a set of keys comprising: m (≥1) pairs of private Qi and public Gi = gi2 values; a public module n consisting of the product of f(≥2) prime factors; an exponent v=2k (k > 1), linked by relationships of the type: G¿i .Qi?v 1. mod n or G¿i? QI?v¿ mod n . The set of keys is produced such that: among the m numbers obtained by increasing Q¿i? or its inverse modulo n to modulo n square, k-1 times rank, at least one of them is different from ∓ gi; among the 2m equations: x?2¿ g¿i? mod n, x?2¿ -g¿i? mod n at least one of them has solutions in x in the ring of the modulo n integers.