摘要:
This method of smoothing the workload of a transaction server executing processes in response to requests transmitted by terminals, this method comprising: - for each terminal, the logging (100) of the instants of toggling between an active state and an inactive state, - the construction (100) for each terminal, on the basis of the toggling instants logged, of an individual usage profile associating with each possible future date a state probability corresponding to the probability that this terminal will be in the active state on this date, - the selection of a rendezvous date associated in a workload plan of the server with a provisional workload which is less than a predetermined first threshold, at the same time, associated in the individual usage profile with a state probability corresponding to a probability that this terminal will be in the active state greater than a second predetermined threshold.
摘要:
The invention relates to a method of protecting a recorded multimedia content in which: d) an authorization server, common to a set of readers, receives (226) an identifier of a channel on which the multimedia content has been broadcast, e) in response to a request to read the recorded multimedia content, the authorization server determines (236) whether the reader is authorized or not to descramble the multimedia content recorded on this channel as a function of access authorizations, associated with the reader, and of the channel identifier received, f) if the reader is not authorized, the reading, by this reader, of the recorded multimedia content is prevented, g) only if the reader is authorized, cryptograms CW KHI , are transmitted (242) to the reader, and h) the reader downloads (248) the scrambled multimedia content recorded by the recorder, decrypts (248) the cryptograms CW KHI and then descrambles (248) the downloaded multimedia content.
摘要:
This method for detecting illegal use of a security processor used for descrambling various multimedia contents broadcast on a plurality of respective channels involves: - incrementing (153) a counter Kch i by a predetermined step each time that, following the verification, a message ECM i,c is received within a time window immediately following a message ECM i,p and, in a converse case, reinitializing (158) the counter Kch i to its initial value, - detecting (162) illegal use as soon as the counter Kch i reaches a predetermined threshold.
摘要:
The invention relates to a method for providing protected multimedia content, during which a terminal: a) acquires (1408) a service date from a date server; and b) assesses (1414) a license time criterion corresponding to the last acquired service date. In said method: a head end associates (1202) the transmission date of the multimedia content with each segment thereof and transmits (1206) said date into a stream, together with the segment; then the terminal extracts (1400, 1402) the transmission date of the segment from the stream then compares the extracted transmission date with the last acquired date of service, and only if the extracted transmission date comes after said last acquired service date, the terminal acquires (1406) same as the service date and uses (1414) same as the last acquired service date when carrying out Step b), between two consecutive instances of carrying out Step a).
摘要:
This method of providing a licence comprises: a) a server receives (130) a request comprising an identifier of a multimedia content and an identifier of a terminal or of a user, b) the server calculates (140) the licence comprising at least one access data required by the terminal to access the content, - before step a), a step e) (120) containing: • the obtaining (122) of a first recommendation list for this user, • the automatic selection (124), in this first list, of at least one multimedia content identifier, and • for each automatically selected identifier, the precalculation (126) of at least one access data, and - during step b), the server searches (141) for the identifier of the multimedia content received in step a) from among the identifiers automatically selected in step e), then, in the event of success, selects the precalculated access data corresponding to this identifier, and, in the case of failure, generates (142) this access data.