Abstract:
The invention concerns a method implemented in a communication network comprising a source device including: a first symmetrical key for encrypting data to be transmitted to a display device connected to the network; and the first symmetrical key encrypted with a second symmetrical network key known only to at least one display device connected to the network. When the source device needs to renew its first symmetrical key to encrypt new data, it generates a random number, then it calculates a new symmetrical key based on the first symmetrical key and on the random number. It then encrypts the data to be transmitted with the new symmetrical key and transmits to a display device, via the network: the data encrypted with the new symmetrical key, the random number, and the first encrypted symmetrical key with the second symmetrical network key.
Abstract:
A method for secure installation of software applications. The user receives the software, partly encrypted, and an installation token for a number of licenses from the software provider, plugs the software and the installation token into a computer, and launches the installation application. A Secure Authenticated Channel is established between the installation application and the installation token and a unique identifier of the computer is sent thereon to the installation token. The installation token verifies that there are remaining licenses, decreases the remaining licenses, authorizes the installation and sends the decryption key and a certificate/key pair to the installation application that decrypts and installs the software, preferably linking the installation to the computer's identifier. A variant allows (virtually) unlimited installations of time limited programs that are transformed into time unlimited programs once the installation token has reported the number to the software provider and paid for the necessary licenses. Also provided is the installation token.
Abstract:
Distinguishing between live and recorded content in a network comprising a rendering device, an access device, and a storage device. The rendering device broadcasts a message requesting devices in the network to respond if they diffuse a content, and sets a timer. The devices respond if they diffuse the content. The rendering device then determines that the content is: live, if it has received a response from the access device; recorded, if it has received a response from the storage device, but not from the access device; and illegal, if it has not received a response before time-out of the timer. There is further a “still live delay” after diffusion of the content during which the access device responds that it is diffusing the content, and following which it may send a content release message to the storage device that may then respond to request messages.
Abstract:
A layered audiovisual packet data stream, such as one obtained by a JPEG2000 encoder, is received together with information (metadata) about the contribution of each packet to the reduction of image distortion. The distortion-to-rate ratio for each packet is calculated and the packets are ordered in descending ratio. The non-encrypted packet having the highest ratio is encrypted until the target distortion is obtained. Also provided is an apparatus. In a variant, the data in the packets are substituted by dummy data instead of encrypted.
Abstract:
The invention relates to a microwave frequency structure for microwave tube comprising a cylindrical vacuum jacket and a device for containing an electron beam in the axis of revolution of the cylindrical jacket. The containing device comprises at least two rows, each containing permanent magnets, each row being aligned either side of and equidistant to the beam-containment axis, the at least two rows containing permanent magnets being of parallelepipedal shapes and having a magnetic polarization parallel to one of its edges in a plane transversal to the axis, their direction of magnetization in the row changing alternately from one containing magnet to another next containing magnet, or preceding containing magnet, to create an alternating periodic magnetic field along the containment axis.
Abstract:
A protocol (i.e. method) and corresponding apparatuses for calculating a session key. Two peers with knowledge of a common Diffie-Hellman permanent key, Kperm, and the identity and public key of the other peer. A first peer chooses a first ephemeral private key x and calculates the first corresponding ephemeral public key gx, which is sent to the second peer. The second peer calculates a second ephemeral public key gy in the same manner, and an ephemeral shared key Keph, hashes gy, Keph, Kperm, and its identity, and sends gy and the hash to the first peer. The first peer calculates Keph, verifies the hash, and hashes gx, Keph, Kperm, and its identity, and sends it to the second peer that verifies this hash. Thereafter, both peers obtain a session key by hashing Keph. The apparatuses may then use the session key to establish a secure authenticated channel (SAC).
Abstract:
A method of processing digital content according to a workflow. The digital content is received and information for the workflow is checked to decide if a processing device is authorised to process the content, the workflow imposing that the digital content be processed in a process chain comprising at least two nodes, wherein the processing device is authorised to process the content if it corresponds to the node that according to the process chain is the next node to process the digital content. If the processing device is authorised to process the content, the digital content is processed and the information for the workflow is updated. Also provided is a system.
Abstract:
The invention relates to a method of receiving and securely recording digital data comprising a step for recording said digital data on a secured disk by a recorder/receiver belonging to a determined secured domain comprising several equipment items and defined by an identifier, a step for recording on the secured disk the identifier of the domain of the recorder/receiver to define this domain as the only domain in which the reproduction/copying of the multimedia content is authorized, wherein it comprises a prior step for recovering a disk key from the secured disk, and in that the domain identifier is encrypted by said disk key and the digital data is scrambled by title keys, said title keys being encrypted by said disk key. The invention also relates to a method of securely distributing digital data, an access device and a recorder/receiver.
Abstract:
A method for controlling access to content by an Acquisition Point to Presentation Points in clusters in a domain. The AP receives from a PP an access content request comprising the PPs cluster identity and the PP's priority. The AP verifies if access is granted to a PP in the cluster and, if so, grants access to the requesting PP. If not, the AP verifies (603) if access is granted to PPs in a maximum number of clusters. If not, the AP grants access. If the maximum is reached, the AP verifies if the requesting PP's priority is higher than the priority of every PP in another cluster. If not, access is denied; if so, the AP grants access to the requesting PP and denies access to the PPs in the cluster with the lowest priority values. An Acquisition Point is also claimed.
Abstract:
Distinguishing between live and recorded content in a network comprising a rendering device, an access device, and a storage device. The rendering device broadcasts a message requesting devices in the network to respond if they diffuse a content, and sets a timer. The devices respond if they diffuse the content. The rendering device then determines that the content is: live, if it has received a response from the access device; recorded, if it has received a response from the storage device, but not from the access device; and illegal, if it has not received a response before time-out of the timer. There is further a “still live delay” after diffusion of the content during which the access device responds that it is diffusing the content, and following which it may send a content release message to the storage device that may then respond to request messages.