Abstract:
In a method for the restriction of access from a sink device to a content stored in a storage device, a content protection protocol comprises an authentication phase and an encryption key exchange phase is implemented between the storage device and the sink device. The method comprises a prior step for the association of at least one predetermined password with said content and/or said storage device; and the following steps of: a) obtaining at least one piece of access information during the authentication phase; b) obtaining a processing function dependent on said at least one piece of access information (UCPK) and said at least one predetermined password (CPK); c) applying the processing function thus obtained during the authentication phase of the protection protocol, the application of the processing function causing the authentication phase to fail when said at least one piece of access information does not meet a predetermined condition.
Abstract:
In a method for securing the transfer of a data stream from a sender device to at least one receiver device, through a network comprising a plurality of nodes connected to one another by a plurality of links, the sender device is connected to an input node in the network and each receiver device is connected to an output node of the network. The method comprises the following steps: a) the transmission of the data stream to the receiver devices through the associated output nodes; b) the informing of the output nodes by the input node that the transmission or maintaining of transmission of the data stream, in clear (i.e. non-encrypted) form necessitates the authentication of the output nodes; c) the reception by the input node of at least one authentication request sent by at least one of said output nodes; d) the authentication by the input node of the output nodes that are destination nodes of the data streams; e) the transmission of the data stream in clear form to, at most, the authenticated output nodes and the stopping of the transmission of the data stream to the other output nodes.
Abstract:
A method is proposed for managing communications in a wireless network in which a first communication is set up or established on a plurality of carriers between a first sender device and a receiver device, the network comprising a set of at least one second sender device for which a second communication has to be established simultaneously with said first communication.Such a method comprises steps of: allocating a set comprising at least one carrier among said plurality of carriers to each second sender device; obtaining (, for each second sender device, a level of reception power of a predetermined signal sent by said second sender device on the set of carrier(s) that have been allocated to it; estimating a rate of disturbance of said first communication by one said or several said second communications as a function of the power level(s) obtained for the second sender device(s); authorizing the second sender device(s), for which the estimated rate(s) of disturbance is or are below a predefined threshold, to set up a said second communication on the plurality of carriers.
Abstract:
A method is proposed for managing a distribution of bandwidth in a communications network by means of a slave node of the network, said network comprising a set of nodes.The slave node is such that it performs steps for: determining a coarse representation and a detailed representation of the distribution of the bandwidth in said network, as a function of a piece or pieces of information relative to conditions of transmission in said network and/or relative to applications needs of transmission; receiving a coarse reference representation of the distribution of bandwidth in said network, coming from a master node of said network; comparing said determined coarse representation and said reference coarse representation; should said coarse representations be identical, applying said determined detailed representation; if not, applying said coarse reference representation.
Abstract:
In a method for securing the transfer of a data stream from a sender device to at least one receiver device, through a network comprising a plurality of nodes connected to one another by a plurality of links, the sender device is connected to an input node in the network and each receiver device is connected to an output node of the network. The method comprises the following steps: a) the transmission of the data stream to the receiver devices through the associated output nodes; b) the informing of the output nodes by the input node that the transmission or maintaining of transmission of the data stream, in clear (i.e. non-encrypted) form necessitates the authentication of the output nodes; c) the reception by the input node of at least one authentication request sent by at least one of said output nodes; d) the authentication by the input node of the output nodes that are destination nodes of the data streams; e) the transmission of the data stream in clear form to, at most, the authenticated output nodes and the stopping of the transmission of the data stream to the other output nodes.
Abstract:
The invention pertains to a method for determining a sequence of access (300) to a communications network (100) by a plurality of nodes (101, 102, 103, 5 104, 107) of said communications network (100) in the context of the broadcasting of a data content by a transmitter node (101) to a set of receiver nodes (103, 107, 104, 102), at least one receiver node (102, 104) having to receive said content by means of another receiver node (103, 107), called a relay receiver node.
Abstract:
A method for managing communications in a wireless communications network comprising a set of pairs constituted by a sender device and a receiver device, each of the devices having a determined area of communications coverage, the coverage areas of each pair having a mutual intersection area. Such a method comprises the followings steps: determining future trajectories of a disturbing mobile obstacle as a function of a set of prior positions of the disturbing mobile obstacle, a position of an obstacle being determined as a function of areas of mutual overlapping of at least two disturbed intersecting areas, a disturbed intersecting area having a given state of disturbance according to a determined criterion of quality of communications between the devices of the pairs corresponding to the disturbed intersection area; establishing a forecast diagnostic of quality of communications by examining the determined future trajectory or trajectories; managing the routing of communications as a function of the established forecast diagnostic.