摘要:
A method for service delivery to a client, in which the client selects a service, and establishes a connection with a system server to which it sends an identity associated with the client and an identifier of the service. The system server verifies that the client is authorised to access to the service and that the client is non-emulated. If this is verified, the service is provided to the client. In a preferred embodiment, the service is scrambled content and the system server provides a descrambling key to the client, and instructs a content server to provide the scrambled content to the client. Also claimed are a device, a system, and a system server.
摘要:
A method for fingerprinting wireless devices and a method for using a device fingerprint for identifying wireless devices. A monitoring station listens to a channel. For each received frame, the station measures the inter-arrival time from the end of the previously received frame to the end of the present frame, if possible, the station obtains the identity of the sender of the frame. If the sender is known, then the station stores the inter-arrival time in a histogram for the sender; the histogram becomes the fingerprint for the sender. Identification of a device begins by obtaining a number of inter-arrival times for an unknown sender and then matching these to stored fingerprints using a suitable similarity measure. The invention is particularly suitable for IEEE 802.11 and may for example be used to detect so-called MAC spoofing and as an additional layer of an identification protocol.
摘要:
A device receives protected content and a license for the content, unprotects the content using an input key and retrieves a rule associated with the input key. The device then processes the content to create new content, retrieves at least one output key associated with the input key in the retrieved rule, protects the content using the output key and sends the newly protected content and the corresponding license. It is thus possible to impose a work flow as it is necessary for a device to store a particular key in order to access the content and as the rule imposes a particular output key depending on the input key. In a preferred embodiment, the content is scrambled using a symmetrical key that is encrypted by an asymmetrical key in the license. An alternate embodiment uses watermarking techniques instead of encryption. The invention finds particular use in video processing.
摘要:
A method for performing at least one evolution operation in a dynamic, evolutive community of devices in a network comprising at least a first device. The method comprises a step of sending at least one message over the network from the first device to a second device, wherein the first device continues the method without acknowledgement of the at least one message from the second device. The method is suitable for execution on clockless devices. A device for performing the method is also claimed.
摘要:
The invention relates to the protection by firewall of a domestic community of interconnectable appliances. The invention allows distributed and totally decentralized management of the firewall policy, implemented at the level of each appliance, which is consistent and adapts dynamically to the changes occurring within the domestic network. We shall speak of ubiquitous firewalls.
摘要:
A device receives protected content and a license for the content, unprotects the content using an input key and retrieves a rule associated with the input key. The device then processes the content to create new content, retrieves at least one output key associated with the input key in the retrieved rule, protects the content using the output key and sends the newly protected content and the corresponding license. It is thus possible to impose a work flow as it is necessary for a device to store a particular key in order to access the content and as the rule imposes a particular output key depending on the input key. In a preferred embodiment, the content is scrambled using a symmetrical key that is encrypted by an asymmetrical key in the license. An alternate embodiment uses watermarking techniques instead of encryption. The invention finds particular use in video processing.
摘要:
The invention is related to a method for burning digital data representative of a multimedia content on a secure disc. The multimedia content is intended to be downloaded from a remote server to a client device carrying out the burning on the secure disc. The secure disc contains a first encryption key. The method comprises the following steps: (a) retrieving the first encryption key from the secure disc; (b) transmitting to the remote server the first encryption key and an identifier of the multimedia content; (c) receiving from the remote server at least a second encryption key encrypted with the first encryption key and the multimedia content scrambled with the second encryption key; and (d) burning the second encryption key and the scrambled multimedia content on the secure disc containing the encrypted first encryption key, by the client device.
摘要:
A distributed communication and data sharing system that provides anonymity and unlinkability. A group comprising a number of structures, each having a public/private key pair, is stored on a plurality of nodes in a Distributed Hash Table. Advantageous features of the group management system are provided through the use of Cryptographically Generated Addresses (CGA) for the structures, a secure capture method that enables a user to capture an address and be the only one authorized to request certain operations for the address, and an anonymous get/set mechanism in which a user signs messages, encloses the public key in the message and encrypts the message and public key using the public key of the receiver. The distributed communication and data sharing system of the invention can advantageously be used for group management of social networks.
摘要:
A network, advantageously a home network, comprises a number of user devices, for example personal computers, game consoles and smartphones, each having an estimator application, preferably voluntarily installed by the user. The network further comprises a network device that acts as an interface between the network and an external network. The estimator applications measure the network traffic for its user device, while the network device in parallel generates an independent measurement of the network consumption. The measurements are then compared. If the difference between the sum of the measurements from the estimator applications and the measurement of the network device is below a fixed threshold, it is assumed that the measurements are valid for the considered measurement time interval. Otherwise, the difference is an indication that at least one estimation was incorrect.
摘要:
A method for detecting a version of a client software in a network. A server receives a first request from the client software, sends a first response comprising a first challenge to the client software, receives a second request comprising an answer to the first challenge from the client software, and detects the version of the client software from at least the second request. The answer to the challenge is dependent on the version of the client software and is expressed as a modification to a communication protocol used for the first and the second request. Also provided are a server, a client and a computer program product.