Abstract:
A method for registering a device in a wireless network comprising a central controller. The method includes the step of asking a user whether he wants to install a new network or install a device on the network. In the case of installing a new network, the user enters a PIN code, an authentication key of the new network is generated and the device becomes the central controller. In the case of installing the device on an existing network, the user enters a PIN code, and upon authorization, receives an authentication key of the network for use in authenticating procedures with the central controller.
Abstract:
The invention relates to a method whereby it can be checked whether data received by a receiver has been sent by a transmitter authorized by a trusted third party, the transmitter and the receiver being connected to a digital network. An identifier is associated with the data sent by the transmitter and, on receipt of the data by the receiver, the receiver generates a random number and diffuses the same on the network. The transmitter that receives said random number calculates a response by applying a first function to the random number and to the identifier, and sends said response to the receiver which verifies the response received by applying a second function to the response received, the random number and the identifier. The first function is delivered first to the transmitter by the trusted third part, and the second function is a function for checking the result of the first function which is delivered first to the receiver by the thrusted third party.
Abstract:
The processing device is intended to be connected to a network of the second domain so as to receive data encrypted according to an encryption method specific to the first domain. It comprises: a memory for containing a first secret specific to the first domain; means of decryption of the data encrypted with the aid of the first secret so as to obtain decrypted data; means of encryption of the data decrypted according to an encryption method specific to the second domain, so that the data encrypted by said means of encryption cannot be decrypted other than with the aid of a second secret specific to the second domain. The invention also relates to the method for transmitting data encrypted with the aid of the secret specific to the first domain in the network of the second domain.
Abstract:
Process for obtaining a homogeneous layer of composition Hg.sub.1-x Cd.sub.x Te, comprising the steps of:subjecting a wafer formed by a layer of Hg.sub.1-x.sbsb.o Cd.sub.x.sbsb.o Te deposited by epitaxial growth on a CdTe substrate, x.sub.o being less than the desired value x, to a melting treatment,then rapidly cooling the wafer.
Abstract:
A method for discovering emulated clients. A verifier sends a cryptographic challenge C to a client and preferably starts a timer. The client uses a deterministic key search algorithm to find the correct key and returns the result as a number of tries needed. The verifier then stops the timer if this was started and verifies that the result is correct and preferably that the response was timely. Also provided is a verifier.
Abstract:
The number of devices installed in an Authorized Domain is controlled by a master device functionality. This master devices stores ceiling values for the total number Totaljimit of devices to be installed in the AD; the total number Localjimit of devices to be installed in a local proximity with the master device and the total number Remotejimit of devices to be installed remotely from said master device. The master device also stores current values of the number Local_count of devices installed in the AD in local proximity with the master device; and the number Remote_count of devices installed in the AD remotely from said master device. When a new device is to be installed in the AD, the ceiling values are checked with respect to the current values and it is checked whether the device is in local proximity with the master device to authorize or not its installation in the AD, either locally or remotely.
Abstract:
The invention relates to a method of receiving and securely recording digital data comprising a step for recording said digital data on a secured disk by a recorder/receiver belonging to a determined secured domain comprising several equipment items and defined by an identifier, a step for recording on the secured disk the identifier of the domain of the recorder/receiver to define this domain as the only domain in which the reproduction/copying of the multimedia content is authorized, wherein it comprises a prior step for recovering a disk key from the secured disk, and in that the domain identifier is encrypted by said disk key and the digital data is scrambled by title keys, said title keys being encrypted by said disk key. The invention also relates to a method of securely distributing digital data, an access device and a recorder/receiver.
Abstract:
The invention relates to a microwave frequency structure for microwave tube comprising a cylindrical vacuum jacket and a device for containing an electron beam in the axis of revolution of the cylindrical jacket. The containing device comprises at least two rows, each containing permanent magnets, each row being aligned either side of and equidistant to the beam-containment axis, the at least two rows containing permanent magnets being of parallelepipedal shapes and having a magnetic polarization parallel to one of its edges in a plane transversal to the axis, their direction of magnetization in the row changing alternately from one containing magnet to another next containing magnet, or preceding containing magnet, to create an alternating periodic magnetic field along the containment axis.
Abstract:
A method for service delivery to a client, in which the client selects a service, and establishes a connection with a system server to which it sends an identity associated with the client and an identifier of the service. The system server verifies that the client is authorized to access to the service and that the client is non-emulated. If this is verified, the service is provided to the client. In a preferred embodiment, the service is scrambled content and the system server provides a descrambling key to the client, and instructs a content server to provide the scrambled content to the client. Also claimed are a device, a system, and a system server.
Abstract:
A secure pre-recorded medium and a method for descrambling encrypted content thereon. When a player wants to access the content, a secure processor on the medium verifies that the player has not been revoked, preferably by comparing an identity of the player with identities in a revocation list, after which a mutual authentication is performed. The secure processor then verifies that the player has the rights to access the content and provides the player with the key necessary to descramble the content, whereafter the player descrambles the content.