Abstract:
In a method for managing a Certificate Revocation List (CRL), a first device (31, 61) receives the CRL (33, 67) which comprises at least one revoked certificate identifier (SNi). An integrity field (MACi) associated to an entry of the CRL (371, . . . , 37p) is calculated using a secret data (KCRL), wherein an entry comprises at least one revoked certificate identifier of the CRL. The entry and its associated calculated integrity field are transmitted to a second device (32, 62), distinct from the first device and are stored into the second device. The method further comprises checking a validity of a certificate.
Abstract:
A method of processing digital content following a workflow. A processing device receives the digital content and a license for the digital content, the license comprising workflow information about a process chain, which comprises a present node and a following node; decrypts the license; verifies if it may process the content by verifying if it corresponds to the present node. If the processing device may process the digital content, it processes the digital content to obtain processed content and generates a new license comprising updated workflow information, wherein the following node is set as a new present node. Also provided is a processing device.
Abstract:
A method for protecting live content in a multimedia system. An Acquisition Point that receives content distributes it in a network comprising a recording device and a rendering device. The content is associated with a license comprising a content identifier and the identity of the sending Acquisition Point. If the content is live, the license indicates that the content is “live protected”. A rendering device that receives the content and its license asks 208 the Acquisition Point indicated in the license if it may render the content. If the content is not live, e.g. if it is replayed later, the permission is given. The Acquisition Point also stores a counter that indicates the number simultaneous viewings. If this number equals a maximum number of viewings when a request is received, the Acquisition Point asks all devices if they access the content to check if its count is correct and, if not, permits access to the requesting device.
Abstract:
The present invention concerns a method and a device for encrypting an encoded scalable enhancement frame sent by an emitter to a receiver, the enhancement frame comprising a plurality of complementary streams ordered in term of quality level, each complementary stream corresponding to a combination of more than one scalability type, where a complementary stream of a lower quality level corresponds to a lower quality on each scalability type, comprising at the level of the emitter the steps of generating a key per complementary stream for encrypting said complementary stream in such a way that all scalability types can be either simultaneously or individually used, said keys being generated in such a way that only the keys of the complementary streams of quality levels lower than the quality level of a complementary stream can be obtained from the key of said complementary stream, and sending the key of a complementary stream corresponding to a required quality level to the receiver, the key permitting a receiver to generate the keys of the complementary streams of the lower quality levels only. The present invention also concerns a method and a device for decrypting a received encoded scalable enhancement frame.
Abstract:
A method for service delivery to a client, in which the client selects a service, and establishes a connection with a system server to which it sends an identity associated with the client and an identifier of the service. The system server verifies that the client is authorised to access to the service and that the client is non-emulated. If this is verified, the service is provided to the client. In a preferred embodiment, the service is scrambled content and the system server provides a descrambling key to the client, and instructs a content server to provide the scrambled content to the client. Also claimed are a device, a system, and a system server.
Abstract:
A method of processing data, encrypted according to an encryption method specific to a first domain, in which such data cannot be decrypted without the aid of a first secret specific to the first domain The data is received in a presentation device connected to a network belonging to a second domain. The method comprises the steps of: (a) transmitting at least a portion of said encrypted data to a processing device connected to the network and; (b) receiving from said processing device at least one element being used to decrypt said received data with the aid of a second secret specific to the second domain, the second secret being contained in the presentation device.
Abstract:
A cutting insert includes a body having a first surface, a second surface, and an intermediate surface. The intermediate surface includes a generally cylindrical main surface and at least one recess surface extending radially inwardly from the main surface, the main surface and the recess surface extending between the first surface and the second surface. Cutting edges are defined by intersections between the main surface and the recess surface.
Abstract:
A tyre tread (1) comprising a plurality of grooves (2) opening on to a running surface (11), each groove (2) having an average orientation and being defined by facing walls, these walls being connected together by a groove bottom, each groove being defined geometrically by a transverse profile (21) obtained by intersecting said groove (2) by a section plane substantially transverse to the average direction of the groove, the transverse profile of a plurality of grooves having variable curvatures, the variation of said curvatures in the section plane being mathematically continuous.A tyre provided with such a tread.
Abstract:
The electronic wallet system comprises a plurality of devices interconnected through a local network and capable of conducting electronic business transactions on an open network. Each device contains a smart card reader. A plurality of smart cards represent electronic purses able to contain electronic money. One of the devices contains an entity, the server, which contains a list of data entries, each entry corresponding to a purse liable to receive electronic money, contained in tokens, from other purses of the system. The tokens transferred between purses are stored temporally by the server. In order to improve the security of the transactions, the messages which are exchanged between the devices and/or the smart cards during token transfer operations are protected by secret keys which are only stored in the smart cards of the system.