摘要:
To access services on a device, such as a computer, a user has a portable device in two parts: a plug adapted to be inserted in a USB port and a transponder that remains about his person. In a preferred embodiment, an access manager verifies that first the plug and then the transponder are identified. If so, the access manager verifies if plug and transponder have to be paired and if they have the proper access rights for the desired service. Only then is access given. In a further embodiment, more than one transponder is needed to access a certain service. It can thus be appreciated that the invention provides a flexible and secure way to secure access to services.
摘要:
A secure pre-recorded medium and a method for descrambling encrypted content thereon. When a player wants to access the content, a secure processor on the medium verifies that the player has not been revoked, preferably by comparing an identity of the player with identities in a revocation list, after which a mutual authentication is performed. The secure processor then verifies that the player has the rights to access the content and provides the player with the key necessary to descramble the content, whereafter the player descrambles the content.
摘要:
Disclosed is a multistage electron collector for electron tubes. This collector comprises an imperviously sealed envelope subjected to vacuum with an input wall and a back. Within, there is a succession of electrodes and dielectric spacers. Two successive electrodes are insulated by a spacer of a first type in contact with the two electrodes and having no contact with the envelope. A spacer of a second type is in contact firstly with the electrode closest to the back and secondly with the back. Application to electron tubes, especially millimeter travelling wave tubes.
摘要:
This amplifier stage comprises a microwave tube wherein an electron beam (3) is made to interact with a microwave having a frequency variable within a given useful range, the velocity of the electrons of the beam being determined by a cathode voltage (V.sub.k) applied to the tube and the microwave being propagated in said delay structure (4) that imposes a phase velocity close to the velocity of the electron beam on said microwave. The cathode voltage is a variable voltage, regulated as a function of said frequency, said voltage varying with the frequency to modify the velocity of the electrons of the beam in such a way that, for every frequency of said useful range of frequencies, the corresponding velocity of these electrons remains essentially, but not precisely, identical to the phase velocity of the microwave. Thus, the dispersivity in frequency of the delay structure is compensated for, and the output power delivered by the tube is thus kept essentially constant.
摘要:
The invention relates to a local digital network comprising: at least one source device intended to broadcast data over the network; and at least one receiver device intended to receive said data. The source device uses a network active encryption key to encrypt data liable to be broadcast in the network and the receiver device contains: a network active decryption key for decrypting data encrypted using said active encryption key and at least one decryption key of the network for decrypting data encrypted with the aid of an encryption key used previously in the network. The invention also relates to the installing of new devices in such a network as well as the sending of data from a source device to a receiver device.
摘要:
Delivery of conditional access data to a receiver that is able to connect to a plurality of scrambled programs. Conditional access for a current channel is handled using standard ECMs delivered with the channel. In parallel, the receiver retrieves an ECM for a separate stream comprising control words for every channel. The control word of this ECM is used to descramble the separate stream to access the control words for every channel. In a preferred embodiment, these control words are super-encrypted using channel keys and the receiver is only able to obtain channel keys for channels for which it has access rights. In case the control words are super-encrypted, they are decrypted. Upon channel change, the relevant retrieved control word is used to descramble the new channel. Also provided is a receiver device and a transmitter device. According to a variant, the control words received in the separate stream is treated only upon a change of channel. The invention enables a reduction or removal of the CA delay when switching between channels.
摘要:
A network device may receive a packet from a user device; allocate a first port range to the user device; measure a period of time after allocating the first port range; and allocate a second port range to the user device when the measured period of time is equal to a particular period of time. The first port range may be associated with a first Internet Protocol (IP) address.
摘要:
Device and method for calculating distance in a communication network. Device A sets a non-predictable initial Time-To-Live (TTL) value and sends a message with this value to device B. B reads the TTL of the received message. A and B establish a Secure Authenticated Channel over which B sends the TTL of the received message. A may then calculate the distance to B. If the received TTL is greater than the initial TTL, this indicates an error or an attack; if the received TTL is lower than the initial TTL minus a TTL limit, then B is too distant; and if the initial TTL minus the TTL limit is less than or equal to the received TTL, which in turn is less than or equal to the initial TTL, then A may conclude that B a priori is within the required distance.
摘要:
A network monitoring and network congestion analysis can be performed based on a comparison of data packets at multiple different network nodes installed at different locations on a communication path. A downstream network node may be installed at a user location while an upstream network may be installed at an access router further up the network. A network congestion analyzer may receive data packet information including timestamps from both network nodes, and may compare the data packet information to group the data packets into application flows and match the corresponding packets from the different network nodes. Based on the data packet matching, the network congestion analyzer may calculate packet loss, packet delay, packet delay variation, and perform other network congestion analysis techniques for the application flows corresponding to a user's various devices and the applications executing on those devices.
摘要:
The present invention concerns a method and a device for encrypting an encoded scalable enhancement frame sent by an emitter to a receiver, the enhancement frame comprising a plurality of complementary streams ordered in term of quality level, each complementary stream corresponding to a combination of more than one scalability type, where a complementary stream of a lower quality level corresponds to a lower quality on each scalability type, comprising at the level of the emitter the steps of generating a key per complementary stream for encrypting said complementary stream in such a way that all scalability types can be either simultaneously or individually used, said keys being generated in such a way that only the keys of the complementary streams of quality levels lower than the quality level of a complementary stream can be obtained from the key of said complementary stream, and sending the key of a complementary stream corresponding to a required quality level to the receiver, the key permitting a receiver to generate the keys of the complementary streams of the lower quality levels only. The present invention also concerns a method and a device for decrypting a received encoded scalable enhancement frame.