Abstract:
This invention relates to a method for managing consumption of digital contents of a provider in a client domain comprising a portable isolated device where the portable isolated device receives an isolated content, the result of a digital processing of the audio and/or video provider content, and an isolated license associated with the content and containing rights to use the isolated content and authorization information. Also, the portable isolated device manages the consumption of the content in devices of the domain in accordance with the associated rights that it has received, independently of the provider.
Abstract:
The invention concerns a method implemented in a communication network comprising a source device including: a first symmetrical key for encrypting data to be transmitted to a display device connected to the network; and the first symmetrical key encrypted with a second symmetrical network key known only to at least one display device connected to the network. When the source device needs to renew its first symmetrical key to encrypt new data, it generates a random number, then it calculates a new symmetrical key based on the first symmetrical key and on the random number. It then encrypts the data to be transmitted with the new symmetrical key and transmits to a display device, via the network: the data encrypted with the new symmetrical key, the random number, and the first encrypted symmetrical key with the second symmetrical network key.
Abstract:
A protocol (i.e. method) and corresponding apparatuses for calculating a session key. Two peers with knowledge of a common Diffie-Hellman permanent key, Kperm, and the identity and public key of the other peer. A first peer chooses a first ephemeral private key x and calculates the first corresponding ephemeral public key gx, which is sent to the second peer. The second peer calculates a second ephemeral public key gy in the same manner, and an ephemeral shared key Keph, hashes gy, Keph, Kperm, and its identity, and sends gy and the hash to the first peer. The first peer calculates Keph, verifies the hash, and hashes gx, Keph, Kperm, and its identity, and sends it to the second peer that verifies this hash. Thereafter, both peers obtain a session key by hashing Keph. The apparatuses may then use the session key to establish a secure authenticated channel (SAC).
Abstract:
The invention relates to pairing a slave device with a master device, for example decoders in a conditional access system. There is provided a security module that stores a device state that indicates whether a decoder shall be a master or a slave decoder. There is also provided a method in a conditional access system of providing a device with a device state stored on a security module. It is detected that the security module is in connection with the device and the device state is transferred from the security module to the device. There is further provided a method of pairing a slave device with a master device. The slave device asks the master device to identify itself, the master device returns an identification, and if the slave device has not yet been paired with a master device, it checks the identity of the master device and, if the identity is verified pairs with the master device. There is also provided a first, slave, device for pairing with a second, master, device. The first device comprises an interface for sending an identification command to and receiving an identification message from the master device, and a processor for checking the identity of the second device and pairing the first device with the second device.
Abstract:
The process consists in receiving in a reception device a content from a content provider to which is attached a unique identifier of most recent revocation list, the revocation list containing identifiers of keys, of appliances or of modules regarded as noncompliant by a trusted third party. The revocation list identifier received is compared with a revocation list identifier stored in the reception device and, in case of difference between the identifiers: one downloads the most recent revocation list to the said reception device; or one awaits the reception of the most recent revocation list with a next content. The invention also relates to a process for presenting a content received according to the above process.
Abstract:
Process for preparing crystals of Hg.sub.1-x Cd.sub.x Te, in which ingots of HgTe and of CdTe are made to pass through a solvent zone, characterized in that it comprises the step of using as solvent a mixture of tellurium, of HgTe and of CdTe in proportions corresponding to thermodynamic balance.