摘要:
The invention concerns a method for controlling access to encrypted data (CT) by control words (CW), said control words being received by a security module in control messages (ECM) and returned to a unit operating on the encrypted data. Said control messages (ECM) contain at least one first control word (CW1) and a second control word (CW2), said control words each allowing access to the encrypted data (CT) during a predetermined period called cryptoperiod (CP). Said method includes the following steps: sending said encrypted data to at least one operating unit; and sending control messages (ECM) to said control unit, such a control message (ECM) containing at least two specific control words (CW1, CW2) being sent to the operating unit after sending the data encrypted by said first control word (CW1) and before sending the data encrypted by said second control word (CW2). Said method is characterized in that the time shift between sending to the operating unit the data encrypted by said first control word (CW1) and sending the control message (ECM) containing said first control word (CW1) and said second control word (CW2) is more than 75% of the cryptoperiod.
摘要:
This invention relates to a Method for updating a table of correspondence between a logical address associated to a user unit in a communication network and a unique identification number associated to a user unit of a group of user units managed by a management centre, a method in which messages are exchanged between said management centre and at least one specific user unit of said group by means of said communication network, these messages being forwarded to the specific user unit using the logical address of said user unit in said network, wherein it includes the steps of searching in said table of correspondence for the logical address of the user unit in said communication network corresponding to the unique identification number of the specific user unit; of sending of messages to the user unit having the concerned unique identification number, to the logical address corresponding to said communication network; in the case of incorrect reception of the messages, sending of a request containing an identifier of said specific user unit (STB*), this request being sent to all or part of the user units (STB) forming said group; detection of a return message of a user unit (STB*) whose unique identification number (UA*) corresponds to said identifier contained in the request; determination of the logical address (AD*) in said network, used by the user unit (STB*) having transmitted the return message; verification of the logical address (AD) by establishing a communication between the management centre and the user unit (STB*) and authentication of the specific user unit by the management centre; storage in the table of correspondence (TC) of the management centre of said logical address (AD*) of the user unit in said network, in connection with said unique identification number (UA*) of the user unit (STB*) having transmitted the return messages.
摘要:
A method of production and distribution of asymetric public and private keys between a key generation centre and at least one user unit (DEC), the unit comprising a security module (SM), the method consisting in generating certificates comprising a public key and a private key in a first cryptographic unit (KPG), coding the private key by use of a service key in the first cryptographic unit (KPG) and storing the private key in a key memory (KPS), when sending the keys to a user unit, extracting the keys from the key memory (KPS), composing the certification with the public key, decoding the corresponding private key by use of the service key in a cryptographic security module and coding it with a transport key of the user.
摘要:
The present invention concerns the generation of a key necessary to decrypt audio/video contents by genuine decoding units. It concerns in particular a method to secure the reception of a broadcast content managed by a control center and encrypted by at least one content key, said content key or a data allowing to recover said content key being transmitted to the decoding units encrypted by a transmission key common to the decoding units, each decoding unit having at least one environment parameter known by the control center, said decoding unit receiving from the control center a first message common to all decoding units and comprising the encrypted transmission key and a second message, pertaining to said decoding unit and comprising correction data dedicated to said decoding unit, the decryption of the transmission key being made using the environment parameter and the correction data.
摘要:
In a pay television system, the choice and the confirmation of an impulse purchase are performed by the user on presentation, by means of a screen, of a grid of programmes. The selection by this user of a particular programme of his choice from the grid is subsequently confirmed in the system by an entitlement management message, this message being specific to an impulse purchase. In order to authorize the immediate screening of the selected transmission, the entitlement management message specific to an impulse purchase is contained in the data tied to the presentation of the grid.
摘要:
Example embodiments relate to a method for granting customers access to a product or a set of products. The method may include providing by the customer through a secured communication network, a code to a registration center, wherein the code being unique, transmitting the code from the registration center to an authorization center, retrieving the identifier of the product or the set products from the code, by requesting a data base or calculating the identifier, and transmitting, by the authorization center, an authorization code to the customer terminal, wherein the authorization code allows access to the product or the set of products.
摘要:
This invention relates to a security module comprising a microprocessor, a program memory containing at least one operating program and unique identification means of said module. This security module is characterized in that the identification means are constituted by a set of unique and artificial computer codes, compatible with their execution by said microprocessor of the module and stored in the program memory. The invention also concerns a personalization method of a security module by a unique identifier, this module comprising a microprocessor and a program memory containing at least one operating program. The method of the invention is characterized in that it includes the steps of generation of a unique set of computer codes, called artificial computer codes and the writing of this set of codes in the program memory in specific memory locations.
摘要:
A method is for securing and verifying an electronic certificate issued by an authority to an owner. The certificate is stored in the memory of a user unit operated by the owner. The user unit transmits all or part of the data of the certificate to the authority. Further, during an initialization phase, the method includes determining, by the authority, a network identifier pertaining to the user unit, and storing, by the authority, the identifier in connection with the data of the certificate. As such, the use of an electronic certificate by individuals other than the owner may be prevented. Further, damages to the owner, in the case of the theft or copying of a certificate, may be avoided.
摘要:
A method for updating a table of correspondence between a logical address associated to a user unit in a communication network and a unique identification number associated to one of a group of user units managed by a management center, a method where messages are exchanged between said management center and a specific user unit of said group by using said communication network, these messages being forwarded to the logical address of the specific user in said network, the method including searching in said table for the logical address of the user unit in said communication network corresponding to the unique identification number of the specific user unit; sending of messages to the user unit having the concerned unique identification number, to the logical address corresponding to said communication network; and if the messages are received incorrectly, sending a request containing an identifier of said specific user unit.
摘要:
The present invention concerns the generation of a key necessary to decrypt audio/video contents by genuine decoding units. It concerns in particular a method to secure the reception of a broadcast content managed by a control center and encrypted by at least one content key, said content key or a data allowing to recover said content key being transmitted to the decoding units encrypted by a transmission key common to the decoding units, each decoding unit having at least one environment parameter known by the control center, said decoding unit receiving from the control center a first message common to all decoding units and comprising the encrypted transmission key and a second message, pertaining to said decoding unit and comprising correction data dedicated to said decoding unit, the decryption of the transmission key being made using the environment parameter and the correction data.