摘要:
The present invention relates to a management messages transmission method by a management center intended to a plurality of multimedia units. Each unit has a security module (SC) comprising at least one global encryption key used in relation with an encryption module. This method is characterized in that it consists of dividing the totality of the security modules allowing access to encrypted data originating from a determined provider into at least two groups (GR1, GR2), a first group of security modules having a first configuration of the security elements and a second group of security modules having a second configuration of the security elements, the first configuration being different from the second configuration.
摘要:
Systems and methods for performing cascading dynamic crypto periods are disclosed. In embodiments, a control word and a set of functions is transmitted between a head-end and recipient devices at the beginning of a crypto period. The crypto period is divided into a discrete number of sub-crypto periods. The control word used to encrypt and decrypt the broadcast content is changed during each sub-crypto period. At the end of the first sub-crypto period, a derived control word is generated by passing the original control word to a function in the set of functions in order to generate a derived control word at the first transition between sub-crypto periods. The derived control word is used for encryption and decryption of the broadcasted content during the second sub-crypto period. Upon transitioning to the third sub-control-period, the derived control word is input into another function to produce a second derived control word.
摘要:
Systems and methods for performing cascading dynamic crypto periods are disclosed. In embodiments, a control word and a set of functions is transmitted between a head-end and recipient devices at the beginning of a crypto period. The crypto period is divided into a discrete number of sub-crypto periods. The control word used to encrypt and decrypt the broadcast content is changed during each sub-crypto period. At the end of the first sub-crypto period, a derived control word is generated by passing the original control word to a function in the set of functions in order to generate a derived control word at the first transition between sub-crypto periods. The derived control word is used for encryption and decryption of the broadcasted content during the second sub-crypto period. Upon transitioning to the third sub-control-period, the derived control word is input into another function to produce a second derived control word.
摘要:
The aim of this invention is to be able to recover specific information of a security module when it has been replaced by a new module in a user unit connected to a broadcasting network. This aim is reached by a method of storage and transmission of information generated by a first security module connected to a user unit, this first security module comprising a unique identifier and information representative of its functioning, this first module being able to be replaced by a second security module, this method comprising the following steps: determination of the specific information contained in the first security module intended for transmission, transfer of this information in the user unit, storage of this information in the user unit, replacement of the first security module by the second security module, connection of the user unit on a transmission network, initialization of a communication between the second security module and a management center, insertion by the user unit, of a data block in the blocks transmitted by the second module, this block comprising the identifier of the first module and the data specific to said first module.
摘要:
Systems and methods are disclosed for performing anti-piracy countermeasures in order to prevent unauthorized access of protected content. A conditional access system may be modified to include a counter. The counter is incremented every time the conditional access system receives a request that is a potential indication of pirate activity. The counter may also be decremented every time the conditional access system receives a request indicative of legitimate activity. If the conditional access system receives a management message containing a key required to access content keys, the conditional access system cheeks the counter. If the counter is below a threshold value, the conditional access system obtains the key. However, if the counter is above the threshold value, the conditional access system disregards the key contained in the management message, thereby losing access to protected content.
摘要:
The present invention proposes a method for managing rights of subscribers to a pay-television system comprising an access control system to which are connected subscriber management systems each managed by an operator and a plurality of subscriber decoders, said decoders each being equipped with a security module containing the rights for each subscriber allowing him the decryption of encrypted digital data of a stream broadcasted by at least one operator, during a modification of the rights carried out by an operator in the security module of a subscriber, the control access system receives data identifying a subscriber with modification commands of rights of said subscriber coming from a subscriber management system of an operator, generates a management message containing the modified rights and transmits said message to the security module of the subscriber via the stream containing the encrypted data, said method comprising the step of verification of the modifications according the properties and the available resources of the security module and the step of generation of the management message containing the modified rights when the result of the comparison is positive.
摘要:
Systems and methods are disclosed for performing anti-piracy countermeasures in order to prevent unauthorized access of protected content. A conditional access system may be modified to include a counter. The counter is incremented every time the conditional access system receives a request that is a potential indication of pirate activity. The counter may also be decremented every time the conditional access system receives a request indicative of legitimate activity. If the conditional access system receives a management message containing a key required to access content keys, the conditional access system cheeks the counter. If the counter is below a threshold value, the conditional access system obtains the key. However, if the counter is above the threshold value, the conditional access system disregards the key contained in the management message, thereby losing access to protected content.
摘要:
A method is proposed to update access rights to conditional access data. In this method, the group number in which the access rights must be updated is first determined, and then all the security modules connected to this group are determined. Subsequently, according to the embodiment chosen, either an encrypting key for each of the modules with the access rights that must be updated is determined, or a subscriber key (KAB) common to all the security modules of a determined group with rights to be updated is determined. The rights are then encrypted with the corresponding key. The authorization messages (EMM) containing said encrypted access rights and an identifier of the security modules for which they are destined are sent. These rights are then received and decrypted in the security modules corresponding to said identifiers.
摘要:
This invention relates to an access means management method of to conditional access data, this data being broadcasted to at least one multimedia unit. The access means being controlled by a management centre, and these access means being associated to a time information. The multimedia unit comprises at least one security module in which the access means to data are stored. It also includes remote communication means with the management centre and local communication means with said security module. This process is characterized in that it includes the steps of: determination by the security module, of the next renewal date of the access means; if the next renewal date of the access means is closer than a preset duration, sending by the security module of a request to the multimedia unit, requesting the renewal of the access means, this request using said local communication means; sending by the multimedia unit of said request for renewal of the access means to the management centre, this request using said remote communication means; verification by the management centre, if said multimedia unit is authorized to renew the access means; in the case of a positive response, sending to said multimedia unit of an access means renewal message.