摘要:
A method for secure installation of software applications. The user receives the software, partly encrypted, and an installation token for a number of licenses from the software provider, plugs the software and the installation token into a computer, and launches the installation application. A Secure Authenticated Channel is established between the installation application and the installation token and a unique identifier of the computer is sent thereon to the installation token. The installation token verifies that there are remaining licenses, decreases the remaining licenses, authorizes the installation and sends the decryption key and a certificate/key pair to the installation application that decrypts and installs the software, preferably linking the installation to the computer's identifier. A variant allows (virtually) unlimited installations of time limited programs that are transformed into time unlimited programs once the installation token has reported the number to the software provider and paid for the necessary licenses. Also provided is the installation token.
摘要:
A method for secure installation of software applications. The user receives the software, partly encrypted, and an installation token for a number of licenses from the software provider, plugs the software and the installation token into a computer, and launches the installation application. A Secure Authenticated Channel is established between the installation application and the installation token and a unique identifier of the computer is sent thereon to the installation token. The installation token verifies that there are remaining licenses, decreases the remaining licenses, authorizes the installation and sends the decryption key and a certificate/key pair to the installation application that decrypts and installs the software, preferably linking the installation to the computer's identifier. A variant allows (virtually) unlimited installations of time limited programs that are transformed into time unlimited programs once the installation token has reported the number to the software provider and paid for the necessary licenses. Also provided is the installation token.
摘要:
There are times when a first user may wish to distribute an excerpt of a protected digital content to a second user, for example for criticism. The protected digital content is divided into a plurality of parts, each part being encrypted using a control word specific for the part, wherein each control word can be generated from a master control word for the protected digital content. A device belonging to the first user selects the parts of the excerpt; generates the control words for the selected parts from the master control word; generates a license for the selected parts, the license comprising the control words for the selected parts; and transmits the selected parts and the license to the receiver of the second user. Also provided is the device of the first user.
摘要:
The disclosure relates to a method of reception of signals from at least two transmitters (RCi), wherein for each transmitter the data ("0", "1") are represented by the time interval (T0i, T1i) between two consecutive pulses transmitted by this transmitter, said time intervals and the pulse widths (Tpi) being characteristic of each transmitter, and wherein said method includes the following steps: reception of a resultant signal that is the sum of the signals from by said transmitters; determination of the parameters of said resultant signal, these parameters including the width and spacing of the pulses; analysis of said parameters and assignment of a data item to one of said transmitters. The invention also concerns a receiver device, a remote controller, and a system of reception. The invention is applicable notably in the field of television and video.
摘要:
To authenticate a digital medium for a given title, an authentication server selects a number of challenges corresponding to the title from an authentication database, clears an error counter and sends the challenges sequentially to an authentication application in a media reader in which the digital medium is inserted. Upon reception of a response, it is verified if the answer is correct. If this is the case, then the next challenge is sent; otherwise, it is first verified if a correct answer was mandatory and if so, it is deduced that the digital medium is not genuine. If an incorrect may be accepted, then the error counter is incremented and the next challenge is sent. When there are no more challenges to send, it is verified if the error counter is above an acceptable limit. If so, the digital medium is deemed as not genuine. The invention may be used to allow an owner of a digital medium to access further information or content.
摘要:
The invention relates to a method for controlling digital rights of the “Play N times” type for a digital audio and/or video content, referred to as controlled content, the controlled content being consumed by a consumer on a consuming device or on another device delegating the controlling of these rights to the consuming device. According to this method, charging of one additional usage is inhibited in at least one of the following cases where: the consumer momentarily consumes another content, on the same device where the controlled content is consumed, and then returns to the controlled content; the consumer effects a pause in the usage of the controlled content; the consumer performs a fast-forward of the controlled content; or the consumer performs a rewind of the controlled content.
摘要:
To access services on a device, such as a computer, a user has a portable device in two parts: a plug adapted to be inserted in a USB port and a transponder that remains about his person. In a preferred embodiment, an access manager verifies that first the plug and then the transponder are identified. If so, the access manager verifies if plug and transponder have to be paired and if they have the proper access rights for the desired service. Only then is access given. In a further embodiment, more than one transponder is needed to access a certain service. It can thus be appreciated that the invention provides a flexible and secure way to secure access to services.
摘要:
The invention relates to a method to verify that data received by a receiver has been sent by a transmitter authorized by a trusted third party, the transmitter and the receiver being connected to a digital network. An identifier is associated with the data sent by the transmitter and, on receipt of the data by the receiver, the receiver generates a random number and diffuses the same on the network. The transmitter that receives the random number calculates a response by applying a first function to the random number and to the identifier, and sends the response to the receiver which verifies the response received by applying a second function to the response received, the random number and the identifier. The first function is delivered first to the transmitter by the trusted third party. The second function is a function for checking the result of the first function which is delivered first to the receiver by the trusted third party.
摘要:
To access services on a device, such as a computer, a user has a portable device in two parts: a plug adapted to be inserted in a USB port and a transponder that remains about his person. In a preferred embodiment, an access manager verifies that first the plug and then the transponder are identified. If so, the access manager verifies if plug and transponder have to be paired and if they have the proper access rights for the desired service. Only then is access given. In a further embodiment, more than one transponder is needed to access a certain service. It can thus be appreciated that the invention provides a flexible and secure way to secure access to services.
摘要:
A secure pre-recorded medium and a method for descrambling encrypted content thereon. When a player wants to access the content, a secure processor on the medium verifies that the player has not been revoked, preferably by comparing an identity of the player with identities in a revocation list, after which a mutual authentication is performed. The secure processor then verifies that the player has the rights to access the content and provides the player with the key necessary to descramble the content, whereafter the player descrambles the content.