EP1829277A1 - Procédé et système d'encryption par un proxy. - Google Patents
Procédé et système d'encryption par un proxy.Info
- Publication number
- EP1829277A1 EP1829277A1 EP05821572A EP05821572A EP1829277A1 EP 1829277 A1 EP1829277 A1 EP 1829277A1 EP 05821572 A EP05821572 A EP 05821572A EP 05821572 A EP05821572 A EP 05821572A EP 1829277 A1 EP1829277 A1 EP 1829277A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- key
- receiver
- message
- conversion
- transmitter
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
- 238000000034 method Methods 0.000 title claims abstract description 32
- 238000006243 chemical reaction Methods 0.000 claims abstract description 76
- 230000005540 biological transmission Effects 0.000 claims description 5
- 230000001419 dependent effect Effects 0.000 claims description 2
- 230000009466 transformation Effects 0.000 claims 2
- 238000013475 authorization Methods 0.000 claims 1
- 101000622430 Homo sapiens Vang-like protein 2 Proteins 0.000 description 4
- 241000272534 Struthio camelus Species 0.000 description 4
- 102100023520 Vang-like protein 2 Human genes 0.000 description 4
- 230000001010 compromised effect Effects 0.000 description 4
- 238000004364 calculation method Methods 0.000 description 3
- 101000622427 Homo sapiens Vang-like protein 1 Proteins 0.000 description 2
- 102100023517 Vang-like protein 1 Human genes 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 101100457838 Caenorhabditis elegans mod-1 gene Proteins 0.000 description 1
- 101150110972 ME1 gene Proteins 0.000 description 1
- 238000013459 approach Methods 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 238000000605 extraction Methods 0.000 description 1
- 238000007429 general method Methods 0.000 description 1
- 230000008570 general process Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/16—Analogue secrecy systems; Analogue subscription systems
- H04N7/167—Systems rendering the television signal unintelligible and subsequently intelligible
- H04N7/1675—Providing digital key or authorisation information for generation or regeneration of the scrambling sequence
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04K—SECRET COMMUNICATION; JAMMING OF COMMUNICATION
- H04K1/00—Secret communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3006—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
- H04L9/3013—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the discrete logarithm problem, e.g. ElGamal or Diffie-Hellman systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/23—Processing of content or additional data; Elementary server operations; Server middleware
- H04N21/234—Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs
- H04N21/2343—Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs involving reformatting operations of video signals for distribution or compliance with end-user requests or end-user device requirements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/23—Processing of content or additional data; Elementary server operations; Server middleware
- H04N21/234—Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs
- H04N21/2347—Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs involving video stream encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/43—Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
- H04N21/44—Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs
- H04N21/4405—Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs involving video stream decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/76—Proxy, i.e. using intermediary entity to perform cryptographic operations
Definitions
- the present invention relates on the one hand to a new method for transmitting messages intended to be transmitted between a transmitter and at least one receiver, and on the other hand, a system comprising a transmitter and at least one receiver, this system using the method of encryption mentioned above.
- the content is first encrypted by means of a plurality of keys which can each have a relatively short lifetime, these keys being called “control words" or control words.
- the encrypted content is broadcast to multimedia units subscribed to the provider.
- the control words are themselves encrypted by means of a transmission key and sent in the form of control messages (Entitlement control message ECM).
- control words are performed in a security module which may have the particular shape of a smart card.
- control words When the control words have been decrypted, they can be used to decrypt the content. This procedure being well known to those skilled in the art, it is not described in more detail here.
- This document describes an encryption method in which a message is encrypted by means of a key linked to the transmitter and sent to a conversion module which transforms the received message into another message which can be decrypted by means of a key linked to the receiver.
- This conversion module does not deliver the message in clear, nor the key related to the transmitter, nor that related to the receiver.
- This module also contains a particular function, hereinafter referred to as the conversion function, which makes it possible to modify the message according to the constraints defined above.
- a secret key a and a random number generator, which generates a value k.
- the notion of large numbers is not defined by a specific numerical value. The larger the numbers used, the more difficult it is for a third party to find these values by successive trials. The level of security is therefore related to the size of the numbers used.
- the issuer also has a value g belonging to the set 9 p .
- the value (g a ) m0 d P is the public key of the transmitter.
- the pair ⁇ C1;C2> forms the message that is generated by the transmitter and is transmitted to the conversion module.
- the conversion module has a conversion key and a conversion function.
- the key is equal to:
- the couple ⁇ C1, C2> entering the conversion module is transformed into an outgoing couple ⁇ C1, C2 '>.
- the latter is transmitted to the receiver and more specifically to the secure part of the receiver which contains the secret key b1 specific to this receiver.
- each receiver has a key b of its own.
- the receiver can deduce the message by applying the following formula:
- the present invention proposes to overcome the disadvantages of the processes of the prior art and in particular of the Blaze & Strauss method as described above.
- This object is achieved by a method of transmitting messages between a transmitter and at least one receiver, comprising the following steps: encrypting the message (m) to be transmitted by means of a key associated with said transmitter;
- the conversion key (71 to _> b ) of the conversion module is dependent on a non-trivial value raised to a power of the key (a) linked to the transmitter and the key (b) related to the receiver.
- a system for transmitting messages between a transmitter and at least one receiver said transmitter comprising means for encrypting said message (m) by means of a key (a) associated with this transmitter , said system comprising at least one conversion module in which is memorized a conversion key (7l a _> b ) and a conversion function, this conversion module being arranged to convert the incoming message (m) into a message capable of being decrypted by a key (b) specific to said receiver, this receiver comprising a decryption stage arranged to decrypt the outgoing message of the conversion module, characterized in that the conversion key (7I 3 ⁇ b ) of the module conversion depends on a non-trivial value raised to a power of the key (a) linked to the transmitter and the key (b) linked to the receiver.
- the method of the invention applies in cases where the receiver is capable of decrypting encrypted messages according to the EIGamal algorithm (Taher EIGamal, "A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms", IEEE Transactions on Information Theory, v. IT-31, No. 4, 1985, pp469-472 or CRYPTO 84, pp10-18, Springer-Verlag.) Or any variants thereof, especially variants using at least one curve elliptical.
- the method of the invention ensures optimal security while avoiding the need to use a security module.
- the data and message streams are identically encrypted for each user and can be broadcast in a conventional manner.
- the data and messages are then decrypted by each user so that the data accessed by one of the users can not be used by another user.
- Figure 1 shows the message transmission system according to the present invention, in a specific embodiment
- Figure 2 generally illustrates the method of transmitting messages of the invention.
- the transmitter is a pay-TV CG management center and in which the receivers are STB multimedia units for receiving events.
- the receivers are STB multimedia units for receiving events.
- Pay TV These multimedia units are for example decoders or computers.
- a content CT to be transmitted that is to say data relating to a pay-TV event
- control words cw control words
- the method according to the invention is applied to the ECM control messages containing the control words. It should be noted, however, that it is possible to apply the method of the invention directly to the data relating to pay-TV events. In this case, these would not be encrypted by control words. This approach is however not preferred in practice because the decryption time of the messages must be short enough to be able to display the content adequately.
- the method of the invention requires a relatively large bandwidth. The method could therefore be used when there is sufficient bandwidth and the decryption can be done quickly enough.
- Each multimedia unit STB-i, STB 2 , STB n has a specific key respectively bi, b 2 , b n and is associated with a conversion module CM.
- This module may be in an unsecured part of the decoder or physically removed from the decoder, for example in a redistribution center such as those known by the acronym DSLAM.
- the CG Management Center has a key a. It should be noted that this key may be specific to a channel or product.
- CT control words
- the message obtained is represented by (CT) cw in FIG. 1.
- the set of messages is sent in the form of a data stream DF to the receivers concerned.
- the same control words cw are encrypted by the key a of the management center, which gives (cw) a .
- the receiver comprises a monolithic security unit containing a secret key b1, inaccessible from outside this unit. It also includes an MPEG decompressor.
- the stream DF of the encrypted content (CT) cw is transmitted directly to the security unit in which it will be processed.
- the flow of the ECM control messages is processed conventionally to extract the encrypted control words (cw) a .
- These control words (cw) a are then sent to the conversion module of the multimedia unit concerned.
- the conversion module is shown as integrated in the multimedia unit. It is also possible to group the conversion modules in a retransmission center such as those known by the acronym DSLAM (Digital Subscriber Access Access Multiplexer). Each conversion module is then connected to the multimedia unit by a specific line.
- the incoming message encrypted by the key a is converted into an outgoing message, encrypted by the key b1.
- the outgoing message (cw) b i is sent to the decryption stage which can decipher it by means of the key b1.
- control words cw when the control words cw have been decrypted using the key b1 of the multimedia unit, they can be conventionally used to decrypt the content CT, which in turn can be processed in order to its use for example on a TV screen.
- 9 * 2q is the set of integers between 0 and 2q-1 that are prime with 2q.
- the pair ⁇ C1; C2> forms the encrypted message to be sent.
- This torque is sent to the conversion modules of the receivers concerned.
- the following description relates to the processing of this torque in the conversion module associated with the multimedia unit STB1 having the secret key b1.
- This conversion module contains the following conversion key:
- (-) mod ⁇ is such that (a * -) m0 d ⁇ ⁇ st is equal to 1.
- the converted torque is ⁇ 1; 8> or generally ⁇ C1, C2 '>.
- equation ) mod P without knowing g.
- the resolution of this equation requires a logarithmic calculation. Due to the extreme difficulty in solving this genre of equations, one can be sure, by choosing sufficiently large numbers, that the equation is not solved during the validity period of these keys. At each key change, the calculation should be repeated.
- the present invention therefore makes it possible to guarantee an optimal level of security since, on the one hand, it is very difficult to obtain the secret key of a specific multimedia unit, on the other hand, the discovery of a key does not endanger the whole system.
- This invention is therefore particularly well suited in an environment in which it is not desirable to use removable security modules such as smart cards.
- the conversion module of the invention may be remote from the multimedia unit.
- the method therefore perfectly meets the requirements and constraints of conditional access television broadcast by a network such as the Internet. It should be noted, however, that this represents only one of the possible applications of the invention.
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Multimedia (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computing Systems (AREA)
- Physics & Mathematics (AREA)
- Mathematical Optimization (AREA)
- Mathematical Physics (AREA)
- Pure & Applied Mathematics (AREA)
- Mathematical Analysis (AREA)
- General Physics & Mathematics (AREA)
- Algebra (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
- Mobile Radio Communication Systems (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Storage Device Security (AREA)
- Communication Control (AREA)
Abstract
Description
Claims
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP05821572A EP1829277A1 (fr) | 2004-12-10 | 2005-12-08 | Procédé et système d'encryption par un proxy. |
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP04292975A EP1670172A1 (fr) | 2004-12-10 | 2004-12-10 | Procédé et système d'encryption par un proxy. |
EP05821572A EP1829277A1 (fr) | 2004-12-10 | 2005-12-08 | Procédé et système d'encryption par un proxy. |
PCT/EP2005/056613 WO2006061420A1 (fr) | 2004-12-10 | 2005-12-08 | Procede et systeme d ' encryption par un proxy |
Publications (1)
Publication Number | Publication Date |
---|---|
EP1829277A1 true EP1829277A1 (fr) | 2007-09-05 |
Family
ID=34931598
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP04292975A Withdrawn EP1670172A1 (fr) | 2004-12-10 | 2004-12-10 | Procédé et système d'encryption par un proxy. |
EP05821572A Withdrawn EP1829277A1 (fr) | 2004-12-10 | 2005-12-08 | Procédé et système d'encryption par un proxy. |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP04292975A Withdrawn EP1670172A1 (fr) | 2004-12-10 | 2004-12-10 | Procédé et système d'encryption par un proxy. |
Country Status (15)
Country | Link |
---|---|
US (1) | US7724896B2 (fr) |
EP (2) | EP1670172A1 (fr) |
JP (1) | JP4838809B2 (fr) |
KR (1) | KR101203276B1 (fr) |
CN (1) | CN1812320B (fr) |
AR (1) | AR052652A1 (fr) |
AU (1) | AU2005313270B2 (fr) |
BR (1) | BRPI0517168A2 (fr) |
CA (1) | CA2590008C (fr) |
IL (1) | IL183799A (fr) |
MX (1) | MX2007006904A (fr) |
RU (1) | RU2007121323A (fr) |
TW (1) | TWI376136B (fr) |
WO (1) | WO2006061420A1 (fr) |
ZA (1) | ZA200704815B (fr) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7181017B1 (en) | 2001-03-23 | 2007-02-20 | David Felsher | System and method for secure three-party communications |
US9818136B1 (en) | 2003-02-05 | 2017-11-14 | Steven M. Hoffberg | System and method for determining contingent relevance |
US8874477B2 (en) | 2005-10-04 | 2014-10-28 | Steven Mark Hoffberg | Multifactorial optimization system and method |
CN108924161A (zh) * | 2018-08-13 | 2018-11-30 | 南京敞视信息科技有限公司 | 一种交易数据加密通信方法及系统 |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1043864A2 (fr) * | 1999-04-06 | 2000-10-11 | Xerox Corporation | Système et procédé de distribution de documents |
WO2003009522A1 (fr) * | 2001-07-18 | 2003-01-30 | France Telecom | Procede pour effectuer une tache cryptographique au moyen d'une cle publique |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5392353A (en) * | 1989-08-07 | 1995-02-21 | Tv Answer, Inc. | Interactive satellite broadcast network |
US6779111B1 (en) * | 1999-05-10 | 2004-08-17 | Telefonaktiebolaget Lm Ericsson (Publ) | Indirect public-key encryption |
JP2002141895A (ja) * | 2000-11-01 | 2002-05-17 | Sony Corp | コンテンツ配信システムおよびコンテンツ配信方法 |
JP3864249B2 (ja) * | 2002-06-04 | 2006-12-27 | インターナショナル・ビジネス・マシーンズ・コーポレーション | 暗号通信システム、その端末装置及びサーバ |
-
2004
- 2004-12-10 EP EP04292975A patent/EP1670172A1/fr not_active Withdrawn
-
2005
- 2005-12-08 EP EP05821572A patent/EP1829277A1/fr not_active Withdrawn
- 2005-12-08 BR BRPI0517168-7A patent/BRPI0517168A2/pt not_active Application Discontinuation
- 2005-12-08 MX MX2007006904A patent/MX2007006904A/es active IP Right Grant
- 2005-12-08 JP JP2007544920A patent/JP4838809B2/ja not_active Expired - Fee Related
- 2005-12-08 ZA ZA200704815A patent/ZA200704815B/xx unknown
- 2005-12-08 RU RU2007121323/09A patent/RU2007121323A/ru not_active Application Discontinuation
- 2005-12-08 KR KR1020077013145A patent/KR101203276B1/ko active IP Right Grant
- 2005-12-08 AU AU2005313270A patent/AU2005313270B2/en not_active Ceased
- 2005-12-08 CA CA2590008A patent/CA2590008C/fr not_active Expired - Fee Related
- 2005-12-08 TW TW094143432A patent/TWI376136B/zh not_active IP Right Cessation
- 2005-12-08 WO PCT/EP2005/056613 patent/WO2006061420A1/fr active Application Filing
- 2005-12-09 US US11/297,637 patent/US7724896B2/en active Active
- 2005-12-09 CN CN2005101373255A patent/CN1812320B/zh not_active Expired - Fee Related
- 2005-12-12 AR ARP050105182A patent/AR052652A1/es active IP Right Grant
-
2007
- 2007-06-10 IL IL183799A patent/IL183799A/en not_active IP Right Cessation
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1043864A2 (fr) * | 1999-04-06 | 2000-10-11 | Xerox Corporation | Système et procédé de distribution de documents |
WO2003009522A1 (fr) * | 2001-07-18 | 2003-01-30 | France Telecom | Procede pour effectuer une tache cryptographique au moyen d'une cle publique |
Also Published As
Publication number | Publication date |
---|---|
CN1812320B (zh) | 2011-03-30 |
EP1670172A1 (fr) | 2006-06-14 |
TWI376136B (en) | 2012-11-01 |
IL183799A (en) | 2012-03-29 |
AU2005313270A1 (en) | 2006-06-15 |
WO2006061420A1 (fr) | 2006-06-15 |
KR20070100712A (ko) | 2007-10-11 |
US7724896B2 (en) | 2010-05-25 |
CA2590008C (fr) | 2014-04-01 |
JP4838809B2 (ja) | 2011-12-14 |
ZA200704815B (en) | 2008-08-27 |
JP2008523673A (ja) | 2008-07-03 |
TW200633463A (en) | 2006-09-16 |
CN1812320A (zh) | 2006-08-02 |
KR101203276B1 (ko) | 2012-11-20 |
RU2007121323A (ru) | 2009-01-20 |
MX2007006904A (es) | 2007-09-26 |
US20060140397A1 (en) | 2006-06-29 |
AU2005313270B2 (en) | 2010-06-03 |
IL183799A0 (en) | 2007-09-20 |
AR052652A1 (es) | 2007-03-28 |
CA2590008A1 (fr) | 2006-06-15 |
BRPI0517168A2 (pt) | 2009-07-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP1525748B1 (fr) | Procede et module electronique de transmission securisee de donnees | |
EP0740870B1 (fr) | Procede d'emission et de reception de programmes a acces conditionnel utilisant des mots de controle specifiques aux programmes | |
EP1867096B1 (fr) | Procede et systeme de reception d'un signal multimedia, entite cryptographique pour ce procede de reception et systeme, procede et boite noire pour la fabrication de l'entite cryptographique | |
EP2168304B1 (fr) | Verification de code mac sans revelation | |
EP2520042B1 (fr) | Procédés de déchiffrement, de transmission et de réception de mots de contrôle, support d'enregistrement et serveur pour ces procédés | |
WO2020008131A1 (fr) | Procede d'obtention d'une succession de cles cryptographiques | |
WO2005120066A1 (fr) | Procede de diffusion de donnees numeriques a un parc de terminaux recepteurs cible | |
FR2877119A1 (fr) | Procede et dispositif pour generer une cle de decryptage d'un contenu | |
EP1419640B1 (fr) | Reseau numerique local, procedes d'installation de nouveaux dispositifs et procedes de diffusion et de reception de donnees dans un tel reseau | |
WO2011113870A1 (fr) | Procede et systeme de diffusion securisee d'un flux de donnees numeriques | |
EP1829277A1 (fr) | Procédé et système d'encryption par un proxy. | |
WO2004045184A1 (fr) | Procede de renouvellement de cles symetriques dans un reseau numerique | |
EP2652899B1 (fr) | Procédé et système d'accès conditionnel à un contenu numérique, terminal et dispositif d'abonné associés | |
EP1723791B1 (fr) | Methode de securisation d'un evenement telediffuse | |
EP1723790B1 (fr) | Méthode de sécurisation d'un contenu chiffré transmis par un diffuseur | |
EP1633144A1 (fr) | Procédé de gestion des conditions d accès à un flux vidéo par un routeur / DSLAM | |
EP2328316B1 (fr) | Controle d'accès à un contenu numérique | |
EP2297954B1 (fr) | Mise a jour de droits d'acces a un contenu audiovisuel protege | |
EP1492346A1 (fr) | Système de traitement simultané de données d'au moins deux services de télévision à péage | |
WO2009068785A1 (fr) | Procédé de conditionnement et de contrôle d'accès à des contenus en codage hiérarchique, processeur et émetteur pour ce procédé | |
WO2001089215A2 (fr) | Procede de transmission de donnees chiffrees, application d'un tel procede dans un systeme de television numerique a peage et decodeur utilise dans un tel systeme | |
EP1605698A1 (fr) | Méthode de sécurisation d'un événement télédiffusé |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 20070619 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LI LT LU LV MC NL PL PT RO SE SI SK TR |
|
RIN1 | Information on inventor provided before grant (corrected) |
Inventor name: BREDY, NICOLAS Inventor name: NIMOUR, ABDELKRIM Inventor name: BARBIER, EVE-MARIE |
|
17Q | First examination report despatched |
Effective date: 20071005 |
|
REG | Reference to a national code |
Ref country code: HK Ref legal event code: DE Ref document number: 1104708 Country of ref document: HK |
|
DAX | Request for extension of the european patent (deleted) | ||
REG | Reference to a national code |
Ref country code: HK Ref legal event code: WD Ref document number: 1104708 Country of ref document: HK |
|
RAP1 | Party data changed (applicant data changed or rights of an application transferred) |
Owner name: NAGRA FRANCE SAS |
|
GRAP | Despatch of communication of intention to grant a patent |
Free format text: ORIGINAL CODE: EPIDOSNIGR1 |
|
INTG | Intention to grant announced |
Effective date: 20180725 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN |
|
18D | Application deemed to be withdrawn |
Effective date: 20181205 |