Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for securing encrypted content broadcast by a broadcaster

A technology for broadcasters and content, applied in selective content distribution, television, electrical components, etc., can solve the problem of inability to eliminate clone modules, and achieve the effect of reducing bandwidth

Inactive Publication Date: 2009-09-16
NAGRAVISION SA
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0019] As a result, sending transport keys via global transports as well as individual transports has drawbacks and does not eliminate clone modules

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for securing encrypted content broadcast by a broadcaster
  • Method for securing encrypted content broadcast by a broadcaster
  • Method for securing encrypted content broadcast by a broadcaster

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] Figures 1 to 3 Process implementations of the encryption side and the decryption side according to the invention are shown. The encryption is performed at the level of the management center CG, which sends the stream to the decoder STB associated with the security module SC that manages the decryption of the data.

[0047] Such as figure 1 As shown in , the Manager produces three streams that are detailed below.

[0048] The management center first generates a control word cw in a control word generator cwg, and first uses cw to encrypt the content CT to be disseminated in a conventional manner. exist figure 1 Encrypt the content CT during the step marked with Scramb in . These are sent as encrypted data stream CT'=cw(CT). As is known, the control word is changed at regular intervals, eg every 2 to 10 seconds, although other intervals are also contemplated.

[0049] When the control words are generated, they are also encrypted by the generator MCWG with a randoml...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method preventing the misuse of conditionally accessible data, particularly with the aid of closes of security modules whose security has been compromised. The aim of the invention is achieved by means of a method for securing content which is encrypted by means of at least one encryption key and transmitted by a broadcaster to at least one multimedia unit associated with a security module, wherein a value enabling determination of the encryption key or keys of said content is also transmitted to the multimedia unit by the broadcaster. The security module comprises means for determining the encryption key based on said value. The inventive method comprises the following steps: generation of a temporary encryption key (MCW); encryption of the value, which determines the encryption keys (cw) of the content, by the temporary key (MCW); transmission of said encrypted value to the destination of the multimedia unit; encryption and transmission of at least two cryptograms comprising the temporary key (MCW) encrypted by an authorization key (G), wherein the first cryptogram is encrypted by a first authorization key which is proper to a first security module and the second cryptogram is encrypted by a second authorization key which is proper to a group of security modules from which the first security module is excluded.

Description

technical field [0001] The present invention relates to the security of security modules for containing personal and confidential data allowing access to services or benefits. [0002] More precisely the invention applies to the field of pay television, in which content is transmitted in encrypted form, the decryption of which is authorized under certain conditions. Background technique [0003] It is known to broadcast a plurality of streams to a multimedia unit, eg a decoder, for watching pay TV, eg movies, sports games or games in particular. In particular, these streams are on the one hand event files such as encrypted data streams and on the other hand control message streams allowing the decryption of this data stream. The content of the data stream is encrypted by a "Control Word" (CW), which is updated periodically. The second stream is called an ECM stream (Entitlement Control Message) and can be formed in two different ways. According to a first way, these contr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04N7/167
CPCH04N7/167H04N21/2347H04N21/26606H04N21/26613H04N21/6334
Inventor 塞德里克·格罗克斯雷查德·克桑迪尼亨丽·库德洛斯基
Owner NAGRAVISION SA