Securely providing a control word from a smartcard to a conditional access module

A technology for accessing modules and control words, applied in safety communication devices, electrical components, digital transmission systems, etc.

Inactive Publication Date: 2010-09-08
IRDETO ACCESS
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The weakness of this symmetric encryption is that the mutual trust between the smart card and the CAM keeps the encryption key used secret

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Securely providing a control word from a smartcard to a conditional access module
  • Securely providing a control word from a smartcard to a conditional access module
  • Securely providing a control word from a smartcard to a conditional access module

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] The present invention provides a state-based key exchange in which control words transmitted between a smart card and a CAM in a receiver are encrypted using a diversified key. CAMs are usually integrated in receivers such as set-top boxes, but may also be implemented in other types of receivers such as televisions, personal video recorders, mobile phones, smartphones or computer devices. Diversification is based on user interaction with the set-top box, which can be detected in the CAM, smart card, or both.

[0030] The basic concept of state-based key exchange is in figure 1 shown in , and based on the symmetric encryption of the control word CW. The smart card 1 receives one or more control words CW in a manner known per se, for example by transmission to the smart card's ECM. The smart card 1 encrypts the control word in the encryptor 11 using the encryption key ek and the encrypted control word E(CW) is transmitted to the CAM 2 . The CAM 2 decrypts the encrypted...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Various embodiments of the invention provide a method, a smartcard, a conditional access module (CAM) of a receiver and a receiver, such as e.g. a set-top box, for securely providing a control word from the smartcard to the CAM. In various embodiments, diversification data from the smartcard and the CAM is used to make the encryption key and decryption key to encrypt and decrypt the control word in the smartcard and CAM, respectively, dependent on a user interaction with the receiver, such as e.g. selecting a service in the set-top box.

Description

technical field [0001] The present invention relates to a method for securely providing a control word from a smart card to a conditional access module, a method for securely obtaining a control word in a conditional access module of a smart card, a smart card for securely providing a control word to a conditional access module, securely obtaining a control word from a smart card A conditional access module for a receiver of a control word, and a receiver for descrambling scrambled data. Background technique [0002] It is well known that conditional access systems are widely used in conjunction with currently available pay television systems. Currently, such systems are based on the delivery of services scrambled with a control word (also called a traffic encryption key) received by a user with a conditional access module (CAM) and a smart card for each subscription package . Typically these services are delivered by head-end systems in the broadcast stream. Implementati...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04N7/16H04N7/167H04N5/00
CPCH04L9/0822H04N21/4104H04N7/165H04N21/4623H04N21/4367H04L2209/16H04N21/4181H04N21/4112
Inventor E·韦斯特维尔特A·A·瓦伊斯
Owner IRDETO ACCESS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products