Supercharge Your Innovation With Domain-Expert AI Agents!

Deciphering method for ciphering service, conditional access system and smartcard

An encryption service and conditional access technology, applied in analog security/charging systems, transmission systems, digital transmission systems, etc., can solve problems such as large user cards, and achieve the effect of strengthening protection

Inactive Publication Date: 2003-10-22
THOMSON MULTIMEDIA SA
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0016] Since the number of user cards is usually very large, this solution also has disadvantages, especially in terms of fees

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Deciphering method for ciphering service, conditional access system and smartcard
  • Deciphering method for ciphering service, conditional access system and smartcard
  • Deciphering method for ciphering service, conditional access system and smartcard

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] Figure 1a represents a first EMM format according to the prior art.

[0032] Figure 1a The EMM represented in has a body C1a containing the three main items described earlier and a heading 4 whose content (H1) gives, among other things, the type and size of the items contained in body C1a.

[0033] Subject C1a includes item 1 containing user card address (AD), item 2 containing user qualification description and a trailing prompt HASH K Item 3. Tail tip HASH K depends on the password K and enables it to perform the aforementioned analysis of EMMs.

[0034] Figure 1b Represents a second EMM format according to the prior art.

[0035] The EMM includes a header 4 and a body C1b.

[0036] The subject C1b includes the address AD containing the user card and the description of the user qualification encrypted with the algorithm with the password K and related to the address AD (E(user qualification) K,AD ). According to this EMM format, verification and validation o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a conditional access system allowing a service provider to supply services only to those users who have acquired entitlements to these services. The services supplied by a service provider consist of an item scrambled by control words. In order to keep the control words secret, they are supplied after having been encrypted with an algorithm with key K. The entitlements of each user are forwarded in messages commonly denoted EMM (the abbreviation EMM standing for "Entitlement Management Messages"). According to the invention, the key K of the control words encryption algorithm is contained in the EMMs.

Description

technical field [0001] The present invention relates to conditional access systems. Background technique [0002] Conditional access systems allow service providers to provide services only to subscribers who have qualified for such services. Pay TV systems are one example. [0003] Those skilled in the art know that the service provided by the service provider includes an item that has been confidentially processed by the control word, and this confidential item can only be decrypted and read by the user under the premise that the user is authorized. The confidential items are denoted as IE (ECG) in the following, where ECG represents items that have not been processed for confidentiality (ECG is an abbreviation of "Electronically Coded Good"). [0004] In order to decrypt the item, the service provider provides each user with a control word to decrypt the item. In order to keep the control words secret, they are provided after having been encrypted with an algorithm with...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G07F7/10H04L9/32H04N7/16H04N7/167
CPCH04N7/163H04L9/0822G06Q20/4097H04L2209/601G06Q20/341H04N7/1675G07F7/1008H04N21/26606H04N21/4181H04N21/4623
Inventor 阿诺尔多·坎皮诺斯让-伯纳德·费希尔
Owner THOMSON MULTIMEDIA SA
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More