Transmission method of secrete data
A technology of confidential data and random numbers, applied in the field of transmission of confidential data
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0015] according to figure 1 , the first communication device D1 is a smart card (SC), and the second communication device D2 is a conditional access module (CAM) in a pay digital television environment (for example, digital video broadcasting DVB), although the present invention is not limited to such operation applications in the environment. Devices D1 and D2 will exchange confidential data such as Entitlement Management Messages (EMMs), Entitlement Control Messages (ECMs) and Control Words (CWs). In order to prevent confidential data from being eavesdropped, a secure communication channel is established between devices D1 and D2.
[0016] The first device D1 possesses a secret private key PrK and a corresponding public key PuK. Device D1 also has a random number generator G1.
[0017] The second device D2 knows the public key PuK, which it received unmistakably from the device D1. Device D2 also has a random number generator G2.
[0018] Initially, devices D1, D2 do n...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 