Unlock instant, AI-driven research and patent intelligence for your innovation.

Transmission method of secrete data

A technology of confidential data and random numbers, applied in the field of transmission of confidential data

Inactive Publication Date: 2003-03-05
SCM MICROSYSTEMS GMBH
View PDF2 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method is only applicable when working in pairs of communicating devices

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Transmission method of secrete data
  • Transmission method of secrete data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0015] according to figure 1 , the first communication device D1 is a smart card (SC), and the second communication device D2 is a conditional access module (CAM) in a pay digital television environment (for example, digital video broadcasting DVB), although the present invention is not limited to such operation applications in the environment. Devices D1 and D2 will exchange confidential data such as Entitlement Management Messages (EMMs), Entitlement Control Messages (ECMs) and Control Words (CWs). In order to prevent confidential data from being eavesdropped, a secure communication channel is established between devices D1 and D2.

[0016] The first device D1 possesses a secret private key PrK and a corresponding public key PuK. Device D1 also has a random number generator G1.

[0017] The second device D2 knows the public key PuK, which it received unmistakably from the device D1. Device D2 also has a random number generator G2.

[0018] Initially, devices D1, D2 do n...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

For transmitting confidential data, two devices (D1, D2) are linked through a transmission channel which is secured by symmetric encryption with a shared secret session key. Both devices (D1, D2) possess the same secret session key (K) which is developed from two random keys (K1, K2) each of which is generated in a different one of the devices. Both random keys are exchanged between the devices (D1, D2) using asymmetric encryption.

Description

technical field [0001] The present invention relates to a method of transmitting confidential data between two communication devices, and more particularly to a method of secure communication between a chip circuit card and a conditional access module (CAM) in a pay television environment. technical background [0002] EP 0720326 A2 discloses a method for establishing a secure communication channel between two similar stations. The communication process uses symmetric encryption / decryption, thereby avoiding the problems previously encountered in systems connected with distributed master keys and modifier elements, such as timestamps, counters, etc. In this symmetric process, the secret encryption key is known to both communicating devices. This method is only applicable when working in pairs of communicating devices. [0003] Another method is disclosed in WO 97 / 38530, in which secure communication between two devices, for example a CAM and a chip circuit card, takes place...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08H04L9/30
CPCH04L9/0838H04L9/08H04L9/30H04L63/061H04L9/0825H04L63/0442H04L2463/061H04L2463/062H04N21/4181
Inventor 延·洛塞尔
Owner SCM MICROSYSTEMS GMBH