EP1803297A1 - Procede et installation de controle d'habilitation du logiciel interne d'un terminal recepteur - Google Patents

Procede et installation de controle d'habilitation du logiciel interne d'un terminal recepteur

Info

Publication number
EP1803297A1
EP1803297A1 EP05809248A EP05809248A EP1803297A1 EP 1803297 A1 EP1803297 A1 EP 1803297A1 EP 05809248 A EP05809248 A EP 05809248A EP 05809248 A EP05809248 A EP 05809248A EP 1803297 A1 EP1803297 A1 EP 1803297A1
Authority
EP
European Patent Office
Prior art keywords
terminal
server
software applications
download
control server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP05809248A
Other languages
German (de)
English (en)
French (fr)
Inventor
Fabien Lloansi
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Viaccess SAS
Original Assignee
Viaccess SAS
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Viaccess SAS filed Critical Viaccess SAS
Publication of EP1803297A1 publication Critical patent/EP1803297A1/fr
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/16Analogue secrecy systems; Analogue subscription systems
    • H04N7/173Analogue secrecy systems; Analogue subscription systems with two-way working, e.g. subscriber sending a programme selection signal
    • H04N7/17309Transmission or handling of upstream communications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/60Network structure or processes for video distribution between server and client or between remote clients; Control signalling between clients, server and network components; Transmission of management data between server and client, e.g. sending from server to client commands for recording incoming content stream; Communication details between server and client 
    • H04N21/63Control signaling related to video distribution between client, server and network components; Network processes for video distribution between server and clients or between remote clients, e.g. transmitting basic layer and enhancement layers over different transmission paths, setting up a peer-to-peer communication via Internet between remote STB's; Communication protocols; Addressing
    • H04N21/633Control signals issued by server directed to the network components or client
    • H04N21/6332Control signals issued by server directed to the network components or client directed to client
    • H04N21/6334Control signals issued by server directed to the network components or client directed to client for authorisation, e.g. by transmitting a key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/60Network structure or processes for video distribution between server and client or between remote clients; Control signalling between clients, server and network components; Transmission of management data between server and client, e.g. sending from server to client commands for recording incoming content stream; Communication details between server and client 
    • H04N21/63Control signaling related to video distribution between client, server and network components; Network processes for video distribution between server and clients or between remote clients, e.g. transmitting basic layer and enhancement layers over different transmission paths, setting up a peer-to-peer communication via Internet between remote STB's; Communication protocols; Addressing
    • H04N21/637Control signals issued by the client directed to the server or network components
    • H04N21/6377Control signals issued by the client directed to the server or network components directed to server
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/80Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
    • H04N21/81Monomedia components thereof
    • H04N21/8166Monomedia components thereof involving executable data, e.g. software
    • H04N21/818OS software
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/80Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
    • H04N21/81Monomedia components thereof
    • H04N21/8166Monomedia components thereof involving executable data, e.g. software
    • H04N21/8193Monomedia components thereof involving executable data, e.g. software dedicated tools, e.g. video decoder software or IPMP tool
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/16Analogue secrecy systems; Analogue subscription systems
    • H04N7/173Analogue secrecy systems; Analogue subscription systems with two-way working, e.g. subscriber sending a programme selection signal
    • H04N7/17345Control of the passage of the selected programme

Definitions

  • the invention relates to the enabling control of the internal software of controlled access multimedia stream receiving terminals, in particular of pay television descrambler terminals / decoders.
  • a security processor such as a smart card integrated in the receiver or connected thereto.
  • This security processor controls access to the data processed by the receiver, typically by allowing or prohibiting the descrambling or decoding of this data according to the compliance of the receiver with access criteria attached to this data.
  • the security processor also makes it possible to verify the authorization of the receiving terminal to process the data, often by implementing an authentication procedure. If the security processor has verified that the terminal was enabled, it allows the execution of specific software applications to descramble / decode the media stream that receives the terminal. On the other hand, if the terminal is not enabled, the security processor inhibits the execution of the aforementioned software applications.
  • some terminals can decode the multimedia data (for example, decoding MPEG or other audiovisual data compression), provided that internal functions of decoding. Activation or inhibition of these decoding functions are conditioned in particular by checking the validity or invalidity, respectively, of the access rights associated with the terminal. Moreover, multimedia data such as audiovisual data may be deliberately entangled, prior to broadcast. The data descrambling functions at the terminal can then be activated or inhibited according to the verification of the validity or invalidity of the access rights associated with the terminal.
  • the terms "descrambling” and / or "decoding” denote functions whose execution or inhibition are conditioned by the validity or invalidity of the access rights.
  • the present invention intends to take advantage of these means of communication to remote servers, which are already equipped most receiver terminals, to substantially solve the problems encountered in the prior art and indicated above.
  • the terminal firstly proposes a method for controlling the authorization of at least one receiving terminal of a multimedia stream, in which the terminal is arranged: on the one hand, to communicate with at least one remote server by a bidirectional link, and - on the other hand, to receive a multimedia stream and descramble / decode this stream by the execution of specific software applications.
  • the aforementioned remote server is a download control server of the aforementioned software applications to the terminal.
  • the method according to the invention then comprises the following steps: a) storing device authorization information is stored at the download control server and at the terminal, b) when the terminal is turned on, the terminal automatically establishes a connection to the download control server, c) the download control server retrieves at least a portion of the authorization information stored at the terminal and verifies a match with the authorization information stored with the server, and d) at least based on this check by the control server download, the latter authorizes or not a download to the terminal specific software applications for descrambling / decoding the multimedia stream.
  • the present invention then offers many advantages.
  • the download conditions are set by the operator responsible for the aforementioned server. These conditions may therefore change over time according to the wish of the operator.
  • the download conditions are defined in the receiving terminal, and can not evolve.
  • the step of downloading the applications can be used to obtain information on the terminals, such as statistics on their configuration and their use.
  • the operator can control downloads, including the number of downloads for the same terminal, make for example, audience measurement, evaluating the migration of security processors (for example in the form of smart cards) on a fleet of terminals, or others.
  • the server comprises a database storing authorization information of several terminals and terminal-specific software applications, in correspondence of at least respective terminal identifiers, for the management of the terminal. a fleet of receiving terminals available to users.
  • the server preferably transmits to the terminal a new version of the software applications most suitable for this terminal, if necessary.
  • the most suitable version may be the version that is available from the server and is the most recent, depending on the modernity of the terminal.
  • the software applications include at least one operating system (or "Operating System” in English) for the terminal computer resources.
  • the aforementioned software applications include an application for descrambling / decoding the multimedia stream.
  • the terminal stores, in step d), the software applications downloaded from the server to a volatile memory, each startup of the terminal, typically during a power up.
  • none of said applications is resident in the terminal.
  • all the descrambling / decoding software applications used by the terminals are checked, with a risk of fraud practically nil.
  • the terminal stores the software applications received from the download control server in a permanent memory, typically in a flash memory or E2Prom. It will thus be understood that, in this embodiment, the downloading of the software applications is not systematic but is preferably performed for an update of the applications.
  • the download control server can also check consistency with the terminal of the software application version which is stored in the permanent memory of the terminal.
  • the server can archive, typically in the database storing the authorization information of the terminals, the versions that should be installed at the different terminals.
  • a terminal connects to the download control server to signify to the server the version that he has in memory.
  • the download control server then archives a reference of the version stored in this terminal, preferably in an appropriate database. Then, during the following connections, the download control server reads the version actually installed and compares it with the version archived in its database.
  • the control server can further verify a consistency of the version of the software applications that is stored in the permanent memory of the terminal.
  • the download control server can transmit to the terminal a blocking order of the terminal or, if necessary, update the installed version.
  • the download control server advantageously transmits to the terminal this new version of the software applications.
  • the aforementioned entitlement information includes authentication data.
  • the download control server authenticates the terminal by a procedure implementing on the one hand a public key provided by the terminal and on the other hand a corresponding private key derived from the stored data. from the server.
  • the method provides mutual authentication of the download control server and the terminal, by a procedure implementing, via the bidirectional link, the public keys of the terminal and the server and the respective private keys, derived from the data stored at the terminal. server and terminal.
  • the terminal preferably comprises a security processor in which initially stores data d 1 authentication vis-à-vis terminal of the download control server.
  • a smart card can be provided as a security component installed at the terminal to improve the security of the download.
  • the physical structure is thus essentially preserved.
  • the method also provides a procedure for verifying the integrity of the software application data transmitted to the terminal, preferably with a verification of the authenticity of the issuer of the software application data.
  • the respective computer programs are initially stored in the terminal, on the one hand, and from the download control server, on the other hand, in permanent memory.
  • These programs essentially allow:
  • the following initial steps are preferably provided: al) the computer resource terminal is equipped to read a start-up routine, a2) a startup routine is provided that includes at least one connection instruction from the terminal to the server , a3) and this startup routine is stored in a permanent memory of the terminal.
  • the present invention relates to a computer program product, intended to be stored in a permanent memory of a receiving terminal, and thus comprising a start-up routine of the terminal, for the implementation of all or part of the process steps according to the invention.
  • the IT resource server is equipped to read a software application download routine to the terminal, a'2) a download routine including at least one terminal enabling verification instruction is provided; 3) and stores this download routine in a permanent memory of the server.
  • the present invention also aims a computer program product, now intended to be stored in a permanent memory of a software application download control server for descrambling / decoding a multimedia stream, and thus comprising a download software application control routine, for the implementation of all or part of the steps of the method according to the invention.
  • the present invention is advantageously applicable to the distribution of multimedia content, including pay television content, over a bidirectional broadband network (broadband network), allowing content to be delivered beyond the broadband network.
  • a bidirectional broadband network broadband network
  • simple broadcast of television signals on a mono-directional network or "broadcast network” in English terms).
  • the above-mentioned distribution of the multimedia contents can be carried out in "point-to-point” (or “peer-to-peer”) mode.
  • the present invention also aims at such an application of the method within the meaning of the invention.
  • the present invention also aims at an authorization control system for downloading software applications, in particular for descrambling / decoding a multimedia stream such as an audiovisual television stream, comprising at least:
  • a receiving terminal firstly connected to the download control server via a bidirectional link for downloading said software applications, and furthermore arranged to receive the multimedia stream and to descramble / decode this stream by running the software applications above.
  • the terminal of the system within the meaning of the invention comprises computer resources for: storing first terminal authorization information,
  • a startup computer program comprising at least one automatic connection instruction to the server when the terminal is powered up.
  • the download control server of the system within the meaning of the invention comprises computer resources for: storing second terminal authorization information, storing and reading a software program for downloading software applications comprising at least: a read instruction of the first and second enabling information, a consistency check test between the first and second enabling information, and a instruction for downloading software applications, conditioned at least by said test.
  • the first and second enabling information respectively comprise first and second authentication data.
  • the terminal startup program includes at least one instruction to train and communicate to the server authentication data terminal by a procedure implementing a public key derived raw data 1 authentication.
  • the server download program includes at least one instruction for verifying the authentication data of the terminal by a procedure implementing a private key derived from the second authentication data.
  • the aforementioned test may then comprise a consistency check instruction between the public key and the private key, in the manner of a conventional cryptographic authentication procedure.
  • RSA for "Rivest Shamir Adleman”
  • the startup programs of the terminal and server download advantageously comprise homologous authentication instructions, with exchange and verification of consistency of authentication data obtained by one .
  • the bidirectional link between the terminal and the download control server is preferably of type xDSL (for "Digital Subscriber Line"). It will be understood, however, that the present invention can be adapted to any other bidirectional network technology.
  • the present invention also relates to the receiver terminal of the system within the meaning of the invention.
  • FIG. 1 represents an exemplary architecture of the system within the meaning of the invention
  • FIG. 2a schematically represents the elements of a download control and authorization control server within the meaning of the invention
  • FIG. 2b diagrammatically represents the structure of a receiver terminal in the sense of the invention
  • FIG. 3 schematically represents the structure of a flash memory of the terminal, according to a particular embodiment of the invention.
  • FIG. 4 represents a preferred embodiment of the different steps carried out by a method within the meaning of the invention.
  • FIG. 1 We first refer to Figure 1 to describe the system within the meaning of the invention, in the architecture of a digital television network, in the example shown.
  • the system comprises a bidirectional network 3 for connecting a receiving terminal 4 to a server 2 for downloading control and enabling control of the terminal.
  • the terminal 4 and this server 2 are connected by a bidirectional link 81-82.
  • the present invention provides the control of the start-up of a digital television receiver terminal 4, as well as the secure and adapted downloading from the terminal 4 of a software application version, in particular for the descrambling / decoding.
  • the terminal connected to the network 3 makes a connection to the download control server 2.
  • the control server 2 retrieves information present on the terminal 4 and the security processor 6.
  • the control server 2 analyzes this information and allows or not the continuation of the startup process.
  • the criteria that make it possible to define whether a receiving terminal is authorized or not to continue the start-up sequence are advantageously modifiable with the control server 2 to allow maximum flexibility.
  • the server 2 can authorize or not the download of a version of the software applications to the receiving terminal.
  • the server 2 advantageously stores all the information in order to perform statistics on the receiving terminals present on the network 3.
  • the complete start-up of the terminal then makes it possible to access the television programs broadcast for example by another server with the reference 1 in Figure 1, which, he, ensures the distribution of multimedia content, with, for example, a broadcast of audiovisual television programs.
  • this multimedia distribution server 1 broadcasts the television programs (arrow I) 1 via the network 3 in the example shown.
  • This server 1 is managed by the operator who broadcasts the programs.
  • This multimedia distribution server 1 may or may not be distinct from the download control server 2 within the meaning of the invention.
  • control server 2 carries out the control of the receiver terminal 4 and, more particularly, the possible download of the software applications, in particular descrambling / decoding.
  • the equipment 2 is hereinafter called “download control server”. This server 2 is managed by the operator and / or the access control provider.
  • the system within the meaning of the invention may include several terminals 4, receiving the multimedia stream 7, for example containing the digital television data to be descrambled / decoded.
  • the system within the meaning of the invention may include several terminals 4, receiving the multimedia stream 7, for example containing the digital television data to be descrambled / decoded.
  • the download control server 2 comprises: one or more security processors 5 to ensure the security of the connection and the download to the terminal,
  • a database 21 for storing, in particular, authorization data of a plurality of receiving terminals 4, in correspondence of respective identifiers, in order to advantageously manage an entire pool of terminals available to users,
  • processing means such as a processor 22 for implementing computer program instructions which will be detailed below, and
  • Memory 23 (permanent, for example ROM type, and / or working, for example RAM type) for storing and executing program instructions.
  • download control server 2 comprises computer resources for:
  • control server 2 executes a program implementing an authentication algorithm, preferentially mutual, between the control server 2 and the terminal receiver 4, for example using a cryptographic algorithm implementing public keys and private keys,
  • a black list of the unique identifiers of the unauthorized security processors (corresponding, for example, to stolen or pirated smart cards), and
  • the download control server 2 can then perform the following actions:
  • CHECKSUM on an application is a integrity guarantee routine consisting for example in calculating the sum of the bytes that make up this application (so-called "control" sum), in particular to check the integrity of the application. a file or block of data corresponding to or used in this application.
  • the general architecture of a digital television receiver terminal 4 within the meaning of the invention comprises:
  • processing means such as a processor 14, connected by a bus 13 to memories 15 to 18 (directly addressable by the processor 14), a non-volatile, non-volatile read-only memory, which may be of type ROM, referenced 15 in Figure 2b and typically for storing a startup program of the terminal,
  • a volatile random-access memory for example of the RAM type, referenced 16 in FIG. 2b and intended in particular for the execution of the programs and the manipulation of the data, as working memory,
  • a permanent, non-volatile and re ⁇ programmable memory for example of the flash type 17 and / or of the E2PROM type 18, containing terminal configuration and / or security parameters.
  • the software applications downloaded from the control server 2 can be stored in RAM 16, in a first mode of realization, or in permanent memory 17 or 18, in a second embodiment, as will be seen later.
  • the download of the descrambling / decoding software applications is performed at each startup (or power on) of the terminal.
  • the terminal then executes these descrambling / decoding applications from a volatile memory 16.
  • FIG. 3 shows the structure of a flash memory 17, according to this second embodiment in which provision is made a download in permanent memory.
  • the flash memory 17 includes a non-rewritable portion 171 ("OTP" memory) for storing all or part of the instructions of the terminal startup program.
  • the second part 172 is a rewritable zone intended typically for storing software applications (APPL) downloaded from the server 2.
  • the software applications that can be downloaded include an operating system (or "OS” for “Operating System”) responsible for managing the use of terminal resources by these applications.
  • OS operating system
  • the last version of the operating system OS is preferably stored in the rewritable zone 172 of the flash memory 17.
  • startup program can be stored in ROM 15 and / or in permanent memory 17 or 18.
  • This boot program (or "boot” in English word) ensures:
  • drivers for controlling the only hardware components (processor, memory, interface with the security processor, or other) necessary for the connection, the authorization check and the download,
  • connection configuration (parameterized according to main parameters to connect to the download control server 2, as well as fallback parameters allowing a connection to other control servers in case of failure of the communication with the control server; server 2)
  • an asymmetric algorithm implementing a private key, here to verify the signature of the version of the downloaded software applications, and hence the integrity of the downloaded data, as well as the authenticity of the sender of said data, and
  • the terminal memory also stores a unique identifier of the terminal, called for example "STB-id” in the case where the receiving terminal is a descrambler / decoder terminal of an "STB" type audiovisual stream (for "Set Top Box”). "). It is however indicated that, alternatively, the receiving terminal may consist of a lounge computer or a laptop, to which respective unique identifiers are assigned.
  • the terminal 4 further comprises:
  • an interface 10 with the network 3 (for example an xDSL modem interface) making it possible in particular to exchange data with the servers 1 and 2,
  • a demultiplexer / descrambler 11 providing the data separation functions (audio, video, interaction data, private data, and others),
  • a security processor 6 such as a smart card to ensure the security of the connection to the server 2 and the security of downloading applications.
  • the security processor 6 is connected to the terminal 4 by an input / output module 19.
  • the user of the terminal can act on the functions of the terminal via a man / machine interface 20 connected to the aforementioned module 19.
  • the interface 20 may comprise for example a remote control and a data display on the television screen.
  • each security processor ⁇ comprises:
  • UA for "Unique Address"
  • a re-programmable non-volatile memory for storing information such as a confidential code, access rights to the programs, or others.
  • FIG. 4 shows, on the left-hand side, the steps taken by the terminal 4 and, on the right-hand side, the steps carried out by the download control server 2.
  • the startup program takes over, initializes the hardware components and executes a computer routine in the sense of the invention which preferably takes place as follows.
  • step 30 this program controls the xDSL modem of the terminal to send a connection request to the control server 2. It uses for this purpose the memorized connection parameters, mentioned above.
  • the control server 2 if it accepts it, establishes the connection with the terminal 4.
  • the control server 2 can advantageously store the time and the address of the terminal.
  • the program tests whether the connection succeeded (arrow "ok") or failed (arrow "ko"). In case of failure of the connection to the main server 2 or to the fallback servers as indicated above, the program proceeds to the error handling step 52, described below.
  • step 33 the program verifies the presence of the security processor 6, for example by resetting (or "resetting") it.
  • the program proceeds to the error-handling step 52. Otherwise (arrow ok), it proceeds to the next step 35, corresponding to the step 36 implemented by the server 2 and consisting of allowing the authentication of the terminal by the server or to verify their mutual authentication with the help of the security processor 6 of the terminal 4 and the security processor 5 of the control server 2. As indicated above, this authentication can be conducted by using public keys and respective private keys.
  • step 54 If this authentication step has failed (in test 37), the program proceeds to step 52. In addition, in case of failure of the peer authentication test 38 conducted with the control server 2, the server 2 stores the negative result of the authentication in step 49.
  • the terminal retrieves and transmits to the server 2, in step 39, the information relating to, and not exhaustively:
  • the unique identifier of the terminal for example of the STB-id type
  • security processor 6 program access rights, confidential access code, or other
  • terminal 4 and / or the security processor are initially allocated.
  • control server 2 retrieves, in step 40, the information transmitted to it by the terminal and stores it.
  • server can then carry out statistics on each terminal, including for example the total number of downloads since it was put into service, the average number of terminal starts per day, the number of security processors used by a terminal, or others.
  • step 41 the control server 2 verifies that the received information is consistent.
  • the control server 2 verifies that the received information is consistent.
  • the unique identifier of the terminal must not be blacklisted, the unique identifier of the security processor and the unique identifier of the terminal go together,
  • the access rights derived from the security processor are coherent, the other security information is coherent,
  • the version of the software applications stored in permanent memory in the terminal in the second aforementioned embodiment, must be consistent with the data in the base of the control server 2.
  • control server 2 proceeds to the error storing step 49, then to the disconnected state with the "DECONNECT KO" anomaly bearing the reference 50.
  • the server 2 performs the download in the terminal of the version best adapted to the terminal (steps 44 and 45); it will be understood that in this first mode, steps 42 and 43 are not executed because the download is to be done systematically, - in the second embodiment of the invention (applications stored in permanent memory), 5 002495
  • control server 2 checks whether to download a new version of the software applications, for example by comparing a received version number with a version number of the software applications available on the server 2.
  • the server 2 informs the terminal 4 that no download is to be made (step 43) and goes to the disconnection step without fault 60. For its part, the receiving terminal 4 also proceeds to the step 56 of disconnection without anomaly.
  • the server 2 informs the terminal (step 43) of the future download of the new version and, at the step 45, the terminal receives this new version.
  • step 44 in which the control server 2 sends the available and best adapted version of the software applications to the terminal, as well as the value of the CHECKSUM and a digital signature of the corresponding file.
  • step 45 the terminal receives in RAM 16 this new version and, in step 46, verifies the aforementioned digital signature using a private key provided for this purpose and the aforementioned asymmetric algorithm.
  • step 47 if the signature is not correct, the terminal proceeds to the error step 52. Otherwise, in step 48, the terminal checks the value of the CHECKSUM by calculating the CHECKSUM then by comparison with compared to the value sent.
  • test 53 if the value of the CHECKSUM is not correct, the terminal proceeds to step 52. Otherwise, the terminal saves the downloaded software applications in permanent memory 17, only in the second embodiment mentioned above, at the same time. step 54 (shown for this purpose in dashed lines in Figure 4).
  • step 55 the terminal 4 informs the control server 2 that the download operation has proceeded correctly and, in step 56, it receives the authorization to execute the software applications E. Then, the terminal 4 and the server 2 can proceed to respective steps 56 and 60 disconnection without abnormality.
  • the terminal can then implement the software applications allowing in particular the descrambling / decoding of the received multimedia stream.
  • the terminal preferentially executes the step 52 of warning the server 2 of an error and displaying an alarm message, for example on the screen of the television set of the subscriber, to prevent it.
  • the terminal then disconnects from the server (step 57) and then hangs (step 58).
  • the user must preferentially reset the terminal, in this case.
  • step 49 consisting of an error storage, followed by a step 50 of disconnection.

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
  • Storage Device Security (AREA)
  • Information Transfer Between Computers (AREA)
EP05809248A 2004-10-18 2005-10-10 Procede et installation de controle d'habilitation du logiciel interne d'un terminal recepteur Withdrawn EP1803297A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
FR0411012A FR2876859B1 (fr) 2004-10-18 2004-10-18 Procede et installation de controle d'habilitation du logiciel interne d'un terminal recepteur
PCT/FR2005/002495 WO2006042932A1 (fr) 2004-10-18 2005-10-10 Procede et installation de controle d'habilitation du logiciel interne d'un terminal recepteur

Publications (1)

Publication Number Publication Date
EP1803297A1 true EP1803297A1 (fr) 2007-07-04

Family

ID=34950904

Family Applications (1)

Application Number Title Priority Date Filing Date
EP05809248A Withdrawn EP1803297A1 (fr) 2004-10-18 2005-10-10 Procede et installation de controle d'habilitation du logiciel interne d'un terminal recepteur

Country Status (5)

Country Link
EP (1) EP1803297A1 (zh)
CN (1) CN101044758A (zh)
FR (1) FR2876859B1 (zh)
TW (1) TW200627956A (zh)
WO (1) WO2006042932A1 (zh)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10528705B2 (en) 2006-05-09 2020-01-07 Apple Inc. Determining validity of subscription to use digital content
WO2008127092A2 (en) * 2007-03-14 2008-10-23 Aht Europe Ltd Device and method for gaining conditional access to a data network
CN101795295A (zh) * 2010-03-11 2010-08-04 北京安天电子设备有限公司 一种基于点对点技术的局域网病毒库升级系统和方法
CN102347939B (zh) 2010-08-05 2015-09-09 华为终端有限公司 软件管理的方法、装置及系统
CN102647282B (zh) * 2011-02-18 2015-06-17 鸿富锦精密工业(深圳)有限公司 基于poe对网络装置进行管理的电子装置及方法
JP2012221240A (ja) * 2011-04-08 2012-11-12 Sony Corp 情報処理装置、認証方法及びプログラム
CN103024438B (zh) * 2012-12-31 2016-06-08 深圳市九洲电器有限公司 一种机顶盒及其生产测试方法、系统
CN105635094B (zh) * 2015-06-16 2019-04-12 宇龙计算机通信科技(深圳)有限公司 安全验证方法、安全验证装置和安全验证系统

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1457047B1 (en) * 2001-12-18 2008-08-27 Thomson Licensing Internally generated close captioning/tele-texting for set-up menus of network-capable signal processing apparatus
US7263610B2 (en) * 2002-07-30 2007-08-28 Imagictv, Inc. Secure multicast flow

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See references of WO2006042932A1 *

Also Published As

Publication number Publication date
FR2876859B1 (fr) 2007-01-05
WO2006042932A1 (fr) 2006-04-27
CN101044758A (zh) 2007-09-26
TW200627956A (en) 2006-08-01
FR2876859A1 (fr) 2006-04-21

Similar Documents

Publication Publication Date Title
EP1803297A1 (fr) Procede et installation de controle d'habilitation du logiciel interne d'un terminal recepteur
EP1815681B1 (fr) Unité de traitement de données audio/vidéo numériques et méthode de contrôle d'accès audites données
EP2177025B1 (fr) Procédé et dispositif de chiffrement partiel d'un contenu numérique
EP1687953A2 (fr) Méthode d'authentification d'applications
EP1890493A1 (fr) Méthode de révocation de modules de sécurité utilisés pour sécuriser des messages diffusés
FR3025377A1 (fr) Gestion de tickets electroniques
WO2007051823A2 (fr) Méthode de sécurisation de données échangées entre un dispositif de traitement multimédia et un module de sécurité
WO2003063445A1 (fr) Dispositif pour securiser la transmission, l'enregistrement et la visualisation de programmes audiovisuels
EP1994745B1 (fr) Procédé pour la distribution sécurisée de séquences audiovisuelles, décodeur et système pour la mise en uvre de ce procédé
EP1353511A2 (fr) Procédé de gestion de droits d'accès à des services de télévision
WO2004017635A1 (fr) Méthode de vérification de la validité d'une clé pour un réseau domestique numérique
FR2848764A1 (fr) Procede de controle d'acces en television numerique payante
FR2999851A1 (fr) Procede pour acceder a un service propose par un serveur distant.
FR2883683A1 (fr) Procede d'appariement entre un terminal et un processeur de securite, systeme et programme informatique pour la mise en oeuvre du procede
EP2372945A1 (fr) Procédé de transmission sécurisée de données entre un terminal numérique et une plateforme de services interactifs
WO1999012352A1 (fr) Procede et installation de telechargement d'une plateforme de decodeur d'usager
FR2896654A1 (fr) Procede d'identification d'un operateur autorise au sein d'un decodeur de television numerique
EP1584190A1 (fr) Procede et systeme pour garantir l'integrite d'au moins un logiciel transmis a un module de chiffrement/dechiffrement et supports d'enregistrement pour mettre en oeuvre le procede
WO2021229189A1 (fr) Procédé et système pour authentifier une application informatique, ou une fonction de l'application,exécutée par un récepteur multimédia
WO2003077555A2 (fr) Protocole de commande a distance d'une action locale de generation d'un message d'ordre
EP1590960A2 (fr) M thode de stockage et de transmission d'informations g n r es par un module de s curit
EP1547383A1 (fr) Method pour la transmission securisee de fichiers audiovisuels
FR2865592A1 (fr) Procede de diffusion securisee de programmes de television, systeme de diffusion, decodeur et support de donnees correspondants.
WO2008050055A2 (fr) Procede de gestion de droits d'acces a un contenu numerique dans un reseau de pairs
WO2005096628A1 (fr) Securisation d’un dispositif d’access a des bouquets de programmes de chaines encryptees

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20070410

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LI LT LU LV MC NL PL PT RO SE SI SK TR

DAX Request for extension of the european patent (deleted)
17Q First examination report despatched

Effective date: 20100809

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN

18D Application deemed to be withdrawn

Effective date: 20101221