EP2462530A1 - Portable data carrier having a decoder - Google Patents
Portable data carrier having a decoderInfo
- Publication number
- EP2462530A1 EP2462530A1 EP10739361A EP10739361A EP2462530A1 EP 2462530 A1 EP2462530 A1 EP 2462530A1 EP 10739361 A EP10739361 A EP 10739361A EP 10739361 A EP10739361 A EP 10739361A EP 2462530 A1 EP2462530 A1 EP 2462530A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- data
- data carrier
- encrypted
- carrier
- data stream
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
- 238000012545 processing Methods 0.000 claims abstract description 49
- 238000004891 communication Methods 0.000 claims abstract description 24
- 238000013475 authorization Methods 0.000 claims description 23
- 238000000034 method Methods 0.000 claims description 22
- 238000004590 computer program Methods 0.000 claims description 4
- 238000013500 data storage Methods 0.000 claims description 2
- 238000012552 review Methods 0.000 claims 1
- 238000007726 management method Methods 0.000 description 4
- 230000000903 blocking effect Effects 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 230000033458 reproduction Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/16—Analogue secrecy systems; Analogue subscription systems
- H04N7/162—Authorising the user terminal, e.g. by paying; Registering the use of a subscription channel, e.g. billing
- H04N7/163—Authorising the user terminal, e.g. by paying; Registering the use of a subscription channel, e.g. billing by receiver means only
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
- G06F21/79—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/41—Structure of client; Structure of client peripherals
- H04N21/418—External card to be used in combination with the client device, e.g. for conditional access
- H04N21/4181—External card to be used in combination with the client device, e.g. for conditional access for conditional access
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/43—Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
- H04N21/433—Content storage operation, e.g. storage operation in response to a pause request, caching operations
- H04N21/4334—Recording operations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/43—Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
- H04N21/44—Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs
- H04N21/4405—Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs involving video stream decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/43—Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
- H04N21/44—Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs
- H04N21/4408—Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs involving video stream encryption, e.g. re-encrypting a decrypted video stream for redistribution in a home network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N5/00—Details of television systems
- H04N5/76—Television signal recording
- H04N5/91—Television signal processing therefor
- H04N5/913—Television signal processing therefor for scrambling ; for copy protection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N5/00—Details of television systems
- H04N5/76—Television signal recording
- H04N5/91—Television signal processing therefor
- H04N5/913—Television signal processing therefor for scrambling ; for copy protection
- H04N2005/91357—Television signal processing therefor for scrambling ; for copy protection by modifying the video signal
- H04N2005/91364—Television signal processing therefor for scrambling ; for copy protection by modifying the video signal the video signal being scrambled
Definitions
- the invention relates to a portable data carrier, in particular a chip card, for example an SD card, miniSD or microSD, with a communication interface via which the data carrier an encrypted received data stream can be fed, which is decodable by a decoder of the data carrier.
- the invention further relates to a method for processing data in a portable data carrier of the type described above.
- the invention relates to a computer program product.
- adapter devices are in particular used as an accessory for television receivers. They extend the functions of the television receiver for access to the encrypted audiovisual programs for payment (pay-TV).
- the decryption of the programs and the access authorization typically take place in a so-called conditional access module (CAM module), whereby the encryption type and the access authorization differ for the individual providers.
- CAM module conditional access module
- a portable data carrier is used to store access authorization data. The data carrier provides access authorization data to the adapter device or CAM module as well as necessary keys and applications for decoding the data stream, wherein the data carrier is in a communication connection to the adapter device or CAM module.
- DE 10044386 A1 discloses such a pay-TV system in which encrypted pay-TV data are received and stored within a decoder.
- the decryption of the data takes place within the A decoder using a portable data carrier, a so-called pay TV card, on which access authorization data is provided.
- a card-shaped data carrier (smart card) according to the standard ISO 7816 for pay-TV is known.
- the data carrier has a plurality of code / decoder modules coupled to a high speed data channel (e.g., according to the Universal Serial Bus (USB) specification).
- the encoder / decoder modules in conjunction with the high speed data channel allow for decoding the pay TV signals within the volume.
- DE 69833 022 T2 discloses the use of a portable data carrier for downloading an executable application into a reader called a decoder.
- the application is stored here on the portable data carrier.
- a portion of the application stored on the medium may be encrypted and / or signed, the decoder having access to equivalent public code for decrypting and / or authenticating the original of the application.
- the decoder refuses to download the code.
- the data carrier described in DE 69833 022 T2 is different from a chip card provided for pay-TV use.
- the patent application DE 10 2009 019 051.1 by the applicant of the present patent application describes a storage medium with an encryption device and two output channels. All data entering the storage medium is encrypted and stored encrypted in the storage medium without being able to influence the user.
- the re-output of the encrypted stored data can optionally be encrypted, that is unchanged, (first output channel) or decrypted (second output channel).
- the decryption of the encrypted data stream on a portable data carrier facilitates the handling for the user in a pay-TV system. Since the reader (processing unit) is fed by the data carrier with a decrypted data stream, the reader may be of a generic type while the portable data carrier is designed according to the encryption used. However, the known pay-TV systems can only be applied to broadcast content. In order to be able to store a specific, radiated content, it must first be decrypted and then stored unencrypted. This means that the content can be duplicated or copied in any way.
- the invention provides a portable data carrier, in particular a chip card, for example an SD card, miniSD or microSD, with a communication interface, via which an encrypted received data stream can be fed to the data carrier, which is detected by a decoder of the data carrier. gers is decodable.
- the data carrier is characterized in that it comprises a data memory for storing the data of the encrypted data stream, wherein from the data carrier the encrypted data of the data stream can be supplied to the decoder for decoding by means of decryption information stored on the data carrier, which via the communication interface of a can be supplied by the data carrier by means of the decryption information as a legitimately checked processing unit.
- the invention further provides a system with a, in particular encrypted, data stream for receiving and transmitting an unencrypted data stream, wherein the data stream, if the processing unit is authorized to decode by a decoder.
- the system is characterized in that the decoder is designed together with a unit for checking the authorization on a data carrier (10) according to one of the preceding claims
- the portable data carrier makes it possible to provide an integrated recorder and decoder, for example a pay-TV recorder and decoder.
- the encrypted data stream such as a pay-TV signal
- the term data stream is to be understood broadly and includes not only continuously received data but also sporadically received data.
- the decoding takes place within the portable data carrier, so that the unprocessed data stream can be made available to the processing unit. Due to the caching of the encrypted data stream, there is no need to attach an encryption in time to the reception of the encrypted data stream. In the context of the available storage space of the data memory, the decryption of the data stream can also take place with a time delay. In particular, this results in by the possibility for a user to bring information repeatedly, ie repeatedly, to the output. This can be done in accordance with an implemented in the portable data carrier digital rights management (DRM).
- DRM portable data carrier digital rights management
- the encryption information necessary for processing the encrypted data stream does not have to be transferred from the portable data carrier to a processing unit at any time, it can not be abused or copied. Due to the fact that a portable data carrier is removable from the processing unit, the content of a data stream recorded thereon can be reproduced on a plurality of different processing units. Caching the encrypted stream allows the user greater flexibility in outputting the corresponding view. So a repeated output or a time-shifted output is possible.
- the data carrier comprises a security element in which the decryption information is stored, wherein the information stored in the security element can not be read out.
- the data stream is decrypted only during playback.
- the security element registers how many times the data stream has been reproduced and, moreover, prevents the data stream from being reproduced after a predefined number of reproductions, for example by blocking the decryption by the security element.
- the data carrier is in particular a secure SD card (including a mini SD card or a micro SD card) or a secure flash card with a security element.
- the data carrier comprises an encryption device and two output channels, wherein the encryption device is intended to encrypt data that is undelayed into the data carrier and to store it in the data memory, and wherein a first of the two output channels for output of unencrypted data and a second of the two output channels is provided for the output of encrypted data.
- the data stream comprises audio and / or video data and / or further optional data.
- the data carrier according to the invention is intended in particular for use in a processing unit which comprises CAS-specific (Conditional Access System) hardware and software components.
- CAS-specific Consumer Access System
- an encrypted received data stream is supplied to the data carrier via a communication interface and the data stream is decoded with a decoder of the data carrier.
- the method is characterized in that the data of the encrypted data stream are stored in a data memory of the data carrier, the encrypted data of the data stream are read from the data memory and supplied to the decoder for decoding by means of decryption information stored on the data carrier, and the decoded data of the data stream be provided for processing via the communication interface of a processing unit verified by the data carrier by means of the decryption information.
- all data of the data stream entering the data carrier are encrypted without the possibility of action of a user and stored in the data memory. This procedure is important if the data stream stored in the portable data carrier is not encrypted by default.
- the re-output of the encrypted stored data is optionally encrypted via a first of the two output channels or decrypted via a second of the two output channels.
- a further embodiment provides that for the decryption of the encrypted data stream necessary applications and / or protocols and / or access authorization data during the personalization of the data carrier, in particular the security element, are brought into the disk.
- the decryption of the encrypted data stream necessary applications and / or protocols and / or access authorization data after the output of the data carrier to a user in the data carrier, in particular the security element, are introduced.
- a further embodiment of the method according to the invention provides that upon a positive check of the authorization of the processing unit with respect to the re-output of the decoded data for decoding necessary decryption information to a decryption device of the decoder are transmitted, with which the data of the encrypted data stream are decoded.
- the invention further comprises a computer program product which can be loaded directly into the memory of a portable data carrier and comprises software code sections with which the steps of the method according to the invention are carried out when the product is run on a portable data carrier.
- FIG. 1 is a schematic representation of a portable data carrier according to the invention
- FIG. 2 is a first flowchart illustrating the storage of encrypted contents in the data carrier
- FIG. 3 is a second flowchart illustrating the reading out of contents stored in the data carrier, provided that a processing unit is authorized to output the contents, and
- Fig. 4 is a third flowchart illustrating the attempted reading of contents stored in the medium, as long as a processing unit for outputting the content is unauthorized.
- the data carrier 10 is embodied, for example, in the form of an SD card (including the variants mini SD or micro SD card) or a flash card. Data can be exchanged with a processing unit (so-called host), not shown in Fig. 1, via a communication interface 11 ("physical interface") .
- the communication interface 11 can be in the form of a contactless or contact-type configuration
- Data carrier 10 data output to the processing unit is performed by an input / output unit 15 ("IO controller").
- the input / output unit 15 is coupled to a data memory 14 in which encrypted data of a data stream, for example audio-visual data of an encrypted television broadcast, are stored Storing in the data memory 14 by a decision / decision 12 are encrypted.
- the input / output unit 15 is also connected to the encryption / decryption processor 12 ("encryption / decryption processor") and to a security element element 13 ("smart card").
- the encryption / decryption device 12 and the security element 13 are in turn interconnected in such a way that a data exchange between these two units is possible. Together, these two elements represent a decoder.
- the security element 13 necessary applications and / or protocols are stored for decrypting data stored in the data memory 14. Furthermore, access authorization data is maintained in the security element 13, with which a rights management with respect to the output of the encrypted data in the data memory 14 to the processing unit is made possible.
- the decryption information present in the security element 13 i.e., the applications and / or protocols necessary to decrypt the encrypted data stream and / or the access authorization data
- the information may also be available after the volume has been output to the user, into the volume, i. in the security element 13, are introduced.
- the access credentials are used to verify that a user has the authority to output the encrypted data stored on the portable data carrier 10 via the processing unit.
- necessary data eg cryptographic data with content-specific session keys
- the authorization is checked. If the check is positive, it will be necessary to decrypt it. transmit information to the VerveNtscCHadorelungs uncomfortable 12.
- the Kornnitinikationsterrorismstelle 12 retrieves the data stored in the data memory 14, has them decrypted by the encryption / decryption device 12 and outputs them via the communication interface 11 to the processing unit.
- the data carrier 10 is therefore characterized in that both encrypted data, in particular a data stream with e.g. audiovisual data, and the information necessary for the decryption are stored together in the data carrier 10.
- the necessary for decryption applications and / or protocols are deposited in such a security element 13 that they can not be read by unauthorized persons and abused. Due to the common storage of encrypted data and the information necessary for decryption, at least the decryption is performed by the data carrier itself.
- the decrypted data is then output to a processing unit authorized by the data carrier by means of stored access authorization data. A data processing unit that has not been verified as authorized will not be provided with the data.
- the combination of encrypted data and the information necessary for decryption in one and the same physical data carrier results in a simplified use for the end user.
- This can, for example, services, such as television broadcasts, buy online or at points of sale with the portable data carrier and spend the encrypted content stored on different processing units, such as a large TV or a mobile device.
- the decryption is carried out by the data carrier itself, the information stored on the data carrier can be encrypted Data can be output by simple output devices or computers without CAS-specific hardware and software.
- the information necessary for the decryption does not leave the data carrier at any time during the execution of the method according to the invention. In this way, misuse of this information is excluded.
- the portable data carrier according to the invention makes it possible to organize the contents using digital rights management (DRM).
- DRM digital rights management
- FIGS. 2 to 4 show, in respective flowcharts, the working principle of the data carrier according to the invention.
- the components involved in the communication are shown.
- Denoted by 20 is a processing unit ("host"), furthermore shown are the communication interface 11 ("Physical Interface”), the input / output unit 15 ("IO Controller”), the security element 13 ("Smart Card”), the Ver - / decryption device 12 (“Enc / Dec processor”) and the data storage 14 (“mass storage”).
- FIG. 2 shows the method sequence when storing encrypted data, for example a data stream.
- Step S1 Store encrypted content
- the encrypted data are hereby transmitted from the processing unit 20 to the communication interface 11.
- the input / output unit 15 takes the encrypted data. seldom receives data from the communication interface 1 and stores them in the data memory 14.
- step S2 (“store-decoding material"), necessary applications and / or protocols and / or access authorization data are stored in the security element 13 for decrypting the encrypted data the communication interface 11 is transmitted and stored under control of the input / output unit 15 in the security element 13.
- step S1 the processing unit 20 sends a request for access to data stored in the data carrier 10 to the input / output unit 15 via the communication interface 11.
- step S2 gather content information
- step S3 the access request is transmitted to the security element 13.
- step S4 the security element 13 processes the request In step S5 (“provision decryption material”), due to the positive check for decrypting the encrypted data, necessary applications and / or protocols and / or access authorization data to the encryption / decryption device 12.
- step S6 provision decryption material
- the security element 13 transmits, under the control of the input / output unit 15 via the communication interface 11, an access-permitting message to the processing unit 20.
- step S7 (“Request piece of content”)
- the processing unit 20 transmits a request to the user via the communication interface 11.
- / Output unit 15, with the data from the data memory 14 are requested.
- the input / output unit 15 then reads in a step S8 ("Read encrypted content") the requested data from the data memory 14, which are transmitted to the input / output unit 15 in step S9.
- step S10 (“Have content decrypted ")
- the input / output unit 15 transmits the data read from the data memory 14 to the encryption / decryption device 12.
- the encryption / decryption device 12 decrypts the encrypted data in step Sil (“ Decrypt ”) and outputs the unencrypted data in step S12 to the input / output unit 15.
- step S13 (“Return piain content”)
- the decrypted data is transferred from the input / output unit 15 to the processing unit 20 through the correspondence interface 11.
- step S1 (“request access”)
- the processing unit 20 transmits a data access request to the data carrier 10.
- the communication interface 11 transmits this to the input / output unit 15.
- step S2 ("gather content information") information concerning the requested data from the data memory 14 is determined by the input / output unit 15.
- step S3 (“request access”)
- a request for data access is made to the security element 13.
- step S4 (“process request”) the request, which determines based on the access authorization data stored in it that the processing unit 20 is not entitled to the requested data.
- step S5 (“Deny access”) becomes Therefore, an access denial is transmitted to the processing unit 20.
Landscapes
- Engineering & Computer Science (AREA)
- Multimedia (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
Abstract
Description
Claims
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE200910036214 DE102009036214A1 (en) | 2009-08-05 | 2009-08-05 | Portable data carrier with a decoder |
PCT/EP2010/061182 WO2011015544A1 (en) | 2009-08-05 | 2010-08-02 | Portable data carrier having a decoder |
Publications (1)
Publication Number | Publication Date |
---|---|
EP2462530A1 true EP2462530A1 (en) | 2012-06-13 |
Family
ID=42813481
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP10739361A Ceased EP2462530A1 (en) | 2009-08-05 | 2010-08-02 | Portable data carrier having a decoder |
Country Status (3)
Country | Link |
---|---|
EP (1) | EP2462530A1 (en) |
DE (1) | DE102009036214A1 (en) |
WO (1) | WO2011015544A1 (en) |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0914001A1 (en) | 1997-10-28 | 1999-05-06 | CANAL+ Société Anonyme | Downloading of applications in a digital decoder |
EP1056015A4 (en) * | 1998-01-21 | 2005-01-05 | Tokyo Electron Ltd | Storage device, encrypting/decrypting device, and method for accessing nonvolatile memory |
DE10044386A1 (en) | 2000-09-08 | 2002-04-04 | Scm Microsystems Gmbh | Adapter device for DVB |
TW571245B (en) | 2000-09-15 | 2004-01-11 | Nagracard Sa | Multi-ports card |
AU2002224119A1 (en) * | 2000-11-28 | 2002-06-11 | Fujitsu Limited | Data terminal for managing ciphered content data and license acquired by software |
KR101238848B1 (en) * | 2004-12-21 | 2013-03-04 | 샌디스크 코포레이션 | Versatile Content Control With Partitioning |
DE102009019051B4 (en) | 2009-04-28 | 2011-07-07 | Giesecke & Devrient GmbH, 81677 | Storage medium with encryption device |
-
2009
- 2009-08-05 DE DE200910036214 patent/DE102009036214A1/en not_active Withdrawn
-
2010
- 2010-08-02 EP EP10739361A patent/EP2462530A1/en not_active Ceased
- 2010-08-02 WO PCT/EP2010/061182 patent/WO2011015544A1/en active Application Filing
Non-Patent Citations (2)
Title |
---|
None * |
See also references of WO2011015544A1 * |
Also Published As
Publication number | Publication date |
---|---|
DE102009036214A1 (en) | 2011-02-10 |
WO2011015544A1 (en) | 2011-02-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
DE69932326T2 (en) | IMPROVED PROCESS FOR CONDITIONAL ACCESS AND CONTENT | |
DE69719803T3 (en) | PREVENT PLAY ATTACKS FROM DIGITAL INFORMATION DISTRIBUTED BY NETWORK SERVICE PROVIDERS | |
DE60014060T2 (en) | GLOBAL COPIER PROTECTION FOR DIGITAL HOME NETWORKS | |
DE69702310T3 (en) | METHOD FOR THE SECURED TRANSMISSION BETWEEN TWO DEVICES AND THEIR APPLICATION | |
DE69833022T2 (en) | LOADING APPLICATIONS INTO A DIGITAL DECODER | |
DE69738002T2 (en) | Authentication device according to the challenge-response principle | |
DE60213650T2 (en) | ACCESS TO ENCRYPTED ROUND END | |
DE60309647T2 (en) | System and method for the secure handling of control information | |
EP1151561B1 (en) | Method and device for generating a data stream and method and device for playing back a data stream | |
DE69723650T2 (en) | Method of authentication of data using encryption and system of authentication using such a method | |
WO2000049763A1 (en) | Method and device for generating an encoded user data stream and method and device for decoding such a data stream | |
EP1016282B1 (en) | Transcoder for decoding encoded tv programs | |
DE19529487C2 (en) | Software delivery system | |
DE10212656A1 (en) | Selective encryption of multimedia data | |
DE60217576T2 (en) | Devices and methods for transmitting and implementing control instructions for accessing receiver functionalities | |
DE102005009621A1 (en) | Circuit, apparatus and method for receiving, conditional access and copy protection of digital video transmission signals | |
DE69837096T2 (en) | An information signal processing method | |
ES2600796T3 (en) | Access control procedure for randomized digital content | |
EP1677537A1 (en) | Method and device for receiving content data with conditional access and Remote Server | |
EP2407843B1 (en) | Secure data transfer in an automation network | |
DE69821183T2 (en) | Access control procedure for house network and arrangement for its implementation | |
DE602004008093T2 (en) | PORTABLE SAFETY MODULE PAIRING | |
RU2542934C2 (en) | Transmission method, reception method and identification method, security processor and data medium for said methods | |
EP1980080A1 (en) | Method and device for specifying a common key between a first communication device and a second communication device | |
EP2462530A1 (en) | Portable data carrier having a decoder |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 20120305 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO SE SI SK SM TR |
|
DAX | Request for extension of the european patent (deleted) | ||
17Q | First examination report despatched |
Effective date: 20151123 |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R003 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION HAS BEEN REFUSED |
|
18R | Application refused |
Effective date: 20170227 |