WO2004032328A2 - Logiciel embarque et procede d'authentification de celui-ci. - Google Patents
Logiciel embarque et procede d'authentification de celui-ci. Download PDFInfo
- Publication number
- WO2004032328A2 WO2004032328A2 PCT/FR2003/050073 FR0350073W WO2004032328A2 WO 2004032328 A2 WO2004032328 A2 WO 2004032328A2 FR 0350073 W FR0350073 W FR 0350073W WO 2004032328 A2 WO2004032328 A2 WO 2004032328A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- software
- certificate
- downloaded
- authentication
- authenticating
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/43—Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
- H04N21/443—OS processes, e.g. booting an STB, implementing a Java virtual machine in an STB or power management in an STB
- H04N21/4435—Memory management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/60—Network structure or processes for video distribution between server and client or between remote clients; Control signalling between clients, server and network components; Transmission of management data between server and client, e.g. sending from server to client commands for recording incoming content stream; Communication details between server and client
- H04N21/63—Control signaling related to video distribution between client, server and network components; Network processes for video distribution between server and clients or between remote clients, e.g. transmitting basic layer and enhancement layers over different transmission paths, setting up a peer-to-peer communication via Internet between remote STB's; Communication protocols; Addressing
- H04N21/633—Control signals issued by server directed to the network components or client
- H04N21/6332—Control signals issued by server directed to the network components or client directed to client
- H04N21/6334—Control signals issued by server directed to the network components or client directed to client for authorisation, e.g. by transmitting a key
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/22—Microcontrol or microprogram arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/45—Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies, resolving scheduling conflicts
- H04N21/462—Content or additional data management, e.g. creating a master electronic program guide from data received from the Internet and a Head-end, controlling the complexity of a video stream by scaling the resolution or bit-rate based on the client capabilities
- H04N21/4627—Rights management associated to the content
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/80—Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
- H04N21/81—Monomedia components thereof
- H04N21/8166—Monomedia components thereof involving executable data, e.g. software
- H04N21/8173—End-user applications, e.g. Web browser, game
Definitions
- the invention relates to on-board software and a method for authenticating the latter, in particular in the field of digital television decoders.
- an integrity test of an on-board software is generally carried out by calculating, using an external tool, a reference signature of this software representative of it and by inserting this one in this software.
- the software calculates its own signature and compares this signature with the reference signature. If these signatures are different, the software runs software specific to a defense procedure otherwise it continues normally.
- a known solution consists in taking the principle of the integrity test and combining it with an asymmetric cryptographic algorithm: the reference signature is encrypted with a private key and the result is integrated, in the form of a certificate, into the software. During the control phase, the reference signature is decrypted with an integrated public key to the software before being compared to the reference signature.
- DVD Digital Video Broadcasting
- MHP Multimedia Home Platform
- the object of the invention is to enable the supplier to ensure that this authentication has indeed taken place and that his rights have therefore been respected by the customer.
- the present invention therefore proposes a method for authenticating software downloaded in a terminal, said method comprising a step of authentication by certificate of said software downloaded by means of software embedded in said terminal, characterized in that it comprises , in addition, a certificate authentication step, during the execution of said downloaded software, of said first embedded software by means of an authentication software module associated with said downloaded software.
- the first on-board software authenticates the downloaded software by means of an authentication library and a first certificate; the first on-board software and the authentication library form a first part of write-protected memory, the downloaded software and this first certificate form a second part of loadable memory.
- the first part also comprises a second certificate, the second part also comprises verification software, and, once the downloaded software has been authenticated, the verification software authenticates the first software by means of the authentication library and of the second. certificate.
- these two successive authentications take place on initialization.
- the second part can be downloaded.
- the invention also relates to on-board software comprising a first part of write-protected memory formed by first software and an authentication library, and a second part comprising application software and a first certificate, characterized in that the first part further comprises a second certificate, and in that the second part further comprises verification software.
- This software can be used for example in a digital television decoder, in a PC ("personal computer") type terminal, or in any other on-board device.
- Figure 1 illustrates a method of authentication of the known art.
- Figure 2 illustrates the authentication method of the invention.
- Figure 3 illustrates an example certificate.
- Figure 4 illustrates an example of a signature.
- a first software contained in a first part 10 of write-protected memory authenticates, for example in the initialization phase, a second software, which is the application software, located in a second part 11 which can be loaded using an authentication library located in the first part and a certificate 12 located in this second part 11.
- the term “certificate” having a very specific meaning (An electronic identity which is issued by a trusted third party for a person or a network entity, Each certificate being signed with the private signature key of a certification authority.) And too limiting in authentication techniques, the term “certificate” used in this description also intends to cover, more generally, the terms signature, CRC or other data necessary to verify the authenticity / integrity of software.
- the first part 10 further comprises a second certificate 13, as illustrated in FIG. 2.
- the second part 11 further comprises verification software. This verification software, once the application software has been authenticated, authenticates the first software by means of the authentication library and the second certificate.
- Such a process allows the supplier of the first software to ensure that the client who uses the application software respects his rights.
- the format of the certificate, illustrated in FIG. 3 is as follows:
- Signature (for example 128 bytes) which is the result of an RSA encryption, with a private key, of 1024 bits of the message illustrated in FIG. 4.
- the signature of 1024 bits begins with a byte at 0 to allow its RSA encryption , the rest 20 is filled randomly in a different way before each encryption.
- H_CODE_OFFSET At the offset H_CODE_OFFSET compared to the beginning of the message, there is a Hash code SHAl on 20 bytes. This H_C0DE is preceded by a CHECK_PATTERN reason whose role is to allow the distinction between a bad decryption (rank or value of public key, algorithm, inconsistent certificate) and a bad H_CODE during the integrity check.
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- Multimedia (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Databases & Information Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Computer Networks & Wireless Communication (AREA)
- Storage Device Security (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
- Information Transfer Between Computers (AREA)
Priority Applications (5)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| AU2003288370A AU2003288370A1 (en) | 2002-10-04 | 2003-10-02 | Integrated software and method for authenticating same |
| EP03780285A EP1546866A2 (fr) | 2002-10-04 | 2003-10-02 | Logiciel embarque et procede d'authentification de celui-ci. |
| MXPA05003618A MXPA05003618A (es) | 2002-10-04 | 2003-10-02 | Software integrado y metodo para la autenticacion del mismo. |
| JP2004540905A JP2006501735A (ja) | 2002-10-04 | 2003-10-02 | 同一のものを認証するための統合ソフトウェア及び方法 |
| US10/529,972 US7356815B2 (en) | 2002-10-04 | 2003-10-02 | Integrated software and method for authenticating same |
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| FR0212325A FR2845493A1 (fr) | 2002-10-04 | 2002-10-04 | Logiciel embarque et procede d'authentification de celui-ci |
| FR02/12325 | 2002-10-04 |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| WO2004032328A2 true WO2004032328A2 (fr) | 2004-04-15 |
| WO2004032328A3 WO2004032328A3 (fr) | 2004-07-15 |
Family
ID=32011393
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/FR2003/050073 Ceased WO2004032328A2 (fr) | 2002-10-04 | 2003-10-02 | Logiciel embarque et procede d'authentification de celui-ci. |
Country Status (9)
| Country | Link |
|---|---|
| US (1) | US7356815B2 (enExample) |
| EP (1) | EP1546866A2 (enExample) |
| JP (1) | JP2006501735A (enExample) |
| KR (1) | KR100973203B1 (enExample) |
| CN (1) | CN1703668A (enExample) |
| AU (1) | AU2003288370A1 (enExample) |
| FR (1) | FR2845493A1 (enExample) |
| MX (1) | MXPA05003618A (enExample) |
| WO (1) | WO2004032328A2 (enExample) |
Cited By (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2007064359A1 (en) * | 2005-11-29 | 2007-06-07 | Thomson Licensing | Method and apparatus for securing digital content |
| JP2008293033A (ja) * | 2003-09-18 | 2008-12-04 | Apple Inc | インクリメンタルなコード署名の方法及び装置 |
| JP2009504061A (ja) * | 2005-08-03 | 2009-01-29 | エヌエックスピー ビー ヴィ | 秘密鍵を保護する、セキュア端末、ルーチン、および方法 |
| US8364965B2 (en) | 2006-03-15 | 2013-01-29 | Apple Inc. | Optimized integrity verification procedures |
| US9672350B2 (en) | 2008-03-04 | 2017-06-06 | Apple Inc. | System and method of authorizing execution of software code based on at least one installed profile |
Families Citing this family (8)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN101668167A (zh) * | 2003-12-18 | 2010-03-10 | 松下电器产业株式会社 | 用于存储、认证以及执行应用程序的方法 |
| MXPA06004543A (es) * | 2003-12-18 | 2006-06-23 | Matsushita Electric Ind Co Ltd | Metodo para autentificar y ejecutar un programa de aplicacion. |
| US7831838B2 (en) * | 2004-03-05 | 2010-11-09 | Microsoft Corporation | Portion-level in-memory module authentication |
| US7644287B2 (en) * | 2004-07-29 | 2010-01-05 | Microsoft Corporation | Portion-level in-memory module authentication |
| US20090228868A1 (en) * | 2008-03-04 | 2009-09-10 | Max Drukman | Batch configuration of multiple target devices |
| WO2009111411A2 (en) * | 2008-03-04 | 2009-09-11 | Apple Inc. | System and method of authorizing execution of software code in a device based on entitlements granted to a carrier |
| AU2009222007A1 (en) * | 2008-03-04 | 2009-09-11 | Apple Inc. | System and method of authorizing execution of software code based on accessible entitlements |
| WO2009111405A1 (en) * | 2008-03-04 | 2009-09-11 | Apple Inc. | System and method of authorizing execution of software code based on a trusted cache |
Family Cites Families (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US5757914A (en) * | 1995-10-26 | 1998-05-26 | Sun Microsystems, Inc. | System and method for protecting use of dynamically linked executable modules |
| FI990461A7 (fi) * | 1999-03-03 | 2000-10-20 | Nokia Corp | Menetelmä ohjelmiston lataamiseksi palvelimelta päätelaitteeseen |
| US6901518B1 (en) * | 1999-04-08 | 2005-05-31 | Sun Microsystems, Inc. | Method and system for establishing trust in downloaded proxy code |
| CN1355996A (zh) * | 1999-04-21 | 2002-06-26 | 通用仪器公司 | 在有线电视系统先进置顶盒组中编程的目标或者通用升级的方法和系统 |
| JP2002140298A (ja) * | 2000-10-31 | 2002-05-17 | Matsushita Electric Ind Co Ltd | 認証方法 |
| US6965994B1 (en) * | 2001-01-30 | 2005-11-15 | Microsoft Corporation | Security mechanism for computer processing modules |
-
2002
- 2002-10-04 FR FR0212325A patent/FR2845493A1/fr active Pending
-
2003
- 2003-10-02 EP EP03780285A patent/EP1546866A2/fr not_active Withdrawn
- 2003-10-02 KR KR1020057005479A patent/KR100973203B1/ko not_active Expired - Fee Related
- 2003-10-02 WO PCT/FR2003/050073 patent/WO2004032328A2/fr not_active Ceased
- 2003-10-02 JP JP2004540905A patent/JP2006501735A/ja active Pending
- 2003-10-02 AU AU2003288370A patent/AU2003288370A1/en not_active Abandoned
- 2003-10-02 CN CNA200380100961XA patent/CN1703668A/zh active Pending
- 2003-10-02 US US10/529,972 patent/US7356815B2/en not_active Expired - Lifetime
- 2003-10-02 MX MXPA05003618A patent/MXPA05003618A/es not_active Application Discontinuation
Cited By (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP2008293033A (ja) * | 2003-09-18 | 2008-12-04 | Apple Inc | インクリメンタルなコード署名の方法及び装置 |
| US8341422B2 (en) | 2003-09-18 | 2012-12-25 | Apple Inc. | Method and apparatus for incremental code signing |
| JP2009504061A (ja) * | 2005-08-03 | 2009-01-29 | エヌエックスピー ビー ヴィ | 秘密鍵を保護する、セキュア端末、ルーチン、および方法 |
| WO2007064359A1 (en) * | 2005-11-29 | 2007-06-07 | Thomson Licensing | Method and apparatus for securing digital content |
| US8364965B2 (en) | 2006-03-15 | 2013-01-29 | Apple Inc. | Optimized integrity verification procedures |
| US8886947B2 (en) | 2006-03-15 | 2014-11-11 | Apple Inc. | Optimized integrity verification procedures |
| US9672350B2 (en) | 2008-03-04 | 2017-06-06 | Apple Inc. | System and method of authorizing execution of software code based on at least one installed profile |
Also Published As
| Publication number | Publication date |
|---|---|
| JP2006501735A (ja) | 2006-01-12 |
| AU2003288370A1 (en) | 2004-04-23 |
| MXPA05003618A (es) | 2005-06-17 |
| AU2003288370A8 (en) | 2004-04-23 |
| EP1546866A2 (fr) | 2005-06-29 |
| US7356815B2 (en) | 2008-04-08 |
| KR100973203B1 (ko) | 2010-07-30 |
| WO2004032328A3 (fr) | 2004-07-15 |
| KR20050083699A (ko) | 2005-08-26 |
| FR2845493A1 (fr) | 2004-04-09 |
| US20060156000A1 (en) | 2006-07-13 |
| CN1703668A (zh) | 2005-11-30 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| EP1570648B1 (fr) | Méthode de sécurisation des mises à jour de logiciels | |
| EP3476097B1 (fr) | Technique de téléchargement d'un profil d'accès à un réseau | |
| EP3665609B1 (fr) | Procédé et serveur de certification d'un document électronique | |
| WO2004032328A2 (fr) | Logiciel embarque et procede d'authentification de celui-ci. | |
| WO2012031755A2 (fr) | Procede d'authentification pour l'acces a un site web | |
| EP2249543A2 (fr) | Procédé pour autoriser une connexion entre un terminal informatique et un serveur source | |
| FR3025377A1 (fr) | Gestion de tickets electroniques | |
| EP1376367A2 (fr) | Vérification d'intégrité d'un code logiciel exécuté par un processeur intégré | |
| EP2077515B1 (fr) | Dispositif, systèmes et procédé de démarrage sécurisé d'une installation informatique | |
| EP1867189A1 (fr) | Communication securisee entre un dispositif de traitement de donnees et un module de securite | |
| EP1609326B1 (fr) | Procede de protection d'un terminal de telecommunication de type telephone mobile | |
| EP1867159A2 (fr) | Procede d'authentification d'un utilisateur d'un contenu numerique | |
| EP2710779A1 (fr) | Procede de securisation d'une platforme d'authentification, dispositifs materiels et logiciels correspondants | |
| WO2014076121A1 (fr) | Dispositif et procédé pour une transmission de données sous forme chiffrée | |
| FR3108818A1 (fr) | Procédé et dispositif d’authentification d’un utilisateur auprès d’une application. | |
| EP3166252B1 (fr) | Procédé d'enregistrement sécurisé de données, dispositif et programme correspondants | |
| EP3503500B1 (fr) | Procédé pour créer une signature électronique à distance au moyen du protocole fido | |
| FR3080693A1 (fr) | Authentification mutuelle d'un dispositif ou d'un systeme contenant des donnees sensibles ou confidentielles commandable par un utilisateur | |
| EP2452286A1 (fr) | Securisation de localisation d'un code distant a travers l'empreinte du destinataire | |
| FR2959577A1 (fr) | Dispositif amovible securise et/ou de securisation, serveur, et procede de verrouillage d'une entite informatique correspondants | |
| FR2976753A1 (fr) | Procede d'initiation d'une communication securisee entre deux systemes de communication |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| AK | Designated states |
Kind code of ref document: A2 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NI NO NZ OM PH PL PT RO RU SC SD SE SG SK SL TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW |
|
| AL | Designated countries for regional patents |
Kind code of ref document: A2 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
| DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
| WWE | Wipo information: entry into national phase |
Ref document number: 1015/DELNP/2005 Country of ref document: IN |
|
| WWE | Wipo information: entry into national phase |
Ref document number: 1020057005479 Country of ref document: KR Ref document number: 2004540905 Country of ref document: JP |
|
| WWE | Wipo information: entry into national phase |
Ref document number: 2003780285 Country of ref document: EP |
|
| WWE | Wipo information: entry into national phase |
Ref document number: PA/a/2005/003618 Country of ref document: MX Ref document number: 20038A0961X Country of ref document: CN |
|
| WWP | Wipo information: published in national office |
Ref document number: 2003780285 Country of ref document: EP |
|
| WWP | Wipo information: published in national office |
Ref document number: 1020057005479 Country of ref document: KR |
|
| ENP | Entry into the national phase |
Ref document number: 2006156000 Country of ref document: US Kind code of ref document: A1 |
|
| WWE | Wipo information: entry into national phase |
Ref document number: 10529972 Country of ref document: US |
|
| WWP | Wipo information: published in national office |
Ref document number: 10529972 Country of ref document: US |