WO2012080683A2 - Procédé et système d'accès conditionnel à un contenu numérique, terminal et dispositif d'abonné associés - Google Patents
Procédé et système d'accès conditionnel à un contenu numérique, terminal et dispositif d'abonné associés Download PDFInfo
- Publication number
- WO2012080683A2 WO2012080683A2 PCT/FR2011/053040 FR2011053040W WO2012080683A2 WO 2012080683 A2 WO2012080683 A2 WO 2012080683A2 FR 2011053040 W FR2011053040 W FR 2011053040W WO 2012080683 A2 WO2012080683 A2 WO 2012080683A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- content
- terminal
- control word
- tag
- crypto
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0866—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0822—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0847—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving identity based encryption [IBE] schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/088—Usage controlling of secret information, e.g. techniques for restricting cryptographic keys to pre-authorized uses, different access levels, validity of crypto-period, different key- or password length, or different strong and weak cryptographic algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
- H04L9/3073—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves involving pairings, e.g. identity based encryption [IBE], bilinear mappings or bilinear pairings, e.g. Weil or Tate pairing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
Definitions
- the invention relates to a system and method for conditional access to a digital content that makes it possible to prevent the implementation of an electronic device lawfully acquired and integrated by means of a pirate terminal.
- the invention thus makes it possible to fight effectively against the fraudulent provision of protected multimedia content.
- the invention further relates to the adaptation of such devices and a method for respectively triggering the temporary or permanent revocation of an electronic device or the possible rehabilitation of the latter.
- the invention further relates to the adaptation of a terminal to enable the implementation of the conditional access method.
- a digital content broadcasting operator generally operates a conditional access system (CAS) in order to make protected content available to a subscriber or a plurality of subscribers.
- CAS conditional access system
- Such a system generally relies on secure electronic devices, such as smart cards, to host the identities and / or rights of subscribers and to perform encryption, decryption or number generation operations.
- encrypted control words c and encoded contents C are transmitted through a broadcast network, at regular intervals or crypto-periods, for the least, known and mastered by the broadcast operator.
- Encoded content It is obtained by means of a coding function enc and said control word k, such that C - enc (k, M), M being the multimedia content in the clear.
- the encoding function may be in accordance with the DVB-CSA standard (Digital Video Broadcasting - Common Scrambling Algorithm). In order to view or listen to protected content, everyone must subscribe.
- a subscriber receives a dedicated device, generally in the form of a smart card, which coupled to a terminal, generally called a set-top box, allows said subscriber to decode protected content.
- the encrypted control words c are typically decrypted by a subscriber device which delivers the control words k to the terminal.
- the latter is in charge of decoding a coded content C and allows, by means of a suitable human-machine interface - for example a living room television, to access the clear content M. It is customary for "hacker" entities to attempt to develop an illicit trade aimed at transmitting, on a hacker network, decrypted control words k making it possible to decode protected content C using a terminal adapted for this purpose.
- the invention makes it possible to respond particularly effectively to the threat of "control word sharing".
- control word sharing Among the many advantages provided by the invention, we can mention that the invention makes it possible to remotely trace any subscriber device that has made it possible to produce a control word whose value can be transmitted on a hacker network. Indeed, the invention makes it possible to provide a dedicated and distinct control word for each subscriber device. The observation of such a control word transmitted on a hacker network makes it possible to find the subscriber device exploited illegally.
- the invention also makes it possible to remotely revoke such a device, called a "treacherous device", while continuing to broadcast content. through the broadcast network.
- the invention thus offers any content distribution operator a particularly simple and effective tool for combating piracy.
- a subscriber device operates only few calculations, expensive calculations being made in the terminal made available to the subscriber and cooperating with said subscriber device.
- a method for producing a control word implemented by processing means of a subscriber electronic device cooperating with a terminal, said device comprising receiving means for receiving data from the terminal and means for delivering said product control word to said terminal. Said method comprises:
- a step for delivering a control word via the means for delivering the device a step for delivering a control word via the means for delivering the device.
- the step for generating the control word of such a process is to develop a control word k j cp traceable whose value is distinct from that of a product control word, for the current crypto-period cp, by any other subscriber device by integrating the value of an identifier i into the calculation of the word Said value of the identifier i is stored by the device and distinct from that memorized by any other subscriber device.
- the step of issuing the control word consists of delivering V equal to k icp .
- the latter may comprise a preliminary step to allow the device to deliver a control word k equal to the product control word k icp .
- such a method may comprise a step for calculating and delivering a header H to allow, in fine, the decoding of the content encoded by a terminal.
- the invention provides for adapting a subscriber electronic device cooperating with a terminal and comprising:
- receiving means for receiving data from the terminal
- processing means for generating a control word from said data
- Such an adaptation consists in that the device comprises storage means for storing an identifier i, a secret SK.
- the processing and storage means are further adapted to produce and deliver a traceable control word k according to a method according to the invention.
- the invention provides a method for decoding an encoded content C and producing a clear content M, said method being implemented by means of processing a terminal cooperating with means for receiving data from the world. exterior and means for delivering said clear content
- said data consist of said encoded content C, an H header and a traceable control word k icp developed and delivered by an electronic subscriber device according to the invention.
- the method for decoding comprises:
- the invention provides for adapting an electronic terminal comprising:
- receiving means for receiving data from the outside world
- processing means for producing a clear content M from said data
- the data received from the external mode therefore consist of an encoded content C, a header H and a tag t.
- Means for cooperating with said device Subscriber electronics transmit to the latter said tag t and receive in return a traceable control word k i cp developed and delivered according to the invention.
- the terminal further comprises processing means adapted to decode and deliver a clear content M according to a method according to the invention.
- the invention provides a method for encoding a clear content M and producing an encoded content C, said method being implemented by means for processing a server comprising means for delivering said encoded content C to a server. terminal according to the invention and cooperating with a subscriber device also in accordance with the invention.
- Such a method comprises:
- the invention provides for adapting the processing means of a server so that they implement said method for producing and delivering encoded content C from a clear content, d. a crypto-period cp and a secret
- the invention provides a system for conditional access to a digital content comprising a server, a terminal and an electronic device respectively according to the invention.
- the invention provides a method for drawing a control word kp, cp produced by a treacherous subscriber device implementing a method for producing a traceable control word according to FIG. 'invention.
- a method for tracing comprises:
- a step for determining an identifier i-p of a device having produced kp, cp consisting of: i. interpreting the decryption utility or program to design an equivalent program expressing a set of instructions in the form of algebraic and appendix operations each having at least one input variable and at least one output variable;
- FIG. 1 shows a conditional access system according to the state of the art
- FIG. 2 shows a mode of piracy of protected multimedia contents broadcast by means of conditional access system according to the state of the art
- FIGS. 3 and 3a respectively describe two embodiments of a conditional access system according to the invention.
- FIG. 4 describes the implementation, according to the invention, of a method for observing a hacker network and identifying a fraudulently exploited electronic device or treacherous device;
- FIG. 5 illustrates the functional architecture of an electronic subscriber device according to the invention.
- FIGS. 5a and 5b respectively illustrate two embodiments of a method for producing a control word according to the invention
- FIG. 6 describes a first preferred embodiment of a method for decoding an encoded content, according to the invention.
- FIG. 7 describes a first preferred embodiment of a method for encoding clear content, in accordance with the invention.
- FIG. 8 describes a first preferred embodiment of a method for generating a secret for implementing a conditional access system, according to the invention
- FIG. 1 makes it possible to present a system of conditional access to digital content according to the state of the art. It consists of a broadcast network 4 implemented by an operator for broadcasting protected content. Thus, from a content server 3, c control words and c respectively encrypted and encoded contents are issued together.
- the server 3 encode for this purpose, a clear content M by means of an encoding function enc and a control word k, the latter being produced by said server 3.
- An encryption c of the control word k is also transmitted or "broadcasted" together with the encoded content C.
- the encrypted control words c and the encrypted contents C are transmitted via the broadcast network 4 to terminals 2a to 2m.
- the latter are responsible respectively for decoding in real time the encoded contents C transmitted by the server 3.
- a terminal - such as for example the decoder 2a - implements a decoding function dec and applies it to the encoded content C for get the clear content M.
- the latter can be viewed using a living room television 5 or any other interface adapted to reproduce the clear content.
- a terminal must know the value of the control word k that has been used by the server 3 to encode the content M.
- the terminal 2a receives, through the network 4, regularly couples (C, c) and transmits to a device la the ciphered control words c.
- the device can decipher an encrypted control word c by means of a decryption function D to obtain the control word k used to encode a content M.
- k D (c). It is the same for any other terminal, such as 2b to 2m, each cooperating respectively with a device lb to lm.
- the server 3 can use a secret, for example in the form of a key Kc for encrypting a control word k.
- a secret for example in the form of a key Kc for encrypting a control word k.
- Kc E (Kc, k).
- the keys Kc and Kd can be identical. This is the case of symmetric encryption / decryption.
- Kc is a public or secret key dedicated to the operator and Kd is a secret key dedicated to the device and known to the operator. According to this variant, there are thus several individual decryption keys and each of the devices lawfully issued and delivered to the subscribers of said operator has such an individual decryption key.
- Figure 2 illustrates a scenario in which a pirate organization, which we will call "hacker” manages to carry out a fraudulent trade in protected content.
- the hacker has contracted quite normally a subscription with a content operator. It can thus have an electronic subscriber device, such as a smart card.
- the hacker is also in possession of a terminal 2P, called pirate terminal.
- This terminal can receive pairs (C, c) from a broadcast network 4 such as that described with reference to FIG. 1.
- the terminal 2P can cooperate with said device 1a to transmit the encrypted control words c.
- the device produces the control word k by decrypting the encrypted c by means of a decryption function D.
- the device delivers it to the terminal 2P the control word k.
- the pirate terminal 2P can then transmit through a hacker network 6 the words of k control in real time.
- An unscrupulous user who has subscribed to the hacker's subscription may have a 2w terminal.
- the latter is adapted so that it receives on the one hand, from the distribution network 4, encoded contents C (dashed arrow) and on the other hand, from the hacker network 6, the associated control words k, clear.
- the terminal 2w can decode the encoded contents C and deliver the clear contents M so that they can be restored.
- An attacker can also subscribe a plurality of subscriptions from one or more operators.
- a pirate terminal 2P can then simultaneously cooperate with a plurality of subscriber devices 1a to 1z and implement a more or less complex management algorithm of said devices.
- the hacker terminal transmits a control word k decrypted mainly by the devices 1a to lz.
- such a terminal 2P may randomly request such or such an electronic device and so on.
- an attacker may optionally encrypt or encode, according to a proprietary method, the control words k transmitted on a hacker network.
- an encryption c p E p (k) - E p being a proprietary encryption function of the hacker.
- a terminal 2w comprises reciprocal decryption functions D p in order to finally deliver the expected clears. The invention makes it possible to defeat these different piracy scenarios.
- FIG. 3 illustrates a first embodiment of a conditional access system with digital content as provided by the invention.
- the invention provides a network of broadcast 4 implemented by an operator broadcasting protected content. From a content server 3, encoded contents C are emitted.
- the server 3 encodes a clear content M by means of an encoding function enc.
- a t tag is also issued or
- This tag contains data relating in particular to the current crypto-period. It may furthermore contain data concerning the content or directives that the server wishes to transmit on the network 4 to one or more subscriber devices 1a, 1m cooperating respectively with terminals 2a to 2m able to receive the broadcasted elements. via the network 4.
- a header H is also and jointly broadcast with the encoded content C and the tag t. This header will be mainly exploited by any terminal to decode encoded content.
- the decoders 2a to 2m are respectively responsible for decoding in real time the encoded contents C sent by the server 3.
- a terminal - such as for example the decoder 2a - implements a decoding function dec and applies it to the content encoded C to obtain the clear content M.
- the latter can be viewed using a living room television 5 or any other interface adapted to reproduce the clear content.
- a terminal To apply the decoding function dec, a terminal must know the value of the header H and the value of a control word k has cp produced and delivered by the subscriber's secure electronic device cooperating with the terminal 2a. It is the same for any other terminal, such as the terminals 2b to 2m, each cooperating respectively with the devices lb to lm.
- the control words k i cp delivered by a subscriber device li are produced using the tags t transmitted from the server 3 via the terminals, an identifier i dedicated subscriber device li and a secret SK; , i and SK; being stored in the subscriber device li.
- Each control word is thus specific to a particular subscriber device.
- k icp is clean and dedicated to the device li.
- This control word k icp is also different from the other control words respectively dedicated to other subscriber devices.
- a server 3 can transmit, via the network 4, only the encoded content C and the tag t characterizing the current crypto-period cp to terminals whose terminal
- the invention makes it possible to implement a conditional access system that prevents the risk of "control-word sharing".
- the control words used by the decoders to decode the encoded contents are traceable. They depend on each and each of an identifier dedicated to the subscriber device that generated and delivered. Each control word thus produced is clean and dedicated to a subscriber device.
- two control words k icp and k jcp are produced respectively by the devices li and lj such that k icp ⁇ kj cp .
- Figure 4 illustrates a technique that allows an operator to detect the fraudulent use of a subscriber device that we will call "traitor device”.
- FIG. 4 shows the elements described with reference to FIG. 3.
- a pirate terminal 2P receives triplets (C, H, t) from a broadcast network
- the terminal 2P cooperates with one or more devices illegally acquired and in accordance with the invention. They produce and deliver control words that depend in particular and respectively on the identifier of each subscriber device. Thus a device delivers a control word k a cp which depends in particular on its dedicated identifier a. We will study later a process to elaborate such a control word
- 2P terminal having received the control words k acp, kfo c p z k or cp, respectively produced by the devices 2a, 2b, 2z, may emit in real time, through a pirate network 6, one or more words of control - that we will note k pcp - equal to one of the words k acp , kfo ç p or k z cp .
- a terminal 2w can receive on the one hand, from the distribution network 4, encoded contents C (accompanied by the header H and the tag t) and on the other hand, from the hacker network 6, control words k pcp in clear.
- the terminal 2w can decode the encoded contents C and deliver the clear contents M so that they can be viewed.
- An operator may have means 9 for observing the hacker network 6. This observation may consist in perceiving one or more control words k pcp which transit over the hacker network 6. Based on this observation, an operator manages to identify at least one traitor device used by a decoder or hacker terminal 2P, among the devices la to lz.
- a traitor device li As soon as a traitor device li is identified, it can be revoked by transmitting a request for revocation as provided by the invention ( Figure 5b) or take any measures it deems useful to stop the use of the traitorous device .
- control word may alternatively result from a mixture based on one of the said control words k a cp , kfr cp or k z cp for producing and outputting a k p ⁇ k a separate cp said cp, k, C p or k z cp.
- the invention provides an embodiment to prevent the use of such combinations or mixtures to ensure the traceability of subscriber devices. As indicated in FIG. 9, and in connection with the variant described in FIG.
- a clear content M is encoded by a content server 3 by means of a function enc such that described, for example, in conjunction with Figure 7 according to a method 410.
- the latter also allows to develop a tag t which particularly characterizes the current crypto-period cp.
- An H header is furthermore elaborated by said server 3 (or even by the subscriber devices according to the variant of FIG. 3a).
- the triplets (C, H, t) - or the pairs (C, t) according to the figure
- the device li - adapted as indicated by FIG. Figure 5 - product and delivers a clean control word k j cp said terminal 2i.
- the latter decodes the encoded content C according to a decoding function dec in accordance with a method such as the method 200 described by way of example in FIG. 6.
- the clear content M thus obtained can be delivered by a human-machine interface
- such a conditional access method comprises a step for defining and distributing a dedicated secret SK to a group of subscriber devices.
- the secrets SK i have a common value identical to that of a secret MK shared with the server.
- the invention provides a method, such as Example 400 described with reference to FIG. 8.
- the invention further provides that a plurality of subscriber devices can share the same identifier i. Such a plurality of devices is therefore similar to a set of "clones" sharing the same identifier i or even the same SK.
- subscriber device covers without distinction any subscriber device in an individual form (a single electronic device) or in a plural form (a plurality of devices). sharing the same identifier i).
- the invention is based on the mathematical notion of coupling in groups of first order.
- a coupling is a bilinear application generally used in cryptography in the field of elliptic curves in particular.
- / l, ⁇ defining the size elements as a security parameter.
- G 1, G 2 and G ⁇ are three cyclic groups of order p and e: j X 2 - G T coupling.
- a cyclic group is an algebraic set such that g p + 1 is equal to g, p defining the order of the cyclic group and g an element of the group that is called a "generator".
- a particular relationship between groups G 1 and G 2 is not required.
- the two groups can be identical or more generally, an isomorphism ⁇ between G ⁇ and G 2 can be defined.
- the invention provides for the privileging of any possible isomorphism as well as any effectively calculable coupling.
- SK secret ⁇ - ⁇
- This method 400 may be implemented by a content server such as the server 3 described in connection with FIGS. 3 and 3a or alternatively by a dedicated server, the secret MK then being transmitted to said content server which thus knows said secret previously elaborated.
- the processing means of a server 3 as described in connection with FIGS. 3 and 3a can then implementing a method for encoding clear content M and producing for encoded content C.
- a method for encoding clear content M and producing for encoded content C may be in accordance with the example of method 410 described with reference to FIG. 7.
- Said method thus comprises a step 414 for producing an encoded content C from a crypto ⁇ period cp and the secret MK stored by the server 3.
- the function enc to produce the encoded content C consists of calculating 411 first of all.
- Ycp Fo (Yo > c P) ⁇ 0 being a determined and known function of the server 3.
- K j e (g, f) rcp + Sj , for all j between 1 and n, the generator / being a generator randomly selected from the group G 2 , for example at step 402 of the method according to Figure 8 as indicated by the notation f ⁇ G 2 .
- the server applies 414 a function 3 _1 to this word
- the function 3 _1 is the or-exclusive.
- the components of the word K are previously concatenated or mixed in a determined manner.
- the method described in connection with Figure 7 may further comprise a step 413a for developing the header H to allow the decoding of the encoded content.
- This variant is implemented by a server 3 as described in connection with FIG. 3, which delivers the header H together with the encoded content C and the tag t.
- the set n values is identical to the set s used to elaborate the word K and f is the generator chosen - possibly randomly - from the group & 7 during step 402 to elaborate the secret MK.
- FIG. 5 makes it possible to describe a subscriber device according to the invention.
- a device li comprises means R for receiving from the outside world - for example from a terminal 2i - a tag t.
- a tag t may include data attesting its integrity.
- said data may consist of a redundancy code such as a hash or be developed using a Kd secret shared between the device and the server.
- a tag can be transmitted encrypted from the server after it has been developed by the latter using a symmetric or asymmetric encryption algorithm.
- the device li comprises processing means 10 which can verify
- storage means 21 may be provided within a device li according to the invention to store said secret and cooperate with the processing means.
- the processing means 10 cooperate with means 22 for storing an identifier i dedicated to the device.
- the processing means 10 are able to deduce 12 from the tag t, the current crypto-period cp. They cooperate in addition with storage means 23 which memorize a secret SK. From the identifier i, the cryptoperiod cp and the secret SK; the processing means of the device produce the control word k ⁇ cp . The latter is delivered by the device li to the external mode (for example to the terminal 2i) via means for delivering S.
- the processing means of a device li according to the invention can implement a method 100 as illustrated by Figure 5a.
- Such a method for producing a control word comprises a first step for receiving a tag t via the reception means R of the device li. It also comprises a step for determining the current crypto-period cp by exploiting the received tag t followed by a step for producing a control word k i cp from said current crypto-period cp, the dedicated identifier i the device and the secret SK - i and SK being stored by the device. The method also includes a step of outputting a control word k equal to k icv via the means for outputting S from the device.
- a subscriber device implementing implement a method 100 as illustrated in connection with Figure 5a, receives 101 a tag t - possibly valid 102 its integrity - and deduced 103 crypto ⁇ current period cp.
- said device implements a determined function 0 (identical to that implemented by the content server) which, applied to the component ⁇ 0 of the secret SK ⁇ MK and to the crypto-period cp, makes it possible to generate PC belongs to Z ⁇ .
- the method 100 then comprises a step 105 for developing the control word k icp .
- This step consists of calculating a pair of magnitudes x icp and A icp .
- x icp belongs to Z ⁇ and is calculated by the device processing means deterministically from the identifier i and the crypto-period cp.
- a icp is calculated by the device as 1
- the device li implementing a method 100 can then deliver 106 to the outside world (such as a terminal 2i with which it cooperates) a control word k equal to i, cp '
- the invention provides that, according to the variant described in connection with FIG. 3a, a subscriber device according to the invention can - instead of the content server 3 - produce and develop the header H.
- the method 100 then comprises a step 105a for developing the components of said header and a step 106a for delivering to the terminal with which it cooperates said on your mind.
- Step 105a is similar to step 413a described above and implemented by a server 3 according to FIGS. 3 and 7.
- step 105a implemented by a subscriber device may consist of calculating a set
- the invention provides that the tag t includes data characterizing said choices.
- the processing means of a terminal 2i as shown in connection with FIGS. 3 or 3a, cooperate with means for storing the parameters of the bilinear group ⁇ . They implement a decoding function dec - such as that described in connection with Figure 6 - to produce a clear content M.
- Such a method 200 is implemented by the processing means of the terminal following the reception from the outside world of encoded content C, a header H and a control word k icp . It comprises a step for applying 201 a first function Fl to the header H and the control word k j cp to produce a word K. method 200 further comprises a step of applying 204 a second function 3 to said word K and the encoded content C to produce the clear content M.
- the function 3 _1 implemented by the server to encode the content, is an inverse function of the function 3.
- the terminal can thus deliver 205 said clear content M.
- the processing means of the terminal can implement an expansion function F2 to adapt the format of the word K before the application of the function 3.
- control word k icp comprises two components x icp and cp ' x icp having been calculated directly from the identifier i of the subscriber device which produced and delivered said control word.
- H header consists of a set of components h j
- the step of producing the word K therefore consists in implementing a bilinear mapping e: GJXGJ-> G T for which G 1 , G 2 and G ⁇ are three first-order cyclic groups p.
- This bilinear application focuses on the components of H and
- the step 204 for applying the function 3 to said components of the word K and the encoded content C consists in applying the function 3 to the previously aggregated components 203 concatenated or mixed in a manner similar to the aggregation performed. at step 414 when encoding the content by the server.
- the function 3 may consist of the exclusive-or - functions 3 and 3 _1 then being identical.
- the possible implementation of the expansion function F2 - step 202 - may consist, according to the preferred embodiment of the invention, of adapting the size of the outputs of each application of the function F1 to a component K j for make it compatible with the application of function 3 between
- the invention provides a second preferred embodiment also based on the mathematical notion of coupling in groups of first order.
- the value of the secret SK j stored in each subscriber device is distinct and depends in particular on the value of the identifier i of the latter.
- / l, ⁇ defining the size of the elements as a security parameter.
- G 1 , G 2 and Gy are three cyclic groups of order p and e: Gi xG 9 - G T a coupling.
- a special relationship between groups G 1 and G 2 is not required.
- the two groups can be identical or more generally, an isomorphism ⁇ between G ⁇ and G 2 can be defined.
- the invention provides that any possible isomorphism and any efficiently calculable coupling are preferred.
- the value of the known secret MK of the server can consist in choosing randomly two generators g and / respectively groups G 1 and G 2 - as
- the server 3 can implement the following method. We choose 2 ⁇ belonging to Z ⁇ and we
- the processing means of a server 3 such as that described with reference to FIGS. 3 and 3a, can then implement a method for encoding a clear content M and producing for an encoded content C.
- Such a method may comprise a step for producing an encoded content C from a crypto-period cp and the known secret MK or stored by the server 3.
- Such a method may further comprise a step prior to the issuance of the tag t to associate therewith data attesting its integrity.
- the server applies a function 3 _1 to said word K and to the clear content M to produce the encoded content C.
- the function 3 _1 is the exclusive-or.
- the components of the word K are previously concatenated or mixed in a determined manner.
- the method implemented by the server may further include a step for developing the header H to ultimately allow the decoding of the content encoded by a terminal.
- This variant is implemented by a server 3 as described in connection with FIG. 3, which delivers the header H together with the encoded content C and the tag t. header H can
- a subscriber device li comprises a secret SK ⁇ ix ⁇ B j ).
- the device li implementing such a method can then deliver to the outside world (such as a terminal 2i with which it cooperates) a control word k equal to i, cp '
- the invention provides that, according to the variant described in connection with FIG. 3a, a subscriber device according to the invention can - instead of the content server 3 - produce and elaborate the header H as defined previously .
- a decoder 2i implements a decoding function dec to produce a clear content M.
- Such a decoder 2i further comprises means for storing the value of the secret DK elaborated by the server as well as the parameters of the bilinear group ⁇ .
- the step to produce the word K consists, for all j between 1 and n, to elaborate
- the method further comprises a step for applying a function 3 to the word K and to the encoded content C. This amounts to applying function 3 to the components of the word
- K ⁇ K previously aggregated concatenated or mixed in a manner similar to the aggregation performed when encoding the content by the server.
- the function 3 may consist of the exclusive or - functions 3 and 3 _1 then being identical.
- ⁇ , ⁇ defining the size of the elements as a security parameter.
- G 1 , G 2 and Gy are three cyclic groups of order p and e: G j XG 2 ->& T a coupling. A special relationship between groups G 1 and G 2 is not required.
- the two groups may be identical or more generally one isomorphism ⁇ between G ⁇ and G 2 can be defined.
- a parameter T is further defined which determines the maximum size of an authorized coalition.
- the value of said secret MK may consist of possibly randomly choosing a generator g 0 of the group
- the processing means of a server 3, as described in connection with FIGS. 3 and 3a, can then implement a method for encoding a clear content M and produce for a coded content C from a crypto-period. cp and secret MK known or stored by the server 3.
- Such a method may further comprise a step prior to the issuance of the tag t to associate therewith data attesting its integrity.
- K j e (g C p, j) J ' J ''for all j between 1 and n, f being a generator of G 2 ⁇
- the server applies a function 3 _1 to said word K and to the clear content M to produce the encoded content C.
- the function 3 _1 is the exclusive-or.
- the components of the word K are previously concatenated or mixed in a determined manner.
- the method implemented by the server may further comprise a step for developing a header H to ultimately allow the decoding of the content encoded by a terminal.
- This variant is implemented by a server 3 such as that described in connection with FIG. 3, which delivers the header H together with the encoded content C and the tag t.
- the set s, the generators g cp and / and T are also identical to the elements used to construct the word K.
- said method includes a step for producing, deterministically and known to the server - a magnitude X ⁇ r element of, which depends on the identifier i of the device and the current crypto-period cp.
- x icp x i is calculated to depend on the identifier i but not on cp.
- the device li implementing such a method can then deliver to the outside world (such as a terminal 2i with which it cooperates) a control word k equal to i, cp '
- the invention provides that, according to the variant described in connection with FIG. 3a, a subscriber device according to the invention can - instead of the content server 3 - produce and elaborate the header H as defined previously .
- a decoder 2i implements a decoding function dec to produce a clear content M.
- Such a decoder 2i further comprises means for storing the parameters of the bilinear group ⁇ .
- the function 3 may consist of the exclusive or - functions 3 and 3 _1 then being identical.
- Said component is then of constant size and independent of T.
- This parameter T can be adapted to the desired level of security and system efficiency.
- conditional access system uses control words k icp that are traceable and therefore detectable by a operator. Such a system thus prevents any risk of control-word sharing.
- the pirate decoder is first interpreted as a sequence of formal instructions, each instruction being composed of an operation, one or more input variables and an output variable.
- each instruction being composed of an operation, one or more input variables and an output variable.
- the operations associated with the bilinear system / 7, GJ, G2, G
- these operations are called “algebraic” while all the others will be qualified as “ancillary” operations.
- the input and output variables of each instruction are put into a so-called SSA (Static Single-Assignment) form, so that it is easy to deduce from this representation of the decoder hacker a calculation graph of any variable manipulated by him during his formal execution.
- the output variable of the program represents the data in clear K and comes from an output value calculation graph in G j . We limit the program to the calculation of this graph.
- a second so-called specialization step it is sought to set all the input variables of the program to constant values for which the program succeeds in deciphering correctly.
- This search for fixed values can be conducted randomly and exhaustively and, if the decoder originally given is sufficiently functional (i.e. decrypts in a significant fraction of cases on average), this search step can lead quickly in a few tries.
- values are suitable, they are substituted for the corresponding variables in the program, so that the new program obtained is composed only of instructions performed on constants. Then we proceed to a simplification step of the program to obtain a single sequence of instructions without jump.
- This phase may need to have z ⁇ B where B is a terminal that depends on the embodiment of the invention.
- an initialization date cp b may be stored in the subscriber device delivered to a new subscriber.
- a subscriber device according to the invention comprises means 24 for storing such a date. This can be expressed as being equal to the current crypto-period at the time of subscription.
- FIGS. 5 and 5b This embodiment is illustrated by FIGS. 5 and 5b.
- the method 100 implemented by the processing means 10 of a subscriber device, comprises a step 109 provided for this purpose.
- the invention provides that one or more values kf may be stored by the device 1 - storage means 26.
- This embodiment thus prevents any use of a subscriber device for decoding encoded content received prior to the subscription subscription.
- the invention provides in addition or alternatively, the use of an expiration date cp e which can be stored in any subscriber device according to the invention. This date is recorded in means 25 of such a device during the desired or forced cancellation of a subscription.
- the control word delivered 106b by the device may be equal to kf as during the processing of the initialization date.
- This embodiment can be used to possibly revoke a treacherous device by transmitting, via the network 4, a targeted revocation request and defeat the use of said treacherous device.
- the component u makes it possible to indicate a revocation request destined for a device whose value of the identifier i is contained in the component v.
- the values u, v and cp are extracted by the means 12 of the device li according to FIG. 5.
- the means 14 compare 107 with the value of the component u with a predetermined value u r .
- the means for processing the device initialize 111 an expiration date cp e equal to cp.
- the subscriber device is no longer able to issue valid control words. If the value of v is different from the value of the identifier i of the device, the latter continues its conventional processing and produces a valid control word.
- the invention provides a variant for which a request for rehabilitation can be addressed to a subscriber device.
- This request can follow a request for prior revocation that has been sent by mistake, for example.
- the purpose of such a request is to allow a subscriber device again to produce valid control words.
- the invention provides a predetermined value u a characteristic of such a request.
- step 110 the means for processing the device reset 111 an expiration date cp e equal to 0 - meaning no expiration.
- the subscriber device is again able to issue valid control words. If the value of v is different from the value of the identifier i of the device, the latter continues its conventional processing or remains revoked.
- Such a request for annulment of revocation or rehabilitation may be translated alternatively by a request for initialization. In this case, it is possible to initialize the initialization date cp b to the current value of cp, the revocation thus resulting in the definition of an initialization date much higher than the current or infinite crypto periods.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Algebra (AREA)
- Mathematical Analysis (AREA)
- Mathematical Optimization (AREA)
- Mathematical Physics (AREA)
- Pure & Applied Mathematics (AREA)
- Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Storage Device Security (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
Claims
Priority Applications (7)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP11817383.0A EP2652899B1 (fr) | 2010-12-17 | 2011-12-16 | Procédé et système d'accès conditionnel à un contenu numérique, terminal et dispositif d'abonné associés |
US13/994,380 US9294273B2 (en) | 2010-12-17 | 2011-12-16 | Method and system for conditional access to a digital content, associated terminal and subscriber device |
BR112013015199-4A BR112013015199B1 (pt) | 2010-12-17 | 2011-12-16 | Método e sistema para acesso condicional a um conteúdo digital, terminal e dispositivo de assinante associado |
MX2013006905A MX2013006905A (es) | 2010-12-17 | 2011-12-16 | Metodo y sistema para el acceso condicional a un contenido digital, terminal asociada y dispositivo de abonado. |
CN201180067742.0A CN103384981B (zh) | 2010-12-17 | 2011-12-16 | 用于条件访问数字内容的方法和系统、关联的终端和订户装置 |
ES11817383.0T ES2683771T3 (es) | 2010-12-17 | 2011-12-16 | Procedimiento y sistema de acceso condicional a un contenido digital, terminal y dispositivo de abonado asociados |
JP2013543868A JP5784143B2 (ja) | 2010-12-17 | 2011-12-16 | デジタルコンテンツの限定受信のための方法およびシステム、ならびに関連の端末および契約者デバイス |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR1060770A FR2969439B1 (fr) | 2010-12-17 | 2010-12-17 | Procede et systeme d'acces conditionnel a un contenu numerique, terminal et dispositif d'abonne associes |
FR1060770 | 2010-12-17 |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2012080683A2 true WO2012080683A2 (fr) | 2012-06-21 |
WO2012080683A3 WO2012080683A3 (fr) | 2012-08-30 |
Family
ID=44146992
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/FR2011/053040 WO2012080683A2 (fr) | 2010-12-17 | 2011-12-16 | Procédé et système d'accès conditionnel à un contenu numérique, terminal et dispositif d'abonné associés |
Country Status (10)
Country | Link |
---|---|
US (1) | US9294273B2 (fr) |
EP (1) | EP2652899B1 (fr) |
JP (1) | JP5784143B2 (fr) |
CN (1) | CN103384981B (fr) |
BR (1) | BR112013015199B1 (fr) |
ES (1) | ES2683771T3 (fr) |
FR (1) | FR2969439B1 (fr) |
MX (1) | MX2013006905A (fr) |
PT (1) | PT2652899T (fr) |
WO (1) | WO2012080683A2 (fr) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2014502102A (ja) * | 2010-11-22 | 2014-01-23 | クリプトエキスパーツ エスアエス | デジタルコンテンツの限定受信のための方法およびシステム、ならびに関連の端末および契約者デバイス |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2958103B1 (fr) * | 2010-03-23 | 2012-08-17 | Cryptoexperts Sas | Procede pour identifier un dispositif mis en oeuvre par un terminal pirate et dispositif associe |
Family Cites Families (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020114465A1 (en) * | 2000-01-05 | 2002-08-22 | Shen-Orr D. Chaim | Digital content delivery system and method |
US7505593B2 (en) * | 2002-12-09 | 2009-03-17 | International Business Machines Corporation | Method for tracing traitors and preventing piracy of digital content in a broadcast encryption system |
JP2002271310A (ja) * | 2001-03-09 | 2002-09-20 | Shigeo Mitsunari | 生成装置、暗号化装置、復号化装置、生成方法、暗号化方法、復号化方法、プログラム、ならびに、情報記録媒体 |
JP2004361723A (ja) * | 2003-06-05 | 2004-12-24 | Nec Commun Syst Ltd | 楽曲データ配信システム、楽曲データ配信方法、および、楽曲データ配信プログラム |
FR2856539A1 (fr) * | 2003-06-17 | 2004-12-24 | France Telecom | Procede et systeme tracables de chiffrement et/ou de dechiffrement d'informations, et supports d'enregistrement pour la mise en oeuvre du procede |
JP4452105B2 (ja) * | 2004-03-12 | 2010-04-21 | 日本放送協会 | 復号情報生成装置及びそのプログラム、配信用コンテンツ生成装置及びそのプログラム、並びに、コンテンツ復号装置及びそのプログラム |
JP2006109300A (ja) * | 2004-10-08 | 2006-04-20 | Matsushita Electric Ind Co Ltd | セキュリティモジュール、ならびにそこで用いられる契約の更改方法、およびコンテンツ配信システム |
US7958262B2 (en) * | 2004-10-22 | 2011-06-07 | Microsoft Corporation | Allocating and reclaiming resources within a rendezvous federation |
EP1662789A1 (fr) * | 2004-11-29 | 2006-05-31 | Nagracard S.A. | Procédé de contrôle d'accès à des données à accès conditionnel |
US8042188B2 (en) * | 2005-07-15 | 2011-10-18 | Sony Corporation | Information processing apparatus, information recording medium manufacturing apparatus, information recording medium, method and computer program |
CN101119582A (zh) * | 2006-07-31 | 2008-02-06 | 华为技术有限公司 | 一种订阅移动业务的方法和系统 |
FR2905215B1 (fr) * | 2006-08-23 | 2009-01-09 | Viaccess Sa | Procede de transmission d'une donnee complementaire a un terminal de reception |
US7895341B2 (en) * | 2007-04-11 | 2011-02-22 | The Directv Group, Inc. | Method and apparatus for file sharing between a group of user devices with separately sent crucial portions and non-crucial portions |
JP2008301391A (ja) * | 2007-06-04 | 2008-12-11 | Murata Mach Ltd | 放送用暗号システムと暗号通信方法、復号器及び復号プログラム |
US8385545B2 (en) * | 2007-07-27 | 2013-02-26 | Howard G. Pinder | Secure content key distribution using multiple distinct methods |
CN101222772B (zh) * | 2008-01-23 | 2010-06-09 | 西安西电捷通无线网络通信有限公司 | 一种基于id的无线多跳网络认证接入方法 |
WO2009112966A2 (fr) * | 2008-03-10 | 2009-09-17 | Nds Limited | Système de distribution de clé |
JP2010130461A (ja) * | 2008-11-28 | 2010-06-10 | Sony Corp | 情報処理装置、情報処理方法、検出装置、検出方法、プログラム、及び通信システム |
EP2207340A1 (fr) * | 2009-01-12 | 2010-07-14 | Thomson Licensing | Procédé et dispositif pour la réception de mots de commande et procédé de transmission correspondant |
EP2334070A1 (fr) * | 2009-12-11 | 2011-06-15 | Irdeto Access B.V. | Génération d'un flux de données brouillé |
EP2487828A1 (fr) * | 2011-02-10 | 2012-08-15 | Thomson Licensing | Procédé et dispositif pour générer des mots de contrôle |
-
2010
- 2010-12-17 FR FR1060770A patent/FR2969439B1/fr not_active Expired - Fee Related
-
2011
- 2011-12-16 PT PT11817383T patent/PT2652899T/pt unknown
- 2011-12-16 JP JP2013543868A patent/JP5784143B2/ja not_active Expired - Fee Related
- 2011-12-16 EP EP11817383.0A patent/EP2652899B1/fr not_active Not-in-force
- 2011-12-16 WO PCT/FR2011/053040 patent/WO2012080683A2/fr active Application Filing
- 2011-12-16 ES ES11817383.0T patent/ES2683771T3/es active Active
- 2011-12-16 US US13/994,380 patent/US9294273B2/en not_active Expired - Fee Related
- 2011-12-16 MX MX2013006905A patent/MX2013006905A/es active IP Right Grant
- 2011-12-16 CN CN201180067742.0A patent/CN103384981B/zh not_active Expired - Fee Related
- 2011-12-16 BR BR112013015199-4A patent/BR112013015199B1/pt not_active IP Right Cessation
Non-Patent Citations (1)
Title |
---|
None |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2014502102A (ja) * | 2010-11-22 | 2014-01-23 | クリプトエキスパーツ エスアエス | デジタルコンテンツの限定受信のための方法およびシステム、ならびに関連の端末および契約者デバイス |
Also Published As
Publication number | Publication date |
---|---|
BR112013015199A2 (pt) | 2018-06-26 |
CN103384981B (zh) | 2016-10-19 |
BR112013015199A8 (pt) | 2018-10-09 |
US9294273B2 (en) | 2016-03-22 |
BR112013015199B1 (pt) | 2022-02-08 |
JP2014503137A (ja) | 2014-02-06 |
ES2683771T3 (es) | 2018-09-27 |
WO2012080683A3 (fr) | 2012-08-30 |
EP2652899B1 (fr) | 2018-05-23 |
FR2969439A1 (fr) | 2012-06-22 |
PT2652899T (pt) | 2018-10-08 |
JP5784143B2 (ja) | 2015-09-24 |
FR2969439B1 (fr) | 2018-06-22 |
MX2013006905A (es) | 2013-10-17 |
EP2652899A2 (fr) | 2013-10-23 |
CN103384981A (zh) | 2013-11-06 |
US20130326211A1 (en) | 2013-12-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP2168304B1 (fr) | Verification de code mac sans revelation | |
FR2818062A1 (fr) | Methode de transmission securisee de donnees numeriques d'une source vers un recepteur | |
EP1634405B1 (fr) | Procede, systeme et supports d'enregistrement de chiffrement et/ou de dechiffrement traçable | |
WO2008150553A2 (fr) | Schéma de chiffrement de contenu destiné à l'intégration de la gestion des droits numériques dans une multidiffusion chiffrée | |
EP2643943B1 (fr) | Procédé et système d'accès conditionnel à un contenu numérique, terminal et dispositif d'abonné associés | |
EP2022207B1 (fr) | Procédé cryptographique à chiffrement et révocation intégrés, système, dispositif et programmes pour la mise en oeuvre du procédé | |
EP3818659A1 (fr) | Procede d'obtention d'une succession de cles cryptographiques | |
FR2836608A1 (fr) | Dispositif de traitement et procede de transmission de donnees chiffrees pour un premier domaine dans un reseau appartenant a un second domaine | |
EP2652899B1 (fr) | Procédé et système d'accès conditionnel à un contenu numérique, terminal et dispositif d'abonné associés | |
WO2009053605A2 (fr) | Systeme traçable de chiffrement/dechiffrement de donnees numeriques diffusees | |
WO2003019899A2 (fr) | Reseau numerique local, procedes d'installation de nouveaux dispositifs et procedes de diffusion et de reception de donnees dans un tel reseau | |
EP1557025A1 (fr) | Procede simplifie de renouvellement de cles symetriques dans un reseau numerique | |
EP2550766B1 (fr) | Procede pour identifier un dispositif mis en oeuvre par un terminal pirate et dispositif associe | |
EP2294750B1 (fr) | Procede et systeme tracables de diffusion de donnees numeriques | |
EP3646526B1 (fr) | Procédé de réception et de déchiffrement d'un cryptogramme d'un mot de contrôle | |
FR3072848B1 (fr) | Procede de reception et de dechiffrement, par un processeur electronique de securite, d'un cryptogramme d'un mot de controle | |
FR3053497A1 (fr) | Procede de renforcement de la securite d'un systeme de television a peage a base de retro-communication periodique obligatoire | |
FR2885752A1 (fr) | Systeme et procede de transmission securisee, module de chiffrement et processus de synthese de cles pour ce systeme |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 11817383 Country of ref document: EP Kind code of ref document: A2 |
|
ENP | Entry into the national phase |
Ref document number: 2013543868 Country of ref document: JP Kind code of ref document: A |
|
WWE | Wipo information: entry into national phase |
Ref document number: MX/A/2013/006905 Country of ref document: MX |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2011817383 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 13994380 Country of ref document: US |
|
REG | Reference to national code |
Ref country code: BR Ref legal event code: B01A Ref document number: 112013015199 Country of ref document: BR |
|
ENP | Entry into the national phase |
Ref document number: 112013015199 Country of ref document: BR Kind code of ref document: A2 Effective date: 20130617 |