ZA200409819B - Method for secure data exchange between two devices - Google Patents

Method for secure data exchange between two devices Download PDF

Info

Publication number
ZA200409819B
ZA200409819B ZA200409819A ZA200409819A ZA200409819B ZA 200409819 B ZA200409819 B ZA 200409819B ZA 200409819 A ZA200409819 A ZA 200409819A ZA 200409819 A ZA200409819 A ZA 200409819A ZA 200409819 B ZA200409819 B ZA 200409819B
Authority
ZA
South Africa
Prior art keywords
random number
encrypted
key
data exchange
receiver
Prior art date
Application number
ZA200409819A
Other languages
English (en)
Inventor
Olivier Brique
Christophe Nicolas
Marco Sasselli
Original Assignee
Nagracard Sa
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nagracard Sa filed Critical Nagracard Sa
Publication of ZA200409819B publication Critical patent/ZA200409819B/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/107License processing; Key processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • G06F21/445Program or device authentication by mutual authentication, e.g. between devices or programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/72Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in cryptographic circuits
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/061Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0841Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
    • H04L9/0844Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/41Structure of client; Structure of client peripherals
    • H04N21/418External card to be used in combination with the client device, e.g. for conditional access
    • H04N21/4181External card to be used in combination with the client device, e.g. for conditional access for conditional access
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/436Interfacing a local distribution network, e.g. communicating with another STB or one or more peripheral devices inside the home
    • H04N21/4367Establishing a secure communication between the client and a peripheral device or smart card
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/16Analogue secrecy systems; Analogue subscription systems
    • H04N7/167Systems rendering the television signal unintelligible and subsequently intelligible
    • H04N7/1675Providing digital key or authorisation information for generation or regeneration of the scrambling sequence
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2129Authenticate client device independently of the user
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2153Using hardware token as a secondary aspect

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Multimedia (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Computing Systems (AREA)
  • Mathematical Physics (AREA)
  • Technology Law (AREA)
  • Storage Device Security (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
  • Communication Control (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Radar Systems Or Details Thereof (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
ZA200409819A 2002-06-12 2004-12-03 Method for secure data exchange between two devices ZA200409819B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CH10022002 2002-06-12

Publications (1)

Publication Number Publication Date
ZA200409819B true ZA200409819B (en) 2006-10-25

Family

ID=29721339

Family Applications (1)

Application Number Title Priority Date Filing Date
ZA200409819A ZA200409819B (en) 2002-06-12 2004-12-03 Method for secure data exchange between two devices

Country Status (21)

Country Link
US (2) US8522028B2 (es)
EP (1) EP1529369B1 (es)
JP (1) JP2006512792A (es)
KR (1) KR101009523B1 (es)
CN (1) CN1659821A (es)
AT (1) ATE339819T1 (es)
AU (1) AU2003240205B2 (es)
BR (1) BRPI0311813B1 (es)
CA (1) CA2488837C (es)
DE (1) DE60308384T2 (es)
ES (1) ES2273005T3 (es)
HK (1) HK1072134A1 (es)
IL (1) IL165598A (es)
MY (1) MY132101A (es)
PL (1) PL371972A1 (es)
PT (1) PT1529369E (es)
RU (1) RU2321179C2 (es)
SG (1) SG105005A1 (es)
TW (1) TW200401203A (es)
WO (1) WO2003107585A1 (es)
ZA (1) ZA200409819B (es)

Families Citing this family (54)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7127328B2 (en) * 1994-12-30 2006-10-24 Power Measurement Ltd. System and method for federated security in an energy management system
US7761910B2 (en) 1994-12-30 2010-07-20 Power Measurement Ltd. System and method for assigning an identity to an intelligent electronic device
US7188003B2 (en) 1994-12-30 2007-03-06 Power Measurement Ltd. System and method for securing energy management systems
US7644290B2 (en) 2003-03-31 2010-01-05 Power Measurement Ltd. System and method for seal tamper detection for intelligent electronic devices
DE10330643A1 (de) * 2003-07-07 2005-02-10 Siemens Ag Verfahren zur verschlüsselten Datenübertragung über ein Kommunikationsnetz
KR100643278B1 (ko) * 2003-10-22 2006-11-10 삼성전자주식회사 휴대용 저장 장치의 디지털 저작권을 관리하는 방법 및 장치
JP2005244534A (ja) * 2004-02-26 2005-09-08 Hitachi Ltd 暗号通信装置および暗号通信方法
US7370166B1 (en) * 2004-04-30 2008-05-06 Lexar Media, Inc. Secure portable storage device
US20060242406A1 (en) 2005-04-22 2006-10-26 Microsoft Corporation Protected computing environment
US8347078B2 (en) 2004-10-18 2013-01-01 Microsoft Corporation Device certificate individualization
US8336085B2 (en) 2004-11-15 2012-12-18 Microsoft Corporation Tuning product policy using observed evidence of customer behavior
US7770205B2 (en) * 2005-01-19 2010-08-03 Microsoft Corporation Binding a device to a computer
DE102005018561A1 (de) 2005-04-21 2006-11-02 Giesecke & Devrient Gmbh Verfahren zum Betreiben eines Systems mit einem tragbaren Datenträger und einem Endgerät
US9436804B2 (en) 2005-04-22 2016-09-06 Microsoft Technology Licensing, Llc Establishing a unique session key using a hardware functionality scan
US9363481B2 (en) 2005-04-22 2016-06-07 Microsoft Technology Licensing, Llc Protected media pipeline
JP4502393B2 (ja) 2005-06-13 2010-07-14 キヤノン株式会社 通信パラメータの共有方法及び通信装置
KR100682263B1 (ko) * 2005-07-19 2007-02-15 에스케이 텔레콤주식회사 모바일을 이용한 원격 권한인증 시스템 및 방법
EP1784016A1 (fr) 2005-11-03 2007-05-09 Nagravision S.A. Méthode de sécurisation de données échangées entre un dispositif de traitement multimédia et un module de sécurité
EA200501605A1 (ru) * 2005-11-11 2007-04-27 Фонд Сопровождения Инвестиционных Проектов "Генкей" Способ и устройство получения и хранения личного цифрового сертификата и способ защищенного обмена цифровой информацией
DE102006046017B4 (de) 2006-09-28 2010-01-14 Siemens Ag Verfahren zum Bereitstellen eines symmetrischen Schlüssels zum Sichern eines Schlüssel-Management-Protokolls
DE202007018369U1 (de) * 2006-11-18 2008-07-31 Dica Technologies Gmbh Einrichtung zur sicheren Erzeugung und Verwaltung von Schlüsseln und deren Nutzung in Netzwerken zur sicheren Übertragung von Daten
KR100864830B1 (ko) * 2006-12-04 2008-10-23 한국전자통신연구원 모바일 rfid 태그의 사용자 데이터 영역의 읽기 또는 쓰기 명령 실행 요청에 대한 인가 방법 및 그 시스템
US8625784B2 (en) * 2006-12-22 2014-01-07 Samsung Electronics Co., Ltd. Broadcast encryption method and broadcast decryption method thereof
KR101350479B1 (ko) * 2007-02-12 2014-01-16 삼성전자주식회사 Drm 디바이스를 이용하여 drm 기능과 부가 기능을수행하기 위한 방법 및 그 시스템
WO2009084806A1 (en) * 2008-01-02 2009-07-09 Sung-Man Lee System and method for operating end-to-end security channel between server and ic card
WO2009131538A1 (en) * 2008-04-21 2009-10-29 Agency For Science, Technology And Research A portable system and method for remotely accessing data
JP5390844B2 (ja) * 2008-12-05 2014-01-15 パナソニック株式会社 鍵配布システム、鍵配布方法
EP2211497A1 (fr) * 2009-01-26 2010-07-28 Gemalto SA Procédé d'établissement de communication sécurisée sans partage d'information préalable
DE102009061045B4 (de) * 2009-06-10 2012-05-03 Infineon Technologies Ag Erzeugung eines Session-Schlüssels zur Authentisierung und sicheren Datenübertragung
US9106628B2 (en) * 2009-07-07 2015-08-11 Alcatel Lucent Efficient key management system and method
KR101560416B1 (ko) * 2009-11-18 2015-10-14 삼성전자주식회사 근거리 통신에서 보안 채널 형성 방법 및 장치
US8726009B1 (en) * 2010-01-26 2014-05-13 David P. Cook Secure messaging using a trusted third party
PL2466505T3 (pl) 2010-12-01 2013-10-31 Nagravision Sa Sposób rozpoznawania autentyczności terminala
CN103890768B (zh) 2011-10-28 2018-05-29 生物技术公司 医疗装置和其遥控装置之间的可靠通信
CN102546655A (zh) * 2012-02-07 2012-07-04 中山爱科数字科技股份有限公司 健康信息的安全传输方法
EP2870556A2 (en) * 2012-07-09 2015-05-13 Debiotech S.A. Communication secured between a medical device and its remote control device
GB2512595A (en) * 2013-04-02 2014-10-08 Mastercard International Inc Integrated contactless mpos implementation
KR102457809B1 (ko) 2014-09-24 2022-10-24 삼성전자주식회사 데이터 통신 보안을 위한 방법, 장치 및 시스템
CN104901966B (zh) * 2015-06-02 2016-06-08 慧锐通智能科技股份有限公司 一种网络通讯的密钥配置方法及系统
DE102015217735A1 (de) * 2015-09-16 2017-03-16 Robert Bosch Gmbh Verfahren zum Betreiben einer primären Einheit
US10231123B2 (en) * 2015-12-07 2019-03-12 GM Global Technology Operations LLC Bluetooth low energy (BLE) communication between a mobile device and a vehicle
US10262164B2 (en) 2016-01-15 2019-04-16 Blockchain Asics Llc Cryptographic ASIC including circuitry-encoded transformation function
CN109690543B (zh) * 2016-09-26 2021-04-09 华为技术有限公司 安全认证方法、集成电路及系统
CN106941487B (zh) * 2017-02-24 2021-01-05 创新先进技术有限公司 一种数据发送方法及装置
KR102036794B1 (ko) * 2017-05-08 2019-10-25 민상기 태블릿 기기
EP3454502B1 (en) * 2017-09-07 2020-08-05 Nxp B.V. Transceiver system
US10372943B1 (en) 2018-03-20 2019-08-06 Blockchain Asics Llc Cryptographic ASIC with combined transformation and one-way functions
CN110389538A (zh) * 2018-04-20 2019-10-29 比亚迪股份有限公司 车辆及其基于开放平台的车辆安全控制方法、系统
US10404454B1 (en) 2018-04-25 2019-09-03 Blockchain Asics Llc Cryptographic ASIC for derivative key hierarchy
CN108959908B (zh) * 2018-08-03 2021-02-02 深圳市思迪信息技术股份有限公司 一种与接入sdk的移动平台进行认证的方法、计算机设备及存储介质
KR101974411B1 (ko) * 2018-11-13 2019-05-02 동국대학교 산학협력단 차량 내 보안 통신 지원 장치 및 그 동작 방법
RU2722925C1 (ru) * 2019-10-09 2020-06-04 Общество с ограниченной ответственностью "Доверенные Решения" (ООО "Доверенные Решения") Способ защищенного информационного обмена данными
KR20210045676A (ko) * 2019-10-17 2021-04-27 현대자동차주식회사 차량용 통신 시스템 및 그를 위한 보안 통신 방법
CN112910887A (zh) * 2021-01-29 2021-06-04 中国电力科学研究院有限公司 一种对锁具测试设备的身份进行验证的方法及系统

Family Cites Families (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0440158B1 (en) * 1990-01-30 1997-09-10 Kabushiki Kaisha Toshiba Mutual authentication system
US5179591A (en) 1991-10-16 1993-01-12 Motorola, Inc. Method for algorithm independent cryptographic key management
US5371794A (en) * 1993-11-02 1994-12-06 Sun Microsystems, Inc. Method and apparatus for privacy and authentication in wireless networks
US5735070A (en) * 1996-03-21 1998-04-07 Vasquez; Eduardo C. Illuminated gun sight and low ammunition warning assembly for firearms
HRP970160A2 (en) 1996-04-03 1998-02-28 Digco B V Method for providing a secure communication between two devices and application of this method
KR100473536B1 (ko) * 1996-05-22 2005-05-16 마츠시타 덴끼 산교 가부시키가이샤 기기간통신의안전성을확보하는암호화장치및통신시스템
US6035539A (en) * 1997-02-12 2000-03-14 Connecticut Valley Arms, Inc. Fiberoptic gun sight
IL123028A (en) * 1998-01-22 2007-09-20 Nds Ltd Protection of data on media recording disks
WO2000030319A1 (en) 1998-11-13 2000-05-25 Iomega Corporation System for keying protected electronic data to particular media to prevent unauthorized copying using asymmetric encryption and a unique identifier of the media
US6507907B1 (en) * 1999-02-26 2003-01-14 Intel Corporation Protecting information in a system
US6412208B1 (en) * 2000-07-14 2002-07-02 Smith & Wesson Corp. Electronic sight assembly for use with a firearm
US6912653B2 (en) * 2001-01-23 2005-06-28 Erika Monika Gohl Authenticating communications
DE10137152A1 (de) * 2001-07-30 2003-02-27 Scm Microsystems Gmbh Verfahren zur Übertragung vertraulicher Daten
US7773754B2 (en) * 2002-07-08 2010-08-10 Broadcom Corporation Key management system and method
US20040250073A1 (en) * 2003-06-03 2004-12-09 Cukier Johnas I. Protocol for hybrid authenticated key establishment

Also Published As

Publication number Publication date
BR0311813A (pt) 2005-03-15
EP1529369A1 (fr) 2005-05-11
CA2488837A1 (en) 2003-12-24
KR20050010860A (ko) 2005-01-28
US20060190726A1 (en) 2006-08-24
US20130101120A1 (en) 2013-04-25
SG105005A1 (en) 2004-07-30
TW200401203A (en) 2004-01-16
DE60308384D1 (de) 2006-10-26
AU2003240205B2 (en) 2007-07-05
IL165598A0 (en) 2006-01-15
KR101009523B1 (ko) 2011-01-18
CA2488837C (en) 2011-04-26
US8522028B2 (en) 2013-08-27
WO2003107585A1 (fr) 2003-12-24
ATE339819T1 (de) 2006-10-15
BRPI0311813B1 (pt) 2017-01-24
RU2004135376A (ru) 2005-06-27
IL165598A (en) 2010-02-17
CN1659821A (zh) 2005-08-24
PL371972A1 (en) 2005-07-11
JP2006512792A (ja) 2006-04-13
EP1529369B1 (fr) 2006-09-13
AU2003240205A1 (en) 2003-12-31
RU2321179C2 (ru) 2008-03-27
PT1529369E (pt) 2007-01-31
ES2273005T3 (es) 2007-05-01
MY132101A (en) 2007-09-28
HK1072134A1 (en) 2005-08-12
DE60308384T2 (de) 2007-09-20

Similar Documents

Publication Publication Date Title
CA2488837C (en) Method for secure data exchange between two devices
RU2147790C1 (ru) Передача лицензии на программное обеспечение для элемента аппаратного обеспечения
US8756421B2 (en) Authentication device using true random number generating element or pseudo-random number generating element, authentication apparatus, and authentication method
AU2005223902B2 (en) Authentication between device and portable storage
EP1163755B1 (en) Verification of server authorization to provide network resources
RU2399087C2 (ru) Безопасное хранение данных с защитой целостности
RU97105403A (ru) Передача лицензии на программное обеспечение для элемента аппаратного обеспечения
US6839838B2 (en) Data management system, information processing apparatus, authentification management apparatus, method and storage medium
NZ545669A (en) Portable storage device and method of managing files in the portable storage device
JP3824297B2 (ja) 外部記憶装置とシステム装置との間でなされる認証方法、認証システム、および外部記憶装置
CA2908395A1 (en) Method and device to embed watermark in uncompressed video data
JP4912910B2 (ja) アクセス制御システム、及び、記憶装置
CN112804195A (zh) 一种数据安全存储方法及系统
JP2002232410A (ja) 暗号化データの通信装置および通信方法
KR101058929B1 (ko) 스마트카드의 암호키를 이용한 데이터 보안 저장방법 및저장장치
KR20030055713A (ko) 디지털 컨텐츠 저작권 보호 장치 및 방법
KR20030076457A (ko) 시간 코드 키 모듈 및 시간 제어 시스템
WO2001033768A2 (en) Apparatus and method for secure field upgradability
KR20110083163A (ko) 교환가능형 제한수신 시스템에서의 보안 프로토콜 제공 방법