摘要:
A method to enforce watermarking instructions by a security module in a receiving device, comprising the steps of receiving a security message by—a security module, comprising at least a content key, watermark instructions and security message signature, said watermark instruction activates or deactivates a watermarking module, decrypting—a security message with a transmission key, verifying—a security message signature, and in case of successful verification, reading a watermarking data from the watermarking module, verifying the authenticity of the watermarking data, and in case of successful verification, transmitting the watermark instructions to the watermark module and the content key to a descrambling module.
摘要:
A system and method to watermark a compressed content encrypted by at least one content key, said content key as well as pre-marking data forming Conditional Access System (CAS) data, said CAS Data being encrypted by a transmission key and comprising at least one signature to authenticate all or part of the CAS Data, said compressed content being received by a client device comprising: a Descrambler having an input to receive the encrypted compressed content and an output to produce an compressed content, a Watermark (WM) inserter directly connected to the output of the Descrambler, said Descrambler and said WM inserter being connected with a Conditioner, said Conditioner executing the following steps: receiving the CAS Data, decrypting the CAS Data with the transmission key, verifying the signature of the CAS Data, and if the signature is valid, transferring the content key to the descrambler and the pre-marking data to the WM inserter, and watermarking by the WM inserter, the decrypted content received by the descrambler using the pre-marking data and the identifier.
摘要:
A surveillance system connectable to a network, comprising a communication module and a management module; said system being configured to, during an initialization phase: a. intercept a first message being sent to a first device; b. intercept a second message said second message being a response from the first device to the first message; c. calculate a time interval between the interception of the first message and the second message; d. repeat the steps a. to c. to determine further time intervals; e. determine a distribution of said time intervals; f. store the distribution and during a surveillance phase, intercept a third message said message being sent to the first device; intercept a fourth message said fourth message being a response to the third message; calculate a new time interval between the interception of the third and fourth messages; and verify that the new time interval is within the distribution.
摘要:
Method for securing control words within a decoder in charge of descrambling digital content protected by these control words, comprising the following steps: for each descrambling unit of this decoder, loading in a directory a pairing key referenced by an identifier associating said key to a descrambling unit; receiving at least one encrypted control word referenced by an indication allowing to identify the descrambling unit for which it is intended; decrypting the control word by using a first key shared with a security module; identifying in the directory the pairing key whose identifier corresponds to the indication of destination associated to the control word; encrypting this control word by using this pairing key; and storing in a register the control word in a chronological and referenced way.
摘要:
A system and method to watermark a compressed content encrypted by at least one content key, said content key as well as pre-marking data forming Conditional Access System (CAS) data, said CAS Data being encrypted by a transmission key and comprising at least one signature to authenticate all or part of the CAS Data, said compressed content being received by a client device comprising: a Descrambler having an input to receive the encrypted compressed content and an output to produce an compressed content, a Watermark (WM) inserter directly connected to the output of the Descrambler, said Descrambler and said WM inserter being connected with a Conditioner, said Conditioner executing the following steps: receiving the CAS Data, decrypting the CAS Data with the transmission key, verifying the signature of the CAS Data, and if the signature is valid, transferring the content key to the descrambler and the pre-marking data to the WM inserter, and watermarking by the WM inserter, the decrypted content received by the descrambler using the pre-marking data and the identifier.
摘要:
A surveillance system connectable to a network, comprising a communication module and a management module; said system being configured to, during an initialization phase: a. intercept a first message being sent to a first device; b. intercept a second message said second message being a response from the first device to the first message; c. calculate a time interval between the interception of the first message and the second message; d. repeat the steps a. to c. to determine further time intervals; e. determine a distribution of said time intervals; f. store the distribution and during a surveillance phase, intercept a third message said message being sent to the first device; intercept a fourth message said fourth message being a response to the third message; calculate a new time interval between the interception of the third and fourth messages; and verify that the new time interval is within the distribution.
摘要:
A method for watermarking digital media content received in a form of at least one encrypted sample to which metadata is assigned. Each sample is encrypted by means of a sample key. The metadata comprises first data, second data and a signature resulting from the first and second data. The first data is encrypted by a transport key and comprises at least a content key and watermarking metadata. The second data comprises an initialization vector so that the content key and the initialization vector form a unique pair of cryptographic data equivalent to the sample key. The method comprises the steps of extracting the metadata from the media content, decrypting the first data by using the transport key, authenticating the signed data and, in case of positive outcome, descrambling each sample by using the pair of cryptographic data, and marking each descrambled sample by using the watermarking metadata.