Security module revocation method used for securing...

Cryptography – Video cryptography – Video electric signal modification

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C380S239000, C380S259000, C380S282000, C713S171000

Reexamination Certificate

active

07831045

ABSTRACT:
The aim of the present invention is to propose a method to prevent the abusive use of conditional access data, in particular by means of clones of security modules whose security has been compromised.This aim is reached by a revocation method of security modules intended to receive security messages broadcasted to a plurality of security modules, said security modules comprising at least one personal key, this method comprising the steps, prior to revocation:division of the set of security modules into at least two groups,determination for each group of an asymmetrical key comprising a public key and a plurality of private keys,loading of one private key per security module,transmission of one security message per group, said message being encrypted by the public key of said group;revocation consisting in the following steps:sending to each member of the same group as the security module to be revoked, with the exception of the security module(s) to be revoked, of a new private key corresponding to the public key of another group, each private key being encrypted by the personal key of said security module.

REFERENCES:
patent: 2002/0133701 (2002-09-01), Lotspiech et al.
patent: 2004/0114762 (2004-06-01), Medvinsky
patent: 2004/0120529 (2004-06-01), Zhang et al.
patent: 1554163 (2004-12-01), None
patent: 1 501 237 (2005-01-01), None
patent: 2419262 (2006-04-01), None
patent: WO 01/56287 (2001-08-01), None
Boneh D et al: “An Efficient Public Key Traitor Tracing Scheme” Advences in Cryptology. Crypto '99. 19th Annual International Cryptology Conference. Santa Barbara, CA, Aug. 15-19, 1999. Proceedings, Lecture Notes in Computer Science; vol. 1666, Berlin: Springer, DE, Aug. 15, 1999, pp. 338-353, XP001194953 Isbn:3-540-66347-9.
Halevy D et al: “The LSD Broadcast Encryption Scheme” Lecture Notes in Computer Science, Springer Verlag, Berlin, DE, vol. 2442, 2002, pp. 47-60, XP002279256 ISSN: 0302-9743.
Naor D et al: “Revocation and Tracing Schemes for Stateless Receivers” Internet Citation, [Online] Jul. 2001, XP002203174 Extrait de l'Internet: URL:http://eprint.iacr.org/2001/059.pdf> [extrait le Jul. 24, 2002].

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Security module revocation method used for securing... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Security module revocation method used for securing..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Security module revocation method used for securing... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4198337

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.