Cryptography – Video cryptography – Video electric signal modification
Reexamination Certificate
2007-08-02
2010-11-09
Moazzami, Nasser (Department: 2436)
Cryptography
Video cryptography
Video electric signal modification
C380S239000, C380S259000, C380S282000, C713S171000
Reexamination Certificate
active
07831045
ABSTRACT:
The aim of the present invention is to propose a method to prevent the abusive use of conditional access data, in particular by means of clones of security modules whose security has been compromised.This aim is reached by a revocation method of security modules intended to receive security messages broadcasted to a plurality of security modules, said security modules comprising at least one personal key, this method comprising the steps, prior to revocation:division of the set of security modules into at least two groups,determination for each group of an asymmetrical key comprising a public key and a plurality of private keys,loading of one private key per security module,transmission of one security message per group, said message being encrypted by the public key of said group;revocation consisting in the following steps:sending to each member of the same group as the security module to be revoked, with the exception of the security module(s) to be revoked, of a new private key corresponding to the public key of another group, each private key being encrypted by the personal key of said security module.
REFERENCES:
patent: 2002/0133701 (2002-09-01), Lotspiech et al.
patent: 2004/0114762 (2004-06-01), Medvinsky
patent: 2004/0120529 (2004-06-01), Zhang et al.
patent: 1554163 (2004-12-01), None
patent: 1 501 237 (2005-01-01), None
patent: 2419262 (2006-04-01), None
patent: WO 01/56287 (2001-08-01), None
Boneh D et al: “An Efficient Public Key Traitor Tracing Scheme” Advences in Cryptology. Crypto '99. 19th Annual International Cryptology Conference. Santa Barbara, CA, Aug. 15-19, 1999. Proceedings, Lecture Notes in Computer Science; vol. 1666, Berlin: Springer, DE, Aug. 15, 1999, pp. 338-353, XP001194953 Isbn:3-540-66347-9.
Halevy D et al: “The LSD Broadcast Encryption Scheme” Lecture Notes in Computer Science, Springer Verlag, Berlin, DE, vol. 2442, 2002, pp. 47-60, XP002279256 ISSN: 0302-9743.
Naor D et al: “Revocation and Tracing Schemes for Stateless Receivers” Internet Citation, [Online] Jul. 2001, XP002203174 Extrait de l'Internet: URL:http://eprint.iacr.org/2001/059.pdf> [extrait le Jul. 24, 2002].
Harness & Dickey & Pierce P.L.C.
Moazzami Nasser
Nagravision S.A.
Reza Mohammad W
LandOfFree
Security module revocation method used for securing... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Security module revocation method used for securing..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Security module revocation method used for securing... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4198337