Device for processing and method for transmission of encoded data for a first domain in a network pertaining to a second domain
First Claim
1. Data processing device intended to be connected to a network belonging to a second domain so as to receive data encrypted according to an encryption method specific to a first domain, wherein it comprises:
- a memory for containing a first secret specific to the first domain;
means of decryption of said data encrypted with the aid of said first secret so as to obtain decrypted data;
means of encryption of said data decrypted according to an encryption method specific to the second domain, so that the data encrypted by said means of encryption cannot be decrypted other than with the aid of a second secret specific to the second domain.
1 Assignment
0 Petitions
Accused Products
Abstract
The processing device is intended to be connected to a network of the second domain so as to receive data encrypted according to an encryption method specific to the first domain. It comprises: a memory for containing a first secret specific to the first domain; means of decryption of the data encrypted with the aid of the first secret so as to obtain decrypted data; means of encryption of the data decrypted according to an encryption method specific to the second domain, so that the data encrypted by said means of encryption cannot be decrypted other than with the aid of a second secret specific to the second domain. The invention also relates to the method for transmitting data encrypted with the aid of the secret specific to the first domain in the network of the second domain.
-
Citations
13 Claims
-
1. Data processing device intended to be connected to a network belonging to a second domain so as to receive data encrypted according to an encryption method specific to a first domain, wherein it comprises:
-
a memory for containing a first secret specific to the first domain;
means of decryption of said data encrypted with the aid of said first secret so as to obtain decrypted data;
means of encryption of said data decrypted according to an encryption method specific to the second domain, so that the data encrypted by said means of encryption cannot be decrypted other than with the aid of a second secret specific to the second domain. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
Specification