METHOD FOR CONTROLLING ACCESS TO A SCRAMBLED DIGITAL CONTENT
First Claim
1. A method for controlling access to a digital content scrambled by a secret key K and distributed by an operator, said operator being equipped with a content server and a rights server, to at least one receiving terminal comprising a plurality of access-control modules, each access-control module implementing a specific technology for determining the secret key K,in which:
- the content server transmits the scrambled content to the terminal,the rights server transmits to the terminal the security data D(K) previously defined according to the secret key K,a method characterised in that;
prior to broadcasting, the licence server incorporates into the security data D(K) a selection criterion permitting at least one of the access-control modules among the terminal'"'"'s different access-control modules to decide to process the data D(K) alone in order to attempt to obtain the secret key K or to transmit at least a portion of the data to one of the terminal'"'"'s other access-control modules.when one of said access-control modules receives said security data D(K), said access-control module;
analyses the data D(K) to obtain said selection criterion and, based on its value,terminates the data D(K) processing in order to obtain the secret key K,or transmits a portion or the totality of said security data D(K) to at least one of the other access-control modules.
1 Assignment
0 Petitions
Accused Products
Abstract
A method for controlling access by a secret key K to a scrambled digital content distributed, along with the security data D(K) calculated on the basis of K, by an operator equipped with a content server and an access-rights server to at least one receiving terminal comprising a plurality of access-control modules, each access-control module implementing a specific technology for determining the secret key K. The rights server prior to distribution incorporates into said security data D(K) a selection criterion for selecting an access-control module from among the plurality of the terminal'"'"'s access-control modules to process said security data D(K), after which when one of said access-control modules receives said security data D(K), said access-control module analyses the data D(K) to obtain said selection criterion and, on the basis of its value, terminates processing the data D(K) in order to attempt to obtain the secret key K or transmits a portion or the entirety of said security data D(K) to at least one of the other access-control modules.
11 Citations
13 Claims
-
1. A method for controlling access to a digital content scrambled by a secret key K and distributed by an operator, said operator being equipped with a content server and a rights server, to at least one receiving terminal comprising a plurality of access-control modules, each access-control module implementing a specific technology for determining the secret key K,
in which: -
the content server transmits the scrambled content to the terminal, the rights server transmits to the terminal the security data D(K) previously defined according to the secret key K, a method characterised in that; prior to broadcasting, the licence server incorporates into the security data D(K) a selection criterion permitting at least one of the access-control modules among the terminal'"'"'s different access-control modules to decide to process the data D(K) alone in order to attempt to obtain the secret key K or to transmit at least a portion of the data to one of the terminal'"'"'s other access-control modules. when one of said access-control modules receives said security data D(K), said access-control module; analyses the data D(K) to obtain said selection criterion and, based on its value, terminates the data D(K) processing in order to obtain the secret key K, or transmits a portion or the totality of said security data D(K) to at least one of the other access-control modules. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. System for controlling access to a scrambled digital content supplied by an operator to a receiving terminal having a plurality of separate access-control modules, each access-control module implementing a specific technology for determining the secret key K, said system comprising:
-
a content server having means to scramble the content by means of a secret key K, a rights server having means to calculate the security data D(K) according to the secret key K, said system characterised in that; the rights server comprises moreover means for incorporating into the security data D(K) a selection criterion permitting at least one of the access-control modules among the different access-control modules of the terminal to decide to process the data D(K) alone in order to attempt to obtain the secret key K or to transmit at least a portion of the data to one of the terminal'"'"'s other access-control modules.
-
-
10. Receiving terminal for receiving from an operator a scrambled content by means of a secret key K, said terminal having a plurality of separate access-control modules, each access-control module implementing a specific technology for determining said secret key K, and said terminal furthermore receiving from said operator security data D(K) comprising a selection criterion for selecting one access-control module from among the plurality of the terminal'"'"'s access-control modules, characterised in that:
one of said access-control modules comprises means for analysing said selection criterion so as to determine whether to process the data D(K) alone in order to attempt to obtain the secret key K or to transmit at least a portion of the data to one of the terminal'"'"'s other access-control modules. - View Dependent Claims (11, 12)
-
13. A computer program recorded on a medium and, when run by a computer, intended to implement a method for controlling access to a digital content scrambled by a secret key K and distributed by an operator, said operator being equipped with a content server and a rights server, to at least one receiving terminal comprising a plurality of access-control modules, each access-control module implementing a specific technology for determining the secret key K,
in which: -
the content server transmits the scrambled content to the terminal, the rights server transmits to the terminal the security data D(K) previously defined according to the secret key K, prior to broadcasting, the licence server incorporates into the security data D(K) a selection criterion permitting at least one of the access-control modules among the terminal'"'"'s different access-control modules to decide to process the data D(K) alone in order to attempt to obtain the secret key K or to transmit at least a portion of the data to one of the terminal'"'"'s other access-control modules. when one of said access-control modules receives said security data D(K), said access-control module; analyses the data D(K) to obtain said selection criterion and, based on its value, terminates the data D(K) processing in order to obtain the secret key K, or transmits a portion or the totality of said security data D(K) to at least one of the other access-control modules; practiced in a receiving terminal for receiving from an operator a scrambled content by means of a secret key K, said terminal having a plurality of separate access-control modules, each access-control module implementing a specific technology for determining said secret key K, and said terminal furthermore receiving from said operator security data D(K) comprising a selection criterion for selecting one access-control module from among the plurality of the terminal'"'"'s access-control modules.
-
Specification