Process for protecting an information item transmitted from a security element to a decoder and protection system using such a process
First Claim
Patent Images
1. A method for protecting a stream of data output from a security element comprising:
- receiving a signal scrambled using control words from a source external to said security element, said scrambled signal comprising a data component and a control component;
generating a control word in response to said control component of the scrambled signal;
descrambling said data component using said control word to generate a descrambled data component;
encrypting said descrambled data component using a first key to generate a re-encrypted data component; and
providing said re-encrypted data component to said external source.
4 Assignments
0 Petitions
Accused Products
Abstract
The invention relates to a process for protecting an information item transmitted from a security element to a decoder and a protection system using such a process.
The information item is protected by encrypting within the security element the information item to be transmitted to the decoder and by decrypting this information item within the decoder.
The invention applies to conditional-access systems.
-
Citations
10 Claims
-
1. A method for protecting a stream of data output from a security element comprising:
-
receiving a signal scrambled using control words from a source external to said security element, said scrambled signal comprising a data component and a control component;
generating a control word in response to said control component of the scrambled signal;
descrambling said data component using said control word to generate a descrambled data component;
encrypting said descrambled data component using a first key to generate a re-encrypted data component; and
providing said re-encrypted data component to said external source. - View Dependent Claims (2, 3, 4, 5)
receiving data from said external source; and
encrypting said data using a second key to generate said first key.
-
-
3. The method according to claim 2, wherein said data received from said external source is firstly generated by a random number generator.
-
4. The method according to claim 1, further comprising, before the step of encrypting said descrambled data component, the steps of:
-
receiving encrypted data from said external source; and
decrypting said encrypted data using a second key to generate said first encryption key.
-
-
5. The method according to claim 4, wherein said encrypted data received from said external source is firstly generated by a random number generator and secondly encrypted using a third key.
-
6. A method for protecting a stream of data received from an external security element comprising:
-
providing a signal scrambled using control words to said external security element, said scrambled signal having a data component and a control component, said security element generating a control word in response to said control component of the received scrambled signal and descrambling said data component using said control word to generate a descrambled data component;
said security element further encrypting said descrambled data component using a first key to generate a re-encrypted data component; and
receiving said re-encrypted data component from said external security element. - View Dependent Claims (7, 8, 9, 10)
generating a random number; and
providing said random number to said external security element;
wherein said security element encrypts said random number using a second key to generate said first key.
-
-
8. The method according to claim 7, further comprising:
-
encrypting said random number using a third key to generate a decryption key; and
decrypting said re-encrypted data component using said decryption key.
-
-
9. The method according to claim 6, further comprising, before the step of receiving said re-encrypted data component, the steps of:
-
generating a random number;
encrypting said random number using a second key; and
providing said encrypted random number to said external security element;
wherein said security element decrypts said encrypted random number using a third key to generate said first key.
-
-
10. The method according to claim 9, further comprising:
decrypting said re-encrypted data component using said random number.
Specification