Device for processing and method for transmission of encoded data for a first domain in a network pertaining to a second domain
First Claim
Patent Images
1. Data processing device connected to a network belonging to a second domain so as to receive data encrypted according to an encryption method specific to a first domain, comprising:
- a memory for containing a first secret specific to the first domain;
a conditional access module that decrypts data encrypted according to an encryption method specific to the first domain and such encrypted data is received from a further device in the network belonging to the second domain, the second domain using a different encryption method than that of the first domain, and the conditional access module performs the decryption operation with the aid of first secret to obtain said decrypted data;
a converter module that encrypts said data decrypted according to an encryption method specific to the second domain, so that the data encrypted by said converter module cannot be decrypted other than with the aid of a second secret specific to the second domaina memory for containing a first symmetric key as well as the encryption of said first symmetric key with the aid of the second secret specific to said second domain;
said converter module converts the data decrypted with the aid of the first symmetric key;
an interface that communicates;
the data encrypted from said converter module; and
the encryption of said first symmetric key with the aid of the second secret specific to the second domain.
1 Assignment
0 Petitions
Accused Products
Abstract
The processing device is intended to be connected to a network of the second domain so as to receive data encrypted according to an encryption method specific to the first domain. It comprises:
- a memory for containing a first secret specific to the first domain;
- means of decryption of the data encrypted with the aid of the first secret so as to obtain decrypted data;
- means of encryption of the data decrypted according to an encryption method specific to the second domain, so that the data encrypted by said means of encryption cannot be decrypted other than with the aid of a second secret specific to the second domain.
The invention also relates to the method for transmitting data encrypted with the aid of the secret specific to the first domain in the network of the second domain.
8 Citations
18 Claims
-
1. Data processing device connected to a network belonging to a second domain so as to receive data encrypted according to an encryption method specific to a first domain, comprising:
-
a memory for containing a first secret specific to the first domain; a conditional access module that decrypts data encrypted according to an encryption method specific to the first domain and such encrypted data is received from a further device in the network belonging to the second domain, the second domain using a different encryption method than that of the first domain, and the conditional access module performs the decryption operation with the aid of first secret to obtain said decrypted data; a converter module that encrypts said data decrypted according to an encryption method specific to the second domain, so that the data encrypted by said converter module cannot be decrypted other than with the aid of a second secret specific to the second domain a memory for containing a first symmetric key as well as the encryption of said first symmetric key with the aid of the second secret specific to said second domain; said converter module converts the data decrypted with the aid of the first symmetric key; an interface that communicates; the data encrypted from said converter module; and the encryption of said first symmetric key with the aid of the second secret specific to the second domain. - View Dependent Claims (2)
-
-
3. Method of processing data, encrypted according to a method of encryption using a first secret specific to a first domain, in a network belonging to a second domain, comprising:
-
(a) receiving the data encrypted in the network from a further device in a network associated with the second domain; (b) decrypting said data encrypted with the aid of the first secret contained in the processing device so as to obtain decrypted data; (c) encrypting the data decrypted with the aid of a first symmetric key contained in the processing device; and (d) performing a data broadcast in the network; of the data encrypted in step (c) with the aid of the first symmetric key; and of the encryption of said first symmetric key with the aid of a second secret specific to the second domain, said encryption having been transmitted previously to the processing device by a device of the second domain. - View Dependent Claims (4, 5, 6, 7, 8, 9)
-
-
10. A method performed by a data processing device connected to a network belonging to a second domain so as to receive data encrypted according to an encryption method specific to a first domain, comprising:
-
storing in a memory a first secret specific to the first domain; decrypting data encrypted according to an encryption method specific to the first domain and such encrypted data is received from a further device in the network belonging to the second domain, the second domain using a different encryption method than that of the first domain, and the conditional access module performs the decryption operation with the aid of first secret to obtain said decrypted data; encrypting said data decrypted according to an encryption method specific to the second domain, so that the data encrypted by said converter module cannot be decrypted other than with the aid of a second secret specific to the second domain storing in said memory a first symmetric key as well as the encryption of said first symmetric key with the aid of the second secret specific to said second domain; converting the data decrypted with the aid of the first symmetric key; communicating the data encrypted from said converter module; and communicating the encryption of said first symmetric key with the aid of the second secret specific to the second domain. - View Dependent Claims (11)
-
-
12. A data processing device that processes data, encrypted according to an encryption operation using a first secret specific to a first domain, in a network belonging to a second domain, comprising:
-
a processor; a memory storing instructions, when executed by said processor perform the operations; (a) receiving the data encrypted in the network from a further device in a network associated with the second domain; (b) decrypting said data encrypted with the aid of the first secret contained in the processing device so as to obtain decrypted data; (c) encrypting the data decrypted with the aid of a first symmetric key contained in the processing device; and (d) performing the data broadcast in the network; of the data encrypted in operation (c) with the aid of the first symmetric key; and of the encryption of said first symmetric key with the aid of a second secret specific to the second domain, said encryption having been transmitted previously to the processing device by a device of the second domain. - View Dependent Claims (13, 14, 15, 16, 17, 18)
-
Specification