US20050281406A1 - Method and device to guarantee the integrity and authenticity of a set of data - Google Patents

Method and device to guarantee the integrity and authenticity of a set of data Download PDF

Info

Publication number
US20050281406A1
US20050281406A1 US11/199,727 US19972705A US2005281406A1 US 20050281406 A1 US20050281406 A1 US 20050281406A1 US 19972705 A US19972705 A US 19972705A US 2005281406 A1 US2005281406 A1 US 2005281406A1
Authority
US
United States
Prior art keywords
data
result
storage unit
security unit
unit
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US11/199,727
Inventor
Michael Hill
Marco Sasselli
Christophe Nicolas
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nagravision SARL
Original Assignee
Nagravision SA
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nagravision SA filed Critical Nagravision SA
Priority to US11/199,727 priority Critical patent/US20050281406A1/en
Assigned to NAGRAVISION S.A. reassignment NAGRAVISION S.A. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: HILL, MICHAEL JOHN, NICOLAS, CHRISTOPHE, SASSELLI, MARCO
Publication of US20050281406A1 publication Critical patent/US20050281406A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/436Interfacing a local distribution network, e.g. communicating with another STB or one or more peripheral devices inside the home
    • H04N21/4367Establishing a secure communication between the client and a peripheral device or smart card
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions

Definitions

  • This invention concerns the field of the control of the integrity and authenticity of data, and in particular the downloading of software.
  • the invention is applied to all those apparatuses that contain at least one central unit such as those currently used in information technology, that is to say, with a processor that has at least a part of its program inside a rewrite memory.
  • checksum a simple mathematical technique such as “checksum” is used in order to determine if the data taken into consideration has been modified by establishing a checksum reference.
  • control system has also been altered and that it is no longer able to verify the contents of its memory.
  • the propagation of compensatory random errors may occur, giving an identical result to the one expected. Consequently, verification by the known methods will be inoperative in certain cases.
  • collision-free operation means an operation according to which any different combination of data that is entered gives a similar result.
  • this mono-directional operation is a mathematical application H of a source group towards an object group, in which each x element of the source group is attributed with an H (x) symbol.
  • H functions known as Hash, as they are defined on page 27 of the RSA Laboratories publication “Frequently Asked Questions About Today's Cryptography, v.4.0”.
  • the aim of this invention is to guarantee that the information contained in a pay-T.V. decoder is, on the one hand, that which the control center has transmitted and, on the other hand, has not been altered.
  • the aim is achieved through the use of a method to check the integrity and authenticity of a set of memorized data (M 1 to Mn) in a pay-T.V. decoding unit, consisting of a decoding unit and a security unit, along with a means of communication (NET, REC) with a control center.
  • M 1 to Mn memorized data
  • a pay-T.V. decoding unit consisting of a decoding unit and a security unit, along with a means of communication (NET, REC) with a control center.
  • This method consists in:
  • the decoder itself can carry out the calculations and transmit the results to the security unit, or transmit the data M 1 to Mn to the security unit which will than carry out the calculation of the Hash information.
  • the cipher-keys used to cipher the information with the control center are contained exclusively in the security unit.
  • the decoder does not have the means to decipher these messages and so modify the data transmitted by the control center when the same messages pass through the decoder.
  • These security units are generally in the form of smart-cards, and include a memory, a microprocessor and a means of communication.
  • the verification operation of the conformity of the check information (Hx) may be carried out in various ways.
  • the security module sends the ciphered check information to the control center, the latter being in charge of carrying out the verification.
  • the control center may send either a simple result of the comparison OK/NOK, or send the reference value. All these messages are ciphered by a cipher-key of the security module.
  • the control center memorizes the result with reference to each subscriber unit as proof of the correct functioning of the downloading operation or, contrarily, of the alteration of the data in view of a repetition, for example.
  • control center may first send the reference value directly to the security units. In this way, it will not be necessary to ask the control center to verify the conformity of the calculated check information, Hx.
  • the control center sends, as a comparison result, the reference value (Hy) in a ciphered form k 2 (Hy) to the security unit. Once this is done, the control center does not only inform the security unit whether it is correct or not, but sends the reference value to the security unit. It will be done mainly if the comparison has given a positive result so that the security unit can memorize the reference value Hy.
  • the sending of this information can be carried out by an auxiliary means of communication such as a modem, or by the main data path.
  • the decoding unit may carry out an initial test with the means contained inside it. None the less, the reliability of this test is to create a doubt, that is, if the data has been modified by a third person, it is certain that that person will have modified the verification means in the same way.
  • the security unit can inform the decoding unit not to accept the test result as a guarantee of the authenticity of the data, but that the authenticity is determined according to the method described further on.
  • This variation is important in the case of the updating of a number of decoders, some of which of an old generation operating system type and in need of a Checksum verification, or others that have already been equipped for the system according to the method claimed herein.
  • the data M 1 to Mn does not represent the whole newly-updated program. This is because, in order to maintain a reliable means of verifying the whole program, it is important to have an H′y reference value available that is representative of a Hash function in the newly created program.
  • the security unit can immediately order a Hash function to be carried out on the whole of the new program P 1 giving the result H 1 . This result will be needed for the following checks or for further updates.
  • a variation of this method consists in obtaining the new H′y value which is representative of the result of the Hash function on the whole new program P 1 from the control center, represented here by M 0 to Mm.
  • the control data R sent by the control center may include a utilization data describer D that indicates to the decoding unit (IRD) how to use this data.
  • the describer may be in the form of a table that contains all the addresses and destinations of the data. In this way, it will not be possible to use this data without the describer, the latter being sent back to the decoding unit (IRD) only if the comparison is positive.
  • control center includes a warranty to certify the broadcaster of the data with the control data R.
  • This verification function is connected not only to the downloading of new data in a decoder, but also allows the testing of the validity and authenticity of the data at any moment.
  • the operation consists of periodically calculating, or according to a request, the representative Hx values of the result of a so-called mono-directional and collision-free function carried out on all or only a part of the data (M 0 to Mm) in the operational memory of the decoder, and to transmit this information (H′x) to the security unit for comparison with a reference value (H′y).
  • a first method which consists in the calculation being carried out by the decoder, the result being transmitted to the security unit.
  • the calculation is carried out by the security unit, with the data (M 0 to Mm) being transmitted from the decoder to the security unit (SC).
  • the request for these verification operations may come from the control center, from the security unit, from a test unit or from one of the means of communication, even if they are under tension.
  • the security unit compares the calculated H′x value with the reference value H′y
  • the latter may be represented either by the value calculated by the IRD. decoder after the confirmation of its validity from the control center, or by the reference value supplied by the control center.
  • the value of the result of the calculation Hx is transmitted to the control center. To do this, and to remain hidden, the result is divided up and included piece by piece inside administration messages used by the system.
  • the control center recomposes the Hx value piece by piece and when the value is complete, determines if there are modifications to the values.
  • One proposed solution in the sphere of this invention is to sub-divide the requests to the control center for a verification in a pseudo-random way.
  • Another solution previously described consists in sending a preliminary reference value. In this way, if the data is received correctly, which is in the majority of cases, the update can take effect without waiting for a request at the control center. This request will be carried out anyway to confirm that the update has been carried out correctly.
  • the group considered includes a transmitter part, located inside a control center, and a receiver that can be made up of quite a large number of peripheral units which work in a similar way.
  • the aim is to guarantee that the software sent by the transmission part is received in an authentic and complete way by each of the peripheral units.
  • the peripheral units will be called IRD (Integrated Receiver Decoder) in the following part of the paper, and include a receiver, a decoder to process the signal received by the decoder and a central processing unit, or CPU, that works preferably with a non-volatile memory as in various peripherals.
  • IRD Integrated Receiver Decoder
  • a non-volatile memory is a memory where the contents are maintained intact even if the main current supply is cut, for example through at least one independent source of energy such as batteries.
  • Other types of non-volatile memories can be used, such as EEPROM, Flash EPROM or FEPROM. It is these non-volatile memories that keep the data safeguarded in case of an interruption in the supply of current, and It is essential to make the IRD processor work well.
  • the information is received by the IRD coming from the control center, in the form of a stream of data arriving at the receiver of the IRD unit.
  • the stream of data includes video information, audio information, data information, execute applications and, finally, various types of data check information.
  • the receiver of the IRD transmits them to a decoder, that then puts them in circulation in the IRD by means of a bus.
  • a bus Connected to the bus there is a specialized multimedia processor that is, in turn, connected to a monitor and to one or more loudspeakers, the aforementioned non-volatile memory and one or more optional sub-devices.
  • the IRD processor CPU
  • the control center may receive exchange information, for example through a modem connected to the public telecommunications network.
  • the software and the data for which the authenticity and integrity must be guaranteed may be loaded by various means.
  • One of these means consists in sending the aforementioned receiver an update of the memory with the stream of data, including a number of heading-like data blocks M 1 , M 2 , . . . . Mn to allow the data M 1 to Mn to be easily recognizable for the central unit.
  • the data blocks may reach the IRD through one of its optional sub-devices such as the modem, for example.
  • the data blocks M 1 , M 2 , . . . . Mn may be sent in clear without any drawbacks, that is to say, without yet being ciphered.
  • the method according to the invention consists, in this form, of applying first of all, during the transmission stage, a mono-directional or Hash function to a part or to all of the data blocks M 1 , M 2 , . . . . Mn to obtain a representative Hx result of the M 1 to Mn group.
  • the data blocks M 1 to Mn may be processed separately just the same and obtain the Hx 1 result corresponding to M 1 , Hx 2 corresponding to M 2 and Hxn corresponding to Mn. This or these Hx results are memorised by the control center for ulterior verification.
  • a particularly crucial property for the authentication of the data concerns the systems by which the data is transmitted along public routes such as Hertzian-wave, telephonic or internet routes.
  • an intruder may take the place of the control center and send data to modify the operation of the target system.
  • the strength of the method resides, in part, in the quality of the mono-directional H function and in the ratification of these signatures by a security unit that is reputed to be impenetrable. In this way, a simple checksum does not allow the exchange of two blocks of characters in the data to be detected because the addition is reputed to be, in mathematics, commutative and associative.
  • a result of a Hash function Hx is a very realistic image of x, even if it is much longer than Hx. If an exchange of characters is carried out in the group of x characters, the H(x) function will detect it immediately, and the system will no longer be able to function following its detection. The result is a security crash.
  • An important aspect of the invention is that it allows a verification of the validity of the data in the peripheral unit's memory to be carried out at any time.
  • the presence of this check information in the security module allows the decoder to carry out an auto-verification. This verification gives a result without comparing it to the checksum normally used in the program memory. If this verification gives a result similar to the reference, the unit has various means (modem connection, cable connection) to inform an external unit, for example the control center, about the non-conformity of the program.
  • the invention has a peripheral unit in which all or a part of the program is initially loaded with the check information such as that described above. This can be carried out during fabrication at the moment of initialization before the sale through the processor, or by downloading the check information through one of the peripherals at the moment of an initialization step.
  • the invention is illustrated in the schematic block diagram of an IRD. ( FIG. 1 )
  • An IRD or Integrated Receiver Decoder, is represented in this diagram, making up the peripheral part of the system to which the method according to the invention is applied, and in the way described below.
  • This IRD includes a central bus DB to which all the different modules are connected.
  • the central module of the IRD is made up of the CPU processor which has the task of carrying out the various processes.
  • An REC receiver receives a stream of data including video and audio information, data and execute applications through various support paths such as a cable, a Hertzian antenna, a satellite dish, internet or other known technology.
  • This REC receiver is connected to a DC interface, which is also connected to the bus (DB).
  • the data is broken up and the different elements are stored in the temporary memory TMEM.
  • the IRD processes the blocks M 1 to Mn in the same way as when they were transmitted, but in the opposite order. It is clear that in the case where the blocks are received in ciphered form, the first operation is to decipher the data with the public cipher-key PuK to have the data in clear.
  • the next step involves carrying out a mono-directional function H on the data blocks M 1 to Mn to have a result of the values Hy 1 to Hyn.
  • a mono-directional function H on the data blocks M 1 to Mn to have a result of the values Hy 1 to Hyn.
  • this error will show up on Hy that will be found to be different from Hx which is contained in the control block and the data M 1 to Mn will be rejected.
  • H functions are the functions MD 2 , MD 5 and SHA- 1 .
  • the unit containing the data does not have a communication path with a control center.
  • the data is delivered to a storage unit with the control information (R 1 ) including the result of a mono-directional or collision-free function, called Hash function, carried out on all or a part of the data (M 1 to Mn).
  • the particularity of this control data (R 1 ) is that, on the one hand, it contains the hash function for the set of data taken into consideration, while on the other hand that they are stored in a ciphered form k 2 (Hy).
  • the storage unit can neither understand nor can modify them.
  • the storage unit transmits the check information to the security unit in a ciphered form.
  • the security unit contains the means to decipher the information, particularly for extracting the result of the hash function (Hy).
  • the storage unit carries out the hash function on the data M 1 to Mn, calculates the check information Hx and transmits it to the security unit for comparison.
  • the security unit sends the return data (R 2 ) to the storage unit, including the result of the comparison.
  • the storage unit is then in charge of taking the necessary measures in the case where the data is not authentic.
  • the calculation of the check information Hx is carried out by the security unit, which in this case receives the data M 1 to Mn from the storage unit.
  • a cipher key k 3 is added to the control data (R 1 ) to decipher the data M 1 to Mn.
  • This data is initially stored in a ciphered form and the Hash function is made in the ciphered data.
  • the security unit in the reply data (R 2 ) sent to the storage unit, includes the cipher-key k 3 which allows it to decipher the data M 1 to Mn.
  • the security unit does not send the cipher-key k 3 , but it is the storage unit that sends the ciphered data M 1 to Mn to the security unit SC for deciphering.
  • this control may be carried out at any time during the operation of the storage unit.
  • the control data (R 1 ) includes a data describer D that indicates to the storage unit how to use the data.
  • This describer can be in the form of a table containing the addresses and the destinations of the data. In this way, it will not be possible to use the data without the describer, the latter being returned to the storage unit only if the comparison is positive.

Abstract

Method and a device for guaranteeing the integrity and authenticity of data transmitted between a management center and one or several receiver units, wherein each receiver unit comprises a decoder (IRD) and a security unit (SC) and means for communicating (NET, REC) with the management center. The method consists in calculating a check information (Hx) representative of the result of a unidirectional and collision-free function, performed on all or part of the transmitted data and in transmitting the result to the management center for verification. The center will be able to inform the decoder concerning the authenticity of the data through return channels or through the main channel.

Description

    FIELD OF THE INVENTION
  • This invention concerns the field of the control of the integrity and authenticity of data, and in particular the downloading of software.
  • The invention is applied to all those apparatuses that contain at least one central unit such as those currently used in information technology, that is to say, with a processor that has at least a part of its program inside a rewrite memory.
  • BACKGROUND OF THE INVENTION
  • It is well known that the alteration or the damage of data leaves traces in certain parts of the information processed and stored in a memory, either before or after being processed. It is also known that a simple mathematical technique such as “checksum” is used in order to determine if the data taken into consideration has been modified by establishing a checksum reference.
  • However, it is possible that the control system has also been altered and that it is no longer able to verify the contents of its memory. Thus, during the course of mathematical operations, the propagation of compensatory random errors may occur, giving an identical result to the one expected. Consequently, verification by the known methods will be inoperative in certain cases.
  • There is, therefore, a problem that is not solved in a satisfactory manner, which consists in improving the reliability and the security achieved by the known verification methods, particularly when the same unit is in charge of calculating its own checksum and of comparing it with a reference value.
  • It is well known that, in order to render all data modifications visible, a mono-directional operation is used on the data, that is, an operation that is easy to perform in one direction but almost impossible to perform in the other direction. For example, the operation XY is easy to carry out, while the operation Y√X is much more difficult.
  • The term collision-free operation means an operation according to which any different combination of data that is entered gives a similar result.
  • Within the sphere of this invention, this mono-directional operation is a mathematical application H of a source group towards an object group, in which each x element of the source group is attributed with an H(x) symbol. These functions are particularly useful when there are functions known as Hash, as they are defined on page 27 of the RSA Laboratories publication “Frequently Asked Questions About Today's Cryptography, v.4.0”. The x element can be of any length, but H(X) always has a series of characters of a fixed length (fixed-size string). Such a function is difficult to invert, that is to say, knowing H(X) does not generally mean that x can be found. It is said to be more collision-free when it is injective, that is, that H(Y)=H(X) leads to y=x, or H(Y)≠H(X) leads to y≠x.
  • SUMMARY OF THE INVENTION
  • The aim of this invention is to guarantee that the information contained in a pay-T.V. decoder is, on the one hand, that which the control center has transmitted and, on the other hand, has not been altered.
  • The aim is achieved through the use of a method to check the integrity and authenticity of a set of memorized data (M1 to Mn) in a pay-T.V. decoding unit, consisting of a decoding unit and a security unit, along with a means of communication (NET, REC) with a control center.
  • This method consists in:
      • transmitting the data (M1 to Mn) to the security unit;
      • calculating a check information (HX) representative of the result of a function called mono-directional and collision-free, carried out on all or only a part of the data (M1 to Mn);
      • ciphering the check information (Hx) with a first cipher-key (k1);
      • establishing the conformity of the check information (Hx) by way of a communication to the control center by one of the means of communication.
  • In this way, the integrity of the data is no longer checked exclusively by the decoding unit in which the data is stored, but is guaranteed by an external unit, considered impenetrable, the security unit.
  • According to this invention, the decoder itself can carry out the calculations and transmit the results to the security unit, or transmit the data M1 to Mn to the security unit which will than carry out the calculation of the Hash information.
  • The cipher-keys used to cipher the information with the control center are contained exclusively in the security unit. The decoder does not have the means to decipher these messages and so modify the data transmitted by the control center when the same messages pass through the decoder.
  • These security units are generally in the form of smart-cards, and include a memory, a microprocessor and a means of communication.
  • By means of communication we mean either a two-directional connection by a cable, a modem outlet or a Hertzian-wave connection. The principle means of carrying the data and on which messages directed to the security module are forwarded is included in this term.
  • The verification operation of the conformity of the check information (Hx) may be carried out in various ways.
  • The security module sends the ciphered check information to the control center, the latter being in charge of carrying out the verification. In the reply, the control center may send either a simple result of the comparison OK/NOK, or send the reference value. All these messages are ciphered by a cipher-key of the security module.
  • The control center memorizes the result with reference to each subscriber unit as proof of the correct functioning of the downloading operation or, contrarily, of the alteration of the data in view of a repetition, for example.
  • According to a variation of the invention, the control center may first send the reference value directly to the security units. In this way, it will not be necessary to ask the control center to verify the conformity of the calculated check information, Hx.
  • With another operational method, and when a verification request comes from a security unit, the control center sends, as a comparison result, the reference value (Hy) in a ciphered form k2(Hy) to the security unit. Once this is done, the control center does not only inform the security unit whether it is correct or not, but sends the reference value to the security unit. It will be done mainly if the comparison has given a positive result so that the security unit can memorize the reference value Hy.
  • The sending of this information can be carried out by an auxiliary means of communication such as a modem, or by the main data path.
  • In the case where the data M1 to Mn is already accompanied by a means of verification, such as CRC, Checksum or Hash, the decoding unit may carry out an initial test with the means contained inside it. None the less, the reliability of this test is to create a doubt, that is, if the data has been modified by a third person, it is certain that that person will have modified the verification means in the same way.
  • This is because, with this method of the invention, the security unit can inform the decoding unit not to accept the test result as a guarantee of the authenticity of the data, but that the authenticity is determined according to the method described further on.
  • This variation is important in the case of the updating of a number of decoders, some of which of an old generation operating system type and in need of a Checksum verification, or others that have already been equipped for the system according to the method claimed herein.
  • When updated software is downloaded, it is quite common to send only the part that has been modified. The data M1 to Mn does not represent the whole newly-updated program. This is because, in order to maintain a reliable means of verifying the whole program, it is important to have an H′y reference value available that is representative of a Hash function in the newly created program.
  • There is a first method which consists in establishing the initial integrity of a program P0, that is, before being updated. To do this, the initial results H0 of the Hash function in the program P0 are either initialized on installing the program or established according to the method in this invention.
  • When the authenticity of the data of the update has been established and have been introduced into the memory program, the security unit can immediately order a Hash function to be carried out on the whole of the new program P1 giving the result H1. This result will be needed for the following checks or for further updates.
  • A variation of this method consists in obtaining the new H′y value which is representative of the result of the Hash function on the whole new program P1 from the control center, represented here by M0 to Mm.
  • The control data R sent by the control center may include a utilization data describer D that indicates to the decoding unit (IRD) how to use this data. The describer may be in the form of a table that contains all the addresses and destinations of the data. In this way, it will not be possible to use this data without the describer, the latter being sent back to the decoding unit (IRD) only if the comparison is positive.
  • According to a variation of the invention, the control center includes a warranty to certify the broadcaster of the data with the control data R.
  • This verification function is connected not only to the downloading of new data in a decoder, but also allows the testing of the validity and authenticity of the data at any moment. In this case, the operation consists of periodically calculating, or according to a request, the representative Hx values of the result of a so-called mono-directional and collision-free function carried out on all or only a part of the data (M0 to Mm) in the operational memory of the decoder, and to transmit this information (H′x) to the security unit for comparison with a reference value (H′y).
  • To carry out this operation, there is a first method which consists in the calculation being carried out by the decoder, the result being transmitted to the security unit. According to a variation of this method, the calculation is carried out by the security unit, with the data (M0 to Mm) being transmitted from the decoder to the security unit (SC).
  • The request for these verification operations may come from the control center, from the security unit, from a test unit or from one of the means of communication, even if they are under tension.
  • While the security unit compares the calculated H′x value with the reference value H′y, the latter may be represented either by the value calculated by the IRD. decoder after the confirmation of its validity from the control center, or by the reference value supplied by the control center.
  • One of the ways in which certain dishonest people use to try and understand how a pay-T.V. system works, is to observe the reaction following an attempt at modifying it. This is why the invention is equally open to a way of transmitting the result of the comparison carried out with another method, for example when the subscriber decides to accept an event, and a subscriber generated message is sent to the control center.
  • It is useful to include the information that the data M1 to Mn has been changed in the message, otherwise it would be extremely difficult to make the tie between the modification of the data and the blockage of the decoder, that could happen much later.
  • According to a variation, the value of the result of the calculation Hx is transmitted to the control center. To do this, and to remain hidden, the result is divided up and included piece by piece inside administration messages used by the system.
  • The control center recomposes the Hx value piece by piece and when the value is complete, determines if there are modifications to the values.
  • One problem that is encountered when updating a large number of decoders is with the number of requests to the control center to obtain the verification.
  • One proposed solution in the sphere of this invention is to sub-divide the requests to the control center for a verification in a pseudo-random way.
  • Another solution previously described consists in sending a preliminary reference value. In this way, if the data is received correctly, which is in the majority of cases, the update can take effect without waiting for a request at the control center. This request will be carried out anyway to confirm that the update has been carried out correctly.
  • In a particular way of operating, the group considered includes a transmitter part, located inside a control center, and a receiver that can be made up of quite a large number of peripheral units which work in a similar way. The aim is to guarantee that the software sent by the transmission part is received in an authentic and complete way by each of the peripheral units. In line with the terminology used in pay television, which represents an important but not exclusive application of the invention, the peripheral units will be called IRD (Integrated Receiver Decoder) in the following part of the paper, and include a receiver, a decoder to process the signal received by the decoder and a central processing unit, or CPU, that works preferably with a non-volatile memory as in various peripherals.
  • A non-volatile memory is a memory where the contents are maintained intact even if the main current supply is cut, for example through at least one independent source of energy such as batteries. Other types of non-volatile memories can be used, such as EEPROM, Flash EPROM or FEPROM. It is these non-volatile memories that keep the data safeguarded in case of an interruption in the supply of current, and It is essential to make the IRD processor work well.
  • The information is received by the IRD coming from the control center, in the form of a stream of data arriving at the receiver of the IRD unit. In the case of coded television, or more in general interactive, the stream of data includes video information, audio information, data information, execute applications and, finally, various types of data check information.
  • In this case it is a question of guaranteeing that the information is received in the correct way and interpreted by the IRD before being stored in the operational memory, particularly the execute data, that is, the software.
  • The receiver of the IRD transmits them to a decoder, that then puts them in circulation in the IRD by means of a bus. Connected to the bus there is a specialized multimedia processor that is, in turn, connected to a monitor and to one or more loudspeakers, the aforementioned non-volatile memory and one or more optional sub-devices. It is the IRD processor (CPU) that manages and controls its correct functioning, as well as the different sub-devices, such as an interface, an auxiliary memory pack, other processors or a modem. What is more, the control center may receive exchange information, for example through a modem connected to the public telecommunications network.
  • These sub-devices themselves could be the source of errors that it then acts upon to detect and correct, especially in the case of the loading of a new version of IRD operating software and particularly of its CPU, or of certain execute programs for the IRD or its components.
  • The software and the data for which the authenticity and integrity must be guaranteed may be loaded by various means. One of these means, as has already been said, consists in sending the aforementioned receiver an update of the memory with the stream of data, including a number of heading-like data blocks M1, M2, . . . . Mn to allow the data M1 to Mn to be easily recognizable for the central unit.
  • Alternatively, or as a supplement, the data blocks may reach the IRD through one of its optional sub-devices such as the modem, for example.
  • Within the sphere of the invention, the data blocks M1, M2, . . . . Mn may be sent in clear without any drawbacks, that is to say, without yet being ciphered.
  • The method according to the invention consists, in this form, of applying first of all, during the transmission stage, a mono-directional or Hash function to a part or to all of the data blocks M1, M2, . . . . Mn to obtain a representative Hx result of the M1 to Mn group. The data blocks M1 to Mn may be processed separately just the same and obtain the Hx1 result corresponding to M1, Hx2 corresponding to M2 and Hxn corresponding to Mn. This or these Hx results are memorised by the control center for ulterior verification.
  • A particularly crucial property for the authentication of the data, concerns the systems by which the data is transmitted along public routes such as Hertzian-wave, telephonic or internet routes. In this case, an intruder may take the place of the control center and send data to modify the operation of the target system.
  • Adding a cryptogram during the transmission of the data to authenticate the latter is well known. None the less, this cryptogram only responds to the need of identifying the author of the data but it has no effect on a decoder that has lost the reference criteria.
  • The strength of the method resides, in part, in the quality of the mono-directional H function and in the ratification of these signatures by a security unit that is reputed to be impenetrable. In this way, a simple checksum does not allow the exchange of two blocks of characters in the data to be detected because the addition is reputed to be, in mathematics, commutative and associative. On the other hand, a result of a Hash function Hx is a very realistic image of x, even if it is much longer than Hx. If an exchange of characters is carried out in the group of x characters, the H(x) function will detect it immediately, and the system will no longer be able to function following its detection. The result is a security crash.
  • An important aspect of the invention is that it allows a verification of the validity of the data in the peripheral unit's memory to be carried out at any time. As a matter of fact, the presence of this check information in the security module allows the decoder to carry out an auto-verification. This verification gives a result without comparing it to the checksum normally used in the program memory. If this verification gives a result similar to the reference, the unit has various means (modem connection, cable connection) to inform an external unit, for example the control center, about the non-conformity of the program.
  • If the preferential means of the invention for generating and transmitting check information is the control center, the invention has a peripheral unit in which all or a part of the program is initially loaded with the check information such as that described above. This can be carried out during fabrication at the moment of initialization before the sale through the processor, or by downloading the check information through one of the peripherals at the moment of an initialization step.
  • BRIEF DESCRIPTION OF THE DRAWING
  • The invention is illustrated in the schematic block diagram of an IRD. (FIG. 1)
  • DETAILED DESCRIPTION OF THE INVENTION
  • An IRD, or Integrated Receiver Decoder, is represented in this diagram, making up the peripheral part of the system to which the method according to the invention is applied, and in the way described below. This IRD includes a central bus DB to which all the different modules are connected. The central module of the IRD is made up of the CPU processor which has the task of carrying out the various processes.
  • An REC receiver receives a stream of data including video and audio information, data and execute applications through various support paths such as a cable, a Hertzian antenna, a satellite dish, internet or other known technology. This REC receiver is connected to a DC interface, which is also connected to the bus (DB).
  • The following are also connected to the bus (DB):
      • A multimedia processor MP specialized in the processing of video or audio information, that sends it respectively to a monitor VD and loudspeakers AD;
      • a test channel TC, which can be connected to a tester TEST for factory regulation and for maintenance;
      • a non-volatile memory NVM, independent from the main power with its own feed source;
      • an interface INT for a smart card, which physically receives the smart-card SC;
      • an auxiliary memory or memory pack TMEM;
      • a modem MD, connected to the public network NET, adopting widely known technology and supports;
      • other processors OP, DP with various functions according to the needs of the user, in particular those used for data processing; It is the CPU that controls the updating of the software, an example of which will be described. It accepts or rejects it according to the test results carried out using the method which is the object of this invention.
  • These software versions of the IRD's CPU may arrive at the IRD through the receiver REC, through the tester TEST, through the smart-card SC or through the network NET. In the following, an example of how a stream of video and audio information arrives at the IRD through the REC receiver will be described.
  • A set of data, representing a new software version arriving at the IRD, is stored in the temporary memory TMEM of the IRD, with the service information, after being controlled regarding its authenticity and its integrity. This allows the control center to load the software version into a large number of peripherals, and to carry out an error-free installation through the IRD.
  • Once the message has been received by the IRD, the data is broken up and the different elements are stored in the temporary memory TMEM. The IRD processes the blocks M1 to Mn in the same way as when they were transmitted, but in the opposite order. It is clear that in the case where the blocks are received in ciphered form, the first operation is to decipher the data with the public cipher-key PuK to have the data in clear.
  • The next step involves carrying out a mono-directional function H on the data blocks M1 to Mn to have a result of the values Hy1 to Hyn. In the case where an error has entered into the memory blocks M1, M2, . . . . Mn during the transmission of the message, this error will show up on Hy that will be found to be different from Hx which is contained in the control block and the data M1 to Mn will be rejected.
  • These results are transmitted to the smart-card SC that is in charge of their authentication. As described before, this operation is carried out through a connection to the control center, either immediately or at a later moment.
  • Examples of the H functions are the functions MD2, MD5 and SHA-1.
  • According to another variation of the invention, the unit containing the data does not have a communication path with a control center. The data is delivered to a storage unit with the control information (R1) including the result of a mono-directional or collision-free function, called Hash function, carried out on all or a part of the data (M1 to Mn). The particularity of this control data (R1) is that, on the one hand, it contains the hash function for the set of data taken into consideration, while on the other hand that they are stored in a ciphered form k2(Hy). The storage unit can neither understand nor can modify them.
  • During the verification phase, the storage unit transmits the check information to the security unit in a ciphered form. The security unit contains the means to decipher the information, particularly for extracting the result of the hash function (Hy).
  • Moreover, according to a first variation, the storage unit carries out the hash function on the data M1 to Mn, calculates the check information Hx and transmits it to the security unit for comparison. In exchange, the security unit sends the return data (R2) to the storage unit, including the result of the comparison.
  • The storage unit is then in charge of taking the necessary measures in the case where the data is not authentic.
  • According to a second variation, the calculation of the check information Hx is carried out by the security unit, which in this case receives the data M1 to Mn from the storage unit.
  • According to a variation giving a higher level of guarantee as far as the use of the data is concerned, a cipher key k3 is added to the control data (R1) to decipher the data M1 to Mn.
  • This data is initially stored in a ciphered form and the Hash function is made in the ciphered data. When the integrity verification of the data is done for the security unit and the result is positive, the security unit, in the reply data (R2) sent to the storage unit, includes the cipher-key k3 which allows it to decipher the data M1 to Mn.
  • According to a variation of the method described above, the security unit does not send the cipher-key k3, but it is the storage unit that sends the ciphered data M1 to Mn to the security unit SC for deciphering.
  • In the same way as the previous method, this control may be carried out at any time during the operation of the storage unit.
  • The control data (R1) includes a data describer D that indicates to the storage unit how to use the data. This describer can be in the form of a table containing the addresses and the destinations of the data. In this way, it will not be possible to use the data without the describer, the latter being returned to the storage unit only if the comparison is positive.
  • It is also foreseen that a warrant is added to the control data (R1) which certifies the broadcaster of the data, in order to keep a trace of it in the security unit.

Claims (12)

1-26. (canceled)
27-42. (canceled)
43. A method to check the integrity and the authenticity of a set of data (M1 to Mn) memorized inside a data storage unit connected with a security unit (SC) including the following steps:
transmission from the storage unit to the security unit (SC) of the control data (R1) including ciphered reference check information k1(Hy) representative of the result of a mono-directional and collision-free function, carried out on all or only a part of the data (M1 to Mn);
calculation of check information (Hx) which is representative of the result of a mono-directional and collision-free function, carried out on all or only a part of the data (M1 to Mn);
comparison of the calculated value (Hx) with the deciphered reference value (Hy) by the security unit (SC) and transfer of the management data (R2) including the result of the comparison to the storage unit.
44. A method according to claim 43, characterized by the fact that the calculation is carried out by the storage unit, with the result of the calculation (Hx) being transmitted to the security unit (SC).
45. A method according to claim 43, characterized by the fact that the calculation is carried out by the security unit (SC), with the data (M1 to Mn) being transmitted from the storage unit to the security unit (SC).
46. A method according to claims 44 or 45, characterized by the fact that the control data (R1) includes a utilization describer (D) for the data (M1 to Mn), and if the result of the comparison is positive, sends the utilization describer (D) back to the storage unit in a deciphered form, to process the data (M1 to Mn) by the storage unit according to the guidelines contained in the describer (D).
47. A method according to claim 43, characterized by the fact that the control data (R1) includes a certificate that certifies the broadcaster of the data (M1 to Mn).
48. A method according to claim 43, characterized by the fact that it consists of calculating periodically, or when requested, the values (Hx) representative of the result of a so-called mono-directional and collision-free function, carried out on all or only a part of the data (M1 to Mm), with the security unit (SC) comparing the result (Hx) with the reference value (Hy).
49. A method according to claim 43, characterized by the fact that it consists of:
storing the data (M1 to Mn) in a ciphered form;
transmitting to the security unit (SC) in the control data (R1) of a deciphering key (k3) for the data (M1 to Mn).
if the result of the comparison Hx=Hy is positive, deciphering of the data (M1 to Mn) with the use of the cipher-key (k3).
50. A method according to claim 49, characterized by the fact that the deciphering operation of the data (M1 to Mn) is carried out by the storage unit, the deciphering key (k3) being transmitted by the security unit (SC).
51. A method according to claim 49 characterized by the fact that the deciphering operation of the data (M1 to Mn) is carried out by the security unit (SC), the data (M1 to Mn) being transmitted from the storage unit to the security unit (SC).
52. A method according to claim 49 characterized by the fact that it includes, inside the control data (R1), a utilization describer (D) for the data (M1 to Mn), to decipher the control data (R1) and transmit the describer (D) to the storage unit if the result of the comparison is positive, to process the data (M1 to Mn) by the storage unit according to the guidelines contained in the describer (D).
US11/199,727 1999-08-04 2005-08-09 Method and device to guarantee the integrity and authenticity of a set of data Abandoned US20050281406A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US11/199,727 US20050281406A1 (en) 1999-08-04 2005-08-09 Method and device to guarantee the integrity and authenticity of a set of data

Applications Claiming Priority (5)

Application Number Priority Date Filing Date Title
CH143899 1999-08-04
CH1438/99 1999-08-04
US10/031,178 US6961429B1 (en) 1999-08-04 2000-06-23 Method and device for guaranteeing the integrity and authenticity of a set of data
PCT/IB2000/000847 WO2001011820A1 (en) 1999-08-04 2000-06-23 Method and device for guaranteeing the integrity and authenticity of a set of data
US11/199,727 US20050281406A1 (en) 1999-08-04 2005-08-09 Method and device to guarantee the integrity and authenticity of a set of data

Related Parent Applications (2)

Application Number Title Priority Date Filing Date
US10/031,178 Division US6961429B1 (en) 1999-08-04 2000-06-23 Method and device for guaranteeing the integrity and authenticity of a set of data
PCT/IB2000/000847 Division WO2001011820A1 (en) 1999-08-04 2000-06-23 Method and device for guaranteeing the integrity and authenticity of a set of data

Publications (1)

Publication Number Publication Date
US20050281406A1 true US20050281406A1 (en) 2005-12-22

Family

ID=4210473

Family Applications (2)

Application Number Title Priority Date Filing Date
US10/031,178 Expired - Lifetime US6961429B1 (en) 1999-08-04 2000-06-23 Method and device for guaranteeing the integrity and authenticity of a set of data
US11/199,727 Abandoned US20050281406A1 (en) 1999-08-04 2005-08-09 Method and device to guarantee the integrity and authenticity of a set of data

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US10/031,178 Expired - Lifetime US6961429B1 (en) 1999-08-04 2000-06-23 Method and device for guaranteeing the integrity and authenticity of a set of data

Country Status (39)

Country Link
US (2) US6961429B1 (en)
EP (1) EP1201057B1 (en)
JP (1) JP4671088B2 (en)
KR (1) KR100782230B1 (en)
CN (1) CN1160904C (en)
AP (1) AP1496A (en)
AR (1) AR025013A1 (en)
AT (1) ATE286637T1 (en)
AU (1) AU769218B2 (en)
BG (1) BG64432B1 (en)
BR (1) BR0012987A (en)
CA (2) CA2381089C (en)
CO (1) CO5300514A1 (en)
CZ (1) CZ301928B6 (en)
DE (1) DE60017261T2 (en)
DZ (1) DZ3211A1 (en)
EA (1) EA003710B1 (en)
EE (1) EE200200055A (en)
ES (1) ES2235895T3 (en)
GE (1) GEP20033125B (en)
HK (1) HK1047205B (en)
HR (1) HRP20020101A2 (en)
HU (1) HU224845B1 (en)
IL (2) IL147589A0 (en)
IS (1) IS6188A (en)
MX (1) MXPA02000213A (en)
MY (1) MY130305A (en)
NO (1) NO332641B1 (en)
OA (1) OA12005A (en)
PA (1) PA8499301A1 (en)
PL (1) PL353208A1 (en)
PT (1) PT1201057E (en)
RS (1) RS49730B (en)
SK (1) SK1592002A3 (en)
TR (1) TR200200286T2 (en)
TW (1) TW540214B (en)
UA (1) UA66940C2 (en)
WO (1) WO2001011820A1 (en)
ZA (1) ZA200200124B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130132730A1 (en) * 2010-08-03 2013-05-23 Rainer Falk Method and System for Transmitting Control Data in a Manner that is Secured Against Manipulation

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2831757B1 (en) * 2001-10-26 2004-01-30 Canal Plus Technologies METHOD FOR VERIFYING TELEVISION RECEIVERS WITH ACCESS CONTROL AND CORRESPONDING RECEIVER
CN100337442C (en) * 2003-06-27 2007-09-12 华为技术有限公司 A method of data integrity protection in WLAN
EP1826695A1 (en) * 2006-02-28 2007-08-29 Microsoft Corporation Secure content descriptions
KR100765774B1 (en) 2006-01-03 2007-10-12 삼성전자주식회사 Method and apparatus for managing domain
DE102006006868A1 (en) * 2006-02-15 2007-08-16 Zf Friedrichshafen Ag Switching device for switching a motor vehicle transmission
KR101079592B1 (en) * 2006-11-03 2011-11-04 삼성전자주식회사 Display apparatus and information update method thereof
FI20075776L (en) * 2007-10-31 2009-05-01 Eads Secure Networks Oy End-to-end encrypted communication
US10191826B2 (en) * 2016-03-23 2019-01-29 Keysight Technologies Singapore (Holdings) Pte. Ltd. Methods, systems, and computer readable media for providing an anticipated data integrity check
US10176068B2 (en) 2016-11-29 2019-01-08 Keysight Technologies Singapore (Holdings) Pte. Ltd. Methods, systems, and computer readable media for token based message capture
CN109086612B (en) * 2018-07-06 2022-01-14 北京航空航天大学 Embedded system dynamic data protection method based on hardware implementation

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5448641A (en) * 1993-10-08 1995-09-05 Pitney Bowes Inc. Postal rating system with verifiable integrity
US5625693A (en) * 1995-07-07 1997-04-29 Thomson Consumer Electronics, Inc. Apparatus and method for authenticating transmitting applications in an interactive TV system
US6061449A (en) * 1997-10-10 2000-05-09 General Instrument Corporation Secure processor with external memory using block chaining and block re-ordering
US6959384B1 (en) * 1999-12-14 2005-10-25 Intertrust Technologies Corporation Systems and methods for authenticating and protecting the integrity of data streams and other data

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA2149067A1 (en) * 1994-06-22 1995-12-23 Joseph Anton Bednar Jr. User-identification and verification of data integrity in a wireless communication system
FR2729521A1 (en) * 1995-01-17 1996-07-19 Thomson Consumer Electronics METHOD FOR PROTECTING MANAGEMENT MESSAGES OF AN ACCESS CONTROL SYSTEM AND DEVICE FOR IMPLEMENTING SAID METHOD
JP2000514625A (en) * 1996-07-11 2000-10-31 ジェムプリュス エス.セー.アー. Synchronization and security method of short enhanced message exchange and short enhanced message exchange in cellular wireless communication system
AU8670598A (en) 1997-08-01 1999-02-22 Scientific-Atlanta, Inc. Verification of the source of program of information in a conditional access system
US6201798B1 (en) 1997-11-14 2001-03-13 Worldspace Management Corporation Signaling protocol for satellite direct radio broadcast system
US6069647A (en) * 1998-01-29 2000-05-30 Intel Corporation Conditional access and content security method
US20010048669A1 (en) 2000-04-14 2001-12-06 Frank Kelly System interfaces in a two-way satellite system
DE10031178A1 (en) 2000-06-27 2002-01-17 Siemens Ag Position determination method for radio communications subscriber device uses measuring signal transmitted in time frame slot which is free of real-time data

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5448641A (en) * 1993-10-08 1995-09-05 Pitney Bowes Inc. Postal rating system with verifiable integrity
US5625693A (en) * 1995-07-07 1997-04-29 Thomson Consumer Electronics, Inc. Apparatus and method for authenticating transmitting applications in an interactive TV system
US6061449A (en) * 1997-10-10 2000-05-09 General Instrument Corporation Secure processor with external memory using block chaining and block re-ordering
US6959384B1 (en) * 1999-12-14 2005-10-25 Intertrust Technologies Corporation Systems and methods for authenticating and protecting the integrity of data streams and other data

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130132730A1 (en) * 2010-08-03 2013-05-23 Rainer Falk Method and System for Transmitting Control Data in a Manner that is Secured Against Manipulation
US9252956B2 (en) * 2010-08-03 2016-02-02 Siemens Aktiengesellschaft Method and system for transmitting control data in a manner that is secured against manipulation

Also Published As

Publication number Publication date
DE60017261D1 (en) 2005-02-10
US6961429B1 (en) 2005-11-01
EP1201057B1 (en) 2005-01-05
CN1360772A (en) 2002-07-24
GEP20033125B (en) 2003-11-25
CN1160904C (en) 2004-08-04
PL353208A1 (en) 2003-11-03
TR200200286T2 (en) 2002-06-21
ATE286637T1 (en) 2005-01-15
UA66940C2 (en) 2004-06-15
MXPA02000213A (en) 2003-08-20
EA200200102A1 (en) 2002-06-27
JP2003506963A (en) 2003-02-18
HK1047205B (en) 2005-02-25
OA12005A (en) 2006-04-19
HU224845B1 (en) 2006-03-28
HUP0201567A2 (en) 2002-09-28
NO332641B1 (en) 2012-11-26
CZ200277A3 (en) 2002-05-15
HRP20020101A2 (en) 2003-12-31
NO20020460D0 (en) 2002-01-29
AR025013A1 (en) 2002-11-06
NO20020460L (en) 2002-01-29
RS49730B (en) 2008-04-04
BG64432B1 (en) 2005-01-31
PA8499301A1 (en) 2002-09-17
DZ3211A1 (en) 2001-02-15
SK1592002A3 (en) 2002-05-09
JP4671088B2 (en) 2011-04-13
CO5300514A1 (en) 2003-07-31
KR20020022092A (en) 2002-03-23
CA2381089C (en) 2010-02-16
PT1201057E (en) 2005-05-31
DE60017261T2 (en) 2005-12-08
WO2001011820A1 (en) 2001-02-15
BG106305A (en) 2002-08-30
AP2002002408A0 (en) 2002-03-31
HK1047205A1 (en) 2003-02-07
EE200200055A (en) 2003-04-15
YU90001A (en) 2003-07-07
IS6188A (en) 2001-11-29
CA2381089A1 (en) 2001-02-15
AU5417500A (en) 2001-03-05
CA2686435A1 (en) 2001-02-15
KR100782230B1 (en) 2007-12-05
AU769218B2 (en) 2004-01-22
EP1201057A1 (en) 2002-05-02
ES2235895T3 (en) 2005-07-16
BR0012987A (en) 2002-04-23
IL147589A (en) 2007-07-04
ZA200200124B (en) 2003-04-30
EA003710B1 (en) 2003-08-28
MY130305A (en) 2007-06-29
CZ301928B6 (en) 2010-08-04
TW540214B (en) 2003-07-01
IL147589A0 (en) 2002-08-14
AP1496A (en) 2005-11-17

Similar Documents

Publication Publication Date Title
US20050281406A1 (en) Method and device to guarantee the integrity and authenticity of a set of data
US5390252A (en) Authentication method and communication terminal and communication processing unit using the method
US7693797B2 (en) Transaction and payment system security remote authentication/validation of transactions from a transaction provider
US4723284A (en) Authentication system
CN103067333B (en) The method of proof machine top box access identity and certificate server
EP1163589A4 (en) Authentication enforcement using decryption and authentication in a single transaction in a secure microprocessor
CN107248075A (en) A kind of method and device for realizing bidirectional authentication of smart secret key equipment and transaction
CN103765843A (en) Method and apparatus for authenticating users of a hybrid terminal
JP2002300152A (en) Communication security keeping method, its execution device, and its processing program
US6473742B1 (en) Reception apparatus for authenticated access to coded broadcast signals
CN111461799B (en) Data processing method, data processing device, computer equipment and medium
CN111444496A (en) Application control method, device, equipment and storage medium
CN109492371A (en) A kind of digital certificate sky forwarding method and device
EP2337347A1 (en) Method and processing unit for secure processing of access controlled audio/video data
CN111369332A (en) Data processing method and device based on block chain
KR20070109442A (en) Set-top box including remote controller having otp generating function and system and method for electronic commerce using the same
CN114128207A (en) Data distribution system, data processing device, and program
CA2427175A1 (en) Method for eliminating an error in a data processing unit
EP4250209A1 (en) Devices, methods and a system for secure electronic payment transactions
JP3495232B2 (en) Prepaid card system, authentication system, reading device and device authentication method
CN101227466A (en) Content providing apparatus and method, content using apparatus and method, and content providing apparatus and method for revoking content using apparatus

Legal Events

Date Code Title Description
AS Assignment

Owner name: NAGRAVISION S.A., SWITZERLAND

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:HILL, MICHAEL JOHN;NICOLAS, CHRISTOPHE;SASSELLI, MARCO;REEL/FRAME:016881/0260

Effective date: 20020124

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION