Patent application number | Description | Published |
20080276083 | Method for Transmitting a Message Containing a Description of an Action to be Executed in a Receiver Equipment - The invention relates to a method for transmitting a message to a reception equipment by an operator, the message containing a description of an action to be executed in the said equipment at a time chosen by the operator. | 11-06-2008 |
20090031411 | Method and sytsem for assuring security of a transaction in a telecommunication network - The invention relates to a method for assuring security of a commercial transaction between a terminal ( | 01-29-2009 |
20090083838 | Method and System For Assuring Security of a Transaction in a Telecommunicaiton Network - The invention relates to a method for a beneficiary to acquire a right to use a digital content in a contents distribution system comprising a commercial server ( | 03-26-2009 |
20090323949 | METHOD OF TRANSMITTING AN ADDITIONAL PIECE OF DATA TO A RECEPTION TERMINAL - The invention relates to a method of transmitting at least one additional piece of data D in a list of access control words CWi to a scrambled content transmitted by a content server of an operator to a user equipment ( | 12-31-2009 |
20100017605 | METHOD OF DETECTING AN ABNORMAL USE OF A SECURITY PROCESSOR - The invention relates to a method of detecting an abnormal use of a security processor invoked by at least one receiving terminal in order to control access to a scrambled digital content supplied by at least one operator to said receiving terminal. | 01-21-2010 |
20100024043 | METHOD FOR CONTROLLING ACCESS TO A SCRAMBLED DIGITAL CONTENT - A method for controlling access by a secret key K to a scrambled digital content distributed, along with the security data D(K) calculated on the basis of K, by an operator equipped with a content server and an access-rights server to at least one receiving terminal comprising a plurality of access-control modules, each access-control module implementing a specific technology for determining the secret key K. The rights server prior to distribution incorporates into said security data D(K) a selection criterion for selecting an access-control module from among the plurality of the terminal's access-control modules to process said security data D(K), after which when one of said access-control modules receives said security data D(K), said access-control module analyses the data D(K) to obtain said selection criterion and, on the basis of its value, terminates processing the data D(K) in order to attempt to obtain the secret key K or transmits a portion or the entirety of said security data D(K) to at least one of the other access-control modules. | 01-28-2010 |
20130145147 | Content Protection Method - A method for protecting content to be distributed to a pool of receiving terminals connected to a content distribution network and each having a specific security level depending on the technical securing means used, the method comprising the following steps:
| 06-06-2013 |