DE10204832A1 - Method for protecting access control module from unsanctioned usage in host device, requires unique identity code for transmission to access control module - Google Patents
Method for protecting access control module from unsanctioned usage in host device, requires unique identity code for transmission to access control moduleInfo
- Publication number
- DE10204832A1 DE10204832A1 DE2002104832 DE10204832A DE10204832A1 DE 10204832 A1 DE10204832 A1 DE 10204832A1 DE 2002104832 DE2002104832 DE 2002104832 DE 10204832 A DE10204832 A DE 10204832A DE 10204832 A1 DE10204832 A1 DE 10204832A1
- Authority
- DE
- Germany
- Prior art keywords
- access control
- control module
- volatile memory
- host device
- identity code
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/43—Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
- H04N21/442—Monitoring of processes or resources, e.g. detecting the failure of a recording device, monitoring the downstream bandwidth, the number of times a movie has been viewed, the storage space available from the internal hard disk
- H04N21/44236—Monitoring of piracy processes or activities
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/41—Structure of client; Structure of client peripherals
- H04N21/418—External card to be used in combination with the client device, e.g. for conditional access
- H04N21/4181—External card to be used in combination with the client device, e.g. for conditional access for conditional access
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/43—Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
- H04N21/442—Monitoring of processes or resources, e.g. detecting the failure of a recording device, monitoring the downstream bandwidth, the number of times a movie has been viewed, the storage space available from the internal hard disk
- H04N21/44231—Monitoring of peripheral device or external card, e.g. to detect processing problems in a handheld device or the failure of an external recording device
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/16—Analogue secrecy systems; Analogue subscription systems
- H04N7/162—Authorising the user terminal, e.g. by paying; Registering the use of a subscription channel, e.g. billing
- H04N7/163—Authorising the user terminal, e.g. by paying; Registering the use of a subscription channel, e.g. billing by receiver means only
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Multimedia (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Databases & Information Systems (AREA)
- Health & Medical Sciences (AREA)
- Virology (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Automation & Control Theory (AREA)
- Storage Device Security (AREA)
Abstract
Description
Die vorliegende Erfindung betrifft ein Verfahren zum Schutz eines Zugangskontrollmoduls gegen unbeabsichtigte Benutzung in einer Host-Vorrichtung, die Anwendungen ausführt, die sichere Transaktionen und/oder die Zugangskontrolle zu werthaltigen Inhalten und/oder Dienstleistungen umfassen. The present invention relates to a method for protecting a Access control module against unintended use in a host device that Applications that execute secure transactions and / or access control to include valuable content and / or services.
Typische Gebiete für die erfindungsgemäße Methode sind DVB (Digital Video Broadcast), POD-Netzwerke (POD = Point of Deployment) und andere Netzwerke, die einen Zugang zu werthaltigen Dienstleistungen oder Ereignissen auf einer Abonnentenbasis herstellen. Ein autorisierter Abonnent benutzt ein Zugangskontrollmodul (CAM = Conditional Access Module), das in eine Host- Vorrichtung wie eine Set-Top-Box (STB) eingesteckt oder eingebettet ist, und eine Abonnentenkarte, die in ein Kartenlesegerät eingesteckt wird. Typical areas for the method according to the invention are DVB (digital Video broadcast), POD networks (POD = Point of Deployment) and others Networks that provide access to valuable services or events on a subscriber basis. An authorized subscriber uses one Access control module (CAM = Conditional Access Module), which is integrated into a host Device such as a set-top box (STB) is inserted or embedded, and a subscriber card that is inserted into a card reader.
In bestehenden Systemen ist die Abonnentenkarte eine Smartcard (SC) und das Zugangskontrollmodul ist eine PC-Karte (PCMCIA-Standard) und umfaßt ein Chipkartenlesegerät für die Aufnahme der Smartcard. Die Set-Top-Box hat eine gemeinsame Schnittstelle (CI = Common Interface) zur Aufnahme des Zugangskontrollmoduls. In alternativen Systemen ist das Zugangskontrollmodul in die Set-Top-Box eingebettet. Das Zugangskontrollmodul kann einen Entschlüsselungsschaltkreis und einen nicht-flüchtigen Speicher umfassen, der unter anderem zur Speicherung von Informationen dient, die individuelle Zugangsrechte und prozeduren festlegen. In existing systems, the subscriber card is a smart card (SC) and the access control module is a PC card (PCMCIA standard) and includes one Smart card reader for the smart card. The set-top box has one common interface (CI = Common Interface) for recording the Access control module. In alternative systems, the access control module is in the Set-top box embedded. The access control module can be one Decryption circuitry and non-volatile memory include, among others serves to store information, individual access rights and set procedures.
Obwohl die Sicherheitsfunktion in Zugangskontrollmodulen hauptsächlich in der Smartcard untergebracht ist, können Versuche, durch Austauschen oder Überschreiben des nicht-flüchtigen Speichers ungenehmigten Zugang zu erhalten, erfolgreich sein. Although the security function in access control modules is mainly in the smart card is housed, attempts to exchange or Overwrite the non-volatile memory to get unauthorized access be successful.
Die vorliegende Erfindung stellt ein effizientes und außerdem leicht einzuführendes Verfahren zum Schutz eines Zugangskontrollmoduls gegen unbeabsichtigte Nutzung in einer Host-Vorrichtung bereit, die Anwendungen ausführt, die sichere Transaktionen und/oder Zugangskontrolle zu werthaltigen Inhalten und/oder Dienstleistungen umfaßt. The present invention provides an efficient and also easy Procedure to be implemented to protect an access control module against unintended use in a host device that is running applications that are ready secure transactions and / or access control to valuable content and / or services.
Grundsätzlich beruht die Erfindung auf der Idee, ein Paar aus jedem Zugangskontrollmodul und einer bestimmten Host-Vorrichtung zu bilden, so daß, wenn anfänglich einmal ein Paar gebildet wurde, das Zugangskontrollmodul nur noch mit dieser bestimmten Host-Vorrichtung zusammen benutzt werden kann. Vorzugsweise wird die Host-Vorrichtung ein neues Zugangskontrollmodul nur zur Ausführung einer anfänglichen Paarbildung erkennen und akzeptieren. Die Host- Vorrichtung wird weiter vorzugsweise ein Zugangskontrollmodul auf jede mögliche Verfälschung von spezifischen Inhalten im nicht-flüchtigen Speicher überprüfen und ein verfälschtes Zugangskontrollmodul zurückweisen. Basically, the invention is based on the idea of a pair of each Access control module and a particular host device so that when initially a pair was formed, the access control module only can be used with this particular host device. Preferably, the host device becomes a new access control module only Recognize and accept execution of an initial pairing. The host Device is further preferably an access control module on each possible corruption of specific content in the non-volatile memory check and reject a falsified access control module.
Dies hat zum Ergebnis, daß jeder Versuch, durch Austauschen oder Überschreiben des nicht-flüchtigen Speichers ungenehmigten Zugang zu bekommen, nicht erfolgreich sein wird. Ein wichtiger Gesichtspunkt des erfindungsgemäßen Verfahrens ist, daß es in der bestehenden Hardware implementiert werden kann. As a result, every attempt, by swapping or Overwriting the non-volatile memory to get unauthorized access will not be successful. An important aspect of the invention The process is that it can be implemented in existing hardware.
In der bevorzugten Ausführungsform wird ein Versuch, ein bestimmtes Zugangskontrollmodul, das mit einer bestimmten Set-Top-Box ein Paar bildet, in Verbindung mit einer anderen Set-Top-Box zu benutzen, dazu führen, daß der nicht-flüchtige Speicher mit bestimmten Informationen, die für einen definierten Zustand der Verfälschung kennzeichnend sind, gekennzeichnet, das heißt teilweise überschrieben wird. Ein Zugangskontrollmodul, das sich in einem solchen definierten Zustand der Verfälschung befindet, kann nicht in der Set-Top-Box benutzt werden, kann aber durch eine autorisierte Entität, wie einen Anbieter von Inhalten, wiederhergestellt werden. Ein Zugangskontrollmodul in irgend einem anderen fehlerhaften Zustand wird von der Set-Top-Box zurückgewiesen und kann nicht wiederhergestellt werden. In the preferred embodiment, an attempt is made to a particular one Access control module that pairs with a specific set-top box Using a connection with another set-top box will cause the non-volatile memory with specific information for a defined State of the adulteration are characteristic, marked, that is is partially overwritten. An access control module located in one defined state of the adulteration cannot be in the set-top box can be used by an authorized entity, such as a provider of Content to be restored. An access control module in any one other faulty condition is rejected by the set top box and cannot be restored.
Weitere Einzelheiten der Erfindung ergeben sich aus den Zeichnungen und aus den Ansprüchen. In den Zeichnungen zeigen: Further details of the invention emerge from the drawings and the claims. The drawings show:
Fig. 1 ein Flußdiagramm eines Paarbildungsverfahrens; und FIG. 1 is a flowchart of a pairing method; and
Fig. 2 ein Flußdiagramm eines Verfahrens zur Prüfung der Paarbildung. Fig. 2 is a flow diagram of a method for checking the pairing.
In der beispielhaften Ausführungsform, die in diesen Flußdiagrammen dargestellt ist, hat das Zugangskontrollmodul einen Zufallszahlengenerator und einen geschützten Speicher mit einem darin gespeicherten geheimen Verschlüsselungsalgorithmus. Der geheime Verschlüsselungsalgorithmus kann eine private Hash- Funktion sein. Das Zugangskontrollmodul hat einen nicht-flüchtigen Schreib/Lesespeicher, der in den Flußdiagrammen als Flash bezeichnet wird. In the exemplary embodiment shown in these flow charts the access control module has a random number generator and one protected memory with a secret stored in it Encryption algorithm. The secret encryption algorithm can be a private hash Function. The access control module has a non-volatile one Read / write memory, which is referred to as flash in the flowcharts.
Claims (7)
Übertragung des einmaligen Identitätscodes von der Host-Vorrichtung an das Zugangskontrollmodul;
Lesen der Zufallszahl und des einmaligen Paarbildungscodes aus dem nicht- flüchtigen Speicher;
Verschlüsselung der Zufallszahl und des einmaligen Identitätscodes mit dem geheimen Verschlüsselungsalgorithmus und Vergleich des Ergebnisses mit dem einmaligen Paarbildungscode;
Erlaubnis zur ordnungsgemäßen Ausführung der Anwendung nur dann, wenn der Vergleich erfolgreich war. 5. The method of any preceding claim, wherein the access control module is connected to the host device for executing an application; and further includes the following steps that are performed at least each time the access control module is reset:
Transmission of the unique identity code from the host device to the access control module;
Reading the random number and the unique pairing code from the non-volatile memory;
Encrypting the random number and the unique identity code with the secret encryption algorithm and comparing the result with the unique pairing code;
Permission to run the application properly only if the comparison was successful.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| DE2002104832 DE10204832A1 (en) | 2002-02-06 | 2002-02-06 | Method for protecting access control module from unsanctioned usage in host device, requires unique identity code for transmission to access control module |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| DE2002104832 DE10204832A1 (en) | 2002-02-06 | 2002-02-06 | Method for protecting access control module from unsanctioned usage in host device, requires unique identity code for transmission to access control module |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| DE10204832A1 true DE10204832A1 (en) | 2003-08-14 |
Family
ID=27588412
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| DE2002104832 Ceased DE10204832A1 (en) | 2002-02-06 | 2002-02-06 | Method for protecting access control module from unsanctioned usage in host device, requires unique identity code for transmission to access control module |
Country Status (1)
| Country | Link |
|---|---|
| DE (1) | DE10204832A1 (en) |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| EP2645729A1 (en) * | 2012-03-30 | 2013-10-02 | Nagravision S.A. | Security device for Pay-TV receiver/decoder |
-
2002
- 2002-02-06 DE DE2002104832 patent/DE10204832A1/en not_active Ceased
Cited By (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| EP2645729A1 (en) * | 2012-03-30 | 2013-10-02 | Nagravision S.A. | Security device for Pay-TV receiver/decoder |
| WO2013144378A1 (en) | 2012-03-30 | 2013-10-03 | Nagravision S.A. | Security device for pay-tv receiver decoder |
| US9686580B2 (en) | 2012-03-30 | 2017-06-20 | Nagravision S.A. | Security device for pay-tv receiver decoder |
| US9819988B2 (en) | 2012-03-30 | 2017-11-14 | Nagravision S. A. | Security device for pay-TV receiver decoder |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| DE60308990T2 (en) | PROTECTION OF A DEVICE AGAINST UNWANTED USE IN A SAFE ENVIRONMENT | |
| DE69626530T2 (en) | PROTECTION OF SOFTWARE AGAINST USE WITHOUT PERMISSION | |
| DE69527773T2 (en) | Circuit arrangement for monitoring the use of functions in an integrated circuit | |
| DE69507129T2 (en) | CHARGE PROTECTION FOR A DATA SECURITY DEVICE | |
| EP3259698B1 (en) | Autonomously booting system with a security module | |
| DE69827742T2 (en) | METHOD FOR STORING AND WORKING SENSITIVE INFORMATION IN A SAFETY MODULE AND ASSOCIATED SAFETY MODULE | |
| DE112008003931T5 (en) | Systems and procedures for data security | |
| DE102009041176B4 (en) | A compiler system and method for compiling a source code into an encrypted machine language code | |
| DE10162306A1 (en) | Method and arrangement for verifying NV fuses as well as a corresponding computer program product and a corresponding computer-readable storage medium | |
| DE102020119389A1 (en) | Device and method for the secure management of keys | |
| US20110083020A1 (en) | Securing a smart card | |
| DE102009007345A1 (en) | Safety device for protecting data stored in external memory e.g. multi media card, has controller to prevent coded memory access over interface or prevents output of data over other interface based on data received over former interface | |
| DE60100363T2 (en) | SEQUENCE NUMBERING MECHANISM FOR SECURING EXECUTION INTEGRITY OF INTERDEPENDENT SMART CARD APPLICATIONS | |
| EP0280035B1 (en) | Method for the programme securing and for integrity checking of a secured programme | |
| DE102019008059A1 (en) | Side channel attack countermeasure for safe bootloading | |
| EP1425723B1 (en) | Initialization of a chip card | |
| DE10340861A1 (en) | A processor circuit and method for associating a logic chip with a memory chip | |
| DE602004011965T2 (en) | PROCEDURE AND CIRCUIT FOR IDENTIFYING AND / OR VERIFYING HARDWARE AND / OR SOFTWARE OF A DEVICE AND A DEVICE WORKING WITH THE DEVICE | |
| DE10204832A1 (en) | Method for protecting access control module from unsanctioned usage in host device, requires unique identity code for transmission to access control module | |
| DE112006004173T5 (en) | Protecting a programmable memory against unauthorized modification | |
| WO2006072568A1 (en) | Portable data support with watermark function | |
| DE102021126509B4 (en) | Portable chip device and method for performing a software module update in a portable chip device | |
| DE102005038106A1 (en) | Method for securing the authentication of a portable data carrier against a reader via an insecure communication path | |
| DE10162307A1 (en) | Production of mask-programmed ROMs, using a mask containing several systems, whereby encryption using the mask is carried out so that the produced systems have different keys | |
| EP1643405A1 (en) | tamper-proof microprocessor system and method of operation thereof |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 8127 | New person/name/address of the applicant |
Owner name: SMARDTV S.A., CHESEAUX-SUR-LAUSANNE, CH |
|
| 8128 | New person/name/address of the agent |
Representative=s name: PRINZ UND PARTNER GBR, 80335 MUENCHEN |
|
| 8110 | Request for examination paragraph 44 | ||
| 8131 | Rejection |