This method of smoothing the workload of a transaction server executing processes in response to requests transmitted by terminals this method comprising: for each terminal the logging (100) of the instants of toggling between an active state and an inactive state the construction (100) for each terminal on the ba...
This method for renewing the code of an algorithm comprises:
- receiving (122) a randomly drawn seed whose size in terms of number of bits, is at least four times smaller than the number of bits needed to encode the N numerical constants of the cryptographic algorithm,
- expanding (128) the seed deterministically ...
The invention relates to a verification of the authenticity of a message (M) transmitted by a transmitting unit (95) to a receiver unit (96) with a cryptographic redundancy corresponding to a message authentification code (MAC) calculated from a block encryption. According to the invention, instead of verifying the ...
This method for sending a stream of plain images comprises the conversion (108) by means of a secret invertible transform of the images of the plain image stream to obtain a converted image stream that is encoded and sent instead of the plain image stream this secret invertible transform converting each image of ...
The hierarchical access control method includes:
- the reception (100) and transnnission (106) to a security processor of second cryptograms, (CWi)Ki for i included between 1 and k-1, which are obtained by enciphering control words CW1 to CWK-1 with keys K1 to Kk-1 respectively, which are constructed with at least ...
The method of the invention comprises: a) determining (64, 68) at least one limit based on N already received identifiers, where N is strictly higher than the number of identifiers that can be contained in an anti-replay memory, the limit being determined so as to define, on the one hand, a range of identifiers that...
The invention relates to a method for loading the code of at least one software module in a main memory by a security processor in which: a bootstrap loader also loads (170) the code of the software module in the main memory before the execution of an operating system is launched into a range of addresses of the mai...
The invention relates to a method for decrypting control words for a first and second terminal, that includes: a control word server that transmits (162) to the first terminal a control word CW2,t obtained by decrypting a cryptogram CW*2,t transmitted by the second terminal even before the first terminal changes a d...
The method in which an attempt to attack a security processor is detected by the security processor itself comprises:
measurements (50) of several different events occurring independently of one another in the absence of attack attempts
:building (52) the value of at least one attack indicator as a function of a...
The invention relates to a method of transmitting at least one complementary datum D in a list of control words CWi for access to a scrambled content transmitted by a content server of an operator of user equipment (2) comprising a reception terminal (4) associated with a security processor (6), each control word CW...
This method for detecting an illicit use of a security processor used for the descrambling of different multimedia contents disseminated on several respective channels comprises:
- the incrementing (153) of a counter Kchi by a predetermined step whenever, after verification, a message ECMi,c is received within a ti...
The invention relates to a method for detecting the abnormal use of a safety processor called by at least one reception terminal for controlling the access to a scrambled digital content provided by at least one operator to said reception terminal. The method comprises the following steps: analysing the use of the s...
The invention relates to a method for controlling access by a secret key K to a scrambled digital content distributed, along with the security data D(K) calculated on the basis of K, by an operator equipped with a content server and an access-rights server to at least one receiving terminal comprising a plurality of...
ABSTRACT
The invention relates to a method for
access control to a digital scrambled content
distributed to a set of installed reception terminals
comprising one master terminal and at least one slave
terminal dependent on said master terminal, method in
which the slave terminal systematically or occasionally
...
This security method for scrambled multimedia signal decoder comprises at least one rewritable lock (62, 64), the value of which can be toggled at least between a first and a second value in response to an EMM message, and in which a registration module is able, in response to one and the same EMM registration messa...
Abstract
METHODS FOR BROADCASTING AND RECEIVING A SCRAMBLED
MULTIMEDIA PROGRAMME, NETWORK HEAD, TERMINAL,
RECEIVER AND SECURITY PROCESSOR
FOR THESE METHODS
A method of broadcasting a scrambled multimedia programme, by way of a broadband network, in wliich before transmitting a licence key; - a network head carr...
Abstract
SECURITY PROCESSOR AND RECORDING METHOD AND MEDIUM FOR CONFIGURING THE BEHAVIOUR OF THIS PROCESSOR
Security processor (42) for a decoder able to receive a scrambled multimedia signal, this processor comprising: - at least one first rewritable lock (FIELDKEY, FIELDPIEMM, FIELDPIEMMC, FIELDPIECM, FIELDFCT) ...
A method of establishing a session key Ks for a
session between a unit for descrambling scrambled
multimedia signals and a removable cryptographic unit,
wherein: - one of the units sends (steps 166, 184) the
other unit a message containing a received random number,
a term a and a signature of the random number ...
Abstract
METHOD OF ESTABLISHING A CRYPTOGRAPHIC KEY,
NETWORK HEAD AND RECEIVER FOR THIS METHOD,
AND METHOD OF TRANSMITTING SIGNALS
This method of establishing a cryptographic session key comprises: a subscription phase (104) during which an identifier of a local loop to the end of which a receiver must be connec...
This method comprises:
the modification (114), whenever a second multimedia content is viewed by means of an electronic receiver, of the value of the counter as a function of the instructions on progression associated with this second multimedia content,
the storage (114) of the value of this counter between ...
The conditional jump authorizes the execution of a specific processing operation on a data element D if a Boolean expression between one or more operands is verified and, if not, prohibits the execution of the specific processing operation on the data element D. The method for securing this conditional jump comprise...
The invention relates to a method for protecting content (6) scrambled by a content key (CW) transmitted in an encrypted form using a content-access key (K), said content being provided by a transmission system to at least one reception terminal (4) using a locally configured service at said reception terminal accor...
The invention concerns a method for decrypting control words for terminals that are mechanically and
electronically independent of one another wherein a control word server:
– determines (164) selectively for each terminal a number of additional control words CWs to be transmitted to the terminal as a functio...
This method for protecting the transmission of a multimedia content or of a control word between a security processor and a terminal comprises:
- the advance recording in the terminal of several secret codes Ci-1 each secret code Ci-1 enabling solely the decryption of the multimedia content or of the control word...
The invention relates to a method of transmitting and receiving a multimedia content scrabbled with the aid of a control word CW comprising: the encryption (216) of the control word CW with the aid of a mother virtual card so as to obtain a cryptogram CW* the generation (220) of a message ECM incorporating the cry...
The invention pertains to a method for sending an enciphered multimedia content in bursts, wherein the replacing (110; 140) of a current enciphering key TEKj by another current key TEKj+1 to encipher a segment Pi of the multimedia content is delayed until after an instant tdi + TSTKM brought forward to or before an ...
The invention relates to a method of protecting a content to be distributed to a pool of receiving terminals connected to a content distribution network and each having a specific level of security dependent on the technical security means used method comprising the following steps: at the sending end generating a ...
The invention relates to a method for securing a number n greater than or equal to 1 of messages MUi (i= 1 to n) transmitted by a transmitting terminal to a receiving terminal in which,
Before transmitting, the transmitting terminal, a- generating an ordered sequence comprising N data
blocks Bj, (j= 1 to N), wh...
The invention relates to a method for transmitting an additional datum from a security processor to an external device, in which the transmission of the additional datum is carried out by delaying (98) the beginning of an information frame transmission from the security processor to the external device for a duratio...
Documents
CERTIFICATE FOR CLOSURE OF PLACE OF BUSINESS-20160510
-25042016
Optional Attachment-(1)-25042016
Details of directors and key managerial personnel and their remuneration-260216.PDF
Details of penalties-punishment-Compounding of offences-260216.PDF
Details of Promoters - Directors and Key managerial personnel and changes.-260216.PDF
Details of the meeting of the members or class thereof- board and its various committees along with attendance-260216.PDF
Optional Attachment 1-260216.PDF
Particulars of Holding- subsidiary and associate companies and firms has not been attached-260216.PDF
Particulars of members and debenture holders along with changes therein since the close of previous financial year-260216.PDF
Form FC-2-211115.PDF
Copy of the Board resolution- if any--211115.PDF
Form FC-3-300915.OCT
Copy of amended document memorandum-300915.PDF
Copy of the general meeting resolution.-300915.PDF
Form FC-3-081214.OCT
Copy of amended document memorandum-081214.PDF
Copy of the general meeting resolution.-081214.PDF
Form 52-271213.PDF
Optional Attachment 1-271213.PDF
Annual accounts-271213.PDF
Form 52-281212.PDF
Annual accounts-281212.PDF
Optional Attachment 1-281212.PDF
Certificate of establishment of business in India-080411.PDF
Certificate of establishment of business in India-080411.PDF
Optional Attachment 1-190411.PDF
Form 67 -Addendum--190411 in respect of Form 44-080411.PDF