Sign In to Follow Application
View All Documents & Correspondence

Protection Method&Nbsp; Decrypting Method&Nbsp; Recording Medium And Terminal For Thisprotection Method

Abstract: This method for protecting the transmission of a multimedia content or of a control word between a security processor and a terminal comprises: - the advance recording in the terminal of several secret codes Ci-1  each secret code Ci-1 enabling solely the decryption of the multimedia content or of the control word encrypted by a respective session key SKi obtained by diversification of the key SK_root with a parameter Pi  one of the parameters Pi being the parameter Pc  - the reception (122) of the parameter Pc by the terminal in a message also containing a multimedia content or a control word to be decrypted by the security processor  and - the selection (132) by the terminal  from among the set of recorded secret codes  of the secret code Cc-1 to be used  as a function of the parameter Pc or another parameter contained in the same message.

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
22 November 2012
Publication Number
07/2014
Publication Type
INA
Invention Field
ELECTRONICS
Status
Email
Parent Application

Applicants

Viaccess
Les Collines de l"Arche  Tour Operera C 92057 PARIS L a Défense France

Inventors

1. POCHON Nicolas
6 Rue Leopold Robert  F75014 Paris  France
2. CHIEZE Quentin
56 Rue De Douai  FR75009 Paris  France
3. LAFRANCHE Stephane
14 Bis Avenue De Saint Mande  FR75012 Paris  France

Specification

[001] The invention pertains to a method for protecting the transmission of a multimedia content or a control word between a security processor and a terminal. An object of the invention is also a method for decrypting a multimedia content or a control word as well as a recording medium and a terminal to implement this protection method.
[002] The term “multimedia content” herein designates a content to be displayed on a screen and/or to be played back via speakers. Typically  a multimedia content is a sequence of an audiovisual program such as a television broadcast or a film.
[003] To secure the transmission of multimedia contents towards terminals via a public network  the multimedia contents are scrambled with control words and then transmitted on this public network.
[004] More specifically  a control word is a word encoded on several information bits used to scramble a cryptoperiod of the multimedia content. A cryptoperiod is a period of the multimedia content that is scrambled with the same control word and during which the rights of access to this multimedia content are not modified.
[005] Here  the terms “scramble” and “encrypt” are considered to be synonyms. This is also the case for the terms “descramble” and “decrypt”.
[006] To secure the transmission of control words towards terminals by the intermediary of the public network  these control words are also encrypted before transmission  for example with a subscription key Ka.
[007] A security processor is a processor that processes confidential information such as cryptographic keys or cryptographic algorithms. To preserve the confidentiality of this information  such a processor is designed to be as robust as possible against attack attempts conducted by computer hackers. It is therefore more robust against these attacks than other components of the terminal. In many applications  this security processor is detachable  i.e. it can easily be introduced into and removed from the terminal in alternation. In this case  it often takes the form of a chip card.
[008] In the context of the scrambling of multimedia contents  the security processor contains secret information enabling the descrambling of the multimedia content received by a terminal. More specifically  there are two possible modes of operation for this security processor:
– either the security processor itself descrambles the multimedia content and transmits the descrambled multimedia content to the terminal 
– or the security processor decrypts the control word and transmits the decrypted control word to the terminal.
[009] If no precaution is taken  the descrambled multimedia content or the decrypted control word is transmitted in plain or unencrypted form from the security processor to the terminal.
[0010] The term “plain” or "in plain form" designates the state of a piece of information corresponding to its state before it is scrambled or encrypted by secret control words or secret keys.
[0011] The plain multimedia content or plain control word transmitted on the interface between the security processor and the terminal is vulnerable. Attacks have been devised to exploit this vulnerability. For example  it has been proposed to pick up the plain control word on this interface and then illicitly broadcast it to other terminals.
[0012] To overcome this drawback  it has already been proposed to encrypt the multimedia content of the control word transmitted from the security processor to the terminal.
[0013] Thus  there are methods for protecting the transmission of a multimedia content or a control word between the security processor and the terminal wherein:
– the security processor builds a current session key SKc by diversification of a root key SK_root as a function of a parameter Pc transmitted by the terminal 
– the security processor decrypts the multimedia content or the control word and then encrypts the decrypted multimedia content or the decrypted control word with the current session key SKc and finally transmits the multimedia content or the control word encrypted with the current session key SKc to the terminal  and
– the terminal decrypts the multimedia content or the control word encrypted with the built key SKc by means of a secret code Cc-1 to obtain the plain multimedia content or the plain control word.
[0014] For example  a method of this kind is disclosed in the patent application EP 1 867 096. In this prior art method  the parameter Pc is an identifier of the terminal.
[0015] However  it can happen that the security of the current session key SKc gets compromised. For example  hacking attempts are made to discover this current session key and/or the root key SK_root from which it has been built.
[0016] If the security of the current session key has been compromised  it must be renewed. The renewal of a session key is a lengthy and complicated process. For example  in the system described in the patent application EP 1 867 096  it necessitates the renewal of the root key SK_root in each security processor and the renewal of the cryptogram SK_H* or SK_S* in each terminal. This renewal can only be done individually by addressing each terminal  and this is a particularly lengthy process which cannot be carried out simultaneously for all the terminals. The changing of the session key also calls for the sending of several messages to the same terminal  including especially a message to replace the cryptogram SK_H* or SK_S* and a message to replace the key SK_root. Furthermore  the messages addressed individually to each terminal can easily be filtered so that they are eliminated. Thus  an ill-intentioned user can easily prevent the renewal of his session key.
[0017] The prior art also includes the known patents EP0889956A2 and US2009/238363A1.
[0018] The invention seeks to overcome at least one of these drawbacks. An object of the invention therefore is a method for protecting the transmission of a multimedia content or control word between a security processor and a terminal wherein the method comprises:
- the advance recording in the terminal of several secret codes Ci-1  each secret code Ci-1 enabling solely the decryption of the multimedia content or of the control word encrypted with a respective session key SKi obtained by diversification of the key SK_root with a parameter Pi  one of the parameters Pi being the parameter Pc 
- the reception of the parameter Pc by the terminal in a message also containing a multimedia content or a control word to be decrypted by the security processor  and
- in response to the reception of the parameter Pc  the selection by the terminal from among the set of recorded secret codes of the secret code Cc-1 to be used to decrypt the multimedia content or the control word encrypted with the secret key SKc  as a function of the parameter Pc or another parameter contained in the same message.
[0019] In the above method  the changing of the session key is faster because the parameter or parameters used to renew the session key both in the security processor and in the terminal are transmitted in the same message. Thus  a single message is sufficient to activate the changing of the session key. Furthermore  these parameters are contained within the same message as the one containing the scrambled multimedia content or the encrypted control word. Thus  if this message is eliminated to prevent the renewal of the session key  the descrambling of the multimedia content is made impossible since the scrambled multimedia content or the encrypted control word needed for this purpose is not transmitted to the security processor.
[0020] Finally  each terminal already contains several secret codes in advance  enabling each of them to decrypt the multimedia content or control word encrypted with a session key SKi different from the other session keys. Thus  the session key can be changed instantaneously without any transitory period during which the former session key is no longer usable while the new session key is not yet available.
[0021] The embodiments of this protection method may comprise one or more of the following characteristics:
each secret code Ci-1 is a code directly executable or interpretable by the terminal  this terminal being already parameterized by its session key SKi so that it does not have to be parameterized again by this key SKi during its execution or interpretation;
each secret code Ci-1 is a key SKi or a cryptogram of this key SKi making it possible to decrypt the multimedia content or the control word encrypted with the key SKi when it is used to parameterize a decryption algorithm pre-recorded in the terminal;
the message containing the parameter Pc is an ECM (Entitlement Control Message);
the security processor transmits the multimedia content or control word encrypted twice  once by a specific key determined independently of the parameter Pc and once by the session key Skc;
the processor verifies the presence of the parameter Pc in the message transmitted and  if the parameter Pc is absent  the processor does not encrypt the multimedia content or the control word with the current session key Skc;
the secret code or codes Cc-1 are transmitted to the terminal before reception of the message containing the parameter Pc by means of a EMM (Entitlement Management Message).
[0022] These embodiments of the protection method furthermore have the following advantages:
– when the code is an executable code or a interpretable code  then compromising this code gives no information on the root key or the cryptographic algorithm implemented to make the other secret keys that are executable or interpretable 
– the use of an ECM message to transmit the parameter Pc enables very frequent renewal of this session key 
– transmitting the encrypted multimedia content or control word twice increases the security of the system.
[0023] An object of the invention is also a method for decrypting a multimedia content or a control word by means of a terminal to put into practice the above method  the method comprising:
- the transmission of the parameter Pc to a security processor capable of decrypting the multimedia content or the control word 
- the reception by the terminal of the multimedia content or the control word encrypted with a current session key SKc built by the security processor through diversification of a root key SK_root as a function of the parameter Pc transmitted by the terminal 
- the decrypting by the terminal of the multimedia content or of the control word encrypted with the key SKc by means of a secret code Cc-1 to obtain the plain multimedia content or the plain control word 
- the advance recording in the terminal of several secret codes Ci-1  each secret code Ci-1 enabling solely the decrypting of the multimedia content or of the control word encrypted by a respective session key SKi obtained by diversification of the key SK_root with a parameter Pi  one of these parameters Pi being the parameter Pc 
- the reception of the parameter Pc by the terminal in a message also containing a multimedia content or a control word to be decrypted by the security processor  and
- in response to the reception of the parameter Pc  the selection by the terminal from among all the recorded secret codes  of the secret code Cc-1 to be used to decrypt the multimedia content or the control word encrypted with the key SKc as a function of the parameter Pc or any other parameter contained in the same message.
[0024] An object of the invention is also an information-recording medium comprising instructions to implement one of the above methods  when these instructions are executed by an electronic computer.
[0025] Finally  an object of the invention is also the terminal for decrypting an encrypted multimedia content or an encrypted control word  the terminal being capable of:
- transmitting a parameter Pc to a security processor capable of decrypting the multimedia content or the control word 
- receiving the multimedia content or control word encrypted with a current session key SKc built by the security processor by diversification of a root key SK_root as a function of the parameter Pc transmitted by the terminal 
- decrypting the multimedia content or the control word encrypted with the key SKc by means of a secret code Cc-1 to obtain the plain multimedia content or the plain control word 
wherein:
- the terminal comprises a memory in which several secret codes Ci-1  are recorded in advance  each secret code Ci-1 enabling solely the decryption of the multimedia content or control word encrypted by a respective session key SKi obtained by diversification of the key SK_root with a parameter Pi  one of these parameters Pi being the parameter Pc  and
- the terminal is capable of:
receiving the parameter Pc in a message also containing the multimedia content or the control word to be decrypted by the security processor  and
selecting  from the set of secret codes recorded  the secret code Cc-1 to be used to decrypt the multimedia content or control word encrypted with the key SKc as a function of the parameter Pc or another parameter contained in the same message  in response to the reception of the parameter Pc.
[0026] The invention will be understood more clearly from the following description  given purely by way of a non-exhaustive example and made with reference to the appended drawings  of which:
– Figure 1 is a schematic illustration of a system for transmitting and receiving scrambled multimedia contents 
– Figure 2 is a schematic and partial illustration of an ECM message used in the system of Figure 1 
– Figure 3 is a schematic and partial illustration of an EMM (Entitlement Management Message) used in the system of Figure 1 
– Figure 4 is an illustration of a table also used in the system of Figure 1 
– Figure 5 is a flowchart of a method for transmitting and receiving scrambled multimedia content implemented by means of the system of Figure 1  and
- Figure 6 is a flowchart of a method for recording secret codes in a terminal of the system of Figure 1.
[0027] In these figures  the same references are used to designate the same elements.
[0028] Here below in this description  the characteristics and functions well known to those skilled in the art shall not be described in detail. Furthermore  the terminology used is that of systems of conditional access to multimedia contents. For further information on this terminology  the reader may refer to the following document:
- « Functional Model of Conditional Access System »  EBU Review  Technical European Broadcasting Union  Brussels  BE  n° 266  21 December 1995.
[0029] Figure 1 shows a system 2 for sending and receiving scrambled multimedia contents. For example  each multimedia content corresponds to a sequence of an audiovisual program such as a television broadcast or a film.
[0030] The plain multimedia contents are generated by one or more sources 4 and transmitted to a broadcasting device 6. The device 6 broadcasts the multimedia contents simultaneously towards a multitude of reception terminals through an information transmission network 8. The broadcast multimedia contents are time-synchronized with one another  for example to comply with a preset program schedule.
[0031] The network 8 is typically a long-distance information transmission network such as the internet or a satellite network or any other type of broadcasting network such as the one used to transmit digital terrestrial television (DTTV).
[0032] To simplify Figure 1  only three reception terminals 10 to 12 are shown.
[0033] The device 6 comprises an encoder 16 which compresses the multimedia contents that it receives. The encoder 16 processes the digital multimedia contents. For example  this encoder works in compliance with the MPEG2 (Moving Picture Expert Group – 2) standard or the UIT-T H264 standard.
[0034] The compressed multimedia contents are sent towards an input of a scrambler 22. The scrambler 22 scrambles each compressed multimedia content to make its viewing conditional on certain conditions such as the purchase of a title of access by the users of the reception terminals. The scrambled multimedia contents are rendered at an output connected to the input of a multiplexer 26.
[0035] The scrambler 22 scrambles each compressed multimedia content by means of a control word CWj t that is given to it as well as to a conditional access system 28 by a key generator 32.
[0036] The system 28 is known as a CAS (Conditional Access System).
[0037] The index j is an identifier of the channel on which the scrambled multimedia content is broadcast and the index t is an identifier of the cryptoperiod scrambled with this control word. Here below in this description  the cryptoperiod currently scrambled by the terminals is the cryptoperiod t-1.
[0038] Typically  this scrambling is compliant with a standard such as the DVB-CSA (Digital Video Broadcasting – Common Scrambling Algorithm)  ISMA Cryp (Internet Streaming Media Alliance Cryp)  SRTP (Secure Real-time Transport Protocol)  AES (Advanced Encryption Standard) etc.
[0039] The system 28 generates ECMs (Entitlement Control Messages) containing at least the cryptogram CW*j t of the control word CWj t generated by the generator 32 and used by the scrambler 22 to scramble the cryptoperiod t of the channel j. These ECM messages and the scrambled multimedia contents are multiplexed by the multiplexer 26  these contents being respectively given by the conditional access system 28 and by the scrambler 22 and then being transmitted on the network 8.
[0040] The system 28 is also capable of inserting two parameters Pi and Pxi into the ECM.
[0041] The system 28 also generates EMMs (Entitlement Management Messages) such as the one illustrated in Figure 3.
[0042] By way of an illustration here  the scrambling and the multiplexing of the multimedia contents is compliant with the DVB-Simulcrypt (ETSI TS 103 197) protocol.
[0043] The system 28 is also connected to a unit 34 for managing the renewal of the session keys. This unit 34 gives the system 28 the parameters Pi  Pxi as well as associated secret codes Ci-1. These parameters and these codes are described in greater detail here below.
[0044] For example  the terminals 10 to 12 are identical and only the terminal 10 is described in greater detail.
[0045] The terminal 10 has a receiver 20 of broadcast multimedia contents. This receiver 70 is connected to the input of a demultiplexer 72 which firstly transmits the multimedia content to a descrambler 74 and secondly transmits the ECMs and EMMs (Entitlement Management Messages) to a security module 76.
[0046] The descrambler 74 descrambles the scrambled multimedia content from the control word transmitted by the module 76. The descrambled multimedia content is transmitted to a decoder 80 which decodes it. The decompressed or decoded multimedia content is transmitted to a graphic card 82 which drives the display of this multimedia content on a display unit 84 equipped with a screen 86.
[0047] The display unit 84 displays the multimedia content on the screen 86 in plain form.
[0048] The module 76 manages the information exchanges with a detachable security processor 80. In particular  it cooperates with the processor 80 to protect the interface between this processor 80 and the terminal 10. To this end  this module 76 is interposed in the stream of information transmitted from the terminal 10 to the processor 80 and vice versa. The module 76 is made  for example  with a programmable electronic computer. It is connected to a memory 82 comprising all the instructions and data needed to execute the methods of Figures 5 and 6. This memory 82 therefore has especially the following elements:
– an identifier D-ID of the terminal 10 enabling the identification of this terminal 10 from among all the terminals of the system 2 
– a cryptogram TSK* of a session key TSK obtained by diversification of a root key TSK_root with the identifier D_ID.
– a personal key Ki enabling the decryption of the cryptogram TSK* 
– a table 84 associating a secret code Ci-1 with each parameter Pxi enabling the decryption of a piece of information encrypted with a current session key SKi  and
– the codes Ci-1.
[0049] In this embodiment  each code Ci-1 is a code of a function of decryption of the information encrypted with a respective session key SKi. Each code Ci-1 is directly executable by the module 16. Each code Ci-1 corresponds to a decryption function accepting the information to be decrypted as the sole parameter. This code is therefore already parameterized with the session key SKi. This session key SKi is obtained by diversification of a root key SK_root by means of a parameter Pi.
[0050] The processor 80 is also made with an electronic computer 86 implementing an information encryption and decryption module. To this end  the processor 80 also has a memory 88 connected to the computer 86. This memory 88 is a secured memory containing especially the secret information needed to execute the method of Figure 5. In particular  this method contains inter alia:
– titles of access to one or more multimedia contents 
- one or more subscription keys Ka 
– the root key TSK_root 
– the root key SK_root  and
– instructions to execute the method of Figure 5.
[0051] Figure 2 shows a portion of a frame of an ECM 90 capable of being generated by the system 28. This ECM contains especially a field 92 containing the parameters Pi and Pxi. The parameter Pxi can be all or part of the parameter Pi and vice versa. The role of these parameters Pi and Pxi is described in greater detail with reference to Figure 5.
[0052] Classically  this ECM 90 also contains:
- the identifier j of the channel 
- the cryptograms CW*j t and CW*j t+1 of the control words CWj t and CWj t+1 enabling the cryptoperiods t and t+1 of the channel j to be descrambled 
– rights of access DA to be compared with titles of access acquired by the user  and
- a signature or a cryptographic redundancy MAC to verify the integrity of the ECM.
[0053] Figure 3 gives a schematic and partial view of an EMM 100 capable of being generated by the system 28. This EMM 100 contains especially a Message_Type identifier to indicate the fact that this EMM is intended for the terminal and not for the security processor.
[0054] This message 100 also contains:
– several codes Ci-1 where i ranges from 1 to n  n being an integer strictly greater than or equal to two 
– the parameters Pxi  each of these parameters being associated with the corresponding code Ci-1  and
– a CRC code enabling the integrity of the message 100 to be verified.
[0055] Figure 4 shows a possible example of a structure of the table 84. This table 84 has two columns 102 and 104. The column 102 includes the parameter Pxi while the column 104 includes the corresponding associated code Ci-1 or the address in the memory 82 of this code Ci-1.
[0056] The working of the system 2 shall now be described with reference to the method of Figure 5.
[0057] Initially  during an initialization phase 110  the processor 80 is inserted into the terminal 10. In response  the terminal 10 sends its identifier D-ID to the processor 80. This processor 80 then generates a session key TSK. This session key TSK is obtained by diversification of the root key TSK_root recorded in the memory 88.
[0058] The details on the encryption or decryption of control words by means of this session key TSK are not described here in detail. Indeed  the method of encryption of the control words on the interface between the processor 80 and the terminal 10 is the same here as the one described in the patent application EP 1 867 096. Thus  the reader may refer to this patent application for further information.
[0059] During the initialization phase  the processor 80 also receives  for example through EMMs  access titles and subscription keys Ka. These access titles and keys Ka enable it to decrypt the cryptograms of the control words of the channels for which it has taken out a subscription with an operator.
[0060] The transmission of a multimedia content from the device 6 to a terminal shall now be described in the particular case of the terminal 10.
[0061] During a step 112  the generator 32 generates a control word which is transmitted to the scrambler 22 and to the system 28.
[0062] At a step 114  this control word is encrypted with a subscription key Ka to obtain a cryptogram CW*Ka. For example  the key Ka is renewed once a month.
[0063] Then  at a step 116  the system 28 generates an ECM containing the cryptogram CW*Ka as well as the corresponding rights of access. If necessary  this ECM also contains parameters Pc and Pxc if the level of security of the protection of the interface between the processor 80 and the terminal 10 needs to be boosted. The parameters Pc and Pxc are chosen from among the pairs of parameters Pi and Pxi used to create the table 84.
[0064] At the same time  during a step 118  the control word generated is transmitted to the scrambler 22 which scrambles the cryptoperiod of the multimedia content by means of this control word before transmitting the scrambled cryptoperiod to the multiplexer 26.
[0065] At a step 120  the multiplexer 26 multiplexes the ECMs generated with the scrambled multimedia content and then broadcasts them to all the terminals of the system 2 by means of the network 8.
[0066] At a step 122  the terminal 10 receives the signals broadcast by the device 6 through its receiver 70.
[0067] At a step 124  these signals are demultiplexed by the demultiplexer 72.
[0068] At a step 126 the scrambled multimedia content is transmitted to the descrambler 74.
[0069] At a step 128  the ECMs and EMMs for their part are transmitted to the security module 76.
[0070] At a step 130  the module 76 checks to see if new parameters Pc  Pxc are present in the ECM received. "New parameters" Pc  Pxc are parameters Pc  Pxc having values different from those received earlier.
[0071] If the response is affirmative  the module carries out the step 132 during which it extracts the parameter Pxc and then selects the code Cc-1 associated with this parameter by means of the table 84.
[0072] At the end of the step 132 or should the ECM comprise no parameter Pc  Pxc or new parameters Pc  Pxc  then at a step 133  the module 76 transmits the ECM received to the processor 80.
[0073] At a step 134  the processor 80 compares the access titles contained in the memory 88 with the access rights contained in the ECM received.
[0074] If the access titles do not correspond to the access right  then the processor 80 carries out a step 138 to inhibit the descrambling of the multimedia content received. For example  to this end  it does not transmit the control word needed to descramble the multimedia content to the terminal 10.
[0075] If not  at the step 140  the processor 80 decrypts the cryptogram CW*Ka with the key Ka so as to obtain the control word CW in plain form.
[0076] Then  at a step 142  the computer 86 encrypts the control word CW by means of the session key TSK recorded in the memory 88 and generated during the phase 110. The cryptogram CW*TSK is then obtained.
[0077] At a step 144  the processor 80 checks to see if a parameter Pc is present in the received ECM.
[0078] If the response is affirmative  the processor 80 then carries out a step 146 during which it builds the new session key SKc by diversification of the root key SK_root by means of the parameter Pc received. The step 146 is performed only when it is a new parameter Pc. If the parameter Pc has already been received  the key SKc has already been built and it is possible to proceed directly to the next step.
[0079] Then  at a step 148  it encrypts the cryptogram CW*TSK by means of the key SKc to obtain a cryptogram CW**(TSK)(SKc). This cryptogram CW**(TSK)(SKc) corresponds to the control word encrypted twice  once by the key TSK and once by the key SKc. In this case  it is also said that the control word CW is over-encrypted with the key SKc.
[0080] At the end of the step 148 or should the received ECM include no parameter Pc  then at a step 150  the processor 80 transmits the cryptogram of the control word to the terminal 10. Depending on whether the steps 146  148 have been executed or not  this cryptogram is either the cryptogram CW**(TSK)(SKc) or the cryptogram CW*TSK.
[0081] Then  if the parameter Pxc is present in the received ECM  during a step 152  the module 76 decrypts the cryptogram CW**(TSK)(SKc) in executing the code Cc-1 selected during the step 132. More specifically  in this second step  the code Cc-1 receives only the cryptogram CW**(TSK)(SKc) to be deciphered as an input parameter. At this stage  it is not necessary for it to be also parameterized with the session key SKc since this parameter is already integrated into the executable code. At the end of the step 152  the cryptogram CW*TSK is obtained from the cryptogram CW**(TSK)(SKc).
[0082] After the step 152 or if the control word transmitted by the processor 80 has been encrypted only once  then at a step 154 the module 76 decrypts the cryptogram CW*TSK by means of the key TSK. At this step 154  the key TSK is for example obtained by decrypting a cryptogram of this key stored in the memory 82 by means of its personal key Ki. At the end of the step 154  the plain control word CW is obtained.
[0083] At a step 156  the module 76  transmits this plain control word CW to the descrambler 74 which then descrambles the corresponding cryptoperiod of the scrambled multimedia content with this control word.
[0084] At a step 158  the descrambled multimedia content is transmitted to the decoder 80 which decodes it.
[0085] At a step 160  the graphic card receives the decoded multimedia content and commands its display on the screen 86. Thus  at a step 162  the plain multimedia content is displayed on the screen 86.
[0086] In the method of Figure 5  when the protection of the interface between the processor 80 and the terminal 10 needs to be boosted  it is enough to insert parameters Pc and Pxc into an ECM. From this instant onwards  the control word transmitted from the processor 80 to the terminal 10 is encrypted twice instead of only once. Furthermore  to change the session key SKc  it is enough to change the parameters Pc and Pxc contained in the ECM. However  this change in session key SKc entails the assumption that the corresponding codes Cc-1 have been recorded preliminarily in the memory 82. This is done by means of the method of the following Figure 6.
[0087] When the security has to be boosted  then at a step 170  several pairs of parameters Pi  Pxi are chosen.
[0088] Then  at a step 172  the unit 34 builds a session key SKi for each parameter Pi chosen at the step 170. Here  each key SKi is obtained by diversification of the root key SK_root as a function of the parameter Pi. One example of a method of diversification is described in the patent application EP 1 867 096.
[0089] Then  at a step 174  these codes Ci-1 used to decrypt the cryptograms obtained with the keys SKi are generated. For example  to this end  for each code Ci-1 the same decrypting algorithm as the one used by the processor 80 is parameterized with the key SKi and then compiled by means of a compiler. Preferably  the executable code is made robust against crypto-analysis attempts aimed for example at identifying the session key  the root key or the algorithm used to decrypt the messages. For example  to this end  the teaching of the following document is implemented:
S. Chow  P. Eisen  H. Johnson  P. C. Van Oorchot   “White Box Cryptography And an AES Implementation”   Proceedings of SAC 2002  9th Annual Workshop on Selected Area in Cryptography  August 15-16 2002  Saint John""s   Canada.
[0090] Once the codes Ci-1 have been generated  then at a step 176  these codes are transmitted with the corresponding parameters Pxi to the system 28 of the device 6. To this end  the system 28 generates an EMM such as the EMM 100 which is then multiplexed with the scrambled multimedia content and broadcast simultaneously to all the terminals of the system 2.
[0091] In response to the reception of this EMM 100  at a step 178  this message is transmitted to the security module 76.
[0092] At a step 180  the security module 76 updates the table 84 using information contained in this EMM and records the codes Ci-1 in the memory 82.
[0093] From this time onwards  the over-encryption of the control words with one of the keys SKi can be activated and the changing of the over-encryption key can be also made rapidly and frequently.
[0094] Many other embodiments are possible. For example  the codes Ci-1 are not necessarily executable codes and may be replaced by codes that are directly interpretable by a virtual machine implemented in the terminal 10. Typically  this virtual machine is a Java® virtual machine.
[0095] The code Ci-1 is not necessarily an executable or interpretable code. As a variant  the code Ci-1 is a key SKi or a cryptogram of this key SKi.
[0096] The parameters Pi and Pxi may constitute all or part of a same parameter. In particular  the parameter Pxi can be identical to the parameter Pi. In this variant  only the parameter Pi is then transmitted.
[0097] The parameters Pi or Pxi can be the object of various operations before they are used by the terminal or the processor 80. For example  these parameters can be used as a seed serving to initialize a generator of pseudorandom numbers. It is then the generated pseudorandom number that is used to diversify the root key SK_root or used by the module 76.
[0098] In another variant  only one parameter Pxi and the associated code Ci-1 are sent to the terminals before the use of the key SKi. Thus  the memory 82 only has the code Cc-1 and the code Ci-1 which will be used immediately after the code Cc-1. This prevents the unnecessary exposure of the other codes Ci-1 that could be used.
[0099] The changing of the key SKc can come into play immediately as described here above or after a predetermined number of cryptoperiods received after the reception of the message containing the new parameter Pc.
[00100] In another variant  the first encryption of the control word by means of the key TSK is not implemented. In this case  the control word is encrypted solely by means of the session key SKc.
[00101] The security processor is not necessarily detachable. For example  it is fixed without any degree of freedom inside the terminal 10.
[00102] The security processor does not necessarily take the form of a chip card. For example  it can also take the form of an USB (Universal Serial Bus) stick. In another variant  it is not detachable but integrated into the terminal casing.
[00103] The elements of the terminal 10 are not necessarily contained in a same casing. For example  these elements can be distributed over a local area network. In this case  typically  a casing receiving the signal transmitted by the device 6 uses the processor 8 to decrypt the control words and to encrypt them by means of the session key SKc. The control words thus encrypted are then transmitted through the local area network to one or more casings placed for example in proximity to display screens. These other casings each incorporate a security module  for example one that is identical to the module 76 previously described so as to be able to decrypt and obtain in plain form the control word needed to descramble the received multimedia contents.
[00104] Finally  the system 2 has been described in the particular case where the processor 80 is used solely to decrypt the control words received. In another variant  the processor 80 descrambles the multimedia content and it is the descrambled multimedia content that is transmitted from the processor 80 to the terminal 10. In this variant  the encryption by means of the key SKc is applied to the multimedia content transmitted from the processor 80 to the terminal 10 and no longer applied to the control word since this word is no longer transmitted between the terminal 10 and the processor 80.

We Claim:
1. Method for protecting the transmission of a multimedia content or of a control word between a security processor and a terminal wherein:
– the security processor builds (146) a current session key SKc by diversification of a root key SK_root as a function of a parameter Pc transmitted by the terminal 
– the security processor decrypts (140) the multimedia content or the control word and then encrypts (148) the decrypted multimedia content or the decrypted control word with the current session key SKc and finally transmits (150) the multimedia content or the control word encrypted with the current session key SKc to the terminal  and
– the terminal decrypts (152) the multimedia content or the control word encrypted with the built key SKc by means of a secret code Cc-1 to obtain the plain multimedia content or the plain control word 
characterized in that the method comprises:
- the advance recording (180) in the terminal of several secret codes Ci-1  each secret code Ci-1 enabling solely the decryption of the multimedia content or of the control word encrypted by a respective session key SKi obtained by diversification of the key SK_root with a parameter Pi  one of the parameters Pi being the parameter Pc 
- the reception (122) of the parameter Pc by the terminal in a message also containing a multimedia content or a control word to be decrypted by the security processor  and
- in response to the reception of the parameter Pc  the selection (132) by the terminal from among the set of recorded secret codes of the secret code Cc-1 to be used to decrypt the multimedia content or the control word encrypted with the secret key SKc  as a function of the parameter Pc or another parameter contained in the same message.

2. Method according to claim 1  wherein each secret code Ci-1 is a code directly executable or interpretable by the terminal  this terminal being already parameterized by its session key SKi so that it does not have to be parameterized again by this key SKi during its execution or interpretation.

3. Method according to claim 1  wherein each secret code Ci-1 is a key SKi or a cryptogram of this key SKi making it possible to decrypt the multimedia content or the control word encrypted with the key SKi when it is used to parameterize a decryption algorithm pre-recorded in the terminal.

4. Method according to any one of the above claims  wherein the message containing the parameter Pc is an ECM (Entitlement Control Message).

5. Method according to any one of the above claims  wherein the security processor transmits (150) the multimedia content or control word encrypted twice  once by a specific key determined independently of the parameter Pc and once by the session key Skc
6. Method according to claim 5  wherein the processor verifies (144) the presence of the parameter Pc in the message transmitted and  if the parameter Pc is absent  the processor does not encrypt (150) the multimedia content or the control word with the current session key Skc.

7. Method according to any one of the above claims  wherein the secret code or codes Cc-1 are transmitted to the terminal before reception of the message containing the parameter Pc by means of an EMM (Entitlement Management Message).

8. Method according to any one of the above claims  comprising the advance recording (180) in the terminal of strictly more than two secret codes Ci-1.

9. Method for decrypting a multimedia content or a control word by means of a terminal to put into practice a method according to any one of the above claims  the method comprising:
- the transmission (128) of a parameter Pc to a security processor capable of decrypting the multimedia content or the control word 
- the reception by the terminal of the multimedia content or the control word encrypted with a current session key SKc built by the security processor through diversification of a root key SK_root as a function of the parameter Pc transmitted by the terminal 
- the decrypting (152) by the terminal of the multimedia content or of the control word encrypted with the key SKc by means of a secret code Cc-1 to obtain the plain multimedia content or the plain control word 
characterized in that the method comprises:
- the advance recording (180) in the terminal of several secret codes Ci-1  each secret code Ci-1 enabling solely the decrypting of the multimedia content or of the control word encrypted by a respective session key SKi obtained by diversification of the key SK_root with a parameter Pi  one of these parameters Pi being the parameter Pc 
- the reception (122) of the parameter Pc by the terminal in a message also containing a multimedia content or a control word to be decrypted by the security processor  and
- in response to the reception of the parameter Pc  the selection (132) by the terminal from among all the recorded secret codes  of the secret code Cc-1 to be used to decrypt the multimedia content or the control word encrypted with the key SKc as a function of the parameter Pc or any other parameter contained in the same message.

10. Information-recording medium characterized in that it comprises instructions to execute a method according to any one of the above claims  when these instructions are executed by an electronic computer

11. A terminal for decrypting an encrypted multimedia content or an encrypted control word  the terminal (10) being capable of:
- transmitting a parameter Pc to a security processor capable of decrypting the multimedia content or the control word 
- receiving the multimedia content or control word encrypted with a current session key SKc built by the security processor by diversification of a root key SK_root as a function of the parameter Pc transmitted by the terminal 
- decrypting the multimedia content or the control word encrypted with the key SKc by means of a secret code Cc-1 to obtain the plain multimedia content or the plain control word 
characterized in that:
- the terminal comprises a memory in which several secret codes Ci-1  are recorded in advance  each secret code Ci-1 enabling solely the decryption of the multimedia content or control word encrypted by a respective session key SKi obtained by diversification of the key SK_root with a parameter Pi  one of these parameters Pi being the parameter Pc  and
- the terminal is capable of:
receiving the parameter Pc in a message also containing a multimedia content or a control word to be decrypted by the security processor  and
selecting  from the set of secret codes recorded  the secret code Cc-1 to be used to decrypt the multimedia content or control word encrypted with the key SKc as a function of the parameter Pc or another parameter contained in the same message  in response to the reception of the parameter Pc.

Documents

Application Documents

# Name Date
1 ABSTRACT1.jpg 2018-08-11