发明名称 Tracing unauthorized use of secure modules
摘要 <p>At least methods and systems for generating tracing data for tracing rogue secure modules in a population of secure modules are described wherein said rogue secure modules are configured for unauthorized provisioning of control words to a control word sharing network. One method comprises: executing a predetermined number of tracing experiments on said population, wherein each of said tracing experiments comprises: sending at least one tracing event message to each secure module in said selected population, wherein event information in said tracing event message is used to select at least part of said secure modules in said population to generate a tracing event; in response to the reception of said at least one tracing event message, a tracing event detector monitoring for a predetermined time the presence of at least one tracing event in said control word sharing network; and, storing tracing data in an event database, said tracing data comprising said event information and event detection information indicating whether or not a tracing event is detected.</p>
申请公布号 EP2373020(A1) 申请公布日期 2011.10.05
申请号 EP20100158195 申请日期 2010.03.29
申请人 IRDETO B.V. 发明人 SCHIPPER, ROBERT
分类号 H04N7/167 主分类号 H04N7/167
代理机构 代理人
主权项
地址