摘要 |
<p>At least methods and systems for generating tracing data for tracing rogue secure modules in a population of secure modules are described wherein said rogue secure modules are configured for unauthorized provisioning of control words to a control word sharing network. One method comprises: executing a predetermined number of tracing experiments on said population, wherein each of said tracing experiments comprises: sending at least one tracing event message to each secure module in said selected population, wherein event information in said tracing event message is used to select at least part of said secure modules in said population to generate a tracing event; in response to the reception of said at least one tracing event message, a tracing event detector monitoring for a predetermined time the presence of at least one tracing event in said control word sharing network; and, storing tracing data in an event database, said tracing data comprising said event information and event detection information indicating whether or not a tracing event is detected.</p> |