摘要 |
<p>The method involves authenticating a connection between source and receptor devices in a frame of initialization. An event e.g. request for exchanging private content between the devices, for exchanging an complementary information such as system renewability message (SRM) revocation lists associated with a content protection protocol such as digital transfer content protection internet protocol (DTCP-IP), is detected. Another connection for exchanging complementary information in the frame is authenticated with one device when the former connection is active and after detection of the event. Independent claims are also included for the following: (1) a computer program product comprising instructions for performing a secured data exchanging method (2) a storage unit readable by a computer for storing instruction set executable by the computer for implementing a secured data exchanging method.</p> |