摘要 |
The invention relates to a method for checking conformity of a network key (NK). The inventive method is used for transmitting data from a conditional access source to a domestic network and consists in verifying the authencity of a network key (NK) by means of pertinent control data provided by a verification centre in the form of a list { (TK)NK1, (TK)NK2, (TK)NK3}. The verification of the presence or absence of a cryptogram (T K)NKis carried out according to the list { (TK) NK1, (TK)NK2, (TK)NK3}. The cryptogram (T K)NK is produced on the basis of a test key (TK) delivered by the centre for verification of encryption, by the network key (NK) of the safety module (CT) of a device (TV1, TV2, PC) connected to the network.
|