The aim of this invention is to propose a control method for the conformity of a network key (NK). This method is applied during the transfer of data coming from a conditional access source to a domestic network. It handles on the verification of the network key (NK) authenticity using relevant control data provided by the verification center in general in form of a list {(TK).sub.NK1, (TK).sub.NK2, (TK).sub.NK3 . . . }.A verification of the presence or absence of a cryptogram (TK).sub.NK is carried out according to the list {(TK).sub.NK1, (TK).sub.NK2, (TK).sub.NK3 . . . }. The cryptogram (TK).sub.NK is constituted from a test key (TK), provided by the verification center, encrypted by a network key (NK) of a security module (CT) of a device (TV1, TV2, PC) connected to the network.

 
Web www.patentalert.com

< System and method for authenticating/registering network device in power line communication (PLC)

> Online data encryption and decryption

> Method and system for generating shared information

~ 00557