In a method for operating a conditional access system for broadcast applications, the conditional access system comprising a number of subscribers and each subscriber having a terminal including a conditional access module and a secure device for storing entitlements, a source signal is encrypted using a first key (C.sub.W). The encrypted source signal is broadcasted for receipt by the terminals, wherein entitlement control messages (ECM's) are sent to the secure devices, the ECM's comprising the first keys (C.sub.W) encrypted using a service key (P.sub.T). Entitlement management messages (EMM's) are sent to the secure devices providing the service key (P.sub.T) required to decrypt encrypted first keys (C.sub.W). A cracked secure device which is used in an unauthorized manner is traced by sending different keys required to obtain the first keys to different terminals or groups of terminals and monitoring the key information provided by a pirate. To this end search EMM's are sent to at least a part of the terminals, the search EMM's providing at least the service key (P.sub.T) and a dummy key (P.sub.D1 or P.sub.D2). At least the search EMM's comprise identifiers identifying the keys (P.sub.T and P.sub.D1 or P.sub.D2), wherein first search EMM's with the keys (P.sub.T and P.sub.D1) are sent to a first part of the terminals and second search EMM's with the keys (P.sub.T and P.sub.D2) are sent to a second part of the terminals An ECM identifying the service key (P.sub.T) to be used to decrypt the encrypted first key (C.sub.W), is sent to all secure devices just before the first key (C.sub.W) is needed to decrypt the source signal.

 
Web www.patentalert.com

> Signal format that facilitates easy scalability of encrypted streams

~ 00312