Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Secure key authentication and ladder system

a technology of secure key authentication and ladder system, which is applied in the field of conditional access and copy protection systems, can solve the problems of difficult for a third party to perform unauthorized reception, the scrambled signal content cannot be understandable, and the transmitted data bits of unauthorised decoders cannot be decoded

Inactive Publication Date: 2005-08-04
AVAGO TECH WIRELESS IP SINGAPORE PTE
View PDF2 Cites 32 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0035]FIG. 3 is a flow diagram illustrating a method for conventional digital signature generation and verification process utilizing public ke

Problems solved by technology

Most CA systems scramble and / or randomize transmitted data bits so that unauthorized decoders cannot decode the transmitted data bits.
With regard to robust protection against signal piracy, it must be difficult for a third party to perform unauthorized reception.
In addition, the scrambled signal content must not be understandable.
Even though the key unwrapping module 206 may provide increasing level of protection by increasing the number of scramblers and encrypted keys, it may be difficult to determine whether or not the received encrypted keys in the key ladder system 200 of FIG. 2 have been manipulated by unauthorized parties.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure key authentication and ladder system
  • Secure key authentication and ladder system
  • Secure key authentication and ladder system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] Certain aspects of the invention may be found in a method and system for secure key authentication and key ladder. The method for secure key authentication may include generating a digital signature of a secure key in order to obtain a digitally signed secure key; and transmitting the digitally signed secure key from a first location to a second location. The digital signature may be generated by utilizing an asymmetric encryption algorithm and / or a symmetric encryption algorithm. The digitally signed secure key may be encrypted prior to transmission. The secure key may be one of a master key, a work key and a scrambling key. The digitally signed secure key may be received at the second location and the digitally signed secure key may be decrypted to obtain a decrypted digitally signed secure key. If the secure key comprises a master key, a decrypted digitally signed master key may be utilized for decrypting an encrypted digitally signed work key. If the secure key comprises ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Method and system for secure key authentication and key ladder are provided herein. Aspects of the method for secure key authentication may include generating a digital signature of a secure key in order to obtain a digitally signed secure key and transmitting the digitally signed secure key from a first location to a second location. The digital signature may be generated by utilizing an asymmetric encryption algorithm and / or a symmetric encryption algorithm. The digitally signed secure key may be encrypted prior to transmission. The secure key may be a master key, a work key and / or a scrambling key. The digitally signed secure key may be received at the second location and the digitally signed secure key may be decrypted to obtain a decrypted digitally signed secure key.

Description

CROSS-REFERENCE TO RELATED APPLICATIONS / INCORPORATION BY REFERENCE [0001] [Not Applicable]FIELD OF THE INVENTION [0002] Certain embodiments of the invention relate to conditional access and copy protection systems. More specifically, certain embodiments of the invention relate to a method and system for secure key authentication and key ladder. BACKGROUND OF THE INVENTION [0003] The implementation of fee-based video broadcasting requires a conventional conditional access (CA) system to prevent non-subscribers and unauthorized users from receiving signal broadcasts. A complete CA system usually includes three main functions: a scrambling / descrambling function, an entitlement control function, and an entitlement management function. [0004] The scrambling / descrambling function is designed to make the program incomprehensible for unauthorized receivers. Scrambling can be applied commonly or separately to the different elementary stream components of a program. For example, the video, au...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08H04N7/16H04N7/167
CPCH04L9/0822H04L9/0825H04L9/3247H04N7/163H04L9/0844H04N21/26606H04N21/4181H04N21/63345H04L9/0816H04N7/1675
Inventor RODGERS, STEVE
Owner AVAGO TECH WIRELESS IP SINGAPORE PTE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products