Method and apparatus for security in a data processing system
First Claim
Patent Images
1. A method used for provisioning an access key to receive broadcast services in a terminal storing a private key comprising:
- distributing a public key corresponding to the private key;
receiving a secret key encrypted by the public key;
decrypting the secret key by the private key;
receiving the access key encrypted by the secret key; and
decrypting the access key by the secret key.
1 Assignment
0 Petitions
Accused Products
Abstract
Method and apparatus for secure transmissions. Each user is provided a registration key. A long-time updated broadcast key is encrypted using the registration key and provided periodically to a user. A short-time updated key is encrypted using the broadcast key and provided periodically to a user. Broadcasts are then encrypted using the short-time key, wherein the user decrypts the broadcast message using the short-time key. One embodiment provides link layer content encryption. Another embodiment provides end-to-end encryption.
-
Citations
57 Claims
-
1. A method used for provisioning an access key to receive broadcast services in a terminal storing a private key comprising:
-
distributing a public key corresponding to the private key;
receiving a secret key encrypted by the public key;
decrypting the secret key by the private key;
receiving the access key encrypted by the secret key; and
decrypting the access key by the secret key. - View Dependent Claims (2, 3, 4)
-
-
5. A method used for provisioning an access key to receive broadcast services in a terminal storing a private key comprising:
-
distributing a public key corresponding to the private key;
receiving the access key encrypted by the public key; and
decrypting the access key by the private key. - View Dependent Claims (6, 7, 8)
-
-
9. A method used for provisioning an access key to receive broadcast services in a terminal storing a secret key comprising:
-
receiving a public key corresponding to a private key;
encrypting the secret key with the public key;
sending the encrypted secret key;
receiving the access key encrypted by the secret key; and
decrypting the access key by the secret key. - View Dependent Claims (10, 11, 12)
-
-
13. A method used for distributing an access key to provide broadcast services from a content provider comprising:
-
receiving a public key corresponding to a private key;
encrypting secret key using the public key;
sending the encrypted secret key;
encrypting the access key using the secret key; and
sending the encrypted access key. - View Dependent Claims (14, 15)
-
-
16. A method used for distributing an access key to provide broadcast services from a content provider comprising:
-
receiving a public key corresponding to a private key;
encrypting the access key using the pubic key; and
sending the encrypted access key. - View Dependent Claims (17, 18)
-
-
19. A method used for distributing an access key to provide broadcast services from a content provider having stored a private key comprising:
-
distributing a public key corresponding to the private key;
receiving a secret key encrypted by the public key;
decrypting the secret key using the private key;
encrypting the access key using the secret key; and
sending the encrypted access key. - View Dependent Claims (20, 21)
-
-
22. Apparatus for provisioning an access key to receive broadcast services in a terminal storing a private key comprising:
-
means for distributing a public key corresponding to the private key;
means for receiving a secret key encrypted by the public key;
means for decrypting the secret key by the private key;
means for receiving the access key encrypted by the secret key; and
means for decrypting the access key by the secret key. - View Dependent Claims (23, 24)
-
-
25. Apparatus for provisioning an access key to receive broadcast services in a terminal storing a private key comprising:
-
means for distributing a public key corresponding to the private key;
means for receiving the access key encrypted by the public key; and
means for decrypting the access key by the private key. - View Dependent Claims (26, 27)
-
-
28. Apparatus for provisioning an access key to receive broadcast services in a terminal storing a secret key comprising:
-
means for receiving a public key corresponding to a private key;
means for encrypting the secret key with the public key;
means for sending the encrypted secret key;
means for receiving the access key encrypted by the secret key; and
means for decrypting the access key by the secret key. - View Dependent Claims (29, 30)
-
-
31. Apparatus for distributing an access key to provide broadcast services from a content provider comprising:
-
means for receiving a public key corresponding to a private key;
means for encrypting secret key using the public key;
means for sending the encrypted secret key;
means for encrypting the access key using the secret key; and
means for sending the encrypted access key. - View Dependent Claims (32, 33)
-
-
34. Apparatus for distributing an access key to provide broadcast services from a content provider comprising:
-
means for receiving a public key corresponding to a private key;
means for encrypting the access key using the pubic key; and
means for sending the encrypted access key. - View Dependent Claims (35, 36)
-
-
37. Apparatus for distributing an access key to provide broadcast services from a content provider having stored a private key comprising:
-
means for distributing a public key corresponding to the private key;
means for receiving a secret key encrypted by the public key;
means for decrypting the secret key using the private key;
means for encrypting the access key using the secret key; and
means for sending the encrypted access key. - View Dependent Claims (38, 39)
-
-
40. Machine readable medium used for provisioning an access key to receive broadcast services in a terminal storing a private key comprising:
-
codes for distributing a public key corresponding to the private key;
codes for receiving a secret key encrypted by the public key;
codes for decrypting the secret key by the private key;
codes for receiving the access key encrypted by the secret key; and
codes for decrypting the access key by the secret key. - View Dependent Claims (41, 42)
-
-
43. Machine readable medium used for provisioning an access key to receive broadcast services in a terminal storing a private key comprising:
-
codes for distributing a public key corresponding to the private key;
codes for receiving the access key encrypted by the public key; and
codes for decrypting the access key by the private key. - View Dependent Claims (44, 45)
-
-
46. Machine readable medium used for provisioning an access key to receive broadcast services in a terminal storing a secret key comprising:
-
codes for receiving a public key corresponding to a private key;
codes for encrypting the secret key with the public key;
codes for sending the encrypted secret key;
codes for receiving the access key encrypted by the secret key; and
codes for decrypting the access key by the secret key. - View Dependent Claims (47, 48)
-
-
49. Machine readable medium used for distributing an access key to provide broadcast services from a content provider comprising:
-
codes for receiving a public key corresponding to a private key;
codes for encrypting secret key using the public key;
codes for sending the encrypted secret key;
codes for encrypting the access key using the secret key; and
codes for sending the encrypted access key. - View Dependent Claims (50, 51)
-
-
52. Machine readable medium used for distributing an access key to provide broadcast services from a content provider comprising:
-
codes for receiving a public key corresponding to a private key;
codes for encrypting the access key using the pubic key; and
codes for sending the encrypted access key. - View Dependent Claims (53, 54)
-
-
55. Machine readable medium for distributing an access key to provide broadcast services from a content provider having stored a private key comprising:
-
codes for distributing a public key corresponding to the private key;
codes for receiving a secret key encrypted by the public key;
codes for decrypting the secret key using the private key;
codes for encrypting the access key using the secret key; and
codes for sending the encrypted access key. - View Dependent Claims (56, 57)
-
Specification