Supporting multiple key ladders using a common private key set
First Claim
Patent Images
1. A security module, comprising:
- first circuitry to hold a first private key associated with a first vendor of first media information;
a first cryptographic module to operate on the first private key to generate a first result for decrypting the first media information; and
a second cryptographic module to operate on the first private key to generate a second result.
1 Assignment
0 Petitions
Accused Products
Abstract
An apparatus may include circuitry to permanently and inaccessibly store a first private key that is a shared secret between a manufacturer of the circuitry and a first vendor of first encrypted media information. It may also include a key ladder to provide plural layers of encryption to the first private key to generate a first result for decrypting the first encrypted media information. A cryptographic module may encrypt the first private key to generate a second result for a security purpose other than decrypting media information. The module also may include a key ladder, and the apparatus may include other key ladders using the private key.
-
Citations
20 Claims
-
1. A security module, comprising:
-
first circuitry to hold a first private key associated with a first vendor of first media information; a first cryptographic module to operate on the first private key to generate a first result for decrypting the first media information; and a second cryptographic module to operate on the first private key to generate a second result. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. An apparatus, comprising:
-
circuitry to permanently and inaccessibly store a first private key that is a shared secret between a manufacturer of the circuitry and a first vendor of first encrypted media information; a key ladder to provide plural layers of encryption to the first private key to generate a first result for decrypting the first encrypted media information; and a cryptographic module to encrypt the first private key to generate a second result for a security purpose other than decrypting media information. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. A system to decrypt media information from different vendors, comprising:
-
at least one receiver to receive first encrypted media information and second encrypted media information from different vendors; storage to store at least a portion of the first encrypted media information and second encrypted media information; a security module to generate a first decryptor and a second decryptor, including; circuitry to store plural private keys respectively associated with the different vendors, a first crypto module associated with one of the different vendors to generate the first decryptor using one of the plural private keys, and a second crypto module associated with another of the different vendors to generate the second decryptor using another one of the plural private keys; and a processor to decrypt the first encrypted media information using the first decryptor and to decrypt the second encrypted media information using the second decryptor. - View Dependent Claims (15, 16, 17)
-
-
18. A method of enabling dual use of a private key, comprising:
-
providing a private key permanently on a chip; enabling the private key to secure an aspect of a device; and enabling the private key to decrypt encrypted media information. - View Dependent Claims (19, 20)
-
Specification