METHOD AND SYSTEM FOR PREVENTING REVOCATION DENIAL OF SERVICE ATTACKS
First Claim
1. A method for signal processing in a secure communication system, the method comprising:
- receiving a command for revoking a secure key;
decrypting said command for revoking said secure key utilizing a hidden key;
verifying a signature of said decrypted command for revoking said secure key; and
revoking said secure key upon successful verification of said signature.
0 Assignments
0 Petitions
Accused Products
Abstract
Methods and systems for preventing revocation denial of service attacks are disclosed and may include receiving and decrypting a command for revoking a secure key utilizing a hidden key, and revoking the secure key upon successful verification of a signature. The command may comprise a key ID that is unique to a specific set-top box. A key corresponding to the command for revoking the secure key may be stored in a one-time programmable memory, compared to a reference, and the security key may be revoked based on the comparison. The command for revoking the secure key may be parsed from a transport stream utilizing a hardware parser. The method and system may also comprise generating a command for revoking a secure key. The command may be encrypted and signed utilizing a hidden key and may comprise a key ID that is unique to a specific set-top box.
-
Citations
28 Claims
-
1. A method for signal processing in a secure communication system, the method comprising:
-
receiving a command for revoking a secure key; decrypting said command for revoking said secure key utilizing a hidden key; verifying a signature of said decrypted command for revoking said secure key; and revoking said secure key upon successful verification of said signature. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method for signal processing in a secure communication system, the method comprising:
-
generating a command for revoking a secure key; encrypting said generated command for revoking said secure key utilizing a hidden key; signing said encrypted generated command for revoking said secure key. - View Dependent Claims (13, 14)
-
-
15. A system for signal processing in a secure communication system, the system comprising:
-
one or more circuits for receiving a command that revokes a secure key; said one or more circuits decrypts said command for revoking said secure key utilizing a hidden key; said one or more circuits verifies a signature of said decrypted command for revoking said secure key; and said one or more circuits revokes said secure key upon successful verification of said signature. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22, 23, 24, 25)
-
-
26. A system for signal processing in a secure communication system, the system comprising:
-
one or more circuits that generates a command for revoking a secure key; said one or more circuits encrypts said command for revoking said secure key utilizing a hidden key; and said one or more circuits signs said encrypted generated command for revoking said secure key. - View Dependent Claims (27, 28)
-
Specification