METHOD AND APPARATUS FOR SECURE MANAGEMENT OF DEBUGGING PROCESSES WITHIN COMMUNICATION DEVICES
First Claim
1. A communication device, comprising:
- a controller configured to receive multimedia content, wherein the controller includes a debugging process; and
a security processor coupled to the controller and configured to manage the activation of the debugging process,wherein the security processor is configured to verify an access token received by the communication device for allowing activation of the debugging process, wherein the access token has a lifetime, wherein the security processor generates a set of debug authorization information in response to verifying the access token,wherein the controller is configured to authenticate the set of debug authorization information,wherein the controller is configured to activate the debugging process after successfully authenticating the set of debug authorization information, andwherein the security processor is configured to instruct the controller to deactivate the debugging process when the lifetime of the access token has expired.
11 Assignments
0 Petitions
Accused Products
Abstract
A method, device and system for securely managing debugging processes within a communication device, such as a set top box or other multimedia processing device. For example, a security processor (SP) within the communication device manages the lifetime (LT) of any access token issued for use in activating debugging privileges within the communication device. The security processor authenticates an issued access token and securely delivers appropriate debug authorization information to the device controller. The security processor uses its secure, internal timer to count down the lifetime and update the remaining lifetime of the issued access token during the processing of each command by the security processor. In addition to securely managing the issuance of the access token and it'"'"'s remaining lifetime, the updating process reduces any impact on the normal communications within the device. The method overcomes the issue of the communication device not having a secure internal clock.
-
Citations
18 Claims
-
1. A communication device, comprising:
-
a controller configured to receive multimedia content, wherein the controller includes a debugging process; and a security processor coupled to the controller and configured to manage the activation of the debugging process, wherein the security processor is configured to verify an access token received by the communication device for allowing activation of the debugging process, wherein the access token has a lifetime, wherein the security processor generates a set of debug authorization information in response to verifying the access token, wherein the controller is configured to authenticate the set of debug authorization information, wherein the controller is configured to activate the debugging process after successfully authenticating the set of debug authorization information, and wherein the security processor is configured to instruct the controller to deactivate the debugging process when the lifetime of the access token has expired. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method for managing a debugging process within a communication device, wherein the communication device includes a controller and a security processor coupled to the controller, comprising the steps of:
-
verifying by the security processor an access token received by the communication device for allowing activation of the debugging process, wherein the access token has a lifetime, wherein the security processor generates a set of debug authorization information in response to verifying the access token, wherein the controller activates the debugging process upon authenticating the set of debug authorization information; and instructing by the security processor the controller to deactivate the debugging process when the lifetime of the access token expires, wherein the instructing step includes determining the remaining amount of the lifetime of the access token in response to the security processor receiving a command from the controller, determining if the lifetime of the access token has expired, if the lifetime of the access token has expired, instructing the controller to deactivate the debugging process within the communication device, and if the lifetime of the access token has not expired, reducing the remaining amount of the lifetime of the access token based on the amount of time required for the security processor to receive a command from the controller. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17)
-
-
18. A computer readable medium storing instructions that, when executed on a programmed processor, carry out a method for managing a debugging process within a communication device, comprising:
-
instructions for verifying an access token received by the communication device for allowing activation of the debugging process, wherein the access token has a lifetime; instructions for generating a set of debug authorization information in response to verifying the access token, wherein the controller activates the debugging process upon authenticating the set of debug authorization information; and instructions for informing the controller to deactivate the debugging process when the lifetime of the access token expires, wherein the informing instructions include instructions for determining the remaining amount of the lifetime of the access token in response to the security processor receiving a command from the controller, instructions for determining if the lifetime of the access token has expired, if the lifetime of the access token has expired, instructions for informing the controller to deactivate the debugging feature within the communication device, and if the lifetime of the access token has not expired, instructions for reducing the remaining amount of the lifetime of the access token based on the amount of time required to receive a command from the controller.
-
Specification