PARING METHOD BETWEEN SM AND TP IN DOWNLOADABLE CONDITIONAL ACCESS SYSTEM, SET-TOP BOX AND AUTHENTICATION DEVICE USING THIS
First Claim
Patent Images
1. A method of pairing a secure micro (SM) for security processing and a transport processor (TP) for descrambling scrambled contents, the method comprising:
- exchanging, between the SM and TP, the security components of each of the SM and the TP;
receiving a result of a validation check with respect to the security components; and
generating encryption keys for encrypting data to be transmitted between the SM and the TP based on the validation check result.
1 Assignment
0 Petitions
Accused Products
Abstract
The present invention relates to a technology of paring a secure micro (SM) and a transport processor (TP) in a downloadable conditional access system (DCAS). More specifically, predetermined security components generated by a trusted authority which is a certificate authority are previously embedded into the SM and the TP, and pairing between the SM and the TP is performed by association of the security components with the TA. Accordingly, safe pairing can be assured and the leakage of security information from the SM by malicious hacking can be prevented.
14 Citations
20 Claims
-
1. A method of pairing a secure micro (SM) for security processing and a transport processor (TP) for descrambling scrambled contents, the method comprising:
-
exchanging, between the SM and TP, the security components of each of the SM and the TP; receiving a result of a validation check with respect to the security components; and generating encryption keys for encrypting data to be transmitted between the SM and the TP based on the validation check result. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method of pairing a secure micro (SM) for security processing and a transport processor (TP) for descrambling scrambled contents, the method comprising:
-
assigning, at a trusted authority (TA), security components to the SM and the TP; receiving, at the TA, the security components of the SM and the TP and performing a validation check with respect to the received security components; and informing the SM or the TP of the validation check result. - View Dependent Claims (10, 11, 12, 13, 14)
-
-
15. A set-top box of a downloadable conditional access system (DCAS), the set-top box comprising:
-
a secure micro (SM) for security processing; and a transport processor (TP) for descrambling scrambled contents, wherein the set-top box receives a validation check result with respect to security components assigned to the SM and the TP and generates an encryption key to be used for encrypting data to be transmitted between the SM and the TP based on the received validation check result. - View Dependent Claims (16, 17)
-
- 18. An authentication device of a downloadable conditional access system (DCAS) which is connected with a set-top box through an authentication proxy, wherein the set-top box includes a secure micro (SM) for security processing and a transport processor (TP) for descrambling scrambled contents and the authentication device assigns security components to the SM and the TP, performs validation check with respect to the security components of the SM and the TP and informs the SM or the TP of a validation check result.
Specification