PREVENTING THE USE OF MODIFIED RECEIVER FIRMWARE IN RECEIVERS OF A CONDITIONAL ACCESS SYSTEM
First Claim
Patent Images
1. A receiver comprising:
- a descrambler configured to descramble scrambled content using a control word to obtain descrambled content;
a decrypter configured to decrypt an encrypted control word using a response to obtain the control word;
a firmware memory; and
a probe module configured to receive a challenge indicative of one or more locations in the firmware memory and to read data from the one or more locations in the firmware memory, the data forming the response.
3 Assignments
0 Petitions
Accused Products
Abstract
The invention enables the shared secret, which is used for encrypting the communication of CWs from a smartcard to a receiver, to cover at least a part of a binary image of firmware that is executing in the receiver. Preferably the shared secret covers the entire binary image of the firmware. Hereto, data from one or more predefined firmware memory locations are read, the set of data forming the shared secret.
7 Citations
15 Claims
-
1. A receiver comprising:
-
a descrambler configured to descramble scrambled content using a control word to obtain descrambled content; a decrypter configured to decrypt an encrypted control word using a response to obtain the control word; a firmware memory; and a probe module configured to receive a challenge indicative of one or more locations in the firmware memory and to read data from the one or more locations in the firmware memory, the data forming the response. - View Dependent Claims (2, 7, 8, 9, 10, 11)
-
-
3. A smartcard comprising:
-
a key memory configured to store a first key and a second key; a first decrypter configured to decrypt one or more encrypted challenge-response pairs using the second key from the key memory to obtain one or more decrypted challenge response pairs; a memory configured to store the one or more challenge-response pairs; a second decrypter configured to decrypt an encrypted control word using the first key from the key memory to obtain a control word; an encrypter configured to encrypt the control word using a response of one of the challenge-response pairs stored in the memory to obtain a re-encrypted control word, wherein the smartcard is configured to transmit the re-encrypted control word and a challenge of the one of the challenge-response pairs to a receiver, and wherein the challenge is indicative of one or more locations in a firmware memory of the receiver, data in the one or more locations in the firmware forming the response enabling the receiver to decrypt the encrypted control word. - View Dependent Claims (6)
-
-
4. A smartcard comprising:
-
a key memory configured to store a key; a decrypter configured to decrypt an encrypted control word, an encrypted challenge and two or more encrypted responses using the key from the key memory to obtain a control word, a challenge and two or more responses, respectively, wherein each response forms a challenge-response pair with the challenge for a particular receiver; an encrypter configured to encrypt the control word using a response of one of the challenge response pairs to obtain a re-encrypted control word, wherein the smartcard is configured to transmit the re-encrypted control word and the challenge of the one of the challenge-response pairs to a receiver, and wherein the challenge is indicative of one or more locations in a firmware memory of the receiver, data in the one or more locations in the firmware forming the response enabling the receiver to decrypt the encrypted control word. - View Dependent Claims (5)
-
-
12. A method in a receiver comprising:
-
descrambling scrambled content using a control word to obtain descrambled content; decrypting an encrypted control word using a response to obtain the control word; receiving a challenge indicative of one or more locations in a firmware memory of the receiver; and reading data from the one or more locations in the firmware memory, the data forming the response. - View Dependent Claims (13)
-
-
14. A method in a smartcard comprising:
-
decrypting one or more encrypted challenge response pairs using a second key to obtain one or more decrypted challenge response pairs; storing the one or more challenge response pairs) in a memory; decrypting an encrypted control word using a first key to obtain a control word; encrypting the control word using a response of one of the challenge response pairs stored in the memory to obtain a re-encrypted control word; and transmitting the re-encrypted control word and a challenge of the one of the challenge response pairs to a receiver, wherein the challenge is indicative of one or more locations in a firmware memory of the receiver, data in the one or more locations in the firmware forming the response enabling the receiver to decrypt the encrypted control word.
-
-
15. A method in a smartcard comprising:
-
decrypting an encrypted control word, an encrypted challenge and two or more encrypted responses using a key to obtain a control word, a challenge and two or more responses, respectively, wherein each response forms a challenge response pair with the challenge for a particular receiver; encrypting the control word using a response of one of the challenge response pairs to obtain a re-encrypted control word; and transmitting the re-encrypted control word and the challenge of the one of the challenge response pairs to a receiver, wherein the challenge is indicative of one or more locations in a firmware memory of the receiver, data in the one or more locations in the firmware forming the response enabling the receiver to decrypt the encrypted control word.
-
Specification