Key Derivation for Secure Communications
First Claim
Patent Images
1. A security device, comprising:
- a first memory storage storing a device security key; and
a first processor configured to;
encrypt the device security key using a first seed value to derive a first derived key, and store the first derived key in a second memory storage area of the device; and
in response to a compromise of the first derived key, re-encrypt the device security key using a second seed value to derive a second derived key, and store the second derived key in the second memory storage of the device.
1 Assignment
0 Petitions
Accused Products
Abstract
A security system is disclosed in which a device-specific key value is provided to a security processing device, and then used to derive additional derived keys for use in secured communications. In response to identifying a compromise of the derived keys, the system can be instructed to derive new or replacement derived keys for use in the secured communications. In some embodiments, the security system can be used in a video reception device, to decrypt encrypted video content.
31 Citations
20 Claims
-
1. A security device, comprising:
-
a first memory storage storing a device security key; and a first processor configured to; encrypt the device security key using a first seed value to derive a first derived key, and store the first derived key in a second memory storage area of the device; and in response to a compromise of the first derived key, re-encrypt the device security key using a second seed value to derive a second derived key, and store the second derived key in the second memory storage of the device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A security method, comprising:
-
encrypting, by a computing processor, a device key stored in a device'"'"'s first memory to derive a first derived key for the device; using the first derived key for multiple communication sessions involving the device; and in response to a key compromise, performing a second encryption of the device key to derive a second derived key for the device, the second derived key being different from the first derived key. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification