DOWNLOADING OF DATA TO SECURE DEVICES
4 Assignments
0 Petitions
Accused Products
Abstract
An encryption key may be generated based on personalized unit data associated with a software download recipient, for example, a secure processor. In some aspects, the secure processor may generate a decryption key based on its personalized unit data, and a software download may be performed between the software provider and the secure processor using the generated encryption keys. The secure processor may then decrypt and load the software for execution. The encryption and decryption key generation may also be based on a sequence number or other data indicating one or more previous software downloads at the secure processor. Using the sequence number or other data, sequences of multiple encryption and/or decryption keys may be generated to support multiple software downloads to a secure processor.
-
Citations
21 Claims
-
1. (canceled)
-
2. A method comprising:
-
retrieving, by a secure device, personalized unit data and a sequence number stored in a memory of the secure device; generating, by the secure device, a first decryption key based on the personalized unit data and the sequence number, wherein generating the first decryption key comprises executing at least a portion of a key generation algorithm a number of times based on the sequence number; and decrypting, by the secure device, first content using the first decryption key. - View Dependent Claims (3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method comprising:
-
retrieving from a secure memory, by a computing device, first personalized unit data and a first sequence number associated with a first secure processor; generating, by the computing device, a first encryption key based on the first personalized unit data and the first sequence number, wherein generating the first encryption key comprises executing at least a portion of a key generation algorithm a number of times based on the first sequence number; and encrypting, by the computing device, a first content download using the first encryption key; and transmitting, by the computing device, the encrypted first content download to the first secure processor. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18)
-
-
19. A method, comprising:
-
encrypting, by a control server, a first content download for a first secure processor, wherein the encrypting is based on a first sequence number associated with the first secure processor; transmitting, by the control server, the encrypted first content download to the first secure processor; receiving, by the control server, a confirmation message indicating that the encrypted first content download was successfully executed by the first secure processor; and in response to receiving the confirmation message, updating the first sequence number corresponding to the first secure processor within a secure memory of the control server. - View Dependent Claims (20, 21)
-
Specification