Method for providing a secure communication between two devices and application of this method
First Claim
1. A method for providing a secure communication between a first device and a second device in a pay TV system, comprising:
- generating a first key associated with the first device;
encrypting a first message, including the first key, with a public key associated with the first device;
transferring the first encrypted message to the second device;
decrypting the first encrypted message, at the second device, using a secret key corresponding to the public key, to obtain the first key;
encrypting a second message including an authentication using the first key as a key;
returning the second encrypted message to the first device;
decrypting the second encrypted message;
verifying that the authentication in the decrypted second message is correct; and
if verified, using the first key to encrypt at least one subsequent transmission between the first and second devices.
1 Assignment
0 Petitions
Accused Products
Abstract
A method of providing a secure communication between first and second devices is described. The method includes encrypting a random key using an encryption key at a first device and transferring the encrypted random key to the second device for encryption of data communicated from the second device to the first device. The encrypted data received from the second device is decrypted using the random key. The method typically includes transferring a control word encrypted with an encryption key to the second device for decryption, and encryption using the random key. The encrypted control word received from the second device is then decrypted using the random key. The invention extends to a method of enabling a decoder, and to a decoder, to decode a data stream. It also extends, inter alia, to a method of authenticating an enabling device and to an enabling device.
-
Citations
55 Claims
-
1. A method for providing a secure communication between a first device and a second device in a pay TV system, comprising:
-
generating a first key associated with the first device; encrypting a first message, including the first key, with a public key associated with the first device; transferring the first encrypted message to the second device; decrypting the first encrypted message, at the second device, using a secret key corresponding to the public key, to obtain the first key; encrypting a second message including an authentication using the first key as a key; returning the second encrypted message to the first device; decrypting the second encrypted message; verifying that the authentication in the decrypted second message is correct; and if verified, using the first key to encrypt at least one subsequent transmission between the first and second devices. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. Apparatus for providing a secure communication in a pay TV system, the apparatus comprising:
-
a first device including at least one microprocessor and being configured to; generate a first key associated with the first device; encrypt a first message, including the first key, with a public key associated with the first device; and transfer the first encrypted message; and a second device including at least one microprocessor and being configured to; receive the first encrypted message, decrypt the first encrypted message, by using a secret key corresponding to the public key, to obtain the first key, encrypt a second message containing an authentication using the first key as a key, and return the second encrypted message to the first device;
the first device being further configured to;decrypt the second encrypted message for verification upon which, the apparatus uses the first key to encrypt at least one subsequent transmission between the first and second devices. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A method of providing secure communications with a device for use in a pay TV system, comprising:
-
generating a first key associated with the device; encrypting a first message, including the first key, with a public key associated with the device; transferring the first encrypted message from the device; receiving a second encrypted message at the device; the second message including an authentication and being encrypted using the first key; decrypting the second encrypted message; verifying that the authentication in the decrypted second message is correct; and if verified, using the first key to encrypt at least one subsequent transmission from the first device. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22)
-
-
23. An apparatus to provide secure communications in a pay TV system, the apparatus comprising a device, including at least one microprocessor and being configured to:
-
generate a first key associated with the device; encrypt a first message, including the first key, with a public key associated with the device; transfer the first encrypted message from the device; receive a second encrypted message at the device, the second message including an authentication and being encrypted using the first key; decrypt the second encrypted message; verify that the authentication in the decrypted second message is correct; and if verified, use the first key to encrypt at least one subsequent transmission from the first device. - View Dependent Claims (24, 25, 26, 27, 28, 29)
-
-
30. A method of providing secure communications with a device in a pay TV system, comprising:
-
receiving a first encrypted message, including a first key, and encrypted with a public key; decrypting the first encrypted message using a secret key corresponding to the public key; transmitting a second message to a remote device for verification; the second message including an authentication and being encrypted using the first key; and if verification occurs, receiving or transmitting at least one subsequent transmission encrypted using the first key. - View Dependent Claims (31, 32, 33, 34, 35, 36)
-
-
37. An apparatus to provide secure communications in a pay TV system, the apparatus comprising a device, including at least one microprocessor and being configured to:
-
receive a first encrypted message, including a first key, and encrypted with a public key; decrypt the first encrypted message using a secret key corresponding to the public key; transmit a second message to a remote device for verification; the second message including an authentication and being encrypted using the first key; and if verification occurs, receive or transmit at least one subsequent transmission encrypted using the first key. - View Dependent Claims (38, 39, 40, 41, 42, 43)
-
-
44. A method for providing a secure communication between a first device and a second device, the method including:
-
generating a first key and an authentication number, both associated with the first device; encrypting a first message, including the first key and the authentication number; transferring the first encrypted message to the second device; decrypting the first encrypted message at the second device, to obtain the first key and the authentication number; encrypting a second message, including the first key and the authentication number; returning the second encrypted message to the first device; decrypting the second encrypted message; verifying that the authentication number in the decrypted second message is correct; and if verified, using the first key to encrypt at least one subsequent transmission between the first and second devices. - View Dependent Claims (45, 46, 47, 48, 49)
-
-
50. Apparatus to provide a secure communication, the apparatus comprising:
-
a first device including at least one microprocessor and being configured to; generate a first key and an authentication number, both associated with the first device; encrypt a first message, including the first key and the authentication number; and transfer the first encrypted message; and a second device including at least one microprocessor and being configured to; receive the first encrypted message, decrypt the first encrypted message to obtain the first key and the authentication number, encrypt a second message containing the authentication number, using the first key, and return the second encrypted message to the first device;
the first device being further configured to;decrypt the second encrypted message for verification of the authentication number, upon which, the apparatus uses the first key to encrypt at least one subsequent transmission between the first and second devices. - View Dependent Claims (51, 52, 53, 54, 55)
-
Specification