×

Data authentication with a secure environment

  • US 7,715,552 B2
  • Filed: 07/05/2006
  • Issued: 05/11/2010
  • Est. Priority Date: 07/05/2006
  • Status: Active Grant
First Claim
Patent Images

1. A system for data authentication, comprising:

  • a secure processor comprising a physically secure environment wherein, subsequent to manufacture of the secure processor, operations and calculations made within the secure environment are unobservable by other components outside of the secure processor, the secure processor configured to;

    receive an encrypted control word from a headend via a first Entitlement Control Message (ECM),decrypt the encrypted control word using a second decryption key to render the control word,encrypt the control word using a first encryption key,receive usage rights data from the headend via a second ECM,encrypt the received usage rights data using the control word, andsend the received usage rights data; and

    a transport processor configured to;

    receive the encrypted control word that was encrypted using the first encryption key from the secure processor,decrypt the received control word using a first decryption key, wherein the first decryption key is compatible with the first encryption key,receive the encrypted usage rights data from the secure processor,decrypt the received usage rights data using the control word, andsend the decrypted usage rights data to a display device.

View all claims
  • 4 Assignments
Timeline View
Assignment View
    ×
    ×