Method and apparatus for security in a data processing system
First Claim
Patent Images
1. A method for secure transmissions, the method comprising:
- determining a registration key specific to a mobile station participating in a transmission;
determining a first key;
encrypting the first key with the registration key;
sending the encrypted first key to the mobile station participating in the transmission;
determining a second key for decrypting content on a broadcast channel;
updating the first key after a first time period has elapsed; and
updating the second key after a second time period has elapsed, wherein the updated second key is determined based on two parts, a first part comprising the updated first key and a second part based on information sent on the broadcast channel, and wherein the first part and the second part are concatenated to determine the updated second key using a cryptographic function.
1 Assignment
0 Petitions
Accused Products
Abstract
Method and apparatus for secure transmissions. Each user is provided a registration key. A long-time updated broadcast key is encrypted using the registration key and provided periodically to a user. A short-time updated key is encrypted using the broadcast key and provided periodically to a user. Broadcasts are then encrypted using the short-time key, wherein the user decrypts the broadcast message using the short-time key.
-
Citations
41 Claims
-
1. A method for secure transmissions, the method comprising:
-
determining a registration key specific to a mobile station participating in a transmission; determining a first key; encrypting the first key with the registration key; sending the encrypted first key to the mobile station participating in the transmission; determining a second key for decrypting content on a broadcast channel; updating the first key after a first time period has elapsed; and updating the second key after a second time period has elapsed, wherein the updated second key is determined based on two parts, a first part comprising the updated first key and a second part based on information sent on the broadcast channel, and wherein the first part and the second part are concatenated to determine the updated second key using a cryptographic function. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A method for secure reception of a transmission, the method comprising:
-
receiving a registration key specific to a mobile station participating in a transmission; receiving, at the mobile station, a first key encrypted with the registration key; decrypting the first key with the registration key; determining a second key using a cryptographic function and the first key, for decrypting content on a broadcast channel; receiving a broadcast stream of information; decrypting the broadcast stream of information using the second key; receiving an updated first key after a first time period has elapsed; and determining an updated second key after a second time period has elapsed, wherein the updated second key is determined based on two parts, a first part comprising the updated first key and a second part based on information sent on the broadcast channel, and wherein the first part and the second part are concatenated to determine the updated second key using a cryptographic function. - View Dependent Claims (15, 16, 17, 18, 19)
-
-
20. In a wireless communication system supporting a broadcast service option, an infrastructure element comprising:
-
a receive circuitry adapted to receive a registration key specific to a mobile station participating in a transmission, receive a first key encrypted with the registration key, receive an updated first key after a first time period has elapsed, and receive a second part for updating a short-time key after a second time period has elapsed; a user identification unit, operative to determine an updated short-time key for decrypting a broadcast message, wherein the short-time key is determined based on two parts, a first part comprising the updated first key and the second part based on information sent on the broadcast channel, and wherein the first part and the second part are concatenated to determine the updated short-time key using a cryptographic function, comprising; processing unit operative to decrypt and to determine key information; memory storage unit for storing a registration key; and a mobile equipment unit adapted to apply the short-time key for decrypting the broadcast message. - View Dependent Claims (21, 22, 23, 24, 25, 26, 27, 28, 29)
-
-
30. A wireless communication system, comprising:
-
means for determining a registration key specific to a mobile station participating in a transmission; means for determining a first key; means for encrypting the first key with the registration key; means for sending the encrypted first key to the mobile station participating in the transmission; means for determining a second key for decrypting content on a broadcast channel; means for updating the first key after a first time period has elapsed; and means for updating the second key after a second time period has elapsed, wherein the updated second key is determined based on two parts, a first part comprising the updated first key and a second part based on information sent on the broadcast channel, and wherein the first part and the second part are concatenated to determine the updated second key using a cryptographic function. - View Dependent Claims (31, 32, 33)
-
-
34. An infrastructure element, comprising:
-
means for receiving a registration key specific to a mobile station participating in a transmission; means for receiving a first key encrypted with the registration key; means for decrypting the first key with the registration key; means for determining a second key using a cryptographic function and the first key, for decrypting content on a broadcast channel; means for receiving a broadcast stream of information; means for decrypting the broadcast stream of information using the second key; means for updating the first key after a first time period has elapsed; and means for updating the second key after a second time period has elapsed, wherein the updated second key is determined based on two parts, a first part comprising the updated first key and a second part based on information sent on the broadcast channel, and wherein the first part and the second part are concatenated to determine the updated second key using a cryptographic function. - View Dependent Claims (35, 36, 37)
-
-
38. A digital storage device storing instructions, said instructions comprising:
-
first set of instructions for receiving a registration key specific to a mobile station participating in a transmission; second set of instructions for receiving a first key encrypted with the registration key; third set of instructions for decrypting the first key with the registration key; fourth set of instructions for determining a second key using a cryptographic function and the first key, for decrypting content on a broadcast channel; fifth set of instructions for receiving the broadcast stream of information; sixth set of instructions for decrypting the broadcast stream of information using the second key; and seventh set of instructions for updating the first key after a first time period has elapsed, updating the second key after a second time period has elapsed, wherein the updated second key is determined based on two parts, a first part comprising the updated first key and a second part based on information sent on a broadcast channel, and wherein the first part and the second part are concatenated to determine the updated second key using a cryptographic function. - View Dependent Claims (39, 40, 41)
-
Specification