Apparatus and method for a secure broadcast system
First Claim
Patent Images
1. A method operational on a user terminal for secure processing in a device that securely stores a secret key, the user terminal in communication with a network that broadcasts to a plurality of user terminals, the method operational on the user terminal comprising:
- receiving a plurality of random challenges from the network;
generating a plurality of ciphering keys based on the secret key and the plurality of random challenges;
generating an access key based on the plurality of ciphering keys;
generating a plurality of authentication responses using the plurality of random challenges and the secret key;
sending at least one authentication response, from the plurality of authentication responses, to the network; and
discarding any authentication responses, from the plurality of authentication responses, not sent to the network.
1 Assignment
0 Petitions
Accused Products
Abstract
Apparatus and method for provisioning an access key used for a controlled access broadcast service is disclosed. In one aspect, a method for secure processing in a device that securely stores a secret key comprises receiving a plurality of challenges from a network, generating a plurality of ciphering keys based on the secret key and the plurality of challenges, and generating an access key based on the plurality of ciphering keys.
-
Citations
34 Claims
-
1. A method operational on a user terminal for secure processing in a device that securely stores a secret key, the user terminal in communication with a network that broadcasts to a plurality of user terminals, the method operational on the user terminal comprising:
-
receiving a plurality of random challenges from the network; generating a plurality of ciphering keys based on the secret key and the plurality of random challenges; generating an access key based on the plurality of ciphering keys; generating a plurality of authentication responses using the plurality of random challenges and the secret key; sending at least one authentication response, from the plurality of authentication responses, to the network; and discarding any authentication responses, from the plurality of authentication responses, not sent to the network. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 32, 33, 34)
-
-
13. Apparatus for use in a mobile phone, the apparatus in communication with a network that broadcasts to a plurality of user terminals, the apparatus comprising:
-
an integrated circuit card (ICC) configured to securely store a secret key and to generate a plurality of ciphering key based on the secret key and a plurality of random challenges received from the network; a processor coupled to the ICC and configured to generate an access key based on the plurality of ciphering keys; and a transmitter coupled to the ICC, wherein the ICC uses the plurality of challenges and the secret key to generate a plurality of authentication responses, the transmitter is configured to send at least one authentication response, from the plurality of authentication responses, to the network, and the transmitter is configured to discard any authentication responses, from the plurality of authentication responses, not sent to the network. - View Dependent Claims (14, 15, 16, 17, 18, 19)
-
-
20. Apparatus for use in a mobile phone, the apparatus in communication with a network that broadcasts to a plurality of user terminals, the apparatus comprising:
-
means for receiving a plurality of random challenges from the network; means for generating a plurality of ciphering keys based on the plurality of random challenges and the secret key; means for generating an access key based on the plurality of ciphering keys; means for generating a plurality of authentication responses using the plurality of challenges and the secret key; means for sending at least one authentication response, from the plurality of authentication responses, to the network; and means for discarding any authentication responses, from the plurality of authentication responses, not sent to the network. - View Dependent Claims (21, 22, 23, 24, 25, 26, 27)
-
-
28. A non-transitory machine readable medium for use in a device that securely stores a secret key, the device in communication with a network that broadcasts to a plurality of user terminals, the machine readable medium comprising:
-
codes for receiving a plurality of random challenges from the network; codes for generating a plurality of ciphering keys based on the plurality of random challenges and the secret key; codes for generating an access key based on the plurality of ciphering keys; codes for generating a plurality of authentication responses using the plurality of challenges and the secret key; codes for sending at least one authentication response, from the plurality of authentication responses, to the network; and codes for discarding any authentication responses, from the plurality of authentication responses, not sent to the network. - View Dependent Claims (29, 30, 31)
-
Specification