×

Preventing unauthorized poaching of set top box assets

  • US 8,108,680 B2
  • Filed: 07/23/2007
  • Issued: 01/31/2012
  • Est. Priority Date: 07/23/2007
  • Status: Active Grant
First Claim
Patent Images

1. A method for maintaining control over a set-top-box (STB) asset, comprising:

  • authenticating, using a hardware-based authentication process, a first software application, the first software application having been generated by a first party, wherein the STB asset is operated by a second party;

    once authenticated, using the first software application to authenticate a public key received with a second software application that was generated by a third party and is intended to be run on the STB asset;

    once authenticated, using the public key of the third party to authenticate the second software application generated by the third party; and

    confirming that the second software application is authorized to be run on the STB asset by consulting a list of authorized third parties, wherein consulting the list of authorized third parties comprise utilizing a list maintenance code signing key (LMCSK) having a unique serial number always recognized by the hardware-based authentication process, and locating the third party that generated the second software application, wherein the list of authorized third parties is itself authenticated by the first software application using the LMCSK.

View all claims
  • 9 Assignments
Timeline View
Assignment View
    ×
    ×