Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique
Reexamination Certificate
2007-12-04
2007-12-04
Sheikh, Ayaz (Department: 2131)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Particular communication authentication technique
C713S177000, C713S181000, C713S170000, C713S189000, C713S165000, C713S176000, C713S169000, C705S051000, C705S052000, C705S053000, C705S054000, C705S055000, C705S056000, C705S057000, C380S232000, C380S278000, C380S281000
Reexamination Certificate
active
10109111
ABSTRACT:
A system is described for uniquely mating components of a communication network such as a smartcard and a set-top box. When mated, the smartcard and set-top box are tied together and have a single identity. Further, the smartcard operates properly only when inserted into an authorized set-top box. Exchanges of information between both components are secured by encryption and authentication to guard against piracy of the exchanged information. The system provides the same authentication key to the set-top box and the smartcard. This key is used for authenticating communication between the set-top box and the smartcard. First, the authentication key is encrypted by a set-top box mating key. The set-top box employs this mating key to decrypt the authentication key. After it is derived, the authentication key is stored in the set-top box's memory. Further, the same authentication key is encrypted by a smartcard mating key. Thereafter, the smartcard employs the smartcard mating key to extract the authentication key. The clear authentication key is stored in the smartcard's memory as well. In this manner, the authentication key is used for securing all communication between the set-top box and the smart-card. For example, the set-top box may request control words from the smartcard. Only after authenticating the request, are the control words for decrypting digital content provided to the set-top box. If the smartcard authentication key is different from the set-top box key, the request for control words is denied.
REFERENCES:
patent: 5604801 (1997-02-01), Dolan et al.
patent: 6157719 (2000-12-01), Wasilewski et al.
patent: 6363149 (2002-03-01), Candelore
patent: 6466671 (2002-10-01), Maillard et al.
patent: 6853728 (2005-02-01), Kahn et al.
patent: 2001/0009026 (2001-07-01), Terao et al.
patent: 0471373 (1992-02-01), None
patent: 1026898 (2000-08-01), None
patent: WO 97/38530 (1997-10-01), None
Schneier, “Applied Cryptography Second Edition: protocols, algorithms, and source code in C”, Applied Cryptography, John Wiley & Sons, New York, pp. 30-31, 180-181, 265-301, 351-354, 429-459, XP002104180.
Schneier, “Applied Cryptography Second Edition: protocols, algorithms, and source code in C”, Applied Cryptography, John Wiley & Sons, New York, publication date: 1996, pp. 30-31, 180-181, 265-301, 351-354, 429-459, XP002104180.
Chen Annie On-yee
Kimball Bridget
Okimoto John I.
Petty Douglas
Sprunk Eric J.
Chen Shin-Hon
Cullen Larry T.
General Instrument Corporation
Sheikh Ayaz
LandOfFree
Smart card mating protocol does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Smart card mating protocol, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Smart card mating protocol will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3856018