Smart card mating protocol

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S177000, C713S181000, C713S170000, C713S189000, C713S165000, C713S176000, C713S169000, C705S051000, C705S052000, C705S053000, C705S054000, C705S055000, C705S056000, C705S057000, C380S232000, C380S278000, C380S281000

Reexamination Certificate

active

10109111

ABSTRACT:
A system is described for uniquely mating components of a communication network such as a smartcard and a set-top box. When mated, the smartcard and set-top box are tied together and have a single identity. Further, the smartcard operates properly only when inserted into an authorized set-top box. Exchanges of information between both components are secured by encryption and authentication to guard against piracy of the exchanged information. The system provides the same authentication key to the set-top box and the smartcard. This key is used for authenticating communication between the set-top box and the smartcard. First, the authentication key is encrypted by a set-top box mating key. The set-top box employs this mating key to decrypt the authentication key. After it is derived, the authentication key is stored in the set-top box's memory. Further, the same authentication key is encrypted by a smartcard mating key. Thereafter, the smartcard employs the smartcard mating key to extract the authentication key. The clear authentication key is stored in the smartcard's memory as well. In this manner, the authentication key is used for securing all communication between the set-top box and the smart-card. For example, the set-top box may request control words from the smartcard. Only after authenticating the request, are the control words for decrypting digital content provided to the set-top box. If the smartcard authentication key is different from the set-top box key, the request for control words is denied.

REFERENCES:
patent: 5604801 (1997-02-01), Dolan et al.
patent: 6157719 (2000-12-01), Wasilewski et al.
patent: 6363149 (2002-03-01), Candelore
patent: 6466671 (2002-10-01), Maillard et al.
patent: 6853728 (2005-02-01), Kahn et al.
patent: 2001/0009026 (2001-07-01), Terao et al.
patent: 0471373 (1992-02-01), None
patent: 1026898 (2000-08-01), None
patent: WO 97/38530 (1997-10-01), None
Schneier, “Applied Cryptography Second Edition: protocols, algorithms, and source code in C”, Applied Cryptography, John Wiley & Sons, New York, pp. 30-31, 180-181, 265-301, 351-354, 429-459, XP002104180.
Schneier, “Applied Cryptography Second Edition: protocols, algorithms, and source code in C”, Applied Cryptography, John Wiley & Sons, New York, publication date: 1996, pp. 30-31, 180-181, 265-301, 351-354, 429-459, XP002104180.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Smart card mating protocol does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Smart card mating protocol, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Smart card mating protocol will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3856018

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.