METHOD AND SYSTEM FOR PREVENTING REVOCATION DENIAL OF SERVICE ATTACKS
    2.
    发明申请
    METHOD AND SYSTEM FOR PREVENTING REVOCATION DENIAL OF SERVICE ATTACKS 有权
    防止服务攻击的撤销方式和系统

    公开(公告)号:US20080086641A1

    公开(公告)日:2008-04-10

    申请号:US11743533

    申请日:2007-05-02

    Abstract: Methods and systems for preventing revocation denial of service attacks are disclosed and may include receiving and decrypting a command for revoking a secure key utilizing a hidden key, and revoking the secure key upon successful verification of a signature. The command may comprise a key ID that is unique to a specific set-top box. A key corresponding to the command for revoking the secure key may be stored in a one-time programmable memory, compared to a reference, and the security key may be revoked based on the comparison. The command for revoking the secure key may be parsed from a transport stream utilizing a hardware parser. The method and system may also comprise generating a command for revoking a secure key. The command may be encrypted and signed utilizing a hidden key and may comprise a key ID that is unique to a specific set-top box.

    Abstract translation: 公开了用于防止撤销拒绝服务攻击的方法和系统,并且可以包括使用隐藏密钥接收和解密用于撤销安全密钥的命令,以及在成功验证签名时撤销安全密钥。 该命令可以包括特定机顶盒唯一的密钥ID。 与参考相比,与撤销安全密钥的命令相对应的密钥可以存储在一次性可编程存储器中,并且可以基于比较来撤销安全密钥。 用于撤销安全密钥的命令可以使用硬件解析器从传输流中解析出来。 该方法和系统还可以包括生成用于撤销安全密钥的命令。 命令可以使用隐藏密钥进行加密和签名,并且可以包括特定机顶盒唯一的密钥ID。

    Method and system for protection of customer secrets in a secure reprogrammable system
    3.
    发明授权
    Method and system for protection of customer secrets in a secure reprogrammable system 有权
    在安全可重编程系统中保护客户机密的方法和系统

    公开(公告)号:US08528102B2

    公开(公告)日:2013-09-03

    申请号:US11753414

    申请日:2007-05-24

    Abstract: Methods and systems for protection of customer secrets in a secure reprogrammable system are disclosed, and may include controlling, via hardware logic and firmware, access to customer specific functions. The firmware may comprise trusted code, and may comprise boot code, stored in non-volatile memory, which may comprise read only memory, or a locked flash memory. A customer mode may be checked via the trusted code prior to allowing downloading of code written by a customer to the reprogrammable system. Access to customer specific functions may be restricted via commands from a trusted source. The hardware logic may be latched at startup in a disabled mode by the firmware, determined by the customer mode stored in a one time programmable memory. The customer mode may be re-checked utilizing the firmware, and may disallow the use of code other than trusted code in the reprogrammable system when the re-checking fails.

    Abstract translation: 公开了用于保护安全可重新编程系统中的客户秘密的方法和系统,并且可以包括通过硬件逻辑和固件来控制对客户特定功能的访问。 固件可以包括可信代码,并且可以包括存储在非易失性存储器中的引导代码,其可以包括只读存储器或锁定的闪存。 可以在允许将由客户编写的代码下载到可重新编程系统之前通过可信代码来检查客户模式。 可以通过来自可信来源的命令来限制访问客户特定功能。 由存储在一次可编程存储器中的客户模式确定的固件可以在禁用模式下的硬件逻辑锁存硬件逻辑。 可以使用固件来重新检查客户模式,并且当重新检查失败时,可以不允许在可再编程系统中使用除可信代码之外的代码。

    Method and system for disaster recovery in a secure reprogrammable system
    4.
    发明授权
    Method and system for disaster recovery in a secure reprogrammable system 有权
    安全可重编程系统中的灾难恢复方法和系统

    公开(公告)号:US08452987B2

    公开(公告)日:2013-05-28

    申请号:US11753474

    申请日:2007-05-24

    Abstract: Methods and systems for software security in a secure communication system are disclosed and may include verifying downloaded code in a reprogrammable system and reloading prestored unmodifiable first stage code upon failure. The prestored unmodifiable first stage code, which may comprise boot code for the reprogrammable system, may be stored in locked flash, and the downloaded software code may be stored in unlocked flash. The downloaded software code may be verified by comparing a signature of the downloaded code to a private key. A first sticky bit may be utilized to indicate a failure of the verification and a second sticky bit may be utilized to indicate passing of the verification and the use of the downloaded software code. Whether to reset the reprogrammable system and reload the prestored unmodifiable first stage code may be determined from within the reprogrammable system, which may comprise a set-top box.

    Abstract translation: 公开了用于安全通信系统中的软件安全性的方法和系统,并且可以包括验证可再编程系统中的下载代码,并且在故障时重新加载预先存储的不可修改的第一级代码。 预先存储的不可修改的第一级代码(其可以包括用于可重新编程系统的引导代码)可以存储在锁定的闪存中,并且下载的软件代码可以存储在解锁的闪存中。 可以通过将下载的代码的签名与私钥进行比较来验证下载的软件代码。 可以使用第一粘性位来指示验证失败,并且可以利用第二粘性位来指示验证的传递和下载的软件代码的使用。 是否重置可编程系统并重新加载预先存储的不可修改的第一级代码可以在可重编程系统内确定,其可以包括机顶盒。

    Method and system for NAND flash support in an autonomously loaded secure reprogrammable system
    5.
    发明授权
    Method and system for NAND flash support in an autonomously loaded secure reprogrammable system 有权
    在自动加载的可重新编程系统中的NAND闪存支持的方法和系统

    公开(公告)号:US08417931B2

    公开(公告)日:2013-04-09

    申请号:US13034176

    申请日:2011-02-24

    CPC classification number: G06F21/575 G06F21/572

    Abstract: A boot code may be segmented to allow separate and independent storage of the code segments in a manner that may enable secure system boot by autonomous fetching and assembling of the boot code by a security sub-system. The code fetching may need to be done without the main CPU running on the chip for security reasons. Because the boot code may be stored in memory devices that require special software application to account for non-contiguous storage of data and/or code, for example a NAND flash memory which would require such an application as Bad Block Management, code segments stored in areas guaranteed to be usable may enable loading remaining segment separately and independently. Each of the code segments may be validated, wherein validation of the code segments may comprise use of hardware-based signatures.

    Abstract translation: 引导代码可以被分段以允许以可以通过安全子系统自主地取出和组合引导代码来实现安全系统引导的方式来分离和独立地存储代码段。 出于安全考虑,代码获取可能需要完成,而主CPU不会在芯片上运行。 由于引导代码可能存储在需要特殊软件应用程序的存储器件中以解决数据和/或代码的不连续存储,例如将要求诸如坏块管理的应用的NAND闪存,存储在 保证可用的区域可以分开和独立地加载剩余段。 可以验证每个代码段,其中代码段的验证可以包括使用基于硬件的签名。

    METHOD AND SYSTEM FOR PREVENTING REVOCATION DENIAL OF SERVICE ATTACKS
    6.
    发明申请
    METHOD AND SYSTEM FOR PREVENTING REVOCATION DENIAL OF SERVICE ATTACKS 有权
    防止服务攻击的撤销方式和系统

    公开(公告)号:US20110197069A9

    公开(公告)日:2011-08-11

    申请号:US11743533

    申请日:2007-05-02

    Abstract: Methods and systems for preventing revocation denial of service attacks are disclosed and may include receiving and decrypting a command for revoking a secure key utilizing a hidden key, and revoking the secure key upon successful verification of a signature. The command may comprise a key ID that is unique to a specific set-top box. A key corresponding to the command for revoking the secure key may be stored in a one-time programmable memory, compared to a reference, and the security key may be revoked based on the comparison. The command for revoking the secure key may be parsed from a transport stream utilizing a hardware parser. The method and system may also comprise generating a command for revoking a secure key. The command may be encrypted and signed utilizing a hidden key and may comprise a key ID that is unique to a specific set-top box.

    Abstract translation: 公开了用于防止撤销拒绝服务攻击的方法和系统,并且可以包括使用隐藏密钥接收和解密用于撤销安全密钥的命令,以及在成功验证签名时撤销安全密钥。 该命令可以包括特定机顶盒唯一的密钥ID。 与参考相比,与撤销安全密钥的命令相对应的密钥可以存储在一次性可编程存储器中,并且可以基于比较来撤销安全密钥。 用于撤销安全密钥的命令可以使用硬件解析器从传输流中解析出来。 该方法和系统还可以包括生成用于撤销安全密钥的命令。 命令可以使用隐藏密钥进行加密和签名,并且可以包括特定机顶盒唯一的密钥ID。

    Method and system for preventing revocation denial of service attacks
    7.
    发明授权
    Method and system for preventing revocation denial of service attacks 有权
    防止撤销拒绝服务攻击的方法和系统

    公开(公告)号:US09461825B2

    公开(公告)日:2016-10-04

    申请号:US11743533

    申请日:2007-05-02

    Abstract: Methods and systems for preventing revocation denial of service attacks are disclosed and may include receiving and decrypting a command for revoking a secure key utilizing a hidden key, and revoking the secure key upon successful verification of a signature. The command may comprise a key ID that is unique to a specific set-top box. A key corresponding to the command for revoking the secure key may be stored in a one-time programmable memory, compared to a reference, and the security key may be revoked based on the comparison. The command for revoking the secure key may be parsed from a transport stream utilizing a hardware parser. The method and system may also comprise generating a command for revoking a secure key. The command may be encrypted and signed utilizing a hidden key and may comprise a key ID that is unique to a specific set-top box.

    Abstract translation: 公开了用于防止撤销拒绝服务攻击的方法和系统,并且可以包括使用隐藏密钥接收和解密用于撤销安全密钥的命令,以及在成功验证签名时撤销安全密钥。 该命令可以包括特定机顶盒唯一的密钥ID。 与参考相比,与撤销安全密钥的命令相对应的密钥可以存储在一次性可编程存储器中,并且可以基于比较来撤销安全密钥。 用于撤销安全密钥的命令可以使用硬件解析器从传输流中解析出来。 该方法和系统还可以包括生成用于撤销安全密钥的命令。 命令可以使用隐藏密钥进行加密和签名,并且可以包括特定机顶盒唯一的密钥ID。

    METHOD AND SYSTEM FOR DISASTER RECOVERY IN A SECURE REPROGRAMMABLE SYSTEM
    8.
    发明申请
    METHOD AND SYSTEM FOR DISASTER RECOVERY IN A SECURE REPROGRAMMABLE SYSTEM 有权
    用于在安全可重构系统中进行灾难恢复的方法和系统

    公开(公告)号:US20080086657A1

    公开(公告)日:2008-04-10

    申请号:US11753474

    申请日:2007-05-24

    Abstract: Methods and systems for software security in a secure communication system are disclosed and may include verifying downloaded code in a reprogrammable system and reloading prestored unmodifiable first stage code upon failure. The prestored unmodifiable first stage code, which may comprise boot code for the reprogrammable system, may be stored in locked flash, and the downloaded software code may be stored in unlocked flash. The downloaded software code may be verified by comparing a signature of the downloaded code to a private key. A first sticky bit may be utilized to indicate a failure of the verification and a second sticky bit may be utilized to indicate passing of the verification and the use of the downloaded software code. Whether to reset the reprogrammable system and reload the prestored unmodifiable first stage code may be determined from within the reprogrammable system, which may comprise a set-top box.

    Abstract translation: 公开了用于安全通信系统中的软件安全性的方法和系统,并且可以包括验证可再编程系统中的下载代码,并且在故障时重新加载预先存储的不可修改的第一级代码。 预先存储的不可修改的第一级代码(其可以包括用于可重新编程系统的引导代码)可以存储在锁定的闪存中,并且下载的软件代码可以存储在解锁的闪存中。 可以通过将下载的代码的签名与私钥进行比较来验证下载的软件代码。 可以使用第一粘性位来指示验证失败,并且可以利用第二粘性位来指示验证的传递和下载的软件代码的使用。 是否重置可编程系统并重新加载预先存储的不可修改的第一级代码可以在可重编程系统内确定,其可以包括机顶盒。

    METHOD AND SYSTEM FOR SECURELY LOADING CODE IN A SECURITY PROCESSOR
    9.
    发明申请
    METHOD AND SYSTEM FOR SECURELY LOADING CODE IN A SECURITY PROCESSOR 有权
    安全处理器中安全加载代码的方法和系统

    公开(公告)号:US20080084273A1

    公开(公告)日:2008-04-10

    申请号:US11753338

    申请日:2007-05-24

    CPC classification number: G06F21/6209 G06F21/77

    Abstract: Securely loading code in a security processor may include autonomous fetching an encrypted security data set, which may comprise security code and/or root keys, by a security processor integrated within a chip. The encrypted security data set may be decrypted via the on-chip security processor and the decrypted code set may be validated on-chip using an on-chip locked value. The on-chip locked value may be stored in a one-time programmable read-only memory (OTP ROM) and may include security information generated by applying one or more security algorithms, for example SHA-based algorithms, to the security data set. The encryption of the security data set may utilize various security algorithms, for example AES-based algorithms. The on-chip locked value may be created and locked after a virgin boot of a device that includes the security processor. The security data set may be authenticated during the virgin boot of the device.

    Abstract translation: 在安全处理器中安全地加载代码可以包括通过集成在芯片内的安全处理器来自主地获取可以包括安全代码和/或根密钥的加密安全数据集。 加密的安全数据集可以经由片上安全处理器解密,并且解码的代码集可以使用片上锁定值在片上进行验证。 片上锁定值可以存储在一次性可编程只读存储器(OTP ROM)中,并且可以包括通过将一个或多个安全算法(例如基于SHA的算法)应用于安全数据集而生成的安全信息。 安全数据集的加密可以利用各种安全算法,例如基于AES的算法。 在包含安全处理器的设备的初始引导之后,可以创建和锁定片上锁定值。 安全数据集可以在设备的初始启动期间被认证。

    Method and system for preventing revocation denial of service attacks

    公开(公告)号:US09338009B2

    公开(公告)日:2016-05-10

    申请号:US11743533

    申请日:2007-05-02

    Abstract: Methods and systems for preventing revocation denial of service attacks are disclosed and may include receiving and decrypting a command for revoking a secure key utilizing a hidden key, and revoking the secure key upon successful verification of a signature. The command may comprise a key ID that is unique to a specific set-top box. A key corresponding to the command for revoking the secure key may be stored in a one-time programmable memory, compared to a reference, and the security key may be revoked based on the comparison. The command for revoking the secure key may be parsed from a transport stream utilizing a hardware parser. The method and system may also comprise generating a command for revoking a secure key. The command may be encrypted and signed utilizing a hidden key and may comprise a key ID that is unique to a specific set-top box.

Patent Agency Ranking