WO2006086296A1 - Method for securely distributing configuration information to a device - Google Patents

Method for securely distributing configuration information to a device Download PDF

Info

Publication number
WO2006086296A1
WO2006086296A1 PCT/US2006/004088 US2006004088W WO2006086296A1 WO 2006086296 A1 WO2006086296 A1 WO 2006086296A1 US 2006004088 W US2006004088 W US 2006004088W WO 2006086296 A1 WO2006086296 A1 WO 2006086296A1
Authority
WO
WIPO (PCT)
Prior art keywords
session key
configuration information
certificate
encrypted
key
Prior art date
Application number
PCT/US2006/004088
Other languages
French (fr)
Inventor
Ali Negahdar
Original Assignee
Arris International, Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Arris International, Inc. filed Critical Arris International, Inc.
Publication of WO2006086296A1 publication Critical patent/WO2006086296A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/045Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply hybrid encryption, i.e. combination of symmetric and asymmetric encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates

Definitions

  • This invention relates, generally, to communication networks and devices and, more particularly, to protecting configuration file information during distribution to a user device over a non-secure protocol.
  • DOCSIS Data-Over-Cable Service Interface Specifications
  • CATV community antenna television
  • MSO multiple services operators
  • CATV CATV network infrastructure for carrying voice, video on demand (“VoD”) and video conferencing traffic signals, among other types.
  • An MSO may use what is known in the art as PacketCable for providing telephony services to users.
  • PacketCableTM which is a trademark of CableLabs , facilitates the presentation of a transparent interface to a user with respect to operation of the network.
  • a user plugs a standard telephone into a user device, which presents to the telephone what appears to be a traditional plain old telephony service ("POTS") line card interface.
  • POTS plain old telephony service
  • the user device transforms analog POTS signals to and from the telephone from/to internet packets .
  • Such a user device typically includes a media terminal adaptor ("MTA") that performs processing of signals between the telephone and the network interface portions of the user device.
  • MTA media terminal adaptor
  • a user device such as one containing an MTA
  • secure provisioning of the MTA device is performed according to procedures set forth in the PacketCable specification.
  • Such secure provisioning ensures that the device securely receives information that allows it to confirm with the network that it is the device it purports to be.
  • Transporting of the user device configuration data as specified in the PacketCable specification is typically performed securely according to protocols and procedures that prevent unauthorized access to information related to the user device and associated user.
  • MSOs which may operate a DOCSIS network for communicating data over a communication network, may want to provide telephony services over the same network without conforming to the PacketCable specification related to device security.
  • a user device attempting to register with the provisioning server must demonstrate to the provisioning server that it is authorized to do so before a configuration file is sent to the user device attempting to register.
  • PacketCable specifies the use of Kerberized Key Management,in combination with SNMPv3 to secure the device provisioning process. Kerberized Key Management is familiar to those skilled in the art.
  • the reader may refer to section 5 of PacketCable TM MTA Device Provisioning Specification.
  • an MSO may not wish to implement secure provisioning according to PacketCable sec 5, or later versions thereof. These reasons may include, but are not limited to, reluctance or inability to purchase network equipment required to implement the PacketCable sec. 5 specified security procedures. Another reason may be that that an MSO may encounter difficulty in integrating existing equipment used in providing telephony according to PacketCable with the network equipment required for providing secure provisioning according to PacketCable sec. 5. ' An operator may, for example, wish to establish a session initiation protocol ("SIP”) communication session without using the PacketCable method for securely transmitting configuration information to a user device.
  • SIP session initiation protocol
  • a password is sent from the user device to a provisioning server.
  • the password should be provided to the user device such that it is not susceptible to being discovered by other entities. As discussed above, the operator may not want to use the PacketCable-specified method for securely transmitting confidential information to the user device.
  • FIG. 1 illustrates a system for providing communication over a network.
  • FIG. 2 illustrates a system and method for securely distributing a configuration file to a MTA device.
  • FIG. 3 illustrates a flow diagram of a method for securely distributing configuration information to an MTA device.
  • FIG. 4 illustrates a flow diagram of a method for securely decrypting a composite file containing configuration information.
  • Network 12 may be one of a variety of network types.
  • Network 12 typically includes an HFC network for communication between user devices and a CMTS.
  • Network 13 typically may include one or more IP networks that couple back-end office equipment, call servers and provisioning servers, for example, to the CMTS.
  • head end 14 and user devices 16 are coupled together for communication there between.
  • Networks 12 and 13 may collectively be referred to as an MSO's network, since a particular service provider typically couples its CMTS to networks 12 and 13.
  • network 13 may include an IP network for example, that may be public, and thus not under the control of a given MSO, and another one or more networks that may be private. However, for clarity, only one symbolic cloud is shown to represent network 13.
  • head end herein generally refers to equipment at a service provider's central location. Equipment located at a head end typically includes a cable modem termination system ("CMTS") for data services, interfaces to other networks and often video servers and satellite dish antennas for receiving video programming.
  • CMTS cable modem termination system
  • head end as used herein in reference to head end 14 refers to a location owned by a service operator having centralized equipment for providing services.
  • each user device 16 When each user device 16 is manufactured, information, typically referred to as a certificate 18, is permanently embedded into the nonvolatile RAM. This certificate information 18 may become part of a management information base ("MIB") 20 that is created when each device 16 is initialized.
  • MIB management information base
  • Each of devices 16 may contain, for example, a media terminal adaptor (“MTA”) or an embedded MTA (“EMTA”).
  • MTA media terminal adaptor
  • EMTA embedded MTA
  • Information in each certificate 18 is used to protect a configuration file during its distribution to a device 16.
  • the configuration file is retrieved from configuration file database 21 stored on provisioning server 22, which is typically coupled to head end 14 via network 13.
  • the configuration file is used by devices 16 while being initialized for operation with an MSO's network. It will be appreciated that provisioning server 22 may be located at the head end 14, or located at another location and be coupled to the head end.
  • system 10 is illustrated showing some major process steps of securely transporting configuration file 34A from database 34 to an MTA user device 16A.
  • device 16A sends its device certificate 18 to provisioning server 14.
  • Information from certificate 18 that is sent to provisioning server 22 at head end 14 includes public key 24 that is part of public/private key pair 26.
  • head end may be referred to in the art as the CMTS in the context of providing DOCSIS data services.
  • the MTA device does not communicate with the CMTS when communicating with provisioning server 22 and sending certificate 18 to the provisioning server.
  • use of public/private key pairs is known in the art for securely transmitting information in a network. Therefore, background detail regarding public/private keys is not given here. It is noted that in the figure, the public key 24 points to the right and the private key 28 points to the left, to distinguish them visually in the figure from one another.
  • encircled reference numerals are used to show temporal relationship of some of the steps of the process of securely transmitting configuration.
  • a message 30 is sent toward provisioning server 22 at step 1, which is indicated by the encircled reference numeral 1 (one).
  • Message 30 typically contains an MIB object as known in the art.
  • the MIB object typically contains certificate 18, which contains public key 24 as discussed above. It will be appreciated that the preferred method for receiving the certificate of a user device is via message 30 sent over network 12.
  • the public key information from certificate 18 may also be provided to provisioning server 22 via a download from a server based on the MAC address of an MTA device. Alternatively, certificate 18 may be provided to server 22 via a compact disk, DVD or other similar storage means.
  • device certificate 18 may be extracted when an MSO receives a particular device from the device's manufacturer.
  • public key 24 is used to encrypt information to be sent from head end 14 toward user device 16A.
  • the information encrypted by public key 24 may include a randomly generated session key 32.
  • Session key 32 is generated by the provisioning server and is unique from other session keys that may have been generated for other devices, or even for device 16A during another initiation process.
  • Session key 32 is preferably symmetric (also referred to as secret) as opposed to asymmetric, which is a term typically used in the art to describe public/private key pairs.
  • symmetric key 32 When symmetric key 32 has been generated at step 2, it is used to encrypt configuration information from configuration database 34 corresponding to device 16A at step 3.
  • Configuration information from database 34 may be extracted from provisioning server 22 based on unique identifier information associated with device 16A, such as for example, MAC address, public key, etc.
  • Encrypted configuration information 36 is shown by the illustration of configuration information 34A inside of session key 32.
  • session key 32 After session key 32 has been used to encrypt configuration information 34A corresponding to device 16A, the session key is encrypted at step 4 using public key 24 that was received at step 1. The result is encrypted session key 38, which is shown by the illustration of session key 32 inside of public key 24. Then, encrypted session key 38 and encrypted configuration information 36 are combined into a composite file, or message, 39 at step 5. Composite file/message 39 is then sent to device 16A at step 6. Private key 28 is then used to decrypt the session key at step 7. The decrypted session key is then used to decrypt the configuration information 34A. Finally, configuration information 34A is used to complete initialization and configuration of device 16A for use in system 10. Such use may include conducting telephony calls using network 12.
  • Method 300 begins at step 305 when a provisioning server is ready to obtain a certificate.
  • a provisioning server is coupled to a network and powered up, it is continuously awaiting a request for configuration information from a user device.
  • the server determines at step 310 whether a certificate has already been delivered that corresponds to the requesting devices. If yes, the method advances to step 325.
  • step 315 a determination is made whether a certificate has been received in an MIB corresponding to the requesting device. If yes, the method advances to step 325. If a certificate has not already been received, method 300 advances to step 320, and a certificate is retrieved from an MIB corresponding to the device requesting configuration information. At step 325, the provisioning server extracts a public key from the certificate.
  • the provisioning server generates a random symmetric session key and configuration information associated with the requesting MTA device is encrypted using the session key at step 335. It will be appreciated that the generation and encrypting of the configuration file information may be performed in an order different from that shown in the figure with respect to steps 310 — 325.
  • the session key is encrypted with the public key at step 340.
  • the version number of the configuration information is written to a composite file. This version number may be used to provide detail to the MTA device as to how information within the composite file is arranged, thus facilitating decrypting and unpacking of the information.
  • the encrypted session key is written to the composite file and the encrypted configuration information is written to the composite file at step 355.
  • the composite file is made available to the requesting MTA device at a TFTP sever, and the MTA device is notified that the composite file is available at step 365.
  • FIG. 4 a flow diagram of a method 400 for securely decrypting configuration information at an MTA device is shown.
  • Method 400 begins when a requesting MTA device receives notification that a composite file containing configuration information is available.
  • the composite file is downloaded at step 410.
  • the version number is extracted from the composite file and used to refer to a mapping to determine what bytes of the composite file correspond to the encrypted session key and what bytes correspond to the encrypted configuration information.
  • the encrypted session key is extracted based on the mapping referred to by the version number.
  • the MTA devices embedded private key is used to decrypt the session key at step 525.
  • the encrypted configuration information is extracted from the composite file.
  • the extracted configuration information is decrypted using the already decrypted symmetric session key.
  • the MTA device uses the decrypted configuration information to configure itself for connection and operation with the network, and then method 400 ends. It will be appreciated that the arrangement of bytes within the composite file may change, and the version number of the configuration information refers to said arrangement.
  • the version number is used to determine which remaining bytes in the composite file contain the encrypted configuration information, and which contain the encrypted session key, the version number is placed in the composite file by the provisioning server 'in the clear,' meaning that the version number is not encrypted.
  • a mapping of the arrangement based on version number may be downloaded to the MTA device by the provisioning server, or may be accessible by the MTA but located at the provisioning server.
  • the encrypted session key and encrypted configuration information may include the size of the session key and configuration information, respectively.
  • a non- secret initialization vector may be encrypted with the configuration information.

Abstract

An MTA certificate containing a public key is provided to a provisioning server, typically via an MIB. The provisioning server retrieves configuration information associated with the MTA. A symmetric session key is randomly generated and used to encrypt the configuration information. The public key is used to encrypt the symmetric key. The encrypted session key is combined with the encrypted configuration information into a composite file, and the composite file is distributed to the device that contains the MTA. The MTA device decrypts the session key using its private key that corresponds to the public key and the decrypted session key is used to decrypt the configuration information. The decrypted configuration information is used to complete initialization of the MTA device.

Description

METHOD FOR SECURELY DISTRIBUTING CONFIGURATION
INFORMATION TO A DEVICE
CROSS REFERENCE TO RELATED APPLICATION
This application claims priority under 35 U.S. C. 119(e) to U.S. provisional patent application number 60/651,039 entitled "SIP-based EMTA," which was filed February 7, 2005, and is incorporated herein by reference in its entirety.
FIELD OF THE INVENTION This invention relates, generally, to communication networks and devices and, more particularly, to protecting configuration file information during distribution to a user device over a non-secure protocol.
BACKGROUND
Data-Over-Cable Service Interface Specifications ("DOCSIS") has been established by cable television network operators to facilitate transporting data traffic, primarily internet traffic, over existing community antenna television ("CATV") networks. In addition to transporting data traffic as well as television content signals over a CATV network, multiple services operators ("MSO") also use their CATV network infrastructure for carrying voice, video on demand ("VoD") and video conferencing traffic signals, among other types.
An MSO may use what is known in the art as PacketCable for providing telephony services to users. PacketCable™, which is a trademark of CableLabs , facilitates the presentation of a transparent interface to a user with respect to operation of the network. In other words, a user plugs a standard telephone into a user device, which presents to the telephone what appears to be a traditional plain old telephony service ("POTS") line card interface. However, the user device transforms analog POTS signals to and from the telephone from/to internet packets .
Such a user device typically includes a media terminal adaptor ("MTA") that performs processing of signals between the telephone and the network interface portions of the user device. When a user device, such as one containing an MTA, performs processing of telephony signals for transport over a network according to PacketCable, secure provisioning of the MTA device is performed according to procedures set forth in the PacketCable specification. Such secure provisioning ensures that the device securely receives information that allows it to confirm with the network that it is the device it purports to be. Transporting of the user device configuration data as specified in the PacketCable specification is typically performed securely according to protocols and procedures that prevent unauthorized access to information related to the user device and associated user. However, some MSOs, which may operate a DOCSIS network for communicating data over a communication network, may want to provide telephony services over the same network without conforming to the PacketCable specification related to device security. A user device attempting to register with the provisioning server must demonstrate to the provisioning server that it is authorized to do so before a configuration file is sent to the user device attempting to register. For example, PacketCable specifies the use of Kerberized Key Management,in combination with SNMPv3 to secure the device provisioning process. Kerberized Key Management is familiar to those skilled in the art. For further definition of terms and the requirements of PacketCable MTA security requirements, the reader may refer to section 5 of PacketCable TM MTA Device Provisioning Specification. This document has document number PKT-SP-PROV-Il 1-.050812, which may be found at http://www.packetcable.com/downloads/specs/PKT-SP- PROV-Il l-050812.pdf, is referred to elsewhere herein as PacketCable sec. 5, and is incorporated herein by reference in its entirety for purposes of providing background information.
For a variety of reasons, an MSO may not wish to implement secure provisioning according to PacketCable sec 5, or later versions thereof. These reasons may include, but are not limited to, reluctance or inability to purchase network equipment required to implement the PacketCable sec. 5 specified security procedures. Another reason may be that that an MSO may encounter difficulty in integrating existing equipment used in providing telephony according to PacketCable with the network equipment required for providing secure provisioning according to PacketCable sec. 5. ' An operator may, for example, wish to establish a session initiation protocol ("SIP") communication session without using the PacketCable method for securely transmitting configuration information to a user device. To authenticate a user device in a SIP session, a password is sent from the user device to a provisioning server. However, before the device sends the password to the provisioning server, the password should be provided to the user device such that it is not susceptible to being discovered by other entities. As discussed above, the operator may not want to use the PacketCable-specified method for securely transmitting confidential information to the user device.
Thus, there is a need in the art for a method and system for securely distributing information used to initialize a user device according to PacketCable in general, but not in accordance with PacketCable-specified security, an example of which is described in PacketCable sec. 5, as discussed above. BRIEF DESCRIPTION OF DRAWINGS
FIG. 1 illustrates a system for providing communication over a network.
FIG. 2 illustrates a system and method for securely distributing a configuration file to a MTA device.
FIG. 3 illustrates a flow diagram of a method for securely distributing configuration information to an MTA device.
FIG. 4 illustrates a flow diagram of a method for securely decrypting a composite file containing configuration information.
DETAILED DESCRIPTION
As a preliminary matter, it will be readily understood by those persons skilled in the art that the present invention is susceptible of broad utility and application. Many methods, embodiments and adaptations of the present invention other than those herein described, as well as many variations, modifications, and equivalent arrangements, will be apparent from or reasonably suggested by the present invention and the following description thereof, without departing from the substance or scope of the present invention.
Accordingly, while the present invention has been described herein in detail in relation to preferred embodiments, it is to be understood that this disclosure is only illustrative and exemplary of the present invention and is made merely for the purposes of providing a full and enabling disclosure of the invention. The following disclosure is not intended nor is to be construed to limit the present invention or otherwise to exclude any such other embodiments, adaptations, variations, modifications and equivalent arrangements, the present invention being limited only by the claims appended hereto and the equivalents thereof.
Turning to FIG. 1, a system 10 for facilitating communication over a communication network 12 is shown. Network 12 may be one of a variety of network types. Network 12 typically includes an HFC network for communication between user devices and a CMTS. Network 13 typically may include one or more IP networks that couple back-end office equipment, call servers and provisioning servers, for example, to the CMTS. Over network 12, head end 14 and user devices 16 are coupled together for communication there between. Networks 12 and 13 may collectively be referred to as an MSO's network, since a particular service provider typically couples its CMTS to networks 12 and 13.
It will be appreciated that network 13 may include an IP network for example, that may be public, and thus not under the control of a given MSO, and another one or more networks that may be private. However, for clarity, only one symbolic cloud is shown to represent network 13. It will be appreciated that use of the term head end herein generally refers to equipment at a service provider's central location. Equipment located at a head end typically includes a cable modem termination system ("CMTS") for data services, interfaces to other networks and often video servers and satellite dish antennas for receiving video programming. Thus, the term head end as used herein in reference to head end 14 refers to a location owned by a service operator having centralized equipment for providing services. When each user device 16 is manufactured, information, typically referred to as a certificate 18, is permanently embedded into the nonvolatile RAM. This certificate information 18 may become part of a management information base ("MIB") 20 that is created when each device 16 is initialized. Each of devices 16 may contain, for example, a media terminal adaptor ("MTA") or an embedded MTA ("EMTA"). Information in each certificate 18 is used to protect a configuration file during its distribution to a device 16. The configuration file is retrieved from configuration file database 21 stored on provisioning server 22, which is typically coupled to head end 14 via network 13. The configuration file is used by devices 16 while being initialized for operation with an MSO's network. It will be appreciated that provisioning server 22 may be located at the head end 14, or located at another location and be coupled to the head end.
Turning now to FIG. 2, system 10 is illustrated showing some major process steps of securely transporting configuration file 34A from database 34 to an MTA user device 16A. As part of registration, device 16A sends its device certificate 18 to provisioning server 14. Information from certificate 18 that is sent to provisioning server 22 at head end 14 includes public key 24 that is part of public/private key pair 26. As discussed above, it will be appreciated that the term head end may be referred to in the art as the CMTS in the context of providing DOCSIS data services. However, the MTA device does not communicate with the CMTS when communicating with provisioning server 22 and sending certificate 18 to the provisioning server. Furthermore, it will be appreciated that use of public/private key pairs is known in the art for securely transmitting information in a network. Therefore, background detail regarding public/private keys is not given here. It is noted that in the figure, the public key 24 points to the right and the private key 28 points to the left, to distinguish them visually in the figure from one another.
In the figure, encircled reference numerals are used to show temporal relationship of some of the steps of the process of securely transmitting configuration. In the first step, a message 30 is sent toward provisioning server 22 at step 1, which is indicated by the encircled reference numeral 1 (one). Message 30 typically contains an MIB object as known in the art. The MIB object typically contains certificate 18, which contains public key 24 as discussed above. It will be appreciated that the preferred method for receiving the certificate of a user device is via message 30 sent over network 12. The public key information from certificate 18 may also be provided to provisioning server 22 via a download from a server based on the MAC address of an MTA device. Alternatively, certificate 18 may be provided to server 22 via a compact disk, DVD or other similar storage means. In addition, device certificate 18 may be extracted when an MSO receives a particular device from the device's manufacturer. Regardless of how public key 24 is provided to server 22 at head end 14, public key 24 is used to encrypt information to be sent from head end 14 toward user device 16A. The information encrypted by public key 24 may include a randomly generated session key 32. Session key 32 is generated by the provisioning server and is unique from other session keys that may have been generated for other devices, or even for device 16A during another initiation process. Session key 32 is preferably symmetric (also referred to as secret) as opposed to asymmetric, which is a term typically used in the art to describe public/private key pairs. When symmetric key 32 has been generated at step 2, it is used to encrypt configuration information from configuration database 34 corresponding to device 16A at step 3. Configuration information from database 34 may be extracted from provisioning server 22 based on unique identifier information associated with device 16A, such as for example, MAC address, public key, etc. Encrypted configuration information 36 is shown by the illustration of configuration information 34A inside of session key 32.
After session key 32 has been used to encrypt configuration information 34A corresponding to device 16A, the session key is encrypted at step 4 using public key 24 that was received at step 1. The result is encrypted session key 38, which is shown by the illustration of session key 32 inside of public key 24. Then, encrypted session key 38 and encrypted configuration information 36 are combined into a composite file, or message, 39 at step 5. Composite file/message 39 is then sent to device 16A at step 6. Private key 28 is then used to decrypt the session key at step 7. The decrypted session key is then used to decrypt the configuration information 34A. Finally, configuration information 34A is used to complete initialization and configuration of device 16A for use in system 10. Such use may include conducting telephony calls using network 12.
Turning now to FIG. 3, a flow diagram is shown that illustrates the steps of a method 300 for distributing configuration information to an MTA at a user device. Method 300 begins at step 305 when a provisioning server is ready to obtain a certificate. Typically, when the provisioning server is coupled to a network and powered up, it is continuously awaiting a request for configuration information from a user device. When a request is received at the provisioning server, the server determines at step 310 whether a certificate has already been delivered that corresponds to the requesting devices. If yes, the method advances to step 325. If a certificate has not already been delivered, such as, for example, via a CD, SFTP, or other means, the method advances to step 315, where a determination is made whether a certificate has been received in an MIB corresponding to the requesting device. If yes, the method advances to step 325. If a certificate has not already been received, method 300 advances to step 320, and a certificate is retrieved from an MIB corresponding to the device requesting configuration information. At step 325, the provisioning server extracts a public key from the certificate.
At step 330, the provisioning server generates a random symmetric session key and configuration information associated with the requesting MTA device is encrypted using the session key at step 335. It will be appreciated that the generation and encrypting of the configuration file information may be performed in an order different from that shown in the figure with respect to steps 310 — 325.
After the configuration information has been encrypted using the session key, the session key is encrypted with the public key at step 340. At step 345, the version number of the configuration information is written to a composite file. This version number may be used to provide detail to the MTA device as to how information within the composite file is arranged, thus facilitating decrypting and unpacking of the information. At step 350 the encrypted session key is written to the composite file and the encrypted configuration information is written to the composite file at step 355. At step 360, the composite file is made available to the requesting MTA device at a TFTP sever, and the MTA device is notified that the composite file is available at step 365. Turning now to FIG. 4, a flow diagram of a method 400 for securely decrypting configuration information at an MTA device is shown. Method 400 begins when a requesting MTA device receives notification that a composite file containing configuration information is available. The composite file is downloaded at step 410. At step 415, the version number is extracted from the composite file and used to refer to a mapping to determine what bytes of the composite file correspond to the encrypted session key and what bytes correspond to the encrypted configuration information.
At step 420, the encrypted session key is extracted based on the mapping referred to by the version number. The MTA devices embedded private key is used to decrypt the session key at step 525. At step 430, and based on the mapping referred to by the version number, the encrypted configuration information is extracted from the composite file. At step 435, the extracted configuration information is decrypted using the already decrypted symmetric session key. At step 440, the MTA device uses the decrypted configuration information to configure itself for connection and operation with the network, and then method 400 ends. It will be appreciated that the arrangement of bytes within the composite file may change, and the version number of the configuration information refers to said arrangement. Therefore, since the version number is used to determine which remaining bytes in the composite file contain the encrypted configuration information, and which contain the encrypted session key, the version number is placed in the composite file by the provisioning server 'in the clear,' meaning that the version number is not encrypted. A mapping of the arrangement based on version number may be downloaded to the MTA device by the provisioning server, or may be accessible by the MTA but located at the provisioning server. In addition, it will be appreciated that the encrypted session key and encrypted configuration information may include the size of the session key and configuration information, respectively. Also, a non- secret initialization vector may be encrypted with the configuration information.
These and many other objects and advantages will be readily apparent to one skilled in the art from the foregoing specification when read in conjunction with the appended drawings. It is to be understood that the embodiments herein illustrated are examples only, and that the scope of the invention is to be defined solely by the claims when accorded a full range of equivalents.

Claims

CLAIMSWhat is claimed is:
1. A method for protecting the distribution of configuration information to an MTA device for use in a SIP-based network, comprising: providing a certificate associated with the MTA device to a provisioning server; using a session key to encrypt configuration information; using information contained in the certificate to encrypt a session key; and transmitting the encrypted configuration information and the encrypted session key to the MTA device.
2. The method of claim 1 wherein the certificate is provided to the provisioning server on an optical disk.
3. The method of claim 1 wherein the certificate is provided to the provisioning server via a download from a server.
4. The method of claim 1 wherein the certificate is provided to the provisioning server before the MTA device is placed into service.
5. The method of claim 1 wherein the information contained in the certificate used for encrypting the session key includes a public key.
6. The method of claim 1 wherein the session key is a symmetric key.
7. The method of claim 1 further comprising combining the encrypted session key and the encrypted configuration information into a composite file.
8. A method for protecting the distribution of configuration information to an MTA device for use in a SIP-based network, comprising: providing a certificate associated with the MTA device to a provisioning server; generating a random session key; encrypting configuration information using the session key; encrypting the session key using a public key contained in the certificate; combining the encrypted session key and the encrypted configuration information into a composite file; transmitting the composite file to the MTA device; decrypting the encrypted session key using a private key corresponding to the public key contained in the certificate; and decrypting the configuration information using the session key.
9. The method of claim 8 wherein the certificate is provided to the provisioning server on an optical disk.
10. The method of claim 8 wherein the certificate is provided to the provisioning server via an FTP server.
11. The method of claim 8 wherein the certificate is provided to the provisioning server by a multiple services operator before the MTA device is provided to an end user.
12. The method of claim 8 wherein the session key is a symmetric key.
13. The method of claim 8 further comprising combining the encrypted session key and the encrypted configuration information into a composite file.
14. The method of claim 8 wherein a version number corresponding to the arrangement of data in the composite file is part of the composite file.
15. A method for protecting the distribution of configuration information to an MTA device for use in a SIP-based network, comprising: generating a random session key; encrypting configuration information using the session key; encrypting the session key using information contained in a certificate that is associated with the MTA device; combining the encrypted session key and the encrypted configuration file into a composite file; and transmitting the composite file to the MTA device.
16. The method of claim 15 wherein the certificate is provided to the provisioning server on an optical disk.
17. The method of claim 15 wherein the certificate is provided to the provisioning server via an FTP server.
18. The method of claim 15 wherein the certificate is provided to the provisioning server by a multiple services operator before the MTA device is provided to an end user.
19. The method of claim 15 wherein the information contained in the certificate used for encrypting the session key includes a public key.
20. The method of claim 15 wherein the session key is a symmetric key.
21. The method of claim 15 further comprising combining the encrypted session key and the encrypted configuration information into a composite file.
22. A method for protecting the distribution configuration information to an MTA device for use in a SIP-based network, comprising: receiving a composite file at the MTA device, the composite file including an encrypted session key and encrypted configuration information; decrypting the encrypted session key using a private key securely contained in the MTA device; and decrypting the configuration information using the session key.
23. The method of claim 22 further comprising using a version number that is part of the composite file to determine which portion of the composite file is the encrypted session key.
PCT/US2006/004088 2005-02-07 2006-02-07 Method for securely distributing configuration information to a device WO2006086296A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US65103905P 2005-02-07 2005-02-07
US60/651,039 2005-02-07

Publications (1)

Publication Number Publication Date
WO2006086296A1 true WO2006086296A1 (en) 2006-08-17

Family

ID=36572336

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2006/004088 WO2006086296A1 (en) 2005-02-07 2006-02-07 Method for securely distributing configuration information to a device

Country Status (2)

Country Link
US (1) US8577041B2 (en)
WO (1) WO2006086296A1 (en)

Families Citing this family (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060233368A1 (en) * 2005-03-30 2006-10-19 Gordon Thompson Method for conditional access in a DMTS/DOCSIS enabled set top box environment
US8612556B2 (en) * 2006-05-03 2013-12-17 Comcast Cable Holdings, Llc Method of provisioning network elements
US8189572B2 (en) * 2006-12-21 2012-05-29 Verizon Patent And Licensing Inc. Systems and methods for resetting a network device
US8195944B2 (en) * 2007-01-04 2012-06-05 Motorola Solutions, Inc. Automated method for securely establishing simple network management protocol version 3 (SNMPv3) authentication and privacy keys
BRPI0721542A2 (en) * 2007-04-30 2013-01-22 Hewlett Packard Development Co system for distributing node configuration information to a plurality of nodes in an event, method for distributing node configuration information for a plurality of nodes in an event and machine readable medium
KR20090030878A (en) * 2007-09-21 2009-03-25 엘지전자 주식회사 Method of processing certificate status information and apparatus for receiving a broadcasting signal
US8627079B2 (en) 2007-11-01 2014-01-07 Infineon Technologies Ag Method and system for controlling a device
US8908870B2 (en) * 2007-11-01 2014-12-09 Infineon Technologies Ag Method and system for transferring information to a device
JP2009284183A (en) * 2008-05-22 2009-12-03 Yokogawa Electric Corp Network system and device setting method in network system
DE102011083062A1 (en) * 2011-09-20 2013-03-21 Hoccer GmbH System and method for secure spontaneous transmission of confidential data over insecure connections and switching computers
US10803970B2 (en) * 2011-11-14 2020-10-13 Seagate Technology Llc Solid-state disk manufacturing self test
EP2602956A1 (en) * 2011-12-08 2013-06-12 Gemalto SA Method for customising a security element engaging with a telecommunications terminal and corresponding system
US9021574B1 (en) * 2013-03-12 2015-04-28 TrustPipe LLC Configuration management for network activity detectors
US9246678B2 (en) * 2013-03-14 2016-01-26 Intel Corporation Secure cloud storage and encryption management system
US9721244B2 (en) * 2013-03-15 2017-08-01 Maher Pedersoli Authentication system
EP3036680B1 (en) * 2013-08-21 2018-07-18 Intel Corporation Processing data privately in the cloud
GB2531770A (en) * 2014-10-30 2016-05-04 Ibm Confidential Extracting System Internal Data
EP3113501A1 (en) * 2015-06-29 2017-01-04 Nagravision SA Content protection
CN106982419B (en) * 2016-01-18 2020-05-08 普天信息技术有限公司 Single call end-to-end encryption method and system for broadband cluster system
US10540298B2 (en) 2017-09-28 2020-01-21 Hewlett Packard Enterprise Development Lp Protected datasets on tape cartridges
CN110321727A (en) * 2018-03-29 2019-10-11 阿里巴巴集团控股有限公司 The storage of application information, processing method and processing device

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6785816B1 (en) * 2000-05-01 2004-08-31 Nokia Corporation System and method for secured configuration data for programmable logic devices

Family Cites Families (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7028187B1 (en) * 1991-11-15 2006-04-11 Citibank, N.A. Electronic transaction apparatus for electronic commerce
US6918038B1 (en) * 1996-08-13 2005-07-12 Angel Secure Networks, Inc. System and method for installing an auditable secure network
US7366900B2 (en) * 1997-02-12 2008-04-29 Verizon Laboratories, Inc. Platform-neutral system and method for providing secure remote operations over an insecure computer network
US6570869B1 (en) * 1998-09-30 2003-05-27 Cisco Technology, Inc. Communicating voice over a packet-switching network
US7023868B2 (en) * 1999-04-13 2006-04-04 Broadcom Corporation Voice gateway with downstream voice synchronization
US7200230B2 (en) * 2000-04-06 2007-04-03 Macrovision Corporation System and method for controlling and enforcing access rights to encrypted media
US6928432B2 (en) * 2000-04-24 2005-08-09 The Board Of Trustees Of The Leland Stanford Junior University System and method for indexing electronic text
US7961712B2 (en) * 2000-05-08 2011-06-14 Broadcom Corporation System and method for supporting multiple voice channels
US20020025046A1 (en) * 2000-05-12 2002-02-28 Hung-Yu Lin Controlled proxy secure end to end communication
US20020013899A1 (en) * 2000-06-17 2002-01-31 Faul Jacob Joel Automated document distribution and transaction verification
US7370011B2 (en) * 2000-06-28 2008-05-06 Yahoo! Inc. Financial information portal
US6745235B2 (en) * 2000-07-17 2004-06-01 Teleservices Solutions, Inc. Intelligent network providing network access services (INP-NAS)
JP4556308B2 (en) * 2000-08-31 2010-10-06 ソニー株式会社 Content distribution system, content distribution method, information processing apparatus, and program providing medium
US20030021416A1 (en) * 2001-07-26 2003-01-30 International Business Machines Corporation Encrypting a messaging session with a symmetric key
US7558250B2 (en) * 2004-03-12 2009-07-07 Aeromobile, Ltd. Systems and methods for wireless communications via satellite
WO2005104431A1 (en) * 2004-04-21 2005-11-03 Matsushita Electric Industrial Co., Ltd. Content providing system, information processing device, and memory card
US7602913B2 (en) * 2004-08-18 2009-10-13 Scientific - Atlanta, Inc. Retrieval and transfer of encrypted hard drive content from DVR set-top box utilizing second DVR set-top box
US7430664B2 (en) * 2005-02-02 2008-09-30 Innomedia Pte, Ltd System and method for securely providing a configuration file over and open network

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6785816B1 (en) * 2000-05-01 2004-08-31 Nokia Corporation System and method for secured configuration data for programmable logic devices

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
ANONYMOUS: "Mediatrix 2102 Administration Manual (SIP Version)", MEDIATRIX TELECOM, INC, 9 November 2004 (2004-11-09), pages I-XVI,29-30,107 - 128, XP002385689, Retrieved from the Internet <URL:http://support.bctgroup.ru/mediatrix/2102/MTX_2102_SIP_Administration_v4-5_RevT.pdf> [retrieved on 20060615] *
ANONYMOUS: "PacketCable Security Specification (PKT-SP-SEC-I11-040730)", CABLE TELEVISION LABORATORTIES, INC, 30 July 2004 (2004-07-30), pages 1-35,114-126,189 - 191, XP002385688, Retrieved from the Internet <URL:http://www.cablelabs.com/specifications/archives/PKT-SP-SEC-I11-040730-Superseded.pdf> [retrieved on 20060615] *
SCHNEIER B: "Applied Cryptography, protocols, algorithms and source code in C", 1996, JOHN WILEY & SONS, NEW YORK, US, ISBN: 0-471-11709-9, XP002385802 *

Also Published As

Publication number Publication date
US8577041B2 (en) 2013-11-05
US20060182282A1 (en) 2006-08-17

Similar Documents

Publication Publication Date Title
US8577041B2 (en) Method for securely distributing configuration information to a device
US11381549B2 (en) Downloadable security and protection methods and apparatus
US8621218B2 (en) Method and apparatus for mutual authentication in downloadable conditional access system
US7987359B2 (en) Information communication system, information communication apparatus and method, and computer program
US8949595B2 (en) Mutual authentication apparatus and method in downloadable conditional access system
US8904178B2 (en) System and method for secure remote access
JP4861834B2 (en) Security processing system and method for media stream
RU2344554C2 (en) Method of interobject connection, device and system for content protection
US8533458B2 (en) Headend system for downloadable conditional access service and method of operating the same
US20060101524A1 (en) Hierarchical encryption key system for securing digital media
US8837726B2 (en) Content protection key encryptor for security providers
EP1987652B1 (en) Method and apparatus for establishing a cryptographic key between a network head and a receiver
US11575977B2 (en) Secure provisioning, by a client device, cryptographic keys for exploiting services provided by an operator
CA3063396A1 (en) Secure enabling and disabling points of entry on a device remotely or locally
US20060236379A1 (en) Method and system for in-field recovery of security when a certificate authority has been compromised
US7562142B2 (en) System and method for network connection
US20060269058A1 (en) Network node, module therefor and distribution method
US8694773B2 (en) Method of preventing unauthenticated viewing using unique information of secure micro
US8583930B2 (en) Downloadable conditional access system, secure micro, and transport processor, and security authentication method using the same
US20100146276A1 (en) Method of recovering and managing security-related information for downloadable conditional access system
CN114501591A (en) Intelligent equipment network access method and device and computer readable storage medium
KR100947326B1 (en) Downloadable conditional access system host apparatus and method for reinforcing secure of the same
US20100235626A1 (en) Apparatus and method for mutual authentication in downloadable conditional access system
WO2007077387A1 (en) Method of distributing televisual contents subject to subscription
EP2466849B1 (en) Selective distribution of a multicast stream

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application
NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 06734411

Country of ref document: EP

Kind code of ref document: A1