摘要 |
<p>A receiver (100) comprises a security processor (103) and a first memory (106) that stores software code or second stage authentication key (107) and a signature (108) for the software or the second stage key. The receiver also stores a plurality of verification keys (PUAKs). When the receiver is switched on or reset (S21), the software or second stage key (107) and the signature (108) are loaded (S23) from the first memory (106). The security processor (103) then loads (S24) a PUAK and uses it to verify (S25) the signature (108). In case of successful verification, the software code or second stage key is used (S27) and the verification method ends; it is then possible to activate CA specific functions in the receiver. However, if the verification is unsuccessful, then it is verified (S28) if there are untried PUAKs. If there are no untried signatures, then the verification has failed (S29) and the software cannot be verified; the verification method ends. If there are untried signatures, then the next PUAK is loaded (S25). In other words, the PUAKs are tried iteratively or in parallel.</p> |