A system is described for uniquely mating components of a communication
network such as a smartcard and a set-top box. When mated, the smartcard
and set-top box are tied together and have a single identity. Further,
the smartcard operates properly only when inserted into an authorized
set-top box. Exchanges of information between both components are secured
by encryption and authentication to guard against piracy of the exchanged
information. The system provides the same authentication key to the
set-top box and the smartcard. This key is used for authenticating
communication between the set-top box and the smartcard. First, the
authentication key is encrypted by a set-top box mating key. The set-top
box employs this mating key to decrypt the authentication key. After it
is derived, the authentication key is stored in the set-top box's memory.
Further, the same authentication key is encrypted by a smartcard mating
key. Thereafter, the smartcard employs the smartcard mating key to
extract the authentication key. The clear authentication key is stored in
the smartcard's memory as well. In this manner, the authentication key is
used for securing all communication between the set-top box and the
smart-card. For example, the set-top box may request control words from
the smartcard. Only after authenticating the request, are the control
words for decrypting digital content provided to the set-top box. If the
smartcard authentication key is different from the set-top box key, the
request for control words is denied.