Patent application number | Description | Published |
20090019468 | Access control of media services over an open network - To ensure that media services are only provided to those authorized users or receiving devices, various conditional access mechanisms are provided to secure that media services are only received in those authorized. Different from a prior art conditional access system, an entitlement control message containing a master key can be sent directly to an ordering box. Depending on implementation, a secure session may be established between a server and an ordering box, such that all secured information including a master key may be transported. Further an ordering box does not need to possess a key or keys needed to decrypt an entitlement control message, such key(s) may be transported from time to time in a secure session established between the server and the ordering box. | 01-15-2009 |
20090024846 | Secured seeding of data in a distributed environment - Techniques for seeding data among client machines, also referred to as boxes herein, are disclosed. To prevent the data distributed among the boxes from being illegitimately accessed or possessed, according to one aspect of the present invention, each box is configured to perform what is referred to herein as a transcription process. In other words, when encrypted data is received, the data is decrypted and then re-encrypted with a key agreeable with a next box configured to receive the data. | 01-22-2009 |
20090031424 | Incomplete data in a distributed environment - Techniques for seeding data among client machines, also referred to as boxes herein, are disclosed. To prevent the data distributed among the boxes from being illegitimately accessed or possessed, according to one aspect of the present invention, at least one of the data segments for a title cached locally in the boxes is made to miss some data portions that are stored separately. Essentially, the data segments are unusable without these data portions. When the title is ordered and an ordering box is authenticated, these data portions are then provided to complement the data segments so that a playback of the title becomes possible. | 01-29-2009 |
20090256718 | MULTIMEDIA MOBILE PERSONALIZATION SYSTEM - A multimedia mobile personalization system provides a remote control that detects a user's electronic tag, e.g. an RFID tag. The remote control notifies a multimedia device of the user's identity. The multimedia devices tailors it operations to the user's preferences stored locally. Multimedia content such as broadcast or recorded television programs, music play lists, and the like could be sorted, displayed, or restricted, depending on the user identifier. | 10-15-2009 |
20090259939 | MULTIMEDIA MOBILE PERSONALIZATION SYSTEM - A multimedia mobile personalization system provides a remote control that detects a user's electronic tag, e.g. an RFID tag. The remote control notifies a multimedia device of the user's identity. The multimedia devices tailors it operations to the user's preferences stored locally. Multimedia content such as broadcast or recorded television programs, music play lists, and the like could be sorted, displayed, or restricted, depending on the user identifier. | 10-15-2009 |
20100319014 | Multimedia Mobile Personalization System - A multimedia mobile personalization system allows a user to record and play multimedia content on a set top box at a location other than his home using the user's preferences from his home DVR. | 12-16-2010 |
20110023072 | MULTIPLE AUDIO STREAMS - A system and method for providing multiple audio streams for a video over a network such as the Internet. The system comprises a server that includes an encryption unit and a slicing unit, a plurality of boxes, and an ordering box. The server encodes multiple audio streams and a single video to be sliced into segments. The sliced segments of multiple audio streams and the single video are seeded to a number of the plurality of boxes. This may be repeated for other videos with multiple streams. When the ordering box makes a request for a single video with a single audio, then the number of boxes with segments of the requested video and multiple audio streams, filters and sends the requested video and requested single audio stream to the ordering box. Similarly, multiple closed caption streams can be handled and provided like the audio streams. | 01-27-2011 |
20120027208 | CONDITIONAL ACCESS SYSTEM AND METHOD FOR PREVENTION OF REPLAY ATTACKS - In a conditional access system, a headend transmits content to one or more receivers in encrypted transport streams. The system provides a multi-layer security architecture, rendering the system resistant to key replay attacks; if one layer is circumvented, subsequent layers remain intact. A first layer prevents unencrypted keys from being recorded by shielding the unencrypted keys from users and encrypting the path from the receiver's conditional access module to the transport decryption module; a second layer prevents a key recorded on one receiver from being played back to the transport decryption module on a second receiver; a third layer prevents a user from decrypting transport streams without the encryption module by encrypting the stream a second time prior to being passed through any user-accessible memory or processor. Event tables are transmitted with the transport stream, either unencrypted for immediate use or encrypted, to prevent unauthorized use. | 02-02-2012 |
20120272296 | METHOD AND SYSTEM FOR PROTECTING AGAINST THE EXECUTION OF UNAUTHORIZED SOFTWARE - In accordance with an embodiment of the present invention, a client device is protected against the execution of unauthorized software. The client includes a code authentication process that verifies the integrity of executable code, by generating and comparing a first hash value of the executable code with a known hash value of the original code. Furthermore, during boot-up, the client initializes a CPU exception vector table with one or more vector table entries. One or more, or all, of the vector table entries direct the CPU to execute the code authentication process prior to executing an event handler when an exception event occurs. Consequently, the code authentication process is virtually guaranteed to execute, thereby protecting against the execution of unauthorized code. | 10-25-2012 |