Patent application number | Description | Published |
20090106042 | SYSTEM FOR PRODUCT AUTHENTICATION BY MOBILE PHONE - An authentication system enabling a customer to verify the authenticity of a product in a foolproof, secure and simple manner. plurality of secret sets of numbers is generated, each set comprising a challenge portion and a response portion. These sets are stored on a remote server. Each set is associated with a different product. The customer sends a challenge portion to the server, and prompts the server to provide a response. If the response matches that of the product in hand, the product is known to be authentic. In another embodiment of the system, cellular transmission is used to power an electronic tag attached to the product and carrying authentication data. In a third embodiment, the full manufacturer database is divided into separate databases, possibly related to product vendor, such that an authentication process can be performed without the need to access the manufacturer's entire database of products. | 04-23-2009 |
20090154697 | DIGITAL RIGHTS MANAGEMENT SYSTEM AND METHOD - A system and a method for providing variable security mechanisms for securing digital content, in which a single security mechanism is not used for all content. Instead, at least one characteristic or feature of the security mechanism is varied between units, instances or categories of content. Therefore, even if unauthorized access is gained to a single unit of content, the overall integrity and security of the system for content distribution is not compromised. Preferably, security is provided though a general mechanism, which is then varied in order to provide variable, dissimilar security schemes for different types of content. By “type of content”, it is meant any of a single unit of content, a single instance of content or a single category of content. For example, for a category of content, the content may be characterized according to the identity of the content itself, such as the title of a movie for example, and/or according to the owner of a particular copy of the content. Thus, different security schemes may optionally and preferably be generated from a particular root structure. Related apparatus and methods are also provided. | 06-18-2009 |
20090178073 | Method and system for control of broadcast content access - A method for controlling access to content, the method comprising: receiving content in an area in which access to the content is blacked out, the content corresponding to a blacked out event; preventing display of the content at the time of receipt; recording the received content; and allowing access to the recorded content after a time criterion is met, wherein the time criterion comprises an elapse of a predetermined period of time measured from a specified one of the following: commencement of the blacked out event and termination of the blacked out event. | 07-09-2009 |
20090199231 | Time shifted interactive television - Methods and apparatus for managing, implementing and using interactive applications and content that are digitally recorded and viewed in real-time and/or a time-shifted moded are provided. The interactive applications may be associated with television programs or may be unrelated thereto, and may be transmitted together with television programs or separately therefrom. Interactive applications that are employed in a time-shifted mode can be matched to current conditions and interactive content may be updated to include current data. Users may view and manipulate highlights of television programs and receive alerts of occurrence of real-time events during viewing of recorded material. Additional manipulations of interactive applications and content are also enabled. Related apparatus and methods are also described. | 08-06-2009 |
20090204417 | SYSTEM FOR PRODUCT AUTHENTICATION USING COVERT CODES - An authentication system enabling a customer to verify the authenticity of a product in a foolproof, secure and simple manner. plurality of secret sets of numbers is generated, each set comprising a challenge portion and a response portion. These sets are stored on a remote server. Each set is associated with a different product. The customer sends a challenge portion to the server, and prompts the server to provide a response. If the response matches that of the product in hand, the product is known to be authentic. In another embodiment of the system, cellular transmission is used to power an electronic tag attached to the product and carrying authentication data. In a third embodiment, the full manufacturer database is divided into separate databases, possibly related to product vendor, such that an authentication process can be performed without the need to access the manufacturer's entire database of products. | 08-13-2009 |
20090219132 | SYSTEM FOR PRODUCT AUTHENTICATION AND TRACKING - An authentication system enabling a customer to verify the authenticity of a product in a foolproof, secure and simple manner. plurality of secret sets of numbers ( | 09-03-2009 |
20090234743 | SYSTEM FOR MULTIMEDIA VIEWING BASED ON ENTITLEMENTS - An advertising control method is described. The method includes receiving an advertisement identification message (AIM) ( | 09-17-2009 |
20090271516 | UNICAST/MULTICAST ARCHITECTURE - A system and method for providing content to users including a multicast sub-system providing content to multiple users and a unicast sub-system providing content to individual users. The multicast sub-system being operative to push to each of a plurality of user communities, content relating to the community and the unicast sub-system being operative to provide on demand to a user, content which has not been previously pushed to the user. | 10-29-2009 |
20100042728 | UNICAST / MULTICAST ARCHITECTURE - A system and method for providing content to users including a multicast sub-system providing content to multiple users and a unicast sub-system providing content to individual users. The multicast sub-system being operative to push to each of a plurality of user communities, content relating to the community and the unicast sub-system being operative to provide on demand to a user, content which has not been previously pushed to the user. | 02-18-2010 |
20100070993 | ADVERTISEMENTS IN AN END-USER CONTROLLED PLAYBACK ENVIRONMENT - This invention discloses a method for displaying advertisements transmitted to a user unit, the method includes receiving, at the user unit, at least one advertisement tagged with a delay tag indicating whether display of the at least one advertisement can be delayed and only if the delay tag allows delaying display of the at least one advertisement, storing the at least one advertisement at the user unit, retrieving the at least one advertisement and displaying the at least one advertisement. A billing system for reporting a commercial broadcast to a multiplicity of users is also disclosed. | 03-18-2010 |
20100138668 | CONTENT DELIVERY SYSTEM - An information delivery device interacting with a user's eye, the device comprising an eye characteristic reader for reading at least one characteristic of the user's eye, a retinal projector for projecting information onto the retina, and an eye characteristic processor operative to receive at least one characteristic of the eye and to select the information based at least partly thereupon. A content protection system may comprise a multiplicity of such eye characteristic readers and a content protector receiving said at least one characteristic from such readers and controlling the user population's use of content to be protected based on that at least one characteristic. Related apparatus and methods are also provided. | 06-03-2010 |
20110016498 | ADVERTISEMENT SHIFTING SYSTEM - A method for displaying device shifted content is described, the method including receiving at a first device, from a first source of content, a plurality of a first type of content items, receiving at a second device, from a second source of content, a plurality of a second type of content items, receiving at the second device, from a third source of content, at least one third type of content item, sending at least one third type of content item and at least one second type of content item from the second device to the first device, and displaying at the first device at least one first type of content item, at least one second type of content item, and at least one third type of content item. Related methods and systems are also described. | 01-20-2011 |
20110093884 | ADVERTISEMENTS IN AN END-USER CONTROLLED PLAYBACK ENVIRONMENT - This invention discloses a method for displaying advertisements transmitted to a user unit, the method includes receiving, at the user unit, at least one advertisement tagged with a delay tag indicating whether display of the at least one advertisement can be delayed and only if the delay tag allows delaying display of the at least one advertisement, storing the at least one advertisement at the user unit, retrieving the at least one advertisement and displaying the at least one advertisement. A billing system for reporting a commercial broadcast to a multiplicity of users is also disclosed. | 04-21-2011 |
20110164543 | UNICAST/MULTICAST ARCHITECTURE - A system and method for providing content to users including a multicast sub-system providing content to multiple users and a unicast sub-system providing content to individual users. The multicast sub-system being operative to push to each of a plurality of user communities, content relating to the community and the unicast sub-system being operative to provide on demand to a user, content which has not been previously pushed to the user. | 07-07-2011 |
20120110335 | Secure Association of Metadata with Content - A method and system for associating metadata with an encrypted content item, the method including receiving metadata for association with a content item, receiving an entitlement control packet (ECP) associated with the content item, applying a cryptographic hash function to the ECP, thereby generating an ECP hash value, combining the ECP hash value with the metadata, thereby creating a data control object, performing a cryptographic operation on the data control object, thereby generating cryptographic integrity data, and joining the cryptographic integrity data to the data control object after the cryptographic operation, wherein usage of the content by the recipient is dependent on both a validation of the ECP hash value and a validation of the cryptographic integrity data. Related apparatus and methods are also described. | 05-03-2012 |
20120139693 | Electronic Book Security Features - A method and system for fingerprinting a content item is described, the and system method include providing the content item, the content item including a set of content item elements, the set of content item elements denoted E, such that E={E | 06-07-2012 |
20120233290 | SYSTEM FOR MULTIMEDIA VIEWING BASED ON ENTITLEMENTS - An advertising control method is described. The method includes receiving an advertisement identification message (AIM) ( | 09-13-2012 |
20120254954 | SYSTEM FOR MULTIMEDIA VIEWING BASED ON ENTITLEMENTS - An advertising control method is described. The method includes receiving an advertisement identification message (AIM) ( | 10-04-2012 |
20140085196 | Method and System for Secondary Content Distribution - A secondary content distribution system and method is described, the system and method including a receiver for receiving a plurality of differing versions of secondary content from an provider, each one of the differing versions of the secondary content being associated with at least one of a reading mode, and a connection mode, a processor operative to determine a reading mode of a user of a client device, a selector for selecting one of the differing versions of the secondary content for display on the client device display, the selection being a function, at least in part, of matching the determined reading mode with the reading mode associated with the one of the differing versions of the secondary content and the connection mode of the client device, and a display for displaying the selected one of the differing versions of the secondary content on the client device display. Related methods, systems, and apparatus are also described. | 03-27-2014 |
20140137198 | Anonymous Authentication - A method and system for anonymous purchase by a first user device, is described, the method and system including sending R from the first user device to a second user device, where R is a result of a one-way function performed on a random number r selected by the first user device, the second user device being operative to send R to a service provider, which stores R with a data string T and the service provider returns a digitally signed R and T to the second user device, thereby providing the a data string T to the second user device, receiving R and T at the first user device from the second device, thereby ensuring that the identity of the first user device remains unknown to the service provider, opening a communication channel between the first user device and the service provider, sending the service provider r and T from the first user device via the communication channel along with a re quest for the service provider to provide a service, and receiving the requested service from the service provider. Related methods, systems and apparatus are also described. | 05-15-2014 |