Patents by Inventor Glenn A. Morten

Glenn A. Morten has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 7356143
    Abstract: A system, apparatus, and method are directed to providing and securely viewing secure content. In one embodiment, a secure player provides secure screening/previewing of secure content, such as a motion picture, by a member of an awards organization. A content key is employed to selectively encrypt at least a portion of a content stream. The content key is encrypted with a screener key. The encrypted content key is embedded into the secure content. The screener key is encrypted using public/private key pair that is bound to the secure player. The secure content may be distributed on a medium, such as a DVD, high definition DVD, or over a network, or the like. The secure player is configured to receive the medium, screener key, and a screener identity. The screener identity and screener key are employed by the secure player to decrypt and enable secure viewing of the content.
    Type: Grant
    Filed: February 24, 2006
    Date of Patent: April 8, 2008
    Assignee: Widevine Technologies, Inc
    Inventor: Glenn A. Morten
  • Patent number: 7349886
    Abstract: A system, apparatus, and method are directed towards generating chains of encrypted decryption keys for content in a highly distributed environment. In one embodiment, the key chain may be provided within an Entitlement Control Message (ECM). An access key that enables decryption of a current link within the chain of decryption keys may be provided to a downstream recipient using an out-of-band mechanism. Alternatively, the access key may be provided through an in-band mechanism, such as through the use of Entitlement Management Message (EMM), or the like. In one embodiment, the access key within the EMM may be further encrypted by another encryption key that may be unique to the downstream recipient.
    Type: Grant
    Filed: March 23, 2006
    Date of Patent: March 25, 2008
    Assignee: Widevine Technologies, Inc.
    Inventors: Glenn A. Morten, Reza P. Rassool
  • Publication number: 20080037782
    Abstract: A method, apparatus, and system are directed towards reducing a channel change time contribution related to security for digital media devices by using key management and a virtual smart card. In one embodiment, Entitlement Control Messages (ECMs) used to provide access to content keys for decrypting of content are provided over the network to the digital media device at an increased frequency over traditional systems. In another embodiment, use of the virtual smart card is directed towards removing physical limitations that may arise due to the use of a physical smart card, separate secure microprocessor, or the like, and associated physical interface, thereby further reducing channel change times contributed to content protection components of the digital media device.
    Type: Application
    Filed: July 19, 2007
    Publication date: February 14, 2008
    Applicant: Widevine Technologies, Inc.
    Inventor: Glenn A. Morten
  • Patent number: 7328345
    Abstract: A system and method for providing end-to-end security of content over a heterogeneous distribution chain is provided. A content owner provides content to an aggregator that receives the content and processes the content. The processing may involve decrypting the content and associating at least one of a unique fingerprint and a watermark to the decrypted content. The unique fingerprint and a watermark to the decrypted content provide identifying characteristics to the content. Additional content-based fingerprints may be used to monitor quality of consumer experience for Video and Audio. The content may be sent in a decrypted state to a client or in an encrypted state. When the content is encrypted the aggregator wraps and encrypts the content with a signature such that an end-to-end flow of the content may be determined. Application Level encryption is used to provide network/distribution medium transparency as well as persistent encryption.
    Type: Grant
    Filed: January 29, 2003
    Date of Patent: February 5, 2008
    Assignee: Widevine Technologies, Inc.
    Inventors: Glenn A. Morten, Reza P. Rassool, Tom E. Claeys, Brian Andrew Baker
  • Publication number: 20080015999
    Abstract: A system and method are directed towards including buffer packets into an unencrypted content stream at a same location as encryption related information such as an ECM, an EMM message, or the like, would be in a corresponding encrypted content stream. The buffer packets may comprise virtually any information, including a null packet, an ECM message. By inserting buffer packets in the same location, an overall file size, and frame locationing may be made to match the file size, and frame locationing of the encrypted content stream. The modified unencrypted content stream may be employed to generate trick play files, such as a fast forward file, fast reverse file, and so forth, as well as a corresponding index file that indicates locations of relevant content frames in the unencrypted content stream and the trick play files.
    Type: Application
    Filed: January 19, 2006
    Publication date: January 17, 2008
    Applicant: Widevine Technologies, Inc.
    Inventors: Hamid Ali, Andre Jacobs, Glenn Morten
  • Publication number: 20070271189
    Abstract: A system, apparatus, and method are directed to providing digital copy protection of media using a subscriber/publisher architecture. In one embodiment, a publisher employs various dynamic and/or static tamper detection, including, filter graph change detectors, ICE detectors, screen scraping detectors, debugger detectors, pattern recognizers, or the like. When a tampering event is detected by one or more of the publishers, the tamper event may be published for access by a subscriber. Published tamper events may be pushed to or pulled by the subscribers. When one or more subscribers receive the tamper event, the subscriber(s) may perform one or more tamper response actions according to various business rules, and/or other core rules.
    Type: Application
    Filed: November 30, 2006
    Publication date: November 22, 2007
    Applicant: Widevine Technologies, Inc.
    Inventors: Glenn Morten, Edward Hiar, Andre Jacobs, James Veres, Oscar Zhuk, Jeffrey Tinker
  • Patent number: 7299292
    Abstract: There is disclosed a process for encrypting a data stream to secure the data stream for single viewing and to protect copyrights of the data stream. Specifically, there is disclosed a process for protecting streaming multimedia, entertainment and communications in a network transmission. There is further disclosed a streaming server component operably connected with a streaming server that interacts with a client system that includes a virtual smart card to effect the inventive process.
    Type: Grant
    Filed: October 1, 2004
    Date of Patent: November 20, 2007
    Assignee: Widevine Technologies, Inc.
    Inventors: Glenn A. Morten, Brian Baker
  • Publication number: 20070250912
    Abstract: A method, apparatus, and system are directed towards employing transferable entitlements using EMMs for enabling a purchase of content using a mobile device, and redeeming for access the content using a different network device. An existing billing infrastructure may be used during a purchase transaction to identify the purchasing device. Upon billing authorization, a transferable EMM (XEMM) may be sent to the purchasing device. The purchasing device may then provide the XEMM to another network device. The other network device may send the XEMM to a redeeming service when requesting access to the content. Upon authorization, an EMM with an access key to the content may be sent to the other network device.
    Type: Application
    Filed: April 16, 2007
    Publication date: October 25, 2007
    Applicant: Widevine Technologies, Inc.
    Inventors: Reza P. Rassool, Glenn A. Morten
  • Publication number: 20070180231
    Abstract: A system, apparatus, and method are directed towards preventing entitlement/rights filter attacks in a conditional access to secure content over a network. An EMM that is configured to revoke access to selected content may be sent to a user, when a content provider, or the like, determines that access to the selected content is to be revoked for that user. A server may monitor for an acknowledgment of the revocation. If, after a predetermined time, a valid acknowledgement is not received by the server, the server may send another revocation EMM and again monitor for an acknowledgement response. If, after a predetermined number of retry attempts, a valid acknowledgement is not received, the server may send an alert message, investigate for possible network or device failures, change of encryption keys such as the CW, change a service key, or the like, for future content delivery to the user.
    Type: Application
    Filed: January 31, 2006
    Publication date: August 2, 2007
    Applicant: Widevine Technologies, Inc.
    Inventors: Glenn Morten, Edward Hiar
  • Publication number: 20070104097
    Abstract: An apparatus, system, and method is directed to transcoding broadcast content, such as in a DVB, ATSC, and MPEG based network, to secure content suitable for an Internet Protocol (IP) based network. In one embodiment, a single multifunctional convergence appliance is employed to enable such transcoding actions as encryption, encoding, and/or encapsulation. For example, in one embodiment, an MPEG transport stream associated with the broadcast content may be transcoded to an IP-based transport stream. In addition, the transport stream may be decrypted, transrated to another rate, and re-encrypted using a different control word for re-encrypting, but a same service key to encrypt the different control word. The system is also enabled to transcode content formatted for the IP-based network to a content format suitable for the broadcast network.
    Type: Application
    Filed: September 6, 2006
    Publication date: May 10, 2007
    Applicant: Widevine Technologies, Inc.
    Inventors: Reza Rassool, Glenn Morten, Brian Baker
  • Publication number: 20070067643
    Abstract: A method, system, and apparatus are directed towards detecting unauthorized modification of software, such as virtual smart card software. An analysis is performed on the software to generate a unique pattern that is based on the integrity of the software. The pattern is generated using various portions of the software code. In one embodiment, matrix manipulations that involve a sequence of randomly selected matrix operations are performed on extracted portions of the software code. Sample sizes of the software code, sizes of the matrices, and other initialization parameters may be selected based on a desired security level. The resulting pattern may then be compared to a known normal pattern for the software to detect unauthorized modification. In one embodiment, however, the resulting pattern may be algorithmically combined with another value. The resulting combination may be used to decrypt content, if the software has not been modified.
    Type: Application
    Filed: September 21, 2005
    Publication date: March 22, 2007
    Applicant: Widevine Technologies, Inc.
    Inventors: Oscar Zhuk, Glenn Morten, James Veres
  • Publication number: 20070033408
    Abstract: Method and devices are directed to invention is directed towards analyzing packets on-the-fly for pirated content. Packets are intercepted and analyzed to determine if the packets include media content. If media content is detected, a comparator determines a fingerprint associated with the media content. The comparator then compares the determined fingerprint to other fingerprints within a data store. If a match is found, forensic information may be collected. Piracy detection responses may also be performed, including: blocking transmission of the media content, providing a piracy alert message, degrading a quality of the media content, or including within the media content a watermark and/or fingerprint. In one embodiment, the packet analysis and the comparator may reside within a same or different device within a path between a source device and a destination device to enable piracy detection to be performed in real-time.
    Type: Application
    Filed: August 3, 2006
    Publication date: February 8, 2007
    Applicant: Widevine Technologies, Inc.
    Inventor: Glenn Morten
  • Publication number: 20060229992
    Abstract: A system, apparatus, and method are directed towards generating chains of encrypted decryption keys for content in a highly distributed environment. In one embodiment, the key chain may be provided within an Entitlement Control Message (ECM). An access key that enables decryption of a current link within the chain of decryption keys may be provided to a downstream recipient using an out-of-band mechanism. Alternatively, the access key may be provided through an in-band mechanism, such as through the use of Entitlement Management Message (EMM), or the like. In one embodiment, the access key within the EMM may be further encrypted by another encryption key that may be unique to the downstream recipient.
    Type: Application
    Filed: March 23, 2006
    Publication date: October 12, 2006
    Applicant: Widevine Technologies, Inc.
    Inventors: Glenn Morten, Reza Rassool
  • Publication number: 20060143481
    Abstract: A system, apparatus, and method are directed to providing and securely viewing secure content. In one embodiment, a secure player provides secure screening/previewing of secure content, such as a motion picture, by a member of an awards organization. A content key is employed to selectively encrypt at least a portion of a content stream. The content key is encrypted with a screener key. The encrypted content key is embedded into the secure content. The screener key is encrypted using public/private key pair that is bound to the secure player. The secure content may be distributed on a medium, such as a DVD, high definition DVD, or over a network, or the like. The secure player is configured to receive the medium, screener key, and a screener identity. The screener identity and screener key are employed by the secure player to decrypt and enable secure viewing of the content.
    Type: Application
    Filed: February 24, 2006
    Publication date: June 29, 2006
    Applicant: Widevine Technologies, Inc.
    Inventor: Glenn Morten
  • Publication number: 20060101287
    Abstract: A system, apparatus, and method are directed to providing and securely viewing secure content. In one embodiment, a secure player provides secure screening/previewing of secure content, such as a motion picture, by a member of an awards organization. A content key is employed to selectively encrypt at least a portion of a content stream. The content key is encrypted with a screener key. The encrypted content key is embedded into the secure content. The screener key is encrypted using public/private key pair that is bound to the secure player. The secure content may be distributed on a medium, such as a DVD, high definition DVD, and the like. The secure player is configured to receive the medium, screener key, and a screener identity. The screener identity and screener key are employed by the secure player to decrypt and enable secure viewing of the content.
    Type: Application
    Filed: December 27, 2005
    Publication date: May 11, 2006
    Applicant: Widevine Technologies, Inc.
    Inventor: Glenn Morten
  • Publication number: 20060069649
    Abstract: A system and method is arranged to provide compression and decompression of digital content in a secure manner. The system is configured to authenticate a source of the digital content, and to further determine a consumer's entitlements and rights for access to the digital content. Based upon the determined entitlements and rights for access, the system is directed to decrypt, and decompress the digital content. In one embodiment, a component of the system is enabled to establish a trust relationship with at least one other component of the system, to minimize an opportunity for piracy of the digital content. In another embodiment, a secure clock is directed to provide protection against hackers that may employ an in-circuit emulator, or the like.
    Type: Application
    Filed: September 19, 2005
    Publication date: March 30, 2006
    Applicant: Widevine Technologies, Inc.
    Inventors: Glenn Morten, Tomas Palmer, Charles MacLean
  • Patent number: 7007170
    Abstract: A system, apparatus, and method are directed to providing and securely viewing secure content. In one embodiment, a secure player provides secure screening/previewing of secure content, such as a motion picture, by a member of an awards organization. A content key is employed to selectively encrypt at least a portion of a content stream. The content key is encrypted with a screener key. The encrypted content key is embedded into the secure content. The screener key is encrypted using public/private key pair that is bound to the secure player. The secure content may be distributed on a medium, such as a DVD, high definition DVD, and the like. The secure player is configured to receive the medium, screener key, and a screener identity. The screener identity and screener key are employed by the secure player to decrypt and enable secure viewing of the content.
    Type: Grant
    Filed: January 20, 2004
    Date of Patent: February 28, 2006
    Assignee: Widevine Technologies, Inc.
    Inventor: Glenn A. Morten
  • Publication number: 20060021037
    Abstract: An apparatus, system, and method for protecting digital information from unauthorized access are described. The invention is configured to employ digital fingerprinting, pattern recognition, and real-time tamper evidence gathering to monitor for unauthorized access. When an unauthorized access is detected, an appropriate response that may be based on business rules is provided that may include termination of execution of a content player. The invention monitors over time a predetermined set of parameters associated with at least one process on a client device to detect a change in state. The state change is employed to create a fingerprint for the process. Statistical analysis is then applied to additional data collected to determine whether the additional data indicates unauthorized behavior.
    Type: Application
    Filed: June 10, 2005
    Publication date: January 26, 2006
    Applicant: Widevine Technologies, Inc.
    Inventors: Oscar Zhuk, Glenn Morten
  • Publication number: 20050193205
    Abstract: A method and apparatus applies a variety of session based watermarks in real-time to content that is streamed from a server towards a client. The invention employs content where differing targeted portions are selectively encrypted, such that other portions remain in the clear (unencrypted). Session information, such as an intended client, end-user, operator of a content server, content owner, and the like, may be used to generate the various watermarks. The watermarks may also be digitally signed and/or encrypted. The watermarks may be applied to the portions of the clear content as the content is streamed towards the client. In one embodiment, a bridge server is configured to modify packets of streaming media data files with the variety of watermarks. In another embodiment, the content server for the streaming media data includes a plug-in component that dynamically modifies the packets of streaming media data files with the variety of watermarks.
    Type: Application
    Filed: December 14, 2004
    Publication date: September 1, 2005
    Applicant: Widevine Technologies, Inc.
    Inventors: Andre Jacobs, Oscar Zhuk, Glenn Morten, Eric Shapiro
  • Publication number: 20050120125
    Abstract: There is disclosed a process for encrypting a data stream to secure the data stream for single viewing and to protect copyrights of the data stream. Specifically, there is disclosed a process for protecting streaming multimedia, entertainment and communications in a network transmission. There is further disclosed a streaming server component operably connected with a streaming server that interacts with a client system that includes a virtual smart card to effect the inventive process.
    Type: Application
    Filed: October 1, 2004
    Publication date: June 2, 2005
    Applicant: Widevine Technologies, Inc.
    Inventors: Glenn Morten, Brian Baker