Having Program Id Or Authorization Patents (Class 380/241)
-
Patent number: 6424714Abstract: A control system provides secure transmission of programs, including at least one of video, audio, and data, between a service provider and a customer's set top unit over a digital network. Program bearing data packets are received in a first network protocol over a first data link and removed from the first network protocol. Packets representing a particular program requested by a customer having a set top unit are selected. Conditional access is provided to the selected program. In particular, program bearing packets are encrypted according to a first encryption algorithm using a first key, which is then encrypted according to a second encryption algorithm using a second key. The first keys are transported in packets to the customer's set top units along with the program packets. A public key cryptographic technique encrypts the second key such that the public key used in the encryption corresponds to the private key of the customer's set top unit.Type: GrantFiled: August 18, 1998Date of Patent: July 23, 2002Assignee: Scientific-Atlanta, Inc.Inventors: Anthony J. Wasilewski, Douglas F. Woodhead, Gary Lee Logston
-
Publication number: 20020094084Abstract: Methods and apparatus are described for ensuring that programs comprising at least one of video, audio, and data that are requested by a customer from a service provider (SP) via an interactive information services system, which transmits the requested programs in program bearing packets to a set top unit (STU) associated with the customer, are accessible by only authorized customers. The apparatus is positioned between the SP and the STU and comprises: means for receiving the program beating packets in a first network protocol from a first data link and removing the packets from the first network protocol; means for adding conditional access to the program bearing packets; and, means for re-encapsulating the program bearing packets in a second network protocol and outputting the program bearing packets over a second data link.Type: ApplicationFiled: August 18, 1998Publication date: July 18, 2002Inventors: ANTHONY HJ. WASILEWSKI, DOUGLAS F. WOODHEAD, GARY LEE LOGSTON
-
Patent number: 6421445Abstract: Apparatus and methods for including a code having at least one code frequency component in an audio signal are provided. The abilities of various frequency components in the audio signal to mask the code frequency component to human hearing are evaluated and based on these evaluations an amplitude is assigned to the code frequency component. Methods and apparatus for detecting a code in an encoded audio signal are also provided. A code frequency component in the encoded audio signal is detected based on an expected code amplitude or on a noise amplitude within a range of audio frequencies including the frequency of the code component.Type: GrantFiled: June 8, 1998Date of Patent: July 16, 2002Assignee: Arbitron Inc.Inventors: James M. Jensen, Wendell D. Lynch, Michael M. Perelshteyn, Robert B. Graybill, Sayed Hassan, Wayne Sabin
-
Patent number: 6393126Abstract: A trusted time infrastructure system provides time stamps for electronic documents from a local source. The system comprises a trusted master clock, a trusted local clock, and a network operations center. The trusted master clock and network operations center are located within secure environments controlled by a trusted third party. The trusted local clock may be located in an insecure environment. The trusted master clock is certified to be synchronized with an accepted time standard, such as a national time server. The trusted local clock, which issues time stamps, is certified to be synchronized with the trusted master clock. Time stamps and certifications are signed by the issuing device using public key cryptography to enable subsequent authentication. The network operations center logs clock certifications and responds to requests for authentication of time stamps.Type: GrantFiled: February 22, 2000Date of Patent: May 21, 2002Assignee: Datum, Inc.Inventors: Erik H. van der Kaay, David Tyo, David Robinson, Gregory L. Dowd
-
Patent number: 6389542Abstract: A multilevel computer security system including a computer with multiple security subsystems for secure data storage and data communications at each security level, a smart-card reader for controlling user access to each security level, an electronically-activated switch for activating only the selected and authorized security level, and a mechanically-activated switch that detects the availability of the security level selected. The computer will automatically power-up at the first security level and activate the first security subsystem which is allocated to the processing of restricted data. Access to each level of restricted data requires a user to insert-his smart card into a smart-card reader which will verify the identity through an entered PIN or from stored biometrics data and will allow the user to access only those levels for which the user is authorized as stored in the smart card.Type: GrantFiled: May 3, 2000Date of Patent: May 14, 2002Inventor: Terence T. Flyntz
-
Patent number: 6381332Abstract: A setback decoder monitors the IF output from a cable-ready receiver and automatically provides a descrambled audio/video signal back to the receiver for output to the subscriber. When the receiver is tuned to a CATV channel which provides signals in a scrambled format, the decoder detects the scrambled signal, determines whether the subscriber is authorized to view the selected program, and descrambles the signal to provide a descrambled output signal to the receiver. The receiver detects the audio/visual output from the decoder and automatically outputs the audio/visual information to the subscriber.Type: GrantFiled: June 27, 2000Date of Patent: April 30, 2002Assignee: General Instrument CorporationInventor: Joseph B. Glaab
-
Publication number: 20020044659Abstract: A broadcast verification system is provided which enables broadcast verification to be performed by a third party being independent of a broadcasting station, without being assisted by another, at low costs and to be reported to a client.Type: ApplicationFiled: May 15, 2001Publication date: April 18, 2002Applicant: NEC CorporationInventor: Mutsumi Ohta
-
Patent number: 6373948Abstract: A system for restricting access to transmitted programming content is disclosed, which transmits a program identifier with the encrypted programming content. A set-top terminal or similar mechanism restricts access to the transmitted multimedia information using stored decryption keys. The set-top terminal preferably receives entitlement information periodically from the head-end, corresponding to one or more packages of programs that the customer is entitled to for a given period. Each program is preferably encrypted by the head-end server prior to transmission, using a program key, Kp, which may be unique to the program. The set-top terminal uses the received program identifier, p, together with the stored entitlement information, to derive the decryption key necessary to decrypt the program. Each of the k-bit program keys, Kp, used to encrypt transmitted programs is a linear combination of a defined set of k-bit master keys, m1 . . . m1.Type: GrantFiled: August 15, 1997Date of Patent: April 16, 2002Assignee: Lucent Technologies Inc.Inventor: Avishai Wool
-
Patent number: 6353888Abstract: A access rights authentication apparatus relieves burdens resulting from handling unique information of a large number of authentication keys and the like of users and protectors such as application authors, wherein a proof data verification module sends authentication data to a proof data generation module; proof data generation means of the proof data generation module generate proof data from the received authentication data and held user unique identifying information, and returns the proof data to the proof data verification module; the verification means of the proof data verification module verifies the proof data using the access ticket; and if the verification succeeds, program execution is permitted.Type: GrantFiled: July 6, 1998Date of Patent: March 5, 2002Assignee: Fuji Xerox Co., Ltd.Inventors: Rumiko Kakehi, Masaki Kyojima
-
Patent number: 6351817Abstract: A multilevel computer security system including a computer with multiple security subsystems for secure data storage and data communications at each security level, a smart-card reader for controlling user access to each security level, an electronically-activated switch for activating only the selected and authorized security level, and a mechanically-activated switch that detects the availability of the security level selected. The computer will automatically power-up at the first security level and activate the first security subsystem which is allocated to the processing of restricted data. Access to each level of restricted data requires a user to insert his smart-card into a smart-card reader which will verify the identity through an entered PIN or from stored biometrics data and will allow the user to access only those levels for which the user is authorized as stored in the smart-card.Type: GrantFiled: October 27, 1999Date of Patent: February 26, 2002Inventor: Terence T. Flyntz
-
Publication number: 20020019937Abstract: Transport software is provided which facilitates secure transfer of legally enforceable electronic documents between servers in a computer network. The transport software includes four scripts. A doc.send script at the originating server causes preparation of a package having an electronic document and routing information, and transfers the package to the destination server. Consistent with a doc.receive script, the destination server performs an initial validation of the package and, if validation is successful, processes the electronic document. The electronic document is then returned to the originating server in accordance with a doc.return script, and received and processed at the originating server consistent with another doc.receive script. If the electronic document does not pass the initial validation, it is returned to the originating server in accordance with the doc.receive script at the destination server and received and processed at the originating server consistent with the doc.Type: ApplicationFiled: June 6, 2001Publication date: February 14, 2002Inventors: Trevor W. Edstrom, Andy L. Rasmussen, Calvin N. Slater
-
Publication number: 20020018567Abstract: An image indicating a copyright and its related information are set through a setting input means and those settings are stored in a related information storing means in advance. Registration image data is recorded in a detachable registration image data recording medium in advance. When an arbitrary image signal is generated by an image generating means, an image combining control means receives the generated image signal and also receives, via a registration image data input means, the registration image data stored in the registration image data recording medium. Further, the image combining control means generates a registration image signal by referring to the setting information and combines it with the arbitrary image signal. In this state, if no corresponding registration image data exists in the registration image data recording medium, image signal combining is not performed.Type: ApplicationFiled: June 1, 2001Publication date: February 14, 2002Inventors: Hosei Kitazawa, Yasuyuki Nagata, Shinya Kurobe, Hidehiko Okumura
-
Publication number: 20020018568Abstract: Systems and methods are provided for encrypting content sent to a user. The user terminal is assigned a serial number. When content is received by the user terminal, it is encrypted and the serial number is embedded into the encrypted content. The content is decrypted if the serial number embedded in the encrypted content is the serial number associated with the user terminal. Content may also be simultaneously stored and displayed.Type: ApplicationFiled: August 3, 2001Publication date: February 14, 2002Inventors: J. Dewey Weaver, Douglas K. Leech
-
Publication number: 20020015496Abstract: Systems and methods are provided for controlling the content sent to a user. Content is sent in packets, which include a packet ID and content. The packet ID is tagged, or marked with a packet tag by a broadcaster or other computer server to enable specific users to view the content. The “packet tag” is an identifier that marks and identifies the content associated with the packet. The packet tag is used by software applications, or “modules,” for controlling the content at the user terminal. The software applications enable user viewing permissions according to the packet tags, which may include providing access to a decryption algorithm if the user serial number is included in the tag, and recording information about the content if the content is viewed or read by the user terminal.Type: ApplicationFiled: August 3, 2001Publication date: February 7, 2002Inventors: J. Dewey Weaver, Douglas K. Leech, Timothy M. Murphy
-
Publication number: 20010055391Abstract: A system and method for enabling a user to retrieve, decode, and utilize hidden data embedded in audio signals. An exemplary implementation includes a microphone structured to receive sound waves representative of an audio signal and hidden data embedded in the audio signal. The then microphone converts the received sound waves into an electrical output signal. The system also includes a processor electrically coupled to the microphone and configured to receive the electrical output signal in order to extract the hidden data and provide information represented by the hidden data as an output thereof. A user interface is also provided and is electrically coupled to the processor and configured to receive a first input from the user and activate the processor to selectively initiate extraction of the hidden data. The processor produces as an output the information represented by the hidden data. Finally, the system includes a user presentation mechanism configured to present the information to the user.Type: ApplicationFiled: March 13, 2001Publication date: December 27, 2001Inventor: Paul E. Jacobs
-
Patent number: 6330334Abstract: A system and method of information dissemination that permits the user to listen to the specific content of information when and where he or she wants to. A radio or television receiver system receives information from an FM subcarrier, a television vertical blanking interval transmission, a television separate audio program transmission or a dedicated channel and stores the transmitted information in a memory. A user interface allows selection from the memory of the stored information via a set of menus controlling a hierarchical database, so as to access particular items of information. Typically the system includes RAM and/or a storage medium such as a digital audio tape,a magneto-optical mini-disk, a magnetic disk or optical disk, sufficient to store information for 10 hours of audio. A decompression device, accepts the accessed compressed digital audio information items which may have been encrypted and transforms them into spoken speech.Type: GrantFiled: July 26, 2000Date of Patent: December 11, 2001Assignee: Command Audio CorporationInventor: John O. Ryan
-
Patent number: 6321385Abstract: A data receiving-processing apparatus including a receiver for receiving an extended function program or data transmitted thereto, a processor for processing the received data, a first storage such as a read-only memory for storing a basic program used to execute the data processing and an ID code to identify the apparatus and having a branch for the extended function program, a second storage such as a nonvolatile memory for storing the extended function program in a compressed state, a third storage such as a volatile memory for storing the extended function program in an decompressed state, and a decision maker for making a decision as to whether the ID code has predetermined content. The received data is processed in accordance with the basic program stored in the first storage and, after the extended function program stored in the second storage is read out at the branch in the basic program, the data is processed in accordance with the extended function program.Type: GrantFiled: October 12, 1999Date of Patent: November 20, 2001Assignee: Sony CorporationInventors: Toshiro Ozawa, Hirofumi Yuchi
-
Publication number: 20010036271Abstract: A system and method for use in a communication network that communicates with a plurality of digital content servers to provide selected digital data files, including video and audio files, for download to a subscriber device. A segmentation controller is provided for dividing the selected into segments. An encryption controller is provided for compressing and encrypting each of the segments with a selected one of a plurality of encryption keys. The segments are then transmitted at or above the average bandwidth of the communication network to a subscriber device. A copy of the decryption keys are transmitted to the subscriber device to enable playback of the selected file only with a current verification of the subscriber device.Type: ApplicationFiled: March 20, 2001Publication date: November 1, 2001Inventor: Shoeb M. Javed
-
Patent number: 6304660Abstract: A security document processing apparatus is provided having a feed path for receiving documents and at least one imaging assembly for capturing image data from documents received in the apparatus. The apparatus may include a material detection imaging assembly for detecting the material composition of certain materials on documents received in the apparatus. The material detection imaging assembly may detect material on a document by detecting transmissivity characteristics, or by sensing radiation emission characteristics of a document in the case received documents are of a type including radiation wavelength sensitive additives incorporated therein.Type: GrantFiled: June 2, 1998Date of Patent: October 16, 2001Assignee: Welch Allyn Data Collection, Inc.Inventors: Michael A. Ehrhart, Robert M. Hussey, Todd A. Dueker, Cayetano Sanchez, III, Walter Szrek, John C. Abraitis
-
Patent number: 6292568Abstract: A cable television system provides conditional access to services. The cable television system includes a headend from which service “instances”, or programs, are broadcast and a plurality of set top units for receiving the instances and selectively decrypting the instances for display to system subscribers. The service instances are encrypted using public and/or private keys provided by service providers or central authorization agents. Keys used by the set tops for selective decryption may also be public or private in nature, and such keys may be reassigned at different times to provide a cable television system in which piracy concerns are minimized.Type: GrantFiled: January 19, 2000Date of Patent: September 18, 2001Assignee: Scientific-Atlanta, Inc.Inventors: Glendon L. Akins, III, Robert O. Banker, Michael S. Palgon, Howard G. Pinder, Anthony J. Wasilewski
-
Publication number: 20010012366Abstract: A conditional access system for controlling the access of receivers of end-users to data content transmitted from a data content source in an uplink system. The uplink system comprises a scrambler for scrambling the content supplied from the content source, an entitlement control message generator for generating entitlement control messages containing a control word and an entitlement identification and a transmitter for transmitting the scrambled content and the entitlement control messages. A descrambler, an entitlement control message decoder and means for recording entitlement identifications are associated to the receiver. The entitlement control message decoder supplies a control word to the descrambler for descrambling a part of the received scrambled content for which the receiver is entitled, if a match between the entitlement identification in the entitlement control message and the recorded entitlement identification exists.Type: ApplicationFiled: December 20, 2000Publication date: August 9, 2001Inventors: Bartholomeus Johannes Van Rijnsoever, Franciscus Antonius Johannes Kamperman, Mathieu Petrus Franciscus Maria Goudsmits
-
Publication number: 20010010720Abstract: The invention relates to authenticating information sent to a set top box. In one embodiment, a process for distributing information to a plurality of conditional access receivers with a plurality of different signature checking capabilities is disclosed. In one step, a first signature is generated over the information and a second signature is generated over the information. The first and second signatures and the information are sent to the plurality of conditional access receivers.Type: ApplicationFiled: December 18, 2000Publication date: August 2, 2001Inventors: Bridget D. Kimball, Kenneth P. Miller, Douglas M. Petty, Robert S. Eisenbart, Eric J. Sprunk
-
Patent number: 6256393Abstract: A method for providing authentication, authorization and access control of software object residing in digital set-top terminals creates a fingerprint (“signature”) for each software object, associates each fingerprint with a service tier, encodes each association and creates an association table containing the information and downloads the association table to the digital set-top terminal. In addition, the method utilizes an entitlement management message, sent to each set-top terminal, indicating what software objects the set-top terminal may utilize, and provides a system routine at the digital set-top terminal that is invoked whenever software object is about to be utilized. The entitlement management message contains the access rights given to a particular set-top terminal, which must match the software object's access requirements for the software object to be utilized.Type: GrantFiled: February 24, 1999Date of Patent: July 3, 2001Assignee: General Instrument CorporationInventors: Reem Safadi, Lawrence Vince
-
Patent number: 6249532Abstract: A billing system for use in a chargeable program broadcasting is capable of reliably billing a subscriber for program reception while preventing unauthorized reception thereof. A receiving terminal includes a primary terminal 100 and a secondary terminal 150. The primary terminal 100 receives a compressed video signal and confirms by an error checker 113 thereof whether there is a transmission error and bills, by a billing device 114 thereof, the receiving subscriber on the basis of an error information and a program information, etc., separated from the video signal by a separation circuit 112. The compressed video data is time-axis multiplexed with a terminal identifying code and a key signal and transmitted to the secondary terminal 150. In the secondary terminal 150, a bill for the subscriber is confirmed by the terminal identifying code and the compressed data is decoded by a decoder circuit 166 thereof.Type: GrantFiled: January 26, 1999Date of Patent: June 19, 2001Assignees: Hitachi, Ltd., Hitachi Microcomputer Systems, Ltd.Inventors: Kazuhiko Yoshikawa, Hitoaki Owashi, Hiroyuki Hayakawa, Tadasu Otsubo, Kyoichi Hosokawa
-
Publication number: 20010001014Abstract: A cable television system provides conditional access to services. The cable television system includes a headend from which service “instances”, or programs, are broadcast and a plurality of set top units for receiving the instances and selectively decrypting the instances for display to system subscribers. The service instances are encrypted using public and/or private keys provided by service providers or central authorization agents. Keys used by the set tops for selective decryption may also be public or private in nature, and such keys may be reassigned at different times to provide a cable television system in which piracy concerns are minimized.Type: ApplicationFiled: December 26, 2000Publication date: May 10, 2001Inventors: Glendon L. Akins, Robert O. Banker, Michael S. Palgon, Howard G. Pinder, Anthony J. Wasilewski
-
Patent number: 6148400Abstract: A hierarchical cryptographic system has distributed authority among different classes of units in the system. The system may comprise a trusted authority, a first unit authorized by the trusted authority to distribute public and private signature and encryption keys. A second unit accepts for use one or more of the keys only after performing a verification program using the public signature key of the trusted authority. The invention also comprises a unit of a cryptographic system having a processor and a read only memory. The read only memory has stored therein a verification program which includes a public signature key of a trusted authority, and the verification program is made a permanent part of the read only memory during the formation process of the read only memory prior to the application of electrical power to the read only memory.Type: GrantFiled: July 27, 1998Date of Patent: November 14, 2000Assignee: The Merdan Group, Inc.Inventor: Terry Sutton Arnold
-
Patent number: 6105134Abstract: A cable television system provides conditional access to services. The cable television system includes a headend from which service "instances", or programs, are broadcast and a plurality of set top units for receiving the instances and selectively decrypting the instances for display to system subscribers. The service instances are encrypted using public and/or private keys provided by service providers or central authorization agents. Keys used by the set tops for selective decryption may also be public or private in nature, and such keys may be reassigned at different times to provide a cable television system in which piracy concerns are minimized.Type: GrantFiled: July 31, 1998Date of Patent: August 15, 2000Assignee: Scientific-Atlanta, Inc.Inventors: Howard G. Pinder, Michael S. Palgon, Glendon L. Akins, III, Robert O. Banker
-
Patent number: 6092201Abstract: A method and apparatus for extending secure communication operations via shared lists is accomplished by creating a shared list in accordance with authorization parameters by one user and subsequently accessing the shared list via the authorization parameters by this and other users. To create the list, a user within the secured communication system determines whether it has been enabled, or authorized, to create a shared list. If so, the user identifies at least one other user to be added to the shared list. Having identified another user, the user creating the shared list verifies that the secure communication parameters (which includes a public key certificate of an end-user or of a certification authority) it has received regarding the another user is trustworthy. If the secure communication parameters are identified as trustworthy, the secure communication parameters of the another user are added to the shared list. To authenticate the shared list, the user creating the list digitally signs it.Type: GrantFiled: January 27, 1998Date of Patent: July 18, 2000Assignee: Entrust TechnologiesInventors: James Arthur Turnbull, Ian H. Curry, Paul C. Van Oorschot, Stephen William Hillier
-
Patent number: 6055315Abstract: A scrambling system for a cable television system in which a group of channel frequencies are reused over a plurality of service areas includes an access controller, an encoder and a plurality of simplified scrambling units. Each service area receives different television signals on the group of channel frequencies. The access controller provides signal authorization information for a given channel frequency to a plurality of receiver/decoders located in the different services areas. The access controller also provides descrambling information corresponding to the signal authorization information to the encoder for the given channel frequency. The encoder produces a conditional access code by placing the descrambling information into a scrambled reference signal. An extracting unit removes the conditional access code from the scrambled reference signal and distributes the conditional access code to each of the simplified scrambling units operating at the given channel frequency.Type: GrantFiled: December 7, 1998Date of Patent: April 25, 2000Assignee: ICTV, Inc.Inventors: John F. Doyle, Stephen C. Snell, Timothy Dunn