Class / Patent application number | Description | Number of patent applications / Date published |
380239000 | Encrypted code control signal | 25 |
20090028328 | METHOD AND SYSTEM FOR FORMING A CONTENT STREAM WITH CONDITIONAL ACCESS INFORMATION AND A CONTENT FILE - A communication system includes a content repository | 01-29-2009 |
20090141894 | USB VIDEO CARD AND DONGLE DEVICE WITH VIDEO ENCODING AND METHODS FOR USE THEREWITH - A universal serial bus (USB) dongle device includes a USB interface for receiving a video signal in a first format and for sending a processed video signal in a second format wherein the first format differs from the second format. An encoding module generates the processed video signal based on the video signal. In a further embodiment, A video card includes a video receiver for receiving a video signal in a first format, based on a selection command. An encoding module generates a processed video signal in a second format based on the video signal, wherein the first format differs from the second format. A USB interface transfers the processed video signal to the host device, receives the selection command from the host device and receives a power signal from the host device to power the video receiver and the encoding module. | 06-04-2009 |
20090169003 | BROADCAST PROCESSING APPARATUS AND METHOD THEREOF - A broadcast processing apparatus and method thereof, the broadcast processing apparatus including: a decryptor to decrypt a broadcast encrypted by a cable card using a decryption key; and a controller to control the broadcast decrypted by the decryptor to be re-encrypted and stored. Therefore, it is possible to preserve the security of broadcast content and it is easier to manage the security of broadcast content, without generating a separate encryption key. | 07-02-2009 |
20090169004 | Multimedia Storage Systems and Methods - An article of manufacture includes a machine-readable medium that stores a multimedia content file in a first format and multiple program sets. Each program set is a version of software that, when executed by a respective electronic system, produces the multimedia content file in a second format for use in the respective electronic system. A first program set is compatible with a first operating system executed by a first electronic system and a second program set is compatible with a second operating system executed by a second electronic system. The second operating system is distinct from the first operating system. | 07-02-2009 |
20090208009 | ROTATION OF KEYS DURING ENCRYPTION/DECRYPTION - An encrypted program received in an MPEG transport stream is decrypted by receiving a message in the MPEG transport stream, wherein the message contains a key, decrypting the encrypted program based on the key, and replacing the message in the MPEG transport stream with a null packet. | 08-20-2009 |
20090208010 | System for traceable decryption of bandwidth-efficient broadcast of encrypted messages and security module revocation method used for securing broadcasted messages - The present invention makes use of techniques such as those described by Boneh and Franklin to allow for the realisation of a pseudo-asymmetric encryption scheme whereby one public encryption corresponds to a plurality of private decryption keys. This scheme therefore provides a solution to the problem of inefficient use of bandwidth in asymmetrical encryption schemes which inherently require that a plurality of encryptions of data be broadcast to a plurality of receivers. The invention further ensures that the advantage of traceability, typical found in asymmetric encryption schemes, is maintained due to the characteristic that each receiver uses a unique traceable decryption key. The traceability thus achieved by the present invention allows for the revocation of a security module which has been involved in the abusive use of conditional access data, particularly by means of clones of security modules whose security has been compromised. | 08-20-2009 |
20090232305 | System for Publishing Content on a Portable Digital Storage Medium - In a method of publishing creative content to at least one local digital display device, a first unit of the creative content is stored on a first portable digital storage medium in an encrypted format. The digital replication is encrypted with a selected one of a plurality of private encryption keys. The first portable digital storage medium is transferred to the local digital display device. A preselected public key is entered into the local digital display device. The preselected public key corresponds to the selected one of the plurality of private encryption keys. At least a portion of the first unit of the creative content is decrypted by employing the public encryption key using a public key/private key decryption algorithm. The portion of the creative content is displayed on the local digital display device. | 09-17-2009 |
20090238363 | METHOD AND A SYSTEM FOR RECEIVING A MULTIMEDIA SIGNAL, A CRYPTOGRAPHIC ENTITY FOR SAID RECEPTION METHOD AND SYSTEM, AND A METHOD AND A BLACK BOX FOR PRODUCING SAID CRYPTOGRAPHIC ENTITY - This method of receiving a multimedia signal scrambled by means of a control word uses a first cryptographic entity that can be connected to any one of P second cryptographic entities to form part of a device for receiving the scrambled multimedia signal. Only second cryptographic entities of a group of N second cryptographic entities selected from a wider set of P second cryptographic entities use a session key obtained by diversifying a root key identical to the root key used to obtain the session key of the first cryptographic entity. | 09-24-2009 |
20090290711 | Method, Apparatus and System for Secure Distribution of Content - Embodiments of the present invention provide a method, apparatus and system for the secure distribution of content such as audiovisual content in a way that prevents users from misusing the content and provides a mechanism for tracking pirated material back to the original location of misappropriation. A security device, in accordance with one embodiment of the present invention, incorporates encryption methods to insure the broadcast encryption key remains secure. A marking device, in accordance with one embodiment of the present invention, incorporates, for example, digital watermarking methods that attach to the content information to identify a location of origin of the misappropriation, such as a Set-top Box (STB) and/or smart card. | 11-26-2009 |
20090323949 | METHOD OF TRANSMITTING AN ADDITIONAL PIECE OF DATA TO A RECEPTION TERMINAL - The invention relates to a method of transmitting at least one additional piece of data D in a list of access control words CWi to a scrambled content transmitted by a content server of an operator to a user equipment ( | 12-31-2009 |
20100014667 | BROADCAST RECEIVING APPARATUS AND CONTROL METHOD THEREOF - The present invention provides a broadcast receiving apparatus that receives a broadcast wave containing multiple channels. The apparatus comprises, among other things, a selecting unit that selects a channel from the broadcast wave; a determination unit that determines, for all channels that can be selected by the selecting unit, whether or not the obtaining unit can obtain an encrypted second-type encryption key that can be decrypted by the decrypting unit using the updated first-type encryption key; and an updating unit that updates the computer program stored in the memory to the updated program in the case where the determination unit has determined that the obtainment is possible for all the channels. | 01-21-2010 |
20100020969 | MONITORING USAGE OF ENCRYPTED BROADCAST SERVICES - Embodiments include a method and system for monitoring usage of an encrypted broadcast service, such as an encrypted television program, in a secure client module such as a SIM card. An encrypted entitlement control message is received from a head-end system via the intermediary of a client device. A service identifier indicative of the encrypted broadcast service is obtained from the decrypted entitlement control message and, in dependence of the decrypted entitlement control message, status data being indicative of a status of the broadcast service is generated. The service identifier and the status data are stored in a memory of said secure client module and can be transmitted to an external server. | 01-28-2010 |
20100027792 | Virtually Increasing the Number of Content Broadcast Channels - The invention mostly uses conventional procedures with regard to enabling specific end-user to decrypt encrypted content information, but supplies the decryption keys, which are identical for all end-users, only after the end-user has received the encrypted content information and after the end-user has received the subscription information comprised in the specific entitlement management data that specifies the individual rights to access the content information. This approach provides additional control over the conditions under which the content information is played-out by the end-user, and enables to temporally better manage the communication bandwidth available to the service provider. | 02-04-2010 |
20100177893 | Distributed video decoder and distributed video decoding method - A distributed video decoder and a distributed video decoding method are provided. The distributed video decoder includes a key picture decoding unit which reconstructs a key picture received from an encoder, a hash information selecting unit which determines necessary hash information using the reconstructed key picture and/or generated previous side information, and a side information generating unit which generates side information using the reconstructed key picture and/or hash information selected based on information determined by the hash information selecting unit. The distributed video decoder further includes a channel code decoding unit which estimates a quantized value by using a parity bit received from the encoder and the generated side information, and a video reconstructing unit which reconstructs a current picture as a decoding target by using the quantized value estimated by the channel code decoding unit and the generated side information. | 07-15-2010 |
20110206202 | METHOD AND APPARATUS FOR SUPPORTING BROADCAST EFFICIENCY AND SECURITY ENHANCEMENTS - A method and apparatus for providing conditional access to media programs is described. An exemplary method comprising the steps of transmitting media information encrypted according to a control word (CW) to a receiver station, transmitting entitlement management information (EMI) to the receiver station, the EMI comprising a service bitmap, and transmitting entitlement control information (ECI) to the receiver station, the entitlement control information including the control word (CW) encrypted according to a key (K) and an index to an element of the service bitmap, wherein the control word (CW) is decrypted by the receiver stations according to a value of the indexed element of the service bitmap. | 08-25-2011 |
20110228933 | METHOD AND SYSTEM FOR PROTECTING AN INFORMATION SIGNAL USING A CONTROL WORD - This method for protecting an information signal using a control word, the information signal and control word being sent by a transmitter to one or several receivers ( | 09-22-2011 |
20110268271 | COMPUTATIONAL EFFICIENTLY OBTAINING A CONTROL WORD IN A RECEIVER USING TRANSFORMATIONS - The invention provides a receiver, a smartcard and a conditional access system for securely obtaining a control word using an entitlement transform tree, wherein intermediate results are cached to improve computational efficiency. | 11-03-2011 |
20120328099 | ANTI-SPLITTER VIOLATION CONDITIONAL KEY CHANGE - Systems and methods are disclosed for performing anti-piracy countermeasures in order to prevent unauthorized access of protected content. A conditional access system may be modified to include a counter. The counter is incremented every time the conditional access system receives a request that is a potential indication of pirate activity. The counter may also be decremented every time the conditional access system receives a request indicative of legitimate activity. If the conditional access system receives a management message containing a key required to access content keys, the conditional access system cheeks the counter. If the counter is below a threshold value, the conditional access system obtains the key. However, if the counter is above the threshold value, the conditional access system disregards the key contained in the management message, thereby losing access to protected content. | 12-27-2012 |
20130216041 | EFFICIENT BROADCAST ENTITLEMENT MANAGEMENT MESSAGE DELIVERY MECHANISM USING A SCHEDULED DELIVERY WINDOW - Systems and methods include broadcasting an entitlement management message (EMM) in a communication system using a scheduled delivery window. The systems and methods including receiving a EMM broadcast window from a distribution system, listening for the EMM during the EMM broadcast window, and receiving the EMM from the distribution system during the EMM broadcast window. | 08-22-2013 |
20140205094 | VIDEO RECEIVING APPARATUS AND BROADCAST RECEIVING APPARATUS - An video receiving apparatus which reduces waiting time till image is displayed on a monitor include: a plurality of authentication executing units which perform respectively an authentication process to the external devices connected to each of the plurality of input terminals; a terminal selecting unit which selects one of the plurality of input terminals as a video input terminal based on an operation input from outside; an video receiving unit which receives the video information through one of the authentication executing units corresponding to the selected input terminal from the external devices connected through the selected input terminal; and a display control unit which outputs the received video information to a monitor. | 07-24-2014 |
20140376720 | Elementary Bitstream Cryptographic Material Transport Systems and Methods - Systems and methods for providing multimedia content from one process or component to another process or component over an unsecured connection are provided. One embodiment includes obtaining the cryptographic information, extracting the at least partially encrypted video data from the container file to create an elementary bitstream, enciphering the cryptographic information, inserting the cryptographic information in the elementary bitstream, providing the elementary bitstream to a video decoder, extracting the cryptographic information from the elementary bitstream at the video decoder, deciphering the cryptographic information, decrypting the elementary bitstream with the cryptographic information and decoding the elementary bitstream for rendering on a display device using the video decoder. | 12-25-2014 |
20150124964 | CONDITIONAL ENTITLEMENT PROCESSING FOR OBTAINING A CONTROL WORD - Embodiments of the invention provide an improved method and an improved receiver for obtaining a control word. Two or more subkeys are obtained in a receiver. Each subkey was encrypted under control of a key received in an entitlement message or transformed under control of a seed received in an entitlement message. After decryption or transformation, the subkeys are combined to obtain the control word. Typically at least one of the entitlement messages is a positive entitlement message and at least one of the entitlement messages is a negative entitlement message. Embodiments of the invention can be used in a conditional access system such as a Pay-TV system. | 05-07-2015 |
20150312525 | METHOD AND APPARATUS FOR PROTECTING THE TRANSFER OF DATA - According to one embodiment, a method of descrambling digital multimedia content starts by sending an out-of-band request for encrypted control data to a headend. A descrambler integrated circuit may then receive digital program data in a scrambled, format and the encrypted control data. The encrypted control data may then be decrypted entirely within the descrambler integrated circuit using a multiple-step decryption process starting with a unique key permanently stored in the descrambler integrate circuit and using the partial decryption of control data from the previous decryption step to generate a key to decrypt subsequent encrypted control data. The scrambled digital program data may then be descrambled in the descrambler integrated circuit using the decrypted control data from the last decryption step. Other embodiments are described. | 10-29-2015 |
20150373421 | Elementary Bitstream Cryptographic Material Transport Systems and Methods - Systems and methods for providing multimedia content from one process or component to another process or component over an unsecured connection are provided. One embodiment includes obtaining the cryptographic information, extracting the at least partially encrypted video data from the container file to create an elementary bitstream, enciphering the cryptographic information, inserting the cryptographic information in the elementary bitstream, providing the elementary bitstream to a video decoder, extracting the cryptographic information from the elementary bitstream at the video decoder, deciphering the cryptographic information, decrypting the elementary bitstream with the cryptographic information and decoding the elementary bitstream for rendering on a display device using the video decoder. | 12-24-2015 |
20160173946 | Method for Protecting Decryption Keys in a Decoder and Decoder for Implementing Said Method | 06-16-2016 |