Class / Patent application number | Description | Number of patent applications / Date published |
380211000 | Interactive TV | 18 |
20090086969 | METHOD AND SYSTEM FOR PROVIDING CONTENT TO A CONTENT DISTRIBUTION SYSTEM SUITABLE FOR A MULTIPLE DWELLING UNIT USING AN ENCRYPTION - A communication system | 04-02-2009 |
20090086970 | METHOD AND SYSTEM FOR SECURELY PROVIDING AND STORING CONTENT IN A MULTIPLE DWELLING UNIT SYSTEM - A communication system | 04-02-2009 |
20100239090 | Delivering Secure IPTV Services to PC Platforms - To prevent theft of protected content when IPTV services are provided, a conditional access device (CAD) is connected to a personal computer (PC). An application is launched on the PC from the CAD over universal serial bus (USB) interface. The application configures the PC to allow a user to receive secure internet protocol television (IPTV) services. The conditional access device and an IPTV service provider determine user access to the IPTV services via a network by using a trusted computing base (TCB) on the CAD and keys stored on the CAD. The application decrypts and decodes the IPTV services using the processing and storage capability of the PC. The CAD also receives and processes remote control signals received from a remote control interface. The remote control signals are requests or responses from the user interacting with the application. The application displays content requested by the user or indications of responses by the user via a user interface on the PC. | 09-23-2010 |
20100266123 | DIGITAL TV CONDITIONAL ACCESS SYSTEM AND METHOD OF USING THE SAME FOR TRANSMITTING AND RECEIVING DIGITAL DATA - A digital TV conditional access system having an authentication module, a conditional access front-end module, and a receiver module. The authentication module communicates bidirectionally with and authenticates the receiver module to generate a unique ID number and authentication information, the ID number and the authentication information being recorded to a data base. The conditional access front-end module communicates bidirectionally with the data base, collects information of the receiver module from the data base, encrypts entitlement management message of the receiver module, and transmits the encrypted entitlement management message to the receiver module by an addressing mode. The conditional access front-end module further includes an entitlement control message generator, and the receiver module receives a scrambled program with the help of the ID number and the authentication information. A method of using the digital TV conditional access system for transmitting and receiving encrypted digital data is also provided. | 10-21-2010 |
20110064219 | IPTV SECURITY IN A COMMUNICATION NETWORK - A method of setting up a secure IPTV session. An Application Server (AS) receives an invite message from an IPTV receiving node such as a mobile telephone or a Set Top Box to set up an IPTV session. The invite message includes a Bootstrapping Transaction Identifier (BTID) associated with the IPTV receiving node. The AS sends an authentication request including the BTID to a Bootstrapping Server Function (BSF). The AS then receives from the BSF, an authentication response, which includes a long-term key associated with and previously provided to the IPTV receiving node. The AS then sends a request identifying the receiving node to an IPTV content provider. The AS then uses the long-term key to encrypt a media encryption key that is used to encrypt the media sent by the content provider, and sends the encrypted media encryption key to the IPTV receiving node in an invite response. | 03-17-2011 |
20110211694 | DISABLING A CLEARTEXT CONTROL WORD LOADING MECHANISM IN A CONDITIONAL ACCESS SYSTEM - Various embodiments enable a chipset of a receiver of a conditional access system to block cleartext control words provided to the chipset from being used to descramble content. Hereto the chipset comprises a trigger module configured to obtain a disable command that is received with an encrypted Chip Set Session Key (CSSK) and, if the disable command is obtained, have the chipset block any cleartext control word. | 09-01-2011 |
20110293093 | METHOD AND SYSTEM FOR IDENTITY-BASED KEY MANAGEMENT - Systems, methods and devices for distributing a group key between a transmitter and a group of receivers connected over a network. The described group key distribution can be implemented in any television network for encrypted transmission of television related content to large and dynamic groups of subscribers' receivers. Wherein each receiver contributes to the group key by securely transmitting its contribution to the transmitter. The transmitter also contributes to the group key and generates the group key based on all contributions. The transmitter further generates partial keys specific to each receiver such that each receiver can generate a copy of the group key from its contribution and the partial key it receives. The transmitter sends each receiver its corresponding partial key so that each receiver can calculate a copy of the group key. | 12-01-2011 |
20130070924 | METHOD OF COMMUNICATION AND ASSOCIATED SYSTEM OF GLASSES TYPE FOR A USER USING A VIEWING STATION - A method for communicating between a user using a viewing device ( | 03-21-2013 |
20130089202 | IDENTIFICATION AND HANDLING OF DATA STREAMS USING CODED PREAMBLES - Embodiments of the invention are generally directed to identification and handling of data streams using coded preambles. An embodiment of an apparatus includes an interface with a communication channel, transmitter coupled with the interface to transmit one or more data streams via the interface, and a processing element, the processing element to receive one or more data streams for transmission. Upon receiving multiple data streams for transmission of a first type of data, including a first data stream and a second data stream for transmission of the first type of data, the processing element is to select a first preamble for the first data stream and a second preamble for the second data stream, where the first preamble is distinguishable from the second preamble. | 04-11-2013 |
20130142331 | BINDING OF PROTECTED VIDEO CONTENT TO VIDEO PLAYER WITH ENCRYPTION KEY - A server receives a video content identifier and a video player identifier from a video player through a network. The video content identifier identifies video content. The video player identifier identifies a video player. Further, the video player identifier is provided to a hash generator to generate a hash of the video player. In addition, the plaintext of the video content is encrypted with the encryption key to generate ciphertext. The encryption key is encrypted with the hash to generate an encrypted encryption key. | 06-06-2013 |
20130156187 | MOBILE IPTV SERVICE SYSTEM USING DOWNLOADABLE CONDITIONAL ACCESS SYSTEM AND METHOD THEREOF - An apparatus and method associated with an Internet Protocol Television (IPTV) service in a mobile environment are provided. A streaming server may provide a mobile terminal with a mobile certificate and an encryption key. In response to a content request received from the mobile terminal, the streaming server may provide the mobile terminal with encrypted content and a Downloadable Conditional Access System (DCAS) code. The mobile terminal may decrypt the encrypted content using the encryption key and the DCAS code, and may play back the decrypted content. | 06-20-2013 |
20130279694 | SYSTEM AND METHOD TO RECORD ENCRYPTED CONTENT WITH ACCESS CONDITIONS - A television event may be consumed after been stored in a mass memory of a multimedia unit, but still fully relies on the security of a secure device. A conversion of a received content aims at firstly descrambling the content using control words included in entitlement control messages and immediately re-encrypting the descrambled content by a unique key generated specifically for this content. Access conditions attached to the entitlement control message containing the control word are temporarily stored and once the decryption is terminated, the secure device produces an information block. This information block containing for example access conditions and an identifier of the content is either stored into a secure memory of the secure device or stored in the mass memory with the encrypted content. The unique key is made up of a combination of a root key specific to the secure device and the information block. | 10-24-2013 |
20140341377 | SMARTCARD ENCRYPTION CYCLING - Various arrangements for encrypting multiple television channels are presented. A first television channel of a plurality of television channels to be protected via a first entitlement control message (ECM) using a first encryption scheme may be designated. The plurality of television channels may be transmitted using a single transponder stream. A second television channel of the plurality of television channels to be protected via a second ECM encrypted using a second encryption scheme while the first television channel of the plurality of television channels is protected using the first encryption scheme may be designated. The first and second ECMs may be transmitted to a plurality of television receivers. Data from the first ECM may be used for descrambling of the first television channel by the plurality of television receivers. Data from the second ECM may be used for descrambling of the second television channel by the plurality of television receivers. | 11-20-2014 |
20150016607 | SYSTEMS AND METHODS FOR PERFORMING TRANSPORT I/O - Systems and methods for implementing a Transport I/O system are described. Network encrypted content may be received by a device. The device may provide the network encrypted content to a secure processor, such as, for example, a smart card. The secure processor obtains a network control word that may be used to decrypt the network encrypted content. The secure processor may decrypt the network encrypted content to produce clear content. In embodiments, the secure processor may then use a local control word to generate locally encrypted content specific to the device. The device may then receive the locally encrypted content from the secure processor and proceed to decrypt the locally encrypted content using a shared local encryption key. The Transport I/O system ensures the protection of the network control word by maintaining the network control word on the secure processor. | 01-15-2015 |
20150016608 | SYSTEMS AND METHODS FOR PERFORMING TRANSPORT I/O - Systems and methods for implementing a Transport I/O system are described. Network encrypted content may be received by a device. The device may provide the network encrypted content to a secure processor, such as, for example, a smart card. The secure processor obtains a network control word that may be used to decrypt the network encrypted content. The secure processor may decrypt the network encrypted content to produce clear content, in embodiments, the secure processor may then use a local control word to generate locally encrypted content specific to the device. The device may then receive the locally encrypted content from the secure processor and proceed to decrypt the locally encrypted content using a shared local encryption key. The Transport I/O system ensures the protection of the network control word by maintaining the network control word on the secure processor. | 01-15-2015 |
20150078551 | RECEPTION DEVICE, RECEPTION METHOD, PROGRAM, DECRYPTION PROCESSING DEVICE, RECEPTION PROCESSING SYSTEM, AND INFORMATION PROCESSING DEVICE - There is provided a reception device including a content reception unit configured to receive content, a digital watermark information acquisition unit configured to acquire information specifying an outflow route for the content to create a digital watermark, and a content output unit configured to embed a digital watermark in the received content by using the acquired information and configured to output the content. | 03-19-2015 |
20160182925 | SESSION-BASED ENCRYPTION FOR DELIVERING CONTENT ON-DEMAND | 06-23-2016 |
20180027288 | SYSTEMS AND METHODS FOR PERFORMING TRANSPORT I/O | 01-25-2018 |