摘要:
A method of securely downloading at least one of conditional access software (CAS) , Digital Rights Management software (DRMS) , Trusted Domain Software (TDS) , and Gaming Security- Software (GSS) includes presenting a specialized entitlement management message (EMM) to initiate the download to a receiver (402) security device using a supervisory logon key (SLK) split to logon with a second split contained inside the receiver security device, presenting a receiver digitally signed random challenge (404) from the receiver security device to a sender security server to establish authentication of the receiver security device to the sender security server, and signing and returning the receiver random challenge (406) from the sender security server to the receiver security device with a sender random challenge to establish authentication of the sender security server to the receiver security device.
摘要:
A video-on-demand (VOD) method and System for use with a computer connected to the Internet includes an Internet website. The website lists videos available for delivery from a content provider to a cable provider subscriber. The subscriber uses the computer to select a video from the website. The cable provider receives the selected video from the content provider and then delivers the video to a television of the subscriber via the cable television network. The subscriber uses the computer to register an interest profile on the website. Information regarding the available videos is compared with the profile and an email is then sent to the subscriber via the Internet. The email contains information regarding the available videos corresponding to the profile. The subscriber requests a video identified in the email for delivery from the content provider to the television via the cable television network.
摘要:
A method of traffic regulation in a packet communication network involves a token bucket associated with a subscriber. Packets arriving at the regulator are handled in accordance with the token bucket configuration. The method further involves measuring a demand placed on the packet communication network by the subscriber. The token bucket configuration for the subscriber is dynamically adjusted based on the demand. Another method of traffic regulation handles packets that arrive at the regulator in accordance with first and second token bucket configurations. The first token bucket regulates packet rate while the second token bucket regulates data rate. Another method of traffic regulation involves handling packets in accordance with a token bucket configuration, where the amount of tokens to be removed is based on the amount of the flow and is further based on a classification of the flow. Packet-level devices for traffic regulation are also contemplated.
摘要:
A technique is provided for securely transferring programming content from a first device in a first layer, e.g., a trusted domain, to a second device in a second layer, e.g., outside the trusted domain. When a user requests that the first device transfer protected content to the second device, the first device needs to authenticate the second device. After the second device is authenticated, the first device may transfer to the second device the protected content, together with a rights file associated therewith. The rights file specifies the rights of the second device to use the protected content, according to its security level indicative of its security. These rights may concern, e.g., the number of times that the second device may subsequently transfer the protected content to other devices, the time period within which the second device may play the protected content, etc.; The higher the security level of the second device is, the more rights accorded thereto. Indeed, the second device may need to meet a minimum security level requirement in order for it to receive or keep the protected content.
摘要:
A verbal request for an action to be performed in connection with a user's set-top box may be received by a Program Content Manager (PCM) from a voice-enabled input/output device such as a VoIP-enabled device or a mobile communication device. Alternatively, the user may request an action via email, text message, and the like. The PCM receiving the action request may execute, or schedule the request for later execution, depending on whether the request is for a real-time or future action. The user may also request to send an alert or a program recording request to others. Recipients may be able to request further alerts or confirm a program recording invitation if certain criteria are met.
摘要:
System and method for providing accessing to media available through a media output device. The access being facilitated through user interaction with user interface displayed on the media output device. The user interface may be displayed on the media output device without requiring the media output device to support graphical rendering associated with generating the user interface.
摘要:
A technique is provided for securely transferring programming content from a first device in a first layer, e.g., a trusted domain, to a second device in a second layer, e.g., outside the trusted domain. When a user requests that the first device transfer protected content to the second device, the first device needs to authenticate the second device. After the second device is authenticated, the first device may transfer to the second device the protected content, together with a rights file associated therewith. The rights file specifies the rights of the second device to use the protected content, according to its security level indicative of its security. These rights may concern, e.g., the number of times that the second device may subsequently transfer the protected content to other devices, the time period within which the second device may play the protected content, etc.; The higher the security level of the second device is, the more rights accorded thereto. Indeed, the second device may need to meet a minimum security level requirement in order for it to receive or keep the protected content.
摘要:
A system and method for managing communication. The system and method applying to but not limited to settop boxes (STBs) and other devices used to interface services. The management including any number of features and processes associated with achieving Quality of Service (QoS) across different domains and according to network limitations associated with the same.
摘要:
A method of generating encryption and decryption keys for a multiple tier, variable key ladder (VKL) hierarchy includes determining a device key based on network connection and configuration data contained in conditional access system firmware, decrypting and extracting a session or category key from an input media stream or an Entitlement Management Message using the device key, and configuring a key ladder in response to at least one Entitlement Control Message (ECM), wherein the key ladder comprises the device key and at least one of (i) a program key, (ii) the session or category key, and (iii) at least one control word.