SYSTEM AND METHOD FOR SECURE CONDITIONAL ACCESS DOWNLOAD AND RECONFIGURATION
    11.
    发明公开
    SYSTEM AND METHOD FOR SECURE CONDITIONAL ACCESS DOWNLOAD AND RECONFIGURATION 有权
    系统和方法安全条件接收和下载的重新配置

    公开(公告)号:EP1825678A2

    公开(公告)日:2007-08-29

    申请号:EP05853333.2

    申请日:2005-12-08

    IPC分类号: H04N7/16

    摘要: A method of securely downloading at least one of conditional access software (CAS) , Digital Rights Management software (DRMS) , Trusted Domain Software (TDS) , and Gaming Security- Software (GSS) includes presenting a specialized entitlement management message (EMM) to initiate the download to a receiver (402) security device using a supervisory logon key (SLK) split to logon with a second split contained inside the receiver security device, presenting a receiver digitally signed random challenge (404) from the receiver security device to a sender security server to establish authentication of the receiver security device to the sender security server, and signing and returning the receiver random challenge (406) from the sender security server to the receiver security device with a sender random challenge to establish authentication of the sender security server to the receiver security device.

    METHOD AND PACKET-LEVEL DEVICE FOR TRAFFIC REGULATION IN A DATA NETWORK
    13.
    发明公开
    METHOD AND PACKET-LEVEL DEVICE FOR TRAFFIC REGULATION IN A DATA NETWORK 有权
    方法和设备的数据包平原路控制数据网络

    公开(公告)号:EP1683304A2

    公开(公告)日:2006-07-26

    申请号:EP04795113.2

    申请日:2004-10-14

    IPC分类号: H04L12/26

    摘要: A method of traffic regulation in a packet communication network involves a token bucket associated with a subscriber. Packets arriving at the regulator are handled in accordance with the token bucket configuration. The method further involves measuring a demand placed on the packet communication network by the subscriber. The token bucket configuration for the subscriber is dynamically adjusted based on the demand. Another method of traffic regulation handles packets that arrive at the regulator in accordance with first and second token bucket configurations. The first token bucket regulates packet rate while the second token bucket regulates data rate. Another method of traffic regulation involves handling packets in accordance with a token bucket configuration, where the amount of tokens to be removed is based on the amount of the flow and is further based on a classification of the flow. Packet-level devices for traffic regulation are also contemplated.

    Communication signaling engine
    15.
    发明公开
    Communication signaling engine 审中-公开
    Kommunikationssignalisierungsmaschine

    公开(公告)号:EP2278802A3

    公开(公告)日:2013-03-20

    申请号:EP10169750.6

    申请日:2010-07-15

    发明人: Franklyn, Athias

    摘要: A verbal request for an action to be performed in connection with a user's set-top box may be received by a Program Content Manager (PCM) from a voice-enabled input/output device such as a VoIP-enabled device or a mobile communication device. Alternatively, the user may request an action via email, text message, and the like. The PCM receiving the action request may execute, or schedule the request for later execution, depending on whether the request is for a real-time or future action. The user may also request to send an alert or a program recording request to others. Recipients may be able to request further alerts or confirm a program recording invitation if certain criteria are met.

    摘要翻译: 可以由来自诸如支持VoIP的设备或移动通信设备之类的语音输入/输出设备的节目内容管理器(PCM)接收对与用户机顶盒相关的操作的口头请求 。 或者,用户可以通过电子邮件,文本消息等来请求动作。 接收动作请求的PCM可以根据该请求是实时还是将来的动作来执行或者调度稍后执行的请求。 用户还可以请求向其他人发送警报或程序记录请求。 如果满足某些标准,收件人可能会要求进一步提醒或确认节目录制邀请。

    SYSTEM AND METHOD FOR A VARIABLE KEY LADDER
    20.
    发明公开
    SYSTEM AND METHOD FOR A VARIABLE KEY LADDER 审中-公开
    系统和方法与可变密钥导体

    公开(公告)号:EP1872511A2

    公开(公告)日:2008-01-02

    申请号:EP06849666.0

    申请日:2006-01-17

    IPC分类号: H04L9/00

    CPC分类号: H04N21/26606 H04N21/4623

    摘要: A method of generating encryption and decryption keys for a multiple tier, variable key ladder (VKL) hierarchy includes determining a device key based on network connection and configuration data contained in conditional access system firmware, decrypting and extracting a session or category key from an input media stream or an Entitlement Management Message using the device key, and configuring a key ladder in response to at least one Entitlement Control Message (ECM), wherein the key ladder comprises the device key and at least one of (i) a program key, (ii) the session or category key, and (iii) at least one control word.