Abstract:
A secure Internet Protocol (IP) telephony system, apparatus, and methods are disclosed. Communications over an IP telephony system can be secured by securing communications to and from a Cable Telephony Adapter (CTA). The system can include one or more CTAs, network servers, servers configured as signaling controllers, key distribution centers (KDC), and can include gateways that couple the IP telephony system to a Public Switched Telephone Network (PSTN). Each CTA can be configured as secure hardware and can be configured with multiple encryption keys that are used to communicate signaling or bearer channel communications. The KDC can be configured to periodically distribute symmetric encryption keys to secure communications between devices that have been provisioned to operate in the system and signaling controllers. The secure devices, such as the CTA, can communicate with other secure devices by establishing signaling and bearer channels that are encrypted with session specific symmetric keys derived from a symmetric key distributed by a signaling controller.
Abstract:
A system for restricting playback of an electronic presentation, such as a digital video or song. The system uses a playback time limit that specifies a duration of allowable playback time. The playback time limit is typically longer than the running time of the presentation so that a user is able to use standard transport controls such as pause, stop, rewind, fast forward, etc., that affect the overall playback time needed to view the presentation in its entirety. One approach uses a secure time base that is provided by a server over a network to a client device that includes a playback device. The secure time base is received and used by secure processing within the playback device. This approach allows rendering of the presentation to an output device to be performed by non-secure processing without unduly compromising the security of the system.
Abstract:
The integrity of a group of secure processing elements in a communication system is ensured with a validation scheme. Member elements are checked by adjacent members to determine whether a member has been tampered with or operatively removed from a group. If a member is found to be untrustworthy, propagation of group characteristic information to that member will be halted. The group characteristic information defines the group, and is required by each group member in order to function. The untrustworthy member is therefore effectively exiled from the group. An efficient network topology minimizes inter-member message traffic while maintaining group robustness.
Abstract:
Apparatus is provided for authenticating information using a double feedforward hash function to provide complementarity in the implementation of an encryption algorithm. A cryptographic processor has a first input for receiving plaintext, a second input for receiving a key and an output for outputting ciphertext generated by cryptographically processing the plaintext and key. A first circuit element is responsive to the ciphertext and plaintext for outputting a first ciphertext derivative. A second circuit element is responsive to at least a portion of the first ciphertext derivative and the key for outputting a second ciphertext derivative. The first and second circuit elements can be XOR gates. Alternatively, these elements can be provided using lookup tables. Subsequent cryptographic processor stages can be provided having a first input for receiving second plaintext, a second input for receiving the second ciphertext derivative as a key, and an output for outputting second ciphertext generated by cryptographically processing the second plaintext and the second ciphertext derivative. In an illustrated embodiment, the cryptographic processor is a DES processor.
Abstract:
The present invention discloses an apparatus and method for defining and enforcing rules of transition between two security domains, e.g., a transport domain and a persistent security domain. In turn, a border guard, e.g., a security device, is provided between these two domains that enforce rules for transition between the two security domains. This novel approach of defining a transport domain and a persistent security domain simplifies the classification of the digital content and its movement through the system. Namely, the border guard once established between the two systems can enforce DRM rules associated with how contents are moved between the two domains.
Abstract:
Described herein are embodiments that provide an approach to cryptographic key management for a digital rights management (DRM) architecture that includes multiple levels of key management for minimizing bandwidth usage while maximizing security for the DRM architecture. In one embodiment, there is provided a data structure for cryptographic key management that includes a public/private key pair and three additional layers of symmetric keys for authorizing access to a plurality of contents.
Abstract:
A system for streaming encrypted conditional access (CA) data, such as control words, from a primary or master conditional access provider (CAP) to one or more secondary CAPS. The primary CAP encrypts content (program data) that is to be access-controlled, such as a television program, according to the associated CA data. A first group of user terminals is compatible with the CA data of the primary CAP. The CA data is then provided to the secondary CAPs to provide corresponding CA data for the content in the secondary CAPs' associated formats for compatibility with other groups of terminals. The invention can be used in any packet-based distribution system, including a broadband television network headend, and avoids the need for the secondary CAPs to request the control words on an as-needed basis. Moreover, the CA data for a current crypto-period and a number of future crypto-periods are provided in a “sliding window” to allow the secondary CAP to begin preparing its CA data in advance. Moreover, the CA data can be provided to the secondary CAPs on a real-time basis, or well beforehand when the content is pre-encrypted and stored, e.g., at a file server.
Abstract:
A system for token-based management of a PKI (public key infrastructure) personalization process includes a token request and management system (TRMS) configured to gather request information from a requestor; and a token personalization system (TPS) configured to personalize a hardware token such that usage of the hardware token is constrained by the request information. A method for token-based management of a PKI personalization process includes: requesting a hardware token; personalizing a hardware token such that the hardware token is confined to operation within limiting parameters; binding the hardware token to a workstation which is configured receive the hardware token and use credentials within the hardware token to request and download PKI data from a PKI server, the workstation being further configured to personalize an end user product by loading the PKI data into internal memory contained within the end user product; and monitoring usage of the hardware token and the PKI data.
Abstract:
A system for token-based management of a PKI personalization process includes a token request and management system (TRMS) configured to gather request information from a requestor; and a token personalization system (TPS) configured to personalize a hardware token such that usage of the hardware token is constrained by the request information. A method for token-based management of a PKI personalization process includes: requesting a hardware token; personalizing a hardware token such that the hardware token is confined to operation within limiting parameters; binding the hardware token to a workstation which is configured receive the hardware token and use credentials within the hardware token to request and download PKI data from a PKI server, the workstation being further configured to personalize an end user product by loading the PKI data into internal memory contained within the end user product; and monitoring usage of the hardware token and the PKI data.
Abstract:
A method and apparatus of providing a virtual universe associated with a product is disclosed. A virtual universe of amenities is established. The virtual universe of amenities is sponsored by the vendor of a product. A security code is provided as part of the sale of the product. The security code provides access to a portion of the virtual universe of amenities. A user is permitted to access the portion of the virtual universe of amenities when the security code is authenticated at a virtual universe server.