摘要:
A method of generating a Personal Identification Number (PIN) between a first device and a second device in a network is provided. The method includes securely receiving information of input choices of the second device and random numbers assigned to the input choices at the first device. At the first device, the PIN is generated from the random numbers, and instructions are provided directing an entry of the input choices on the second device. At the second device, the input choices are entered. The second device is operable to generate the PIN from the input choices and the random numbers if the input choices are entered as instructed.
摘要:
A secure Internet Protocol (IP) telephony system, apparatus, and methods are disclosed. Communications over an IP telephony system can be secured by securing communications to and from a Cable Telephony Adapter (CTA). The system can include one or more CTAs, network servers, servers configured as signaling controllers, key distribution centers (KDC), and can include gateways that couple the IP telephony system to a Public Switched Telephone Network (PSTN). Each CTA can be configured as secure hardware and can be configured with multiple encryption keys that are used to communicate signaling or bearer channel communications. The KDC can be configured to periodically distribute symmetric encryption keys to secure communications between devices that have been provisioned to operate in the system and signaling controllers. The secure devices, such as the CTA, can communicate with other secure devices by establishing signaling and bearer channels that are encrypted with session specific symmetric keys derived from a symmetric key distributed by a signaling controller.
摘要:
A system is described for allowing “pay by time” purchasing of digital video programming. The system provides for a variable or metered approach. A user can purchase a fraction of a program for a price different from that required for purchasing the entire program. Records of the user's viewing can be created to record, e.g., when a user started receiving a program, how long the user received a program, and when the user stopped receiving a program.
摘要:
The present invention discloses an apparatus and method for securely generating a content decryption key in an endpoint device. In one example, a nonce is acquired from a packet header from a message received at the endpoint device. The content decryption key is derived utilizing a one-way content function that uses a channel key and the nonce as input parameters.
摘要:
An MPEG transport packet stream or the like is modified to provide concatenated synchronization bytes at an output of an interleaver receiving the modified packet stream. A conventional sync byte located in a first transport packet is replaced with a first substitute sync byte. A conventional sync byte located in a conventional sync byte position of a second transport packet is deleted. Another byte from the second transport packet is moved to the position of the deleted sync byte to open a desired byte position in the second transport packet. A second substitute sync byte is inserted into the desired byte position. The first and second transport packets and the desired byte position are selected to provide the first and second substitute sync bytes at locations in the modified packet stream where the first substitute sync byte will be concatenated with the second substitute sync byte at the output of the interleaver. The transport packet stream can be further modified to provide concatenated auxiliary bytes at the output of the interleaver.
摘要:
Alignment of an antenna and a polarizer for the antenna are automatically adjusted and the frequency setting of a frequency-tunable receiver is automatically adjusted while receiving a broadcast communication signal that is forward-error-correction coded by processing the forward-error-correction code of the received signal to measure a channel-bit-error-rate-affected parameter for the received signal; by realigning the antenna and the polarizer from their respective initial positions in response to the measured parameter until the measured parameter is minimized; and by retuning the receiver from its initial frequency setting in response to the measured parameter until the measured parameter is minimized. A Viterbi decoder processes the forward-error-correction code of the received signal to compute path metrics affected by the bit-error rate of the received signal and normalizes the computed path metrics; and a counter counts the normalizations over fixed intervals to measure a path metric normalization rate as the measured parameter.
摘要:
A field upgradeable security system deciphers signals received from a communication network. An information processor includes a receptacle for receiving a replaceable security element. The replaceable security element generates a working key necessary to the operation of the information processor. The working key is communicated to the information processor encrypted under a secret key. The information processor decrypts the encrypted working key for use in deciphering a received communication signal. Additional layers of encryption can be added to the communications between the information processor and security element to increase the level of security.
摘要:
A system for scrambling a video signal having a plurality of horizontal lines, each of which includes a video information portion and a non-video information portion. The scrambling system includes a memory; means for storing the video information portion of each video signal line in the memory; and means for forming scrambled horizontal lines by retrieving each of a plurality of said stored video information lines in a plurality of segments preceded by a non-video segment and separated by non-video segment(s). The retrieval means include means for varying the respective durations of the retrieved video information segments in individual scrambled horizontal lines in accordance with an encryption keystream; and means for varying the total duration of the non-video segments for individual scrambled horizontal lines in accordance with a predetermined timing pattern. A complementary descrambling system also is disclosed.
摘要:
A client, method and system for registering a DRM client is disclosed. The method (100) includes the steps of: initiating (110) a registration request via a DRM client with an encrypted registration message including an asymmetric key cryptographic identity, a customer identifier and an application specific information (AINFO) field including a digital signature and a device certificate chain; validating (120) information in the application specific information (AINFO) field by a DRM registration server; and receiving (130) a registration response, the registration response being encrypted and including access information, to obtain content. Advantageously, this method provides an enhanced and reliable means of authentication.
摘要:
The present invention discloses an apparatus and method for delivering a revocation list over a one-way broadcast network to receivers with limited memory capabilities. In one example, the revocation list is partitioned to form a first certificate revocation list (CRL) sequence if the number of entries in the revocation list exceeds a predetermined value. Individual identification numbers belonging to a first identification number series are subsequently assigned to partitions of the first CRL sequence. Afterwards, the first CRL sequence is interleaved into a first content transport stream.