摘要:
Limited duration previews of program offerings available for purchase via a communication network are provided in a cryptographically secure manner at virtually any time during the service. The invention has particular applicability to the provision of video services on a pay-per-view basis. Such a video service is provided during a program epoch. A fixed period is defined during the program epoch when portions of the video service are available for viewing on a preview basis. A consumer is allowed to preview, without purchase, portions of the video service at any time during the fixed period for up to a maximum preview duration that is shorter than the fixed period. The consumer can then purchase the video service for viewing during the program epoch after previewing portions thereof. A plurality of records is maintained to service different previewable programs concurrently.
摘要:
A microcomputer which is operable in either an internal program mode, wherein the microcomputer functions in accordance with an internally stored program, or in an external program mode, wherein the microcomputer functions in accordance with a program stored in a memory external to the microcomputer, provides internal RAM security during the external program mode. The microcomputer includes an internal program memory for internally storing programs; a bus for connection to an external memory for carrying programs from the external program memory; a nonsecure RAM for storing nonsecure data; a secure RAM for storing secure data; a central processing unit for processing the stored data and/or externally provided data either in accordance with the internally stored programs or in accordance with programs stored in the external memory; and a controller for controlling interconnections between the internal program memory, the bus, the RAMs and the central processing unit in accordance with the mode of operation of the microcomputer; wherein during the external program mode, the controller inhibits access to the secure RAM. Code for accessing the secure data stored in the secure RAM is contained in a program stored in the internal program memory. The microcomputer is ideally suited for performing cryptographic operations utilizing cryptographic keys stored in or derived from the secure memory.
摘要:
An integrated circuit chip containing a secure area in which secure data is processed and/or stored, includes a semiconductive layer containing diffusions defining circuit element components; a first conductive layer coupled to the semiconductive layer to interconnect the components to thereby define circuit elements for distributing, storing processing and/or affecting the processing of secure data; and a second conductive layer overlying the circuit elements to thereby define a secure area in which the circuit elements are shielded from inspection, and coupled to the circuit elements for conducting to the circuit elements a predetermined signal that is essential to an intended function of the shielded circuit elements, whereby removal of the second conductive layer will prevent the predetermined essential signal from being provided to the circuit elements and thereby prevent the intended function.
摘要:
A key security system provides for the reproduction of secure keys by using distributed key generation data and a distributed encrypted prekey. The system encrypts program key generation data with a program key prekey in accordance with a first encryption algorithm to produce the program key; processes the program key to produce a keystream; and processes an information signal with the keystream to produce a scrambled information signal. The program key prekey is encrypted with a category key in accordance with a second encryption algorithm to produce an encrypted program key prekey. The scrambled information signal, the program key generation data and the encrypted program key prekey are distributed to descramblers. The descrambler within the key security system decrypts the distributed encrypted program key prekey with the category key in accordance with the second encryption algorithm to reproduce the program key prekey; encrypts the distributed program key generation data with the reproduced program key prekey in accordance with the first encryption algorithm to produce the program key; processes the reproduced program key to reproduce the keystream; and processes the distributed scrambled information signal with the reproduced keystream to descramble the distributed scrambled information signal. The key generation data incudes authorization data that must be processed by the authorization processor in the descrambler in order to enable the descrambler. The use of authorization data as key generation data protects the authorization data from spoofing attacks. When more data must be protected than a single operation of the encryption algorithm can support, then additional data blocks are protected by chaining the system, wherein the output from one stage forms part of the input to the next. The key generation data for the program key includes a sequence number securely associated with the category key to thereby "timelock" program key reproduction to the use of a current category key and thus prevent an attack based upon the use of an obsolete category key.
摘要:
A host device, which may include a DVR, selects to record content on the host device DVR or in a network attached storage (NAS) unit. The recorded content remains bound to the host device from a DRM perspective when it is recorded on the host DVR and on the remotely located NAS. A client device can obtain access to content recorded on the NAS by negotiating DRM rights with the host device instead of the NAS. When access rights are approved, the host device provides access information to the client device so that the content is streamed directly to the client device from the NAS.
摘要:
In the present disclosure, a DRM (in this case IPRM) system may be used to deliver media content keys to a player device in a live streaming environment and take advantage of all DRM related functionalities that come with it, such as proximity control, copy protection enforcement and rights verification. A playlist may be used to deliver a key identifier for encrypted live streaming content.
摘要:
A method for registering a first device with a second device over a wireless network includes receiving a registration request from the first device and sending one or more user input choices to the first device. The user input choices each specify a user input action available though a user interface associated with the second device. A device description describing the second device is sent to the first device in a manner that allows it to be presented to the user by the first device. At least one of the user input actions are sequentially received through the user interface in response to instructions provided to the user by the first device. The first device is registered with the second device if the user input actions received by the second device correctly reflect the instructions provided to the user by the first device.
摘要:
In a method of registering a plurality of client devices with a device registration server for secure data communications, a unique symmetric key is generated for each of the client devices using a cryptographic function on a private key of the device registration server and a respective public key of each of the client devices, and a broadcast message containing the public key of the device registration server is sent to the client devices, in which the client devices are configured to generate a respective unique symmetric key from the public key of the device registration server and its own private key using a cryptographic function, and in which the unique symmetric key generated by each client device matches the respective unique symmetric key generated by the device registration server for the respective client device.
摘要:
In embodiments of tuner control for streaming live television, a client device can be implemented to utilize the HTTP protocol and REST APIs to communicate with the media streamer to query a list of television channels and initiate tuning to a channel of streaming video content to be decrypted, transcoded, encrypted, and streamed to the client device.
摘要:
Two or more set-top boxes are installed in a household. A communications link, preferably a physical link, is provided between or among the set-top boxes. One of the boxes is designated as a “master” box while the other box or boxes are “slaves.” The slave box will use the communications link to communicate in a secured and encrypted manner with the master box. If that communication is severed, e.g., if an attempt is made to move the slave box to another household to provide unauthorized service in that household, the slave box will stop working when it can no longer communicate with the master box.