Abstract:
Described herein are systems and methods for providing hardware based security to software applications in a television receiver. The system can include a television receiver having a trusted hardware environment that includes a security processor and a standard environment that includes an application processor. The security processor can ensure that at least a portion of the software application executed by the application processor is secure. A portion of the software application code can be placed in an interrupt service routine memory space. During execution of the software application, the security processor can security check the portion of the software application in the interrupt service routine memory space, making it trusted code. The security processor can force the application processor to execute the trusted code by triggering an interrupt. Such forced execution can allow the security processor to not only ensure that code is trusted, but that it is executed.
Abstract:
A broadcast receiving system is disclosed that verifies a current digital certificate extracted from a digital broadcast signal using a previous digital certificate previously stored as trusted. The current and previous digital certificates are associated with digital signatures with which data received with the broadcast signal has been signed. Also disclosed is a system for signing application data to be broadcast together with a digital certificate in a digital broadcast signal. A current digital certificate attesting the validity of a digital signature attached to broadcast data is in turn signed with a digital signature using one or more previous private keys associated with respective previous certificates identifying the issuer of the current digital certificate. These disclosures are in particular applicable to HbbTV.
Abstract:
An example method involves receiving, by a playback device in a media playback system, limited-access media, where the limited-access media corresponds to a limited-access playback device characteristic. The method may further involve determining, by the playback device, that a particular playback device having the limited-access playback device characteristic is active in the media playback system. Based on determining that the particular playback device having the limited-access playback device characteristic is active in the media playback system, the method may further involve causing the media playback system to play back the limited-access media.
Abstract:
A method for managing content commences by entering an order, responsive to an end user input, for physical delivery of encrypted content stored on a tangible, machine-readable medium. Thereafter, in accordance with the order, a first decryption key is electronically received for decrypting the encrypted content for playback on a playback device linked to the order so the playback device can play the encrypted content after the physical delivery of the medium.
Abstract:
When confidential information is displayed at a display device, a secure image may be generated so that the confidential information is visible only to an authorized user within a predetermined viewing distance. In some examples, incorrect information may be generated to mislead an unauthorized viewer outside the predetermined viewing distance.
Abstract:
A method of enabling media recording compatibility between client devices, comprising provisioning a first client device associated with a subscriber identifier with a household key also associated with the subscriber identifier, receiving a media content stream at the first client device, the media content stream having been encrypted by a content provider, decrypting the media content stream at the first client device, creating a recording with the first client device by digitally recording a portion of the media content stream, encrypting the recording with the household key at the first client device, saving the recording to a memory device, and loading the recording onto a second client device that has also been provisioned with the household key, the second client device also being associated with the subscriber identifier, such that the second client device uses the household key to decrypt and play back the recording.