Interactive video distribution systems – Video distribution system with upstream communication – Remote testing of cable system
Reexamination Certificate
2000-02-16
2004-06-22
Miller, John (Department: 2614)
Interactive video distribution systems
Video distribution system with upstream communication
Remote testing of cable system
C725S025000
Reexamination Certificate
active
06754908
ABSTRACT:
BACKGROUND OF THE INVENTION
This invention relates in general to conditional access systems and, more specifically, to detecting modifications to information within a content receiver.
Cable television (TV) providers distribute video streams to subscribers by way of conditional access (CA) systems. CA systems distribute video streams from a headend of the cable TV provider to a set top box associated with a subscriber. The headend includes hardware that receives the video streams and distributes them to the set top boxes within the CA system. Select set top boxes are allowed to decode certain video streams according to entitlement information sent by the cable TV provider to the set top box. In a similar way, other video program providers use satellite dishes to wirelessly distribute video content to set top boxes.
Video programs are broadcast to all set top boxes, but only a subset of those boxes are given access to specific video programs. For example, only those that have ordered a pay per view boxing match are allowed to view it even though every set top box may receive the match. Once a subscriber orders the pay per view program, an entitlement message is broadcast in encrypted form to all set top boxes. Only the particular set top box the entitlement message is intended for can decrypt it. Inside the decrypted entitlement message is a key that will decrypt the pay per view program. With that key, the set top box decrypts the pay per view program as it is received in real-time.
The set top boxes are located remotely from cable TV provider and are susceptible to hacking by pirates attempting to steal content. As those skilled in the art appreciate, set top boxes incorporate elaborate security mechanisms to thwart the efforts of pirates. However, these security mechanisms are occasionally circumvented by pirates who hack the set top boxes. Accordingly, methods for remotely detecting modification to the security mechanisms are desired.
SUMMARY OF THE INVENTION
According to the invention, disclosed are an apparatus and methods for detecting modifications to information within a content receiver. In one embodiment, a method for detecting modification to a content receiver within a conditional access system is disclosed. In this process, a content provider generates a message. The message is sent to the content receiver by way of a network. The content receiver gets the message from the network. The content provider detects any unauthorized modification to the content receiver.
In another embodiment, a process for detecting modification to a content receiver within a conditional access system is disclosed. In one portion of the process, a content provider generates a message that intentionally includes an error. The message is sent to a content receiver by way of a network. At some point, the content receiver accepts the message from the network. An exception condition is recorded if the content receiver fails to notify the content provider of the error in the message.
In yet another embodiment, a method for detecting modification to a content receiver within a conditional access system is described. As part of this process, a content provider generates a message. The message is sent to a content receiver by way of a network. At some point, the content receiver accepts the message from the network. Detecting failure of the content receiver to check at least one of authentication of the message and authorization of the message.
REFERENCES:
patent: 4599646 (1986-07-01), Cottam
patent: 4712239 (1987-12-01), Frezza et al.
patent: 5005200 (1991-04-01), Fischer
patent: 5125028 (1992-06-01), Naito
patent: 5388212 (1995-02-01), Grube et al.
patent: 5420923 (1995-05-01), Beyers et al.
patent: 5483658 (1996-01-01), Grube et al.
patent: 5844986 (1998-12-01), Davis
patent: 5912972 (1999-06-01), Barton
patent: 5933498 (1999-08-01), Schneck et al.
patent: 5961644 (1999-10-01), Kurtzberg et al.
patent: 5982890 (1999-11-01), Akatsu
patent: 5982891 (1999-11-01), Ginter et al.
patent: 6119172 (2000-09-01), Belmont et al.
patent: 6256393 (2001-07-01), Safadi et al.
patent: 6314409 (2001-11-01), Schneck et al.
patent: 6389538 (2002-05-01), Gruse et al.
patent: 0 752 786 (1997-01-01), None
patent: 0 909 094 (1999-04-01), None
patent: 0 914 001 (1999-05-01), None
patent: 0 936 813 (1999-08-01), None
patent: 0 946 019 (1999-09-01), None
patent: WO 98/55910 (1998-12-01), None
patent: WO 98/56180 (1998-12-01), None
patent: WO 99/09743 (1999-02-01), None
patent: WO 99/30217 (1999-06-01), None
patent: WO 99/39504 (1999-08-01), None
patent: WO 99/53624 (1999-10-01), None
patent: WO 00/04727 (2000-01-01), None
“Bullet Buster”, [online] [retrieved on May 14, 2003] Retrieved from the Internet Archive (WayBack Machine) using Internet <URL: http://web.archive.org/web/19981203121755/www.hackerscatalog.com/bullet.htm>.*
Olin Sibert et al., “Digibox: A Self-Protecting Container for Information Commerce,” Proceedings of the First USENIX Workshop on Electronic Commerce, New York, Jul. 1995.
InterTrust Technologies Corporation, “A Piece of the Tick. Supporting the Commercial Redistribution of Electronic Information through Value Chains,” Oct. 1998.
“Digital Consumer Electronics Handbook,” McGraw-Hill, 1997, pp. 17.18-17.25.
“SentinelSuperPro,” Rainbow Technologies. Retrieved from the Internet: http://sentinel.rainbow.com, pp. 1-2.
“iKey,” Rainbow Technologies. Retrieved from the Internet: http://ikey.rainbow.com, pp. 1-2.
Monica Pawlan et al., “Signed Applets, Browsers, and File Access.” Retrieved from the Internet: http://developer.java.sun.com/developer/technicalArticles/Security/Signed/index.html, Apr. 1998.
Monica Pawlan, “Cryptography: The Ancient Art of Secret Messages.” Retrieved from the Internet: http://developer.java.sun.com/developer/technicalArticles/Security/Crypto/index.html, Feb. 1998.
Monica Pawlan, “Is the Only Really Secure Computer a Disconnected Computer?” Retrieved from the Internet: http://developer.java.sun.com/developer/technicalArticles/Security/ReallySecure/index.html, Jan. 1998.
Microsoft Corporation, “Microsoft Authenticode Technology. Ensuring Accountability and Authenticity for Software Components on the Internet,” Redmond, VA, Oct. 1996.
“Modern Cable Television Technology: Video, Voice, and Data Communications,” Morgan Kaufmann Publishers, Inc., San Francisco, CA, 1999, pp. 743-751.
Dan S. Wallach et al., “Extensible Security Architectures for Java,” BNS Document ID XP-002101681, 1997, pp. 1-26.
Charles Crichton et al., “When to trust mobile objects: access control in the Jini™ Software System,” BNS Document ID XP-002155686, 1999. pp. 116-125.
Hackenberg, Gerald,Computerviren: Vorbeugung und Bekampfung, 258 IT Informationstechnik, 32 (1990) Februar. No. 1, Siemens AG, Munchen.
English translation of above Cite No. BC.
Schneck, Paul B.,Persistent Access Control to Prevent Piracy of Digital Information,Proceedings of the IEEE, vol. 87, No. 7, Jul. 1999, pp. 1239-1250.
Beliveau Scott
General Instrument Corporation
Miller John
Townsend and Townsend / and Crew LLP
LandOfFree
Intrusion detection for object security does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Intrusion detection for object security, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Intrusion detection for object security will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3307146