Systems and methods for continually updating and retrieving...

Interactive video distribution systems – Video distribution system with local interaction – Receiver

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C725S040000, C725S044000, C725S140000, C348S901000

Reexamination Certificate

active

06357046

ABSTRACT:

BACKGROUND OF THE INVENTION
This invention relates generally to video communication systems and more particularly concerns an interactive video information retrieval system enabling a viewer to access continually updated information resources such as program guides, sports activities, weather, financial reports and the like.
It is generally accepted that before the year 2000 there will be 150 plus cable channels to choose from. Such concepts as movies-on-demand, two-way interactive TV, interactive program guides, and enhanced “people meters” are already being tested or soon will be.
To facilitate the use of this technology, there is a need for an interactive video system that will help subscribers to navigate through their video resources. No such system is presently available.
Furthermore, while there is a need for subscriber flexibility in use of such a system, security to prevent unauthorized use of the system is also essential.
There are presently known smart card implementations which rely upon the use of an external and secure computer system to achieve data security. When the interface computer is not secure, such as when a product can be reverse engineered and the firmware modified and examined, then the security of these present methods is weak at best.
The four basic methods presently known for achieving security in known smart card systems are, therefore, inadequate to the present application. In one method, access applicating keys lock out various portions of a smart card until a valid key is presented to the card. The access keys may be presented in the clear or encrypted. In a clear key presentation, after the key is used once, then it is always known. In an encrypted key presentation, the smart card generates a random number. The decoder uses this random number, the key and the algorithm used in the decoder to generate the encrypted key data. Whether clear or encrypted, if all this information resides in the decoder firmware, then it can easily be reverse engineered.
Another security method employs random numbers. If a smart card generates a random number and sends this out, then it must receive the encrypted version of the random number using an internal key. But the only way an outside computer can generate the correct encrypted version is to have the same key and algorithm. As a result, the key and the algorithm must reside in the insecure decoder firmware.
A third security method uses authentication. Two way authentication provides good security where each side encrypts information with a known key and then the other unit must decrypt and then encrypt with another known key. This allows both sides to know that the other side has valid keys and the correct algorithm. But, for the decoder to do authentication with the smart card, all the information again resides in the insecure firmware.
One final security method exercises control of the smart card. It assumes that all the commands going to the smart card are generated and controlled by a secure computer. But in the case of the decoder of the present invention, all smart card commands can be intercepted or changed to the benefit of someone trying to defeat the system. Even something as simple as erasing a hidden key, which on some cards first requires that the key be unlocked, may open the information up to examination and changes.
It is, therefore, a primary object of this invention to provide an interactive, video display, data system affording flexibility to the subscriber in accessing a wide variety of data content and formats. In conformance with this primary object, it is further among the objects of this invention to provide an interactive, video display, data system that employs downloadable operating software at the customer's site, that enables the customer to operate the system by one of a variety of standard remote controls, that is capable of constant data base updating and that can be made available at little or no cost to the customer.
Another primary object of this invention is to provide an interactive, video display, data system that affords security to the cable company or other distributor against unauthorized access to the data base. In conformance with this primary object, it is further among the objects of this invention to provide an interactive, video display, data system which employs a smart card encryption-decryption system that has a decryption card at the customer's site which contains keys completely locked in the card, that uses a random feed key which precludes determination of a fixed key that will always work, and that is upgradable to extend and expand services available to the customer.
SUMMARY OF THE INVENTION
In accordance with the invention, an interactive video system is provided in which a composite digital information signal is formed by the combination of a winnowed generic information signal with a local information signal. This composite signal is further manipulated to produce an output signal which includes both data code and object code. This output signal is then formatted and transmitted via one or more modulator cards at the system head end to decoders located at the individual user's television set.
The signal transmitted from the modulator card is formed by use of a dynamic gate array having a configuration sequence determined and maintained by a resident configuration EPROM. Consequently, the configuration of the array can be changed in the field by the replacement of the EPROM. Data is fed to the configured array under the control of a control data EPROM also resident in the modulator card. A transmission modulator in the modulator card receives the data from the dynamic gate array for transmission via any selected medium to the user's location. For example, the transmission modulator may be a radio frequency transmitter in which an RF amplifier is driven by a voltage control oscillator which is in turn controlled by an RF synthesizer which is responsive to the formatted data signal.
Each of the decoders includes a microprocessor, a frequency agile receiver, memory and a custom gate array. The formatted signal containing the data code and object code is sensed by the frequency agile receiver which, under the direction of the microprocessor, scans for frequencies at which data identified by the microprocessor will be available. When an appropriate data containing frequency is sensed, the microprocessor causes the selected portions of data code and object code contained in the formatted signal to be passed to the memory for storage. The microprocessor then accesses the object code which was passed to the storing means to control the processing of the data code which was passed to the storing means. The custom gate array receives the data code and object code from the frequency agile receiver, passes it to the memory and ultimately, under the direction of the microprocessor, passes processed portions of the data code to the customer's video display device.
Each decoder also includes a boot ROM containing a small portion of the object code to enable the microprocessor to receive the full object code contained in the formatted signal.
The present interactive, video display, data system broadcasts from a single point to multiple units and is not bidirectional. If it is desirable that the system be secure against unauthorized use, then the encrypted data stream must be decrypted simultaneously by many receivers. Each receiver must be able to use the same key to decode the data stream. Smart cards are used to securely hold the keys and allow secure distribution of the keys.
The data stream is encrypted using a random seed key. While the seed key changes from time to time in a random fashion, all data sent at any particular time uses the same key. The seed key is doubly encrypted, using keys that are contained and completely locked into every smart card. This random seed is transmitted in the clear with the encrypted data stream and with pointers to indicate which keys were used. This random seed is passed into the smart card and doubly

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Systems and methods for continually updating and retrieving... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Systems and methods for continually updating and retrieving..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Systems and methods for continually updating and retrieving... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2857213

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.