$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Method and apparatus for providing conditional access in connection-oriented interactive networks with a multiplicity of service providers 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04N-007/167
출원번호 US-0135615 (1998-08-18)
발명자 / 주소
  • Anthony J. Wasilewski
  • Douglas F. Woodhead
  • Gary Lee Logston
출원인 / 주소
  • Scientific-Atlanta, Inc.
대리인 / 주소
    Kenneth M. Massaroni
인용정보 피인용 횟수 : 87  인용 특허 : 25

초록

A control system provides secure transmission of programs, including at least one of video, audio, and data, between a service provider and a customer's set top unit over a digital network. Program bearing data packets are received in a first network protocol over a first data link and removed from

대표청구항

1. In an interactive information services system for providing at least one of video, audio, and data (program) requested by a customer from a service provider (SP) and for transmitting the requested program in program bearing packets to a set top unit (STU) associated with the customer, apparatus p

이 특허에 인용된 특허 (25)

  1. Durden Gregory S. ; Ross Douglas L. ; Wall William E., Analog/digital system for television services.
  2. Ford Warwick S. (Nepean CAX) Wiener Michael J. (Nepean CAX), Computer network cryptographic key distribution system.
  3. Rivest Ronald L. (Belmont MA) Shamir Adi (Cambridge MA) Adleman Leonard M. (Arlington MA), Cryptographic communications system and method.
  4. Tatebayashi Makoto. (Vienna VA) Newman ; Jr. David B. (Rockville MD), Cryptographic key distribution method and system.
  5. Gammie Keith B. (Markham CAX), External security module for a television signal decoder.
  6. Matyas Stephen M. (Manassas VA) Johnson Donald B. (Manassas VA) Le An V. (Manassas VA) Prymak Rostislaw (Dumfries VA) Wilkins John D. (Somerville VA) Martin William C. (Concord NC) Rohland William S., Hybrid public key algorithm/data encryption algorithm key distribution method based on control vectors.
  7. Gammie Keith (Markham CAX) Yoneda Robert K. (Toronto CAX) Woo Arthur (Scarborough CAX) Sheldrick Wayne (Don Mills CAX), Independent external security module for a digitally upgradeable television signal decoder.
  8. Logston Gary L. (Tucker GA) Wasilewski Anthony J. (Alpharetta GA) Addington Timothy H. (Roswell GA) Wall ; Jr. William E. (Atlanta GA), Interactive information services control system.
  9. Lee Stephen G. (Beckenham Kent GBX) Smith Peter R. (Alresford GBX), Management of cryptographic keys.
  10. Gammie Keith (Markham CAX) Sheldrick Wayne S. (Scarborough CAX) Woo Arthur S. (Scarborough GA CAX) Wasilewski Anthony J. (Alpharetta GA), Method and apparatus for uniquely encrypting a plurality of services at a transmission site.
  11. Davis Derek L. (Phoenix AZ), Method for providing a roving software license from one node to another node.
  12. Wasilewski Anthony J. (Alpharetta GA) Gammie Keith (Markham CAX), Methods and apparatus for uniquely encrypting data at a plurality of data transmission sites for transmission to a recep.
  13. Wasilewski Anthony J. (Alpharetta GA), Methods for providing conditional access information to decoders in a packet-based multiplexed communications system.
  14. Wechselberger Anthony J. (San Diego CA) Bluestein Leo I. (Rancho Bernardo CA) Jedynak Leo (San Diego CA) Drake David A. (Escondido CA) Simpson Larry W. (Poway CA), Multi-layer encryption system for the broadcast of encrypted information.
  15. Davis Derek L. (Phoenix AZ), Roving software license for a hardware agent.
  16. Chang Chung N. (1455 Wessex Ave Los Altos CA 95024) Yuan Chuan K. (Milpitas CA) Hao Feng Q. (Milpitas CA), Secure, swift cryptographic key exchange.
  17. Lee Lin-nan (Potomac MD) Fang Russell J. (Potomac MD), Security system for SSTV encryption.
  18. Gelb Edward J. (Wayne NJ), Security system for preventing unauthorized communications between networks by translating communications received in ip.
  19. Gilhousen Klein S. (San Diego CA) Newby ; Jr. Charles F. (El Cajon CA) Moerder Karl E. (Poway CA), Signal encryption and distribution system for controlling scrambling and selective remote descrambling of television sig.
  20. Chorley Bernard J. (Hampton GB2) Parkin Graeme I. P. (London GB2) Wichmann Brian A. (Woking GB2) Elsom Simon M. (Feltham GB2), Software protection device.
  21. Ganesan Ravi (Arlington VA), System and method for centralized session key distribution, privacy enhanced messaging and information distribution usin.
  22. Lipner Steven B. (Oakton VA) Balenson David M. (Olney MD) Ellison Carl M. (Baltimore MD) Walker Stephen T. (Glenwood MD), System and method for data recovery.
  23. Wasilewski Anthony J. (Alpharetta GA) Lucas Keith (New Market CAX), System and method for transmitting a plurality of digital services.
  24. Easter Randall J. (Poughquag NY) Merz William A. (Wappingers Falls NY), System and methods for data encryption using public key cryptography.
  25. Easter Randall J. (Poughquaq NY) Merz William A. (Wappingers Falls NY), System and methods for data encryption using public key cryptography.

이 특허를 인용한 특허 (87)

  1. Levi,Steven P.; VanAntwerp,Mark D.; Dowell,Craig M.; Knowlton,Chadd B., Active stream format for holding multiple media streams.
  2. Morley, Steven A.; Faus, Juan; Ratzel, John, Apparatus and method for decoding digital image and audio signals.
  3. Morley,Steven A.; Faus,Juan; Ratzel,John, Apparatus and method for encoding and storage of digital image and audio signals.
  4. Livaditis,Elias J.; Kennedy,Kevin, Apparatus and method for single encryption with multiple authorization of distributed content data.
  5. Russ, Samuel H.; Gaul, Michael A.; Wasilewski, Anthony J.; Pinder, Howard G., Apparatus for entitling and transmitting service instances to remote client devices.
  6. Russ,Samuel H.; Gaul,Michael A.; Wasilewski,Anthony J.; Pinder,Howard G., Apparatus for entitling and transmitting service instances to remote client devices.
  7. Einola,Heikki; M채kinen,Teemu; Ekola,Keijo; Virtanen,Kari O; Tammi,Kalle; Halminen,Harri; Tervo,Vesa; Vilppula,Matti; Lindholm,Rune; Timonen,Juha T; Smolander,Jouni, Arranging authentication and ciphering in mobile communication system.
  8. DeFreese, Darryl L.; Seaman, Jeffrey M.; Wasilewski, Anthony J., Authentication of entitlement authorization in conditional access systems.
  9. Duval, Gregory; Kudelski, Henri, Cascading dynamic crypto periods.
  10. Van Rijnsoever, Bartholomeus Johannes; Kamperman, Franciscus Lucas Antonius Johannes; Goudsmits, Mathieu Petrus Franciscus Maria, Conditional access system for controlling the access to a data content.
  11. Wasilewski, Anthony J., Control of enhanced application features via a conditional access system.
  12. Kubota, Tatsuya; Wakatsuki, Norio, Data multiplexing device, program distribution system, program transmission system, pay broadcast system, program transmission method, conditional access system, and data reception device.
  13. Kubota, Tatsuya; Wakatsuki, Norio, Data multiplexing device, program distribution system, program transmission system, pay broadcast system, program transmission method, conditional access system, and data reception device.
  14. Kubota,Tatsuya; Wakatsuki,Norio, Data multiplexing device, program distribution system, program transmission system, pay broadcast system, program transmission method, conditional access system, and data reception device.
  15. Kubota,Tatsuya; Wakatsuki,Norio, Data multiplexing device, program distribution system, program transmission system, pay broadcast system, program transmission method, conditional access system, and data reception device.
  16. Kubota,Tatsuya; Wakatsuki,Norio, Data multiplexing device, program distribution system, program transmission system, pay broadcast system, program transmission method, conditional access system, and data reception device.
  17. Kubota,Tatsuya; Wakatsuki,Norio, Data multiplexing device, program distribution system, program transmission system, pay broadcast system, program transmission method, conditional access system, and data reception device.
  18. Ono,Takatoshi; Harada,Shunji, Data usage controlling apparatus that prevents the unauthorized use of main data by updating a type 1 and a type 2 key used for protecting the main data in accordance with usage of the main data.
  19. Jain, Amit; Storm, Clifford Paul; Cutter, Jr., Benjamin Brooks; Evans, Brian Patrick, Device certificate individualization.
  20. Jain, Amit; Storm, Clifford Paul; Cutter, Jr., Benjamin Brooks; Evans, Brian Patrick, Device certificate individualization.
  21. En-Seung, Kang; Jin-Young, Byun, Digital content cryptograph and process.
  22. Kang,En Seung; Byun,Jin Young, Digital content cryptograph and process.
  23. Kang,En Seung; Byun,Jin Young, Digital content cryptograph and process.
  24. Russ, Samuel H.; Stallings, Christopher L., Digital media device having media content transfer capability.
  25. Li, Jin; Cui, Yi, Digital rights management scheme for an on-demand distributed streaming system.
  26. D'Souza, Roy P.; Ravi, Thirumalai Muppur, Dynamic bulk-to-brick transformation of data.
  27. D'Souza, Roy P.; Ravi, Thirumalai Muppur, Dynamic bulk-to-brick transformation of data.
  28. D'Souza, Roy P.; Ravi, Thirumalai Muppur, Enterprise server version migration through identity preservation.
  29. Marsh, David J., Establishing a unique session key using a hardware functionality scan.
  30. Khandelwal, Vikas; Oliveira, Eduardo P.; Van Dyke, Clifford P.; VanAntwerp, Mark D.; Storm, Clifford P.; Alkove, James M., Extensible media rights.
  31. Perloff, Ronald S., Hash CAM having a reduced width comparison circuitry and its application.
  32. Cahill,Conor P.; Wexelblat,David Eli; Aoki,Norihiro Edwin; Carriere,Jeromy; Roskind,James; Toomey,Christopher Newell, Identity based service system.
  33. Ishibashi, Yoshihito; Oishi, Tateo; Matsuyama, Shinako; Asano, Tomoyuki; Muto, Akihiro; Kitahara, Jun, Information sending system, information sending device, information receiving device, information distribution system, information receiving system, information sending method, information receiving method, information distribution method, apparatus, sending method of information receiving device, playback method of apparatus, method of using contents and program storing medium.
  34. Ishibashi, Yoshihito; Oishi, Tateo; Matsuyama, Shinako; Asano, Tomoyuki; Muto, Akihiro; Kitahara, Jun, Information sending system, information sending device, information receiving device, information distribution system, information receiving system, information sending method, information receiving method, information distribution method, apparatus, sending method of information receiving device, playback method of apparatus, method of using contents and program storing medium.
  35. Ishibashi,Yoshihito; Oishi,Tateo; Matsuyama,Shinako; Asano,Tomoyuki; Muto,Akihiro; Kitahara,Jun, Information transmission system, transmitter, and transmission method as well as information reception system, receiver and reception method.
  36. Guenebaud,Philippe, Interface module and decoder for host.
  37. Bourne, Steve; Dillaway, Blair Brewster; Jacomet, Pierre; Malaviarachchi, Rushmi U.; Parambir, Kumar B.; Rozenfeld, Yevgeniy Eugene; Venkatesh, Chandramouli; Rose, Charles F., Issuing a publisher use license off-line in a digital rights management (DRM) system.
  38. Bourne, Steve; Dillaway, Blair Brewster; Jacomet, Pierre; Malviarachchi, Rushmi U; Parambir, Kumar B; Rozenfeld, Yevgeniy Eugene; Venkatesh, Chandramouli; Rose, III, Charles F, Issuing a publisher use license off-line in a digital rights management (DRM) system.
  39. Vince, Lawrence D.; Bontempi, Raymond C.; Jost, Arthur P., Method and apparatus for linking a plurality of user devices to a service location.
  40. Furuya,Soichi; Takaragi,Kazuo; Kurumatani,Hiroyuki; Takahashi,Masashi; Miyazaki,Kunihiko; Sato,Hisayoshi; Watanabe,Dai, Method and apparatus for symmetric-key decryption.
  41. Furuya,Soichi; Takaragi,Kazuo; Kurumatani,Hiroyuki; Takahashi,Masashi; Miyazaki,Kunihiko; Sato,Hisayoshi; Watanabe,Dai, Method and apparatus for symmetric-key decryption.
  42. Allibhoy, Nizar; Elliott, L. Dane; Fernandez Silva, Joaquin; Johnson, Stephen M., Method and system for controlling and auditing content/service systems.
  43. Allibhoy, Nizar; Elliott, L. Dane; Fernandez-Silva, Joaquin; Johnson, Stephen M., Method and system for controlling and auditing content/service systems.
  44. Allibhoy, Nizar; Elliott, L. Dane; Fernandez-Silva, Joaquin; Johnson, Stephen M., Method and system for controlling and auditing content/service systems.
  45. Kindle, Brian; Flamino, Gilbert; Ganesan, Prasanna, Method and system for distributing restricted media to consumers.
  46. Hodzic, Edin; Goodman, Andrew M.; Ganesan, Prasanna, Method and system for protecting against the execution of unauthorized software.
  47. Brodigan, Donald L.; Thompson, Tom T., Method and system for providing interactive programming.
  48. Lash, Todd; Salo, Daniel; Weber, Jay, Method and system for video enhancement transport alteration.
  49. Couillard,Bruno, Method and system providing improved security for the transfer of root keys.
  50. Low, Colin; Seaborne, Andrew Franklin; Bouthors, Nicolas, Method for accessing service resource items that are for use in a telecommunications system.
  51. Wasilewski, Anthony J.; Pinder, Howard G., Method for partially encrypting program data.
  52. Wasilewski, Anthony J.; Pinder, Howard G., Method for partially encrypting program data.
  53. Wasilewski, Anthony J.; Pinder, Howard G., Method for partially encrypting program data.
  54. Donley, Christopher J.; Gilman, Robert R.; Haserodt, Kurt H.; Walton, John M., Method to authenticate packet payloads.
  55. Pinder, Howard G.; Woodward, Jr., William D.; Evans, Jonathan Bradford; Wasilewski, Anthony J., Methods and apparatus for providing a partial dual-encrypted stream in a conditional access overlay system.
  56. Jost, Arthur P.; Elstermann, Erik; Kuczynski-Brown, Jeffrey D.; DiColli, Richard; Viola, Jeffrey Paul, Methods and apparatus for reconfiguring protocol data when reducing multiplexed data streams.
  57. Barry, Richard John; Paskins, Adrian Charles, Networked conditional access module.
  58. Barry,Richard John; Paskins,Adrian Charles, Networked conditional access module.
  59. Monzawa, Takashi; Miura, Kenji; Matsuo, Tamotsu; Shiono, Hideki; Toyoda, Yoshimi; Koyanagi, Toshinori; Abiru, Setsuo; Asato, Jun; Fujiyoshi, Shinichi; Uchida, Kazuhiro; Ryu, Kazuya; Hirashima, Katsuh, Optical network unit and optical line terminal.
  60. Monzawa,Takashi; Miura,Kenji; Matsuo,Tamotsu; Shiono,Hideki; Toyoda,Yoshimi; Koyanagi,Toshinori; Abiru,Setsuo; Asato,Jun; Fujiyoshi,Shinichi; Uchida,Kazuhiro; Ryu,Kazuya; Hirashima,Katsuhiko; Shimaru,Tateo; Wakayoshi,Mitsuharu; Sakai,Toshiyuki, Optical network unit and optical line terminal.
  61. Alkove, James M.; Strom, Clifford P.; Cutter, Jr., Benjamin B.; Evans, Brian P., Output protection levels.
  62. Pinder, Howard G.; Evans, Jonathan Bradford; Wasilewski, Anthony J.; Woodward, Jr., William D., Partial dual-encryption using program map tables.
  63. Basquin, Bruno, Pre-control of a program in an additional chip card of a terminal.
  64. Basquin, Bruno, Pre-control of a program in an additional chip card of a terminal.
  65. Murray, Mark R., Preventing unauthorized poaching of set top box assets.
  66. Barde, Sumedh N.; Schwartz, Jonathan D.; Kuhn, Reid Joseph; Grigorovitch, Alexandre Vicktorovich; Debique, Kirt A.; Knowlton, Chadd B.; Alkove, James M.; Dunbar, Geoffrey T.; Grier, Michael J.; Ma, Ming; Upadhyay, Chaitanya D.; Sherwani, Adil Ahmed; Kishan, Arun Upadhyaya, Protected computing environment.
  67. Grigorovitch, Alexandre; Knowlton, Chadd; Debique, Kirt; Alkove, James; Dunbar, Geoffrey T.; Barde, Sumedh N., Protected media pipeline.
  68. Yi, Seung June, Radio communication system and method having a radio link control layer.
  69. Yi, Seung June, Radio communication system and method having a radio link control layer.
  70. Yi, Seung June, Radio communication system and method having a radio link control layer.
  71. Olivier, Steve; Pelkey, Gary L.; Placek, David M.; Kennedy, Kevin, Rapid decryption of data by key synchronization and indexing.
  72. Molaro, Donald Joseph, Real-time delivery of license for previously stored encrypted content.
  73. Jain, Amit; Evans, Brian P.; Strom, Clifford P.; Cutter, Jr., Benjamin B., Secure clock with grace periods.
  74. Pinder, Howard G., Secure content key distribution using multiple distinct methods.
  75. Boynton, Lee R.; Fiatal, Trevor A.; Burke, Scott M.; Sikes, Mark, Secure end-to-end transport through intermediary nodes.
  76. Schlarb, John M.; Bacon, Kinney C., Secure escrow and recovery of media device content keys.
  77. Sedacca, David A., Secure negotiation and encryption module.
  78. Pinder, Howard G.; Maholski, Andrew D., Securing media content using interchangeable encryption key.
  79. Frank, Alexander; Steeb, Curt A.; Ahdout, Isaac P.; Duffus, James S.; Hall, Martin; Temple, Nicholas; Venkatachalam, Rajagopal; Phillips, Thomas; Xu, Zhangwei, Special PC mode entered upon detection of undesired state.
  80. Poder, James, Stateful home phone service.
  81. D'Souza, Roy P.; Ravi, Thirumalai Muppur, Synthetic full copies of data and dynamic bulk-to-brick transformation.
  82. Raciborski, Bohdan, System and method for delivery of a modular operating system.
  83. Prus, Bohdan S.; Russ, Samuel H., Systems and methods for prioritizing the storage location of media data.
  84. Thirumalai, Gokul P.; Ahdout, Isaac, Tuning product policy using observed evidence of customer behavior.
  85. Thirumalai, Gokul P.; Ahdout, Isaac P., Tuning product policy using observed evidence of customer behavior.
  86. Butts, Mark; Rukavina, Doug, Vacuum cleaner accessory tool having a removable brush.
  87. Pinder, Howard G.; Wasilewski, Anthony J.; Mattox, Mark D., Validating client-receivers.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로