Multi-tier digital TV programming for content distribution
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
H04N-005/50
H04L-009/00
출원번호
US-0457563
(1999-12-10)
발명자
/ 주소
Marconcini, Franco
Munson, Jonathan P.
Pacifici, Giovanni
Tantawy, Ahmed
Youssef, Alaa S.
출원인 / 주소
International Business Machines Corporation
대리인 / 주소
Gibbons Jon A.
인용정보
피인용 횟수 :
175인용 특허 :
60
초록▼
A method of securely providing data to a user's system over a broadcast infrastructure. The method comprising the steps of: encrypting the data using a first encrypting key; encrypting a first decrypting key using a second encrypting key; dividing at least part of the encrypted data into a series of
A method of securely providing data to a user's system over a broadcast infrastructure. The method comprising the steps of: encrypting the data using a first encrypting key; encrypting a first decrypting key using a second encrypting key; dividing at least part of the encrypted data into a series of logical packages; placing at least some of the logical packages into a broadcast carousel for cyclical broadcast over the broadcast infrastructure; broadcasting the packages in broadcast carousel so that they can be received by at least one user's system, wherein the broadcast is cyclical and repeats periodically; and transferring the encrypted first decrypting key, which has been encrypted with the second encrypting key, to the user's system.In another embodiment, a system is disclosed to carry out the above method in a broadcast infrastructure and an image overlaid on top of a primary image being displayed isused to denote that additional logical packages are available for receipt by broadcast.
대표청구항▼
1. A method of securely providing data to a users system over a broadcast infrastructure, the method comprising the steps of:encrypting the data using a first encrypting key so that the data can be subsequently decrypted using a first decrypting key;encrypting the first decrypting key using a second
1. A method of securely providing data to a users system over a broadcast infrastructure, the method comprising the steps of:encrypting the data using a first encrypting key so that the data can be subsequently decrypted using a first decrypting key;encrypting the first decrypting key using a second encrypting key;dividing the encrypted data into a series of logical packages, wherein the logical packages are divided independent of any transport layer protocol used to broadcast the packages;placing at least some of the logical packages into a broadcast carousel for cyclical broadcast over the broadcast infrastructure;broadcasting the packages in broadcast carousel so that they can be received by at least one user's system, wherein the broadcast is cyclical and repeats periodically so that all of the logical packages representing the entire encrypted data are available locally for download at the user's system, without requiring a request be made to a broadcast center; andtransferring the encrypted first decrypting key, which has been encrypted with the second encrypting key, to the user's system. 2. The method as defined in claim 1, wherein the step of transferring the encrypted first decrypting key includes the sub-steps of:re-encrypting the first decrypting key using a third encrypting key;broadcasting the decrypted and re-encrypted first decrypting key to the user's system; anddecrypting the re-encrypted first decrypting key using a third decrypting key. 3. The method as defined in claim 1, wherein the step of transferring the encrypted first decrypting key includes the sub-steps of:transferring the encrypted first decrypting key to a broadcast center;re-encrypting the first decrypting key using a third encrypting key;broadcasting the decrypted and re-encrypted first decrypting key to the users system; anddecrypting the re-encrypted first decrypting key using a third decrypting key. 4. The method as defined in claim 1, wherein the step of transferring the encrypted first decrypting key includes the sub-steps of:transferring the encrypted first decrypting key to a clearinghouse;re-encrypting the first decrypting key using a third encrypting key;transferring the decrypted and re-encrypted first decrypting key to the user's system via an Internet download; anddecrypting the re-encrypted first decrypting key using a third decrypting key. 5. The method as defined in claim 1, wherein the data contains a catalog of offerings available for broadcast. 6. The method as defined in claim 1, wherein the data contains a schedule of broadcast times for additional data. 7. A method of securely receiving data on a users system from a broadcast infrastructure, the method comprising the steps of:receiving a primary broadcast stream;receiving encrypted data that has been previously encrypted using a first encrypting key and wherein the data has been previously divided into a series of logical packages, wherein the logical packages are divided independent of any transport layer protocol used to broadcast the packages;receiving data and related promotional data describing the encrypted data being received so that all of the logical packages representing the entire encrypted data are available locally for download, without requiring a request be made to a broadcast center;assembling at least part of the promotional data into one or more promotional images for overlaying on top of the primary broadcast stream being displayed;displaying the promotional images overlaid on top of the primary image being displayed;receiving a user selection of one of the promotional images being displayed; andassembling at least part of the packages being received in response to the user selection into the encrypted data. 8. The method as defined in claim 7, wherein the step of displaying the promotional images includes displaying the promotional images on a television overlaid on top of a television broadcast image. 9. The method as defined in claim 7, wherein the st ep of receiving a primary broadcast stream includes receiving promotional material for data packages to be selected. 10. The method as defined in claim 7, wherein the step of displaying the promotional images includes displaying the promotional images as an icon indicating that a selection can be made at this time, wherein the icon overlaid on top of a primary image being displayed. 11. The method as defined in claim 7, wherein the step of displaying the promotional images includes displaying the promotional images as an icon overlaid on top of a primary image being displayed, wherein the icon appearance on the display is synchronized with the primary broadcast stream. 12. The method as defined in claim 7, wherein the primary broadcast stream represents the promotional material for data packages that can be selected. 13. The method as defined claim 7, wherein an icon appears overlaid on the primary video image to indicate to the user that a selection can be made at this time. 14. The method as defined in claim 7, wherein the appearance and disappearance of an icon overlaid on the primary video image is synchronized with a segment of the primary broadcast stream. 15. The method as defined in claim 7, further comprising the steps of:receiving a decrypting key for decrypting the encrypted data assembled on the user's system. 16. The method as defined in claim 15, wherein the step of receiving a decrypting key, includes receiving a decrypting key that has been encrypted with a second encrypting key. 17. The method as defined in claim 15, wherein the step of receiving a decrypting key includes receiving a decrypting key over a broadcast stream. 18. The method defined in claim 15, wherein a second decrypting key for decrypting data that has been encrypted with the second encryption key is sent to the user's system from a clearinghouse. 19. The method defined in claim 16, wherein the second decrypting key has a timeout provision for decrypting data that has been encrypted with the second encryption key is sent to the user's system from a clearinghouse. 20. A system for securely providing data to a user's system over a broadcast infrastructure, the system comprising:a content system;a first public key;a first private key, which corresponds to the first public key;a data encrypting key;a data decrypting key for decrypting data encrypted using the data encrypting key;first data encryption means for encrypting data so as to be decrypt able only by a data decrypting key:second data encryption means, using the first public key, for encrypting the data decrypting key;a clearinghouse;a broadcast center, for broadcasting a primary broadcast stream and a secondary broadcast stream for reception by the users system, wherein the second broadcast stream includes data encrypted with the data encrypting key, and wherein the data has been broken into a series of packages that are broadcast in a cyclical pattern which repeats over time, wherein the packages are divided independent of any transport layer protocol used to subsequently broadcast the packages so that all of the logical packages representing the entire encrypted data are available locally for download at the user's system, without requiring a request be made to a broadcast center;first transferring means for transferring the data decrypting key which has been encrypted to the clearinghouse, wherein the clearinghouse possesses the first private key;first decrypting means for decrypting the data decrypting key using the first private key;a second public key;a second private key, which corresponds to the second public key;re-encryption means for re-encrypting the data decrypting key using the second public key;second transferring means for transferring the re-encrypted data decrypting key to the user's system via an Internet download, wherein the user's system possesses the second private key; andsecond decrypting means for decrypting the re-encrypted data decrypting key using the second pri vate key. 21. The system as defined in claim 20 wherein the second transferring means for transferring the re-encrypted data decrypting key comprises a means for broadcasting the reencrypted data decrypting key through the broadcast center as part of the secondary broadcast stream. 22. The system as defined in claim 20, wherein the data contains a catalog of offerings available for broadcast. 23. The system as defined in claim 21, wherein the data contains a schedule of broadcast times for additional data. 24. The system for securely receiving data on a user's system from a broadcast infrastructure, comprising:a first receiver for receiving a primary broadcast stream for display on a user's system;a second receiver for receiving encrypted data that has been previously encrypted using a first encrypting key and wherein the data has been previously divided into a series of logical packages, wherein the logical packages are divided independent of any transport layer protocol used to subsequently broadcast the packages so that all of the logical packages representing the entire encrypted data are available locally for download at the user's system, without requiring a request be made to a broadcast center, wherein the second receiver receives encrypted data and related promotional data describing the encrypted data being received;a first assembler for assembling at least part of the promotional data into a promotional image for overlaying on top of the primary broadcast stream being displayed;means for displaying the promotional image overlaid on top of the primary image being displayed;means for receiving a user selection of one of the promotional images being displayed; anda second assembler for assembling at least part of the packages being received in response to the user selection into the encrypted data. 25. The system as defined in claim 24, wherein the means for displaying the promotional image includes a means for displaying the promotional image on a television overlaid on top of a television broadcast image. 26. The system as defined in claim 24, wherein the second receiver further comprises receiving a decrypting key for decrypting the encrypted data assembled on the user's system. 27. The system as defined in claim 24, wherein the second receiver further comprises receiving a decrypting key for decrypting the encrypted data assembled on the user's system. 28. The system as defined claim 24, wherein the promotional image is an icon that appears overlaid on the primary video image to indicate to the user that a selection can be made at this time. 29. The system as defined claim 24, wherein the promotional image is an icon so that the appearance and disappearance of the icon overlaid on the primary video image is synchronized with a segment of the primary broadcast stream.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (60)
Schulhof Nathan (Los Gatos CA) Janky James M. (Los Altos CA), Apparatus for distributing subscription and on-demand audio programming.
Chelliah Raman ; Cornez Jason S. ; Dellar Carl ; Harrison Stephen ; Hempe John A. ; Hsu Chih-Cheng ; Golin Eric J. ; Price Charles A. ; Rutta Neal S. ; Wood Thomas A. ; Yamamoto Wayne K., Computer system and method for electronic commerce.
Fischer Addison M. (60 14th Ave. South Naples FL 33942), Computer system security method and apparatus having program authorization information data structures.
Auerbach Joshua Seth (Ridgefield CT) Chow Chee-Seng (Cupertino CA) Kaplan Marc Adam (Katonah NY) Crigler Jeffrey Charles (McLean VA), Creation and distribution of cryptographic envelope.
Starkey James A. (Manchester MA), Database server system with methods for alerting clients of occurrence of database server events of interest to the clie.
McLaughlin Robert (Arlington VA) Bullen M. James (Oakville CAX), Information service control point, which uses different types of storage devices, which retrieves information as blocks.
Garber Sharon R. (Crystal MN) Kozak Darryn J. (New Brighton MN) Kruse John M. (Minneapolis MN) Clare Mark K. (Fort Wayne IN), Intelligent optical navigator dynamic information presentation and navigation system.
Kaufman Charles W. (Northboro MA) Gasser Morrie (Hopkinton MA) Lampson Butler W. (Cambridge MA) Tardo Joseph J. (Concord MA) Alagappan Kannan (Cambridge MA), Method and apparatus for protecting the confidentiality of passwords in a distributed data processing system.
Wasilewski Anthony John ; Woodhead Douglas F. ; Logston Gary Lee, Method and apparatus for providing conditional access in connection-oriented, interactive networks with a multiplicity.
Halter Bernard J. (Longmont CO) Bracco Alphonse M. (Reston VA) Johnson Donald B. (Manassas VA) Le An V. (Manassas VA) Matyas Stephen M. (Manassas VA) Prymak ; deceased Rostislaw (late of Dumfries VA , Method and system for multimedia access control enablement.
Leighton Frank T. (965 Dedham St. Newton Center MA 02159) Micali Silvio (224 Upland Rd. Cambridge MA 02140), Method and system for personal identification.
Gasser Morrie (Saugus MA) Goldstein Andrew C. (Hudson MA) Kaufman Charles W. (Northborough MA) Lampson Butler W. (Cambridge MA), Method for delegating authorization from one entity to another through the use of session encryption keys.
Leighton Frank T. (459 Chestnut Hill Ave. Newtonville MA) Micali Silvio (459 Chestnut Hill Ave. Brookline MA 02146), Method for enabling users of a cryptosystem to generate and use a private pair key for enciphering communications betwee.
Mniszewski Susan M. (Los Alamos NM) Springer Edward A. (Los Alamos NM) Brenner David P. (North Collins NY), Method for encryption and transmission of digital keying data.
Schnorr Claus P. (Frankfurterstr. 81 6350 Bad Nauheim DEX), Method for identifying subscribers and for generating and verifying electronic signatures in a data exchange system.
Gasser Morrie (Saugus MA) Goldstein Andrew C. (Hudson MA) Kaufman Charles W. (Northborough MA), Method for performing group exclusion in hierarchical group structures.
Perlman Radia J. (Acton MA) Kaufman Charles W. (Northborough MA), Method of issuance and revocation of certificates of authenticity used in public key networks and other systems.
Bird Raymond F. (Durham NC) Herzberg Amir (Bronx NY) Janson Philippe A. (Zurich NJ CHX) Kutten Shay (Rockaway NJ) Molva Refik A. (Juan les Pins NY FRX) Yung Marcel M. (New York NY), Multi-party secure session/conference.
Citta Richard W. (Oak Park IL) Gosc Paul M. (Buffalo Grove IL) Mutzabaugh Dennis M. (Mt. Prospect IL) Sgrigonoli Gary J. (Mt. Prospect IL), Secure data packet transmission system and method.
Cordery Robert A. ; Lee David K. ; Pintsov Leon A. ; Ryan ; Jr. Frederick W. ; Weiant ; Jr. Monroe A., Secure user certification for electronic commerce employing value metering system.
Howell William E. (North Richland Hills TX) Reddy Hari N. (Grapevine TX) Wang Diana S. (Trophy Club TX), System for controlling group access to objects using group access control folder and group identification as individual.
Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Sridhar, Avinash; Campana, David Anthony; Boyce, Jill MacDonald; Anthru, Shemimom M., Apparatus and method for file size estimation over broadcast networks.
Sridhar, Avinash; Campana, David Anthony; Anthru, Shemimon Manalikudy; Boyce, Jill MacDonald, Apparatus and method for simulcast over a variable bandwidth channel.
Matsumoto,Shuichi; Naito,Kazuhiro; Sugiyama,Hirokazu; Yoshida,Azumi; Oda,Toshihiko, Content billing method, and content billing system and content billing apparatus using the content billing method.
Padhye, Tushar N.; Roopa, M. S.; Joshi, C. V.; B. H., Basavaraj; Ray, Arun; Kanungo, Deepanjan; Nahidipour, Aram; Wang, Xin; Ta, Thanh; Raley, Michael; Lao, Guillermo; Chen, Eddie; Tadayon, Bijan; Kansal, Anant, Digital rights management of content when content is a future live event.
Padhye, Tushar N.; Roopa, M. S.; Joshi, C. V.; Basavaraj, B. H.; Ray, Arun; Kanungo, Deepanjan; Nahidipour, Aram; Wang, Xin; Ta, Thanh; Raley, Michael; Lao, Guillermo; Chen, Eddie; Tadayon, Bijan; Kansal, Anant, Digital rights management of content when content is a future live event.
Perez, Milton Diaz, Dynamic adjustment of electronic program guide displays based on view preferences for minimizing navigation in VOD program selection.
Diaz Perez, Milton, Dynamic adjustment of electronic program guide displays based on viewer preferences for minimizing navigation in VOD program selection.
Diaz Perez, Milton, Dynamic adjustment of electronic program guide displays based on viewer preferences for minimizing navigation in VOD program selection.
Perez, Milton Diaz, Dynamic adjustment of electronic program guide displays based on viewer preferences for minimizing navigation in VOD program selection.
Perez, Milton Diaz, Dynamic adjustment of electronic program guide displays based on viewer preferences for minimizing navigation in VOD program selection.
Perez, Milton Diaz, Dynamic adjustment of electronic program guide displays based on viewer preferences for minimizing navigation in VOD program selection.
Perez, Milton Diaz, Dynamic adjustment of electronic program guide displays based on viewer preferences for minimizing navigation in VOD program selection.
Perez, Milton Diaz, Dynamic adjustment of electronic program guide displays based on viewer preferences for minimizing navigation in VOD program selection.
Perez, Milton Diaz, Dynamic adjustment of electronic program guide displays based on viewer preferences for minimizing navigation in VOD program selection.
Perez, Milton Diaz, Dynamic adjustment of electronic program guide displays based on viewer preferences for minimizing navigation in VOD program selection.
Perez, Milton Diaz, Dynamic adjustment of electronic program guide displays based on viewer preferences for minimizing navigation in VOD program selection.
Perez, Milton Diaz, Dynamic adjustment of electronic program guide displays based on viewer preferences for minimizing navigation in VOD program selection.
Perez, Milton Diaz, Dynamic adjustment of electronic program guide displays based on viewer preferences for minimizing navigation in VOD program selection.
Perez, Milton Diaz, Dynamic adjustment of electronic program guide displays based on viewer preferences for minimizing navigation in VOD program selection.
Toshikage, Hideki; Yoneyama, Shigeyuki, Image commercial transactions system and method, image transfer system and method, image distribution system and method, display device and method.
Han, Sung-hyu; Kim, Bong-seon; Kim, Myung-sun; Yoon, Young-sun; Lee, Sun-nam; Lee, Jae-heung, Key management method using hierarchical node topology, and method of registering and deregistering user using the same.
Northcutt, J. Duane; Hwang, Seung Ho; Lyle, James D.; Hanko, James G., Method and apparatus for content protection in a personal digital network environment.
Raley, Michael C.; Valenzuela, Edgardo; Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Lao, Guillermo; Ta, Thanh, Method and apparatus for establishing usage rights for digital content to be created in the future.
Platt, Mark Jonathan; Pratt, Christopher Kent; Burns, Keith Roger; Omberg, Erik James, Method and system for restoring information from backup storage media.
Patry, Nadine; Carbonnel, Louis-Xavier; Gautier, Eric; Lesenne, Laurent; Roudier, François, Method for downloading data preceded by information signals.
R��nkk��,Risto; Sormunen,Toni; Kiiveri,Antti; Jauhiainen,Antti, Method for processing information in an electronic device, a system, an electronic device and a processing block.
Patry, Nadine; Carbonnel, Louis-Xavier; Gautier, Eric; Lesenne, Laurent; Roudier, François, Process for downloading data preceded by announcement signals.
Pendlebury, Kenneth C.; Pratt, Christopher K.; Jones, Terence C.; Omberg, Erik J.; Marsh, John A.; Reese, Christopher D., System and method for creating a de-duplicated data set.
Crafford, Chris; Gomes, Robert; Brooks, Alan Royce; Overton, Jeffrey Mark, System and method for management of retention periods for content in a computing system.
Matheny, Jason R.; Allen, Jason Colby; Oswald, McKinley; Oswald, Jeremy James; O'Marra, Daniel Ryan; Gibby, Curtis John; Skinner, David A.; Squire, Brycen; Cooper, Alex Dayton, Systems and methods for enhanced networking, conversion tracking, and conversion attribution.
Winters, Michelle Eng; Griggs, Alfred William; DiGioacchino, Laura; Salmon, Diane C.; Siegel, Kevin Paul; Subramanian, Kaushik; VonDerheide, James Alan; Fordyce, III, Edward W.; Amaro, Leigh, Systems and methods to aggregate demand.
Fordyce, III, Edward W.; Winters, Michelle Eng; Siegel, Kevin Paul; Amaro, Leigh; Byce, Charles Raymond; Savas, Nurtekin, Systems and methods to deliver targeted advertisements to audience.
Fordyce, III, Edward W.; Winters, Michelle Eng; Siegel, Kevin Paul; Amaro, Leigh; Byce, Charles Raymond; Savas, Nurtekin, Systems and methods to deliver targeted advertisements to audience.
Singh, Shantnu; Dreyer, Michael; Ciurea, Peter; VonDerheide, James Alan; Fordyce, III, Edward W., Systems and methods to facilitate loyalty reward transactions.
Fordyce, III, Edward W.; Amaro, Leigh; Winters, Michelle Eng; Savas, Nurtekin; Byce, Charles Raymond; Hagey, Ryan, Systems and methods to match identifiers.
Fordyce, III, Edward W.; Amaro, Leigh; Winters, Michelle Eng; Savas, Nurtekin; Byce, Charles Raymond; Hagey, Ryan, Systems and methods to match identifiers.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.