$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Method and system for end to end securing of content for video on demand

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-009/00
  • H04K-001/00
  • H94L-009/00
  • H04N-007/167
출원번호 US-0354920 (2003-01-29)
등록번호 US-7328345 (2008-02-05)
발명자 / 주소
  • Morten,Glenn A.
  • Rassool,Reza P.
  • Claeys,Tom E.
  • Baker,Brian Andrew
출원인 / 주소
  • Widevine Technologies, Inc.
대리인 / 주소
    Darby & Darby PC
인용정보 피인용 횟수 : 43  인용 특허 : 102

초록

A system and method for providing end-to-end security of content over a heterogeneous distribution chain is provided. A content owner provides content to an aggregator that receives the content and processes the content. The processing may involve decrypting the content and associating at least one

대표청구항

What is claimed is: 1. A system for providing security of content within a heterogeneous distribution chain, comprising: a content owner having content; an aggregator arranged to perform the following actions: receiving the content, the content being encrypted with a content key, and appended to a

이 특허에 인용된 특허 (102)

  1. Horstmann Cay, Advertising-subsidized and advertising-enabled software.
  2. Pinder Howard George (Atlanta GA) Palgon Michael Steven (Atlanta GA), Apparatus and method for cipher stealing when encrypting MPEG transport packets.
  3. Nachman Jacob B. (Ramat Modiim ILX) Tsuria Yossef (Jerusalem ILX), Apparatus and method for securing communication systems.
  4. Weidong Mao ; David Chen, Apparatus and method for web-casting over digital broadcast TV network.
  5. Shimosato,Hideto; Ushiyama,Yuichi; Mogami,Kazuto, Apparatus, system and method for authenticating personal identity, computer readable medium having personal identity authenticating program recorded thereon method of registering personal identity au.
  6. Gopinath Bhaskarpillai (Watchung NJ) Kurshan David (Sea Bright NJ), Composition of systems of objects by interlocking coordination, projection, and distribution.
  7. Ishibashi, Yoshihito; Oishi, Tateo; Asano, Tomoyuki; Osawa, Yoshitomo, Content processing system.
  8. Perlman, Radia J.; Hanna, Stephen R.; Elley, Yassir K., Content screening with end-to-end encryption prior to reaching a destination.
  9. Taku Kato JP; Takehisa Kato JP; Kenjiro Endoh JP; Hisashi Yamada JP; Naoki Endoh JP, Copy protection apparatus and information recording medium used in this copy protection apparatus.
  10. Saito, Makoto, Data management system.
  11. Kawada,Hirotsugu; Katta,Noboru; Ibaraki,Susumu; Tatebayashi,Makoto; Harada,Shunji, Data player, digital contents player, playback system, data embedding apparatus, and embedded data detection apparatus.
  12. Nonomura,Tomoyuki; Inoue,Mitsuhiro; Minami,Masataka; Kozuka,Masayuki, Data recording and reproduction apparatus.
  13. Gledhill Jeff,GBX ; Anikhindi Santosh,GBX, Decoding carriers encoded using orthogonal frequency division multiplexing.
  14. Tycksen ; Jr. Frank A. ; Jennings Charles W., Digital Certificate.
  15. Miyazaki, Kazuya; Nakajima, Harumitsu; Nakakawaji, Tetsuo, Digital contents distribution system capable of flexibly changing using conditions.
  16. Zeng, Wenjun; Lei, Shaw-Min, Digital image scrambling for image coding systems.
  17. Sesma Jimmy L., Digital product execution control.
  18. Neville Eugene A. ; Sesma Jimmy L., Digital product execution control and security.
  19. Tsuria Yossef,ILX, Digital recording protection system.
  20. Yeung,Minerva M.; Thakkar,Shreekant S., Digital watermarks with values derived from remote platforms.
  21. Sudia Frank W. ; Asay Alan ; Brickell Ernest F. ; Ankney Richard ; Freund Peter C. ; Yung Marcel M. ; Kravitz David W., Electronic cryptographic packing.
  22. Iwamura, Keiichi, Electronic watermarking method, digital information distribution system using such method, and storage medium storing program of such method.
  23. Kudelski, Stefan; Schlup, Jean-Claude; Rosselet, Ernest, Error prevention in a recording and reproducing device with at least one rotating head.
  24. Demmers Petrus Adrianus Cornelis Maria,NLX, Filter device.
  25. Bednarek Robert A. ; Rubin Philip A., GPS TV set top box with regional restrictions.
  26. Rix, Simon Paul Ashley, Integrated circuit and smart card comprising such a circuit.
  27. Handelman Doron,ILX ; Colb Sanford T.,ILX, Integrated telephone and cable communication networks.
  28. Sered, Yishai; Dallard, Nigel Stephen, Key delivery in a secure broadcasting system.
  29. Li Weijun, Merging of separate executable computer programs to form a single executable computer program.
  30. von Willich Manfred,ZAX ; Rix Simon Paul Ashley,ZAX, Method and apparatus for controlling the operation of a signal decoder in a broadcasting system.
  31. Chang, Yuan-Chi; Li, Chung-Sheng; Han, Richard Yeh-whei; Smith, John R., Method and apparatus for networked information dissemination through secure transcoding.
  32. Wasilewski Anthony John ; Woodhead Douglas F. ; Logston Gary Lee, Method and apparatus for providing conditional access in connection-oriented, interactive networks with a multiplicity.
  33. LaRocca Tobie ; Johnson Michael D., Method and apparatus for providing subscription-on-demand services, dependent services and contingent services for an interactive information distribution system.
  34. Arn Robert M. (Toronto CAX) Csanky Peter H. (Toronto CAX) Waszek Glen F. (Toronto CAX), Method and apparatus for scrambling and unscrambling data streams using encryption and decryption.
  35. Davies Donald Watts,GBX, Method and apparatus for transmitting and receiving encrypted signals.
  36. Cooper,Robin Ross; Kulakowski,Robert T., Method and system for protecting ownership rights of digital content files.
  37. White,Mark Andrew George; Wajs,Andrew Augustine, Method and system to uniquely associate multicast content with each of multiple recipients.
  38. Vegt Arjen Van Der,NLX, Method for automatically searching a frequency range for signal channels in a receiver for digitally modulated signals, and receiver for applying such a method.
  39. Slivka Benjamin W. ; Webber Jeffrey S., Method for identifying and obtaining computer software from a network computer.
  40. Slivka Benjamin W. ; Webber Jeffrey S., Method for identifying and obtaining computer software from a network computer using a tag.
  41. Ahmet Mursit Eskicioglu, Method for protecting the audio/visual data across the NRSS interface.
  42. Kudelski Andre (Crissier CHX), Method for scrambling and unscrambling a video signal.
  43. Graunke Gary L. ; Carbajal John ; Maliszewski Richard L. ; Rozas Carlos V., Method for securely distributing a conditional use private key to a trusted entity on a remote system.
  44. Kudelski Andr (Crissier CHX) Laffely Laurent (Le Mont-sur-Lausanne CHX) Sasselli Marco (Chardonne CHX), Method of interactive communication between a subscriber and a decoder of a system of pay-television and decoder thereof.
  45. Moline William A. ; Putnam Frederick A., Methods and apparatus for encrypting and decrypting MIDI files.
  46. Handelman Doron (Givataim ILX), Methods and systems for non-program applications for subscriber television.
  47. Handelman Doron (Givataim ILX), Methods and systems for providing additional service applications in pay television.
  48. Horstmann Cay S., Multi-tier electronic software distribution.
  49. Ahmed Tewfik ; Mitchell D. Swanson ; Bin Zhu, Multimedia data embedding.
  50. Collberg, Christian Sven; Thomborson, Clark David; Low, Douglas Wai Kok, Obfuscation techniques for enhancing software security.
  51. Jeong, Soo Gil; Kim, See Hyun; Kim, Kyu Seok; Kim, Chang Kyu; Oh, Jin Hong, PID/section filter in digital television system.
  52. Toshiyuki Kawagishi JP, Portable electronic device and loyalty point system.
  53. Kudelski Andre (Crissier CHX), Pre-payment television system using a memory card associated with a decoder.
  54. Brian Baker, Process and streaming server for encrypting a data stream.
  55. Horstmann Cay S., Relicensing of electronically purchased software.
  56. Katta Noboru (Itami JPX) Murakami Hiroki (Osaka JPX) Ibaraki Susumu (Toyonaka JPX) Nakamura Seiji (Toyonaka JPX), Scrambled transmission system.
  57. Handelman Doron,ILX ; Kranc Moshe,ILX ; Fink David,ILX ; Zucker Arnold,ILX ; Smith Perry,ILX ; Bar-on Gerson,ILX, Secure access system utilizing an access card having more than one embedded integrated circuit and/or plurality of secu.
  58. Handelman Doron (Givataim ILX) Kranc Moshe (Jerusalem ILX) Fink David (Jerusalem ILX) Zucker Arnold (Ramat Modiim ILX) Smith Perry (Jerusalem ILX) Bar-On Gerson (Kohav Hashahar ILX), Secure access systems and methods utilizing two access cards.
  59. Handelman Doron,ILX ; Kranc Moshe,ILX ; Fink David,ILX ; Zucker Arnold,ILX ; Smith Perry,ILX ; Bar-On Gerson,ILX, Secure access systems utilizing more than one IC card.
  60. Kleinman, Amit; Kipnis, Shlomo, Secure communications system.
  61. Handelman Doron,ILX ; Kranc Moshe,ILX ; Fink David,ILX ; Zucker Arnold,ILX ; Smith Perry,ILX ; Bar-On Gerson,ILX, Secure document access system.
  62. Hallam Toby,GBX ; Siegel Philip I., Secure smart card and tool for removing same.
  63. Michael R. Colligan ; Yong Ho Son ; Christopher Goode, Selective and renewable encryption for secure distribution of video on-demand.
  64. Anderson ; Jr. Bruce J. ; Lamont Nadine ; Drasner Sharyn L. ; Greenberg Arthur L., Set top terminal for an interactive information distribution system.
  65. Yossef Tsuria IL, Smart card chaining in pay television systems.
  66. Horstmann Cay S., Software program self-modification.
  67. Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure.
  68. David M. Van Wie ; Robert P. Weber, Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  69. Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  70. Van Wie, David M.; Weber, Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  71. Gray James P. ; Onvural Raif O. ; Peyravian Mohammad, Synchronization of encryption/decryption keys in a data communication network.
  72. Kuhn Gideon Jacobus,ZAX ; Davies Donald Watts,GB3 ; Rix Simon Paul Ashley,ZAX, System and apparatus for blockwise encryption/decryption of data.
  73. Herz Frederick ; Ungar Lyle ; Zhang Jian ; Wachob David ; Salganicoff Marcos, System and method for scheduling broadcast of and access to video programs and other data using customer profiles.
  74. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., System and methods for secure transaction management and electronic rights protection.
  75. Schneck Paul B. ; Abrams Marshall D., System for controlling access and distribution of digital property.
  76. Schneck Paul B. ; Abrams Marshall D., System for controlling access and distribution of digital property.
  77. Yossef Tsuria IL; Yishai Sered IL, System for preventing playback of unauthorized digital video recordings.
  78. Chaney John William, System for processing a video signal via series-connected high speed signal processing smart cards.
  79. Benaloh, Josh D., Systems and methods for compression of key sets having multiple keys.
  80. Shear Victor H. ; Van Wie David M. ; Weber Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  81. Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  82. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  83. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  84. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  85. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  86. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  87. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  88. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  89. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  90. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  91. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for the secure transaction management and electronic rights protection.
  92. Shear Victor H. ; Sibert W. Olin ; Van Wie David M., Systems and methods using cryptography to protect secure computing environments.
  93. Shear Victor H. ; Sibert W. Olin ; Van Wie David M., Systems and methods using cryptography to protect secure computing environments.
  94. Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining using and manipulating rights management data structures.
  95. Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining, using and manipulating rights management data structures.
  96. Handelman, Doron, Television system communicating individually addressed information.
  97. Mori Toshiya,JPX ; Takao Naoya,JPX ; Shimoji Tatsuya,JPX ; Okamura Kazuo,JPX ; Hirai Junichi,JPX ; Oashi Masahiro,JPX ; Kakiuchi Takashi,JPX ; Kusumi Yuki,JPX ; Miyabe Yoshiyuki,JPX ; Minakata Ikuo,J, Terminal apparatus and method for achieving interactive operations by displaying a desired piece of image information at high speed using cache memories, out of a large amount of image information se.
  98. Tsuria Yossef,ILX ; Handelman Doron,ILX, Theft prevention system and method.
  99. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M. ; Weber Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  100. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support system, methods and techniques for secure electronic commerce transaction and rights management.
  101. Snook, Daniel, Video encoding-method.
  102. Frederiksen Jeffrey E. (603 W. Haven Dr. Arlington Heights IL 60005), Video transmission system.

이 특허를 인용한 특허 (43)

  1. Priyadarshi, Shaiwal; Soroushian, Kourosh; Osborne, Roland; Braness, Jason; Kelley, John, Application enhancement tracks.
  2. Bauer, William D.; White, Donovan Steve; Eder, David W., Cable television secure communication system for one way restricted.
  3. Shivadas, Abhishek; Bramwell, Stephen R., Content streaming with client device trick play index.
  4. Chan, Francis Yee-Dug; Soroushian, Kourosh; Wood, Andrew Jeffrey, Elementary bitstream cryptographic material transport systems and methods.
  5. Chan, Francis Yee-Dug; Soroushian, Kourosh; Wood, Andrew Jeffrey, Elementary bitstream cryptographic material transport systems and methods.
  6. Chan, Francis Yee-Dug; Soroushian, Kourosh; Wood, Andrew Jeffrey, Elementary bitstream cryptographic material transport systems and methods.
  7. Grab, Eric William; Russell, Chris; Chan, Francis Yee-Dug; Kiefer, Michael George, Federated digital rights management scheme including trusted systems.
  8. Grab, Eric William; Russell, Chris; Chan, Francis Yee-Dug; Kiefer, Michael George, Federated digital rights management scheme including trusted systems.
  9. Grab, Eric William; Russell, Chris; Chan, Francis Yee-Dug; Kiefer, Michael George, Federated digital rights management scheme including trusted systems.
  10. Singer, Mitch, Forensic decryption tools.
  11. Cocchi, Ronald P.; Gagnon, Gregory J.; McKee-Clabaugh, Frances C.; Gorman, Michael A., Method and apparatus for providing secure internet protocol media services.
  12. Cocchi, Ronald P.; Gagnon, Gregory J.; McKee-Clabaugh, Frances C.; Gorman, Michael A., Method and apparatus for providing secure internet protocol media services.
  13. Cocchi, Ronald P.; McKee-Clabaugh, Frances C., Method and apparatus for supporting broadcast efficiency and security enhancements.
  14. Cocchi, Ronald P.; McKee-Clabaugh, Frances C., Method and apparatus for supporting broadcast efficiency and security enhancements.
  15. Cocchi, Ronald P.; Gagnon, Gregory J.; Flaharty, Dennis R., Method and apparatus for supporting multiple broadcasters independently using a single conditional access system.
  16. Cocchi, Ronald P.; Gagnon, Gregory J.; Flaharty, Dennis R., Method and apparatus for supporting multiple broadcasters independently using a single conditional access system.
  17. Cocchi, Ronald P.; Gagnon, Gregory J.; Flaharty, Dennis R., Method and apparatus for supporting multiple broadcasters independently using a single conditional access system.
  18. Oxford, William V., Method and system for a recursive security protocol for digital copyright control.
  19. Oxford, William V., Method and system for a recursive security protocol for digital copyright control.
  20. Oxford, William V., Method and system for control of code execution on a general purpose computing device and control of code execution in a recursive security protocol.
  21. Oxford, William V., Method and system for control of code execution on a general purpose computing device and control of code execution in a recursive security protocol.
  22. Oxford, William V., Method and system for process working set isolation.
  23. Mamidwar, Rajesh; Chen, Xuemin; Brownhill, Robert, Method and system for utilizing GPS information to secure digital media.
  24. Shivadas, Abhishek; Bramwell, Stephen R., Network video streaming with trick play based on separate trick play files.
  25. Shivadas, Abhishek; Bramwell, Stephen R., Network video streaming with trick play based on separate trick play files.
  26. Kiefer, Michael George; Grab, Eric William; Braness, Jason, Playback devices and methods for playing back alternative streams of content protected using a common set of cryptographic keys.
  27. Zhuk, Oscar V.; Morten, Glenn A.; Hiar, Edward Charles, Preventing unauthorized modification or skipping of viewing of advertisements within content.
  28. Ghose, Kanad, System and method for validating program execution at run-time using control flow signatures.
  29. Klein, Daniel Paul Leon; Meikle, Neil; Page, Simon Ellett; Mufazzil, Jessica Hanefa, System and method of analysing transfer of data over at least one network.
  30. van der Schaar, Auke Sjoerd; Funnell, John, Systems and methods for encoding and playing back video at different frame rates using enhancement layers.
  31. Braness, Jason; van der Schaar, Auke Sjoerd; Soroushian, Kourosh, Systems and methods for encoding source media in matroska container files for adaptive bitrate streaming using hypertext transfer protocol.
  32. Braness, Jason; Soroushian, Kourosh; van der Schaar, Auke Sjoerd, Systems and methods for performing smooth visual search of media encoded for adaptive bitrate streaming via hypertext transfer protocol using trick play streams.
  33. Kiefer, Michael George; Grab, Eric William; Braness, Jason, Systems and methods for playing back alternative streams of protected content protected using common cryptographic information.
  34. Kiefer, Michael George; Grab, Eric William; Braness, Jason, Systems and methods for playing back alternative streams of protected content protected using common cryptographic information.
  35. Kiefer, Michael George; Grab, Eric William; Braness, Jason, Systems and methods for playing back alternative streams of protected content protected using common cryptographic information.
  36. Kiefer, Michael George; Grab, Eric William; Braness, Jason, Systems and methods for playing back alternative streams of protected content protected using common cryptographic information.
  37. Kiefer, Michael George; Grab, Eric William; Braness, Jason, Systems and methods for protecting alternative streams in adaptive bitrate streaming systems.
  38. Braness, Jason; Amidei, William David; Srinivasan, Mayur, Systems and methods for protecting elementary bitstreams incorporating independently encoded tiles.
  39. van der Schaar, Auke Sjoerd; Shivadas, Abhishek, Systems, methods, and media for controlling delivery of content.
  40. Braness, Jason A, Systems, methods, and media for streaming media content.
  41. Naletov, Ivan Vladimirovich; Zurpal, Sergey, Systems, methods, and media for transcoding video data.
  42. Naletov, Ivan Vladimirovich; Zurpal, Sergey, Systems, methods, and media for transcoding video data according to encoding parameters indicated by received metadata.
  43. Cassidy, Sean; Smith, Brandon, Unique watermarking of content objects according to end user identity.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트