최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
DataON 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
Edison 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
Kafe 바로가기국가/구분 | United States(US) Patent 등록 |
---|---|
국제특허분류(IPC7판) |
|
출원번호 | US-0485507 (1995-06-07) |
등록번호 | US-8191091 (2012-05-29) |
발명자 / 주소 |
|
출원인 / 주소 |
|
대리인 / 주소 |
|
인용정보 | 피인용 횟수 : 31 인용 특허 : 959 |
A unified system of programming communication. The system encompasses the prior art (television, radio, broadcast hardcopy, computer communications, etc.) and new user specific mass media. Within the unified system, parallel processing computer systems, each having an input (e.g., 77) controlling a
A unified system of programming communication. The system encompasses the prior art (television, radio, broadcast hardcopy, computer communications, etc.) and new user specific mass media. Within the unified system, parallel processing computer systems, each having an input (e.g., 77) controlling a plurality of computers (e.g., 205), generate and output user information at receiver stations. Under broadcast control, local computers (73, 205), combine user information selectively into prior art communications to exhibit personalized mass media programming at video monitors (202), speakers (263), printers (221), etc. At intermediate transmission stations (e.g., cable television stations), signals in network broadcasts and from local inputs (74, 77, 97, 98) cause control processors (71) and computers (73) to selectively automate connection and operation of receivers (53), recorder/players (76), computers (73), generators (82), strippers (81), etc. At receiver stations, signals in received transmissions and from local inputs (225, 218, 22) cause control processors (200) and computers (205) to automate connection and operation of converters (201), tuners (215), decryptors (224), recorder/players (217), computers (205), furnaces (206), etc. Processors (71, 200) meter and monitor availability and usage of programming.
1. A method of inhibiting piracy of information or enabling a presentation of programming at a subscriber station, said method comprising the steps of: receiving an information transmission from a first remote station;detecting instruct-to-sample instructions in the information transmission;processi
1. A method of inhibiting piracy of information or enabling a presentation of programming at a subscriber station, said method comprising the steps of: receiving an information transmission from a first remote station;detecting instruct-to-sample instructions in the information transmission;processing, under control of said instruct-to-sample instructions, a datum at said subscriber station;comparing, under control of said instruct-to-sample instructions, selected comparison information of said instruct-to-sample instructions to a selected sample of preprogrammed operating information at said subscriber station, said selected comparison information and said selected sample of preprogrammed operating information being selected based on said step of processing, whereby a successful match indicates that said subscriber station is properly programmed and a failed match suggests that said preprogrammed operating information at said subscriber station has been tampered with; andperforming, under control of said instruct-to-sample instructions, at said subscriber station at least one of the steps of: (1) disabling the functionality of some portion of said subscriber station (i) when said step of comparing results in a determination that said subscriber station has been tampered with or (ii) when an instruction is executed based on said step of comparing and said subscriber station fails to respond in a predetermined fashion or within a predetermined period of time;(2) communicating appearance-of-tampering information to a second remote station when said step of comparing results in a determination that said subscriber station has been tampered with; and(3) enabling at least some of a programming presentation when said step of comparing results in a determination that said subscriber station is properly programmed. 2. The method of claim 1, wherein said comparing step is performed under control of a selected subroutine of said instruct-to-sample instructions. 3. The method of claim 2, wherein said subscriber station selects said selected subroutine based on said step of processing. 4. The method of claim 3, wherein said datum comprises a station specific identifier. 5. The method of claim 4, wherein said subscriber station selects said station specific identifier. 6. The method of claim 1, wherein said step of performing includes said step of disabling and wherein said step of disabling includes erasing information from memory. 7. The method of claim 6, wherein a read only memory is disabled. 8. The method of claim 1, wherein said step of performing includes said step of disabling and wherein said step of disabling includes disabling a decryptor. 9. The method of claim 1, wherein said step of performing includes said step of communicating and wherein said step of communicating includes establishing telephone communications. 10. The method of claim 1, wherein said step of performing includes said step of communicating and wherein said step of communicating includes transmitting an identifier of said subscriber station to said second remote station. 11. The method of claim 1, wherein said step of comparing results in a determination that said subscriber station may have been tampered with and said subscriber station performs both of said steps of disabling and communicating. 12. The method of claim 1, wherein said step of performing includes said step of enabling and wherein said step of enabling includes controlling a decryptor. 13. A method of decrypting programming at a receiver station, said method comprising the steps of: receiving an encrypted digital information transmission including encrypted information;detecting in said encrypted digital information transmission the presence of an instruct-to-enable signal;passing said instruct-to-enable signal to a processor;determining a fashion in which said receiver station locates a first decryption key by processing said instruct-to-enable signal;locating said first decryption key based on said step of determining;decrypting said encrypted information using said first decryption key; andoutputting said programming based on said step of decrypting. 14. The method of claim 13, further comprising the step of computing a second decryption key, and wherein said step of decrypting comprises decrypting said encrypted information using said first and second decryption keys. 15. The method of claim 14, wherein said first and second decryption keys are used to decrypt a video portion of said programming. 16. The method of claim 13, further comprising the step of storing information evidencing said step of decrypting. 17. The method of claim 13, further comprising the step of determining if said receiver station is decrypting said encrypted information correctly, and if not, communicating appearance-of-tampering information to a remote station. 18. The method of claim 13, wherein said encrypted information includes television programming. 19. The method of claim 15, wherein a third decryption key is used to decrypt an audio portion of said programming, and said first decryption key is located based on decrypting said audio portion using said third decryption key. 20. A method of decrypting programming at a receiver station, said method comprising the steps of: receiving an encrypted digital information transmission including encrypted information;detecting in said encrypted digital information transmission the presence of a first instruct-to-enable signal including first processor instructions;executing said first processor instructions of said first instruct-to-enable signal to provide a first decryption key;detecting in said encrypted digital information transmission the presence of a second instruct-to-enable signal including second processor instructions;executing said second processor instructions to provide a second decryption key;decrypting said encrypted information using said first and second decryption keys; andoutputting said programming based on said step of decrypting. 21. The method as in claim 20, further comprising the step of storing information evidencing said step of decrypting. 22. The method as in claim 20, further comprising the step of determining if said receiver station is decrypting said encrypted information correctly, and if not, communicating appearance-of-tampering information to a remote station. 23. The method of claim 20, wherein said first and second decryption keys are used to decrypt a video portion of said programming. 24. The method of claim 20, wherein said encrypted information includes television programming. 25. The method of claim 23, wherein a third decryption key is used to decrypt an audio portion of said programming, and said first decryption key is provided based on decrypting said audio portion using said third decryption key. 26. A method of decrypting programming at a receiver station, said method comprising the steps of: receiving an information transmission including encrypted information;detecting the presence of an instruct-to-enable signal;passing said instruct-to-enable signal to a processor;automatically tuning said receiver station to a channel designated by said instruct-to-enable signal;receiving enabling information from a remote source based on said step of tuning;decrypting said encrypted information by processing said enabling information; andoutputting said programming based on said step of decrypting. 27. The method of claim 26, further comprising the step of storing information evidencing said step of decrypting. 28. The method of claim 26, further comprising the step of determining if said receiver station is decrypting said encrypted information correctly, and if not, communicating appearance-of-tampering to a remote station. 29. The method of claim 26, wherein said enabling information is received from a remote source in an audio portion of said programming. 30. The method of claim 26, wherein said encrypted information includes television programming. 31. The method of claim 29, wherein said step of decrypting comprises decrypting a video portion of said programming.
Copyright KISTI. All Rights Reserved.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.