Preventing unauthorized modification or skipping of viewing of advertisements within content
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
G06F-021/00
H04N-021/4405
H04N-021/266
H04N-007/167
H04N-021/2347
H04N-021/81
H04L-029/06
출원번호
US-0027839
(2008-02-07)
등록번호
US-8868464
(2014-10-21)
발명자
/ 주소
Zhuk, Oscar V.
Morten, Glenn A.
Hiar, Edward Charles
출원인 / 주소
Google Inc.
대리인 / 주소
Fenwick & West LLP
인용정보
피인용 횟수 :
4인용 특허 :
115
초록▼
A method, apparatus, and system are directed towards employing a chain of permission keys obtained during playing of advertisements within content to enable continued playing of the content. A sequence of encoded permission keys are generated with each encoded permission key, except a last permissio
A method, apparatus, and system are directed towards employing a chain of permission keys obtained during playing of advertisements within content to enable continued playing of the content. A sequence of encoded permission keys are generated with each encoded permission key, except a last permission key, incorporating a scrambling key useable to decode a next encoded permission key within the sequence of encoded permission keys that enables playing of a next portion of the content. If playing of any advertisement within the content is avoided, then access to an associated scrambling key useable to decode a next permission key is prevented, which in turn inhibits playing of a next portion of the content. In another embodiment, a heartbeat analysis may also be performed to monitor if skipping of an advertisement is being attempted, and if so, playing of the content is prevented.
대표청구항▼
1. A system configured to manage viewing of advertisements within content, comprising: processor; anda non-transitory memory storing instructions that when executed by the processor cause the processor to perform steps comprising: employing a different scrambling key that scrambles each of at least
1. A system configured to manage viewing of advertisements within content, comprising: processor; anda non-transitory memory storing instructions that when executed by the processor cause the processor to perform steps comprising: employing a different scrambling key that scrambles each of at least two permission keys;generating at least two encoded permission keys by combining each scrambled permission key with a next scrambling key;marking different portions of at least two advertisements based on different ones of the at least two encoded permission keys;partitioning the content into portions of content separated by at least one of the marked advertisements;providing the partitioned content to a client device with the marked advertisements; andproviding a downloadable client component to the client device, the client component containing instructions that when executed by a processor on the client device cause the processor on the client device to perform steps comprising: receiving the partitioned content with the marked advertisements;obtaining a first encoded permission key during playing of a first marked advertisement;extracting the next scrambling key from the first encoded permission key;obtaining, during the playing of a second marked advertisement, a second encoded permission key;unscrambling a permission key associated with the second encoded permission key using the next scrambling key; andplaying a subsequent portion of the content using the unscrambled permission key. 2. The system of claim 1, wherein the downloadable client component further comprises instructions that when executed cause the processor on the client device to perform steps comprising: performing a heartbeat analysis while the content or advertisements is playing, the heartbeat analysis comprising: determining a start time and end time for each advertisement;determining a content play time (CT) and a real-time (RT);determining whether the CT is greater than about the RT, and the CT is greater than about the start time of an advertisement;based on the determination that the CT is greater than about the RT, and the CT is greater than about the start time of the advertisement, detecting an attempt to avoid playing of the advertisement and inhibiting playing of the content;determining whether the CT is greater than about the RT, and the RT is between about the start time and end time for the advertisement; andbased on the determination that the CT is greater than about the RT, and the RT is between about the start time and end time for the advertisement, detecting an attempt to avoid playing of the advertisement and inhibiting playing of the content. 3. The system of claim 1, wherein the instructions for marking different portions comprise instructions stored in the non-transitory memory that when executed by the processor cause the processor to perform steps comprising: partitioning each permission key into a plurality of partitions;associating each partition within the plurality of partitions for a given encoded permission key to a marker; andinserting the markers for the given encoded permission key at randomly selected locations throughout an advertisement. 4. The system of claim 1, wherein the instructions for scrambling a permission key comprise instructions stored in the non-transitory memory that when executed by the processor cause the processor to perform steps comprising: partitioning a respective permission key into a plurality of digits; andemploying the scrambling key to re-locate the plurality of digits within the permission key;wherein combining the scrambled permission key with the next scrambling key further comprises combining the scrambled plurality of digits with the next scrambling key using a reversible process allowing the next scrambling key to be obtained from the encoded permission key. 5. The system of claim 1, the non-transitory memory further storing instructions that when executed by the processor cause the processor to perform steps comprising: selecting each scrambling key such that each bit within a given scrambling key identifies a location within a given permission key in which to re-locate bits from a first location to the location, the first location being identified by a location of each bit within the given scrambling key. 6. The system of claim 1, wherein the instructions for playing a subsequent portion of the content using the unscrambled permission key comprise instructions in the client component that when executed by a processor on the client device cause the processor on the client device to perform steps comprising: determining whether the unscrambled permission key and an original copy of the respective permission key are equal;based on a determination that the unscrambled permission key and the original copy of the respective permission key are equal, enabling the subsequent portion of the content to play; andbased on a determination that the unscrambled permission key and the original copy of the respective permission key are not equal, inhibiting playing of the subsequent portion of the content. 7. A method for managing viewing of advertisements within content by a client device, comprising: employing, by a processor, a different scrambling key that scrambles each of at least two permission keys;generating, by the processor, at least two encoded permission keys by combining each scrambled permission key with a next scrambling key;marking, by the processor, different portions of at least two advertisements based on different ones of the at least two encoded permission keys;partitioning, by the processor, the content into portions of content is separated by at least one of the marked advertisements; andproviding, by the processor, a downloadable client component to the client device, the client component containing instructions that when executed by a processor on the client device cause the processor on the client device to perform steps comprising: receiving, by the client device, the partitioned content with the marked advertisements;obtaining, by the client device, a first encoded permission key during playing of a first marked advertisement;extracting, by the client device, the next scrambling key from the first encoded permission key;obtaining, by the client device, during the playing of a second marked advertisement, a second encoded permission key;unscrambling, by the client device, a permission key associated with the second encoded permission key using the next scrambling key; andplaying, by the client device, a subsequent portion of the content using the unscrambled permission key. 8. The method of claim 7, wherein the client processor on the client device further performs steps comprising: performing a heartbeat analysis while the content or advertisements is playing, the heartbeat analysis comprising: determining a start time and an end time for each advertisement;determining a content play time (CT) anda real-time (RT);determining whether the CT is greater than about the RT, and the CT is greater than about the start time of an advertisement;based on the determination that the CT is greater than about the RT, and the CT is greater than about the start time of the advertisement, detecting an attempt to avoid playing of the advertisement and inhibiting playing of the content;determining whether the CT is greater than about the RT, and the RT is between about the start time and end time for the advertisement; andbased on the determination that the CT is greater than about the RT, and the RT is between about the start time and end time for the advertisement, detecting an attempt to avoid playing of the advertisement and inhibiting playing of the content. 9. A client device for use in managing viewing of advertisements within content, the client device comprising: a processor; anda non-transitory memory storing instructions that when executed by the processor cause the processor to perform steps comprising: receiving a downloadable client component from a server, the server performing steps comprising: employing a different scrambling key to scramble each of at least two permission keys;generating at least two encoded permission keys by combining each scrambled permission key with a next scrambling key;marking different portions of at least two advertisements based on different ones of the at least two encoded permission keys;partitioning the content into portions of content separated by at least one of the marked advertisements;providing the partitioned content to the client device with the marked advertisements; andproviding the downloadable client component to the client device; andexecuting the downloadable client component on the client device to perform steps comprising:receiving the partitioned content with the marked advertisements;obtaining a first encoded permission key during playing of a first marked advertisement;extracting the next scrambling key from the first encoded permission key;obtaining, during the playing of a second marked advertisement, a second encoded permission key;unscrambling a permission key associated with the second encoded permission key using the next scrambling key; andplaying a subsequent portion of the content using the unscrambled permission key. 10. The method of claim 7, wherein marking different portions comprises: partitioning each permission key into a plurality of partitions;associating each partition within the plurality of partitions for a given encoded permission key to a marker; andinserting the markers for the given encoded permission key at randomly selected locations throughout an advertisement. 11. The method of claim 7, wherein scrambling a permission key comprises: partitioning a respective permission key into a plurality of digits; andemploying the scrambling key to re-locate the plurality of digits within the permission key;wherein combining the scrambled permission key with the next scrambling key further comprises combining the scrambled plurality of digits with the next scrambling key using a reversible process allowing the next scrambling key to be obtained from the encoded permission key. 12. The method of claim 7, further comprising: selecting each scrambling key such that each bit within a given scrambling key identifies a location within a given permission key in which to re-locate bits from a first location to the location, the first location being identified by a location of each bit within the given scrambling key. 13. The method of claim 7, wherein playing of a subsequent portion of the content using the unscrambled permission key comprises: determining whether the unscrambled permission key and an original copy of the respective permission key are equal;based on a determination that the unscrambled permission key and the original copy of the respective permission key are equal, enabling the subsequent portion of the content to play; andbased on a determination that the unscrambled permission key and the original copy of the respective permission key are not equal, inhibiting playing of the subsequent portion of the content. 14. The client device of claim 9, the non-transitory memory further storing instructions that when executed by the processor cause the processor to perform steps comprising: performing a heartbeat analysis while the content or advertisements is playing, the heartbeat analysis comprising: determining a start time and end time for each advertisement;determining a content play time (CT) and a real-time (RT);determining whether the CT is greater than about the RT, and the CT is greater than about the start time of an advertisement;based on the determination that the CT is greater than about the RT, and the CT is greater than about the start time of the advertisement, detecting an attempt to avoid playing of the advertisement and inhibiting playing of the content;determining whether the CT is greater than about the RT, and the RT is between about the start time and end time for the advertisement; andbased on the determination that the CT is greater than about the RT, and the RT is between about the start time and end time for the advertisement, detecting an attempt to avoid playing of the advertisement and inhibiting playing of the content. 15. The client device of claim 9, wherein the instructions for marking different portions comprise instructions stored in the non-transitory memory that when executed by the processor cause the processor to perform steps comprising: partitioning each permission key into a plurality of partitions;associating each partition within the plurality of partitions for a given encoded permission key to a marker; andinserting the markers for the given encoded permission key at randomly selected locations throughout an advertisement. 16. The client device of claim 9, wherein the instructions for scrambling a permission key comprise instructions stored in the non-transitory memory that when executed by the processor cause the processor to perform steps comprising: partitioning a respective permission key into a plurality of digits; andemploying the scrambling key to re-locate the plurality of digits within the permission key;wherein combining the scrambled permission key with the next scrambling key further comprises combining the scrambled plurality of digits with the next scrambling key using a reversible process allowing the next scrambling key to be obtained from the encoded permission key. 17. The client device of claim 9, the non-transitory memory further storing instructions that when executed by the processor cause the processor to perform steps comprising: selecting each scrambling key such that each bit within a given scrambling key identifies a location within a given permission key in which to re-locate bits from a first location to the location, the first location being identified by a location of each bit within the given scrambling key. 18. The client device of claim 9, wherein the instructions for playing a subsequent portion of the content using the unscrambled permission key comprise instructions stored in the non-transitory memory that when executed by the processor cause the processor to perform steps comprising: determining whether the unscrambled permission key and an original copy of the respective permission key are equal;based on a determination that the unscrambled permission key and the original copy of the respective permission key are equal, enabling the subsequent portion of the content to play; andbased on a determination that the unscrambled permission key and the original copy of the respective permission key are not equal, inhibiting playing of the subsequent portion of the content.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (115)
Ansell, Steven T.; Cherenson, Andrew R.; Rishniw, Leon; Cannon, Susan A.; Allard, Edward J.; Brownell, Jason S.; Stroud, Micah, Adaptable security mechanism for preventing unauthorized access of digital data.
Shimosato,Hideto; Ushiyama,Yuichi; Mogami,Kazuto, Apparatus, system and method for authenticating personal identity, computer readable medium having personal identity authenticating program recorded thereon method of registering personal identity au.
Gopinath Bhaskarpillai (Watchung NJ) Kurshan David (Sea Bright NJ), Composition of systems of objects by interlocking coordination, projection, and distribution.
Taku Kato JP; Takehisa Kato JP; Kenjiro Endoh JP; Hisashi Yamada JP; Naoki Endoh JP, Copy protection apparatus and information recording medium used in this copy protection apparatus.
Kawada,Hirotsugu; Katta,Noboru; Ibaraki,Susumu; Tatebayashi,Makoto; Harada,Shunji, Data player, digital contents player, playback system, data embedding apparatus, and embedded data detection apparatus.
Koval Michael J. (Boca Raton FL) Lawton William W. (Boca Raton FL) Tyler John G. (Boynton Beach FL) Winters Scott L. (Plantation FL), Data stream protocol for multimedia data streaming data processing system.
Downs Edgar ; Gruse George Gregory ; Hurtado Marco M. ; Lehman Christopher T. ; Milsted Kenneth Louis ; Lotspiech Jeffrey B., Electronic content delivery system.
Sudia Frank W. ; Asay Alan ; Brickell Ernest F. ; Ankney Richard ; Freund Peter C. ; Yung Marcel M. ; Kravitz David W., Electronic cryptographic packing.
Iwamura, Keiichi, Electronic watermarking method, digital information distribution system using such method, and storage medium storing program of such method.
Chang, Yuan-Chi; Li, Chung-Sheng; Han, Richard Yeh-whei; Smith, John R., Method and apparatus for networked information dissemination through secure transcoding.
Wasilewski Anthony John ; Woodhead Douglas F. ; Logston Gary Lee, Method and apparatus for providing conditional access in connection-oriented, interactive networks with a multiplicity.
LaRocca Tobie ; Johnson Michael D., Method and apparatus for providing subscription-on-demand services, dependent services and contingent services for an interactive information distribution system.
Arn Robert M. (Toronto CAX) Csanky Peter H. (Toronto CAX) Waszek Glen F. (Toronto CAX), Method and apparatus for scrambling and unscrambling data streams using encryption and decryption.
Vegt Arjen Van Der,NLX, Method for automatically searching a frequency range for signal channels in a receiver for digitally modulated signals, and receiver for applying such a method.
Graunke Gary L. ; Carbajal John ; Maliszewski Richard L. ; Rozas Carlos V., Method for securely distributing a conditional use private key to a trusted entity on a remote system.
Kudelski Andr (Crissier CHX) Laffely Laurent (Le Mont-sur-Lausanne CHX) Sasselli Marco (Chardonne CHX), Method of interactive communication between a subscriber and a decoder of a system of pay-television and decoder thereof.
Dinallo Chris A. (Boca Raton FL) Koval Michael J. (Boca Raton FL) Lawton William W. (Boca Raton FL) Paulat ; Jr. Martin J. (Delray Beach FL) Tyler John G. (Boynton Beach FL) Winters Scott L. (Plantat, Personal computer with generalized data streaming apparatus for multimedia devices.
Handelman Doron,ILX ; Kranc Moshe,ILX ; Fink David,ILX ; Zucker Arnold,ILX ; Smith Perry,ILX ; Bar-on Gerson,ILX, Secure access system utilizing an access card having more than one embedded integrated circuit and/or plurality of secu.
Handelman Doron (Givataim ILX) Kranc Moshe (Jerusalem ILX) Fink David (Jerusalem ILX) Zucker Arnold (Ramat Modiim ILX) Smith Perry (Jerusalem ILX) Bar-On Gerson (Kohav Hashahar ILX), Secure access systems and methods utilizing two access cards.
Handelman Doron,ILX ; Kranc Moshe,ILX ; Fink David,ILX ; Zucker Arnold,ILX ; Smith Perry,ILX ; Bar-On Gerson,ILX, Secure access systems utilizing more than one IC card.
Anderson ; Jr. Bruce J. ; Lamont Nadine ; Drasner Sharyn L. ; Greenberg Arthur L., Set top terminal for an interactive information distribution system.
Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure.
David M. Van Wie ; Robert P. Weber, Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
Van Wie, David M.; Weber, Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
Agarwal, Rahul; Ayars, Jeffrey M.; Hefta-Gaub, Bradley D.; Greenbaum, Gary S.; Lippman, Alan F.; Patel, Sujal M.; Stammen, Dale R.; Rosedale, Philip; Vergato, Bryan, System and method for providing random access to a multimedia object over a network.
Herz Frederick ; Ungar Lyle ; Zhang Jian ; Wachob David ; Salganicoff Marcos, System and method for scheduling broadcast of and access to video programs and other data using customer profiles.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., System and methods for secure transaction management and electronic rights protection.
Shear Victor H. ; Van Wie David M. ; Weber Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for the secure transaction management and electronic rights protection.
Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining using and manipulating rights management data structures.
Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining, using and manipulating rights management data structures.
Mori Toshiya,JPX ; Takao Naoya,JPX ; Shimoji Tatsuya,JPX ; Okamura Kazuo,JPX ; Hirai Junichi,JPX ; Oashi Masahiro,JPX ; Kakiuchi Takashi,JPX ; Kusumi Yuki,JPX ; Miyabe Yoshiyuki,JPX ; Minakata Ikuo,J, Terminal apparatus and method for achieving interactive operations by displaying a desired piece of image information at high speed using cache memories, out of a large amount of image information se.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M. ; Weber Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support system, methods and techniques for secure electronic commerce transaction and rights management.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.