Method and system for providing secure CODECS
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
G06F-021/00
H04N-007/167
H04N-007/173
H04N-021/4363
H04N-021/4367
H04N-021/4405
H04N-021/4627
H04N-021/8355
H04L-009/32
출원번호
US-0230291
(2005-09-19)
등록번호
US-9609279
(2017-03-28)
발명자
/ 주소
Morten, Glenn A.
Palmer, Tomás E.
MacLean, Charles D.
출원인 / 주소
Google Inc.
대리인 / 주소
Fenwick & West LLP
인용정보
피인용 횟수 :
0인용 특허 :
99
초록▼
A system and method is arranged to provide compression and decompression of digital content in a secure manner. The system is configured to authenticate a source of the digital content, and to further determine a consumer's entitlements and rights for access to the digital content. Based upon the de
A system and method is arranged to provide compression and decompression of digital content in a secure manner. The system is configured to authenticate a source of the digital content, and to further determine a consumer's entitlements and rights for access to the digital content. Based upon the determined entitlements and rights for access, the system is directed to decrypt, and decompress the digital content. In one embodiment, a component of the system is enabled to establish a trust relationship with at least one other component of the system, to minimize an opportunity for piracy of the digital content. In another embodiment, a secure clock is directed to provide protection against hackers that may employ an in-circuit emulator, or the like.
대표청구항▼
1. An apparatus for securely providing digital content, comprising: a processor having executable components, including: an interface component that is configured to receive digital content;a secure clock providing a secure timing signal representative of a periodic pulse;a client side security comp
1. An apparatus for securely providing digital content, comprising: a processor having executable components, including: an interface component that is configured to receive digital content;a secure clock providing a secure timing signal representative of a periodic pulse;a client side security component in communication with the secure clock performing actions, including: receiving a system timing signal representative of another periodic pulse from a system clock;receiving the secure timing signal from the secure clock; anddetermining if the digital content has been tampered with based on a comparison of the system timing signal and the secure timing signal; andan authentication component in communication with the interface component and the client side security component, and that is arranged to perform actions, including: determining if a source of the digital content is authentic;determining if access to the digital content is authorized, based on a digital right and an entitlement;establishing a trust relationship between the authentication component and the client side security component and establishing a different trust relationship between the authentication component and the interface component;receiving the digital content tamper determination from the client side security component based on the trust relationship and receiving the digital content from the interface component based on the different trust relationship; andif the digital content has not been tampered with, the source is authentic, and access to the digital content is authorized, enabling the digital content to be securely decompressed. 2. The apparatus of claim 1, further comprising a secure store configured to include at least one of an encryption key, a trust key, a source identifier, the entitlement, or the digital right. 3. The apparatus of claim 1, further comprising a communications interface that is configured to receiving the digital content over a network and to send the digital content towards the authentication component through a trust link. 4. The apparatus of claim 1, further comprising: a secure compression/decompression (CODEC) that is configured to securely receive the digital content from the interface component and to decompress the digital content. 5. The apparatus of claim 4, wherein the secure CODEC employs a secure trust relationship with the interface component to receive the digital content. 6. The apparatus of claim 1, wherein the received digital content is encrypted. 7. The apparatus of claim 1, wherein the apparatus is operable to connect with at least one of a television, a digital recorder, set-top box, mobile device, or a jukebox. 8. A consumer entertainment device, comprising: a computer processor for executing instructions; anda memory storing instructions that when executed by the processor perform actions including: establishing a trust relationship between a secure Compresser/DECompresser (CODEC) and a client side security component and establishing a different trust relationship between the CODEC and an interface component;receiving digital content at the CODEC from the interface component based on the different trust relationship;authenticating a source of the digital content;receiving a system timing signal representative of a periodic pulse from a system clock;receiving a secure timing signal representative of another periodic pulse from a secure clock;determining, at the client side security component, if the digital content has been tampered with based on a comparison of the system timing signal and the secure timing signal;providing the digital content tamper determination from the client side security component to the CODEC based on the trust relationship; andif access to the digital content is allowed based, in part, on a right and an entitlement associated with a user, authentication of the source, and determining the digital content has not been tampered with, then decrypting the digital content and securely decompressing the decrypted digital content using the CODEC, wherein an entitlement associated with the user includes a set of one or more rights sent from a content distributor to the user. 9. The consumer entertainment device of claim 8, wherein the secure CODEC receives the digital content using a secure trust link. 10. The consumer entertainment device of claim 9, wherein authenticating the source further comprises: determining a validity of at least one of a digital signature associated with the source of the digital content, a digital certificate, or a key. 11. The consumer entertainment device of claim 8, the memory further storing instructions that when executed by the processor perform actions comprising: receiving the right or entitlement in an encrypted format. 12. The consumer entertainment device of claim 8, the memory further storing instructions that when executed by the processor perform actions comprising: if the source is unauthenticated, inhibiting decryption and decompression of the digital content. 13. A system for use in providing digital content, comprising: a processor having executable components, including: a parser that is configured to perform actions, including: receiving digital content;if the received digital content is unencrypted, providing the unencrypted digital content to a clear content CODEC to be decompressed; andif the received digital content is encrypted, providing the encrypted digital content to a secure CODEC;a client side security component in communication with the secure CODEC, and configured to perform actions, including: receiving a timing signal representative of a periodic pulse from a system clock;receiving a secure timing signal representative of another periodic pulse from a secure clock contained within the secure CODEC; anddetermining if the digital content has been tampered with based on a comparison of the system timing signal and the secure timing signal;the secure CODEC being in communication with the parser, and configured to perform actions, including: establishing a trust relationship between the secure CODEC and the parser and establishing a different trust relationship between the secure CODEC and the client side security component;receiving the encrypted digital content securely through a trust link based on the trust relationship and receiving the digital content tamper determination from the client side security component based on the different trust relationship;authenticating a source of the encrypted digital content;determining a right and an entitlement associated with the digital content; andif the source is determined to be authentic, the right and the entitlement enables access to the digital content, and the digital content has not been tampered with, then the secure CODEC decrypting the digital content and decompressing the unencrypted digital content. 14. The system of claim 13, wherein authenticating the source further comprises: determining a validity of at least one of a digital signature associated with the source of the digital content, a digital certificate, or a key. 15. The system of claim 13, wherein establishing the trust link further comprises employing at least one of a digital encryption/encryption key, a hash, or a digital certificate. 16. The system of claim 13, wherein the secure CODEC further comprises: an authentication component configured to determine authentication of a source and access to the digital content based, in part, on the right and entitlement; andan at least one cryptographic component configured to receive and to decrypt encrypted digital content. 17. A device for use in providing digital content, comprising: a transceiver that is configured to receive digital content;a processor having executable components, including: an authentication component to perform actions, including: securely determining authentication of a source of the digital content;securely determining a right or entitlement associated with a use of the digital content;a client side security component to perform actions, including: securely detecting tampering by comparing a system timing signal representative of a periodic pulse received from a system clock to a secure timing signal representative of another periodic pulse received from a secure clock; anda decryption and decompression component to perform actions, including: establishing separate trust relationships between the decryption and decompression component and each of the transceiver, the client side security component, and the authentication component;enabling the digital content to be securely decrypted and decompressed, if it is determined that the source of the digital content is authentic, the right or entitlement enables the use of the digital content, and the digital content has not been tampered with. 18. The device of claim 17, wherein enabling the digital content to be securely decrypted and decompressed further comprises a means for establishing a trusted relationship with at least one other component of the device. 19. The apparatus of claim 1, wherein the authentication component is arranged to perform further actions, including: establishing the trust relationship between the authentication component and the client side security component using a first encryption/decryption mechanism; andreceiving the digital content tamper determination from the client side security component based on the trust relationship using a second encryption/decryption mechanism.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (99)
Ansell, Steven T.; Cherenson, Andrew R.; Rishniw, Leon; Cannon, Susan A.; Allard, Edward J.; Brownell, Jason S.; Stroud, Micah, Adaptable security mechanism for preventing unauthorized access of digital data.
Muratani Hirofumi,JPX ; Muto Akihiro,JPX, Apparatus and method for receiving and decrypting encrypted data and protecting decrypted data from illegal use.
Berson William ; Bernobich Elizabeth ; Heiden Richard W. ; Potoczek Richard A. ; Sisson Robert W. ; Violante Anthony F., Auditable security system for the generation of cryptographically protected digital data.
Gopinath Bhaskarpillai (Watchung NJ) Kurshan David (Sea Bright NJ), Composition of systems of objects by interlocking coordination, projection, and distribution.
Koval Michael J. (Boca Raton FL) Lawton William W. (Boca Raton FL) Tyler John G. (Boynton Beach FL) Winters Scott L. (Plantation FL), Data stream protocol for multimedia data streaming data processing system.
Downs Edgar ; Gruse George Gregory ; Hurtado Marco M. ; Lehman Christopher T. ; Milsted Kenneth Louis ; Lotspiech Jeffrey B., Electronic content delivery system.
Wasilewski Anthony John ; Woodhead Douglas F. ; Logston Gary Lee, Method and apparatus for providing conditional access in connection-oriented, interactive networks with a multiplicity.
LaRocca Tobie ; Johnson Michael D., Method and apparatus for providing subscription-on-demand services, dependent services and contingent services for an interactive information distribution system.
Arn Robert M. (Toronto CAX) Csanky Peter H. (Toronto CAX) Waszek Glen F. (Toronto CAX), Method and apparatus for scrambling and unscrambling data streams using encryption and decryption.
Vegt Arjen Van Der,NLX, Method for automatically searching a frequency range for signal channels in a receiver for digitally modulated signals, and receiver for applying such a method.
Graunke Gary L. ; Carbajal John ; Maliszewski Richard L. ; Rozas Carlos V., Method for securely distributing a conditional use private key to a trusted entity on a remote system.
Kudelski Andr (Crissier CHX) Laffely Laurent (Le Mont-sur-Lausanne CHX) Sasselli Marco (Chardonne CHX), Method of interactive communication between a subscriber and a decoder of a system of pay-television and decoder thereof.
Dinallo Chris A. (Boca Raton FL) Koval Michael J. (Boca Raton FL) Lawton William W. (Boca Raton FL) Paulat ; Jr. Martin J. (Delray Beach FL) Tyler John G. (Boynton Beach FL) Winters Scott L. (Plantat, Personal computer with generalized data streaming apparatus for multimedia devices.
Handelman Doron,ILX ; Kranc Moshe,ILX ; Fink David,ILX ; Zucker Arnold,ILX ; Smith Perry,ILX ; Bar-on Gerson,ILX, Secure access system utilizing an access card having more than one embedded integrated circuit and/or plurality of secu.
Handelman Doron (Givataim ILX) Kranc Moshe (Jerusalem ILX) Fink David (Jerusalem ILX) Zucker Arnold (Ramat Modiim ILX) Smith Perry (Jerusalem ILX) Bar-On Gerson (Kohav Hashahar ILX), Secure access systems and methods utilizing two access cards.
Handelman Doron,ILX ; Kranc Moshe,ILX ; Fink David,ILX ; Zucker Arnold,ILX ; Smith Perry,ILX ; Bar-On Gerson,ILX, Secure access systems utilizing more than one IC card.
Anderson ; Jr. Bruce J. ; Lamont Nadine ; Drasner Sharyn L. ; Greenberg Arthur L., Set top terminal for an interactive information distribution system.
Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure.
David M. Van Wie ; Robert P. Weber, Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
Van Wie, David M.; Weber, Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
Agarwal, Rahul; Ayars, Jeffrey M.; Hefta-Gaub, Bradley D.; Greenbaum, Gary S.; Lippman, Alan F.; Patel, Sujal M.; Stammen, Dale R.; Rosedale, Philip; Vergato, Bryan, System and method for providing random access to a multimedia object over a network.
Herz Frederick ; Ungar Lyle ; Zhang Jian ; Wachob David ; Salganicoff Marcos, System and method for scheduling broadcast of and access to video programs and other data using customer profiles.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., System and methods for secure transaction management and electronic rights protection.
Shear Victor H. ; Van Wie David M. ; Weber Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for the secure transaction management and electronic rights protection.
Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining using and manipulating rights management data structures.
Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining, using and manipulating rights management data structures.
Mori Toshiya,JPX ; Takao Naoya,JPX ; Shimoji Tatsuya,JPX ; Okamura Kazuo,JPX ; Hirai Junichi,JPX ; Oashi Masahiro,JPX ; Kakiuchi Takashi,JPX ; Kusumi Yuki,JPX ; Miyabe Yoshiyuki,JPX ; Minakata Ikuo,J, Terminal apparatus and method for achieving interactive operations by displaying a desired piece of image information at high speed using cache memories, out of a large amount of image information se.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M. ; Weber Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support system, methods and techniques for secure electronic commerce transaction and rights management.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.