CA2367449C - Secure distribution of video on-demand - Google Patents
Secure distribution of video on-demand Download PDFInfo
- Publication number
- CA2367449C CA2367449C CA002367449A CA2367449A CA2367449C CA 2367449 C CA2367449 C CA 2367449C CA 002367449 A CA002367449 A CA 002367449A CA 2367449 A CA2367449 A CA 2367449A CA 2367449 C CA2367449 C CA 2367449C
- Authority
- CA
- Canada
- Prior art keywords
- video
- encrypted
- key
- encrypted form
- set forth
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Lifetime
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/45—Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies, resolving scheduling conflicts
- H04N21/454—Content or additional data filtering, e.g. blocking advertisements
- H04N21/4542—Blocking scenes or portions of the received content, e.g. censoring scenes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/16—Analogue secrecy systems; Analogue subscription systems
- H04N7/167—Systems rendering the television signal unintelligible and subsequently intelligible
- H04N7/1675—Providing digital key or authorisation information for generation or regeneration of the scrambling sequence
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/23—Processing of content or additional data; Elementary server operations; Server middleware
- H04N21/234—Processing of video elementary streams, e.g. splicing of video streams, manipulating MPEG-4 scene graphs
- H04N21/2347—Processing of video elementary streams, e.g. splicing of video streams, manipulating MPEG-4 scene graphs involving video stream encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/23—Processing of content or additional data; Elementary server operations; Server middleware
- H04N21/234—Processing of video elementary streams, e.g. splicing of video streams, manipulating MPEG-4 scene graphs
- H04N21/2347—Processing of video elementary streams, e.g. splicing of video streams, manipulating MPEG-4 scene graphs involving video stream encryption
- H04N21/23473—Processing of video elementary streams, e.g. splicing of video streams, manipulating MPEG-4 scene graphs involving video stream encryption by pre-encrypting
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/23—Processing of content or additional data; Elementary server operations; Server middleware
- H04N21/234—Processing of video elementary streams, e.g. splicing of video streams, manipulating MPEG-4 scene graphs
- H04N21/2347—Processing of video elementary streams, e.g. splicing of video streams, manipulating MPEG-4 scene graphs involving video stream encryption
- H04N21/23476—Processing of video elementary streams, e.g. splicing of video streams, manipulating MPEG-4 scene graphs involving video stream encryption by partially encrypting, e.g. encrypting the ending portion of a movie
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/47—End-user applications
- H04N21/472—End-user interface for requesting content, additional data or services; End-user interface for interacting with content, e.g. for content reservation or setting reminders, for requesting event notification, for manipulating displayed content
- H04N21/47202—End-user interface for requesting content, additional data or services; End-user interface for interacting with content, e.g. for content reservation or setting reminders, for requesting event notification, for manipulating displayed content for requesting content on demand, e.g. video on demand
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/16—Analogue secrecy systems; Analogue subscription systems
- H04N7/173—Analogue secrecy systems; Analogue subscription systems with two-way working, e.g. subscriber sending a programme selection signal
- H04N7/17309—Transmission or handling of upstream communications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/16—Analogue secrecy systems; Analogue subscription systems
- H04N7/173—Analogue secrecy systems; Analogue subscription systems with two-way working, e.g. subscriber sending a programme selection signal
- H04N7/17309—Transmission or handling of upstream communications
- H04N7/17318—Direct or substantially direct transmission and handling of requests
Abstract
A remote server (404) receives encrypted video from a programming source, stores it and decrypts it after receiving a request from a subscriber. Next, the server re-encrypts the video and transmits the newly encrypted video to the subscriber. In a second aspect, a server (404) receives encrypted video, decrypts the originally encrypted video, re-encrypts the video into a second encrypted form and stores the newly encrypted video. When a subscriber requests the video the server will then transmit it to the subscriber. In a third aspect, a server (404) receives encrypted video and stores it. When a subscriber requests the video the server will then transmit the video in its original encrypted form. In a fourth aspect, a server receives pre-encrypted video and stores it. When a subscriber request the video the server will complete encryption of the video before transmitting it to the subscriber.
Description
SECURE DISTRIBUTION OF VIDEO ON-DEMAND
BACKGROUND OF THE INVENTION
1. Field of the Invention This invention relates generally to the field of video distribution networks.
In particular, this invention relates to secure video distribution networks.
BACKGROUND OF THE INVENTION
1. Field of the Invention This invention relates generally to the field of video distribution networks.
In particular, this invention relates to secure video distribution networks.
2. Description of the Background Art Security is an important issue for video distribution networks. For cable distribution networks, there are various portions or locations where security is of concern.
A first portion where security is of concern is the primary distribution network. The primary distribution network is where video content is transferred from television studios to distribution centers. A second portion where security is of eoncern is the secondary distribution network. The secondary distribution network is where the video content is transmitted from a distribution center to subscriber stations.
For video on-demand distribution networks, there is an additional point where security is of concern. That point is a remote server within a distribution center. Typically, such a remote server stores the video content before the video content is distributed to the subscriber stations.
SUMMARY OF THE INVENTION
The present invention provides a solution to the security issues presented above, especially with regards to security at a remote server. In accordance with a first aspect of the invention, a remote server receives video programming in a first encrypted form and stores the video programming in the first encrypted form. After the remote server receives a request from a subscriber station for transmission of the video programming, the remote server decrypts the video programming, re-encrypts the video programming into a second encrypted form, and then transmits the video programming in the second encrypted form to the subscriber station.
In accordance with a second aspect of the invention, a remote server receives video programming in a first encrypted form, decrypts the video programming, re-encrypts the video programming into a second encrypted form, and then stores the video programming in the second encrypted form.
After the remote server receives a request from a subscriber station for transmission of the video programming, the remote server simply transmits the video programming in the second encrypted form to the subscriber station.
In accordance with a third aspect of the invention, a remote server receives video programming in a first encrypted form and stores the video programming in the first encrypted form. After the remote server receives a request from a subscriber station for transmission of the video programming, the remote server passes through the video content by transmitting the video programming in the first encrypted form to the subscriber station.
In accordance with a fourth aspect of the invention, a remote server receives pre-encrypted video programming and stores the pre-encrypted video programming. After the remote server receives a request from a subscriber station for transmission of the video programming, the remote server completes encryption of the video programming and then transmits the video programming to the subscriber station. At the subscriber station, the video programming is fully decrypted.
In a further aspect, the present invention provides a method, comprising: storing at least one partially encrypted video program received from a programming source; processing a partially encrypted video program corresponding to a subscriber requested video program to produce a fully encrypted video program; and causing transmission of the fully encrypted video program to the requesting subscriber.
In a still further aspect, the present invention provides a method comprising: storing a video program encrypted in a first form; decrypting said program from said stored first form encrypting said program into a second form; and transmitting said second form to a subscriber.
In a still further aspect, the present invention provides a computer readable medium including software instructions that, when executed by a processor, perform a method, comprising: means for storing a video program encrypted in a first form; means for decrypting said program from said stored first form; means for encrypting said program into a second form; and means for transmitting said second form to a subscriber.
BRIEF DESCRIPTION OF THE DRAWINGS
Fig. 1 is a schematic diagram of a conventional cable distribution network.
1 o Fig. 2 is a flow chart depicting a conventional insecure process for distributing video content via a conventional cable distribution network.
Fig. 3 is a flow chart depicting a conventional (somewhat) secure process for distributing video content via a conventional cable distribution network.
Fig. 4 is a schematic diagram of cable distribution network including a video on-demand source in accordance with a preferred embodiment of the present invention.
Fig. SA is a flow chart depicting a secure process for distributing video on-demand content via a cable distribution network in accordance with a first aspect of the present invention.
3a Fig. 5B is a flow chart depicting a secure process for distributing video on-demand content via a cable distribution network in accordance with a second aspect of the present invention.
Fig. 6 is a flow chart depicting a secure process for distributing video on-demand content via a cable distribution network in accordance with a third aspect of the present invention.
Fig. 7 is a flow chart depicting a secure process for distributing video on-demand content via a cable distribution network in accordance with a fourth aspect of the present invention.
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS
Fig. 1 is a schematic diagram of a conventional cable distribution network.
The conventional cable distribution network typically includes one or more broadcast sources 102, one or more premium broadcast sources 104, one or more distribution centers 106, one or more secondary distribution networks 108, and a plurality of subscriber stations 110.
The broadcast source 102 may be, for example, a local television station.
For instance, an affiliate station of a major network such as ABC, NBC, CBS, FOX, or UPN. The premium broadcast source 104 may be, for example, a premium channel such as HBO, Showtime, Cinemax, and so on. The sources 102 and 101-1 may be coupled via a primary distribution network to the distribution center 106. The distribution center 106 may be, for example, a cable head-end.
The distribution center 106 may be coupled via a secondary distribution network 108 to the subscriber stations 110. The secondary distribution network 108 comprises may include, for example, various amplifiers, bridges, taps, and drop cables. Finally, the subscriber stations 110 may be, for example, set-top boxes and associated television equipment for viewing the video content by end users.
Fig. 2 is a flow chart depicting a conventional insecure process for distributing video content via a conventional cable distribution network.
First, a non-premium video signal is transported 202 from the broadcast source 102 to the distribution center 106. At the distribution center 106, the video signal is multiplexed 204 with other signals to generate a multiplexed signal. The multiplexed .signal is then distributed 206 from the distribution center 106 via the secondary distribution network 108 to the subscriber stations 110. At the subscriber stations 110, the multiplexed signal is demultiplexed 208 to isolate the video signal, and then the video signal is displayed 210, typically, on a television monitor.
Fig. 3 is a flow chart depicting a conventional (somewhat) secure process for distributing video content via a conventional cable distribution network.
First, a premium video signal is encrypted 302 to generate an encrypted signal.
The encrypted signal is transported 304 from the premium broadcast source 104 to the distribution center 106.
At the distribution center 106, the video signal is decrypted 306 to regenerate the premium video signal. The premium video signal is then scrambled 308 and multiplexed 310 with other signals to generate a multiplexed signal. The multiplexed signal is then distributed 312 from the distribution center 106 via the secondary distribution network 108 to the subscriber stations 110.
At the subscriber stations 110, the multiplexed signal is demultiplexed 314 to isolate the scrambled video signal, the scrambled video signal is unscrambled 316, and then the video signal is displayed 318, typically, on a television monitor connected to a set-top box. The process in Fig. 3 is a typical conventional process for delivering premium video using scrambling. Other conventional processes also exist.
Fig. 4 is a schematic diagram of a cable distribution network including a video on-demand source in accordance with a preferred embodiment of the present invention. In addition to the components of the conventional cable distribution network shown in Fig.1, the cable distribution network shown in Fig. 4 includes a video on-demand source 402 and a remote server 404. The video on-demand source 402 may house, for example, a collection of video programs such as, for example, movies. As shown in Fig. 4, the remote server 404 ma~~ be located within the distribution center 106. The remote server 404 may include, for example, a parallel processing computer configured to be a video server, a disk drive array to store video data, and a video session manager to provide session control of the video data flowing to and from the video server.
Fig. 5A is a flow chart depicting a secure process for distributing video on-demand content via a cable distribution network in accordance with a first aspect WO 00!54493 PCT/US00/06480 -of the present invention. The process depicted in Fig. 5A may be called a store, decrypt, and re-encrypt process.
First, a video program is encrypted 502 by a video on-demand source 402 to generate an encrypted program in a first encrypted form. The encrypted program is transported 504 via a primary distribution network from the video on-demand source 402 to a remote server 404 within a distribution center 106.
The encrypted program is then stored 506 in the remote server 404.
Subsequently, when the remote server 404 receives 508 a request for transmission of the video program from a subscriber station I10, the remote server 404 responds by first decrypting 510 the video program from the first encrypted form. A first key is may be used to accomplish such decryption 510, and such key may have been received from the video on-demand source 402 via a communication channel that is separate from the one used to transmit the video program. After the video program is decrypted 510, the remote server 404 re-encrypts 512 the video program into a second encrypted form using a second key.
The second key may be a public key of a public key encryption system.
Such a public key encryption system uses two different key: a public key to encrypt data and a private key to decrypt data. In that case, decryption would be accomplished using a corresponding private key of the public key encryption system. Examples of such a public key encryption system is encryption under the PGP (Pretty Good Privacy) system or under the RSA (Rivest, Shamir, and Adleman) system. Alternatively, the second key may be a private key of a private key encryption system. Such a private key encryption system uses a single private key to encrypt and decrypt data. Examples of such a private key encryption system is encryption under the Data Encryption Standard (DES) or under triple-DES which involves applying DES three times to enhance security.
The private keys) itself may be transmitted from the remote server 404 to the subscriber station 110 while encrypted in a third encrypted form.
After the video program is re-encrypted 512, the re-encrypted program in the second encrypted form (and the second key if necessary) is multiplexed 514 with other signals to generate a multiplexed signal. The multiplexed signal is then distributed 516 via the secondary distribution network 108 to the subscriber stations 110.
At the subscriber stations 110, the multiplexed signal is demultiplexed 518 to isolate the re-encrypted program in the second encrypted form (and the second key if necessary), the re-encrypted program is decrypted 520 from the second encrypted form to generate the unencrypted video program, and then the video program is displayed 522, typically, on a television monitor connected to set-top box.
Fig. 5B is a flow chart depicting a secure process for distributing video on-demand content via a cable distribution network in accordance with a second aspec: of the present invention. The process depicted in Fig. 5B may be called a decr~-pt, re-encrypt, and store process. In comparison with the process in Fig.
A first portion where security is of concern is the primary distribution network. The primary distribution network is where video content is transferred from television studios to distribution centers. A second portion where security is of eoncern is the secondary distribution network. The secondary distribution network is where the video content is transmitted from a distribution center to subscriber stations.
For video on-demand distribution networks, there is an additional point where security is of concern. That point is a remote server within a distribution center. Typically, such a remote server stores the video content before the video content is distributed to the subscriber stations.
SUMMARY OF THE INVENTION
The present invention provides a solution to the security issues presented above, especially with regards to security at a remote server. In accordance with a first aspect of the invention, a remote server receives video programming in a first encrypted form and stores the video programming in the first encrypted form. After the remote server receives a request from a subscriber station for transmission of the video programming, the remote server decrypts the video programming, re-encrypts the video programming into a second encrypted form, and then transmits the video programming in the second encrypted form to the subscriber station.
In accordance with a second aspect of the invention, a remote server receives video programming in a first encrypted form, decrypts the video programming, re-encrypts the video programming into a second encrypted form, and then stores the video programming in the second encrypted form.
After the remote server receives a request from a subscriber station for transmission of the video programming, the remote server simply transmits the video programming in the second encrypted form to the subscriber station.
In accordance with a third aspect of the invention, a remote server receives video programming in a first encrypted form and stores the video programming in the first encrypted form. After the remote server receives a request from a subscriber station for transmission of the video programming, the remote server passes through the video content by transmitting the video programming in the first encrypted form to the subscriber station.
In accordance with a fourth aspect of the invention, a remote server receives pre-encrypted video programming and stores the pre-encrypted video programming. After the remote server receives a request from a subscriber station for transmission of the video programming, the remote server completes encryption of the video programming and then transmits the video programming to the subscriber station. At the subscriber station, the video programming is fully decrypted.
In a further aspect, the present invention provides a method, comprising: storing at least one partially encrypted video program received from a programming source; processing a partially encrypted video program corresponding to a subscriber requested video program to produce a fully encrypted video program; and causing transmission of the fully encrypted video program to the requesting subscriber.
In a still further aspect, the present invention provides a method comprising: storing a video program encrypted in a first form; decrypting said program from said stored first form encrypting said program into a second form; and transmitting said second form to a subscriber.
In a still further aspect, the present invention provides a computer readable medium including software instructions that, when executed by a processor, perform a method, comprising: means for storing a video program encrypted in a first form; means for decrypting said program from said stored first form; means for encrypting said program into a second form; and means for transmitting said second form to a subscriber.
BRIEF DESCRIPTION OF THE DRAWINGS
Fig. 1 is a schematic diagram of a conventional cable distribution network.
1 o Fig. 2 is a flow chart depicting a conventional insecure process for distributing video content via a conventional cable distribution network.
Fig. 3 is a flow chart depicting a conventional (somewhat) secure process for distributing video content via a conventional cable distribution network.
Fig. 4 is a schematic diagram of cable distribution network including a video on-demand source in accordance with a preferred embodiment of the present invention.
Fig. SA is a flow chart depicting a secure process for distributing video on-demand content via a cable distribution network in accordance with a first aspect of the present invention.
3a Fig. 5B is a flow chart depicting a secure process for distributing video on-demand content via a cable distribution network in accordance with a second aspect of the present invention.
Fig. 6 is a flow chart depicting a secure process for distributing video on-demand content via a cable distribution network in accordance with a third aspect of the present invention.
Fig. 7 is a flow chart depicting a secure process for distributing video on-demand content via a cable distribution network in accordance with a fourth aspect of the present invention.
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS
Fig. 1 is a schematic diagram of a conventional cable distribution network.
The conventional cable distribution network typically includes one or more broadcast sources 102, one or more premium broadcast sources 104, one or more distribution centers 106, one or more secondary distribution networks 108, and a plurality of subscriber stations 110.
The broadcast source 102 may be, for example, a local television station.
For instance, an affiliate station of a major network such as ABC, NBC, CBS, FOX, or UPN. The premium broadcast source 104 may be, for example, a premium channel such as HBO, Showtime, Cinemax, and so on. The sources 102 and 101-1 may be coupled via a primary distribution network to the distribution center 106. The distribution center 106 may be, for example, a cable head-end.
The distribution center 106 may be coupled via a secondary distribution network 108 to the subscriber stations 110. The secondary distribution network 108 comprises may include, for example, various amplifiers, bridges, taps, and drop cables. Finally, the subscriber stations 110 may be, for example, set-top boxes and associated television equipment for viewing the video content by end users.
Fig. 2 is a flow chart depicting a conventional insecure process for distributing video content via a conventional cable distribution network.
First, a non-premium video signal is transported 202 from the broadcast source 102 to the distribution center 106. At the distribution center 106, the video signal is multiplexed 204 with other signals to generate a multiplexed signal. The multiplexed .signal is then distributed 206 from the distribution center 106 via the secondary distribution network 108 to the subscriber stations 110. At the subscriber stations 110, the multiplexed signal is demultiplexed 208 to isolate the video signal, and then the video signal is displayed 210, typically, on a television monitor.
Fig. 3 is a flow chart depicting a conventional (somewhat) secure process for distributing video content via a conventional cable distribution network.
First, a premium video signal is encrypted 302 to generate an encrypted signal.
The encrypted signal is transported 304 from the premium broadcast source 104 to the distribution center 106.
At the distribution center 106, the video signal is decrypted 306 to regenerate the premium video signal. The premium video signal is then scrambled 308 and multiplexed 310 with other signals to generate a multiplexed signal. The multiplexed signal is then distributed 312 from the distribution center 106 via the secondary distribution network 108 to the subscriber stations 110.
At the subscriber stations 110, the multiplexed signal is demultiplexed 314 to isolate the scrambled video signal, the scrambled video signal is unscrambled 316, and then the video signal is displayed 318, typically, on a television monitor connected to a set-top box. The process in Fig. 3 is a typical conventional process for delivering premium video using scrambling. Other conventional processes also exist.
Fig. 4 is a schematic diagram of a cable distribution network including a video on-demand source in accordance with a preferred embodiment of the present invention. In addition to the components of the conventional cable distribution network shown in Fig.1, the cable distribution network shown in Fig. 4 includes a video on-demand source 402 and a remote server 404. The video on-demand source 402 may house, for example, a collection of video programs such as, for example, movies. As shown in Fig. 4, the remote server 404 ma~~ be located within the distribution center 106. The remote server 404 may include, for example, a parallel processing computer configured to be a video server, a disk drive array to store video data, and a video session manager to provide session control of the video data flowing to and from the video server.
Fig. 5A is a flow chart depicting a secure process for distributing video on-demand content via a cable distribution network in accordance with a first aspect WO 00!54493 PCT/US00/06480 -of the present invention. The process depicted in Fig. 5A may be called a store, decrypt, and re-encrypt process.
First, a video program is encrypted 502 by a video on-demand source 402 to generate an encrypted program in a first encrypted form. The encrypted program is transported 504 via a primary distribution network from the video on-demand source 402 to a remote server 404 within a distribution center 106.
The encrypted program is then stored 506 in the remote server 404.
Subsequently, when the remote server 404 receives 508 a request for transmission of the video program from a subscriber station I10, the remote server 404 responds by first decrypting 510 the video program from the first encrypted form. A first key is may be used to accomplish such decryption 510, and such key may have been received from the video on-demand source 402 via a communication channel that is separate from the one used to transmit the video program. After the video program is decrypted 510, the remote server 404 re-encrypts 512 the video program into a second encrypted form using a second key.
The second key may be a public key of a public key encryption system.
Such a public key encryption system uses two different key: a public key to encrypt data and a private key to decrypt data. In that case, decryption would be accomplished using a corresponding private key of the public key encryption system. Examples of such a public key encryption system is encryption under the PGP (Pretty Good Privacy) system or under the RSA (Rivest, Shamir, and Adleman) system. Alternatively, the second key may be a private key of a private key encryption system. Such a private key encryption system uses a single private key to encrypt and decrypt data. Examples of such a private key encryption system is encryption under the Data Encryption Standard (DES) or under triple-DES which involves applying DES three times to enhance security.
The private keys) itself may be transmitted from the remote server 404 to the subscriber station 110 while encrypted in a third encrypted form.
After the video program is re-encrypted 512, the re-encrypted program in the second encrypted form (and the second key if necessary) is multiplexed 514 with other signals to generate a multiplexed signal. The multiplexed signal is then distributed 516 via the secondary distribution network 108 to the subscriber stations 110.
At the subscriber stations 110, the multiplexed signal is demultiplexed 518 to isolate the re-encrypted program in the second encrypted form (and the second key if necessary), the re-encrypted program is decrypted 520 from the second encrypted form to generate the unencrypted video program, and then the video program is displayed 522, typically, on a television monitor connected to set-top box.
Fig. 5B is a flow chart depicting a secure process for distributing video on-demand content via a cable distribution network in accordance with a second aspec: of the present invention. The process depicted in Fig. 5B may be called a decr~-pt, re-encrypt, and store process. In comparison with the process in Fig.
5A, the process in Fig. 5B decrypts 510 and re-encrypts 512 the video program before the video program is stored 506 in the remote server 404.
First, a video program is encrypted 502 by a video on-demand source 402 to generate an encrypted program in a first encrypted form. The encrypted program is transported 504 via a primary distribution network from the video on-demand source 402 to a remote server 404 within a distribution center 106.
At this point, the remote server 510 decrypts 510 the video program from the first encrypted form. A first key is may be used to accomplish such decryption 510, and such key may have been received from the video on-demand source 402 via a communication channel that is separate from the one used to transmit the video program. After the video program is decrypted 510, the remote server 404 re-encrypts 512 the video program into a second encrypted form using a second key. After the decryption 510 and re-encryption 510, the re-encrypted program is then stored 506 in the remote server 404.
Note that step 506 in Fig. 5B differs from step 506 in Fig. 5A in that step 506 in Fig. 5B involves storing the video program in the second encrypted form while step 506 in Fig. 5A involves storing the video program in the first encrypted form.
Subsequently, when the remote server 404 receives 508 a request for transmission of the video program from a subscriber station 110, the remote server 404 responds by multiplexing 514 the re-encrypted program in the second encrypted form (and the second key if necessary) with other signals to generate a multiplexed signal. The multiplexed signal is then distributed 516 via the secondary distribution network 108 to the requesting subscriber station 110.
At the subscriber stations 110, the multiplexed signal is demultiplexed 518 to isolate the re-encrypted program in the second encrypted form (and the second key if necessary), the re-encrypted program is decrypted 520 from the second encrypted form to generate the unencrypted video program, and then the video program is displayed 522, typically, on a television monitor connected to set-top box.
Fig. 6 is a flow chart depicting a secure process for distributing video on-demand content via a cable distribution network in accordance with a third aspect of the present invention. The process depicted in Fig. 6 may be Balled a pass-through process.
First, a video program is encrypted 602 by a video on-demand source 402 to generate an encrypted program in a first encrypted form. The encrypted program is transported 604 via a primary distribution network from the video on-demand source 402 to a remote server 404 within a distribution center 106.
A
kev to decrypt the encrypted program may also be transported from the source 402 to the server 404. The encrypted program is then stored 606 in the remote ser~-er 404.
The key may be a public key of a public key encryption system. Such a putlic key encryption system uses two different key: a public key to encrypt data and a private key to decrypt data. In that case, decryption would be WO 00/54493 PC'T/US00/06480 accomplished using a corresponding private key of the public key encryption system. Examples of such a public key encryption system is encryption under the PGP (Pretty Good Privacy) system or under the RSA (Rivest, Sharnir, and Adleman) system. Alternatively, the key may be a private key of a private key encryption system. Such a private key encryption system uses a single private key to encrypt and decrypt data. Examples of such a private key encryption system is encryption under the Data Encryption Standard (DES) or under triple-DES which involves applying DES three times to enhance security. The private keys) itself may be transmitted from the source 402 to the server 404 while encrypted in a second encrypted form. Alternatively, the private keys) may be transported from the source 402 to the server 404 via a communication channel which is separate from the communication channel used to transport the video program from the source 402 to the server 404.
Subsequently, when the remote server 404 receives 608 a request for transmission of the video program from a subscriber station 110, the remote server 404 responds by multiplexing 610 the encrypted program in the first encrypted form (and the key if necessary) with other signals to generate a multiplexed signal. The multiplexed signal is then distributed 612 via the secondary distribution network 108 to the requesting subscriber station 110.
At the subscriber stations 110, the multiplexed signal is demultiplexed 614 to isolate the encrypted program in the first encrypted form (and the key if necessary), the encrypted program is decrypted 616 from the first encrypted form to generate the unencrypted video program, and then the video program is displayed 618, typically, on a television monitor connected to set-top box.
Fig. 7 is a flow chart depicting a secure process for distributing video on-demand content via a cable distribution network in accordance with a fourth aspect of the present invention. The process depicted in Fig. 7 may be called a multiple-layer encryption process. In comparison with the process in Fig. 6, the process in Fig. 7 pre-encrypts 702 the video program at the source 402, completes encryption 704 of the video program at the remote server 404, and fully decrypts 706 the video program at the subscriber station 110.
The pre-encryption step 702 may be implemented by applying a single DES encryption or a double DES encryption. If the pre-encryption step 702 uses a single DES encryption, then the completion of encryption step 704 may be implemented by applying a double DES encryption to achieve triple-DES
encr~~ption. Similarly, if the pre-encryption step 702 uses a double DES
encr~~ption, then the completion of encryption step 704 may be implemented by applying a single DES encryption to achieve triple-DES encryption. In either case, the video program is transported from the remote server 404 to the subscriber station 110 while under triple-DES encryption. As long as the subscriber station has the three keys required, it will be able to fully decrypt 706 the ti-ipie-DES encryption to obtain the unencrypted video program.
It is to be understood that the specific mechanisms and techniques which have been described are merely illustrative of one application of the principles of the invention. For example, while the present invention is described in application to video on-demand, it also has some application in broadcast video.
Numerous additional modifications may be made to the methods and apparatus described without departing from the true spirit of the invention.
First, a video program is encrypted 502 by a video on-demand source 402 to generate an encrypted program in a first encrypted form. The encrypted program is transported 504 via a primary distribution network from the video on-demand source 402 to a remote server 404 within a distribution center 106.
At this point, the remote server 510 decrypts 510 the video program from the first encrypted form. A first key is may be used to accomplish such decryption 510, and such key may have been received from the video on-demand source 402 via a communication channel that is separate from the one used to transmit the video program. After the video program is decrypted 510, the remote server 404 re-encrypts 512 the video program into a second encrypted form using a second key. After the decryption 510 and re-encryption 510, the re-encrypted program is then stored 506 in the remote server 404.
Note that step 506 in Fig. 5B differs from step 506 in Fig. 5A in that step 506 in Fig. 5B involves storing the video program in the second encrypted form while step 506 in Fig. 5A involves storing the video program in the first encrypted form.
Subsequently, when the remote server 404 receives 508 a request for transmission of the video program from a subscriber station 110, the remote server 404 responds by multiplexing 514 the re-encrypted program in the second encrypted form (and the second key if necessary) with other signals to generate a multiplexed signal. The multiplexed signal is then distributed 516 via the secondary distribution network 108 to the requesting subscriber station 110.
At the subscriber stations 110, the multiplexed signal is demultiplexed 518 to isolate the re-encrypted program in the second encrypted form (and the second key if necessary), the re-encrypted program is decrypted 520 from the second encrypted form to generate the unencrypted video program, and then the video program is displayed 522, typically, on a television monitor connected to set-top box.
Fig. 6 is a flow chart depicting a secure process for distributing video on-demand content via a cable distribution network in accordance with a third aspect of the present invention. The process depicted in Fig. 6 may be Balled a pass-through process.
First, a video program is encrypted 602 by a video on-demand source 402 to generate an encrypted program in a first encrypted form. The encrypted program is transported 604 via a primary distribution network from the video on-demand source 402 to a remote server 404 within a distribution center 106.
A
kev to decrypt the encrypted program may also be transported from the source 402 to the server 404. The encrypted program is then stored 606 in the remote ser~-er 404.
The key may be a public key of a public key encryption system. Such a putlic key encryption system uses two different key: a public key to encrypt data and a private key to decrypt data. In that case, decryption would be WO 00/54493 PC'T/US00/06480 accomplished using a corresponding private key of the public key encryption system. Examples of such a public key encryption system is encryption under the PGP (Pretty Good Privacy) system or under the RSA (Rivest, Sharnir, and Adleman) system. Alternatively, the key may be a private key of a private key encryption system. Such a private key encryption system uses a single private key to encrypt and decrypt data. Examples of such a private key encryption system is encryption under the Data Encryption Standard (DES) or under triple-DES which involves applying DES three times to enhance security. The private keys) itself may be transmitted from the source 402 to the server 404 while encrypted in a second encrypted form. Alternatively, the private keys) may be transported from the source 402 to the server 404 via a communication channel which is separate from the communication channel used to transport the video program from the source 402 to the server 404.
Subsequently, when the remote server 404 receives 608 a request for transmission of the video program from a subscriber station 110, the remote server 404 responds by multiplexing 610 the encrypted program in the first encrypted form (and the key if necessary) with other signals to generate a multiplexed signal. The multiplexed signal is then distributed 612 via the secondary distribution network 108 to the requesting subscriber station 110.
At the subscriber stations 110, the multiplexed signal is demultiplexed 614 to isolate the encrypted program in the first encrypted form (and the key if necessary), the encrypted program is decrypted 616 from the first encrypted form to generate the unencrypted video program, and then the video program is displayed 618, typically, on a television monitor connected to set-top box.
Fig. 7 is a flow chart depicting a secure process for distributing video on-demand content via a cable distribution network in accordance with a fourth aspect of the present invention. The process depicted in Fig. 7 may be called a multiple-layer encryption process. In comparison with the process in Fig. 6, the process in Fig. 7 pre-encrypts 702 the video program at the source 402, completes encryption 704 of the video program at the remote server 404, and fully decrypts 706 the video program at the subscriber station 110.
The pre-encryption step 702 may be implemented by applying a single DES encryption or a double DES encryption. If the pre-encryption step 702 uses a single DES encryption, then the completion of encryption step 704 may be implemented by applying a double DES encryption to achieve triple-DES
encr~~ption. Similarly, if the pre-encryption step 702 uses a double DES
encr~~ption, then the completion of encryption step 704 may be implemented by applying a single DES encryption to achieve triple-DES encryption. In either case, the video program is transported from the remote server 404 to the subscriber station 110 while under triple-DES encryption. As long as the subscriber station has the three keys required, it will be able to fully decrypt 706 the ti-ipie-DES encryption to obtain the unencrypted video program.
It is to be understood that the specific mechanisms and techniques which have been described are merely illustrative of one application of the principles of the invention. For example, while the present invention is described in application to video on-demand, it also has some application in broadcast video.
Numerous additional modifications may be made to the methods and apparatus described without departing from the true spirit of the invention.
Claims (53)
1. A secure method performed by a remote server for providing video programming requested by at least a first of a plurality of subscriber stations, the method comprising:
receiving the video programming in a first encrypted form from a programming source;
storing the video programming in the first encrypted form;
receiving a request from a subscriber station for transmission of the video programming;
decrypting the video programming from the first encrypted form;
re-encrypting the video programming into a second encrypted form; and causing transmission of the video programming in the second encrypted form to the subscriber station.
receiving the video programming in a first encrypted form from a programming source;
storing the video programming in the first encrypted form;
receiving a request from a subscriber station for transmission of the video programming;
decrypting the video programming from the first encrypted form;
re-encrypting the video programming into a second encrypted form; and causing transmission of the video programming in the second encrypted form to the subscriber station.
2. The method as set forth in claim 1, wherein the video programming in the second encrypted form is to be decrypted from the second encrypted form using a key.
3. The method as set forth in claim 2, wherein the second encrypted form comprises a form of public-key encryption, and the key comprises a private key to decrypt the public-key encryption.
4. The method as set forth in claim 2, wherein the key is transmitted to the subscriber station in a third encrypted form such that the subscriber station must decrypt the key before decrypting the video programming.
5. The method as set forth in claim 2, wherein the second encrypted form includes encryption utilizing a Data Encryption Standard.
6. The method as set forth in claim 1, wherein a key is used to decrypt the video programming from the first encrypted form, and wherein the video programming in the first encrypted form and the key are received from the programming source via separate communication channels.
7. The method as set forth in claim 1, wherein causing transmission of the video programming in the second encrypted form to the subscriber station includes multiplexing the video programming in the second encrypted form with other signals to create a multiplexed signal and causing transmission of the multiplexed signal to the subscriber station.
8. The method as set forth in claim 1, wherein the remote server comprises a remote video on-demand server.
9. The method as set forth in claim 1, wherein the remote server is located within a head-end, and the transmission to the subscriber station occurs via a secondary distribution network.
10. The method as set forth in claim 1, wherein the receiving from the programming source occurs via a primary distribution network.
11. A secure method performed by a remote server for providing video programming requested by at least a first of a plurality of subscriber stations, the method comprising:
receiving the video programming in a first encrypted form from a programming source;
decrypting the video programming from the first encrypted form;
re-encrypting the video programming in a second encrypted form;
storing the video programming in the second encrypted form;
receiving a request from a subscriber station for transmission of the video programming; and causing transmission of the video programming into the second encrypted form to the subscriber station.
receiving the video programming in a first encrypted form from a programming source;
decrypting the video programming from the first encrypted form;
re-encrypting the video programming in a second encrypted form;
storing the video programming in the second encrypted form;
receiving a request from a subscriber station for transmission of the video programming; and causing transmission of the video programming into the second encrypted form to the subscriber station.
12. The method as set forth in claim 11, wherein the video programming in the second encrypted form is to be decrypted from the second encrypted form using a key.
13. The method as set forth in claim 12, wherein the second encrypted form comprises a form of public-key encryption, and the key comprises a private key to decrypt the public-key encryption.
14. The method as set forth in claim 12, wherein the key is transmitted to the subscriber station in a third encrypted form such that the subscriber station must decrypt the key before decrypting the video programming.
15. The method as set forth in claim 12, wherein the second encrypted form includes encryption utilizing a Data Encryption Standard.
16. The method as set forth in claim 11, wherein a key is used to decrypt the video programming from the first encrypted form, and wherein the video programming in the first encrypted form and the key are received from the programming source via separate communication channels.
17. The method as set forth in claim 11, wherein causing transmission of the video programming in the second encrypted form to the subscriber station includes multiplexing the video programming in the second encrypted form with other signals to create a multiplexed signal and causing transmission of the multiplexed signal to the subscriber station.
18. The method as set forth in claim 11, wherein the remote server comprises a remote video on-demand server.
19. The method as set forth in claim 11, wherein the remote server is located within a head-end, and the transmission to the subscriber station occurs via a secondary distribution network.
20. The method as set forth in claim 11, wherein the receiving from the programming source occurs via a primary distribution network.
21. A secure method performed by a remote server for providing video programming requested by at least a first of a plurality of subscriber stations, the method comprising:
receiving the video programming in a first encrypted form from a programming source;
storing the video programming in the first encrypted form;
receiving a request from a subscriber station for transmission of the video programming; and responding to the request by causing transmission of the video programming in the first encrypted form to the subscriber station.
receiving the video programming in a first encrypted form from a programming source;
storing the video programming in the first encrypted form;
receiving a request from a subscriber station for transmission of the video programming; and responding to the request by causing transmission of the video programming in the first encrypted form to the subscriber station.
22. The method as set forth in claim 21, wherein the video programming in the first encrypted form is to be decrypted from the first encrypted form using a key.
23. The method as set forth in claim 22, wherein the first encrypted form comprises a form of public-key encryption, and the key comprises a private key to decrypt the public-key encryption.
24. The method as set forth in claim 22, wherein the key is transmitted to the subscriber station in a second encrypted form such that the subscriber station must decrypt the key before decrypting the video programming.
25. The method as set forth in claim 22, wherein the first encrypted form includes encryption utilizing a Data Encryption Standard.
26. The method as set forth in claim 21, wherein a key is used to decrypt the video programming from the first encrypted form, and wherein the video programming in the first encrypted form and the key are received from the programming source via separate communication channels.
27. The method as set forth in claim 21, wherein causing transmission of the video programming in the first encrypted form to the subscriber station includes multiplexing the video programming in the first encrypted form with other signals to create a multiplexed signal and causing transmission of the multiplexed signal to the subscriber station.
28. The method as set forth in claim 21, wherein the remote server comprises a remote video on-demand server.
29. The method as set forth in claim 21, wherein the remote server is located within a head-end, and the transmission from the remote server to the subscriber station occurs via a secondary distribution network.
30. The method as set forth in claim 21, wherein the receiving from the programming source occurs via a primary distribution network.
31. A secure method performed by a remote server for providing video programming requested by at least a first of a plurality of subscriber stations, the method comprising:
receiving the video programming in a pre-encrypted form from a programming source;
storing the video programming in the pre-encrypted form;
receiving a request from a subscriber station for transmission of the video programming;
completing encryption of the video programming to a fully encrypted form; and causing transmission of the video programming in the fully encrypted form to the subscriber station.
receiving the video programming in a pre-encrypted form from a programming source;
storing the video programming in the pre-encrypted form;
receiving a request from a subscriber station for transmission of the video programming;
completing encryption of the video programming to a fully encrypted form; and causing transmission of the video programming in the fully encrypted form to the subscriber station.
32. The method as set forth in claim 31, wherein the fully encrypted form comprises a triple-DES encrypted form.
33. The method as set forth in claim 32, wherein the pre-encrypted form comprises a single-DES encrypted form.
34. The method as set forth in claim 32, wherein the pre-encrypted form comprises a double-DES encrypted form.
35. A method, comprising:
storing at least one partially encrypted video program received from a programming source;
processing a partially encrypted video program corresponding to a subscriber requested video program to produce a fully encrypted video program; and causing transmission of the fully encrypted video program to the requesting subscriber.
storing at least one partially encrypted video program received from a programming source;
processing a partially encrypted video program corresponding to a subscriber requested video program to produce a fully encrypted video program; and causing transmission of the fully encrypted video program to the requesting subscriber.
36. The method of claim 35, further comprising:
causing the transmission of a decryption key to said requesting subscriber, said decryption key being necessary to decrypt said fully encrypted video program.
causing the transmission of a decryption key to said requesting subscriber, said decryption key being necessary to decrypt said fully encrypted video program.
37. The method of claim 35, wherein said fully encrypted video program is encrypted according to a public key associated with said requesting subscriber, said public key having associated with it a private key necessary to decrypt said fully encrypted video program.
38. The method of claim 35, wherein said fully encrypted video program is encrypted according to a private key associated with said requesting subscriber, said private key having associated with it a public key necessary to decrypt said fully encrypted video program.
39. The method of claim 35, wherein said fully encrypted video program is encrypted according to a public key, said public key having associated with it a private key necessary to decrypt said fully encrypted video program, said method further comprising:
causing the transmission of said private key to said requesting subscriber.
causing the transmission of said private key to said requesting subscriber.
40. The method of claim39, wherein said public key is encrypted prior to transmission to said requesting subscriber.
41. The method of claim 36, wherein said fully encrypted video program is transmitted to said requesting subscriber via a first communications channel and said decryption key is transmitted to said requesting subscriber via a second communications channel.
42. The method of claim 35, wherein said fully encrypted video program is encrypted according to a Data Encryption Standard.
43. The method of claim 35, further comprising:
multiplexing said fully encrypted video program and other signals to create a multiplexed signal for transmission to said requesting subscriber.
multiplexing said fully encrypted video program and other signals to create a multiplexed signal for transmission to said requesting subscriber.
44. A method comprising:
storing a video program encrypted in a first form;
decrypting said program from said stored first form encrypting said program into a second form; and transmitting said second form to a subscriber.
storing a video program encrypted in a first form;
decrypting said program from said stored first form encrypting said program into a second form; and transmitting said second form to a subscriber.
45. The method of claim 44, wherein a first key is used to decrypt said first form of said program.
46. The method of claim 45, wherein said first key is transmitted on a communication channel different than a channel used to transmit said first form to said storing means.
47. The method of claim 44 wherein a second key is used to encrypt said program into said second form.
48. The method of claim 47, wherein said second key is a public key of a public key encryption system.
49. The method of claim 47, wherein said second key is a private key encryption system that encrypts and decrypts said second form.
50. The method of claim 49, wherein said private key encryption system utilizes a data encryption standard.
51. The method of claim 50, wherein said second key is transmitted from a remote server to said subscriber while encrypted in a third form.
52. The method of claim 51, wherein said subscriber isolates and de-encrypts said program.
53. A computer readable medium including software instructions that, when executed by a processor, perform a method, comprising:
means for storing a video program encrypted in a first form;
means for decrypting said program from said stored first form;
means for encrypting said program into a second form; and means for transmitting said second form to a subscriber.
means for storing a video program encrypted in a first form;
means for decrypting said program from said stored first form;
means for encrypting said program into a second form; and means for transmitting said second form to a subscriber.
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US09/267,800 US6229895B1 (en) | 1999-03-12 | 1999-03-12 | Secure distribution of video on-demand |
US09/267,800 | 1999-03-12 | ||
PCT/US2000/006480 WO2000054493A1 (en) | 1999-03-12 | 2000-03-10 | Secure distribution of video on-demand |
Publications (2)
Publication Number | Publication Date |
---|---|
CA2367449A1 CA2367449A1 (en) | 2000-09-14 |
CA2367449C true CA2367449C (en) | 2005-10-11 |
Family
ID=23020173
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CA002367449A Expired - Lifetime CA2367449C (en) | 1999-03-12 | 2000-03-10 | Secure distribution of video on-demand |
Country Status (5)
Country | Link |
---|---|
US (5) | US6229895B1 (en) |
AU (1) | AU3878900A (en) |
CA (1) | CA2367449C (en) |
GB (1) | GB2363928B (en) |
WO (1) | WO2000054493A1 (en) |
Families Citing this family (373)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6020189A (en) * | 1996-08-30 | 2000-02-01 | The Johns Hopkins University School Of Medicine | Fibroblast growth factor homologous factors (FHFs) and methods of use |
US6697489B1 (en) | 1999-03-30 | 2004-02-24 | Sony Corporation | Method and apparatus for securing control words |
US7730300B2 (en) | 1999-03-30 | 2010-06-01 | Sony Corporation | Method and apparatus for protecting the transfer of data |
GB2363931B (en) * | 1999-03-31 | 2003-11-12 | Diva Systems Corp | Method and apparatus for performing impulse authorizations within a video on demand environment |
US6424998B2 (en) | 1999-04-28 | 2002-07-23 | World Theatre, Inc. | System permitting the display of video or still image content on selected displays of an electronic display network according to customer dictates |
US20030149986A1 (en) * | 1999-08-10 | 2003-08-07 | Mayfield William W. | Security system for defeating satellite television piracy |
US7647618B1 (en) | 1999-08-27 | 2010-01-12 | Charles Eric Hunter | Video distribution system |
US6647417B1 (en) | 2000-02-10 | 2003-11-11 | World Theatre, Inc. | Music distribution systems |
US8090619B1 (en) | 1999-08-27 | 2012-01-03 | Ochoa Optics Llc | Method and system for music distribution |
US20060212908A1 (en) * | 1999-08-27 | 2006-09-21 | Ochoa Optics Llc | Video distribution system |
US6952685B1 (en) * | 1999-08-27 | 2005-10-04 | Ochoa Optics Llc | Music distribution system and associated antipiracy protection |
US7209900B2 (en) | 1999-08-27 | 2007-04-24 | Charles Eric Hunter | Music distribution systems |
US20090150924A1 (en) * | 1999-09-30 | 2009-06-11 | Yue Heng Xu | Using Two Electronic Programming Guides |
US7747982B1 (en) | 1999-10-13 | 2010-06-29 | Starz Entertainment, Llc | Distributing and storing content to a user's location |
US8020186B1 (en) | 1999-10-13 | 2011-09-13 | Starz Entertainment, Llc | Methods and systems for distributing on-demand programming |
US6973662B1 (en) | 1999-10-13 | 2005-12-06 | Starz Entertainment Group Llc | Method for providing programming distribution |
US6983480B1 (en) | 1999-10-13 | 2006-01-03 | Starz Entertainment Group Llc | Method for authorizing limited programming distribution |
US7024679B1 (en) | 1999-10-13 | 2006-04-04 | Svod Llc | Local near video on demand storage |
US7228559B1 (en) | 1999-10-13 | 2007-06-05 | Starz Encore Group Llc | Programming distribution and notification system |
US7809849B2 (en) * | 1999-10-13 | 2010-10-05 | Starz Entertainment, Llc | Pre-storing multiple programs with user control of playback |
US7240359B1 (en) * | 1999-10-13 | 2007-07-03 | Starz Entertainment, Llc | Programming distribution system |
US6912513B1 (en) * | 1999-10-29 | 2005-06-28 | Sony Corporation | Copy-protecting management using a user scrambling key |
US7039614B1 (en) | 1999-11-09 | 2006-05-02 | Sony Corporation | Method for simulcrypting scrambled data to a plurality of conditional access devices |
ATE357812T1 (en) * | 1999-11-19 | 2007-04-15 | Smardtv Sa | APPARATUS AND METHOD FOR DIGITAL TELEVISION |
IL150220A0 (en) * | 1999-12-17 | 2002-12-01 | World Theatre Inc | Centralized telephone order and distribution system |
US6701528B1 (en) | 2000-01-26 | 2004-03-02 | Hughes Electronics Corporation | Virtual video on demand using multiple encrypted video segments |
US9252898B2 (en) | 2000-01-28 | 2016-02-02 | Zarbaña Digital Fund Llc | Music distribution systems |
US7225164B1 (en) * | 2000-02-15 | 2007-05-29 | Sony Corporation | Method and apparatus for implementing revocation in broadcast networks |
US7321923B1 (en) * | 2000-03-08 | 2008-01-22 | Music Choice | Personalized audio system and method |
US8463780B1 (en) | 2000-03-08 | 2013-06-11 | Music Choice | System and method for providing a personalized media service |
US7028082B1 (en) | 2001-03-08 | 2006-04-11 | Music Choice | Personalized audio system and method |
US7783722B1 (en) | 2000-03-08 | 2010-08-24 | Music Choice | Personalized audio system and method |
US7856485B2 (en) | 2000-03-08 | 2010-12-21 | Music Choice | Systems and methods for providing customized media channels |
US7320025B1 (en) | 2002-03-18 | 2008-01-15 | Music Choice | Systems and methods for providing a broadcast entertainment service and an on-demand entertainment service |
US7325043B1 (en) | 2000-03-08 | 2008-01-29 | Music Choice | System and method for providing a personalized media service |
US7275256B1 (en) | 2001-08-28 | 2007-09-25 | Music Choice | System and method for providing an interactive, visual complement to an audio program |
JP2001268544A (en) * | 2000-03-15 | 2001-09-28 | Sony Corp | Digital signal receiver |
US6879963B1 (en) | 2000-04-12 | 2005-04-12 | Music Choice | Cross channel delivery system and method |
US20020037081A1 (en) * | 2000-04-28 | 2002-03-28 | David Rogoff | Cryptographic key distribution system and method for digital video systems |
EP1279283A2 (en) * | 2000-04-28 | 2003-01-29 | Broadcom Corporation | Cryptographic key distribution system and method for digital video systems |
US6898285B1 (en) * | 2000-06-02 | 2005-05-24 | General Instrument Corporation | System to deliver encrypted access control information to support interoperability between digital information processing/control equipment |
US8082572B1 (en) | 2000-06-08 | 2011-12-20 | The Directv Group, Inc. | Method and apparatus for transmitting, receiving, and utilizing audio/visual signals and other information |
US20030206631A1 (en) * | 2000-06-22 | 2003-11-06 | Candelore Brant L. | Method and apparatus for scrambling program data for furture viewing |
US20040205812A1 (en) * | 2000-06-22 | 2004-10-14 | Candelore Brant L. | Method and apparatus for routing program data in a program viewing unit |
WO2002001592A1 (en) * | 2000-06-28 | 2002-01-03 | Intertainer, Inc. | Intelligent media targeting system and method |
US7203311B1 (en) * | 2000-07-21 | 2007-04-10 | The Directv Group, Inc. | Super encrypted storage and retrieval of media programs in a hard-paired receiver and storage device |
US6853728B1 (en) | 2000-07-21 | 2005-02-08 | The Directv Group, Inc. | Video on demand pay per view services with unmodified conditional access functionality |
US8140859B1 (en) * | 2000-07-21 | 2012-03-20 | The Directv Group, Inc. | Secure storage and replay of media programs using a hard-paired receiver and storage device |
US7457414B1 (en) * | 2000-07-21 | 2008-11-25 | The Directv Group, Inc. | Super encrypted storage and retrieval of media programs with smartcard generated keys |
US7203314B1 (en) | 2000-07-21 | 2007-04-10 | The Directv Group, Inc. | Super encrypted storage and retrieval of media programs with modified conditional access functionality |
US6847719B1 (en) * | 2000-08-11 | 2005-01-25 | Eacceleration Corp. | Limiting receiver access to secure read-only communications over a network by preventing access to source-formatted plaintext |
IL153945A0 (en) | 2000-08-11 | 2003-07-31 | Nds Ltd | System and method for pre-encryption of transmitted content |
WO2002015578A1 (en) * | 2000-08-11 | 2002-02-21 | Nds Limited | System and method for pre-encryption of transmitted content |
US6976176B1 (en) * | 2000-09-08 | 2005-12-13 | Cisco Technology, Inc. | Method, device, and network for providing secure communication environments |
US20020042754A1 (en) * | 2000-10-10 | 2002-04-11 | Del Beccaro David J. | System and method for receiving broadcast audio/video works and for enabling a consumer to purchase the received audio/video works |
US7054256B2 (en) | 2000-10-20 | 2006-05-30 | Ochoa Optics Llc | High capacity digital data storage by transmission of radiant energy through arrays of small diameter holes |
US20020083438A1 (en) * | 2000-10-26 | 2002-06-27 | So Nicol Chung Pang | System for securely delivering encrypted content on demand with access contrl |
US7080397B2 (en) * | 2000-10-26 | 2006-07-18 | General Instrument Corporation | Communication protocol for content on demand system with callback time |
WO2002047388A2 (en) | 2000-11-14 | 2002-06-13 | Scientific-Atlanta, Inc. | Networked subscriber television distribution |
US8127326B2 (en) | 2000-11-14 | 2012-02-28 | Claussen Paul J | Proximity detection using wireless connectivity in a communications system |
US20020069419A1 (en) * | 2000-12-01 | 2002-06-06 | Pierre-Guillaume Raverdy | System and method for streaming video information to a user device |
US20030031138A1 (en) * | 2000-12-12 | 2003-02-13 | Beckwith Robert W. | Wireless transceivers using a simplified prism II system |
US7870592B2 (en) | 2000-12-14 | 2011-01-11 | Intertainer, Inc. | Method for interactive video content programming |
US20020083006A1 (en) * | 2000-12-14 | 2002-06-27 | Intertainer, Inc. | Systems and methods for delivering media content |
JP2002261747A (en) * | 2000-12-28 | 2002-09-13 | Sony Corp | Data distribution method and distribution system |
JP4752113B2 (en) * | 2001-01-16 | 2011-08-17 | ソニー株式会社 | Electronic device and signal transmission method |
AU2002236807A1 (en) * | 2001-01-18 | 2002-07-30 | Madstone Films | A method and system providing a digital cinema distribution network having backchannel feedback |
US20020112243A1 (en) * | 2001-02-12 | 2002-08-15 | World Theatre | Video distribution system |
US8112311B2 (en) | 2001-02-12 | 2012-02-07 | Ochoa Optics Llc | Systems and methods for distribution of entertainment and advertising content |
US20020114360A1 (en) * | 2001-02-20 | 2002-08-22 | Perlman Stephen G. | System and method for processing multiple broadcast multimedia streams |
US20020144283A1 (en) * | 2001-03-30 | 2002-10-03 | Intertainer, Inc. | Content distribution system |
US20020143647A1 (en) * | 2001-03-30 | 2002-10-03 | Intertainer, Inc. | Subscriber management system |
US6925469B2 (en) * | 2001-03-30 | 2005-08-02 | Intertainer, Inc. | Digital entertainment service platform |
US8707357B1 (en) | 2001-04-23 | 2014-04-22 | Starz Entertainment, Llc | Thematic VOD navigation |
US7386129B2 (en) * | 2001-05-30 | 2008-06-10 | Digeo, Inc. | System and method for multimedia content simulcast |
US7093277B2 (en) * | 2001-05-30 | 2006-08-15 | Digeo, Inc. | System and method for improved multi-stream multimedia transmission and processing |
US7139398B2 (en) * | 2001-06-06 | 2006-11-21 | Sony Corporation | Time division partial encryption |
US7350082B2 (en) * | 2001-06-06 | 2008-03-25 | Sony Corporation | Upgrading of encryption |
US7895616B2 (en) | 2001-06-06 | 2011-02-22 | Sony Corporation | Reconstitution of program streams split across multiple packet identifiers |
US7747853B2 (en) | 2001-06-06 | 2010-06-29 | Sony Corporation | IP delivery of secure digital content |
EP1271951A1 (en) * | 2001-06-22 | 2003-01-02 | Octalis S.A. | Conditional access system for digital data by key decryption and re-encryption |
US7383561B2 (en) * | 2001-06-29 | 2008-06-03 | Nokia Corporation | Conditional access system |
US7298849B2 (en) * | 2001-06-29 | 2007-11-20 | Intel Corporation | Method and apparatus for simultaneous encryption and decryption of publicly distributed media |
US7463737B2 (en) | 2001-08-15 | 2008-12-09 | Digeo, Inc. | System and method for conditional access key encryption |
US7960005B2 (en) * | 2001-09-14 | 2011-06-14 | Ochoa Optics Llc | Broadcast distribution of content for storage on hardware protected optical storage media |
US7039955B2 (en) | 2001-09-14 | 2006-05-02 | The Directv Group, Inc. | Embedded blacklisting for digital broadcast system security |
EP1436943B1 (en) | 2001-09-21 | 2016-11-02 | The DIRECTV Group, Inc. | Method and apparatus for controlling paired operation of a conditional access module and an integrated receiver and decoder |
US7409562B2 (en) * | 2001-09-21 | 2008-08-05 | The Directv Group, Inc. | Method and apparatus for encrypting media programs for later purchase and viewing |
US7233781B2 (en) | 2001-10-10 | 2007-06-19 | Ochoa Optics Llc | System and method for emergency notification content delivery |
US20030084171A1 (en) * | 2001-10-29 | 2003-05-01 | Sun Microsystems, Inc., A Delaware Corporation | User access control to distributed resources on a data communications network |
US20030093515A1 (en) * | 2001-11-14 | 2003-05-15 | Kauffman Marc W. | Quality of service control of streamed content delivery |
US7739707B2 (en) * | 2001-11-20 | 2010-06-15 | Starz Entertainment, Llc | Parental controls using view limits |
US7464392B2 (en) * | 2001-11-20 | 2008-12-09 | Starz Encore Group Llc | Viewing limit controls |
US8312265B2 (en) * | 2001-12-11 | 2012-11-13 | Pinder Howard G | Encrypting received content |
US7039938B2 (en) * | 2002-01-02 | 2006-05-02 | Sony Corporation | Selective encryption for video on demand |
US7233669B2 (en) * | 2002-01-02 | 2007-06-19 | Sony Corporation | Selective encryption to enable multiple decryption keys |
US7242773B2 (en) * | 2002-09-09 | 2007-07-10 | Sony Corporation | Multiple partial encryption using retuning |
US7292690B2 (en) | 2002-01-02 | 2007-11-06 | Sony Corporation | Video scene change detection |
US7215770B2 (en) * | 2002-01-02 | 2007-05-08 | Sony Corporation | System and method for partially encrypted multimedia stream |
US7765567B2 (en) | 2002-01-02 | 2010-07-27 | Sony Corporation | Content replacement by PID mapping |
US7376233B2 (en) * | 2002-01-02 | 2008-05-20 | Sony Corporation | Video slice and active region based multiple partial encryption |
US7302059B2 (en) * | 2002-01-02 | 2007-11-27 | Sony Corporation | Star pattern partial encryption |
US7292691B2 (en) * | 2002-01-02 | 2007-11-06 | Sony Corporation | Progressive video refresh slice detection |
US7218738B2 (en) * | 2002-01-02 | 2007-05-15 | Sony Corporation | Encryption and content control in a digital broadcast system |
US7823174B2 (en) | 2002-01-02 | 2010-10-26 | Sony Corporation | Macro-block based content replacement by PID mapping |
US7155012B2 (en) * | 2002-01-02 | 2006-12-26 | Sony Corporation | Slice mask and moat pattern partial encryption |
WO2003061173A2 (en) * | 2002-01-02 | 2003-07-24 | Sony Electronics Inc. | Elementary stream partial encryption |
US7617295B1 (en) | 2002-03-18 | 2009-11-10 | Music Choice | Systems and methods for providing a broadcast entertainment service and an on-demand entertainment service |
US7793323B2 (en) * | 2002-04-29 | 2010-09-07 | The Boeing Company | Digital cinema system hub for multiple exhibitor distribution |
US7181010B2 (en) * | 2002-05-24 | 2007-02-20 | Scientific-Atlanta, Inc. | Apparatus for entitling remote client devices |
US7861082B2 (en) * | 2002-05-24 | 2010-12-28 | Pinder Howard G | Validating client-receivers |
US7530084B2 (en) * | 2002-05-28 | 2009-05-05 | Sony Corporation | Method and apparatus for synchronizing dynamic graphics |
US20090180025A1 (en) * | 2002-05-28 | 2009-07-16 | Sony Corporation | Method and apparatus for overlaying graphics on video |
EP1383327B1 (en) * | 2002-06-11 | 2013-12-25 | Panasonic Corporation | Content distributing system and data-communication controlling device |
US20040268410A1 (en) * | 2003-06-11 | 2004-12-30 | Starz Encore Group Llc | Subscription video on demand delivery |
US7516470B2 (en) | 2002-08-02 | 2009-04-07 | Cisco Technology, Inc. | Locally-updated interactive program guide |
CN102737180A (en) * | 2002-08-08 | 2012-10-17 | 晟碟以色列有限公司 | Integrated circuit for digital rights management |
US8272020B2 (en) * | 2002-08-17 | 2012-09-18 | Disney Enterprises, Inc. | System for the delivery and dynamic presentation of large media assets over bandwidth constrained networks |
EP1530880A4 (en) * | 2002-08-21 | 2005-12-28 | Disney Entpr Inc | Digital home movie library |
US8818896B2 (en) | 2002-09-09 | 2014-08-26 | Sony Corporation | Selective encryption with coverage encryption |
US20040068754A1 (en) * | 2002-10-02 | 2004-04-08 | Russ Samuel H. | Expandable tuning capability |
US7908625B2 (en) | 2002-10-02 | 2011-03-15 | Robertson Neil C | Networked multimedia system |
US20040068752A1 (en) * | 2002-10-02 | 2004-04-08 | Parker Leslie T. | Systems and methods for providing television signals to multiple televisions located at a customer premises |
US20040068739A1 (en) * | 2002-10-04 | 2004-04-08 | Russ Samuel H. | Networked multimedia system having a multi-room interactive network guide |
US20040133911A1 (en) * | 2002-10-04 | 2004-07-08 | Russ Samuel H. | Subscriber network in a satellite system |
US7545935B2 (en) * | 2002-10-04 | 2009-06-09 | Scientific-Atlanta, Inc. | Networked multimedia overlay system |
US20050155052A1 (en) * | 2002-10-04 | 2005-07-14 | Barbara Ostrowska | Parental control for a networked multiroom system |
US8046806B2 (en) | 2002-10-04 | 2011-10-25 | Wall William E | Multiroom point of deployment module |
US7360235B2 (en) | 2002-10-04 | 2008-04-15 | Scientific-Atlanta, Inc. | Systems and methods for operating a peripheral record/playback device in a networked multimedia system |
US7724907B2 (en) | 2002-11-05 | 2010-05-25 | Sony Corporation | Mechanism for protecting the transfer of digital content |
US8572408B2 (en) | 2002-11-05 | 2013-10-29 | Sony Corporation | Digital rights management of a digital device |
US20040091110A1 (en) * | 2002-11-08 | 2004-05-13 | Anthony Christian Barkans | Copy protected display screen |
US7000241B2 (en) * | 2002-11-21 | 2006-02-14 | The Directv Group, Inc. | Method and apparatus for minimizing conditional access information overhead while ensuring conditional access information reception in multi-tuner receivers |
US7225458B2 (en) * | 2002-11-21 | 2007-05-29 | The Directv Group, Inc. | Method and apparatus for ensuring reception of conditional access information in multi-tuner receivers |
US7046677B2 (en) * | 2002-11-27 | 2006-05-16 | Rgb Networks, Inc. | Method and apparatus for time-multiplexed processing of multiple digital video programs |
US8667525B2 (en) | 2002-12-13 | 2014-03-04 | Sony Corporation | Targeted advertisement selection from a digital stream |
US8645988B2 (en) | 2002-12-13 | 2014-02-04 | Sony Corporation | Content personalization for digital content |
US7487532B2 (en) | 2003-01-15 | 2009-02-03 | Cisco Technology, Inc. | Optimization of a full duplex wideband communications system |
US8094640B2 (en) | 2003-01-15 | 2012-01-10 | Robertson Neil C | Full duplex wideband communications system for a local coaxial network |
US20040162780A1 (en) * | 2003-02-19 | 2004-08-19 | General Instrument Corporation | Methods and apparatus for integrating one-way and two-way security systems to enable secure distribution of encrypted services |
US7626609B1 (en) | 2003-03-07 | 2009-12-01 | Music Choice | Method and system for displaying content while reducing burn-in of a display |
JPWO2004079987A1 (en) * | 2003-03-07 | 2006-06-08 | シャープ株式会社 | ENCRYPTION CODE MANAGEMENT SYSTEM, DATA PROCESSING DEVICE, AND ELECTRONIC DEVICE |
US7158169B1 (en) | 2003-03-07 | 2007-01-02 | Music Choice | Method and system for displaying content while reducing burn-in of a display |
US7409702B2 (en) * | 2003-03-20 | 2008-08-05 | Sony Corporation | Auxiliary program association table |
US7292692B2 (en) * | 2003-03-25 | 2007-11-06 | Sony Corporation | Content scrambling with minimal impact on legacy devices |
CA2523343A1 (en) * | 2003-04-21 | 2004-11-04 | Rgb Networks, Inc. | Time-multiplexed multi-program encryption system |
US7426637B2 (en) * | 2003-05-21 | 2008-09-16 | Music Public Broadcasting, Inc. | Method and system for controlled media sharing in a network |
US20060051060A1 (en) * | 2003-07-03 | 2006-03-09 | Henry Dorovanessian | Method and system for digitally recording broadcast content |
TW200509637A (en) * | 2003-07-14 | 2005-03-01 | Nagravision Sa | Method to create and manage a local network |
US20050036067A1 (en) * | 2003-08-05 | 2005-02-17 | Ryal Kim Annon | Variable perspective view of video images |
CN101065963B (en) * | 2003-08-29 | 2010-09-15 | Rgb网络有限公司 | Video multiplexer system providing low-latency VCR-like effects and program changes |
US20050066357A1 (en) * | 2003-09-22 | 2005-03-24 | Ryal Kim Annon | Modifying content rating |
US7343013B2 (en) * | 2003-12-16 | 2008-03-11 | Sony Corporation | Composite session-based encryption of video on demand content |
US7263187B2 (en) * | 2003-10-31 | 2007-08-28 | Sony Corporation | Batch mode session-based encryption of video on demand content |
US7346163B2 (en) * | 2003-10-31 | 2008-03-18 | Sony Corporation | Dynamic composition of pre-encrypted video on demand content |
US7620180B2 (en) * | 2003-11-03 | 2009-11-17 | Sony Corporation | Preparation of content for multiple conditional access methods in video on demand |
US20050097597A1 (en) * | 2003-10-31 | 2005-05-05 | Pedlow Leo M.Jr. | Hybrid storage of video on demand content |
US7853980B2 (en) | 2003-10-31 | 2010-12-14 | Sony Corporation | Bi-directional indices for trick mode video-on-demand |
US20050097596A1 (en) * | 2003-10-31 | 2005-05-05 | Pedlow Leo M.Jr. | Re-encrypted delivery of video-on-demand content |
US20050102702A1 (en) * | 2003-11-12 | 2005-05-12 | Candelore Brant L. | Cablecard with content manipulation |
US7580523B2 (en) * | 2004-01-16 | 2009-08-25 | The Directv Group, Inc. | Distribution of video content using client to host pairing of integrated receivers/decoders |
US7548624B2 (en) * | 2004-01-16 | 2009-06-16 | The Directv Group, Inc. | Distribution of broadcast content for remote decryption and viewing |
US7599494B2 (en) * | 2004-01-16 | 2009-10-06 | The Directv Group, Inc. | Distribution of video content using a trusted network key for sharing content |
US20050169473A1 (en) * | 2004-02-03 | 2005-08-04 | Candelore Brant L. | Multiple selective encryption with DRM |
US7801303B2 (en) | 2004-03-01 | 2010-09-21 | The Directv Group, Inc. | Video on demand in a broadcast network |
US20050216941A1 (en) * | 2004-03-26 | 2005-09-29 | Primedia Workplace Learning, Lp | System and method for controlling video-on-demand content |
US7590243B2 (en) * | 2004-05-04 | 2009-09-15 | The Directv Group, Inc. | Digital media conditional access system for handling digital media content |
US20060013557A1 (en) * | 2004-07-01 | 2006-01-19 | Thomas Poslinski | Suppression of trick modes in commercial playback |
US20060013556A1 (en) * | 2004-07-01 | 2006-01-19 | Thomas Poslinski | Commercial information and guide |
US20060013555A1 (en) * | 2004-07-01 | 2006-01-19 | Thomas Poslinski | Commercial progress bar |
US20060013554A1 (en) * | 2004-07-01 | 2006-01-19 | Thomas Poslinski | Commercial storage and retrieval |
US7543317B2 (en) | 2004-08-17 | 2009-06-02 | The Directv Group, Inc. | Service activation of set-top box functionality using broadcast conditional access system |
US20060044589A1 (en) * | 2004-08-26 | 2006-03-02 | Shuichi Nakagawaji | Printing device and method for printing |
US7529845B2 (en) * | 2004-09-15 | 2009-05-05 | Nokia Corporation | Compressing, filtering, and transmitting of protocol messages via a protocol-aware intermediary node |
US7478247B2 (en) * | 2004-11-10 | 2009-01-13 | Hillcrest Laboratories, Inc. | Methods and systems for securing data processing devices |
US7751324B2 (en) | 2004-11-19 | 2010-07-06 | Nokia Corporation | Packet stream arrangement in multimedia transmission |
US20060117354A1 (en) * | 2004-11-29 | 2006-06-01 | Mark Schutte | Consolidating video-on-demand (VOD) services with multi-room personal video recording (MR-PVR) services |
US7895617B2 (en) | 2004-12-15 | 2011-02-22 | Sony Corporation | Content substitution editor |
US8041190B2 (en) | 2004-12-15 | 2011-10-18 | Sony Corporation | System and method for the creation, synchronization and delivery of alternate content |
EP1672831A1 (en) * | 2004-12-16 | 2006-06-21 | Nagravision S.A. | Method for transmission of digital data in a local network |
US20070143776A1 (en) * | 2005-03-01 | 2007-06-21 | Russ Samuel H | Viewer data collection in a multi-room network |
US20060218581A1 (en) * | 2005-03-01 | 2006-09-28 | Barbara Ostrowska | Interactive network guide with parental monitoring |
US20060225105A1 (en) * | 2005-04-05 | 2006-10-05 | Scientific-Atlanta, Inc. | Networked multi-room system ad insertion |
US8825551B2 (en) * | 2005-04-21 | 2014-09-02 | Google Technology Holdings LLC | Digital rights management for local recording and home network distribution |
US8584171B2 (en) * | 2005-05-06 | 2013-11-12 | Starz Entertainment Group Llc | Local context navigation system |
US8037501B2 (en) * | 2005-05-06 | 2011-10-11 | Starz Entertainment, Llc | Methods for entertainment-programming distribution |
US20060262928A1 (en) * | 2005-05-23 | 2006-11-23 | Hagai Bar-El | Method, device, and system of encrypting/decrypting data |
US7668538B2 (en) | 2005-06-15 | 2010-02-23 | Music Choice | Systems and methods for facilitating the acquisition of content |
US8074248B2 (en) | 2005-07-26 | 2011-12-06 | Activevideo Networks, Inc. | System and method for providing video content associated with a source image to a television in a communication network |
US9325944B2 (en) | 2005-08-11 | 2016-04-26 | The Directv Group, Inc. | Secure delivery of program content via a removable storage medium |
EP1915672A4 (en) * | 2005-08-18 | 2009-03-11 | Emc Corp | Compliance processing of rights managed data |
US20070055982A1 (en) * | 2005-09-02 | 2007-03-08 | Netgear Inc. | System and method for digital content media distribution |
US7876998B2 (en) | 2005-10-05 | 2011-01-25 | Wall William E | DVD playback over multi-room by copying to HDD |
US8185921B2 (en) | 2006-02-28 | 2012-05-22 | Sony Corporation | Parental control of displayed content using closed captioning |
US7555464B2 (en) * | 2006-03-01 | 2009-06-30 | Sony Corporation | Multiple DRM management |
US8208796B2 (en) * | 2006-04-17 | 2012-06-26 | Prus Bohdan S | Systems and methods for prioritizing the storage location of media data |
US7992175B2 (en) | 2006-05-15 | 2011-08-02 | The Directv Group, Inc. | Methods and apparatus to provide content on demand in content broadcast systems |
US20070265973A1 (en) * | 2006-05-15 | 2007-11-15 | The Directv Group, Inc. | Methods and apparatus to protect content in home networks |
US20070265966A1 (en) * | 2006-05-15 | 2007-11-15 | The Directv Group, Inc. | Content delivery systems and methods to operate the same |
US8775319B2 (en) | 2006-05-15 | 2014-07-08 | The Directv Group, Inc. | Secure content transfer systems and methods to operate the same |
US8095466B2 (en) | 2006-05-15 | 2012-01-10 | The Directv Group, Inc. | Methods and apparatus to conditionally authorize content delivery at content servers in pay delivery systems |
US8996421B2 (en) * | 2006-05-15 | 2015-03-31 | The Directv Group, Inc. | Methods and apparatus to conditionally authorize content delivery at broadcast headends in pay delivery systems |
US8001565B2 (en) | 2006-05-15 | 2011-08-16 | The Directv Group, Inc. | Methods and apparatus to conditionally authorize content delivery at receivers in pay delivery systems |
US20070282846A1 (en) * | 2006-05-30 | 2007-12-06 | Nortel Networks Limited | System and Method for Securely Partitioning a Media Library |
US9277295B2 (en) | 2006-06-16 | 2016-03-01 | Cisco Technology, Inc. | Securing media content using interchangeable encryption key |
US7716699B2 (en) * | 2006-06-29 | 2010-05-11 | Microsoft Corporation | Control and playback of media over network link |
US7978720B2 (en) * | 2006-06-30 | 2011-07-12 | Russ Samuel H | Digital media device having media content transfer capability |
US9137480B2 (en) * | 2006-06-30 | 2015-09-15 | Cisco Technology, Inc. | Secure escrow and recovery of media device content keys |
US20080022304A1 (en) * | 2006-06-30 | 2008-01-24 | Scientific-Atlanta, Inc. | Digital Media Device Having Selectable Media Content Storage Locations |
US9225761B2 (en) | 2006-08-04 | 2015-12-29 | The Directv Group, Inc. | Distributed media-aggregation systems and methods to operate the same |
US9178693B2 (en) | 2006-08-04 | 2015-11-03 | The Directv Group, Inc. | Distributed media-protection systems and methods to operate the same |
WO2008044916A2 (en) * | 2006-09-29 | 2008-04-17 | Avinity Systems B.V. | Method for streaming parallel user sessions, system and computer software |
US20080154775A1 (en) * | 2006-12-22 | 2008-06-26 | Nortel Networks Limited | Re-encrypting encrypted content on a video-on-demand system |
US9042454B2 (en) * | 2007-01-12 | 2015-05-26 | Activevideo Networks, Inc. | Interactive encoded content system including object models for viewing on a remote device |
US9826197B2 (en) * | 2007-01-12 | 2017-11-21 | Activevideo Networks, Inc. | Providing television broadcasts over a managed network and interactive content over an unmanaged network to a client device |
US20080201736A1 (en) * | 2007-01-12 | 2008-08-21 | Ictv, Inc. | Using Triggers with Video for Interactive Content Identification |
US8233425B2 (en) * | 2007-03-30 | 2012-07-31 | Livetv, Llc | Aircraft communications system selectively allocating data communications channel capacity and associated methods |
US9456054B2 (en) | 2008-05-16 | 2016-09-27 | Palo Alto Research Center Incorporated | Controlling the spread of interests and content in a content centric network |
EP2304953A4 (en) * | 2008-06-25 | 2012-11-28 | Activevideo Networks Inc | Providing television broadcasts over a managed network and interactive content over an unmanaged network to a client device |
US8667279B2 (en) | 2008-07-01 | 2014-03-04 | Sling Media, Inc. | Systems and methods for securely place shifting media content |
CN102144237B (en) | 2008-07-03 | 2014-10-22 | 美国唯美安视国际有限公司 | Efficient watermarking approaches of compressed media |
US20110197219A1 (en) * | 2008-08-06 | 2011-08-11 | Nxp B.V. | Wireless video distribution |
US8381310B2 (en) | 2009-08-13 | 2013-02-19 | Sling Media Pvt. Ltd. | Systems, methods, and program applications for selectively restricting the placeshifting of copy protected digital media content |
US8589993B2 (en) * | 2008-08-29 | 2013-11-19 | At&T Intellectual Property I, L.P. | Distributing on-demand multimedia content |
US20100061709A1 (en) * | 2008-09-05 | 2010-03-11 | Davender Agnihotri | Ad Menu for skipped advertisements |
US9160974B2 (en) * | 2009-08-26 | 2015-10-13 | Sling Media, Inc. | Systems and methods for transcoding and place shifting media content |
US8923293B2 (en) | 2009-10-21 | 2014-12-30 | Palo Alto Research Center Incorporated | Adaptive multi-interface use for content networking |
CA2814070A1 (en) | 2010-10-14 | 2012-04-19 | Activevideo Networks, Inc. | Streaming digital video between video devices using a cable television system |
US9729902B2 (en) * | 2011-01-06 | 2017-08-08 | Cox Communications, Inc. | System and method for providing session based encryption from a video pump |
WO2012138660A2 (en) | 2011-04-07 | 2012-10-11 | Activevideo Networks, Inc. | Reduction of latency in video distribution networks using adaptive bit rates |
WO2012145762A2 (en) * | 2011-04-21 | 2012-10-26 | Vikram Jandhyala | Systems and methods for protecting data for server-based computations |
EP2815582B1 (en) | 2012-01-09 | 2019-09-04 | ActiveVideo Networks, Inc. | Rendering of an interactive lean-backward user interface on a television |
US9123084B2 (en) | 2012-04-12 | 2015-09-01 | Activevideo Networks, Inc. | Graphical application integration with MPEG objects |
US9197937B1 (en) | 2012-04-26 | 2015-11-24 | Music Choice | Automatic on-demand navigation based on meta-data broadcast with media content |
US8917868B2 (en) * | 2012-08-22 | 2014-12-23 | Vixs Systems, Inc. | Adaptable encryption device and methods for use therewith |
US9280546B2 (en) | 2012-10-31 | 2016-03-08 | Palo Alto Research Center Incorporated | System and method for accessing digital content using a location-independent name |
US9400800B2 (en) | 2012-11-19 | 2016-07-26 | Palo Alto Research Center Incorporated | Data transport by named content synchronization |
US10430839B2 (en) | 2012-12-12 | 2019-10-01 | Cisco Technology, Inc. | Distributed advertisement insertion in content-centric networks |
WO2014145921A1 (en) | 2013-03-15 | 2014-09-18 | Activevideo Networks, Inc. | A multiple-mode system and method for providing user selectable video content |
US9978025B2 (en) | 2013-03-20 | 2018-05-22 | Cisco Technology, Inc. | Ordered-element naming for name-based packet forwarding |
US9935791B2 (en) | 2013-05-20 | 2018-04-03 | Cisco Technology, Inc. | Method and system for name resolution across heterogeneous architectures |
US9294785B2 (en) | 2013-06-06 | 2016-03-22 | Activevideo Networks, Inc. | System and method for exploiting scene graph information in construction of an encoded video sequence |
US9219922B2 (en) | 2013-06-06 | 2015-12-22 | Activevideo Networks, Inc. | System and method for exploiting scene graph information in construction of an encoded video sequence |
EP3005712A1 (en) | 2013-06-06 | 2016-04-13 | ActiveVideo Networks, Inc. | Overlay rendering of user interface onto source video |
US9444722B2 (en) | 2013-08-01 | 2016-09-13 | Palo Alto Research Center Incorporated | Method and apparatus for configuring routing paths in a custodian-based routing architecture |
US9407549B2 (en) | 2013-10-29 | 2016-08-02 | Palo Alto Research Center Incorporated | System and method for hash-based forwarding of packets with hierarchically structured variable-length identifiers |
US9276840B2 (en) | 2013-10-30 | 2016-03-01 | Palo Alto Research Center Incorporated | Interest messages with a payload for a named data network |
US9282050B2 (en) | 2013-10-30 | 2016-03-08 | Palo Alto Research Center Incorporated | System and method for minimum path MTU discovery in content centric networks |
US9401864B2 (en) | 2013-10-31 | 2016-07-26 | Palo Alto Research Center Incorporated | Express header for packets with hierarchically structured variable-length identifiers |
US9311377B2 (en) | 2013-11-13 | 2016-04-12 | Palo Alto Research Center Incorporated | Method and apparatus for performing server handoff in a name-based content distribution system |
US10101801B2 (en) | 2013-11-13 | 2018-10-16 | Cisco Technology, Inc. | Method and apparatus for prefetching content in a data stream |
US10129365B2 (en) | 2013-11-13 | 2018-11-13 | Cisco Technology, Inc. | Method and apparatus for pre-fetching remote content based on static and dynamic recommendations |
US10089655B2 (en) | 2013-11-27 | 2018-10-02 | Cisco Technology, Inc. | Method and apparatus for scalable data broadcasting |
US9503358B2 (en) | 2013-12-05 | 2016-11-22 | Palo Alto Research Center Incorporated | Distance-based routing in an information-centric network |
US9379979B2 (en) | 2014-01-14 | 2016-06-28 | Palo Alto Research Center Incorporated | Method and apparatus for establishing a virtual interface for a set of mutual-listener devices |
US10172068B2 (en) | 2014-01-22 | 2019-01-01 | Cisco Technology, Inc. | Service-oriented routing in software-defined MANETs |
US10098051B2 (en) | 2014-01-22 | 2018-10-09 | Cisco Technology, Inc. | Gateways and routing in software-defined manets |
US9374304B2 (en) | 2014-01-24 | 2016-06-21 | Palo Alto Research Center Incorporated | End-to end route tracing over a named-data network |
US9954678B2 (en) * | 2014-02-06 | 2018-04-24 | Cisco Technology, Inc. | Content-based transport security |
US9531679B2 (en) | 2014-02-06 | 2016-12-27 | Palo Alto Research Center Incorporated | Content-based transport security for distributed producers |
US9678998B2 (en) | 2014-02-28 | 2017-06-13 | Cisco Technology, Inc. | Content name resolution for information centric networking |
US10089651B2 (en) | 2014-03-03 | 2018-10-02 | Cisco Technology, Inc. | Method and apparatus for streaming advertisements in a scalable data broadcasting system |
US9836540B2 (en) | 2014-03-04 | 2017-12-05 | Cisco Technology, Inc. | System and method for direct storage access in a content-centric network |
US9391896B2 (en) | 2014-03-10 | 2016-07-12 | Palo Alto Research Center Incorporated | System and method for packet forwarding using a conjunctive normal form strategy in a content-centric network |
US9473405B2 (en) | 2014-03-10 | 2016-10-18 | Palo Alto Research Center Incorporated | Concurrent hashes and sub-hashes on data streams |
US9626413B2 (en) | 2014-03-10 | 2017-04-18 | Cisco Systems, Inc. | System and method for ranking content popularity in a content-centric network |
US9407432B2 (en) * | 2014-03-19 | 2016-08-02 | Palo Alto Research Center Incorporated | System and method for efficient and secure distribution of digital content |
US9916601B2 (en) | 2014-03-21 | 2018-03-13 | Cisco Technology, Inc. | Marketplace for presenting advertisements in a scalable data broadcasting system |
US9363179B2 (en) | 2014-03-26 | 2016-06-07 | Palo Alto Research Center Incorporated | Multi-publisher routing protocol for named data networks |
US9363086B2 (en) | 2014-03-31 | 2016-06-07 | Palo Alto Research Center Incorporated | Aggregate signing of data in content centric networking |
US9716622B2 (en) | 2014-04-01 | 2017-07-25 | Cisco Technology, Inc. | System and method for dynamic name configuration in content-centric networks |
US9390289B2 (en) | 2014-04-07 | 2016-07-12 | Palo Alto Research Center Incorporated | Secure collection synchronization using matched network names |
US10075521B2 (en) | 2014-04-07 | 2018-09-11 | Cisco Technology, Inc. | Collection synchronization using equality matched network names |
US9473576B2 (en) | 2014-04-07 | 2016-10-18 | Palo Alto Research Center Incorporated | Service discovery using collection synchronization with exact names |
US9451032B2 (en) | 2014-04-10 | 2016-09-20 | Palo Alto Research Center Incorporated | System and method for simple service discovery in content-centric networks |
US9992281B2 (en) | 2014-05-01 | 2018-06-05 | Cisco Technology, Inc. | Accountable content stores for information centric networks |
US9609014B2 (en) | 2014-05-22 | 2017-03-28 | Cisco Systems, Inc. | Method and apparatus for preventing insertion of malicious content at a named data network router |
US9455835B2 (en) | 2014-05-23 | 2016-09-27 | Palo Alto Research Center Incorporated | System and method for circular link resolution with hash-based names in content-centric networks |
US9276751B2 (en) | 2014-05-28 | 2016-03-01 | Palo Alto Research Center Incorporated | System and method for circular link resolution with computable hash-based names in content-centric networks |
US9516144B2 (en) | 2014-06-19 | 2016-12-06 | Palo Alto Research Center Incorporated | Cut-through forwarding of CCNx message fragments with IP encapsulation |
US9467377B2 (en) | 2014-06-19 | 2016-10-11 | Palo Alto Research Center Incorporated | Associating consumer states with interests in a content-centric network |
US9537719B2 (en) | 2014-06-19 | 2017-01-03 | Palo Alto Research Center Incorporated | Method and apparatus for deploying a minimal-cost CCN topology |
US9426113B2 (en) | 2014-06-30 | 2016-08-23 | Palo Alto Research Center Incorporated | System and method for managing devices over a content centric network |
US9699198B2 (en) | 2014-07-07 | 2017-07-04 | Cisco Technology, Inc. | System and method for parallel secure content bootstrapping in content-centric networks |
US9621354B2 (en) | 2014-07-17 | 2017-04-11 | Cisco Systems, Inc. | Reconstructable content objects |
US9959156B2 (en) | 2014-07-17 | 2018-05-01 | Cisco Technology, Inc. | Interest return control message |
US9729616B2 (en) | 2014-07-18 | 2017-08-08 | Cisco Technology, Inc. | Reputation-based strategy for forwarding and responding to interests over a content centric network |
US9590887B2 (en) | 2014-07-18 | 2017-03-07 | Cisco Systems, Inc. | Method and system for keeping interest alive in a content centric network |
US9535968B2 (en) | 2014-07-21 | 2017-01-03 | Palo Alto Research Center Incorporated | System for distributing nameless objects using self-certifying names |
US9882964B2 (en) | 2014-08-08 | 2018-01-30 | Cisco Technology, Inc. | Explicit strategy feedback in name-based forwarding |
US9729662B2 (en) | 2014-08-11 | 2017-08-08 | Cisco Technology, Inc. | Probabilistic lazy-forwarding technique without validation in a content centric network |
US9503365B2 (en) | 2014-08-11 | 2016-11-22 | Palo Alto Research Center Incorporated | Reputation-based instruction processing over an information centric network |
US9391777B2 (en) | 2014-08-15 | 2016-07-12 | Palo Alto Research Center Incorporated | System and method for performing key resolution over a content centric network |
US9800637B2 (en) | 2014-08-19 | 2017-10-24 | Cisco Technology, Inc. | System and method for all-in-one content stream in content-centric networks |
US9467492B2 (en) | 2014-08-19 | 2016-10-11 | Palo Alto Research Center Incorporated | System and method for reconstructable all-in-one content stream |
US9497282B2 (en) | 2014-08-27 | 2016-11-15 | Palo Alto Research Center Incorporated | Network coding for content-centric network |
US10204013B2 (en) | 2014-09-03 | 2019-02-12 | Cisco Technology, Inc. | System and method for maintaining a distributed and fault-tolerant state over an information centric network |
US9553812B2 (en) | 2014-09-09 | 2017-01-24 | Palo Alto Research Center Incorporated | Interest keep alives at intermediate routers in a CCN |
US10069933B2 (en) | 2014-10-23 | 2018-09-04 | Cisco Technology, Inc. | System and method for creating virtual interfaces based on network characteristics |
US10219027B1 (en) | 2014-10-24 | 2019-02-26 | Music Choice | System for providing music content to a user |
US9536059B2 (en) | 2014-12-15 | 2017-01-03 | Palo Alto Research Center Incorporated | Method and system for verifying renamed content using manifests in a content centric network |
US9590948B2 (en) | 2014-12-15 | 2017-03-07 | Cisco Systems, Inc. | CCN routing using hardware-assisted hash tables |
US10237189B2 (en) | 2014-12-16 | 2019-03-19 | Cisco Technology, Inc. | System and method for distance-based interest forwarding |
US9846881B2 (en) | 2014-12-19 | 2017-12-19 | Palo Alto Research Center Incorporated | Frugal user engagement help systems |
US10003520B2 (en) | 2014-12-22 | 2018-06-19 | Cisco Technology, Inc. | System and method for efficient name-based content routing using link-state information in information-centric networks |
US9473475B2 (en) | 2014-12-22 | 2016-10-18 | Palo Alto Research Center Incorporated | Low-cost authenticated signing delegation in content centric networking |
US9660825B2 (en) | 2014-12-24 | 2017-05-23 | Cisco Technology, Inc. | System and method for multi-source multicasting in content-centric networks |
US9916457B2 (en) | 2015-01-12 | 2018-03-13 | Cisco Technology, Inc. | Decoupled name security binding for CCN objects |
US9954795B2 (en) | 2015-01-12 | 2018-04-24 | Cisco Technology, Inc. | Resource allocation using CCN manifests |
US9832291B2 (en) | 2015-01-12 | 2017-11-28 | Cisco Technology, Inc. | Auto-configurable transport stack |
US9946743B2 (en) | 2015-01-12 | 2018-04-17 | Cisco Technology, Inc. | Order encoded manifests in a content centric network |
US9602596B2 (en) | 2015-01-12 | 2017-03-21 | Cisco Systems, Inc. | Peer-to-peer sharing in a content centric network |
US9462006B2 (en) | 2015-01-21 | 2016-10-04 | Palo Alto Research Center Incorporated | Network-layer application-specific trust model |
US9552493B2 (en) | 2015-02-03 | 2017-01-24 | Palo Alto Research Center Incorporated | Access control framework for information centric networking |
US10333840B2 (en) | 2015-02-06 | 2019-06-25 | Cisco Technology, Inc. | System and method for on-demand content exchange with adaptive naming in information-centric networks |
US10075401B2 (en) | 2015-03-18 | 2018-09-11 | Cisco Technology, Inc. | Pending interest table behavior |
US10116605B2 (en) | 2015-06-22 | 2018-10-30 | Cisco Technology, Inc. | Transport stack name scheme and identity management |
US10075402B2 (en) | 2015-06-24 | 2018-09-11 | Cisco Technology, Inc. | Flexible command and control in content centric networks |
US10701038B2 (en) | 2015-07-27 | 2020-06-30 | Cisco Technology, Inc. | Content negotiation in a content centric network |
US9986034B2 (en) | 2015-08-03 | 2018-05-29 | Cisco Technology, Inc. | Transferring state in content centric network stacks |
US10610144B2 (en) | 2015-08-19 | 2020-04-07 | Palo Alto Research Center Incorporated | Interactive remote patient monitoring and condition management intervention system |
US9832123B2 (en) | 2015-09-11 | 2017-11-28 | Cisco Technology, Inc. | Network named fragments in a content centric network |
US10355999B2 (en) | 2015-09-23 | 2019-07-16 | Cisco Technology, Inc. | Flow control with network named fragments |
US9977809B2 (en) | 2015-09-24 | 2018-05-22 | Cisco Technology, Inc. | Information and data framework in a content centric network |
US10313227B2 (en) | 2015-09-24 | 2019-06-04 | Cisco Technology, Inc. | System and method for eliminating undetected interest looping in information-centric networks |
US10454820B2 (en) | 2015-09-29 | 2019-10-22 | Cisco Technology, Inc. | System and method for stateless information-centric networking |
US10263965B2 (en) | 2015-10-16 | 2019-04-16 | Cisco Technology, Inc. | Encrypted CCNx |
US9794238B2 (en) | 2015-10-29 | 2017-10-17 | Cisco Technology, Inc. | System for key exchange in a content centric network |
US10009446B2 (en) | 2015-11-02 | 2018-06-26 | Cisco Technology, Inc. | Header compression for CCN messages using dictionary learning |
US9807205B2 (en) | 2015-11-02 | 2017-10-31 | Cisco Technology, Inc. | Header compression for CCN messages using dictionary |
US10021222B2 (en) | 2015-11-04 | 2018-07-10 | Cisco Technology, Inc. | Bit-aligned header compression for CCN messages using dictionary |
US10097521B2 (en) | 2015-11-20 | 2018-10-09 | Cisco Technology, Inc. | Transparent encryption in a content centric network |
US9912776B2 (en) | 2015-12-02 | 2018-03-06 | Cisco Technology, Inc. | Explicit content deletion commands in a content centric network |
US10097346B2 (en) | 2015-12-09 | 2018-10-09 | Cisco Technology, Inc. | Key catalogs in a content centric network |
US10078062B2 (en) | 2015-12-15 | 2018-09-18 | Palo Alto Research Center Incorporated | Device health estimation by combining contextual information with sensor data |
US10257271B2 (en) | 2016-01-11 | 2019-04-09 | Cisco Technology, Inc. | Chandra-Toueg consensus in a content centric network |
US9949301B2 (en) | 2016-01-20 | 2018-04-17 | Palo Alto Research Center Incorporated | Methods for fast, secure and privacy-friendly internet connection discovery in wireless networks |
US10305864B2 (en) | 2016-01-25 | 2019-05-28 | Cisco Technology, Inc. | Method and system for interest encryption in a content centric network |
US10043016B2 (en) | 2016-02-29 | 2018-08-07 | Cisco Technology, Inc. | Method and system for name encryption agreement in a content centric network |
US10003507B2 (en) | 2016-03-04 | 2018-06-19 | Cisco Technology, Inc. | Transport session state protocol |
US10051071B2 (en) | 2016-03-04 | 2018-08-14 | Cisco Technology, Inc. | Method and system for collecting historical network information in a content centric network |
US10038633B2 (en) | 2016-03-04 | 2018-07-31 | Cisco Technology, Inc. | Protocol to query for historical network information in a content centric network |
US10742596B2 (en) | 2016-03-04 | 2020-08-11 | Cisco Technology, Inc. | Method and system for reducing a collision probability of hash-based names using a publisher identifier |
US9832116B2 (en) | 2016-03-14 | 2017-11-28 | Cisco Technology, Inc. | Adjusting entries in a forwarding information base in a content centric network |
US10212196B2 (en) | 2016-03-16 | 2019-02-19 | Cisco Technology, Inc. | Interface discovery and authentication in a name-based network |
US11436656B2 (en) | 2016-03-18 | 2022-09-06 | Palo Alto Research Center Incorporated | System and method for a real-time egocentric collaborative filter on large datasets |
US10067948B2 (en) | 2016-03-18 | 2018-09-04 | Cisco Technology, Inc. | Data deduping in content centric networking manifests |
US10091330B2 (en) | 2016-03-23 | 2018-10-02 | Cisco Technology, Inc. | Interest scheduling by an information and data framework in a content centric network |
US10033639B2 (en) | 2016-03-25 | 2018-07-24 | Cisco Technology, Inc. | System and method for routing packets in a content centric network using anonymous datagrams |
US10320760B2 (en) | 2016-04-01 | 2019-06-11 | Cisco Technology, Inc. | Method and system for mutating and caching content in a content centric network |
US9930146B2 (en) | 2016-04-04 | 2018-03-27 | Cisco Technology, Inc. | System and method for compressing content centric networking messages |
US10425503B2 (en) | 2016-04-07 | 2019-09-24 | Cisco Technology, Inc. | Shared pending interest table in a content centric network |
US10027578B2 (en) | 2016-04-11 | 2018-07-17 | Cisco Technology, Inc. | Method and system for routable prefix queries in a content centric network |
US10404450B2 (en) | 2016-05-02 | 2019-09-03 | Cisco Technology, Inc. | Schematized access control in a content centric network |
US10320675B2 (en) | 2016-05-04 | 2019-06-11 | Cisco Technology, Inc. | System and method for routing packets in a stateless content centric network |
US10547589B2 (en) | 2016-05-09 | 2020-01-28 | Cisco Technology, Inc. | System for implementing a small computer systems interface protocol over a content centric network |
US10063414B2 (en) | 2016-05-13 | 2018-08-28 | Cisco Technology, Inc. | Updating a transport stack in a content centric network |
US10084764B2 (en) | 2016-05-13 | 2018-09-25 | Cisco Technology, Inc. | System for a secure encryption proxy in a content centric network |
US10103989B2 (en) | 2016-06-13 | 2018-10-16 | Cisco Technology, Inc. | Content object return messages in a content centric network |
US10305865B2 (en) | 2016-06-21 | 2019-05-28 | Cisco Technology, Inc. | Permutation-based content encryption with manifests in a content centric network |
US10148572B2 (en) | 2016-06-27 | 2018-12-04 | Cisco Technology, Inc. | Method and system for interest groups in a content centric network |
US10009266B2 (en) | 2016-07-05 | 2018-06-26 | Cisco Technology, Inc. | Method and system for reference counted pending interest tables in a content centric network |
US9992097B2 (en) | 2016-07-11 | 2018-06-05 | Cisco Technology, Inc. | System and method for piggybacking routing information in interests in a content centric network |
US10122624B2 (en) | 2016-07-25 | 2018-11-06 | Cisco Technology, Inc. | System and method for ephemeral entries in a forwarding information base in a content centric network |
US10069729B2 (en) | 2016-08-08 | 2018-09-04 | Cisco Technology, Inc. | System and method for throttling traffic based on a forwarding information base in a content centric network |
US10956412B2 (en) | 2016-08-09 | 2021-03-23 | Cisco Technology, Inc. | Method and system for conjunctive normal form attribute matching in a content centric network |
US10033642B2 (en) | 2016-09-19 | 2018-07-24 | Cisco Technology, Inc. | System and method for making optimal routing decisions based on device-specific parameters in a content centric network |
US10212248B2 (en) | 2016-10-03 | 2019-02-19 | Cisco Technology, Inc. | Cache management on high availability routers in a content centric network |
US10447805B2 (en) | 2016-10-10 | 2019-10-15 | Cisco Technology, Inc. | Distributed consensus in a content centric network |
US10135948B2 (en) | 2016-10-31 | 2018-11-20 | Cisco Technology, Inc. | System and method for process migration in a content centric network |
US10243851B2 (en) | 2016-11-21 | 2019-03-26 | Cisco Technology, Inc. | System and method for forwarder connection information in a content centric network |
WO2018208997A1 (en) | 2017-05-09 | 2018-11-15 | Verimatrix, Inc. | Systems and methods of preparing multiple video streams for assembly with digital watermarking |
US10735828B2 (en) | 2017-10-24 | 2020-08-04 | Joe Edick | On-demand and real-time trailer generation systems and methods |
Family Cites Families (36)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4694490A (en) * | 1981-11-03 | 1987-09-15 | Harvey John C | Signal processing apparatus and methods |
US4690490A (en) * | 1983-09-27 | 1987-09-01 | Kei Mori | Light diverting device |
US4890319A (en) * | 1984-09-21 | 1989-12-26 | Scientific-Atlantic, Inc. | Method for controlling copying of protected information transmitted over a communications link |
US5132992A (en) * | 1991-01-07 | 1992-07-21 | Paul Yurt | Audio and video transmission and receiving system |
US5115467A (en) * | 1991-01-23 | 1992-05-19 | General Instrument Corporation | Signal encryption apparatus for generating common and distinct keys |
US5138659A (en) * | 1991-05-02 | 1992-08-11 | General Instrument Corporation | Conversion of television signal formats with retention of common control data stream |
US5600573A (en) * | 1992-12-09 | 1997-02-04 | Discovery Communications, Inc. | Operations center with video storage for a television program packaging and delivery system |
ES2152712T3 (en) | 1992-12-09 | 2001-02-01 | Discovery Communicat Inc | DISTRIBUTION SYSTEM OF TELEVISION PROGRAMS. |
US5504816A (en) * | 1994-02-02 | 1996-04-02 | Gi Corporation | Method and apparatus for controlling access to digital signals |
US5497420A (en) * | 1994-02-07 | 1996-03-05 | Le Groupe Vide/ otron Lte/ e | Cable TV system using passwords |
FI95756C (en) | 1994-03-21 | 1996-03-11 | Nokia Technology Gmbh | A method for encrypting and decrypting a bitstream containing digital information |
US5420866A (en) * | 1994-03-29 | 1995-05-30 | Scientific-Atlanta, Inc. | Methods for providing conditional access information to decoders in a packet-based multiplexed communications system |
US5521631A (en) * | 1994-05-25 | 1996-05-28 | Spectravision, Inc. | Interactive digital video services system with store and forward capabilities |
US5838792A (en) * | 1994-07-18 | 1998-11-17 | Bell Atlantic Network Services, Inc. | Computer system for centralized session key distribution, privacy enhanced messaging and information distribution using a split private key public cryptosystem |
US5557346A (en) * | 1994-08-11 | 1996-09-17 | Trusted Information Systems, Inc. | System and method for key escrow encryption |
JP3729529B2 (en) * | 1994-10-28 | 2005-12-21 | ソニー株式会社 | Digital signal transmission / reception system |
US5758257A (en) * | 1994-11-29 | 1998-05-26 | Herz; Frederick | System and method for scheduling broadcast of and access to video programs and other data using customer profiles |
EP0719045B1 (en) * | 1994-12-13 | 2003-10-29 | Mitsubishi Corporation | Crypt key system for secure electronic transactions |
US6424717B1 (en) * | 1995-04-03 | 2002-07-23 | Scientific-Atlanta, Inc. | Encryption devices for use in a conditional access system |
US5666487A (en) * | 1995-06-28 | 1997-09-09 | Bell Atlantic Network Services, Inc. | Network providing signals of different formats to a user by multplexing compressed broadband data with data of a different format into MPEG encoded data stream |
US5649283A (en) * | 1995-09-28 | 1997-07-15 | Lucent Technologies Inc. | Program verification for cable television at a consumer location |
US5999629A (en) * | 1995-10-31 | 1999-12-07 | Lucent Technologies Inc. | Data encryption security module |
JPH09139937A (en) * | 1995-11-14 | 1997-05-27 | Fujitsu Ltd | Moving image stream converter |
US6055314A (en) * | 1996-03-22 | 2000-04-25 | Microsoft Corporation | System and method for secure purchase and delivery of video content programs |
US5933620A (en) * | 1996-03-28 | 1999-08-03 | Advanced Micro Devices, Inc. | Method and apparatus for serializing microprocessor identification numbers |
US6289314B1 (en) * | 1996-09-18 | 2001-09-11 | Matsushita Electric Industrial Co., Ltd. | Pay information providing system for descrambling information from plural sources and rescrambling the information before sending to a terminal or terminals |
US6236727B1 (en) * | 1997-06-24 | 2001-05-22 | International Business Machines Corporation | Apparatus, method and computer program product for protecting copyright data within a computer system |
JP3657396B2 (en) * | 1997-07-07 | 2005-06-08 | 株式会社日立製作所 | Key management system, key management apparatus, information encryption apparatus, information decryption apparatus, and storage medium storing program |
EP0912052A1 (en) | 1997-09-25 | 1999-04-28 | CANAL+ Société Anonyme | Method and apparatus for recording of encrypted digital data |
US7301944B1 (en) * | 1997-10-24 | 2007-11-27 | Tranz-Send Broadcasting Network, Inc. | Media file distribution with adaptive transmission protocols |
US6184878B1 (en) * | 1997-12-23 | 2001-02-06 | Sarnoff Corporation | Interactive world wide web access using a set top terminal in a video on demand system |
US6385614B1 (en) * | 1998-01-14 | 2002-05-07 | Netlibrary Inc. | Electronic bookshelf with multi-user features |
US6330675B1 (en) * | 1998-02-13 | 2001-12-11 | Liquid Audio, Inc. | System and method for secure transfer of digital data to a local recordable storage medium |
US7246246B2 (en) * | 1998-04-17 | 2007-07-17 | Iomega Corporation | System for keying protected electronic data to particular media to prevent unauthorized copying using a compound key |
US6151675A (en) * | 1998-07-23 | 2000-11-21 | Tumbleweed Software Corporation | Method and apparatus for effecting secure document format conversion |
US6434535B1 (en) * | 1998-11-13 | 2002-08-13 | Iomega Corporation | System for prepayment of electronic content using removable media and for prevention of unauthorized copying of same |
-
1999
- 1999-03-12 US US09/267,800 patent/US6229895B1/en not_active Expired - Lifetime
-
2000
- 2000-03-10 AU AU38789/00A patent/AU3878900A/en not_active Abandoned
- 2000-03-10 WO PCT/US2000/006480 patent/WO2000054493A1/en active Application Filing
- 2000-03-10 GB GB0121689A patent/GB2363928B/en not_active Expired - Lifetime
- 2000-03-10 CA CA002367449A patent/CA2367449C/en not_active Expired - Lifetime
-
2001
- 2001-05-07 US US09/850,231 patent/US6681326B2/en not_active Expired - Lifetime
-
2003
- 2003-10-28 US US10/695,277 patent/US7930724B2/en not_active Expired - Lifetime
-
2011
- 2011-03-25 US US13/071,973 patent/US8370883B2/en not_active Expired - Fee Related
-
2013
- 2013-02-04 US US13/757,959 patent/US8973027B2/en not_active Expired - Fee Related
Also Published As
Publication number | Publication date |
---|---|
US20110185380A1 (en) | 2011-07-28 |
GB2363928A (en) | 2002-01-09 |
US8370883B2 (en) | 2013-02-05 |
US6681326B2 (en) | 2004-01-20 |
US8973027B2 (en) | 2015-03-03 |
GB0121689D0 (en) | 2001-10-31 |
WO2000054493A1 (en) | 2000-09-14 |
US7930724B2 (en) | 2011-04-19 |
US20010017920A1 (en) | 2001-08-30 |
CA2367449A1 (en) | 2000-09-14 |
US20040091109A1 (en) | 2004-05-13 |
US20130152122A1 (en) | 2013-06-13 |
GB2363928B (en) | 2003-08-13 |
AU3878900A (en) | 2000-09-28 |
US6229895B1 (en) | 2001-05-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CA2367449C (en) | Secure distribution of video on-demand | |
US8667304B2 (en) | Methods and apparatuses for secondary conditional access server | |
CA2571533C (en) | Validating client-receivers | |
US8036382B2 (en) | Conditional access system and method for prevention of replay attacks | |
US5627892A (en) | Data security scheme for point-to-point communication sessions | |
CA2470132C (en) | Encrypting received content | |
CA2715445C (en) | Encryption system for satellite delivered television | |
US8804965B2 (en) | Methods for decrypting, transmitting and receiving control words, recording medium and control word server to implement these methods | |
KR20020083812A (en) | Content service security system of broadcasting method and control method thereof | |
CN107948727B (en) | Digital television program stream transmission system and method based on quantum encryption | |
KR20090070881A (en) | Broadcast processing apparatus and method thereof | |
JP2002218435A (en) | Method and device for video distribution service | |
KR20080069327A (en) | Method for the protected distribution of contents in iptv environment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
EEER | Examination request | ||
MKEX | Expiry |
Effective date: 20200310 |
|
MKEX | Expiry |
Effective date: 20200310 |