SEARCH
Tynax ~ Patent Library

Patent for Sale:

Conditional Access System for Content Distributors & Service Providers    

Reduces piracy, enhances security for service provider and subscriber.

Overview

High-speed broadbrand allows content disributers and service providers to provide rich home entertainment experiences that include Digital TV, DVRs, gaming, telephony and more.

As expanding the boundaries and enhancing the reach of their services to consumers, content distributors and service providers also expose premium content to piracy with the risk of being mishandled.

In the same way people make illegal copies of copyright works, they make unauthorized smart cards and other decoding equipment with the intention of selling them, depriving the broadcaster or cable operator of the payments that would normally be paid for reception of the transmissions. The pirates are dynamic and always looking for gaps in security. There is a need for solutions to secure Conditional Access systems (CAS) against increasingly sophisticated intruders. The four patent families in this portfolio are focused on enhancing the security for CAS.

Areas covered include:

- Techniques to effectively protect a system against unauthorized users. For example Pay TV customers who share their key with unauthorized users.
- Public and secret key encryption
- Key management and intruder ID

Primary Application of the Technology

Cryptography, Pay-TV, Unauthorised User Identification, Conditional Access. Key management

Competitive Advantage

- Allows broadcasters to identify and block pirate access with little to no disruption for authorized users.
- Better security for subscribers and service providers.
- Reduces piracy.

Additional Information

Prototype available

Patent Summary

U.S. Patent Classes & Classifications Covered in this listing:

Class 380: Cryptography

Equipment and processes which (a) conceal or obscure intelligible information by transforming such information so as to make the information unintelligible to a casual or unauthorized recipient, or (b) extract intelligible information from such a concealed representation, including breaking of unknown codes and messages.

Subclass 201: Copy protection or prevention
Subclass 262: Transmitting a seed, sequence, or initial value
Subclass 277: KEY MANAGEMENT
Subclass 278: Key distribution
Subclass 28: PARTICULAR ALGORITHMIC FUNCTION ENCODING
Subclass 281: Using master key (e.g., key-encrypting-key)
Subclass 283: User-to-user key distributed over data link (i.e., no center)
Subclass 284: Using master key (e.g., key-encrypting-key)
Subclass 285: By public key method
Subclass 29: NBS/DES algorithm
Subclass 30: Public key
Subclass 44: Having particular key generator

Class 348: Television

Generating, processing, transmitting or transiently displaying a sequence of images, either locally or remotely, in which the local light variations composing the images may change with time.

Subclass E7.056: Providing digital key or authorization information for generation or regeneration of the scrambling sequence (EPO)

Class 713: Electrical Computers And Digital Processing Systems: Support

Subclass 150: MULTIPLE COMPUTER COMMUNICATION USING CRYPTOGRAPHY
Subclass 171: Having key exchange

Class 726: Information Security

This class provides, within a computer or digital data processing system, for processes or apparatus for increasing a system s extension of protection of system hardware, software, or data from maliciously caused destruction, unauthorized modification, or unauthorized disclosure. It provides for protection of data processing systems, apparatus, and methods as well as protection of information and services. Subject matter included in this class includes security policies, access control, monitoring, scanning data, countermeasures, usage control, and data protection from maliciously caused destruction, unauthorized modification, or unauthorized disclosure, and includes protection of hardware, and user protection, e.g., privacy, etc.

Subclass 9: Tokens (e.g., smartcards or dongles, etc.)
Subclass 13: Packet filtering
Subclass 20: Tokens (e.g., smartcards or dongles, etc.)
Subclass 28: By authorizing user

Class 705: Data Processing:Financial, Business Practice, Management, Or Cost/Price Determination

This is the generic class for apparatus and corresponding methods for performing data processing operations, in which there is a significant change in the data or for performing calculation operations wherein the apparatus or method is uniquely designed for or utilized in the practice, administration, or management of an enterprise, or in the processing of financial data. It also provides for apparatus and corresponding methods for performing data processing or calculating operations in which a charge for goods or services is determined.

Subclass 64: Secure transaction (e.g., EFT/POS)
Subclass 65: Including intelligent token (e.g., electronic purse)