|Numéro de publication||USRE41919 E1|
|Type de publication||Octroi|
|Numéro de demande||US 12/425,314|
|Date de publication||9 nov. 2010|
|Date de dépôt||16 avr. 2009|
|Date de priorité||25 juin 2003|
|État de paiement des frais||Payé|
|Autre référence de publication||US7206411, US20040268117|
|Numéro de publication||12425314, 425314, US RE41919 E1, US RE41919E1, US-E1-RE41919, USRE41919 E1, USRE41919E1|
|Inventeurs||Steve Olivier, Gary L. Pelkey, David M. Placek, Kevin Kennedy|
|Cessionnaire d'origine||Steve Olivier, Pelkey Gary L, Placek David M, Kevin Kennedy|
|Exporter la citation||BiBTeX, EndNote, RefMan|
|Citations de brevets (100), Citations hors brevets (6), Classifications (29), Événements juridiques (2)|
|Liens externes: USPTO, Cession USPTO, Espacenet|
This application claims the benefit of U.S. Provisional Application Ser. No. 60/482,235 filed Jun. 25, 2003.
1. Field of the Invention
This invention relates generally to satellite broadcast systems and, more particularly, to a conditional access system for encrypting and decrypting data.
2. Related Art
A conditional access system is used to permit access to a transport stream only to subscribers who have paid for it. This is generally done by distributing the transport stream in encrypted form. Although any integrated receiver-decoder (IRD) that is connected to a satellite broadcast network can receive the encrypted transport stream, only the IRDs of those authorized subscribers are able to decrypt the encrypted transport stream. The IRD determines whether the encrypted transport stream should be decrypted and, if so, to decrypt it to produce a decrypted transport stream comprising information making up the broadcast program.
After a subscriber has purchased a service, a service provider sends messages to the subscriber's IRD with an authorization stream for the purchased services. The authorization stream may be sent with the transport stream or may be sent via a separate channel to an IRD. Various techniques have been used to encrypt the authorization stream. The authorization stream may include a seed as a key for a service of the service provider and an indication of what programs in the service the subscriber is entitled to receive. If the authorization stream indicates that the subscriber is entitled to receive the program of an encrypted transport stream, the IRD decrypts the encrypted transport stream using the received seed.
A well known problem concerning such conditional access systems is that the IRDs may suffer either carrier fades or be switched between carriers bearing the same instantiation of the service provider. It is therefore desirable for the IRDs to recover and pass a correctly decrypted transport stream to downstream processing stages as quickly as possible. However, the magnitude of time delay in the recoveries, on a typical large network (12,000 satellite IRDs) can be extremely long, such as one or two minutes in legacy systems. Other implementations of conditional access solve the problem of quick restoration of the IRD's decrypter by either risking that still-scrambled material may inadvertently be passed to the downstream processing stages, or consuming far more bandwidth in the transport stream to send cyphered seeds.
Hence, there is a need in the industry for an efficient and reliable technique for rapidly decrypting data after brief or extended loss of transport or authorization streams due to short carrier fades or switches. For that purpose, the conditional access system should allow the IRDs to quickly determine, after restoration of the data link following a carrier fade or switch, whether their stored copies of the decryption seeds are still current and correct. Furthermore, it is needed to greatly reduce the likelihood that the carrier fade or switch could prevent the IRD from getting at least one copy of its own messages without the need for consuming large amounts of bandwidth.
It is in view of the above problems that the present invention was developed. The present invention is a satellite broadcast conditional access system with key synchronization that allows the IRDs to quickly restart the decrypting process after short carrier fades and after carrier switches when they are within the same protected network. The invention uses an indexed authorization stream allowing the IRDs to quickly decide, after restoration of the data link following a carrier fade or switch, whether their stored copies of the decrypting seeds are still current and correct. The invention also uses multiple transmissions of the cyphered seeds during each distribution period providing the IRD with multiple opportunities to receive the current seed.
For the first attribute, the index numbers on all the authorization streams are assigned in a manner such that the authorization stream may be identified and that the specific time epoch of those cyphered seeds may be determined. When a conditional access server program initializes, it randomly selects the starting index number from a domain of numbers, and applies this number to each and every authorization stream bearing a cyphered seed. Then, while in operation, it increments that index by a predefined value at each new distribution period, i.e., an odd/even flavor switch according to the preferred embodiment. The IRDs, in their turn, after reestablishing connection to the carrier-borne transport stream, may quickly retrieve the index numbers being issued in the authorization stream and compare them to the same for both flavors of the cyphered seeds it keeps in volatile storage. If those numbers match, then the IRD will then immediately decypher those seed(s) and restart decrypting on the transport stream knowing it is using the correct seed. This restart may commence very quickly after the authorization stream is detected, and that the IRD need not wait until its own messages are received and decyphered.
For the second attribute, the distribution of the cyphered seeds is repeatedly sent with considerable delay between the cyphered seed messages. This greatly reduces the likelihood that a carrier switch or a short fade could prevent the IRD from getting at least one copy of its own cyphered seed message during each distribution period.
Further features and advantages of the present invention, as well as the structure and operation of various embodiments of the present invention, are described in detail below with reference to the accompanying drawings.
The accompanying drawings, which are incorporated in and form a part of the specification, illustrate the embodiments of the present invention and together with the description, serve to explain the principles of the invention. In the drawings:
Referring to the accompanying drawings in which like reference numbers indicate like elements,
The encryption function 22 in the conditional access server 16 provides an authorization stream 24 bearing cyphered messages which can only be decyphered and read by authorized devices. These messages give the cryptographic multiplexers 18, at the satellite uplink, and the authorized IRDs 20, at the downlink sites, a sequence of cyphered encrypting seeds. The cryptographic multiplexers 18 extract their own cyphered encryption seeds using their own serial number, and their decrypter 26 decyphers the cyphered encrypting seeds to get an encryption seed. These seeds initialize scrambler 28, in the cryptographic multiplexers 18 which appears to randomly encrypt the encrypt able portions of the MPEG transport stream 12. The authorization stream 24 and the encrypted transport stream 30 are transmitted through an interposed satellite broadcast network 31 by the multiplexer 32 and received by the input module 34 of the IRDs 20. Like the cryptographic multiplexers 18, the host microprocessor 36 of IRDs extract their own cyphered encryption seeds using their own serial number, and their decrypters 38 decypher the cyphered encrypting seeds to get an original encryption seed. Since the encrypting operation is symmetric, the encrypting seed sent to the IRDs 20 allows descrambler 40 to decrypt the transport stream encrypted by the cryptographic multiplexer 18.
At the uplink site, a conditional access server 16 runs the conditional access system 10. It can retrieve database information 41 from a conditional access database 42 by a network connection to the conditional access server 16 if on separate machines. This information is used to build and edit a list of authorized IRDs 20 by serial number n 102 under local operator control.
When the conditional access server's encryption engine is activated, it generates a sequence of random numbers Ki 122 and associated index numbers i 124 (operation 220). While each Ki in the sequence is independently random, the i values preferably begin with a randomly selected number, i.e., the initial index number is randomly generated. In a preferred embodiment of the invention, the i index then increments by a given value, preferably one, for each new (Ki,i) pair 122, 124 that is generated. For each pair 122, 124 in the sequence, the conditional access server 16 creates a cyphered message for every authorized IRD 20 plus all encrypting cryptographic multiplexers 18. It does this using the list of secret serial numbers Sn 114. Each cyphered message (CM) contains a value Cni 126, the index i, 124 the destination unit serial number n 102, and an even/odd flavor indicator 128. The value Cni is calculated (operation 220): Cni=Ki xor F(Sn∥i) and it is called the cyphered seed 126. After the entire set of cyphered messages is distributed, the conditional access server 16 sends either an encryption ON or OFF message 130, addressed to all. The aggregate of all these messages (Cni 126, i 124, n 102, an even/odd flavor indicator 128, an encryption ON or OFF message 130) is generally called the authorization stream 24. This stream then feeds the cryptographic multiplexers 18 (operation 230).
The authorization stream 24 is preferably structured as shown in FIG. 3. The time interval over which cyphered messages are used to distribute a (Ki,i) pair 122, 124 to the universe of IRDs 20 and cryptographic multiplexers 18 is the odd/even flavor distribution period 142. Within this period, all the cyphered messages 144 intended for the downlink IRDs 20 are sent first as an ordered group. The ordered group is a set of cyphered messages (CM1, CM2, . . . , CMm) corresponding with the group of IRDs (IRD1, IRD2, . . . , IRDm), respectively. For each distribution period, the cyphered messages will all contain the same index number and even/odd flavor indicator, but will vary according to the IRDn serial numbers (Sn1, Sn2, . . . , Snnm). Of course, the cyphered seed 126 will also vary according to the different serial numbers based on operation 220. Then that whole set of messages 146 is repeated in the same order. Following this, there is a delay period 148 where no messages are transmitted. Then cyphered messages 150 addressed to all the cryptographic multiplexers 18 listed in the conditional access database 42 are sent, in order, just once. This is followed preferably, without delay, by some number of encryption ON or OFF commands 130. After this, there is another delay 154 before transmission of the next (Ki,i) pair 122, 124 begins, which preferably has the opposing odd/even flavor 156.
In a preferred embodiment of the invention, the conditional access system 10 may be in one of three states. They are (1) encryption off; (2) encryption on and starting up; (3) encryption on static. In the first state, the engine continues to create the (Ki,i) pairs 122, 124, but only a single encryption off authorization message is sent at the end of each distribution period. In the second state, the engine begins distribution of the encrypting seeds. At the end of the first two distribution periods, the conditional access server 16 sends an encryption off message 130 to all devices. After the second state, the conditional access system 10 enters the third state. Here, after the seeds have been distributed to the IRDs 20 and cryptographic multiplexers 18, an encryption on message 130 is sent to all devices. Note that there is no similar transition from the encryption on state to the off state. As soon as the user orders encryption to stop, distribution of new seeds ceases immediately and the very next authorization message sent is an encryption off message 130.
In the preferred embodiment of the invention, the list of all cryptographic multiplexers 18 which may do encryption is found in the associated conditional access database 42. The presence or absence of the cryptographic multiplexer 18 from conditional access system's authorized list does not mean the same thing as the presence or absence of an IRD 20, as shall be seen. If a cryptographic multiplexer 18 is in the conditional access database 42, then, when the conditional access state is encryption on, the cryptographic multiplexer 18 will always be receiving addressed authorization messages from the conditional access system 10. However, the cryptographic multiplexer behavior is then affected by the conditional access mode in use while encryption is on. In the preferred embodiment of the invention, only the authorized cryptographic multiplexers 18 receive addressed encryption on commands, while the unauthorized cryptographic multiplexers (in the conditional access database but not authorized in conditional access) receive addressed encryption off commands. For all networks logically connected to those unauthorized cryptographic multiplexers 18, this has the effect of leaving them completely in the clear (unencrypted).
The cryptographic multiplexer 18 has three functions within the conditional access system 10: (1) to receive and decypher the next encrypting seed, (2) to encrypt the required program IDs (PIDs) in the MPEG transport stream 12 using that seed, and to (3) inject the authorization stream into a ghost PID of the transport stream for use by the authorized IRDs. In support of these functions, the cryptographic multiplexer 18 accepts the authorization stream 24 from the conditional access server 16. In addition, it accepts an MPEG transport stream 12, provides the encrypting processing, and then outputs it, preferably for ultimate distribution to a network of downlink IRDs 20.
In a preferred embodiment of the invention, once the new encryption seed value is available, the host processor immediately sets the scrambler 28 to begin encrypting using that value if (1) the conditional access server 16 has previously sent an encryption ON command 130 more recently than an encryption OFF command, and (2) the cryptographic multiplexer 18 has been set to accept those commands. The encryption seed value used for encrypting is the starting state of a linear feedback shift register (LFSR) generator of the scrambler 28 (operation 430), a device which creates a pseudo-random bit sequence. This sequence of bits is XOR'd with several of the low-order bits in nearly every byte of the payload of the eligible MPEG packets 12, not including the authorization stream-carrying packets. The encryption bit on those packets is then set to indicate to IRD descrambler 40 that those packets are encrypted. In addition, the even-odd bit is set to show which flavor of seed was used to do that encrypting. When the next encryption seed is received by the cryptographic multiplexer 18, it will have the opposing flavor, and when transport streams are encrypted using that new encryption seed, the odd-even bit in the transport streams is toggled to that new opposing state.
While the cryptographic multiplexer 18 is decyphering new encryption seeds and using them to encrypt the transport stream 12, it is also injecting the authorization stream 24 into the transport (operation 440). This operates as a simple logical pipe from the cryptographic multiplexer host processor to all the IRD host processors 36. The authorization stream 24 is inserted as the payload into MPEG packets. As these packets are built, they are queued within the cryptographic multiplexer 18. Each authorized IRD 20 in the receiving network has three tasks to perform within this conditional access system 10: (1) extract and decypher its own authorization streams to get new encryption seeds, (2) decrypt the encrypted transport stream packets 30 and pass the new clear packets to the payload processing portion of the IRD 20, and (3) achieve and maintain synchronization to the timing of the cryptographic multiplexer scrambler 28, to ensure that decrypting is done with the correct seed.
As described above, the IRD 20 detects authorization streams 24 addressed to itself and routes the enclosed (Cni,i) pair 126, 124 to the decrypter 38. In addition, it maintains a circular buffer in volatile memory where the last messages received of each odd/even flavor are stored. When new messages are received, they overwrite the previous message of the same flavor. The purpose of this, which shall be discussed in more detail below, is to provide a way for IRDs 20 to recover from brief losses of transport stream input and, of course, loss of the authorization stream as well.
The IRD 20 accepts an incoming MPEG transport stream 12, either from a satellite carrier or from a terrestrial interface. It applies a process of decrypting the transport stream which is essentially identical to the encrypting operation. The payload of the transport stream packets are XOR'd by the same pseudo-random bit sequence which encrypted them jin the cryptographic multiplexer 18. This process restores the payloads of those transport stream packets back to the clear or normal state. Those packets are then routed to the downstream processing circuitry 46 within the IRD 20.
IRD synchronization to the conditional access system 10 differs depending on the state of the system. Steady state operation of an authorized IRD 20 and the several transient states are discussed in detail below: (1) authorization by conditional access system, (2) de-authorization by conditional access system, (3) brief transport stream loss, and (4) extended transport stream loss.
In steady state operation of the system, authorization streams bearing the cyphered seeds of a particular flavor are distributed to the cryptographic multiplexers 18 and IRDs 20 while those same units are encrypting and decrypting with the previously distributed seed of the opposing odd/even flavor. Within the IRDs themselves, the synchronization is maintained as follows. When a seed of a particular flavor is received, decyphered, and loaded to the IRD 20, an X_SEED_WRITTEN flag is SET within the IRD 20 (where X designates the seed's odd/even flavor). When the IRD detects that the odd/even flavor bit in the incoming encrypted transport streams changes (operation 540, referring to FIG. 5), it looks to see if the X_SEED_WRITTEN flag corresponding to the new flavor is set (test 550). If so, it knows it has a valid seed for that new flavor, and it begins decrypting immediately (operation 560). If not, it blocks all incoming encrypted transport streams 30 from entering the IRD demux chip 44 and clears the X_SEED_WRITTEN flag (operation 570). When the very next flavor change occurs in the incoming encrypted transport packet stream 30, that same flag clears in anticipation of the distribution of the next seed of that flavor.
When an IRD 20 is unauthorized in the conditional access system 10, it does not receive the cyphered authorization streams, addressed to itself, bearing its own (Cni,i) value pair. Without the (Cni,i) pair 126, 124, seeds cannot be decyphered, so the X_SEED_WRITTEN flags remain continuously clear, and the IRD removes all incoming encrypted transport streams and substitutes null streams. When the IRD 20 is first authorized in the conditional access system 10, authorization streams addressed to it begin to be received. In the flavor distribution period corresponding to the first addressed stream received by the IRD 20, the IRD basically performs the following steps: (1) a seed of a particular flavor is later received, decyphered, and loaded to the descrambler 40, setting that respective X_SEED_WRITTEN flag; (2) the odd/even flavor bit in the incoming encrypted transport stream packets later changes over to that flavor; and (3) the seed is used to decrypt the encrypted transport streams. Starting with the steady state described earlier, when an RD 20 is de-authorized by conditional access system 10, it stops receiving authorization streams.
Since the IRDs 20 may suffer either short carrier fades or deliberate carrier switches between carriers bearing the same instantiation of a conditional access system 10, transport streams could be briefly lost.
For all losses of transport streams, the X_SEED_WRITTEN flags are cleared, the IRD host 36 resets the descrambler 40. As just described, when the transport stream is restored, the IRD host 36 examines the first authorization streams received. In the case where the first incoming authorization stream's i index value is not exactly equal to, or is not equal to one more than either of the i index values in the stored authorization streams, then the IRD host 36 assumes that the stored cyphered seeds are unusable. From then on, it behaves as if it had just boot up. The IRD 20 remains unauthorized until the IRD first gets an addressed cyphered seed through authorization stream and, thence until the succeeding transport encrypting flavor switch. Note that this holds true if the IRD 20 switched to an encrypted transport stream with a different authorization stream, or if the IRD 20 has been disconnected from the original authorization stream for an extended period. In a preferred embodiment of the invention, an extended period would be any outage exceeding half of the difference between flavor distribution period 142 and the total delays 148, 154 where double-sending of the cyphered seeds is employed (referring to FIG. 3). Failing to use double-sending of the seeds could cause an IRD 20 to miss its current seed distribution on even the shortest outages. In this case, the IRD 20 will appear to initially recover after an outage, but revert to unauthorized at the next flavor switch and remain that way through that next flavor distribution period.
In view of the foregoing, it will be seen that the several advantages of the invention are achieved and attained. The embodiments were chosen and described in order to best explain the principles of the invention and its practical application to thereby enable others skilled in the art to best utilize the invention in various embodiments and with various modifications as are suited to the particular use contemplated.
As various modifications could be made in the constructions and methods herein described and illustrated without departing from the scope of the invention, it is intended that all matter contained in the foregoing description or shown in the accompanying drawings shall be interpreted as illustrative rather than limiting. Thus, the breadth and scope of the present invention should not be limited by any of the above-described exemplary embodiments, but should be defined only in accordance with the following claims appended hereto and their equivalents.
|Brevet cité||Date de dépôt||Date de publication||Déposant||Titre|
|US4518989||30 sept. 1982||21 mai 1985||Hitachi, Ltd.||Buffer memory dispersion type video/audio transmission system with spatially and timewise divided inter-office junction lines|
|US4538176||26 nov. 1979||27 août 1985||Hitachi, Ltd.||Buffer memory dispersion type video/audio transmission system|
|US4578531||9 juin 1982||25 mars 1986||At&T Bell Laboratories||Encryption system key distribution method and apparatus|
|US4719364||1 oct. 1985||12 janv. 1988||Pulizzi Engineering, Inc.||Multiple time delay power controller apparatus|
|US4723283||20 juin 1986||2 févr. 1988||Sony Corporation||Data transmission system|
|US4761785||12 juin 1986||2 août 1988||International Business Machines Corporation||Parity spreading to enhance storage access|
|US4864615||27 mai 1988||5 sept. 1989||General Instrument Corporation||Reproduction of secure keys by using distributed key generation data|
|US4887296||16 oct. 1987||12 déc. 1989||Ricoh Co., Ltd.||Cryptographic system for direct broadcast satellite system|
|US4903031||20 oct. 1987||20 févr. 1990||Trio Kabushiki Kaisha||Satellite receiver|
|US4930062||14 sept. 1989||29 mai 1990||Nec Corporation||Computer power supply with optically isolated shutdown circuits|
|US4985895||14 nov. 1988||15 janv. 1991||Wegener Communications, Inc.||Remote controlled receiving system apparatus and method|
|US5019910||12 sept. 1988||28 mai 1991||Norsat International Inc.||Apparatus for adapting computer for satellite communications|
|US5029232||12 janv. 1989||2 juil. 1991||Cycle-Sat., Inc.||Satellite communications network|
|US5036537||3 avr. 1987||30 juil. 1991||General Instrument Corp.||Geographic black-out method for direct broadcast satellite system|
|US5046092||29 mars 1990||3 sept. 1991||Gte Laboratories Incorporated||Video control system for transmitted programs|
|US5054064||29 mars 1990||1 oct. 1991||Gte Laboratories Incorporated||Video control system for recorded programs|
|US5235643||21 mai 1991||10 août 1993||Anderson Steven E||Satellite receiver retuning system|
|US5367571||2 déc. 1992||22 nov. 1994||Scientific-Atlanta, Inc.||Subscriber terminal with plug in expansion card|
|US5381481||4 août 1993||10 janv. 1995||Scientific-Atlanta, Inc.||Method and apparatus for uniquely encrypting a plurality of services at a transmission site|
|US5404505||1 nov. 1991||4 avr. 1995||Finisar Corporation||System for scheduling transmission of indexed and requested database tiers on demand at varying repetition rates|
|US5410326||4 déc. 1992||25 avr. 1995||Goldstein; Steven W.||Programmable remote control device for interacting with a plurality of remotely controlled devices|
|US5421017||14 janv. 1994||30 mai 1995||Siemens Aktiengesellschaft||Real time control system and method for replacing software in a controlled system|
|US5440632||28 mars 1994||8 août 1995||Scientific-Atlanta, Inc.||Reprogrammable subscriber terminal|
|US5485577||16 déc. 1994||16 janv. 1996||General Instrument Corporation Of Delaware||Method and apparatus for incremental delivery of access rights|
|US5550576||17 avr. 1995||27 août 1996||Starsight Telecast Incorporated||Method and apparatus for merging television program schedule information received from multiple television schedule information sources|
|US5594490||23 mai 1994||14 janv. 1997||Cable Services Technologies, Inc.||System for distributing video/audio files from central location to a plurality of cable headends|
|US5644354||9 oct. 1992||1 juil. 1997||Prevue Interactive, Inc.||Interactive video system|
|US5651115||28 déc. 1994||22 juil. 1997||Sony Corporation||Apparatus for supplying a leading-end signal from leading-end memory means thereafter supplying the corresponding information signal from a storage means via a buffer means|
|US5657414||1 déc. 1992||12 août 1997||Scientific-Atlanta, Inc.||Auxiliary device control for a subscriber terminal|
|US5684525||28 mars 1996||4 nov. 1997||Starsight Telecast Incorporated||Merging multi-source information in a television system|
|US5694334||6 sept. 1995||2 déc. 1997||Starguide Digital Networks, Inc.||Method and apparatus for electronic distribution of digital multi-media information|
|US5712969||10 sept. 1994||27 janv. 1998||Robert Bosch Gmbh||Method for completely reprogramming an erasable, non-volatile memory|
|US5717887||28 juil. 1995||10 févr. 1998||Nomai Sa||System for the automatic substitution of control firmware embedded in a removable disk drive|
|US5751950||16 avr. 1996||12 mai 1998||Compaq Computer Corporation||Secure power supply for protecting the shutdown of a computer system|
|US5754938||31 oct. 1995||19 mai 1998||Herz; Frederick S. M.||Pseudonymous server for system for customized electronic identification of desirable objects|
|US5761406||11 août 1997||2 juin 1998||Fujitsu Limited||Method of controlling data transfer and a safe shutdown in a hierarchical cache system during power cut-off|
|US5764773||2 nov. 1994||9 juin 1998||Kabushiki Kaisha Toshiba||Repeating device, decoder device and concealment broadcasting|
|US5799083||26 août 1996||25 août 1998||Brothers; Harlan Jay||Event verification system|
|US5805705||29 janv. 1996||8 sept. 1998||International Business Machines Corporation||Synchronization of encryption/decryption keys in a data communication network|
|US5815409||29 oct. 1996||29 sept. 1998||Samsung Electronics Co., Ltd.||Control system and method for automatic shutdown of a power supply|
|US5815662||15 août 1996||29 sept. 1998||Ong; Lance||Predictive memory caching for media-on-demand systems|
|US5828402||5 déc. 1996||27 oct. 1998||Canadian V-Chip Design Inc.||Method and apparatus for selectively blocking audio and video signals|
|US5828945||8 août 1996||27 oct. 1998||Starsight Telecast, Inc.||Merging multi-source information in a television system|
|US5864621||12 juin 1996||26 janv. 1999||Multichannel Communication Sciences, Inc.||Broadband television scrambling and descrambling system|
|US5872846||7 nov. 1996||16 févr. 1999||Mci Communications Corporation||System and method for providing security in data communication systems|
|US5886733||17 mai 1996||23 mars 1999||Sun Microsystems, Inc.||Method and apparatus for successive refinement of broadcasted video frames|
|US5892767||11 mars 1997||6 avr. 1999||Selsius Systems Inc.||Systems and method for multicasting a video stream and communications network employing the same|
|US5898695||27 mars 1996||27 avr. 1999||Hitachi, Ltd.||Decoder for compressed and multiplexed video and audio data|
|US5903766||13 janv. 1997||11 mai 1999||Packard Bell Nec, Inc.||Suspend/resume capability for a protected mode microprocessor|
|US5917915||20 juin 1995||29 juin 1999||Sony Corporation||Scramble/descramble method and apparatus for data broadcasting|
|US5918059||15 août 1997||29 juin 1999||Compaq Computer Corporation||Method and apparatus for responding to actuation of a power supply switch for a computing system|
|US5920626||20 déc. 1996||6 juil. 1999||Scientific-Atlanta, Inc.||Analog/digital system for television services|
|US5923362||28 mars 1997||13 juil. 1999||Starsight Telecast, Inc.||Merging multi-source information in a television system|
|US5930515||30 sept. 1997||27 juil. 1999||Scientific-Atlanta, Inc.||Apparatus and method for upgrading a computer system operating system|
|US5936660||10 déc. 1997||10 août 1999||Rockwell Semiconductor System, Inc.||Digital video converter box for subscriber/home with multiple television sets|
|US5973723||12 déc. 1997||26 oct. 1999||Deluca; Michael Joseph||Selective commercial detector and eliminator apparatus and method|
|US5987518||28 oct. 1996||16 nov. 1999||General Instrument Corporation||Method and apparatus for communicating internet protocol data over a broadband MPEG channel|
|US5987519||19 sept. 1997||16 nov. 1999||Georgia Tech Research Corporation||Telemedicine system using voice video and data encapsulation and de-encapsulation for communicating medical information between central monitoring stations and remote patient monitoring stations|
|US5991800||22 mai 1997||23 nov. 1999||Motorola, Inc.||Method and apparatus for providing internet service at a subscriber premise|
|US5999654||16 juil. 1997||7 déc. 1999||Matsushita Electric Industrial Co., Ltd.||Image processor capable of transferring image data from an input buffer to memory at a high rate of speed|
|US6023723||22 déc. 1997||8 févr. 2000||Accepted Marketing, Inc.||Method and system for filtering unwanted junk e-mail utilizing a plurality of filtering mechanisms|
|US6025869||20 août 1996||15 févr. 2000||Music Corporation||Video viewing supervision system|
|US6026439||28 oct. 1997||15 févr. 2000||International Business Machines Corporation||File transfers using playlists|
|US6040781||26 mai 1998||21 mars 2000||Motorola||Event reminder for a communication device|
|US6040850||5 mai 1997||21 mars 2000||Electronics And Telecommunications||Method for interfacing between transmitter and receiver of digital broadcasting system through satellite|
|US6044205||29 févr. 1996||28 mars 2000||Intermind Corporation||Communications system for transferring information between memories according to processes transferred with the information|
|US6054920||15 oct. 1996||25 avr. 2000||Interactive Technologies,Inc.||Alarm system receiver supervisor|
|US6067300||11 juin 1998||23 mai 2000||Cabletron Systems, Inc.||Method and apparatus for optimizing the transfer of data packets between local area networks|
|US6072983||13 oct. 1998||6 juin 2000||Starsight Telecast, Inc.||Merging multi-source information in a television system|
|US6094671||9 oct. 1997||25 juil. 2000||Starguide Digital Networks, Inc.||Aggregate information production and display system|
|US6097662||29 janv. 1999||1 août 2000||Mitsubishi Denki Kabushiki Kaisha||Dynamic semiconductor memory device with low power consumption mode increasing electrostatic capacity of memory cell than in normal operation mode|
|US6101180||12 nov. 1997||8 août 2000||Starguide Digital Networks, Inc.||High bandwidth broadcast system having localized multicast access to broadcast content|
|US6113652||12 févr. 1998||5 sept. 2000||General Data Comm, Inc.||Communications network equipment capable of non-disruptive software upgrade|
|US6115824||20 janv. 1998||5 sept. 2000||Samsung Electronics Co., Ltd.||Apparatus and a method for avoiding the accidental termination of computer power|
|US6134589||6 mai 1998||17 oct. 2000||Telefonaktiebolaget Lm Ericsson||Dynamic quality control network routing|
|US6154745||23 déc. 1997||28 nov. 2000||Nokia Mobile Phones Ltd.||Method for transmission of information to the user|
|US6157722||23 mars 1998||5 déc. 2000||Interlok Technologies, Llc||Encryption key management system and method|
|US6163809||8 déc. 1997||19 déc. 2000||Microsoft Corporation||System and method for preserving delivery status notification when moving from a native network to a foreign network|
|US6169802||17 déc. 1996||2 janv. 2001||Motorola, Inc.||Dynamic private key security system for personal messaging devices|
|US6173330||17 sept. 1996||9 janv. 2001||Motorola, Inc.||Delivery and acquisition of data segments with optimized inter-arrival time|
|US6182187||7 avr. 1993||30 janv. 2001||Compaq Computer Corporation||System ROM including a flash EPROM and a ROM for storing primary boot code replacing a block flash EPROM|
|US6219422||5 mars 1998||17 avr. 2001||Sony Corporation||Data transmitting apparatus, receiving apparatus, and data transmission and reception system|
|US6222923||15 déc. 1997||24 avr. 2001||Deutsche Telekom Ag||Method for securing system protected by a key hierarchy|
|US6230163||14 août 1998||8 mai 2001||U.S. Philips Corporation||Transient datastream-processing buffer memory organization with software management adapted for multilevel housekeeping|
|US6240188||11 nov. 1999||29 mai 2001||Matsushita Electric Industrial Co., Ltd.||Distributed group key management scheme for secure many-to-many communication|
|US6246752||8 juin 1999||12 juin 2001||Valerie Bscheider||System and method for data recording|
|US6250930||29 mai 1998||26 juin 2001||Picante Communications Corporation||Multi-functional communication and aggregation platform|
|US6252652||6 mai 1999||26 juin 2001||Lifetouch Portrait Studios, Inc.||High speed package printer|
|US6253027||17 juin 1996||26 juin 2001||Hewlett-Packard Company||System, method and article of manufacture for exchanging software and configuration data over a multichannel, extensible, flexible architecture|
|US6262982||20 janv. 2000||17 juil. 2001||Starguide Digital Networks, Inc.||High bandwidth broadcast system having localized multicast access to broadcast content|
|US6266339||13 mai 1999||24 juil. 2001||Starguide Digital Networks, Inc.||High bandwidth broadcast system having localized multicast access to broadcast content|
|US6266810||17 avr. 1998||24 juil. 2001||Matsushita Electric Industrial Co., Ltd.||Remote program downloading system and apparatus|
|US6272549||27 mai 1998||7 août 2001||Hewlett Packard Company||Method for using electronic mail for exchanging data between computer systems|
|US6292586||25 janv. 1999||18 sept. 2001||Fujitsu Limited||Arithmetic unit, correlation arithmetic unit and dynamic image compression apparatus|
|US6317162||26 oct. 1999||13 nov. 2001||Sanyo Electric Co., Ltd.||Digital television receiver including non-volatile memory|
|US6331876||3 nov. 1997||18 déc. 2001||U.S. Philips Corporation||Method of updating software in a video receiver|
|US6332198||9 juin 2000||18 déc. 2001||Equipe Communications Corporation||Network device for supporting multiple redundancy schemes|
|US6343379||18 mars 1999||29 janv. 2002||Sony Corporation||Receiver and program updating method|
|US6351524||20 janv. 1999||26 févr. 2002||3Com Corporation||Toll saving method and apparatus for a remote access system|
|US6490353 *||23 nov. 1998||3 déc. 2002||Tan Daniel Tiong Hok||Data encrypting and decrypting apparatus and method|
|1||"Bridging DVB And IP Networks With Optibase's MGW 3100", Available from http://www.optibase.com.cn/html/solutions/white_papers/Bridging_DVB_and_IP.html on Jul. 11, 2002, (Jul. 11, 2002), 7 pages.|
|2||"MPEG-2 Transport Stream Description", Rev. 2.29.00, Compiled by Ron Wallace, (Feb. 29, 2000), 35 pages.|
|3||"Optibase MGW 3100 Brochure (2001)", (2001).|
|4||Notification of Transmittalof the International Search Report and the Written Opinion of the international Searching Authority, Or the Declaration, (Jun. 23, 2006).|
|5||Unknown, "Network cpontrol brochure", Wegenar communications compel, (Feb. 28, 2002).|
|6||Unknown, "Wegner Compel Control; The Advanced network control system user manual", Wegener communications, (May 2001).|
|Classification aux États-Unis||380/262, 380/44, 380/46|
|Classification internationale||H04L9/00, H04L9/12, H04L9/18, H04H40/90, H04N7/167|
|Classification coopérative||H04L2209/12, H04L2209/601, H04L9/0662, H04H40/90, H04N21/63345, H04N21/26606, H04N21/6143, H04L9/12, H04N7/1675, H04H60/23, H04N21/454, H04N21/26613|
|Classification européenne||H04N7/167D, H04L9/12, H04L9/18, H04N21/61D6, H04N21/266K, H04N21/454, H04N21/266E, H04N21/6334K, H04H60/23|
|24 janv. 2011||AS||Assignment|
Owner name: WEGENER COMMUNICATIONS, INC., GEORGIA
Effective date: 20030812
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:OLIVIER, STEVE;PELKEY, GARY L.;PLACEK, DAVID M.;AND OTHERS;REEL/FRAME:025685/0054
Effective date: 20080703
Owner name: EPAX CONSULTING LIMITED LIABILITY COMPANY, DELAWAR
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:WEGENER COMMUNICATIONS, INC.;REEL/FRAME:025685/0292
|24 sept. 2014||FPAY||Fee payment|
Year of fee payment: 8