Keith R. Cochran - San Diego CA, US John Okimoto - San Diego CA, US
Assignee:
General Instrument Corporation - Horsham PA
International Classification:
H04N 7/173
US Classification:
725 87, 725 31, 380200
Abstract:
A transaction protocol for communicating between an encryption renewal system communicably coupled to one or more video on demand systems via a communication network. The encryption renewal system permits pre-encrypted content to be accessed by clients of the video on demand systems. The protocol comprises, receiving, by the encryption renewal system, a request transaction document having a first format from the video on demand system; parsing the request transaction document to retrieve data from the request transaction document; generating a request object code in a second format for processing by encryption renewal system, the request object code based on the data in the request transaction document; responsive to processing of the request object code, generating a response object code having the second format; converting the response object code to a response transaction document having the first format; and forwarding the response transaction document to the video on demand system.
John I. Okimoto - San Diego CA, US Eric J. Sprunk - Carlsbad CA, US Lawrence W. Tang - San Diego CA, US Annie On-yee Chen - Del Mar CA, US Bridget Kimball - Encinitas CA, US Douglas Petty - San Diego CA, US
A system is described for uniquely mating components of a communication network such as a smartcard and a set-top box. When mated, the smartcard and set-top box are tied together and have a single identity. Further, the smartcard operates properly only when inserted into an authorized set-top box. Exchanges of information between both components are secured by encryption and authentication to guard against piracy of the exchanged information. The system provides the same authentication key to the set-top box and the smartcard. This key is used for authenticating communication between the set-top box and the smartcard. First, the authentication key is encrypted by a set-top box mating key. The set-top box employs this mating key to decrypt the authentication key. After it is derived, the authentication key is stored in the set-top box's memory. Further, the same authentication key is encrypted by a smartcard mating key.
Methods And Apparatuses For Authorizing Features Of A Computer Program For Use With A Product
A method for authorizing a computer program having a number of features for use with a product includes: receiving license data generated using a first key, the license data specifying a unique identifier associated with the product and specifying at least one feature authorized for use with the product; using a second key associated with the first key, obtaining the unique identifier from the license data; retrieving a product identifier from the product; determining whether the unique identifier corresponds to the product identifier; and based on the determination, authorizing use of the at least one feature with the product.
Method And Apparatus For Providing A Secure System Time
Bridget D. Kimball - Encinitas CA, US Michael T. Habrat - San Diego CA, US John I. Okimoto - San Diego CA, US Douglas M. Petty - San Diego CA, US Eric J. Sprunk - Carlsbad CA, US Lawrence W. Tang - San Diego CA, US
Assignee:
General Instrument Corporation - Horsham PA
International Classification:
H04B 7/212
US Classification:
370324, 370350, 370509, 713155, 713165
Abstract:
The present invention discloses a system and method for providing a secured system time reference to a subscriber device, e. g. , a set top box or a receiver. In one embodiment, the system time reference is provided in a secure system time message that is broadcasted to a plurality of subscriber devices. Each subscriber device has a security device or software application that is capable of determining whether the received system time reference is legitimate. If the system time reference is determined to be legitimate, a local time reference is synchronized with said received system time reference.
Method And Apparatus For Providing A Border Guard Between Security Domains
John I. Okimoto - San Diego CA, US Bridget D. Kimball - Encinitas CA, US Annie O. Chen - Del Mar CA, US Michael T. Habrat - San Diego CA, US Douglas M. Petty - San Diego CA, US Eric Sprunk - Carlsbad CA, US Lawrence W. Tang - San Diego CA, US
The present invention discloses an apparatus and method for defining and enforcing rules of transition between two security domains, e. g. , a transport domain and a persistent security domain. In turn, a border guard, e. g. , a security device, is provided between these two domains that enforce rules for transition between the two security domains. This novel approach of defining a transport domain and a persistent security domain simplifies the classification of the digital content and its movement through the system. Namely, the border guard once established between the two systems can enforce DRM rules associated with how contents are moved between the two domains.
System For Securing Encryption Renewal System And For Registration And Remote Activation Of Encryption Device
John Okimoto - San Diego CA, US Lawrence Tang - San Diego CA, US
International Classification:
H04N007/167
US Classification:
380/211000, 725/031000
Abstract:
An encryption renewal system for generating entitlement control messages, the system being secured by physical separation of components. The encryption renewal system has a first computing platform for performing non-secure tasks associated with one or more control messages that transmit one or more keys to a subscriber; and a second computing platform physically separate from the first computing platform containing one or more application specific integrated circuit chip for generating the one or more control messages. In addition, a method by the encryption renewal system is used to register an off-line encryption device in order to begin encrypting clear content. The method includes generating data for registering the off-line encryption device; encrypting the data with one or more cryptographic keys to form encrypted data; forwarding the encrypted data to the off-line encryption device; and retrieving the data from the encrypted data, wherein the off-line encryption device begins to encrypt clear content only after the data is retrieved.
System For Securely Delivering Encrypted Content On Demand With Access Contrl
Nicol Chung So - Bensalem PA, US John Okimoto - San Diego CA, US Annie Chen - Del Mar CA, US Lawrence Tang - San Diego CA, US Akiko Wakabayashi - San Diego CA, US Keith Cochran - San Diego CA, US
International Classification:
H04N007/167 H04N007/00 H04N011/00
US Classification:
725/031000, 348/460000, 380/210000, 380/277000
Abstract:
A method of delivering content from a head end to subscriber terminals within one or more cable systems. Such content may be video, audio or the like. The method includes the step of encrypting the content offline to form pre-encrypted content, generating an encryption record containing parameters employed for encrypting the content. Based on the encryption record, a control message for permitting access to the pre-encrypted content is generated using a periodical key provided by the first cable system. The pre-encrypted content and associated control message is thereafter forwarded to the first subscriber terminal for decryption of the content. For a second subscriber terminal within a second cable system, the pre-encrypted content is retrofitted with a second control message permitting the pre-encrypted content to be decrypted by the second subscriber terminal. Further, multiple versions of a control message for multiple service tiers within a cable system may be generated, each version for permitting access to a particular service tier within the system.
Douglas Makofka - Willow Grove PA, US John Okimoto - San Diego CA, US
International Classification:
H04L009/32
US Classification:
713/200000
Abstract:
The invention relates to controlling functional units within a conditional access system. In one embodiment, a method for controlling access to a functional unit within a set top box is described. In one step, first information comprising a plurality of functional unit identifiers and one or more tier requirements respectively related to each functional unit identifier is received. Second information comprising tier rights is also received. The functional unit identifiers are correlated to their respective tier requirements. The functional unit is interacted with. It is determined if the respective tier requirements are satisfied by the tier rights. Further interaction with the functional unit is authorized.
Name / Title
Company / Classification
Phones & Addresses
John Okimoto Professional Engineer
Motorola Radio and T.V. Communications Equipment · Computer Peripheral Equipment, NEC
6450 Sequence Dr, San Diego, CA 92121 8585782222
Youtube
Leaving on a Jet Plane - The Globalization of...
Family law has gone global with the rise of international citizens and...
Duration:
28m 29s
Propeller Live On Set feat. KEVIN OKIMOTO
Recorded and performed Live @ Propeller Live On Set, Honolulu HI.
Duration:
59m 2s
Kevin Okimoto - Isn't She Lovely (HiSessions....
The third musical segment from the HI*Sessions studio featuring Kevin ...
Duration:
3m
The ultimate display of determination! Ft. Jo...
Marathon Runner John Akhwari fell hard to the ground early in the race...
Duration:
2m 8s
Val Okimoto First Day Votes Against 2nd Amend...
What's more disturbing than progressive democrats dominating politics ...
Duration:
59s
Kevin Okimoto - Let's Chill (HiSessions.com A...
The second musical segment from the HI*Sessions studio featuring Kevin...