Counterfeit STB prevention through protocol switching
First Claim
1. A set-top-box (STB) comprising:
- a databus;
a first communication device suitable for coupling to a digital broadcast communications medium, said first communication device operable to receive digital broadcast data;
memory bi-directionally coupled to said databus, said memory including computer executable instructions for;
a) determining whether said STB is authentic or counterfeit; and
b) performing anti-counterfeit measures upon said STB when said device is determined to be counterfeit;
a digital data decoder bi-directionally coupled to said databus;
a central processing unit (CPU) bi-directionally coupled to said databus, said CPU implementing a STB control process controlling said memory, said first communications device and said digital decoder, said STB control process operable to process digital data received at said first communications device.
1 Assignment
0 Petitions
Accused Products
Abstract
The present invention teaches a universal STB operative to prevent unauthorized access to digital broadcast data including: a databus; a first communication device suitable for coupling to a digital broadcast communications medium, the first communication device operable to receive digital broadcast data; memory bi-directionally coupled to the databus, the memory including computer executable instructions for: a). determining whether the STB is authentic or counterfeit; b). performing anti-counterfeit measures upon the STB when the device is determined to be counterfeit; and c). updating a communications protocol of the STB when the STB is determined to be authentic; a digital data decoder bi-directionally coupled to the databus; a central processing unit (CPU) bi-directionally coupled to the databus, the CPU implementing a STB control process controlling the memory, the first communications device and the digital decoder, the STB control process operable to process digital data received at the first communications device.
18 Citations
44 Claims
-
1. A set-top-box (STB) comprising:
-
a databus;
a first communication device suitable for coupling to a digital broadcast communications medium, said first communication device operable to receive digital broadcast data;
memory bi-directionally coupled to said databus, said memory including computer executable instructions for;
a) determining whether said STB is authentic or counterfeit; and
b) performing anti-counterfeit measures upon said STB when said device is determined to be counterfeit;
a digital data decoder bi-directionally coupled to said databus;
a central processing unit (CPU) bi-directionally coupled to said databus, said CPU implementing a STB control process controlling said memory, said first communications device and said digital decoder, said STB control process operable to process digital data received at said first communications device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21)
-
-
22. A set-top-box (STB) comprising:
-
a databus;
a first communication device suitable for coupling to a digital broadcast communications medium, said first communication device operable to receive digital broadcast data;
memory bi-directionally coupled to said databus, said memory including computer executable instructions for;
a) determining whether said STB is authentic or counterfeit;
b) performing anti-counterfeit measures upon said STB when said device is determined to be counterfeit; and
c) updating a communications protocol of said STB when said STB is determined to be authentic;
a digital data decoder bi-directionally coupled to said databus;
a central processing unit (CPU) bi-directionally coupled to said databus, said CPU implementing a STB control process controlling said memory, said first communications device and said digital decoder, said STB control process operable to process digital data received at said first communications device. - View Dependent Claims (23, 24, 25)
-
-
26. A computer implemented method for authenticating validity of a data receiving system such as a set-top-box, said computer implemented method comprising the act of:
transmitting to said data receiving system an anti-counterfeit software application executable by said data receiving system, said anti-counterfeit software operable to determine whether said data receiving device is counterfeit or authentic, said anti-counterfeit software further operable to perform anti-counterfeit measures at said data receiving system. - View Dependent Claims (27, 28, 29, 30, 31, 32, 33)
-
34. A counterfeit counter measure for transmission signal processors comprising:
-
a transmission signal;
an authenticity checker that is embedded in said transmission signal;
a transmission signal processor;
an authenticity verification that is embedded in said transmission signal processor;
wherein said authenticity checker executes once received by said transmission signal processor;
wherein said authenticity checker searches said transmission signal processor for said authenticity verification;
wherein if said authenticity verification is found said transmission signal processor processes said transmission signal properly; and
wherein if said authenticity verification is not found said transmission signal processor is disabled. - View Dependent Claims (35, 36, 37, 38, 39, 40, 41, 42)
-
-
43. A set-top box (STB) that receives a data file in data blocks for uni- and bi-directional signal system with a counterfeit countermeasures comprising:
-
a STB that is incorporated with a data file utilizing device;
a counterfeit countermeasure incorporated with said STB, said counterfeit countermeasure comprising an authenticity verification;
a signal source linked to said STB;
a data file that is broken into data blocks and sent over said signal source to said STB;
an authenticity checker embedded in said data file;
wherein said data is transmitted to said STB;
wherein once said data file is transmitted to said STB, said authenticity checker searches said STB for said authenticity verification; and
wherein if said authenticity verification is found, said data file may be restored from said data blocks and used by said data file utilizing device. - View Dependent Claims (44)
-
Specification