Security model for interactive television applications
DCFirst Claim
1. A method for controlling functions of interactive television applications in an interactive television system, the method comprising:
- loading in said interactive television system an interactive television application having a credential associated therewith, said credential including information identifying one or more functions;
verifying said credential;
when said interactive television application attempts to perform said one or more functions, allowing said interactive television application to perform said one or more functions if said information indicates permission to perform said one or more functions.
0 Assignments
Litigations
1 Petition
Accused Products
Abstract
A system and method implemented in an interactive television system for restricting or controlling the access rights of interactive television applications and carousels. The system broadcasts modules from a broadcast station to a plurality of receiving stations, which execute applications containing the modules. In one embodiment, the applications utilize a credential consisting of a producer identification number (ID) and an application ID for each of the grantor and grantee applications, an expiration date, a set of permission data, a producer certificate and a signature. An application requesting access and a carousel granting access may be identified by respective producer and application IDs. The credential utilizes public key encryption to ensure the integrity of the credential. The producer and application IDs may be replaced with wildcards so that rights may be granted to a group of producers or applications.
-
Citations
26 Claims
-
1. A method for controlling functions of interactive television applications in an interactive television system, the method comprising:
-
loading in said interactive television system an interactive television application having a credential associated therewith, said credential including information identifying one or more functions; verifying said credential; when said interactive television application attempts to perform said one or more functions, allowing said interactive television application to perform said one or more functions if said information indicates permission to perform said one or more functions. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A device in an interactive television system for controlling functions attempted by an interactive television application, comprising:
-
a receiver configured to receive a broadcast interactive television signal containing said interactive television application, said interactive television application having a credential associated therewith; a data storage device for storing said interactive television application and said credential; a control unit configured to verify said credential, said control unit being further configured to allow said interactive television application to perform a function if said credential is valid and to prevent said interactive television application from performing said function if said credential is not valid. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. An interactive television system configured to control operations performed by an interactive television application, the system comprising:
-
a broadcast station configured to transmit a broadcast signal containing an interactive television application; a receiver configured to receive said broadcast signal from said broadcast station, to extract said interactive television application from said broadcast signal and to execute said interactive television application, said receiver being further configured to accept a request from said application to perform an operation and to allow said application to perform said operation if said application has a valid credential. - View Dependent Claims (21, 22)
-
-
23. A device for executing applications in a controlled manner comprising:
-
a memory for storing an application and a credential associated with said application, wherein said credential contains data corresponding to one or more permissions, said data indicating whether said application has said one or more permissions; and a control unit configured to execute said application, wherein said control unit is configured to verify whether said application has said one or more permissions and to execute said application in accordance with said one or more permissions. - View Dependent Claims (24, 25, 26)
-
Specification