Intrusion detection for object security
First Claim
Patent Images
1. A method for detecting modification to a content receiver within a conditional access system, the method comprising steps of:
- generating a message by a content provider of the conditional access system;
sending the message to a content receiver by way of a network;
receiving the message by the content receiver from the network; and
loading a portion of the message that disrupts operation of the content receiver if the content receiver fails to check at least one of authentication of the message and authorization of the message.
4 Assignments
0 Petitions
Accused Products
Abstract
According to the invention, an apparatus and methods for detecting modifications to information within a content receiver are described. In one embodiment, a method for detecting modification to a content receiver within a conditional access system is disclosed. In this process, a content provider generates a message. The message is sent to the content receiver by way of a network. The content receiver gets the message from the network. The content provider detects any unauthorized modification to the content receiver.
69 Citations
12 Claims
-
1. A method for detecting modification to a content receiver within a conditional access system, the method comprising steps of:
-
generating a message by a content provider of the conditional access system;
sending the message to a content receiver by way of a network;
receiving the message by the content receiver from the network; and
loading a portion of the message that disrupts operation of the content receiver if the content receiver fails to check at least one of authentication of the message and authorization of the message. - View Dependent Claims (2, 3, 4, 5)
checking authenticity of the message, and checking authorization of the message.
-
-
6. A method for detecting modification to a content receiver within a conditional access system after a content receiver is deployed in a broadcast television system, the method comprising steps of:
-
generating a message with a content provider couple to the conditional access system;
sending the message with a content receiver by way of a content ditrbution network wherein;
the message includes an intentionally inserted error, and the content receiver is deployed in the coditional access system for receving content that includes video programs;
receiving the message by the content receiver from the content destribution network, checking authenticity of the message;
cheking authorazation of the messge; and
automatically detecting, at a point remote to the content receiver, that the content receiver failed to detect the intentionally-inserted error in the message. - View Dependent Claims (8, 9)
-
-
7. A method for detecting modification to a content receiver within a conditional access system after a content receiver is deployed in a broadcast television system, the method comprising steps of:
-
generating a message with a content provider couple to the conditional access system;
sending the message with a content receiver by way of a content ditribution network wherein;
the message includes an intentionally inserted error, and the content receiver is deployed in the coditional access system for receving content that includes video programs;
receiving the message by the content receiver from the content destribution network; and
automatically detecting, at a point remote to the content receiver, that the content receiver failed to detect the intentionally-inserted error in the message wherein the content receiver is a set top box.
-
-
10. The method for detecting modification to a content receiver within a conditional access system after a content receiver is deployed in a broadcast television system, the method comprising steps of:
-
generating a message with a content provider coupled to the conditional access system;
sending the message to the content receiver by way of a content distribution network wherein;
the message includes an intentionally-inserted error, and the content receiver is deployed in the conditional access system for receiving content that includes video programs;
receiving the message by the content receiver from the content distribution network;
automatically detecting, at a point remote to the content receiver, that the content receiver failed to detect the intentionally-inserted error in the message; and
randomly placing an error in the message.
-
-
11. The method for detecting modification to a content receiver within a conditional access system after a content receiver is deployed in a broadcast television system, the method comprising steps of:
-
generating a message with a content provider coupled to the conditional access system;
sending the message to the content receiver by way of a content distribution network wherein;
the message includes an intentionally-inserted error, and the content receiver is deployed in the conditional access system for receiving content that includes video programs;
receiving the message by the content receiver from the content distribution network;
automatically detecting, at a point remote to the content receiver, that the content receiver failed to detect the intentionally-inserted error in the message;
detecting if the content receiver fails to check at least one of authentication of the message and authorization of the message; and
loading a portion of the message that disrupts operation of the content receiver.
-
-
12. A method for detecting modification to a content receiver within a conditional access system after a content receiver is deployed in a broadcast television system, the method comprising steps of:
-
generating a message with a content provider coupled to the conditional access system;
sending the message to the content receiver by way of a content distribution network wherein;
the message includes an intentionally-inserted error, and the content receiver is deployed in the conditional access system for receiving content that includes video programs;
receiving the message by the content receiver from the content distribution network;
automatically detecting, at a point remote to the content receiver, that the content receiver failed to detect the intentionally-inserted error in the message;
interacting with an unauthorized resource;
detecting if the content receiver fails to report the interacting step; and
loading a portion of the message that disrupts operation of the content receiver without intervention from outside the content receiver.
-
Specification