Multi-tier digital TV programming for content distribution
First Claim
1. A method of securely providing data to a users system over a broadcast infrastructure, the method comprising the steps of:
- encrypting the data using a first encrypting key so that the data can be subsequently decrypted using a first decrypting key;
encrypting the first decrypting key using a second encrypting key;
dividing the encrypted data into a series of logical packages, wherein the logical packages are divided independent of any transport layer protocol used to broadcast the packages;
placing at least some of the logical packages into a broadcast carousel for cyclical broadcast over the broadcast infrastructure;
broadcasting the packages in broadcast carousel so that they can be received by at least one user'"'"'s system, wherein the broadcast is cyclical and repeats periodically so that all of the logical packages representing the entire encrypted data are available locally for download at the user'"'"'s system, without requiring a request be made to a broadcast center; and
transferring the encrypted first decrypting key, which has been encrypted with the second encrypting key, to the user'"'"'s system.
1 Assignment
0 Petitions
Accused Products
Abstract
A method of securely providing data to a user'"'"'s system over a broadcast infrastructure. The method comprising the steps of: encrypting the data using a first encrypting key; encrypting a first decrypting key using a second encrypting key; dividing at least part of the encrypted data into a series of logical packages; placing at least some of the logical packages into a broadcast carousel for cyclical broadcast over the broadcast infrastructure; broadcasting the packages in broadcast carousel so that they can be received by at least one user'"'"'s system, wherein the broadcast is cyclical and repeats periodically; and transferring the encrypted first decrypting key, which has been encrypted with the second encrypting key, to the user'"'"'s system.
In another embodiment, a system is disclosed to carry out the above method in a broadcast infrastructure and an image overlaid on top of a primary image being displayed isused to denote that additional logical packages are available for receipt by broadcast.
415 Citations
29 Claims
-
1. A method of securely providing data to a users system over a broadcast infrastructure, the method comprising the steps of:
-
encrypting the data using a first encrypting key so that the data can be subsequently decrypted using a first decrypting key;
encrypting the first decrypting key using a second encrypting key;
dividing the encrypted data into a series of logical packages, wherein the logical packages are divided independent of any transport layer protocol used to broadcast the packages;
placing at least some of the logical packages into a broadcast carousel for cyclical broadcast over the broadcast infrastructure;
broadcasting the packages in broadcast carousel so that they can be received by at least one user'"'"'s system, wherein the broadcast is cyclical and repeats periodically so that all of the logical packages representing the entire encrypted data are available locally for download at the user'"'"'s system, without requiring a request be made to a broadcast center; and
transferring the encrypted first decrypting key, which has been encrypted with the second encrypting key, to the user'"'"'s system. - View Dependent Claims (2, 3, 4, 5, 6)
re-encrypting the first decrypting key using a third encrypting key;
broadcasting the decrypted and re-encrypted first decrypting key to the user'"'"'s system; and
decrypting the re-encrypted first decrypting key using a third decrypting key.
-
-
3. The method as defined in claim 1, wherein the step of transferring the encrypted first decrypting key includes the sub-steps of:
-
transferring the encrypted first decrypting key to a broadcast center;
re-encrypting the first decrypting key using a third encrypting key;
broadcasting the decrypted and re-encrypted first decrypting key to the users system; and
decrypting the re-encrypted first decrypting key using a third decrypting key.
-
-
4. The method as defined in claim 1, wherein the step of transferring the encrypted first decrypting key includes the sub-steps of:
-
transferring the encrypted first decrypting key to a clearinghouse;
re-encrypting the first decrypting key using a third encrypting key;
transferring the decrypted and re-encrypted first decrypting key to the user'"'"'s system via an Internet download; and
decrypting the re-encrypted first decrypting key using a third decrypting key.
-
-
5. The method as defined in claim 1, wherein the data contains a catalog of offerings available for broadcast.
-
6. The method as defined in claim 1, wherein the data contains a schedule of broadcast times for additional data.
-
7. A method of securely receiving data on a users system from a broadcast infrastructure, the method comprising the steps of:
-
receiving a primary broadcast stream;
receiving encrypted data that has been previously encrypted using a first encrypting key and wherein the data has been previously divided into a series of logical packages, wherein the logical packages are divided independent of any transport layer protocol used to broadcast the packages;
receiving data and related promotional data describing the encrypted data being received so that all of the logical packages representing the entire encrypted data are available locally for download, without requiring a request be made to a broadcast center;
assembling at least part of the promotional data into one or more promotional images for overlaying on top of the primary broadcast stream being displayed;
displaying the promotional images overlaid on top of the primary image being displayed;
receiving a user selection of one of the promotional images being displayed; and
assembling at least part of the packages being received in response to the user selection into the encrypted data. - View Dependent Claims (8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19)
receiving a decrypting key for decrypting the encrypted data assembled on the user'"'"'s system.
-
-
16. The method as defined in claim 15, wherein the step of receiving a decrypting key, includes receiving a decrypting key that has been encrypted with a second encrypting key.
-
17. The method as defined in claim 15, wherein the step of receiving a decrypting key includes receiving a decrypting key over a broadcast stream.
-
18. The method defined in claim 15, wherein a second decrypting key for decrypting data that has been encrypted with the second encryption key is sent to the user'"'"'s system from a clearinghouse.
-
19. The method defined in claim 16, wherein the second decrypting key has a timeout provision for decrypting data that has been encrypted with the second encryption key is sent to the user'"'"'s system from a clearinghouse.
-
20. A system for securely providing data to a user'"'"'s system over a broadcast infrastructure, the system comprising:
-
a content system;
a first public key;
a first private key, which corresponds to the first public key;
a data encrypting key;
a data decrypting key for decrypting data encrypted using the data encrypting key;
first data encryption means for encrypting data so as to be decrypt able only by a data decrypting key;
second data encryption means, using the first public key, for encrypting the data decrypting key;
a clearinghouse;
a broadcast center, for broadcasting a primary broadcast stream and a secondary broadcast stream for reception by the users system, wherein the second broadcast stream includes data encrypted with the data encrypting key, and wherein the data has been broken into a series of packages that are broadcast in a cyclical pattern which repeats over time, wherein the packages are divided independent of any transport layer protocol used to subsequently broadcast the packages so that all of the logical packages representing the entire encrypted data are available locally for download at the user'"'"'s system, without requiring a request be made to a broadcast center;
first transferring means for transferring the data decrypting key which has been encrypted to the clearinghouse, wherein the clearinghouse possesses the first private key;
first decrypting means for decrypting the data decrypting key using the first private key;
a second public key;
a second private key, which corresponds to the second public key;
re-encryption means for re-encrypting the data decrypting key using the second public key;
second transferring means for transferring the re-encrypted data decrypting key to the user'"'"'s system via an Internet download, wherein the user'"'"'s system possesses the second private key; and
second decrypting means for decrypting the re-encrypted data decrypting key using the second private key. - View Dependent Claims (21, 22, 23)
-
-
24. The system for securely receiving data on a user'"'"'s system from a broadcast infrastructure, comprising:
-
a first receiver for receiving a primary broadcast stream for display on a user'"'"'s system;
a second receiver for receiving encrypted data that has been previously encrypted using a first encrypting key and wherein the data has been previously divided into a series of logical packages, wherein the logical packages are divided independent of any transport layer protocol used to subsequently broadcast the packages so that all of the logical packages representing the entire encrypted data are available locally for download at the user'"'"'s system, without requiring a request be made to a broadcast center, wherein the second receiver receives encrypted data and related promotional data describing the encrypted data being received;
a first assembler for assembling at least part of the promotional data into a promotional image for overlaying on top of the primary broadcast stream being displayed;
means for displaying the promotional image overlaid on top of the primary image being displayed;
means for receiving a user selection of one of the promotional images being displayed; and
a second assembler for assembling at least part of the packages being received in response to the user selection into the encrypted data. - View Dependent Claims (25, 26, 27, 28, 29)
-
Specification