Intrusion detection for object security
First Claim
1. A method for detecting modification to a video content receiver within a conditional access system having a headend coupled with a plurality of video content receivers using a private content distribution network, the method comprising steps of:
- generating a message by a content provider of the conditional access system, wherein the message intentionally includes an unauthorized activity;
sending the message to the video content receiver by way of a private content distribution network, wherein;
the private content distribution network allows broadcast from the headend to the video content receivers, andvideo content receivers cannot play unauthorized received content;
receiving the message by the video content receiver from the private content distribution network, wherein the unauthorized activity of the message causes an activity not authorized for the video content receiver; and
automatically recording an exception condition if the video content receiver fails to notify the content provider of the unauthorized activity, whereby a properly functioning video content receiver would notify the content provider of this type of unauthorized activity.
4 Assignments
0 Petitions
Accused Products
Abstract
According to the invention, a method for detecting modification to a video content receiver within a content distribution system is described. In one step, a message is generated by a content provider. The message is sent to the content receiver by way of a network. The message includes an intentionally-inserted error that a normally-operating content receiver would detect. The message is check for either authenticity or authorization. The message is received by the content receiver from the network. At a point physically remote to the content receiver, it is detected that the content receiver failed to detect the intentionally-inserted error in the message.
6 Citations
19 Claims
-
1. A method for detecting modification to a video content receiver within a conditional access system having a headend coupled with a plurality of video content receivers using a private content distribution network, the method comprising steps of:
-
generating a message by a content provider of the conditional access system, wherein the message intentionally includes an unauthorized activity; sending the message to the video content receiver by way of a private content distribution network, wherein; the private content distribution network allows broadcast from the headend to the video content receivers, and video content receivers cannot play unauthorized received content; receiving the message by the video content receiver from the private content distribution network, wherein the unauthorized activity of the message causes an activity not authorized for the video content receiver; and automatically recording an exception condition if the video content receiver fails to notify the content provider of the unauthorized activity, whereby a properly functioning video content receiver would notify the content provider of this type of unauthorized activity. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method for detecting modification to a content receiver within a system, the method comprising steps of:
-
generating a message by a content provider; sending the message to the content receiver by way of a network, wherein; the message includes an intentionally-inserted error, and a normally-operating content receiver would detect the intentionally-inserted error when at least one of the following steps is performed; checking authenticity of the message, and checking authorization of the message; receiving the message by the content receiver from the network; and automatically detecting, at a point physically remote to the content receiver, that the content receiver failed to detect the intentionally-inserted error in the message. - View Dependent Claims (11, 12, 13, 14)
-
-
15. A method for detecting modification to a content receiver within a system, the method comprising steps of:
-
generating a message by a content provider of the system; sending the message to a content receiver by way of a network; receiving the message by the content receiver from the network; and loading a portion of the message that disrupts operation of the content receiver if the content receiver fails to check at least one of authentication of the message and authorization of the message. - View Dependent Claims (16, 17, 18, 19)
-
Specification