Method and system for detecting and preventing unauthorized signal usage in a content delivery network
First Claim
Patent Images
1. A method for detecting unauthorized signal usage in a content delivery network, the method comprising the steps of:
- acquiring at least two signal usage records for a receiver of said content, each signal usage record having indicia of actual usage associated therewith;
evaluating the respective indicia of actual usage for said at least two signal usage records against a predetermined combination of indicia of usage that are associated with a combination of signals not authorized for usage together on said receiver; and
detecting unauthorized signal usage upon said respective actual usage indicia for said at least two signal usage records being consistent with said predetermined combination of indicia, regardless of whether each instance of signal usage associated with the at least two actual signal usage records have been previously individually authorized for usage with said receiver.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and system for controlling unauthorized signal usage in a content delivery network, such as a television network, is described. The method and system acquires at least two signal usage records for a receiver of the content, evaluates the at least two signal usage records for indicia of usage of a combination of signals not normally authorized on the receiver, and detects unauthorized signal usage upon the at least two signal usage records being consistent with such indicia.
70 Citations
45 Claims
-
1. A method for detecting unauthorized signal usage in a content delivery network, the method comprising the steps of:
-
acquiring at least two signal usage records for a receiver of said content, each signal usage record having indicia of actual usage associated therewith; evaluating the respective indicia of actual usage for said at least two signal usage records against a predetermined combination of indicia of usage that are associated with a combination of signals not authorized for usage together on said receiver; and detecting unauthorized signal usage upon said respective actual usage indicia for said at least two signal usage records being consistent with said predetermined combination of indicia, regardless of whether each instance of signal usage associated with the at least two actual signal usage records have been previously individually authorized for usage with said receiver. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25)
-
-
26. A system for detecting unauthorized signal usage in a content delivery network, comprising:
-
a processor; and a computer-readable storage medium in communication with the processor, the computer-readable storage medium having computer-readable instructions thereon, the computer-readable instructions including instructions executable by the processor for; acquiring at least two signal usage records for a receiver of said content, each signal usage record having indicia of actual usage associated therewith; evaluating the respective indicia of actual usage for said at least two signal usage records against a predetermined combination of indicia of usage that are associated with a combination of signals not for usage together on said receiver; and detecting unauthorized signal usage upon said respective actual usage indicia for said at least two signal usage records being consistent with said predetermined combination of indicia, regardless of whether each instance of signal usage associated with the at least two actual signal usage records have been previously individually authorized for usage with said receiver. - View Dependent Claims (27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44)
-
-
45. A system for detecting unauthorized signal usage in a content delivery network, the system comprising:
a processor, wherein the processor is configured to; acquire at least two signal usage records for a receiver of said content, each signal usage record having indicia of actual usage associated therewith; evaluate the respective indicia of actual usage for said at least two signal usage records against a predetermined combination of indicia of usage that are associated with a combination of signals not authorized for usage together on said receiver; and detect unauthorized signal usage upon said respective actual usage indicia for said at least two signal usage records being consistent with said predetermined combination of indicia, regardless of whether each instance of signal usage associated with the at least two actual signal usage records have been previously individually authorized for usage with said receiver.
Specification