Signal processing apparatus and methods
First Claim
1. A method of inhibiting piracy of information at a subscriber station, said method comprising the steps of:
- receiving at said subscriber station an information transmission from a remote station;
detecting instruct-to-sample instructions including selected comparison information in the information transmission;
processing, under control of said instruct-to-sample instructions, a datum at said subscriber station resulting in selection of a selected sample of preprogrammed operating information;
comparing, under control of said instruct-to-sample instructions, said selected comparison information of said instruct-to-sample instructions to said selected sample of preprogrammed operating information at said subscriber station, whereby a successful match indicates that said subscriber station is properly programmed and a failed match suggests that said preprogrammed operating information at said subscriber station has been tampered with; and
performing, under control of said instruct-to-sample instructions, at said subscriber station at least one of the steps of;
(1) disabling functionality of some portion of said subscriber station (i) when said step of comparing results in a determination that said subscriber station has been tampered with or (ii) when an instruction is executed based on said step of comparing and said subscriber station fails to respond in a predetermined fashion or within a predetermined period of time;
(2) communicating appearance-of-tampering information to said remote station when said step of comparing results in a determination that said subscriber station has been tampered with; and
(3) enabling at least some of a programming presentation when said step of comparing results in a determination that said subscriber station is properly programmed.
1 Assignment
0 Petitions
Accused Products
Abstract
A unified system of programming communication. The system encompasses the prior art (television, radio, broadcast hardcopy, computer communications, etc.) and new user specific mass media. Within the unified system, parallel processing computer systems, each having an input (e.g., 77) controlling a plurality of computers (e.g., 205), generate and output user information at receiver stations. Under broadcast control, local computers (73, 205), combine user information selectively into prior art communications to exhibit personalized mass media programming at video monitors (202), speakers (263), printers (221), etc. At intermediate transmission stations (e.g., cable television stations), signals in network broadcasts and from local inputs (74, 77, 97, 98) cause control processors (71) and computers (73) to selectively automate connection and operation of receivers (53), recorder/players (76), computers (73), generators (82), strippers (81), etc. At receiver stations, signals in received transmissions and from local inputs (225, 218, 22) cause control processors (200) and computers (205) to automate connection and operation of converters (201), tuners (215), decryptors (224), recorder/players (217), computers (205), furnaces (206), etc. Processors (71, 200) meter and monitor availability and usage of programming.
-
Citations
30 Claims
-
1. A method of inhibiting piracy of information at a subscriber station, said method comprising the steps of:
-
receiving at said subscriber station an information transmission from a remote station; detecting instruct-to-sample instructions including selected comparison information in the information transmission; processing, under control of said instruct-to-sample instructions, a datum at said subscriber station resulting in selection of a selected sample of preprogrammed operating information; comparing, under control of said instruct-to-sample instructions, said selected comparison information of said instruct-to-sample instructions to said selected sample of preprogrammed operating information at said subscriber station, whereby a successful match indicates that said subscriber station is properly programmed and a failed match suggests that said preprogrammed operating information at said subscriber station has been tampered with; and performing, under control of said instruct-to-sample instructions, at said subscriber station at least one of the steps of; (1) disabling functionality of some portion of said subscriber station (i) when said step of comparing results in a determination that said subscriber station has been tampered with or (ii) when an instruction is executed based on said step of comparing and said subscriber station fails to respond in a predetermined fashion or within a predetermined period of time; (2) communicating appearance-of-tampering information to said remote station when said step of comparing results in a determination that said subscriber station has been tampered with; and (3) enabling at least some of a programming presentation when said step of comparing results in a determination that said subscriber station is properly programmed. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A method of inhibiting piracy of information at a subscriber station, comprising the steps of:
-
transmitting an information transmission to said subscriber station; and transmitting instruct-to-sample instructions including selected comparison information to said subscriber station, said instruct-to-sample instruction causing said subscriber station to process a datum at said subscriber station resulting in selection of a selected sample of preprogrammed operating information, to compare said selected comparison information of said instruct-to-sample instructions to said selected sample of preprogrammed operating information at said subscriber station, whereby a successful match indicates that said subscriber station is properly programmed and a failed match suggests that said preprogrammed operating information at said subscriber station has been tampered with, and to perform at least one of; (1) disabling functionality of some portion of said subscriber station (i) when said comparing results in a determination that said subscriber station has been tampered with or (ii) when an instruction is executed based on said comparing and said subscriber station fails to respond in a predetermined fashion or within a predetermined period of time; (2) communicating appearance-of-tampering information to a remote station when said comparing results in a determination that said subscriber station has been tampered with; and (3) enabling at least some of a programming presentation when said comparing results in a determination that said subscriber station is properly programmed. - View Dependent Claims (14, 15, 16)
-
-
17. A method of decrypting digital television programming at a receiver station in a network including a plurality of receiver stations, said method comprising the steps of:
-
preprogramming said receiver station with authorization information including a first decryption key at a particular location that varies from station to station in said plurality of receiver stations in accordance with receiver station specific information; receiving an information transmission including encrypted programming; detecting presence of an instruct-to-enable signal; passing said instruct-to-enable signal to a processor; determining a fashion in which said receiver station locates said first decryption key by processing said instruct-to-enable signal; locating said first decryption key in said fashion at said particular location based on said step of determining; decrypting said encrypted programming using said first decryption key; and outputting to a user at said receiver station said programming based on said step of decrypting. - View Dependent Claims (18, 19, 20, 21, 22)
-
-
23. A method of decrypting digital television programming at a receiver station, said method comprising the steps of:
-
receiving an information transmission including encrypted programming; decrypting an audio portion of said encrypted programming using a first decryption key; detecting presence in said information transmission of a first instruct-to-enable signal including first processor instructions; executing said first processor instructions of said first instruct-to-enable signal to provide a location of a second decryption key based on decrypting said audio portion using said first decryption key; detecting presence in said information transmission of a second instruct-to-enable signal including second processor instructions; executing said second processor instructions to provide a third decryption key; decrypting a video portion of said encrypted programming using said second and third decryption keys; and outputting to a user at said receiver station said programming based on said steps of decrypting. - View Dependent Claims (24, 25)
-
-
26. A method of decrypting digital television programming at a receiver station, said method comprising the steps of:
-
receiving instructions including an instruct-to-enable signal from a remote transmitter station; detecting presence of said instruct-to-enable signal in said received instructions; passing said instruct-to-enable signal to a processor; automatically, under control of said processor, tuning a tuner at said receiver station to a particular channel designated by said instruct-to-enable signal; receiving an information transmission including encrypted programming from said remote transmitter station; receiving enabling information on said particular channel designated by said instruct-to-enable signal; decrypting said encrypted programming by processing said enabling information; and outputting said programming to a user at said receiver station based on said step of decrypting. - View Dependent Claims (27, 28, 29, 30)
-
Specification