Signal processing apparatus and methods
DCFirst Claim
1. A method of inhibiting piracy of information or enabling a presentation of programming at a subscriber station, said method comprising the steps of:
- receiving an information transmission from a first remote station;
detecting instruct-to-sample instructions in the information transmission;
processing, under control of said instruct-to-sample instructions, a datum at said subscriber station;
comparing, under control of said instruct-to-sample instructions, selected comparison information of said instruct-to-sample instructions to a selected sample of preprogrammed operating information at said subscriber station, said selected comparison information and said selected sample of preprogrammed operating information being selected based on said step of processing, whereby a successful match indicates that said subscriber station is properly programmed and a failed match suggests that said preprogrammed operating information at said subscriber station has been tampered with; and
performing, under control of said instruct-to-sample instructions, at said subscriber station at least one of the steps of;
(1) disabling the functionality of some portion of said subscriber station (i) when said step of comparing results in a determination that said subscriber station has been tampered with or (ii) when an instruction is executed based on said step of comparing and said subscriber station fails to respond in a predetermined fashion or within a predetermined period of time;
(2) communicating appearance-of-tampering information to a second remote station when said step of comparing results in a determination that said subscriber station has been tampered with; and
(3) enabling at least some of a programming presentation when said step of comparing results in a determination that said subscriber station is properly programmed.
1 Assignment
Litigations
1 Petition
Accused Products
Abstract
A unified system of programming communication. The system encompasses the prior art (television, radio, broadcast hardcopy, computer communications, etc.) and new user specific mass media. Within the unified system, parallel processing computer systems, each having an input (e.g., 77) controlling a plurality of computers (e.g., 205), generate and output user information at receiver stations. Under broadcast control, local computers (73, 205), combine user information selectively into prior art communications to exhibit personalized mass media programming at video monitors (202), speakers (263), printers (221), etc. At intermediate transmission stations (e.g., cable television stations), signals in network broadcasts and from local inputs (74, 77, 97, 98) cause control processors (71) and computers (73) to selectively automate connection and operation of receivers (53), recorder/players (76), computers (73), generators (82), strippers (81), etc. At receiver stations, signals in received transmissions and from local inputs (225, 218, 22) cause control processors (200) and computers (205) to automate connection and operation of converters (201), tuners (215), decryptors (224), recorder/players (217), computers (205), furnaces (206), etc. Processors (71, 200) meter and monitor availability and usage of programming.
-
Citations
31 Claims
-
1. A method of inhibiting piracy of information or enabling a presentation of programming at a subscriber station, said method comprising the steps of:
-
receiving an information transmission from a first remote station; detecting instruct-to-sample instructions in the information transmission; processing, under control of said instruct-to-sample instructions, a datum at said subscriber station; comparing, under control of said instruct-to-sample instructions, selected comparison information of said instruct-to-sample instructions to a selected sample of preprogrammed operating information at said subscriber station, said selected comparison information and said selected sample of preprogrammed operating information being selected based on said step of processing, whereby a successful match indicates that said subscriber station is properly programmed and a failed match suggests that said preprogrammed operating information at said subscriber station has been tampered with; and performing, under control of said instruct-to-sample instructions, at said subscriber station at least one of the steps of; (1) disabling the functionality of some portion of said subscriber station (i) when said step of comparing results in a determination that said subscriber station has been tampered with or (ii) when an instruction is executed based on said step of comparing and said subscriber station fails to respond in a predetermined fashion or within a predetermined period of time; (2) communicating appearance-of-tampering information to a second remote station when said step of comparing results in a determination that said subscriber station has been tampered with; and (3) enabling at least some of a programming presentation when said step of comparing results in a determination that said subscriber station is properly programmed. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A method of decrypting programming at a receiver station, said method comprising the steps of:
-
receiving an encrypted digital information transmission including encrypted information; detecting in said encrypted digital information transmission the presence of an instruct-to-enable signal; passing said instruct-to-enable signal to a processor; determining a fashion in which said receiver station locates a first decryption key by processing said instruct-to-enable signal; locating said first decryption key based on said step of determining; decrypting said encrypted information using said first decryption key; and outputting said programming based on said step of decrypting. - View Dependent Claims (14, 15, 16, 17, 18, 19)
-
-
20. A method of decrypting programming at a receiver station, said method comprising the steps of:
-
receiving an encrypted digital information transmission including encrypted information; detecting in said encrypted digital information transmission the presence of a first instruct-to-enable signal including first processor instructions; executing said first processor instructions of said first instruct-to-enable signal to provide a first decryption key; detecting in said encrypted digital information transmission the presence of a second instruct-to-enable signal including second processor instructions; executing said second processor instructions to provide a second decryption key; decrypting said encrypted information using said first and second decryption keys; and outputting said programming based on said step of decrypting. - View Dependent Claims (21, 22, 23, 24, 25)
-
-
26. A method of decrypting programming at a receiver station, said method comprising the steps of:
-
receiving an information transmission including encrypted information; detecting the presence of an instruct-to-enable signal; passing said instruct-to-enable signal to a processor; automatically tuning said receiver station to a channel designated by said instruct-to-enable signal; receiving enabling information from a remote source based on said step of tuning; decrypting said encrypted information by processing said enabling information; and outputting said programming based on said step of decrypting. - View Dependent Claims (27, 28, 29, 30, 31)
-
Specification