H04L2463/101

Using secure web sockets to extend reach of conditional access systems
11310271 · 2022-04-19 · ·

A system and method for securely and bi-directionally transmitting information including conditional access private data between a client and a headend is disclosed. In an exemplary embodiment, the method includes: establishing a hypertext transfer protocol secure (HTTPs) connection, establishing a hypertext transfer protocol secure (HTTPs) connection; upgrading the HTTPs connection to a persistent bi-directional connection, accepting a first message from a client via the web socket connection, wherein the first message comprises an identifier of the client, parsing the message for the identifier of the client, associating the identifier of the client with the secure web socket connection, and transmitting a second message notifying the headend of the secure web site that connection, the message comprising the identifier of the client.

Method and apparatus for creating and using quantum resistant keys
11308183 · 2022-04-19 · ·

A system is disclosed for securely communicating between a user device and a target device, which includes a user input receiving user inputs and a user device memory for storing at least one fixed dataset having a plurality of data bits and an inherent entropy. At least one predetermined harvest process is stored in ser device memory, which is operable within a main harvest process to distill the dataset to a predetermined bit length to define a private key of the user at a predetermined key length. A processor operates to execute the main harvest process to receive a unique user Personal Information Number (PIN) acquired by the user and having a plurality of digits associated therewith, and wherein the at least one predetermined harvest process is dependent on the user PIN and the value of at least one of the digits therein, such that the at least one predetermined harvest process is parameterized by the value of the at least one of the digits and operates differently for each value of the at least one of the digits. The processor applies the at least one predetermined harvest process to the dataset to distill the dataset down to the predetermined key length to define the private key, and then stores the private key to the user device. A target device memory and an encryption engine on the target device interface with a proximity-based link. The private key is transferred to the target device via the proximity-based link and an interface on the target device stores the transmitted private key in the target device memory.

Method and system for a signed document validity service

A method for managing documents includes obtaining, from a first computing device, a first signed document, and in response to obtaining the first signed document: identifying a first plurality of validity services associated with the signed document, sending a verification request to the first plurality of validity services, wherein each of the plurality of verification requests specifies the first signed document, obtaining a plurality of verification responses from the first plurality of validity services, and making a determination, based on the plurality of verification responses, that the first signed document is valid.

OPERATING SYSTEM LEVEL MANAGEMENT OF GROUP COMMUNICATION SESSIONS

A device for providing operating system managed group communication sessions may include a memory and at least one processor. The at least one processor may be configured to receive, by an operating system level process executing on a device and from an application process executing on a device, a request to initiate a group session between a user associated with the device and another user. The at least one processor may be further configured to identify, by the operating system level process, another device associated with the other user. The at least one processor may be further configured to initiate, by the operating system level process, the group session with the user via the other device. The at least one processor may be further configured to manage, by the operating system level process, the group session.

Methods and systems for purchasing, sharing and transferring ownership of digital music using authenticated data files from near field communication (NFC) chips
11272339 · 2022-03-08 ·

Methods for sharing and transferring music files using near field communication (NFC), which include receiving an NFC ID from an NFC chip using an NFC enabled device, authenticating the received NFC ID with a server system using the NFC enabled device, and upon authentication, permitting the NFC enabled device to temporarily stream or purchase music files.

Electronic apparatus, server and method of controlling the same
11272234 · 2022-03-08 · ·

Disclosed are an electronic apparatus, a server, and a method of controlling the same, the server including: a communicator configured to connect with an electronic apparatus and an external server; and a processor configured to: generate first encrypted information by encrypting first decryption information received from the electronic apparatus, the first decryption information for reproducing content, control the communicator to transmit, to the external server, the generated first encrypted information, generate second decryption information by decrypting second encrypted information received from the external server, the second encrypted information generated based on the first decryption information, and control the communicator transmit the generated second decryption information to the electronic apparatus to scramble the content by a scrambler of the electronic apparatus.

DATA TRANSMISSION METHOD, ELECTRONIC DEVICE AND COMPUTER-READABLE STORAGE MEDIUM
20230396616 · 2023-12-07 ·

A data transmission method, an electronic device and a computer-readable storage medium are disclosed. The method is applied to a topological connection, the topological connection including a source node and first-level sub-nodes. The method includes: selecting, according to the source node, a first-level sub-node to which digital content is issued by the source node; establishing an authentication channel between the first-level sub-node and the source node; adjusting a counting parameter of the source node according to the authentication channel, and acquiring an authentication identifier of the first-level sub-node; and issuing the digital content to the first-level sub-node according to the authentication identifier if the adjusted counting parameter is smaller than a preset threshold.

Right Holder Terminal, Permission Information Management Method, and Permission Information Management Program

A user terminal generates a first key pair and a second key pair, transmits a permission request including a public encryption key of the second key pair after electronically signing the permission request with a secret encryption key, and acquires, from permission information transmitted from a right-holder terminal, a content decryption key by using a secret decryption key of the second key pair and uses the content. The right-holder terminal stores a third key pair and the content decryption key, verifies the permission request received, and encrypts the content decryption key by using the public encryption key of the second key pair included in the permission request and transmits the permission information including the encrypted content decryption key after electronically signing the permission information with a secret encryption key of the third key pair. The permission request and the permission information are transmitted and received via a blockchain.

METHOD AND APPARATUS FOR PORTABLY BINDING LICENSE RIGHTS TO CONTENT STORED ON OPTICAL MEDIA
20210334340 · 2021-10-28 ·

There is provided a method for use by a playback system to play back encrypted content associated with a first globally unique identifier (ID). The method includes storing an encrypted content in a memory being under control of a memory controller having a second globally unique ID, storing the first globally unique ID, transmitting a request from the memory controller to a license server, the request comprising the first globally unique ID, the second globally unique ID and a request for a content license to play back the encrypted content, receiving the content license enabling a right for the playback of the encrypted content, the content license including content keys and being encrypted to be decryptable according to a memory controller secret associated with the second globally unique ID, decrypting the content license, according to the memory controller secret to recover the content keys to a playback module.

Apparatus and method for adapting authorization information for a terminal
11159492 · 2021-10-26 · ·

An apparatus for adapting authorization information for a terminal is provided. The apparatus has a communication unit for communicating with the terminal, the communication unit being configured to carry out the communication as a test communication using an encryption protocol, a checking unit for checking a configuration of the encryption protocol on the terminal, and a control unit for adapting the authorization information for the terminal on the basis of a result of the check. A corresponding method for adapting authorization information for a terminal is also proposed. The proposed apparatus makes it possible to check the options supported by a terminal in an encryption protocol. In this case, the check can be carried out, in particular, using an encrypted communication connection which could not be monitored by a firewall.