throbber
(19) United States
`(12) Patent Application Publication (10) Pub. No.: US 2003/0208561 A1
`Hoang et al.
`(43) Pub. Date:
`Nov. 6, 2003
`
`US 20030208561A1
`
`(54) COUNTERFEIT STB PREVENTION
`THROUGH PROTOCOL, SWITCHING
`(76) Inventors: Khoi Hoang, Pleasanton, CA (US);
`Tony Qu, San Ramon, CA (US)
`Correspondence Address:
`OPPENHEIMER WOLFF & DONNELLY
`P. O. BOX 10356
`PALO ALTO, CA 94.303 (US)
`(21) Appl. No.:
`09/892,015
`(22) Filed:
`Jun. 25, 2001
`Related U.S. Application Data
`(63) Continuation-in-part of application No. 09/870,879,
`filed on May 30, 2001.
`Continuation-in-part of application No. 09/841,792,
`filed on Apr. 24, 2001.
`Continuation-in-part of application No. 09/709,948,
`filed on Nov. 10, 2000.
`Continuation-in-part of application No. 09/584,832,
`filed on May 31, 2000, now Pat. No. 6,557,030.
`
`Publication Classification
`
`(51) Int. Cl." ..................................................... G06F 15/16
`
`(52) U.S. Cl. ........................... 709/219; 709/229; 713/200
`
`(57)
`
`ABSTRACT
`
`The present invention teaches a universal STB operative to
`prevent unauthorized access to digital broadcast data includ
`ing: a databus; a first communication device Suitable for
`coupling to a digital broadcast communications medium, the
`first communication device operable to receive digital
`broadcast data; memory bi-directionally coupled to the
`databus, the memory including computer executable instruc
`tions for: a). determining whether the STB is authentic or
`counterfeit, b). performing anti-counterfeit measures upon
`the STB when the device is determined to be counterfeit, and
`c). updating a communications protocol of the STB when the
`STB is determined to be authentic; a digital data decoder
`bi-directionally coupled to the databus; a central processing
`unit (CPU) bi-directionally coupled to the databus, the CPU
`implementing a STB control proceSS controlling the
`memory, the first communications device and the digital
`decoder, the STB control proceSS operable to proceSS digital
`data received at the first communications device.
`
`36O V
`
`
`
`dist
`fire
`ckeye of I
`it
`
`s
`
`Eg:
`
`demand that serve?
`dei speeds.
`
`?eceive Giew Are
`deal vid
`to do
`
`
`
`
`
`
`
`DISH, Exh.1010, p.0001
`
`

`

`Patent Application Publication
`
`Nov. 6, 2003 Sheet 1 of 11
`
`US 2003/0208561 A1
`
`
`
`DISH, Exh.1010, p.0002
`
`

`

`Patent Application Publication
`
`Nov. 6, 2003 Sheet 2 of 11
`
`US 2003/0208561 A1
`
`
`
`DISH, Exh.1010, p.0003
`
`

`

`Patent Application Publication
`
`Nov. 6, 2003 Sheet 3 of 11
`
`US 2003/0208561 A1
`
`s
`
`
`
`DISH, Exh.1010, p.0004
`
`

`

`Patent Application Publication
`
`Nov. 6, 2003 Sheet 4 of 11
`
`US 2003/0208561 A1
`
`
`
`DISH, Exh.1010, p.0005
`
`

`

`Patent Application Publication
`
`Nov. 6, 2003 Sheet 5 of 11
`
`US 2003/0208561 A1
`
`(SARD
`
`340
`
`/
`
`IDENTFY THE AVAILABLE
`SLOTS WITHIN THE
`AVAILABLE BANDWIDTH
`
`342
`
`PROVIDE EACH CENTA 344
`SUTABLE EPG
`
`
`
`RECEIVE DEMAND FOR SPECIFC DATA
`FROMA PARTICULAR CLIENT, THE
`DEMAND INCLUDING INFORMATION
`IDENTIFYING THE CLIENT
`
`IDENTIFY THE SPECIFIC CLIENT FROM
`INFORMATION INCLUDED WITH THE
`DEMAND
`
`346
`
`348
`
`350 -
`
`NO
`
`ASSGN SLOT TO
`AUTHENTIC CLIENT
`
`PREPARE THE REGUESTED
`CLIENT SPECIFC DATA FOR
`TRANSMISSION
`
`TRANSMIT
`REFUSAL
`MESSAGE
`
`TRANSMIT CLIENT SPECIFIC
`DATAVATHEAPPROPRIATE
`ALOCATED BANDWDTH
`
`
`
`
`
`
`
`351
`
`352
`
`354
`
`FIG. 5
`(PRIOR ART)
`
`DISH, Exh.1010, p.0006
`
`

`

`Patent Application Publication
`
`Nov. 6, 2003 Sheet 6 of 11
`
`US 2003/0208561 A1
`
`36O Av
`
`
`
`
`
`
`
`s
`
`Ger)
`felt re?is
`ckeys of f its
`EPCs
`
`
`
`
`
`562.
`
`361
`
`provide eig irre
`he bed user
`
`e
`
`Stairs
`
`speci
`raw u?er
`
`?
`deman
`E. it:
`diet speeds2.
`
`3o
`
`he tits elected
`b>Aust
`
`3-2
`
`?eceive Ciew sfy k
`ses ovik -31
`to de
`Gre
`
`fl-G, Q
`
`DISH, Exh.1010, p.0007
`
`

`

`Patent Application Publication
`
`Nov. 6, 2003 Sheet 7 of 11
`
`US 2003/0208561 A1
`
`
`
`DISH, Exh.1010, p.0008
`
`

`

`Patent Application Publication
`
`Nov. 6, 2003 Sheet 8 of 11
`
`US 2003/0208561 A1
`
`
`
`DISH, Exh.1010, p.0009
`
`

`

`Patent Application Publication
`
`Nov. 6, 2003 Sheet 9 of 11
`
`US 2003/0208561 A1
`
`
`
`/ 648
`
`INITIATE STB PROTOCOL
`SWITCHING
`
`650
`
`TRANSMIT PROTOCOL
`UPDATE REQUEST
`
`652
`
`TRANSMIT PROTOCOL STB
`SOFTWARE UPDATE
`
`654
`
`UPDATE SERVER
`TRANSMISSION PROTOCOL
`
`656
`
`FIG. 9
`
`DISH, Exh.1010, p.0010
`
`

`

`Patent Application Publication
`
`Nov. 6, 2003 Sheet 10 of 11
`
`US 2003/0208561 A1
`
`
`
`700 /
`
`TUNE INTO PROTOCOL
`CONTROL PROGRAM
`
`702
`
`RECEIVE PROTOCOLUPDATE - 704
`REQUEST
`
`RECEIVE PROTOCOL UPDATE - 706
`SOFTWARE
`
`EXECUTE PROTOCOL UPDATE - 708
`SOFTWARE
`
`FIG 10
`
`DISH, Exh.1010, p.0011
`
`

`

`Patent Application Publication
`
`Nov. 6, 2003 Sheet 11 of 11
`
`US 2003/0208561 A1
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`UPDATE STB
`PROTOCOL
`
`DETERMINE AUTHENTICITY
`OF STB
`
`750
`
`STB
`AUTHENTIC2
`
`F.G. 11
`
`PERFORMANTI
`COUNTERFET
`DEVICE
`MEASURES
`
`756
`
`DISH, Exh.1010, p.0012
`
`

`

`US 2003/0208561 A1
`
`Nov. 6, 2003
`
`COUNTERFET STB PREVENTION THROUGH
`PROTOCOL, SWITCHING
`
`RELATED APPLICATIONS
`0001. This application is a continuation-in-part claiming
`priority to Khoi Nhu Hoang's patent applications entitled
`UNIVERSAL STB ARCHITECTURES AND CONTROL
`METHODS filed on May 30, 2001, SYSTEMS AND
`METHODS FOR PROVIDING VIDEO ON DEMAND
`SERVICES FOR BROADCASTING SYSTEMS filed on
`May 31, 2000, bearing application Ser. No. 09/584,832,
`METHODS FOR PROVIDING VIDEO ON DEMAND
`filed Nov. 10, 2000, bearing application Ser. No. 09/709,948
`and UNIVERSAL DIGITAL BROADCAST SYSTEM
`AND METHODS filed on Apr. 24, 2001, bearing applica
`tion Ser. No. 09/841,792, all three being incorporated herein
`by reference.
`
`BACKGROUND OF THE INVENTION
`0002) 1. Field of the Invention
`0003. The present invention relates to data-on-demand
`(DOD) and digital broadcast technology.
`0004.
`In particular, the present invention teaches a
`method for preventing counterfeit set-top-boxes (STBs)
`from pirating proprietary data transmissions.
`0005 2. Description of the Prior Art
`0006 A variety of mechanisms are available for verifying
`the authenticity of Set top boxes for receiving video on
`demand (VOD) programs for display on a television or other
`video display device. One problem faced in the VOD and
`DOD industry is the counterfeiting of the STB and the
`pirating of the Signal. Traditional uni-directional communi
`cations, Such as cable, have had many problems in attempt
`ing to Stop people from pirating cable. The advent of the
`STB allowed a mixed signal to be sent only to persons with
`a STB capable of de-scrambling the signal would be able to
`decode the signal properly. However, a counterfeit STB
`could still be used to de-Scramble the Signal. Using bi
`directional communications allowed for a certain level of
`authenticity Verification, however this would use significant
`processing and bandwidth resources and will not work in
`uni-directional Systems.
`0007. The following is a general discussion of widely
`used digital broadcast Systems.
`0008 Generally in digital broadcast systems, a bit stream,
`multiplexed in accordance with the MPEG-2 standard, is a
`“transport Stream” constructed from "packetized elementary
`Stream” (or PES) packets and packets containing other
`necessary information. A "packetized elementary Stream”
`(or PES) packet is a data structure used to carry “elementary
`Stream data.” An "elementary Stream” is a generic term for
`one of (a) coded video, (b) coded audio, or (c) other coded
`bit streams carried in a Sequence of PES packets with one
`Stream ID. Transport Streams Support multiplexing of Video
`and audio compressed Streams from one program with a
`common time base. The transport Streams are encrypted So
`that only an authentic STB may decipher them.
`0009 PRIOR ART FIG. 1 illustrates the packetizing of
`compressed video data 106 of a video sequence 102 into a
`stream of PES packets 108, and then, into a stream of
`
`transport Stream packets 112. Specifically, a Video Sequence
`102 includes various headers 104 and associated compressed
`video data 106. The video sequence 102 is parsed into
`variable length Segments, each having an associated PES
`packet header 110 to form a PES packet stream 108. The
`PES packet stream 108 is then parsed into segments, each of
`which is provided with a transport stream header 114 to form
`a transport Stream 112.
`0010 PRIOR ART FIG. 2 is a block schematic showing
`a digital broadcast System 200 including a digital broadcast
`server 202 and a set-top-box 204 Suitable for processing
`digital broadcast data. At the digital broadcast Server 202,
`video data is provided to a video encoder 206 which encodes
`the video data in accordance with the MPEG-2 standard. The
`video encoder 206 provides encoded video 208 to a pack
`etizer 210 which packetizes the encoded video 208. The
`packetized encoded Video 212 provided by the packetizer
`210 is then provided to a transport stream multiplexer 214.
`0011 Similarly, at the digital broadcast server 202, audio
`data is provided to an audio encoder 214 which encodes the
`audio data. The audio encoder 214 provides encoded audio
`218 to a packetizer 220 which packetizes the encoded audio
`218. The packetized encoded audio 222 provided by the
`packetizer 220 is then provided to the transport Stream
`multiplexer 214.
`0012. The transport stream multiplexer 214 multiplexes
`the encoded audio and Video packets and transmits the
`resulting multiplexed Stream to a Set-top-box 204 Via dis
`tribution infrastructure 224. This distribution infrastructure
`224 may be, for example, a telephone network and/or a cable
`TV (CATV) system, employing optical fiber and implement
`ing asynchronous transfer mode (ATM) transmission proto
`cols. At the set-top-box 204, on a remote end of the
`distribution infrastructure 224, a transport Stream demulti
`plexer 230 receives the multiplexed transport stream. Based
`on the packet identification number of a particular packet,
`the transport stream demultiplexer 230 separates the
`encoded audio and Video packets and provides the Video
`packets to a video decoder 232 via link 238 and the audio
`packets to an audio decoder 236 via link 240.
`0013 The transport stream demultiplexer 230 also pro
`vides timing information to a clock control unit 236. The
`clock control unit 236 provides timing outputs to the both
`the video decoder 232 and the audio decoder 236 based on
`the timing information provided by the transport Stream
`demultiplexer 230 (e.g., based on the values of PCR fields).
`The video decoder 232 provides video data which corre
`sponds to the Video data originally provided to the Video
`encoder 206. Similarly, the audio decoder 236 provides
`audio data which corresponds to the audio data originally
`provided to the audio encoder 216.
`0014 PRIOR ART FIG.3 shows a simplified functional
`block diagram of a VOD system 300. At the heart of the
`VOD system 300 is the video server 310 which routes the
`digital movies, resident in the movie Storage System 312, to
`the distribution infrastructure 314. This distribution infra
`Structure 314 may be, for example, a telephone network
`and/or a cable TV (CATV) system, employing optical fiber
`and implementing asynchronous transfer mode (ATM)
`transmission protocols. The distribution infrastructure 314
`deliverS movies to individual homes based on the routing
`information supplied by the video server 310.
`
`DISH, Exh.1010, p.0013
`
`

`

`US 2003/0208561 A1
`
`Nov. 6, 2003
`
`0015 The VOD system 300 also includes a plurality of
`VOD STBs 304 suitable for processing VOD in the VOD
`system 300. Each STB 304 receives and decodes a digital
`movie and converts it to a signal for display on a TV Set or
`monitor.
`0016. The typical model for digital broadcast and DOD
`systems described above adheres to what is termed a “bi
`directional client-server model.” In order to point out defects
`inherent to this prior art System, the typical hardware archi
`tecture generic to such a DOD system will be described
`below with reference to FIG. 4. Further, a pair of methods
`for controlling the prior art DOD server and the prior art
`DOD client will be described below with reference to FIG.
`5 and FIG. 6, respectively.
`0017 PRIOR ART FIG. 4 illustrates a general diagram of
`a DOD system 320 having a bi-directional client-server
`architecture. The DOD system 322 includes a DOD server
`322 bi-directionally coupled with a plurality of DOD clients
`324 via communication link326. As will be appreciated, the
`VOD system 300 of FIG. 3 is a somewhat specific example
`of the DOD system 320.
`0.018
`Broadly speaking, the DOD system 320 operation
`adheres to the well known client-server model as follows. In
`Some manner, typically through transmission of an Elec
`tronic Program Guide (EPG) by the DOD server 322, the
`clients 324 are informed of available on-demand data. Using
`the EPG for reference, a requesting DOD client 324 requests
`specific data from the DOD server 322 via the communica
`tion link 326. The DOD server 322 interprets the client
`request, and then prepares the client Specific data in a format
`suitable for use by the requesting client 324.
`0019. Once the client specific data is prepared, the server
`322 transmits the client Specific data to the requesting client
`324. The requesting client 324 receives, via a specifically
`allocated portion of the communication link 326, the
`requested client specific data in a readably usable format.
`The requested client Specific data is provided in a format
`ready for presentation by the DOD client to the end user.
`These client-Server processes are described below in more
`detail with reference to FIGS. 5-6.
`0020 Under the client-server model of FIG. 4, the avail
`able bandwidth of communication link 326 must be divided
`up into allocated portions 328, each allocated portion being
`dedicated to a particular client. Hence the bandwidth
`required for prior art DOD systems is directly proportional
`to the number of clients being Served.
`0021 Although communication link 326 may be a true
`bi-directional communications medium, Such infrastructure
`is uncommon. Instead, typical implementations today
`cobble together existing infrastructure Such as fiber optic
`cabling and telephone lines to implement the necessary
`bi-directional communications. For example, the fiber optic
`cable may be used for Server transmission of client specific
`data while an existing telephone line may be used for client
`transmission of requests.
`0022 Turning next to PRIOR ART FIG. 5, a DOD server
`method 340 in accordance with the prior art will now be
`described. In a first step 342, the DOD server identifies the
`available slots within the available transmission bandwidth.
`In a next step 344 the DOD server prepares and transmits a
`suitable EPG to each client. It will be appreciated that
`
`different EPGs may be transmitted for different clients
`depending upon factorS Such as Subscription levels, avail
`able Services, personalized Settings, payment history, etc. In
`any event, in a next step 346, the DOD server receives a
`demand for Specific data from a specific client. The demand
`includes information indicating the identity of the client.
`Then in a step 348, the DOD server identifies the specific
`client from information included with the demand.
`0023. At a step 350, a determination is made whether the
`client is authorized to receive the requested data. If the client
`is authorized to receive data, the process proceeds to Step
`351. In step 351, the DOD server assigns an available slot to
`the authentic client. In step 352, the DOD server prepares the
`requested client specific data for transmission in a format
`suitable for the requesting client. Step 348 may include such
`actions as retrieving the client Specific data from a persistent
`Storage mechanism and preparing an appropriate channel
`server for data transmission. Continuing with a step 354, the
`DOD server transmits the client specific data via the band
`width allocated to the requesting client.
`0024.
`If the client is not authorized to receive the
`requested data, or the client is using a counterfeit STB, the
`process proceeds to step 356, where the DOD server trans
`mits a generic message Stating that the Service is unavail
`able. Other appropriate data may also be transmitted.
`0025 Turning next to FIG. 6, a client method 360 for
`retrieving on-demand data will now be described. In a tuning
`step 362, the DOD client will tune into the appropriate
`channel program and in a receiving step 364 the DOD client
`will receive the EPG transmitted by the DOD server. In a
`next step 366, the DOD client provides the EPG information
`to a DOD user and in a step 368, receives a request for
`specific data from the DOD user. Then in a step 370, the
`DOD client demands that the DOD server provide the
`requested client Specific data. In a step 372, in anticipation
`of the requested client specific data, the DOD client tunes
`into the allocated bandwidth. Then in a step 374, the DOD
`client receives via allocated bandwidth the requested client
`Specific data in a readably usable format and provides it to
`the DOD user.
`0026. In uni-directional broadcast systems, broadcasters
`encrypt transmissions in order to prevent counterfeit STBs
`from deciphering their transmissions. The authentic STBs
`having either Software or hardware capable of deciphering
`the transmissions. The problem with this method is that
`Sophisticated counterfeiters are able to acquire and analyze
`authentic STBs in order to fabricate counterfeit STBs
`capable of deciphering the encrypted transmissions.
`0027. As the above discussion reflects, none of the prior
`art Systems provide a method for preventing counterfeit
`STBs from accessing DOD services without relying on
`bi-directional communication. Therefore, it is desirable to
`provide a method for preventing counterfeit STBs from
`accessing data from a DOD System without relying on
`bi-directional communication. Furthermore, it is desirable to
`provide a method for disabling counterfeit STBs. What is
`also needed is a method for preventing counterfeit STBs
`from accessing DOD Services in a unidirectional broadcast
`System. What is further needed is a method for updating an
`STB so that it may decipher encrypted data.
`
`DISH, Exh.1010, p.0014
`
`

`

`US 2003/0208561 A1
`
`Nov. 6, 2003
`
`SUMMARY
`0028. The present invention teaches methods and sys
`tems for preventing counterfeit STBS from accessing data
`from a DOD system without relying on bi-directional com
`munication. The present invention also teaches methods and
`Systems for preventing counterfeit STBS from accessing
`DOD services in a unidirectional broadcast system and for
`disabling counterfeit STBs. These include a universal digital
`data system, a universal STB, and a variety of methods for
`handling these digital Services and controlling the universal
`STB.
`0029. A first embodiment of the present invention teaches
`a universal STB operative to prevent unauthorized access to
`digital broadcast data. The architecture of this STB includes:
`a databus; a first communication device Suitable for coupling
`to a digital broadcast communications medium, the first
`communication device operable to receive digital broadcast
`data; memory bi-directionally coupled to the databus, the
`memory including computer executable instructions for: a).
`determining whether the STB is authentic or counterfeit; b).
`performing anti-counterfeit measures upon the STB when
`the device is determined to be counterfeit, and c). updating
`a communications protocol of the STB when the STB is
`determined to be authentic, a digital data decoder bi-direc
`tionally coupled to the databus, a central processing unit
`(CPU) bi-directionally coupled to the databus, the CPU
`implementing a STB control proceSS controlling the
`memory, the first communications device and the digital
`decoder, the STB control process operable to proceSS digital
`data received at the first communications device.
`0030. In a refinement of the current invention, the STB
`includes an STB authenticity code hidden with the STB
`hardware, wherein the computer executable instructions for
`determining whether the STB is authentic or counterfeit
`includes a computer executable instruction for performing
`an integrity check upon the hidden STB authenticity code.
`0031. In a further refinement of the present invention,
`wherein performing anti-counterfeit measures upon the STB
`when the device is determined to be counterfeit includes
`transmitting a signal to a broadcast Server Site indicating that
`the STB is counterfeit.
`0032. It is important to remark that as types of set-top
`boxes become more ubiquitous, they are often built-in to a
`unit, Such as a TV or computer, rather than actually Set on
`top or beside. One of ordinary skill in the art would
`recognize that all references to STBS would apply equally to
`built-in version, and thus the two become Synonymous.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`0033 PRIOR ART FIG. 1 illustrates pictorially the pack
`etizing of compressed Video data into a Stream of packets
`and a stream of transport packets,
`0034 PRIOR ART FIG. 2 illustrates by block diagram a
`system according to the MPEG-2 standard;
`0035). PRIOR ART FIG. 3 illustrates a simplified func
`tional block diagram of a VOD system;
`0036). PRIOR ART FIG. 4 illustrates a DOD system
`adhering to a prior art bi-directional client-server architec
`ture,
`
`0037 PRIOR ART FIG. 5 illustrates a DOD server
`method for preventing the receipt of DOD data by counter
`feit STBs using a bi-directional, client specific data trans
`mission mechanism;
`0.038 PRIOR ART FIG. 6 illustrates a DOD client
`method for receiving and processing client Specific data via
`a bi-directional transmission mechanism;
`0039 FIG. 7 is a block diagram of a digital broadcast
`Server in accordance with one embodiment of the present
`invention;
`0040 FIG. 8 is a block diagram showing the hardware
`architecture of a universal STB in accordance with yet
`another embodiment of the present invention;
`0041
`FIG. 9 is a flow chart illustrating a computer
`implemented method for updating a communications pro
`tocol of a broadcast System in accordance with the present
`invention;
`0042 FIG. 10 is a flow chart illustrating a computer
`implemented method for updating a communications pro
`tocol of a STB in accordance with the present invention; and
`0043 FIG. 11 is a flow chart illustrating a computer
`executable method for executing the protocol update Soft
`ware in accordance with the method illustrated in FIG. 10.
`
`DETAILED DESCRIPTION OF THE
`PREFERRED EMBODIMENTS
`0044) In the following detailed description of the embodi
`ments, reference is made to the drawings that accompany
`and that are a part of the embodiments. The drawings show,
`by way of illustration, specific embodiments in which the
`invention may be practiced. Those embodiments are
`described in Sufficient detail to enable those skilled in the art
`to practice the invention and it is to be understood that other
`embodiments may be utilized and that Structural, logical,
`and electrical changes as well as other modifications may be
`made without departing from the Spirit and Scope of the
`present invention.
`004.5 The present invention teaches methods and sys
`tems for preventing counterfeit STBS from accessing data
`from a DOD system without relying on bi-directional com
`munication. The present invention also teaches methods and
`Systems for preventing counterfeit STBS from accessing
`DOD services in a uni-directional broadcast system and for
`disabling counterfeit STBs. These include a universal digital
`data system, a universal STB, and a variety of methods for
`handling these digital Services and controlling the universal
`STB. However, those skilled in the art will recognize that all
`aspects of the present invention can be implemented within
`the bi-directional communication paradigm, the only differ
`ence being that even further features can be provided to the
`digital broadcast and DOD user when a bi-directional com
`munication link is available.
`0046 FIG. 7 illustrates the architecture for a VOD server
`450 in accordance with one embodiment of the present
`invention. The VOD server 450 includes a plurality of
`channel Servers 411, a plurality of up converters 412 each
`corresponding to a channel Server 411, a combiner amplifier
`414, a central controlling Server 502, and a central Storage
`504, coupled as illustrated through a data bus 506. As will
`be described below, the central controlling server 502 con
`
`DISH, Exh.1010, p.0015
`
`

`

`US 2003/0208561 A1
`
`Nov. 6, 2003
`
`trols off-line operation of the channel servers 411, as well as
`initiating real-time transmission once the channel Servers
`411 are ready. The central storage 504 typically stores data
`files in a digital format. However, any Suitable mass persis
`tent data Storage device may be used.
`0047. In an exemplary embodiment, data files stored in
`the central storage 504 are accessible via a standard network
`interface (e.g., Ethernet connection) by any authorized com
`puter, Such as the central controlling Server 502, connected
`to the network. The channel servers 411 provide data files
`that are retrieved from the central storage 504 in accordance
`with instructions from the central controlling server 502.
`The retrieval of digital data and the Scheduling of transmis
`sion of the digital data for VOD is performed “off-line” to
`fully prepare each channel Server 411 for real-time data
`transmission. Each channel Server 411 informs the central
`controlling server 502 when ready to provide VOD, at which
`point the central controlling server 502 can control the
`channel servers 411 to begin VOD transmission.
`0.048. In a preferred embodiment, the central controlling
`Server 502 includes a graphics user interface (not shown) to
`enable a Service provider to Schedule data delivery by a
`drag-and-drop operation. Further, the central controlling
`server 502 authenticates and controls the channel servers
`410 to start or Stop according to delivery matrices. Systems
`and methods for providing unidirectional DOD broadcast
`matrices are taught in Khoi Hoang's patent application
`entitled SYSTEMS AND METHODS FOR PROVIDING
`VIDEO ON DEMAND SERVICES FOR BROADCAST
`ING SYSTEMS filed on May 31, 2000, bearing application
`Ser. No. 09/584,832, which is incorporated herein by refer
`CCC.
`0049. Each channel server 411 is assigned to a channel
`and is coupled to an up-converter 412. The output of each
`channel Server 411 is a quadrature amplitude modulation
`(QAM) modulated intermediate frequency (IF) signal hav
`ing a Suitable frequency for the corresponding up-converter
`412. The QAM-modulated IF signals are dependent upon
`adopted Standards. The current adopted Standard in the
`United States is the data-Over-cable-systems-interface
`specification (DOCSIS) standard, which requires an
`approximately 43.75 MHz IF frequency. A preferred channel
`server 411 is described below in more detail with reference
`to FIG. 10.
`0050. The up-converters 412 convert IF signals received
`from the channel servers 104 to radio frequency signals (RF
`Signals). The RF signals, which include frequency and
`bandwidth, are dependent on a desired channel and adopted
`Standards. For example, under the current Standard in the
`United States for a cable television channel 80, the RF signal
`has a frequency of approximately 559.25 MHz and a band
`width of approximately 6 MHz.
`0051. The outputs of the up-converters 412 are applied to
`the combiner/amplifier 414. The combiner/amplifier 414
`amplifies, conditions and combines the received RF signals
`then outputs the Signals out to a transmission medium using
`a communications protocol. In one embodiment, an authen
`ticity checker is embedded in one or more of the output
`Signals. This authenticity checker is operative to determine
`whether a receiving STB is counterfeit and to perform
`ani-counterfeit measures upon the STB if it is counterfeit.
`The operation of the authenticity checker is discussed in
`
`greater detail below. In one embodiment, the communication
`protocol is periodically changed in order to prevent coun
`terfeit STBs using an earlier communication protocol from
`deciphering the Signals.
`0.052 FIG. 8 illustrates a universal STB 600 in accor
`dance with one embodiment of the invention. The STB 600
`comprises a QAM demodulator 602, a CPU 604, a local
`memory 608, a buffer memory 610, a decoder 612 having
`Video and audio decoding capabilities, a graphics overlay
`module 614, a user interface 618, a communications link
`620, and a fast data buS 622 coupling these devices as
`illustrated. The CPU 602 controls overall operation of the
`universal STB 600 in order to select data in response to a
`client's request, decode Selected data, decompress decoded
`data, re-assemble decoded data, Store decoded data in the
`local memory 608 or the buffer memory 610, and deliver
`stored data to the decoder 612. In an exemplary embodi
`ment, the local memory 608 comprises non-volatile memory
`(e.g., a hard drive) and the buffer memory 610 comprises
`Volatile memory.
`0053. In one embodiment, the QAM demodulator 602
`comprises transmitter and receiver modules and one or more
`of the following: privacy encryption/decryption module,
`forward error correction decoder/encoder, tuner control,
`downstream and upstream processors, CPU and memory
`interface circuits. The QAM demodulator 602 receives
`modulated IF signals, Samples and demodulates the Signals
`to restore data using the Same communications protocol used
`by the combiner/amplifier 414 (FIG. 7) in transmitting the
`Signals.
`In an exemplary embodiment, when access is
`0054.
`granted, the decoder 612 decodes at least one data block to
`transform the data block into images displayable on an
`output Screen. The decoder 612 Supports commands from a
`Subscribing client, Such as play, Stop, pause, Step, rewind,
`forward, etc. The decoder 612 provides decoded data to an
`output device 624 for use by the client. The output device
`624 may be any Suitable device Such as a television, com
`puter, any appropriate display monitor, a VCR, or the like.
`The STB 600 may be incorporated into an advanced display
`device So as to appear as a single unit instead of Sitting on
`top of a display device.
`0055. The graphics overlay module 614 enhances dis
`played graphics quality by, for example, providing alpha
`blending or picture-in-picture capabilities. The user inter
`face 618 enables user control of the STB 600, and may be
`any Suitable device Such as a remote control device, a
`keyboard, a Smartcard, etc. The communications link 620
`provides an additional communications connection. This
`may be coupled to another computer, or may be used to
`implement bi-directional communication. The data bus 622
`is preferably a commercially available “fast' data bus suit
`able for performing data communications in a real time
`manner as required by the present invention. Suitable
`examples are USB, firewire, etc.
`0056. In a preferred embodiment, one or more of the data
`blocks may contain an authenticity checker which is Soft
`ware executed by the central processing unit 604. The
`authenticity checker performs an authenticity check of the
`STB in order to determine whether the STB is authentic or
`counterfeit.
`0057 There are many ways in which the authenticity
`checker may determine whether an STB is counterfeit. In
`
`DISH, Exh.1010, p.0016
`
`

`

`US 2003/0208561 A1
`
`Nov. 6, 2003
`
`one embodiment the authenticity checker performs a cyclic
`redundancy check (CRC) on a location in the STB 600 in
`order to determine authenticity. In another embodiment the
`authenticity checker performs an image check of the STB
`System. In another embodiment the authenticity checker
`queries a location hidden in the STB hardware, if the
`location responds the STB is determined to be authentic. In
`yet another embodiment the authenticity checker performs a
`checksum on a memory location. Any other appropriate
`check may be used to determine authenticity. The actual
`implementation of Such checks are well known in the art.
`0.058
`If the STB is counterfeit the authenticity checker
`may perform anti-counterfeit operations or may cause other
`Software or hardware on the STB to perform anti-counterfeit
`measures. In an exemplary embodiment the authenticity
`checker disables or damages the STB. The authenticity
`checker may add or delete STB software rendering the STB
`inoperable, or cause the central processor 604 to overheat by
`executing an infinite loop program, or perfor

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket