Abstract: A system and method for controlling access mechanism of the contents broadcasted by the service provider (or the broadcaster) to the user (or consumer) who uses a mobile device along with specialized set of code segments comprising: a ready to use set-top box, a software to be used in a mobile device, inputting relevant information to install the software, wherein relevant information may include information regarding the workstation or the user, coming from the service provider. The methods using crypto techniques make the access control mechanism efficient and ftarther enhance reliability of the system.
BACKGROUND
The invention relates generally to set-top box licensing, and more particularly, to conditional access using a mobile device.
Pay television or pay-TV refers to subscription-based television services, usually provided by both analog and digital cable and satellite, but also increasingly by digital terrestrial methods. Pay per view (PPV) services are similar to subscription-based pay TV services and in that one must pay to have the broadcast decrypted for viewing, but usually only entail a one-off payment for a single or time-limited viewing. "Free" variants are free-to-air (FTA) and free-to-view (FTV), however FTV services are normally encrypted and decryption cards either come as part of an initial subscription to a pay TV bouquet or can be purchased for a one-off cost.
A set-top box is a device that enables a television set to become a user interface to the Internet and also enables a television set to receive and decode digital television (DTV) broadcasts. DTV set-top boxes are sometimes called receivers. In the Internet realm, a set-top box is really a specialized computer that can "talk to" the Internet -that is, it contains a Web browser and support Internet's main protocol, TCP/IP. The service to which the set-top box is attached may be through a telephone line, for example, with WebTV, or through a cable TV company and enable interactive two-way services. Two-way services are combined with the broadcast feed and a return path, typically with a charge for access and /or for the interactive content offered. Content on offer includes movie, gaming, betting, shopping and banking services. This requires a secure conditional access system and mutual authentication between the end user and the set-top box.
Conditional access system is mainly composed of two parts: the head-end part and the reception-end part. At the head-end, the digital content (including video, audio and data), which the operator (or service provider) wishes to restrict access, is scrambled by the control word (CW) derived from a constantly changing pseudo-random binary sequence generator. The control word also needs to be protected and therefore it is encrypted with a service key (SK). The encrypted control word is then packaged into
so-called entitlement control message (ECM). Further, the service key is encrypted with the individual key (IK) supplied by the subscriber management system and is then packaged with entitlement data into entitlement management message (EMM). Finally, the scrambled content, entitlement control message, and entitlement management message are together broadcasted in the same charmel.
At the reception-end, the set-top box (STB) filters entitlement management message and entitlement control message according to the parameters provided by the user's personalized smart card (SC) and then forwards these messages to smart card. Smart card decrypts entitlement management message using individual key stored in smart card to get service key and the entitlement data. After having passed the verification of the access entitlement, smart card uses the service key to decrypt the encrypted control word and returns the control word towards set-top box so that set-top box will be allowed to descramble the scrambled content.
The control word is very vulnerable to the link between smart card and set-top box. If smart card transfers the control word in the plaintext form to set-top box, the attacker, instead of being forced to compromise smart card, can obtain the control word by monitoring the interface between smart card and set-top box. Further, the attacker can distribute the control word through other channels to the unauthorized users so that they can enjoy the content freely. This is an indeed serious threat to the security of the conditional access system. Thus, the control word must be protected from this attack. On the other hand, the absence of mutual authentication mechanism would allow a fake set-top box, for example a computer with hacking smart card reader, to challenge smart card or a pirated smart card to be used on set-top box to access the protected content. So, smart card and set-top box have to authenticate each other to guarantee the system security. Also the dependency of the smart card exists in the current scenario.
Therefore there is need for an improved method for Set-top Box Licensing and Conditional Access using a Mobile device.
BRIEF DESCRIPTION
In one embodiment of the present technique, a system for controlling access of a plurality of contents broadcasted by a service provider (SP) is disclosed. The system includes at least one user for viewing the plurality of the contents broadcasted by the service provider. The system further includes a registration kit for registering the at least one user and a set-top box (STB) which is synchronized with the respective registration kit of the at least one user after registration process. Further, the system includes a software application to be installed on the mobile device of the at least one user. Software application after execution on the mobile device generates a dynamic key which is inputted into the STB to get the access of the contents broadcasted by the service provider.
[0001] In another embodiment of the present technique, a method for controlling access of a plurality of contents broadcasted by a service provider (SP) is disclosed. The method includes creating a first database comprising a set of parameters for preparing registration kit and synchronizing the set of parameters with respective set-top box (STB) to be used by at least one user and creating a second database of a symmetric key along with encrypted values. The method further includes registering the at least one user by entering the set of parameters in a mobile device of the at least one user and updating details of the at least one user in the second database after registration. The method ftirther includes encrypting the plurality of contents broadcasted by the service provider using the symmetric key of the at least one user stored in the second database during the registration along with the encrypted key values. Further, the method includes executing a software application provided to the user by the SP in the mobile device to generate a dynamic key and the software application code is also bundled with a license certificate. The dynamic key generated by the mobile device is inputted into the set-top box by the user to access the plurality of contents broadcasted by the service provider; wherein the inputted dynamic key in the STB is validated by the STB against the information stored during the registration of the at least one user. The method ftirther includes recharging of the set-top box and the software application; wherein the at least one user is granted access to the plurality of contents broadcasted by the service provider through a re-charge kit. Further, the
method includes enforcing a time and event based access license for the at least one user to access the plurality of contents offered by the service provider through the dynamic key generated by the mobile device through software application installed on the mobile device.
DRAWINGS
These and other features, aspects, and advantages of the present invention will become better understood when the following detailed description is read with reference to the accompanying drawings in which like characters represent like parts throughout the drawings, wherein:
FIG. 1 is a block diagram of a system depicting a various components for controlling access of a plurality of contents broadcasted by a service provider (SP), in one embodiment of the present technique; and
FIG. 2 is a flowchart depicting a method for controlling access of a plurality of contents broadcasted by a service provider (SP), in one embodiment of the present technique.
FIG. 3 is a system illustrating a generalized computer network arrangement, in one embodiment of the present technique.
DETAILED DESCRIPTION
The following description is full and informative description of the best method and system presently contemplated for carrying out the present invention which is known to the inventors at the time of filing the patent application. Of course, many modifications and adaptations will be apparent to those skilled in the relevant arts in view of the following description in view of the accompanying drawings and the appended claims. While the system and method described herein are provided with a certain degree of specificity, the present technique may be implemented with either greater or lesser specificity, depending on the needs of the user. Further, some of the
features of the present technique may be used to advantage without the corresponding use of other features described in the following paragraphs. As such, the present description should be considered as merely illustrative of the principles of the present technique and not in limitation thereof, since the present technique is defined solely by the claims.
As a preliminary matter, the definition of the term "or" for the purpose of the following discussion and the appended claims is intended to be an inclusive "or" That is, the term "or" is not intended to differentiate between two mutually exclusive alternatives. Rather, the term "or" when employed as a conjunction between two elements is defined as including one element by itself, the other element itself, and combinations and permutations of the elements. For example, a discussion or recitation employing the terminology "A" or "B" includes: "A" by itself, "B" by itself and any combination thereof, such as "AB" and/or "BA." It is worth noting that the present discussion relates to exemplary embodiments, and the appended claims should not be limited to the embodiments discussed herein.
The invention relates generally to set-top box licensing, and more particularly, to conditional access using a mobile device.
Referring to figures, FIG. 1 represents the system for controlling access of a plurality of contents broadcasted by a service provider (SP) 140 or broadcaster comprises of set-top box (STB) 120, user 100, mobile device 110, registration kit 150, service provider 140 and display device 130 like television set (TV). User 100 is any person who wants to view or access the contents provided by the service provider 140 or broadcaster. Service provider 140 or broadcaster provides the access to the contents via their server. Mobile device 110 could be any mobile device 110 which user 100 uses to generate the dynamic key to view the contents on his TV or on display device 130 broadcasted by service provider 140. Registration kit 150 comprises of unique registration kit number and software application to be installed on user's mobile device 110 and key for that software application. A set-top box (STB) 120 is a device that enables a television set 130 to become a user interface to the Internet and also enables a television set 130 to receive and decode digital television (DTV) broadcasts.
DTV set-top boxes 120 are sometimes called receivers. In the Internet realm, a set-top box 120 is really a specialized computer that can "talk to" the Internet - that is, it contains a Web browser and the Internet's main program, TCP/IP. The service to which the set-top box 120 is attached may be through a telephone line, for example, with WebTV, or through a cable TV company and enable interactive two-way services. Two-way services are combine the broadcast feed with a return path, typically with a charge for access and /or for the interactive content offered. Content on offer includes movie, gaming, betting, shopping and banking services etc.
In another embodiment of the present technique, a method for controlling access of a plurality of contents broadcasted by a service provider 140 is disclosed.
Referring to the FIG. 2, there are following phases in the method/protocol involving the entities/actors namely: service provider (SP) or the broadcaster 140, consumer/viewer/user 100, Set-top-box(STB) 120 and the mobile device (MD) 110 or mobile phone (MP):
1. Setting up or initialization phase 200
2. Registration Phase 210
3. Transmitting Phase 220
4. User Attempt to View Phase 230
5. User Validation Phase 240
6. Recharging Phase 280
In the Setting up or Initialization Phase 200, the SP 140 creates the inactive database containing the registration detail and prepare registration kits 150 (a kit include a number and related software) and related secret information. SP 140 also creates the active database of the symmetric key along with its encrypted values. This encryption of the symmetric is done using the secret information from the inactive databases.
In the Registration Phase 210, potential consumer/user 100 purchases the STB 120 along with the registration kit 150 and personalized the mobile device 110 and the STB 120 using the kit and updates the service provider 140. SP 140 does the needful and updates his active encrypted key value database.
In the Transmitting Phase 220, the SP or the broadcaster 140 using the symmetric key stored in the active database, encrypts the content and broadcast the same along with the active encrypted key values.
In the User attempt to view Phase 230, the user 100 invokes the relevant software in his Mobile device 110 using his own password. If the password supplied is correct then the software gives the user 100 a one time token to watch/view the encrypted content.
In User Validation Phase 240, after the user 100 has given the one time token to watch the encrypted content the STB 120 verifies token value using the information stored at the time of registration and the previous attempt to watch the content. This is an offline validation of the user 100 done by the STB 120 and not by the service provider 140. One may note that once the token value is over in the MD the STB 120 may not be in the position to validate the user 100 unless the user 100 gets the recharging done.
In Recharging Phase 280, the user 100 purchases the re-charge kit and performs the similar exercise that was carried out in the registration phase. And accordingly the SP 140 does needful in his back-end.
In another embodiment of the invention, the method ftirther comprising enforcing a time and event based access license for the at least one user 100 to access the plurality of contents offered by the service provider 140 through the dynamic key generated by the mobile device 110 of the registered user 100, wherein the software application code is bundled with a license certificate which is to be installed on users 100 mobile device 110 during the registration phase 210.
In one of the exemplary embodiment, the present technique may be illustrated where the user attempt to view/access the contents broadcasted by the service provider 140.
Initially the user 100 purchases the registration kit 150. Registration kit 150 contains set-top box (STB) 120 and software application CD and scratch card for software key. User 100 installs the software application on his mobile device 110 using the scratch card key and STB 120 unique number. Thus the registration of the STB 120 along with the user 100 details is done. Hence, STB 120 is personalized to the given user 100 and with his mobile device 110. At service provider 140 end, active database will be updated based on the registration of user 100 and with his details which includes registration kit 150 number, STB 120 unique number. In active database of service provider 140, symmetric keys are associated with registration kit 150 number and STB 120 unique number for the given user 100. So now the user 100 is active and registered and can receive/access data/information/contents broadcasted by the SP 140.
While transmitting the contents to the registered user 100, broadcaster or service provider 140 encrypts the contents using the symmetric key of the given user 100 stored during registration phase 210 and broadcast the same along with encrypted key
values.
To access the contents broadcasted by the service provider 140, the registered and active user 100 will invoke the software application installed on his mobile device 110. Software application requires the password for execution. If the password supplied is correct then the s/w gives the user 100 a one time token to watch the encrypted content. Thus the software generates a dynamic key or token to view the contents broadcasted by the broadcaster 140. User 100 may change the software password as when he wishes. Software application does not execute if the password supplied by the user 100 is incorrect and in that case user 100 will not be able to access the contents broadcasted by broadcaster 140,
User 100 has to input the dynamic key generated by mobile device 110 into the STB 120 and same will be validated by the STB 120. After the user 100 has given the one
time token or dynamic key upon successful execution of the software application on his mobile device 110 to watch the encrypted content the STB 120 verifies token value using the information stored at the time of registration and the previous attempt to watch the content. In subsequent attempts, till the mobile device 110 is tuned to generate the dynamic one time code, the contents can be viewed by the consumer or user 100.
Thus, this is an offline validation of the user 100 done by the STB 120 and not by the service provider or broadcaster 140.
In another embodiment of the invention, the method further comprising enforcing a time and event based access license for the at least one user 100 to access the plurality of contents offered by the service provider 140 through the dynamic key using the mobile device 110, wherein the software application code is bundled with a license certificate. Thus loading the software application bundle into the mobile device 110 from the service provider 140; wherein the loading comprises of loading a signer certificate and a digital signature for the service code and a digital signature for the license certificate with the software application bundle. The software application bundle is installed into a non-volatile memory of the mobile device 110 of the user 100. Hence, the access to the plurality of contents broadcasted by a service provider 140 by entering the dynamic key generated by the software application in the mobile device 110 into the set top box occurs 260 only if time reading is within license period of the software application for the given user 100. If it is not, then access will not be granted 270. Thus the method authenticates the license certificate of the given registered user 100. Hence eventually it enforces the time and event based access license for the registered user 100.
User 100 has to enter the dynamic key generated by the software application installed on his mobile device 110 into the STB 120 in order to access the contents broadcasted by the SP 140. In subsequent attempts, till the mobile device 110 is tuned to generate the dynamic one time code, the contents can be viewed by the consumer 260. In a scenario when the mobile device 110 get exhausted to generate the dynamic one time key and the subscription is not expired with respect to time then the user 100 can
reinitiate a call to reactivate the mobile device 110 for generating the dynamic one time key.
The user 100 may request for new dynamic key generating facility when the mobile device 110 get exhausted to generate the dynamic key and the subscription of the software application for the user 100 is not expired with respect to time.
It should be noted that that once the token value is over in the mobile device 110, the STB 120 may not be in the position to validate the user 100 unless the user 100 gets the re-charging done 270. The user 100 has to recharge its subscription once it is expired through recharge kit in order to access/view the contents broadcasted by the service provider 140 or broadcaster. In recharging phase, user 100 re-registration is done and service provider 140 active database will be updated with the given user 100 details such as STB 120 number and recharge kit number. Thus, the recharging of the set-top box and the software application is done and the user 100 is granted access to the plurality of contents broadcasted by the service provider 140 through a re-charge kit after the registration.
Thus, the method facilitates key agreement between set-top box and mobile device 110 with forward secrecy and is resilient to replay, forgery, man-in-the-middle and insider attacks. The method also provides flexible password change option to the user 100 for the software application installed on his mobile device 110. The inventive method helps securely enforcing the conditional access system by time and event licensing. The method does not require an online remote server by the broadcaster 140 for access verification for the user 100.
The utility of this method is achieving high confidence level with minimal burden on the authorized access to the user 100 and without an additional requirement of a typical dedicated hardware except a mobile device 110. The method can be easily extend to other types of access model viz. i) subscription, ii) rentals, iii) trail licenses such as try-before-you-buy or try only. Despite the invention does not use the smart card it binds the access to a set-top box and mobile to allow viewing for which the license is procured with a provision of changing to different mobile device 110 after
fulfilling the registration requirement. Despite the registration of the mobile device 110 is required still the privacy of the end consumer can be retained, thus very useful in a scenario where privacy is of great concern.
Exemplary Computing Environment
One or more of the above-described techniques may be implemented in or involve one or more computer systems. Figure 3 illustrates a generalized example of a computing environment 300. The computing environment 300 is not intended to suggest any limitation as to scope of use or functionality of described embodiments.
With reference to Figure 3, the computing environment 300 includes at least one processing unit 310 and memory 320. In Figure 3, this most basic configuration 330 is included within a dashed line. The processing unit 310 executes computer-executable instructions and may be a real or a virtual processor. In a multi-processing system, multiple processing units execute computer-executable instructions to increase processing power. The memory 320 may be volatile memory (e.g., registers, cache, RAM), non-volatile memory (e.g., ROM, EEPROM, flash memory, etc.), or some combination of the two. In some embodiments, the memory 320 stores software 380 implementing described techniques.
A computing environment may have additional features. For example, the computing environment 300 includes storage 340, one or more input devices 350, one or more output devices 360, and one or more communication connections 370. An interconnection mechanism (not shown) such as a bus, controller, or network interconnects the components of the computing environment 300. Typically, operating system software (not shown) provides an operating environment for other software executing in the computing environment 300, and coordinates activities of the components of the computing environment 300.
The storage 340 may be removable or non-removable, and includes magnetic disks, magnetic tapes or cassettes, CD-ROMs, CD-RWs, DVDs, or any other medium which may be used to store information and which may be accessed within the computing
environment 300. In some embodiments, the storage 340 stores instructions for the software 380.
The input device(s) 350 may be a touch input device such as a keyboard, mouse, pen, trackball, touch screen, or game controller, a voice input device, a scarming device, a digital camera, or another device that provides input to the computing environment 300. The output device(s) 360 may be a display, printer, speaker, or another device that provides output from the computing environment 300.
The communication connection(s) 370 enable communication over a communication medium to another computing entity. The communication medium conveys information such as computer-executable instructions, audio or video information, or other data in a modulated data signal. A modulated data signal is a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal. By way of example, and not limitation, communication media include wired or wireless techniques implemented with an electrical, optical, RF, infrared, acoustic, or other carrier.
Implementations may be described in the general context of computer-readable media. Computer-readable media are any available media that may be accessed within a computing environment. By way of example, and not limitation, within the computing environment 300, computer-readable media include memory 320, storage 340, communication media, ahd combinations of any of the above.
Having described and illustrated the principles of our invention with reference to described embodiments, it will be recognized that the described embodiments may be modified in arrangement and detail without departing from such principles. It should be understood that the programs, processes, or methods described herein are not related or limited to any particular type of computing environment, unless indicated otherwise. Various types of general purpose or specialized computing environments may be used with or perform operations in accordance with the teachings described herein. Elements of the described embodiments shown in software may be implemented in hardware and vice versa.
In view of the many possible embodiments to which the principles of our invention may be applied, we claim as our invention all such embodiments as may come within the scope and spirit of the following claims and equivalents thereto.
While the present invention has been related in terms of the foregoing embodiments, those skilled in the art will recognize that the invention is not limited to the embodiments depicted. The present invention may be practiced with modification and alteration within the spirit and scope of the appended claims. Thus, the description is to be regarded as illustrative instead of restrictive on the present invention.
We Claim :-
1. A method for controlling access of a plurality of contents broadcasted
by a service provider (SP) comprising:
creating a first database comprising a set of parameters for preparing registration kit and synchronizing the set of parameters with respective set-top box (STB) to be used by at least one user;
creating a second database of a symmetric key along with encrypted values;
registering the at least one user by entering the set of parameters in a mobile device of the at least one user and updating details of the at least one user in the second database after registration;
encrypting the plurality of contents broadcasted by the service provider using the symmetric key of the at least one user stored in the second database during the registration along with the encrypted key values;
executing a software application provided to the user by the SP in the mobile device to generate a dynamic key; and
inputting the dynamic key generated by the mobile device into the set-top box by the user to access the plurality of contents broadcasted by the service provider;
wherein the inputted dynamic key by the user in the STB is validated by the STB against the information stored during the registration of the at least one user.
2. The method as recited in claim 1, wherein the registration kit
comprises at least one of the kit number or the software application or secret
information or combinations thereof
3. The method as recited in claim 2, wherein secret information is an alphanumeric key for the software application to be installed on the mobile device of the at least one user to generate the dynamic key.
4. The method as recited in claim 1, ftirther comprising personalizing the mobile device of the at least one user and the set top box using the registration kit.
5. The method as recited in claim 1, ftirther comprising updating the second database with the at least one user set top box number, registration kit number and secret information.
6. The method as recited in claim 1, wherein the execution of the
software application on the mobile device of the at least one user occurs only if password supplied by the at least one user is correct.
7. The method as recited in claim 1, further comprising recharging of the set-top box and the software application; wherein the at least one user is granted access to the plurality of contents broadcasted by the service provider through a recharge kit after the registration of the at least one user.
8. The method as recited in claim 1, wherein if the dynamic key is exhausted in the mobile device of the at least one user, the STB may not be in the position to validate the at least one user unless the recharging is done.
9. The method as recited in claim 1, further comprising providing flexible
password change option to the at least one user for software application installed on the mobile device of the at least one user.
10. The method as recited in claim 1, further comprising facilitating key agreement between the set-top box and the mobile device of the at least one user with forward secrecy.
11. The method as recited in claim 1, wherein the set of parameters includes at least one of registration kit number or the software application or the scratch key for software ap plication to be installed on the mobile device or combinations thereof
12. The method as recited in claim 1, further comprising enforcing a time and event based access license for the at least one user to access the plurality of contents offered by the service provider through the dynamic key using the mobile device, wherein the software application code is bundled with a license certificate, thereby creating an application bundle.
13. The method as recited in claim 12, further comprising loading the application bundle into the mobile device from the service provider; wherein the loading comprises at least one of loading a signer certificate or a digital signature for the service code or a digital signature for the license certificate with the application bundle or combinations thereof
14. The method as recited in claim 13, further comprising installing the application bundle into a non-volatile memory of the mobile device of the at least one user.
15. The method as recited in claim 12, wherein the application bundle comprises a signer certificate or a digital signature for the service code or digital signature for license certificate or combinations thereof.
16. The method as recited in claim 12, further comprising authenticating the license certificate of the at least one user.
17. The method as recited in claim 1, wherein the access to the plurality of contents broadcasted by a service provider by entering the dynamic key generated by the software application in the ruobile device into the set top box occurs only if time reading is within license period of the software application for the at least one user.
18. The method as recited in claim 1, further comprising requesting for new dynamic key generating facility when the mobile device get exhausted to generate the dynamic key and the subscription of the software application for the at least one user is not expired with respect to time.
19. The method as recited in claim I, fiirther comprising attempting to access the plurality of contents broadcasted by the service provider for execution with the help of the mobile device of the at least one user.
20. A system for controlling access of a plurality of contents broadcasted by a service provider (SP) comprising:
at least one user for viewing the plurality of the contents broadcasted by the service provider;
a registration kit for registering the at least one user;
a set-top box (STB) synchronized with the respective registration kit; and
an software application configured to execute on a mobile device for generating a dynamic key;
i wherein the mobile device is adapted for generating the dynamic key to access
the plurality of contents broadcasted by the service provider by inputting the dynamic
key.
21. The system of claim 20, wherein the mobile device comprises at least one of a mobile phone or a palm-top or a personal digital assistant or any mobile computing device or combinations thereof.
22. The system of claim 20, ftarther comprising a set of information required to install the software application on the mobile device of the at least one user.
23. The system of claim 22, wherein the set of information comprises information regarding workstation of the service provider or of the at least one user and information coming from the service provider or combinations thereof.
24. A computer program product comprising a computer usable medium having a computer readable program code embodied therein for controlling access of a plurality of contents broadcasted by a service provider (SP), the method comprising:
program code adapted for creating a first database comprising a set of parameters for preparing registration kit and synchronizing the set of parameters with respective set-top box (STB) to be used by at least one user;
program code adapted for creating a second database of a symmetric key along with encrypted values;
program code adapted for registering the at least one user by entering the set of parameters in a mobile device of the at least one user and updating details of the at least one user in the second database after registration;
program code adapted for encrypting the plurality of contents broadcasted by the service provider using the symmetric key of the at least one user stored in the second database during the registration along with the encrypted key values;
program code adapted for executing a software application provided by the SP in the mobile device to generate a dynamic key; and
program code adapted for inputting the dynamic key generated by the mobile device into the set-top box to access the plurality of contents broadcasted by the service provider; wherein the inputted dynamic key in the STB is validated by the STB against the information stored during the registration of the at least one user.
25. The product of claim 1, further comprising program code adapted for recharging of the set-top box and the software application; wherein the at least one user is granted access to the plurality of contents broadcasted by the service provider through a re-charge kit after the registration of the at least one user.
26. The product of claim 1, further comprising program code adapted for
personalizing the mobile device of the at least one user and the set top box using the
registration kit.
27. The product of claim 1, further comprising program code adapted for
providing flexible passw^ord change option to the at least one user for software
application installed on the mobile device of the at least one user..
28. The product of claim 1, further comprising program code adapted for
enforcing a time and event based access license for the at least one user to access the
plurality of contents offered by the service provider through the dynamic key using
the mobile device, wherein the software application code is bundled with a license
certificate, thereby creating an application bundle.
29. The product of claim 12, further comprising program code adapted for
authenticating the license certificate of the at least one user.
30. The product of claim 1, ftirther comprising program code adapted for
requesting for new dynamic key generating facility when the mobile device get
exhausted to generate the dynamic key and the subscription of the software
application for the at least one user is not expired with respect to time.
| Section | Controller | Decision Date |
|---|---|---|
| # | Name | Date |
|---|---|---|
| 1 | 1475-CHE-2007 FORM-18 06-10-2009.pdf | 2009-10-06 |
| 1 | 1475-CHE-2007_EXAMREPORT.pdf | 2016-07-02 |
| 2 | 1475-CHE-2007 FORM-13 28-10-2009.pdf | 2009-10-28 |
| 2 | 1475-CHE-2007-Correspondence-110915.pdf | 2015-09-15 |
| 3 | 1475-che-2007-form 5.pdf | 2011-09-03 |
| 3 | 1475-CHE-2007-Form 1-110915.pdf | 2015-09-15 |
| 4 | 1475-CHE-2007-Other Patent Document-110915.pdf | 2015-09-15 |
| 4 | 1475-che-2007-form 3.pdf | 2011-09-03 |
| 5 | 1475-che-2007-form 1.pdf | 2011-09-03 |
| 5 | 1475-CHE-2007 AMENDED CLAIMS 27-07-2015.pdf | 2015-07-27 |
| 6 | 1475-che-2007-drawings.pdf | 2011-09-03 |
| 6 | 1475-CHE-2007 AMENDED PAGES OF SPECIFICATION 27-07-2015.pdf | 2015-07-27 |
| 7 | 1475-che-2007-description(complete).pdf | 2011-09-03 |
| 7 | 1475-CHE-2007 EXAMINATION REPORT REPLY RECEIVED 27-07-2015.pdf | 2015-07-27 |
| 8 | 1475-che-2007-correspondnece-others.pdf | 2011-09-03 |
| 8 | 1475-CHE-2007 FORM-1 27-07-2015.pdf | 2015-07-27 |
| 9 | 1475-CHE-2007 FORM-3 27-07-2015.pdf | 2015-07-27 |
| 9 | 1475-che-2007-claims.pdf | 2011-09-03 |
| 10 | 1475-CHE-2007 OTHER PATENT DOCUMENT 27-07-2015.pdf | 2015-07-27 |
| 10 | 1475-che-2007-assignement.pdf | 2011-09-03 |
| 11 | 1475-CHE-2007 AMENDED PAGES OF SPECIFICATION 03-06-2015.pdf | 2015-06-03 |
| 11 | 1475-che-2007-abstract.pdf | 2011-09-03 |
| 12 | 1475-CHE-2007 CORRESPONDENCE OTHERS 03-06-2015.pdf | 2015-06-03 |
| 12 | 1475-CHE-2007 FORM-13 03-06-2015.pdf | 2015-06-03 |
| 13 | 1475-CHE-2007 FORM-1 03-06-2015.pdf | 2015-06-03 |
| 14 | 1475-CHE-2007 CORRESPONDENCE OTHERS 03-06-2015.pdf | 2015-06-03 |
| 14 | 1475-CHE-2007 FORM-13 03-06-2015.pdf | 2015-06-03 |
| 15 | 1475-CHE-2007 AMENDED PAGES OF SPECIFICATION 03-06-2015.pdf | 2015-06-03 |
| 15 | 1475-che-2007-abstract.pdf | 2011-09-03 |
| 16 | 1475-CHE-2007 OTHER PATENT DOCUMENT 27-07-2015.pdf | 2015-07-27 |
| 16 | 1475-che-2007-assignement.pdf | 2011-09-03 |
| 17 | 1475-che-2007-claims.pdf | 2011-09-03 |
| 17 | 1475-CHE-2007 FORM-3 27-07-2015.pdf | 2015-07-27 |
| 18 | 1475-CHE-2007 FORM-1 27-07-2015.pdf | 2015-07-27 |
| 18 | 1475-che-2007-correspondnece-others.pdf | 2011-09-03 |
| 19 | 1475-che-2007-description(complete).pdf | 2011-09-03 |
| 19 | 1475-CHE-2007 EXAMINATION REPORT REPLY RECEIVED 27-07-2015.pdf | 2015-07-27 |
| 20 | 1475-che-2007-drawings.pdf | 2011-09-03 |
| 20 | 1475-CHE-2007 AMENDED PAGES OF SPECIFICATION 27-07-2015.pdf | 2015-07-27 |
| 21 | 1475-che-2007-form 1.pdf | 2011-09-03 |
| 21 | 1475-CHE-2007 AMENDED CLAIMS 27-07-2015.pdf | 2015-07-27 |
| 22 | 1475-CHE-2007-Other Patent Document-110915.pdf | 2015-09-15 |
| 22 | 1475-che-2007-form 3.pdf | 2011-09-03 |
| 23 | 1475-che-2007-form 5.pdf | 2011-09-03 |
| 23 | 1475-CHE-2007-Form 1-110915.pdf | 2015-09-15 |
| 24 | 1475-CHE-2007-Correspondence-110915.pdf | 2015-09-15 |
| 24 | 1475-CHE-2007 FORM-13 28-10-2009.pdf | 2009-10-28 |
| 25 | 1475-CHE-2007 FORM-18 06-10-2009.pdf | 2009-10-06 |
| 25 | 1475-CHE-2007_EXAMREPORT.pdf | 2016-07-02 |