Claims
- 1. A method for monitoring components of a digital cinema system comprising:
storing a configuration of an exhibitor system of a digital cinema system, wherein the exhibitor system comprises one or more components; polling each of the one or more components based on the configuration; and determining whether an integrity of the exhibitor system has been compromised based on the configuration and results of the polling.
- 2. The method of claim 1, wherein the configuration is stored using strong authentication.
- 3. The method of claim 1, wherein the configuration comprises a list of the one or more components.
- 4. The method of claim 1, wherein the polling uses a low power unlicensed frequency.
- 5. The method of claim 1, wherein the polling utilizes a multiple access method.
- 6. The method of claim 1, wherein the polling comprises utilizing a radio frequency (RF) receiver to poll an RF transponder of each of the one or more exhibitor system components.
- 7. The method of claim 6, wherein the RF transponder is an integral part of the exhibitor system component.
- 8. The method of claim 6, wherein the RF reader has a range sufficient to cover an installation area of the exhibitor system.
- 9. The method of claim 6, wherein each RF transponder comprises a battery to provide power to the RF transponder.
- 10. The method of claim 1, wherein each component comprises a unique permanent unalterable identification that is one-time programmed during manufacture of the component.
- 11. The method of claim 10, further comprising receiving the identification and a tampering status from each component in response to the polling.
- 12 The method of claim 1 wherein the integrity of the exhibitor system is determined to be compromised if a response is not received from one of the components during the polling.
- 13 The method of claim 1 wherein the integrity of the exhibitor system is determined to be compromised if a report of unauthorized tampering has been received from one of the components during the polling.
- 14. The method of claim 1 further comprising transmitting a message regarding the integrity of the exhibitor system to a network operation center.
- 15. A method for monitoring a component of a digital cinema system comprising:
receiving a global positioning system (GPS) location and a first identification from an exhibitor system component of a digital cinema system; and determining whether the first identification is for an unauthorized component.
- 16. The method of claim 15, wherein a GPS receiver is an integral part of the exhibitor system component.
- 17. The method of claim 15, wherein the GPS location is received during a power up process of the exhibitor system component.
- 18. The method of claim 15, further comprising initiating enforcement action if the first identification is for an unauthorized component.
- 19. The method of claim 15, wherein determining whether the first identification is for an unauthorized component comprises:
receiving a message indicating an integrity of an exhibitor system has been compromised, wherein the message comprises a second identification of an exhibitor system component that has been compromised; determining that the first identification is for an unauthorized component if the first identification and second identification are the same.
- 20. The method of claim 19, wherein the integrity of the exhibitor system is determined to be compromised by:
storing a configuration of the exhibitor system, wherein the exhibitor system comprises one or more exhibitor system components; polling each of the one or more exhibitor system components based on the configuration; and determining whether the integrity of the exhibitor system has been compromised based on the configuration and results of the polling.
- 21. A system for monitoring components of a digital cinema system comprising:
a computer having a memory; a configuration of an exhibitor system of a digital cinema system stored in the memory, wherein the exhibitor system comprises one or more components; wherein the computer is configured to:
poll each of the one or more components based on the configuration; and determine whether an integrity of the exhibitor system has been compromised based on the configuration and results of the polling.
- 22. The system of claim 21, wherein the configuration is stored using strong authentication.
- 23. The system of claim 21, wherein the configuration comprises a list of the one or more components.
- 24. The system of claim 21, wherein the computer is configured to poll using a low power unlicensed frequency.
- 25. The system of claim 21, wherein the computer is configured to poll utilizing a multiple access method.
- 26. The system of claim 21, wherein the computer further comprises a radio frequency (RF) receiver that is utilized to poll an RF transponder of each of the one or more exhibitor system components.
- 27. The system of claim 26, wherein the RF transponder is an integral part of the exhibitor system component.
- 28. The system of claim 26, wherein the RF reader has a range sufficient to cover an installation area of the exhibitor system.
- 29. The system of claim 26, wherein each RF transponder comprises a battery to provide power to the RF transponder.
- 30. The system of claim 21, wherein each component comprises a unique permanent unalterable identification that is one-time programmed during manufacture of the component.
- 31. The system of claim 30, wherein the computer is further configured to receive the identification and a tampering status from each component in response to the polling.
- 32 The system of claim 21 wherein the computer determines that the integrity of the exhibitor system has been compromised if a response is not received from one of the components during the polling.
- 33 The system of claim 21 wherein the computer determines that the integrity of the exhibitor system has been compromised if a report of unauthorized tampering has been received from one of the components during the polling.
- 34. The system of claim 21 wherein the computer is further configured to transmit a message regarding the integrity of the exhibitor system to a network operation center.
- 35. A system for monitoring a component of a digital cinema system comprising:
a first identification of an exhibitor system component of a digital cinema system; a global positioning system (GPS) location of an the exhibitor system component; and a network operations center configured to:
receive the GPS location and the first identification from the exhibitor system component; and determine whether the first identification is for an unauthorized component.
- 36. The system of claim 35, wherein a GPS receiver is an integral part of the exhibitor system component.
- 37. The system of claim 35, wherein the GPS location is received during a power up process of the exhibitor system component.
- 38. The system of claim 35, wherein the network operations center is further configured to intiate enforcement action if the first identification is for an unauthorized component.
- 39. The system of claim 35, wherein the network operations center is configured to determine whether the first identification is for an unauthorized component by:
receiving a message indicating an integrity of an exhibitor system has been compromised, wherein the message comprises a second identification of an exhibitor system component that has been compromised; determining that the first identification is for an unauthorized component if the first identification and second identification are the same.
- 40. The system of claim 39, wherein the integrity of the exhibitor system has been determined to be compromised by:
storing a configuration of the exhibitor system, wherein the exhibitor system comprises one or more exhibitor system components; polling each of the one or more exhibitor system components based on the configuration; and determining whether an integrity of the exhibitor system has been compromised based on the configuration and results of the polling.
CROSS-REFERENCE TO RELATED APPLICATIONS
[0001] This application claims the benefit under 35 U.S.C. Section 119(e) of the following co-pending and commonly-assigned U.S. provisional patent applications, which are incorporated by reference herein:
[0002] Provisional Application Serial No. 60/376,255, filed Apr. 29, 2002, by Joseph S. Ng and Ismael Rodriguez, entitled “A METHOD TO SIGNAL TAMPERING OF REMOTELY POSITIONED COMPONENTS BY TAGGING AND GPS MONITORING,” attorneys' docket number 010589;
[0003] Provisional Application Serial No. 60/376,105, filed Apr. 29, 2002, by Charles F. Stirling, Bernard M. Gudaitis, William G. Connelly and Catherine C. Girardey, entitled “SECURE DATA CONTENT DELIVERY SYSTEM FOR MULTIMEDIA APPLICATIONS UTILIZING BANDWIDTH EFFICIENT MODULATION,” attorneys' docket number PD-01-703; and
[0004] Provisional Application Serial No. 60/376,244, filed Apr. 29, 2002, by Ismael Rodriguez and James C. Campanella, entitled “A METHOD TO SECURELY DISTRIBUTE LARGE DIGITAL VIDEO/DATA FILES WITH OPTIMUM SECURITY,” attorneys' docket number 010892.
[0005] This application is related to the following co-pending and commonly-assigned patent application, which application is incorporated by reference herein:
[0006] U.S. patent application Ser. No. ______, filed on the same date herewith entitled “METHOD AND APPARATUS FOR INTEGRATING AND MONITORING KEY DIGITAL CINEMA SYSTEM COMPONENTS AS A MEANS TO VERIFY SYSTEM INTEGRITY”, by Joseph S. Ng, Ismael Rodriguez, and Antonie C. Smith, Attorney Docket No. 010586.
Provisional Applications (3)
|
Number |
Date |
Country |
|
60376255 |
Apr 2002 |
US |
|
60376105 |
Apr 2002 |
US |
|
60376244 |
Apr 2002 |
US |