CONTROLLING DELIVERY OF VIDEO PROGRAMS USING USER DEFINED IDENTIFIERS FOR VIDEO RECEIVER DEVICES

    公开(公告)号:EP3515062A1

    公开(公告)日:2019-07-24

    申请号:EP19161349.6

    申请日:2012-03-22

    Applicant: Ericsson AB

    Abstract: A method of controlling delivery of video programs from video distribution equipment to video receiver devices includes receiving messages at the video distribution equipment from a mobile terminal operated by a user. The messages contain user defined identifiers that are associated with equipment identifiers of different ones of the video receiver devices. The user defined identifiers are stored associated with the equipment identifiers in a subscriber account. Delivery of video programs from the video distribution equipment to the video receiver devices is controlled in response to commands received from the mobile terminal which request delivery of identified video programs to identified ones of the user defined identifiers. Related video distribution equipment and mobile terminals are disclosed.

    PROCÉDÉ D'IDENTIFICATION DE PROCESSEURS DE SÉCURITÉ

    公开(公告)号:EP3380983A2

    公开(公告)日:2018-10-03

    申请号:EP16813009.4

    申请日:2016-11-24

    Applicant: Viaccess

    Inventor: TRONEL, Bruno

    Abstract: The invention relates to a method for the identification of security processors in a system for delivering protected multimedia content, in which: upon request from an identification device, a network head-end transmits (136) a command to suspend a first identified pre-determined security processor which, in response, switches (136) from an active state to an idle state; the sharing server detects (120) that the first security processor is in the idle state and then transmits (120) access control messages to a second security processor instead of the first security processor; in response to the identification of at least the second security processor, upon request from the identification device, the network head-end transmits (134) a command to re-establish the first security processor, and, subsequently, in response, the first security processor switches (134) from the idle state to the active state.

Patent Agency Ranking