Abstract:
An audio and/or video content receiver configured to receive audio and/or video access- controlled content from a content source comprises a host module; and a conditional access module (CAM) having an access control unit for processing access-controlled content to generate non-access-controlled content, the host module and the CAM being arranged to provide an encrypted transport stream link for communication of the non-access-controlled content between the CAM and the host module; in which: the CAM comprises an identification data module configured to apply identification data to audio and/or video content to generate marked audio and/or video content; the host module is configured to communicate, via the encrypted transport stream link, at least some of the non-access-controlled content to the CAM for application of identification data by the identification data module; and the CAM is configured to communicate marked audio and/or video content to the host module via the encrypted transport stream link.
Abstract:
A method to tag a host rendering device by using a portable multimedia processing device configured to grant access to conditional access multimedia content provided by a specific operator. The multimedia content is rendered by the host rendering device that is connected to the portable multimedia processing device via a communication link. The portable multimedia processing device stores operating specific data comprising an operator identifier and a portable multimedia processing device identifier. This operator specific data is transmitted to the host rendering device to be stored in a non-volatile memory, the host rendering device thus becomes tagged with the operator specific data. The disclosure further relates to a dongle to be connected via the communication link to the host rendering device including a television set, the communication link including a USB link or a HDMI link or a combination thereof. The dongle tags the television set with its identifier and the identifier of the operator.
Abstract:
방송 수신 방법은 적어도 하나의 서비스를 수신하는 단계; 데이터를 전달하고 응답을 요청하기 위해서 사용되는 제1 데이터 유닛을 수신하는 단계; 상기 제1 데이터 유닛에 대한 응답으로 데이터를 전달하기 위해서 사용되는 제2 데이터 유닛을 전송하는 단계; 및 상기 제2 데이터 유닛을 기초로 상기 적어도 하나의 서비스를 적어도 하나의 클라이언트 디바이스로 출력하는 단계를 포함한다.
Abstract:
The specification and drawings present a new method, apparatus and software related product (e.g., a computer readable memory or storage device) for a session-based encryption (e.g., a common-tier encryption) for delivering a content (e.g., video, data, multi-media content and the like) on demand using multiple encryptors. According to an embodiment, the STB's request for a VOD session may be routed by a session resource manager (SRM) to receive content from an appropriate encryptor chosen from multiple encryptors based on a predefined criteria. This approach can minimize a number of encryptions/encryption devices (such as ECM generators) needed in a cable network. However, the simulcrypt encryptor can be also used, if necessary, e.g., when CAS-only encryptors are fully loaded with a traffic.
Abstract:
A dongle is configured to connect to a set top box. The dongle includes a memory for storing data, such as callback data files, and a wireless communication module for forwarding the stored data to an access point, for delivery to a television service provider head end. The dongle can also receive information to be provided to the set top box. Authentication and authorization of the dongle ensure only authenticated and authorized devices can access the system. A communication technology is used that allows for a large coverage area and simultaneous communication with many set top boxes.
Abstract:
Techniques for pairing two different security modules that use two different encryption technologies for operation in two different networks include generation and transmission of a secret to both the security modules via their respective communication networks. In one advantageous aspect, one of the security module, which may be prone for duplication or theft, is logically tethered to the other security module via the pairing. For example, after pairing is successfully performed, the first security module may be usable in a wide area network only when its presence in a local communication connection, such as a home network of a subscriber, or a peer-to-peer or a near field communication link, can be detected and verified by the second security module.
Abstract:
Systems and methods for implementing a Transport I/O system are described. Network encrypted content may be received by a device. The device may provide the network encrypted content to a secure processor, such as, for example, a smart card. The secure processor obtains a network control word that may be used to decrypt the network encrypted content. The secure processor may decrypt the network encrypted content to produce clear content. In embodiments, the secure processor may then use a local control word to generate locally encrypted content specific to the device. The device may then receive the locally encrypted content from the secure processor and proceed to decrypt the locally encrypted content using a shared local encryption key. The Transport I/O system ensures the protection of the network control word by maintaining the network control word on the secure processor.
Abstract:
An apparatus for content transaction is disclosed, which includes a Common Interface Conditional Access Module(CICAM) and a host device which are connected through a common interface. The host device receives a signal for playing a recorded content and determines whether the recorded content includes information about the viewing rating restriction by the CICAM and executes a procedure of relieving the viewing rating restriction by at least one of the CICAM and the host device according to the result of determination. A method of content transaction is also disclosed, which includes judging whether the recorded content includes information about the viewing rating restriction by the CICAM and executing a procedure of relieving the viewing rating restriction by at least one the CICAM and the host device according to the result of the determination.
Abstract:
A method of operation of an audio/video content receiver having a content decoder capable of concurrently decoding two or more audio/video programmes from a single packetized data stream by using data packets defining decryption information comprises the steps of : receiving encoded audio/video content as two or more packetized data streams, each data stream comprising one or more programmes having data packets identified by respective sets of one or more packet identifiers, each packetized data stream comprising identification data mapping programmes to respective sets of the packet identifiers and service data including security authorisation information for content receivers; generating a composite packetized data stream having programme data and the service data from two or more of the packetized data streams; applying a digital security indicator to at least the service data included in the composite packetized data stream; supplying the composite packetized data stream to the content decoder for decoding two or programmes from the composite packetized data stream according to the packet identifiers in the composite stream identification data; receiving the service data from the content decoder; detecting the validity of the digital security indicator applied to the service data; and in response tothe service data, detecting whether the content receiver is authorised to decode received programme data.
Abstract:
The aim of the present invention is to ensure that a security module or conditional access module ("module") is used together with an authorised receiver/decoder to access pay TV content. The module uses a wireless transceiver to read an authorisation message from a wireless tag attached to the receiver/decoder to which it is connected. The authorisation message contains an identifier of the module and is encrypted with a system key. If the obtained identifier in the authorisation message is not the one of the security module, operation of the security module is blocked. The authorisation message is written by a communications device (located i.e. in a shop selling receiver/decoder devices) to a wireless tag attached to the receiver/decoder. Thus a sold receiver/decoder can be immediately operated together with a specific module.