Providing content in a communication system
First Claim
1. A method for providing content in a communication system, the method comprising:
- encoding content to a first layer and a second layer;
protecting the second layer of the content against unauthorised use; and
transmitting the content to user equipment associated with an identity module.
1 Assignment
0 Petitions
Accused Products
Abstract
The present invention relates to a method for providing content in a communication system. The method comprises encoding content to a first part and a second part. Furthermore, the method comprises protecting the second part of the content against unauthorised use. Furthermore, the method comprises transmitting the content to user equipment associated with an identity module. The present invention relates also to a method for obtaining content in user equipment in a communication system. The method comprises receiving content encoded to a first layer and a protected second layer. Furthermore, the method comprises requesting for opening the protection of the second layer, receiving opening means and opening the protection of the second layer using the opening means interacting with an identity module associated with the user equipment. Furthermore, a network element and user equipment are configured to execute the method.
49 Citations
36 Claims
-
1. A method for providing content in a communication system, the method comprising:
-
encoding content to a first layer and a second layer;
protecting the second layer of the content against unauthorised use; and
transmitting the content to user equipment associated with an identity module. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method for obtaining content in user equipment in a communication system, the method comprising:
-
receiving content encoded to a first layer and a protected second layer;
requesting for opening the protection of the second layer;
receiving opening means; and
opening the protection of the second layer using the opening means interacting with an identity module associated with the user equipment. - View Dependent Claims (8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A computer program embodied on a computer-readable medium, said computer program configured to control a computer to perform the steps of:
-
encoding content to a first layer and a second layer;
protecting the second layer of the content against unauthorised use; and
transmitting the content to user equipment associated with an identity module.
-
-
20. A computer program embodied on a computer-readable medium, said computer program configured to control a computer to perform the steps of:
-
receiving content encoded to a first layer and a protected second layer;
requesting for opening the protection of the second layer;
receiving opening means; and
opening the protection of the second layer using the opening means interacting with an identity module associated with the user equipment.
-
-
21. A network element in a communication system comprising:
-
encoding means for encoding content to a first layer and second layer;
protecting means for protecting the second layer of the content against unauthorised use; and
transmitter for transmitting the content to user equipment associated with an identity module.
-
-
22. A network element in a communication system configured to:
-
encode content to a first layer and a second layer;
protect the second layer of the content against unauthorised use; and
transmit the content to a user equipment associated with an identity module. - View Dependent Claims (23, 24, 25, 26)
-
-
27. User equipment comprising:
-
receiver for receiving content encoded to a first layer and a protected second layer; and
requesting means for requesting for opening the protection of the second layer;
the user equipment associated with an identity module; and
the receiver being configured to subsequently receive opening means responsive to the requesting, the opening means interacting with the identity module associated with the user equipment.
-
-
28. User equipment configured to:
-
receive content encoded to a first layer and a protected second layer;
request for opening the second layer;
receive opening means; and
open the protection of the second layer using the opening means interacting with an identity module associated with the user equipment. - View Dependent Claims (29, 30, 31, 32, 33, 34, 35, 36)
-
Specification