Methods and apparatuses for secondary conditional access server
First Claim
1. A method to control a presentation of content, the method comprising:
- receiving a representation of content from a first conditional access server which provides the content in an encrypted form and uses a first set of cryptographic keys to protect the content from unauthorized access; and
presenting the content, at a user'"'"'s request, through a second conditional access server which is coupled to the first conditional access server;
wherein the presenting of the content is authorized through a client server relationship between the second and the first conditional access servers respectively; and
wherein the second conditional access server uses a second set of cryptographic keys to protect the content from unauthorized access in presenting the content.
2 Assignments
0 Petitions
Accused Products
Abstract
Conditional access to media content of primary security systems on a secondary networked environment. In one embodiment, a conditional access server is used to provide services to secondary CA clients (e.g., a bridge, a renderer, a storage, or their different combinations) through network connections. Containing data representing the subscriber, a conditional access server recovers entitlement data and/or decryption keys of a primary security system for the conditional access protected content, such as service keys and control words, and/or enforces conditional access to the content by secondary CA clients according to the authorization of the primary security system for the secondary CA clients. In one embodiment, a conditional access system provides delayed authorization for use so that the content can be recorded for later use when authorized and broadcasts rights for use on multiple secondary CA clients.
111 Citations
146 Claims
-
1. A method to control a presentation of content, the method comprising:
-
receiving a representation of content from a first conditional access server which provides the content in an encrypted form and uses a first set of cryptographic keys to protect the content from unauthorized access; and
presenting the content, at a user'"'"'s request, through a second conditional access server which is coupled to the first conditional access server;
wherein the presenting of the content is authorized through a client server relationship between the second and the first conditional access servers respectively; and
wherein the second conditional access server uses a second set of cryptographic keys to protect the content from unauthorized access in presenting the content. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A machine readable medium containing executable computer program instructions which when executed by a data processing system cause said system to perform a method to control a presentation of content, the method comprising:
-
receiving, at a second conditional access server, a first set of cryptographic keys from a first conditional access server which provides a representation of content in an encrypted form and authorizes access to the content through the first set of cryptographic keys; and
authorizing a client of the second conditional access server to present the content in accordance with authorization the second conditional access server received from the first conditional access server;
wherein the second conditional access server uses a second set of cryptographic keys to protect the content from unauthorized access in presenting the content. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A secondary conditional access server to control a presentation of content, the secondary conditional access server comprising:
-
a communication interface, the communication interface to receive a first set of cryptographic keys from a primary conditional access server which provides a representation of content in an encrypted form and authorizes access to the content through the first set of cryptographic keys; and
a controller coupled to the communication interface, the controller to authorize a client of the secondary conditional access server to present the content in accordance with authorization the secondary conditional access server received from the primary conditional access server;
wherein the secondary conditional access server uses a second set of cryptographic keys to protect the content from unauthorized access in presenting the content. - View Dependent Claims (20, 21, 22)
-
-
23. A secondary conditional access server to control a presentation of content, the secondary conditional access server comprising:
-
means for receiving a first set of cryptographic keys from a primary conditional access server which provides a representation of content in an encrypted form and authorizes access to the content through the first set of cryptographic keys; and
means for authorizing a client of the secondary conditional access server to present the content in accordance with authorization the secondary conditional access server received from the primary conditional access server;
wherein the secondary conditional access server uses a second set of cryptographic keys to protect the content from unauthorized access in presenting the content. - View Dependent Claims (24, 25, 26, 27)
-
-
28. A method to provide conditional access, the method comprising:
-
broadcasting a first entitlement management message for a subscriber to request caching of a media component;
broadcasting the media component from a first conditional access server;
receiving a client request to use the media component from a client through a second conditional access server after said broadcasting; and
responding to the client request through the second conditional access server. - View Dependent Claims (29, 30, 31)
-
-
32. A method to process conditional access protection, the method comprising:
-
receiving, at a conditional access server, security messages of a primary security system;
processing the security messages on the conditional access server; and
transmitting, from the conditional access server to a secondary conditional access client through a network connection, access controlled data that is in an access controlled format and that is at least partially derived from the security messages. - View Dependent Claims (33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47)
-
-
48. A method to process media content provided by a primary security system, the method comprising:
receiving, at a secondary conditional access client from a conditional access server through a network connection, access controlled data that is in an access controlled format and that is at least partially derived from a security message of the primary security system. - View Dependent Claims (49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61)
-
62. A machine readable medium containing executable computer program instructions which when executed by a data processing system cause said system to perform a method to provide conditional access, the method comprising:
-
broadcasting a first entitlement management message for a subscriber to request caching of a media component;
broadcasting the media component from a first conditional access server;
receiving a client request to use the media component from a client through a second conditional access server after said broadcasting; and
responding to the client request through the second conditional access server. - View Dependent Claims (63, 64, 65)
-
-
66. A machine readable medium containing executable computer program instructions which when executed by a data processing system cause said system to perform a method to process conditional access protection, the method comprising:
-
receiving, at a conditional access server, security messages of a primary security system;
processing the security messages on the conditional access server; and
transmitting, from the conditional access server to a secondary conditional access client through a network connection, access controlled data that is in an access controlled format and that is at least partially derived from the security messages. - View Dependent Claims (67, 68, 69, 70, 71, 72, 73, 74, 75, 76, 77, 78, 79, 80, 81)
-
-
82. A machine readable medium containing executable computer program instructions which when executed by a data processing system cause said system to perform a method to process media content provided by a primary security system, the method comprising:
receiving, at a secondary conditional access client from a conditional access server through a network connection, access controlled data that is in an access controlled format and that is at least partially derived from a security message of the primary security system. - View Dependent Claims (83, 84, 85, 86, 87, 88, 89, 90, 91, 92, 93, 94, 95)
-
96. A primary security system to provide conditional access, the system comprising:
-
means for broadcasting a first entitlement management message for a subscriber to request caching of a media component;
means for broadcasting the media component;
means for receiving a client request to use the media component from a client through a secondary conditional access server after said broadcasting; and
means for responding to the client request through the secondary conditional access server. - View Dependent Claims (97, 98, 99)
-
-
100. A data processing system to process conditional access protection, the data processing system comprising:
-
means for receiving, at a conditional access server, security messages of a primary security system;
means for processing the security messages on the conditional access server; and
means for transmitting, from the conditional access server to a secondary conditional access client through a network connection, access controlled data that is in an access controlled format and that is at least partially derived from the security messages. - View Dependent Claims (101, 102, 103, 104, 105, 106, 107, 108, 109, 110, 111, 112, 113, 114, 115)
-
-
116. A data processing system to process media content provided by a primary security system, the data processing system comprising:
means for receiving, at a secondary conditional access client from a conditional access server through a network connection, access controlled data that is in an access controlled format and that is at least partially derived from a security message of the primary security system. - View Dependent Claims (117, 118, 119, 120, 121, 122, 123, 124, 125, 126, 127, 128, 129)
-
130. A conditional access server, comprising:
-
one or more communication interfaces, the one or more communication interfaces to receive security messages of a primary security system;
a processor coupled to the one or more communication interfaces, the processor to process the security messages, and the one or more communication interfaces to transmit, to a secondary conditional access client through a network connection, access controlled data that is in an access controlled format and that is at least partially derived from the security messages. - View Dependent Claims (131, 132, 133, 134, 135, 136, 137, 138, 139)
-
-
140. A secondary conditional access client, comprising:
-
a communication interface to receive, from a conditional access server through a network connection, access controlled data that is in an access controlled format and that is at least partially derived from a security message of a primary security system; and
a processor coupled to the communication interface, the processor to process the access controlled data. - View Dependent Claims (141, 142, 143, 144, 145, 146)
-
Specification