Methods and apparatuses for secondary conditional access server
First Claim
1. A method to control a presentation of content, the method comprising:
- receiving a representation of content from a first conditional access server which provides the content in an encrypted form and uses a first set of cryptographic keys to protect the content from unauthorized access; and
presenting the content, at a user'"'"'s request, through a second conditional access server which is coupled to the first conditional access server;
wherein the presenting of the content is authorized through a client server relationship between the second and the first conditional access servers respectively; and
wherein the second conditional access server uses a second set of cryptographic keys to protect the content from unauthorized access in presenting the content.
2 Assignments
0 Petitions
Accused Products
Abstract
Conditional access to media content of primary security systems on a secondary networked environment. In one embodiment, a conditional access server is used to provide services to secondary CA clients (e.g., a bridge, a renderer, a storage, or their different combinations) through network connections. Containing data representing the subscriber, a conditional access server recovers entitlement data and/or decryption keys of a primary security system for the conditional access protected content, such as service keys and control words, and/or enforces conditional access to the content by secondary CA clients according to the authorization of the primary security system for the secondary CA clients. In one embodiment, a conditional access system provides delayed authorization for use so that the content can be recorded for later use when authorized and broadcasts rights for use on multiple secondary CA clients.
-
Citations
146 Claims
-
1. A method to control a presentation of content, the method comprising:
-
receiving a representation of content from a first conditional access server which provides the content in an encrypted form and uses a first set of cryptographic keys to protect the content from unauthorized access; and
presenting the content, at a user'"'"'s request, through a second conditional access server which is coupled to the first conditional access server;
wherein the presenting of the content is authorized through a client server relationship between the second and the first conditional access servers respectively; and
wherein the second conditional access server uses a second set of cryptographic keys to protect the content from unauthorized access in presenting the content. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A machine readable medium containing executable computer program instructions which when executed by a data processing system cause said system to perform a method to control a presentation of content, the method comprising:
-
receiving, at a second conditional access server, a first set of cryptographic keys from a first conditional access server which provides a representation of content in an encrypted form and authorizes access to the content through the first set of cryptographic keys; and
authorizing a client of the second conditional access server to present the content in accordance with authorization the second conditional access server received from the first conditional access server;
wherein the second conditional access server uses a second set of cryptographic keys to protect the content from unauthorized access in presenting the content. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A secondary conditional access server to control a presentation of content, the secondary conditional access server comprising:
-
a communication interface, the communication interface to receive a first set of cryptographic keys from a primary conditional access server which provides a representation of content in an encrypted form and authorizes access to the content through the first set of cryptographic keys; and
a controller coupled to the communication interface, the controller to authorize a client of the secondary conditional access server to present the content in accordance with authorization the secondary conditional access server received from the primary conditional access server;
wherein the secondary conditional access server uses a second set of cryptographic keys to protect the content from unauthorized access in presenting the content. - View Dependent Claims (20, 21, 22)
-
-
23. A secondary conditional access server to control a presentation of content, the secondary conditional access server comprising:
-
means for receiving a first set of cryptographic keys from a primary conditional access server which provides a representation of content in an encrypted form and authorizes access to the content through the first set of cryptographic keys; and
means for authorizing a client of the secondary conditional access server to present the content in accordance with authorization the secondary conditional access server received from the primary conditional access server;
wherein the secondary conditional access server uses a second set of cryptographic keys to protect the content from unauthorized access in presenting the content. - View Dependent Claims (24, 25, 26, 27)
-
-
28. A method to provide conditional access, the method comprising:
-
broadcasting a first entitlement management message for a subscriber to request caching of a media component;
broadcasting the media component from a first conditional access server;
receiving a client request to use the media component from a client through a second conditional access server after said broadcasting; and
responding to the client request through the second conditional access server. - View Dependent Claims (29, 30, 31)
-
-
32. A method to process conditional access protection, the method comprising:
-
receiving, at a conditional access server, security messages of a primary security system;
processing the security messages on the conditional access server; and
transmitting, from the conditional access server to a secondary conditional access client through a network connection, access controlled data that is in an access controlled format and that is at least partially derived from the security messages. - View Dependent Claims (33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47)
-
-
48. A method to process media content provided by a primary security system, the method comprising:
receiving, at a secondary conditional access client from a conditional access server through a network connection, access controlled data that is in an access controlled format and that is at least partially derived from a security message of the primary security system. - View Dependent Claims (49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61)
-
62. A machine readable medium containing executable computer program instructions which when executed by a data processing system cause said system to perform a method to provide conditional access, the method comprising:
-
broadcasting a first entitlement management message for a subscriber to request caching of a media component;
broadcasting the media component from a first conditional access server;
receiving a client request to use the media component from a client through a second conditional access server after said broadcasting; and
responding to the client request through the second conditional access server. - View Dependent Claims (63, 64, 65)
-
-
66. A machine readable medium containing executable computer program instructions which when executed by a data processing system cause said system to perform a method to process conditional access protection, the method comprising:
-
receiving, at a conditional access server, security messages of a primary security system;
processing the security messages on the conditional access server; and
transmitting, from the conditional access server to a secondary conditional access client through a network connection, access controlled data that is in an access controlled format and that is at least partially derived from the security messages. - View Dependent Claims (67, 68, 69, 70, 71, 72, 73, 74, 75, 76, 77, 78, 79, 80, 81)
-
-
82. A machine readable medium containing executable computer program instructions which when executed by a data processing system cause said system to perform a method to process media content provided by a primary security system, the method comprising:
receiving, at a secondary conditional access client from a conditional access server through a network connection, access controlled data that is in an access controlled format and that is at least partially derived from a security message of the primary security system. - View Dependent Claims (83, 84, 85, 86, 87, 88, 89, 90, 91, 92, 93, 94, 95)
-
96. A primary security system to provide conditional access, the system comprising:
-
means for broadcasting a first entitlement management message for a subscriber to request caching of a media component;
means for broadcasting the media component;
means for receiving a client request to use the media component from a client through a secondary conditional access server after said broadcasting; and
means for responding to the client request through the secondary conditional access server. - View Dependent Claims (97, 98, 99)
-
-
100. A data processing system to process conditional access protection, the data processing system comprising:
-
means for receiving, at a conditional access server, security messages of a primary security system;
means for processing the security messages on the conditional access server; and
means for transmitting, from the conditional access server to a secondary conditional access client through a network connection, access controlled data that is in an access controlled format and that is at least partially derived from the security messages. - View Dependent Claims (101, 102, 103, 104, 105, 106, 107, 108, 109, 110, 111, 112, 113, 114, 115)
-
-
116. A data processing system to process media content provided by a primary security system, the data processing system comprising:
means for receiving, at a secondary conditional access client from a conditional access server through a network connection, access controlled data that is in an access controlled format and that is at least partially derived from a security message of the primary security system. - View Dependent Claims (117, 118, 119, 120, 121, 122, 123, 124, 125, 126, 127, 128, 129)
-
130. A conditional access server, comprising:
-
one or more communication interfaces, the one or more communication interfaces to receive security messages of a primary security system;
a processor coupled to the one or more communication interfaces, the processor to process the security messages, and the one or more communication interfaces to transmit, to a secondary conditional access client through a network connection, access controlled data that is in an access controlled format and that is at least partially derived from the security messages. - View Dependent Claims (131, 132, 133, 134, 135, 136, 137, 138, 139)
-
-
140. A secondary conditional access client, comprising:
-
a communication interface to receive, from a conditional access server through a network connection, access controlled data that is in an access controlled format and that is at least partially derived from a security message of a primary security system; and
a processor coupled to the communication interface, the processor to process the access controlled data. - View Dependent Claims (141, 142, 143, 144, 145, 146)
-
Specification