Systems and methods for conditional access and digital rights management
First Claim
Patent Images
1. A method for encrypting digital media at a first location, the method comprising:
- generating a first encrypted digital media content by performing encryption of a digital media content with a first encryption key according to a first encryption scheme;
generating a second encrypted digital media content by performing encryption of said first encrypted digital media content with a second encryption key according to a second encryption scheme;
generating a first encrypted message, said first encrypted message comprising said first encryption key encrypted with a third encryption key; and
generating a second encrypted message, said second encrypted message comprising said second encryption key encrypted with said third encryption key.
1 Assignment
0 Petitions
Accused Products
Abstract
Conditional access (CA) and digital rights management (DRM) in digital media delivery, processing, and storage systems. Methods and apparatuses are provided for managing digital rights under the protection of multiple CA and/or DRM systems. Some embodiments provide secure and robust methods for bridging multiple DRM systems in the digital media content distribution and playback systems. The present invention simplifies content delivery, conditional access, and digital rights management.
125 Citations
48 Claims
-
1. A method for encrypting digital media at a first location, the method comprising:
-
generating a first encrypted digital media content by performing encryption of a digital media content with a first encryption key according to a first encryption scheme; generating a second encrypted digital media content by performing encryption of said first encrypted digital media content with a second encryption key according to a second encryption scheme; generating a first encrypted message, said first encrypted message comprising said first encryption key encrypted with a third encryption key; and generating a second encrypted message, said second encrypted message comprising said second encryption key encrypted with said third encryption key. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method, to be used in a bridge between a first digital rights management system and a second digital rights management system, the method comprising:
-
receiving a scrambled digital media content, said scrambled digital media content being encrypted with a first control word and a second control word; receiving a first encrypted message, said first encrypted message comprising said second control word encrypted with a first service key associated with the first digital rights management system; and generating a second encrypted message, said second encrypted message comprising said second control word encrypted with a second service key associated with the second digital rights management system. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A method, to be used in a digital rights management system, for decrypting an encrypted digital media, the method comprising:
-
receiving an encrypted digital media content, the encrypted digital media content comprising encrypted data, said encrypted data being encrypted with a first encryption key according to a first encryption scheme, wherein said encrypted data is created by encrypting a digital media content with a second encryption key according to a second encryption scheme; receiving a first encrypted message, said first encrypted message comprising a first decryption key encrypted with a third encryption key, said first decryption key corresponding to said first encryption key; receiving a third decryption key corresponding to said third encryption key; generating the first decryption key by decrypting said first encrypted message using said third decryption key; and performing decryption of said encrypted digital media content using at least said first decryption key. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22)
-
-
23. An apparatus for encrypting digital media, the apparatus comprising:
-
a processor; a memory coupled with said processor, said memory having contained therein sequences of instructions which, when executed by said processor, cause said processor to perform; generating a first encrypted digital media content by performing encryption of a digital media content with a first encryption key; generating a second encrypted digital media content by performing encryption of said first encrypted digital media content with a second encryption key; generating a first encrypted message, said first encrypted message comprising said first encryption key encrypted with a third encryption key; and generating a second encrypted message, said second encrypted message comprising said second encryption key encrypted with said third encryption key. - View Dependent Claims (24, 25)
-
-
26. An apparatus, to be used in a bridge between a first digital rights management system and a second digital right management system, the apparatus comprising:
-
a processor; a memory coupled with said processor, said memory having contained therein sequences of instructions which, when executed by said processor, cause said processor to perform; receiving a scrambled digital media content, said scrambled digital media content being encrypted with a first control word and a second control word; receiving a first encrypted message, said first encrypted message comprising said second control word encrypted with a first service key associated with the first digital rights management system; and generating a second encrypted message, said second encrypted message comprising said second control word encrypted with a second service key associated with the second digital rights management system. - View Dependent Claims (27, 28)
-
-
29. An apparatus, to be used in a digital rights management system, for decrypting an encrypted digital media, the apparatus comprising:
-
a processor; a memory coupled with said processor, said memory having contained therein sequences of instructions which, when executed by said processor, cause said processor to perform a method, the method comprising; receiving an encrypted digital media content, the encrypted digital media content comprising encrypted data, said encrypted data being encrypted with a first encryption key according to a first encryption scheme, wherein said encrypted data is created by encrypting a digital media content with a second encryption key according to a second encryption scheme; receiving a first encrypted message, said first encrypted message comprising a first decryption key encrypted with a third encryption key, said first decryption key corresponding to said first encryption key; receiving a third decryption key corresponding to said third encryption key; generating the first decryption key by decrypting said first encrypted message using said third decryption key; and performing decryption of said encrypted digital media content using at least said first decryption key. - View Dependent Claims (30, 31, 32, 33, 34)
-
-
35. A machine readable medium, the machine readable medium containing machine executable program instructions for encrypting digital media which, when executed by a data processing system, causes the data processing system to perform a method comprising:
-
generating a first encrypted digital media content by performing encryption of a digital media content with a first encryption key; generating a second encrypted digital media content by performing encryption of said first encrypted digital media content with a second encryption key; generating a first encrypted message, said first encrypted message comprising said first encryption key encrypted with a third encryption key; and generating a second encrypted message, said second encrypted message comprising said second encryption key encrypted with said third encryption key. - View Dependent Claims (36, 37)
-
-
38. A machine readable medium containing machine executable program instructions which, when executed by a data processing system, cause the data processing system to perform a method, the method to be used in a bridge between a first digital rights management system and a second digital right management system, the method comprising:
-
receiving a scrambled digital media content, said scrambled digital media content being encrypted with a first control word and a second control word; receiving a first encrypted message, said first encrypted message comprising said second control word encrypted with a first service key associated with the first digital rights management system; and generating a second encrypted message, said second encrypted message comprising said second control word encrypted with a second service key associated with the second digital rights management system. - View Dependent Claims (39, 40, 41)
-
-
42. A machine readable medium containing machine executable program instructions which, when executed by a data processing system, cause the data processing system to perform a method, the method to be used in a digital rights management system, for decrypting an encrypted digital media, the method performing:
-
receiving an encrypted digital media content, the encrypted digital media content comprising encrypted data, said encrypted data being encrypted with a first encryption key according to a first encryption scheme, wherein said encrypted data is created by encrypting a digital media content with a second encryption key according to a second encryption scheme; receiving a first encrypted message, said first encrypted message comprising a first decryption key encrypted with a third encryption key, said first decryption key corresponding to said first encryption key; receiving a third decryption key corresponding to said third encryption key; generating the first decryption key by decrypting said first encrypted message using said third decryption key; and performing decryption of said encrypted digital media content using at least said first decryption key. - View Dependent Claims (43, 44, 45, 46, 47, 48)
-
Specification