Providing Access To Content For a Device Using an Entitlement Control Message
First Claim
1. A method for providing authorized access to content for a plurality of devices, the method comprising:
- providing multiple entitlement management messages (EMMs), each EMM including a service key, to the plurality of devices; and
providing a same entitlement control message (ECM) to the plurality of devices, wherein the same ECM comprises an encrypted traffic key for decrypting content, and each of the plurality of devices derives an access key from the service key according to a business model level of access to the content for a user of each of the plurality of devices, and uses the access key to decrypt the traffic key to access the content according to the business model level of access to the content for the each of the plurality of devices.
3 Assignments
0 Petitions
Accused Products
Abstract
Providing access to content for devices is performed by providing multiple entitlement management messages (EMMs), each which including a service key, to the plurality of devices. Also, a same entitlement control message (ECM) is provided to the devices. The ECM includes an encrypted traffic key for decrypting content. Each of the devices derives an access key from the service key according to a business model level of access to the content for a user of the devices and uses the access key to decrypt the traffic key to access the content according to the business model level of access to the content for the each of the plurality of devices.
21 Citations
20 Claims
-
1. A method for providing authorized access to content for a plurality of devices, the method comprising:
-
providing multiple entitlement management messages (EMMs), each EMM including a service key, to the plurality of devices; and providing a same entitlement control message (ECM) to the plurality of devices, wherein the same ECM comprises an encrypted traffic key for decrypting content, and each of the plurality of devices derives an access key from the service key according to a business model level of access to the content for a user of each of the plurality of devices, and uses the access key to decrypt the traffic key to access the content according to the business model level of access to the content for the each of the plurality of devices. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A computer system configured to facilitate authorized access to content for a plurality of devices, the computer system comprising:
-
a processor configured to provide multiple entitlement management messages (EMMs), each EMM including a service key, to the plurality of devices; wherein the processor is further configured to provide a same entitlement control message (ECM) to the plurality of devices, and the same ECM comprises an encrypted traffic key for decrypting content, and each of the plurality of devices derives an access key from the service key according to a business model level of access to the content for a user of the each of the plurality of devices, and uses the access key to decrypt the traffic key to access the content according to the business model level of access to the content for the each of the plurality of devices; and an interface configured to transmit the EMMs and the ECM to the plurality of devices. - View Dependent Claims (16, 17)
-
-
18. A device configured to access content from a service provider, the device comprising:
-
a processor configured to receive an entitlement management message (EMM) including a service key, wherein the processor is further configured to receive an entitlement control message (ECM) from the service provider, and the ECM comprises an encrypted traffic key for decrypting content, and the device derives an access key from the service key according to a business model level of access to the content for a user of the device, and uses the access key to decrypt the traffic key to access the content according to the business model level of access to the content for the device, wherein the same ECM is sent to multiple other devices and each of the other devices derives an access key from the service key according to a business model level of access to the content for a user of the other device; an interface configured to receive the EMM and the ECM; and a data storage storing information from the EMM and the ECM. - View Dependent Claims (19, 20)
-
Specification