Reconfigurable Access Network Encryption Architecture
First Claim
1. A method comprising:
- receiving, at an access network, a first set of encryption management data for an encryption management data interface, the encryption management data interface defining a format for communication of encryption management data;
encrypting a first set of content data in accordance with the first set of encryption management data using a first encryption module;
receiving, at the access network, a second set of encryption management data for the encryption management data interface; and
encrypting a second set of content data, in accordance with the second set of encryption management data using a second encryption module, wherein the second encryption module is different from the first encryption module.
1 Assignment
0 Petitions
Accused Products
Abstract
An access platform or other network elements can include multiple line cards configured to encrypt data. The platform and/or each of the line cards may receive encryption management data that conforms to a predefined encryption management data interface. The encryption management data received by a particular line card may be generated by a conditional access system device and converted to conform to the encryption management data interface by an encryption manager. Line cards may alternatively be configured for connection to separate encryption hardware components. Line cards may include a block of field programmable gate arrays or other type of programmable hardware that can be configured to execute an encryption module.
30 Citations
21 Claims
-
1. A method comprising:
-
receiving, at an access network, a first set of encryption management data for an encryption management data interface, the encryption management data interface defining a format for communication of encryption management data; encrypting a first set of content data in accordance with the first set of encryption management data using a first encryption module; receiving, at the access network, a second set of encryption management data for the encryption management data interface; and encrypting a second set of content data, in accordance with the second set of encryption management data using a second encryption module, wherein the second encryption module is different from the first encryption module. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. An apparatus comprising:
-
at least one processor; at least one memory; and a first line card, the apparatus configured to perform operations that include receiving a first set of encryption management data for an encryption management data interface, the encryption management data interface defining a format for communication of encryption management data, encrypting a first set of content data, in accordance with the first set of encryption management data, using a first encryption module, receiving a second set of encryption management data for the encryption management data interface, and encrypting a second set of content data, in accordance with the second set of encryption management data, using a second encryption module, wherein the second encryption module is different from the first encryption module. - View Dependent Claims (11, 12, 13, 14, 15, 16)
-
-
17. A method comprising:
-
transferring first content data, within an access network platform of an access network, to a first encryption module across a data interface, the data interface defining a format for transfer of unencrypted data and for receipt of said transferred first content data after encryption; receiving, across the data interface, the first content data encrypted by the first encryption module; forwarding the encrypted first content data from the access network platform to end devices in the access network; transferring second content data within the access network platform across the data interface to a second encryption module, the second encryption module being different from the first encryption module; and receiving encrypted second content data across the data interface, wherein the encrypted second content data is encrypted by the second encryption module. - View Dependent Claims (18, 19, 20, 21)
-
Specification