Super encrypted storage and retrieval of media programs in a hard-paired receiver and storage device
First Claim
1. A method of storing program material for subsequent replay, comprising the steps of:
- receiving a data stream in a receiver having a storage device, the data stream comprising the program material encrypted according to a first encryption key and control data, the control data comprising the first encryption key and being encrypted;
further encrypting the encrypted program material according to a second encryption key;
encrypting the second encryption key according to a third encryption key to produce a fourth encryption key; and
storing the further encrypted program material and control data and the fourth encryption key in the storage device.
5 Assignments
0 Petitions
Accused Products
Abstract
A method and apparatus for storing and retrieving program material for subsequent replay is disclosed. The apparatus comprises a tuner, for receiving a data stream comprising encrypted access control information and the program material encrypted according to a first encryption key, the access control information including the first encryption key; a first encryption module, communicatively coupled to the tuner and communicatively coupleable to a media storage device, for further encrypting the encrypted program material according to a second encryption key and for encrypting the second encryption key according to a third encryption key to produce a fourth encryption key; a first decryption module communicatively coupleable to the media storage device, for decrypting the fourth encryption key retrieved from the media storage device using the third encryption key to produce the second encryption key, and for decrypting the further encrypted program material retrieved from the media program device to produce the encrypted program material; a conditional access module communicatively coupled to the first decryption module, for decrypting the encrypted access control information to produce the first encryption key; and a second decryption module, for decrypting the program material using the first encryption key.
-
Citations
37 Claims
-
1. A method of storing program material for subsequent replay, comprising the steps of:
-
receiving a data stream in a receiver having a storage device, the data stream comprising the program material encrypted according to a first encryption key and control data, the control data comprising the first encryption key and being encrypted; further encrypting the encrypted program material according to a second encryption key; encrypting the second encryption key according to a third encryption key to produce a fourth encryption key; and storing the further encrypted program material and control data and the fourth encryption key in the storage device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 11, 12, 13, 14, 15)
-
-
10. The method of clam 8, wherein the disk drive device is an optical disk drive.
-
16. A receiver for storing program material for subsequent replay, comprising:
-
a tuner, for receiving a data stream comprising encrypted access control information and the program material encrypted according to a first encryption key, the access control information including the first encryption key; a first encryption module, communicatively coupled to the tuner and communicatively coupleable to a media storage device, for further encrypting the encrypted program material according to a second encryption key and for encrypting the second encryption key according to a third encryption key to produce a fourth encryption key; a first decryption module communicatively coupleable to the media storage device, for decrypting the fourth encryption key retrieved from the media storage device using the third encryption key to produce the second encryption key, and for decrypting the further encrypted program material retrieved from the media program device to produce the encrypted program material; a conditional access module communicatively coupled to the first decryption module, for decrypting the encrypted access control information to produce the first encryption key; and a second decryption module, for decrypting the program material using the first encryption key. - View Dependent Claims (17, 18, 19, 20, 21, 22)
-
-
23. A method of storing program material for subsequent replay, comprising the steps of:
-
accepting a received data stream comprising the program material encrypted according to a first encryption key and control data, the control data comprising the first encryption key and being encrypted; further encrypting the encrypted program material according to a second encryption key; encrypting the second encryption key according to a third encryption key to produce a fourth encryption key; and providing the further encrypted program material and control data and the fourth encryption key for storage.
-
-
24. An apparatus for storing program material for subsequent replay, comprising:
-
means for accepting a received data stream comprising the program material encrypted according to a first encryption key and control data, the control data comprising the first encryption key and being encrypted; means for further encrypting the encrypted program material according to a second encryption key; means for encrypting the second encryption key according to a third encryption key to produce a fourth encryption key; and means for providing the further encrypted program material and control data and the fourth encryption key for storage.
-
-
25. An apparatus for storing program material for subsequent replay, comprising:
-
means for receiving a data stream comprising the program material encrypted according to a first encryption key and control data, the control data comprising the first encryption key and being encrypted; means for further encrypting the encrypted program material according to a second encryption key; means for encrypting the second encryption key according to a third encryption key to produce a fourth encryption key; means for storing the farther encrypted program material and control data and the fourth encryption key. - View Dependent Claims (26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37)
-
Specification