Networked multimedia overlay system
First Claim
1. A method for providing a networked overlay system, the method comprising the steps of:
- receiving downstream signals encrypted according to a first encryption scheme at a primary device and a plurality of remote devices, the downstream signals including a plurality of programs;
in the primary device, decrypting at least one of the plurality of programs to provide a clear program;
encrypting the clear program according to a second encryption scheme to provide a second encrypted program;
storing the second encrypted program;
concurrently storing a portion of the at least one program encrypted according to the first encryption scheme by;
buffering the clear program, the clear program having packets;
buffering the at least one program encrypted according to the first encryption scheme, the at least one program having packets;
detecting at least one predetermined critical packet in the clear program;
wherein packets of the clear program are dropped until such time as the at least one predetermined critical packet is identified, wherein a corresponding critical packet in the at least one program encrypted according to the first encryption scheme that is in accordance with the predetermined critical packet is stored;
in response to a requesting remote device for a stored program,determining the decryption device of the requesting remote device;
dependent upon the decryption device, accessing the stored program,wherein if the decryption device is capable of decrypting programs encrypted according to the second encryption scheme, providing the stored second encrypted program to the requesting remote device;
wherein if the decryption device is capable of decrypting programs encrypted according to the first encryption scheme but not the second encryption scheme, providing the stored second encrypted program to a second decryptor device;
decrypting the stored second encrypted program to provide a clear program;
buffering the clear program;
concurrently buffering the at least one corresponding critical packet in the at least one program encrypted according to the first encryption scheme;
detecting the at least one predetermined critical packet in the clear program;
wherein packets of the clear program are passed through until such time as the at least one predetermined critical packet is detected and the at least one predetermined critical packet is dropped from the program;
combining the passed clear program packets with the buffered at least one corresponding critical packet encrypted according to the first encryption scheme to provide a partially encrypted program; and
providing the partially encrypted program to the requesting remote device.
5 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods are disclosed for providing encrypted downstream signals to a plurality of receiver devices 130, 135, 140, where the devices 130, 135, 140 may have different decryption devices. A receiver network (i.e., a networked multimedia system) includes a splitter/isolation module (SIM) 125, a primary set-top terminal (STT) 130, and at least one remote device 135, 140. The remote devices 135, 140 communicate with the primary STT 130 via the SIM 125 over coaxial cable. Accordingly, the remote devices 135, 140 are capable of requesting and receiving stored programs via the networked multimedia overlay system. Depending upon the decryption device included in the requesting remote STT 135, 140, the primary STT 130 sends a stored program encrypted according to that decryption device.
297 Citations
3 Claims
-
1. A method for providing a networked overlay system, the method comprising the steps of:
-
receiving downstream signals encrypted according to a first encryption scheme at a primary device and a plurality of remote devices, the downstream signals including a plurality of programs; in the primary device, decrypting at least one of the plurality of programs to provide a clear program; encrypting the clear program according to a second encryption scheme to provide a second encrypted program; storing the second encrypted program; concurrently storing a portion of the at least one program encrypted according to the first encryption scheme by; buffering the clear program, the clear program having packets; buffering the at least one program encrypted according to the first encryption scheme, the at least one program having packets; detecting at least one predetermined critical packet in the clear program; wherein packets of the clear program are dropped until such time as the at least one predetermined critical packet is identified, wherein a corresponding critical packet in the at least one program encrypted according to the first encryption scheme that is in accordance with the predetermined critical packet is stored; in response to a requesting remote device for a stored program, determining the decryption device of the requesting remote device; dependent upon the decryption device, accessing the stored program, wherein if the decryption device is capable of decrypting programs encrypted according to the second encryption scheme, providing the stored second encrypted program to the requesting remote device; wherein if the decryption device is capable of decrypting programs encrypted according to the first encryption scheme but not the second encryption scheme, providing the stored second encrypted program to a second decryptor device; decrypting the stored second encrypted program to provide a clear program; buffering the clear program; concurrently buffering the at least one corresponding critical packet in the at least one program encrypted according to the first encryption scheme; detecting the at least one predetermined critical packet in the clear program; wherein packets of the clear program are passed through until such time as the at least one predetermined critical packet is detected and the at least one predetermined critical packet is dropped from the program; combining the passed clear program packets with the buffered at least one corresponding critical packet encrypted according to the first encryption scheme to provide a partially encrypted program; and providing the partially encrypted program to the requesting remote device. - View Dependent Claims (2, 3)
-
Specification