Method and apparatus for implementing revocation in broadcast networks
First Claim
Patent Images
1. A method comprising:
- receiving copy controlled content;
receiving a plurality of revocation lists each corresponding to a given range of host identifiers, wherein the revocation list is received in band;
verifying by a computer that an identifier of a digital device is within the range of host identifiers by determining which revocation list of the plurality of revocation lists comprises a range of host identifiers within which the identifier of the host device is bound the computer being a digital device;
determining whether the digital device is on any of the revocation lists; and
if the digital device is determined to be on any of the revocation lists, denying the copy controlled content to the digital device.
0 Assignments
0 Petitions
Accused Products
Abstract
A method of revoking a descrambling privilege for copy controlled content to a host device is provided. The method includes receiving copy controlled content at a conditional access module. A revocation list is also received at the module. The method includes determining whether the host device associated with the module is on the list. If so, the conditional access module will not descramble the content.
384 Citations
29 Claims
-
1. A method comprising:
-
receiving copy controlled content; receiving a plurality of revocation lists each corresponding to a given range of host identifiers, wherein the revocation list is received in band; verifying by a computer that an identifier of a digital device is within the range of host identifiers by determining which revocation list of the plurality of revocation lists comprises a range of host identifiers within which the identifier of the host device is bound the computer being a digital device; determining whether the digital device is on any of the revocation lists; and if the digital device is determined to be on any of the revocation lists, denying the copy controlled content to the digital device. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method comprising:
-
receiving copy controlled content; receiving a plurality of revocation lists corresponding to a given range of host identifiers, wherein the plurality of revocation lists are received in band; authenticating by a computer one of the plurality of revocation lists as having a larger revocation list version number than a stored version number of a prior revocation list the computer being a digital device; verifying that an identifier of a digital device is within the range of host identifiers; determining whether the digital device is on any of the revocation lists; and if the digital device is determined to be on any of the revocation lists denying the copy controlled content to the digital device. - View Dependent Claims (9, 10)
-
-
11. A device for controlling access to copy controlled content, comprising:
-
a tuner to tune to a selected frequency for receipt of the copy controlled content; a demodulator unit coupled to the tuner, the demodulator unit to demodulate the copy controlled content; and means for receiving a plurality of revocation lists each corresponding to a different range of host identifiers and device characteristics, the unit to determine whether an identifier of the device is within a range of any of the plurality of revocation lists, each list based on a selected device characteristic, and if so, to (i) determine whether the identifier of the device on one of the plurality of revocation lists by determining which revocation list of the plurality of revocation lists comprises a range of identifiers within which the identifier of the device is bound and (ii) deny the copy controlled content to the device if the identifier is listed on one of the plurality of revocations lists. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23)
-
-
24. A method comprising:
-
verifying by a computer that an identifier of the computer is within a range of identifiers associated with a revocation list, the computer being a digital device; performing an initial analysis by determining whether the computer can be on the revocation list upon verification that the identifier of the computer is within the range of the identifiers covered by the revocation list; performing a secondary analysis and refraining from decoding encoded content received by the computer if the identifier of the computer is within the range of the identifiers and the computer is determined to be on the revocation list; and allowing decoding of the encoded content if the identifier of the computer is within the range of the identifiers and the computer is not determined to be on the revocation list. - View Dependent Claims (25, 26, 27, 28, 29)
-
Specification