Reconfigurable access network encryption architecture
First Claim
1. A method comprising:
- receiving, by a system and from a first encryption manager separate from the system, a first set of encryption management data converted from a proprietary format of a first conditional access system to a standard format different from the proprietary format of the first conditional access system, wherein the first set of encryption management data comprises an encryption algorithm;
converting the first set of encryption management data from the standard format to a format useable by a first encryption module of the system, wherein the format useable by the first encryption module is different from the standard format;
in response to the receiving and subsequent to the converting, configuring the first encryption module of the system using the first set of encryption management data resulting in a configured first encryption module;
in response to configuring the first encryption module, receiving a first set of encryption control data comprising one or more control words;
in response to receiving the first set of encryption control data, encrypting, by the configured first encryption module, a content item using the one or more control words and in accordance with the first set of encryption management data; and
transmitting, by the system and to a device, the encrypted content item.
2 Assignments
0 Petitions
Accused Products
Abstract
An access platform or other network elements can include multiple line cards configured to encrypt data. The platform and/or each of the line cards may receive encryption management data that conforms to a predefined encryption management data interface. The encryption management data received by a particular line card may be generated by a conditional access system device and converted to conform to the encryption management data interface by an encryption manager. Line cards may alternatively be configured for connection to separate encryption hardware components. Line cards may include a block of field programmable gate arrays or other type of programmable hardware that can be configured to execute an encryption module.
-
Citations
20 Claims
-
1. A method comprising:
-
receiving, by a system and from a first encryption manager separate from the system, a first set of encryption management data converted from a proprietary format of a first conditional access system to a standard format different from the proprietary format of the first conditional access system, wherein the first set of encryption management data comprises an encryption algorithm; converting the first set of encryption management data from the standard format to a format useable by a first encryption module of the system, wherein the format useable by the first encryption module is different from the standard format; in response to the receiving and subsequent to the converting, configuring the first encryption module of the system using the first set of encryption management data resulting in a configured first encryption module; in response to configuring the first encryption module, receiving a first set of encryption control data comprising one or more control words; in response to receiving the first set of encryption control data, encrypting, by the configured first encryption module, a content item using the one or more control words and in accordance with the first set of encryption management data; and transmitting, by the system and to a device, the encrypted content item. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method comprising:
-
receiving, by a system and from a first encryption manager separate from the system, a first set of encryption management data converted from a proprietary format of a first conditional access system to a standard format different from the proprietary format of the first conditional access system, wherein the first set of encryption management data comprises an encryption algorithm; in response to the receiving, converting the first set of encryption management data from the standard format to a format useable by a first encryption module of the system, wherein the format useable by the first encryption module is different from the standard format; in response to the converting, configuring the first encryption module of the system using the first set of encryption management data resulting in a configured first encryption module; and in response to the configuring, encrypting, by the configured first encryption module, a content item using a first set of encryption control data and in accordance with the first set of encryption management data. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
-
16. A method comprising:
-
receiving, by a system and from a first encryption manager separate from the system, a first set of encryption management data converted from a proprietary format of a first conditional access system to a standard format different from the proprietary format of the first conditional access system, wherein the first set of encryption management data comprises an encryption algorithm; in response to the receiving, forwarding the first set of encryption management data to a line card of a plurality of line cards of the system; in response to the forwarding, converting the first set of encryption management data from the standard format to a format useable by a first encryption module of the line card, wherein the format useable by the first encryption module is different from the standard format; and in response to the converting, encrypting, by the first encryption module, a content item using a first set of encryption control data and in accordance with the first set of encryption management data. - View Dependent Claims (17, 18, 19, 20)
-
Specification