Configurable encryption/decryption for multiple services support
First Claim
1. A method of providing data, the method comprising:
- storing a first set of encryption data associated with a first data stream wherein the first data stream includes a first number of services;
encrypting the first data stream having a first-level-of-encryption;
sending the first data stream to a destination device for decryption;
storing a second set of encryption data associated with a second data stream wherein the second data stream includes a second number of services that is different from the first number of services and is greater than one, wherein the second number of services are each available for being played at a same time by a destination device, storing the second set of encryption data includes selecting the second number of services from a total number of services desired by an end user to be made available for being played at the destination device at the same time, and the selection is made based on a priority established by the end user among the total number of services in response to a determination that the total number of services exceeds the second number of services;
encrypting the second data stream having a second-level-of-encryption, the first-level-of-encryption being different from the second-level-of-encryption;
utilizing a common memory to encrypt the first data stream at said first-level-of-encryption and to encrypt the second data stream at the second-level-of-encryption; and
sending the second data stream to the destination device for decryption.
4 Assignments
0 Petitions
Accused Products
Abstract
A system to transmit a set of programs from a transmitter to a receiver is used to accommodate different levels of security used for each program. When a high level of security is necessary for transmitting or receiving a program the transmitter and/or receiver is operable to accommodate that level of security. Thus, both transmitters and receivers are operable to be reconfigured to encrypt or decrypt, respectively, at different levels. Accordingly, differing amounts of programs can be transmitted or received based on the resource requirements needed at any level of security. Consequently, a high level of encryption/decryption requires more resources and allows the processing of fewer services, while a lower level of encryption/decryption allows more services to be transmitted/received.
42 Citations
9 Claims
-
1. A method of providing data, the method comprising:
-
storing a first set of encryption data associated with a first data stream wherein the first data stream includes a first number of services; encrypting the first data stream having a first-level-of-encryption; sending the first data stream to a destination device for decryption; storing a second set of encryption data associated with a second data stream wherein the second data stream includes a second number of services that is different from the first number of services and is greater than one, wherein the second number of services are each available for being played at a same time by a destination device, storing the second set of encryption data includes selecting the second number of services from a total number of services desired by an end user to be made available for being played at the destination device at the same time, and the selection is made based on a priority established by the end user among the total number of services in response to a determination that the total number of services exceeds the second number of services; encrypting the second data stream having a second-level-of-encryption, the first-level-of-encryption being different from the second-level-of-encryption; utilizing a common memory to encrypt the first data stream at said first-level-of-encryption and to encrypt the second data stream at the second-level-of-encryption; and sending the second data stream to the destination device for decryption. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
Specification