Providing content in a communication system
First Claim
1. A method comprising:
- encoding media content to a first part and a second part;
protecting the second part of the encoded media content against unauthorized use using data derived from a secret specific to an identity module, wherein the first part of the encoded media content has not been protected against unauthorized use using data derived from the secret specific to the identity module; and
transmitting, using a network apparatus, the first part and the protected second part of the encoded media content to user equipment associated with the identity module.
1 Assignment
0 Petitions
Accused Products
Abstract
The present invention relates to a method for providing content in a communication system. The method comprises encoding content to a first part and a second part. Furthermore, the method comprises protecting the second part of the content against unauthorised use. Furthermore, the method comprises transmitting the content to user equipment associated with an identity module. The present invention relates also to a method for obtaining content in user equipment in a communication system. The method comprises receiving content encoded to a first layer and a protected second layer. Furthermore, the method comprises requesting for opening the protection of the second layer, receiving opening means and opening the protection of the second layer using the opening means interacting with an identity module associated with the user equipment. Furthermore, a network element and user equipment are configured to execute the method.
50 Citations
44 Claims
-
1. A method comprising:
-
encoding media content to a first part and a second part; protecting the second part of the encoded media content against unauthorized use using data derived from a secret specific to an identity module, wherein the first part of the encoded media content has not been protected against unauthorized use using data derived from the secret specific to the identity module; and transmitting, using a network apparatus, the first part and the protected second part of the encoded media content to user equipment associated with the identity module. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A method comprising:
-
using a transceiver configured to receive media content encoded to a first part and a second part, wherein the second part of the encoded media content is protected against unauthorized use using data derived from a secret specific to an identity module and wherein the first part of the encoded media content has not been protected against unauthorized use using data derived from a secret specific to an identity module; requesting opening of the protection of the second part; receiving enabling data; and opening the protection of the second part using the enabling data and the secret that is specific to and comprised in the identity module associated with a user equipment. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26)
-
-
27. A non-transitory computer-readable medium tangibly embodying a computer program, said computer program configured to control a computer to perform:
-
encoding media content to a first part and a second part; protecting, using second data derived from a secret specific to an identity module, the second part of the encoded media content against unauthorized use, wherein the first part of the encoded media content has not been protected against unauthorized use using data derived from the secret specific to the identity module; and enabling transmission of the first part and the protected second part of the encoded media content to user equipment associated with the identity module.
-
-
28. A non-transitory computer-readable medium tangibly embodying a computer program, said computer program configured to control a computer to perform:
-
receiving media content encoded to a first part and a second part, wherein the second part of the encoded media content is protected against unauthorized use using data derived from a secret specific to an identity module and wherein the first part of the encoded media content has not been protected against unauthorized use using data derived from the secret specific to the identity module; requesting opening of the protection of the second part; receiving enabling data; and opening the protection of the second part using data produced by an identity module associated with the user equipment and based upon the enabling data and the secret that is specific to and comprised in the identity module.
-
-
29. A network apparatus comprising:
-
a processor; and a memory including computer program code, wherein the memory and computer program code are configured, with the processor, to cause the network apparatus to at least perform; encoding media content to a first part and second part; protecting the second part of the encoded media content against unauthorized use using data derived from a secret specific to an identity module, wherein the first part of the encoded media content has not been protected against unauthorized use using data derived from the secret specific to the identity module; and determining that the first part and the protected second part of the encoded media content is to be transmitted to a user equipment associated with the identity module. - View Dependent Claims (30, 31, 32, 33)
-
-
34. User equipment comprising:
-
a processor; a memory including computer program code; and a transceiver, wherein the transceiver is configured to; receive media content encoded to a first part and a second part, wherein the second part of the encoded media content is protected against unauthorized use using data derived from a secret specific to an identity module and wherein the first part of the encoded media content has not been protected against unauthorized use using data derived from the secret specific to the identity module; request opening the second part; and receive enabling data; and wherein the memory and the computer program code are configured, with the processor, to cause the user equipment to at least perform; controlling the opening of the protection of the second part using the enabling data and a secret that is specific to and comprised in the identity module of the user equipment. - View Dependent Claims (35, 36, 37, 38, 39, 40, 41, 42)
-
-
43. User equipment comprising:
-
an identity module comprising a secret that is specific to the identity module and an algorithm; a radio transceiver configured to receive media content encoded to a first part and a second part, configured to request opening of the protection of the second part and configured to receive enabling data, wherein the second part of the encoded media content is protected against unauthorized use using data derived from a secret specific to an identity module and wherein the first part of the encoded media content has not been protected against unauthorized use using data derived from the secret specific to the identity module; and a processor configured to provide the enabling data to the identity module for opening the protection of the second part. - View Dependent Claims (44)
-
Specification