Reconfigurable access network encryption architecture
First Claim
1. A method comprising:
- receiving, at a computing device via an encryption management data interface, a first set of encryption management data corresponding to a first conditional access device and a second set of encryption management data corresponding to a second conditional access device;
configuring, by the computing device, a first encryption module and a second encryption module respectively based on the first set of encryption management data and the second set of encryption management data;
receiving, at the computing device via one or more interfaces different from the encryption management data interface, a first set of encryption control data and a second set of encryption control data; and
encrypting, by the configured first encryption module and the configured second encryption module, a first set of content data based on the first set of encryption control data to produce an encrypted first set of content data and a second set of content data based on the second set of encryption control data to produce an encrypted second set of content data, respectively.
2 Assignments
0 Petitions
Accused Products
Abstract
An access platform or other network elements can include multiple line cards configured to encrypt data. The platform and/or each of the line cards may receive encryption management data that conforms to a predefined encryption management data interface. The encryption management data received by a particular line card may be generated by a conditional access system device and converted to conform to the encryption management data interface by an encryption manager. Line cards may alternatively be configured for connection to separate encryption hardware components. Line cards may include a block of field programmable gate arrays or other type of programmable hardware that can be configured to execute an encryption module.
14 Citations
19 Claims
-
1. A method comprising:
-
receiving, at a computing device via an encryption management data interface, a first set of encryption management data corresponding to a first conditional access device and a second set of encryption management data corresponding to a second conditional access device; configuring, by the computing device, a first encryption module and a second encryption module respectively based on the first set of encryption management data and the second set of encryption management data; receiving, at the computing device via one or more interfaces different from the encryption management data interface, a first set of encryption control data and a second set of encryption control data; and encrypting, by the configured first encryption module and the configured second encryption module, a first set of content data based on the first set of encryption control data to produce an encrypted first set of content data and a second set of content data based on the second set of encryption control data to produce an encrypted second set of content data, respectively. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method comprising:
-
receiving, at a computing device via an encryption management data interface, a first set of encryption management data associated with a first conditional access device and a second set of encryption management data associated with a second conditional access device; converting the first set of encryption management data from a format associated with the encryption management data interface to a first format and the second set of encryption management data from the format associated with the encryption management data interface to a second format different from the first format; configuring a first encryption module of the computing device based on the first set of encryption management data in the first format and a second encryption module of the computing device based on the second set of encryption management data in the second format; and encrypting, by the configured first encryption module and the configured second encryption module, a first set of content data based on a first set of encryption control data to produce an encrypted first set of content data and a second set of content data based on a second set of encryption control data to produce an encrypted second set of content data, respectively. - View Dependent Claims (10, 11, 12, 13, 14)
-
-
15. A method comprising:
-
receiving, at a computing device, a plurality of sets of encryption settings corresponding to a plurality of conditional access devices; configuring, by the computing device, a plurality of encryption modules respectively based on the plurality of sets of encryption settings; receiving, at the computing device, a plurality of sets of control words or entitlement control messages (ECMs); and encrypting, by the configured plurality of encryption modules, a plurality of sets of content data respectively based on the plurality of sets of control words or ECMs to produce an encrypted plurality of sets of content data. - View Dependent Claims (16, 17, 18, 19)
-
Specification