Method for recording an elapsed time period in a security module
A security module and time technology, applied in data recording, recording signal processing, recording information storage, etc., can solve the problems that the date and time cannot be provided regularly, the actual duration of 24 hours cannot be determined, and the time clock is not configured.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0046] The detachable security module SM issues the necessary authority to decrypt the audio-visual data stream from the management center CG, and to decrypt the content recorded on the hard disk DD. In addition to the rights validity duration, the security module SM also contains the validity start date / time provided by the clock RTC.
[0047] The PVR acts on the one hand as an online decoder of the transmitted audiovisual data streams and, on the other hand, as a data recorder for their subsequent viewing.
[0048] In a first mode of use, said online decoder, the ECM containing access conditions and time information is sufficient to manage rights based on a duration, since the control messages ECM already contain time data allowing to determine the duration of rights.
[0049] In the second mode, where the content is recorded and viewed later, the time information of the control messages ECM is ignored, in which case the time data from the decoder PVR is used to calculate th...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 