Method and device for authorising access to data
A technology for authorized access and equipment, applied in the field of conditional access systems and digital rights management solutions, which can solve problems such as complex business models and lack of local judgment capabilities
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0018] The present invention proposes to implement a security client with complex functionality on the device in the access network, which cannot be physically reached by the terminal user, but is close enough to the terminal to realize fast and secure data exchange with the terminal, thereby realizing The type of local decision provided by the smart card or equivalent solution. These local decisions enable business models that would otherwise be impossible, such as pulse-based pay-per-view (purchasing content locally without real-time communication with a call center or central computer), pay-per-view (consumed minutes of content), etc.
[0019] According to one embodiment of the invention, the terminal handling of the conditional access system (CAS) and DRM is moved into the access node. This will not affect the CAS system, such as figure 2 shown. Usually, the video head-end uses randomly generated Control Words (CW) to scramble the AV stream. The scrambled AV stream is...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 