Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
METHOD AND APPARATUS FOR CONTENT PROTECTION IN WIRELESS COMMUNICATIONS
Document Type and Number:
WIPO Patent Application WO/2007/092793
Kind Code:
A3
Abstract:
Disclosed is a method for securely presenting content in a mobile station. The mobile station may have a smart module, a security agent, and an air interface for communicating with a content provider and with a remote content rights manager. The smart module stores content presentation units and has a proxy content rights manager for when the mobile station is unable to receive secure content keys from the remote content rights manager using the air interface. In the method, content presentation units are transferred from the remote rights manager to the smart module for storage. Secure content keys are requested from the smart module for allowing presentation of content requested while the mobile station is unable to communicate with the remote rights manager. The secure content keys are transferred, based on a stored content presentation unit, from the proxy content rights manager to the security agent for allowing content presentation.

Inventors:
LO CHARLES N (US)
WANG JUN (US)
DONDETI LAKSHMINATH REDDY (US)
HAWKES PHILIP MICHAEL (AU)
Application Number:
PCT/US2007/061577
Publication Date:
September 20, 2007
Filing Date:
February 02, 2007
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
QUALCOMM INC (US)
LO CHARLES N (US)
WANG JUN (US)
DONDETI LAKSHMINATH REDDY (US)
HAWKES PHILIP MICHAEL (AU)
International Classes:
H04L29/06; G06F21/00; G06F21/10
Domestic Patent References:
WO2005036854A12005-04-21
Foreign References:
EP1513040A12005-03-09
Attorney, Agent or Firm:
OGROD, Gregory D. (5775 Morehouse Drive San Diego, California, US)
Download PDF:
Claims:

CLAIMS

L A. method for securely presenting content in a mobile station having an air interface for communicating with a content, provider and with a. remote content lights manager, a user interface for receiving content requests and presenting content, a smart module for storing content presentation units and having a proxy content rights manager for issuing secure content keys when the mobile station is unable to receive secure content, keys from the remote content rights manager using the air interface, a security agent for securely receiving secure content keys from the remote content rights manager and for securely transferring secure content keys between the remote content rights manager and the smart module, the method comprising: transferring, using the air interface and me security agent, content presentation units from the remote content rights manager to the smart module for storage; receiving a content presentation, request while the mobile station is unable to communicate with the remote content manager using the air interlace; requesting secure content keys from the smart module for allowing presentation of the requested content; and transferring secure content keys, based on one or more of the stored content presentation units, from the proxy content rights manager to the security agent for allowing presentation of the requested content.

2. A method for securely presenting content in a mobile station as defined in claim 1, wherein the smart module is a removable smsrteard.

3. A method for securely presenting content in a mobile station as defined in claim 1 , wherein the smart module is a universal subscriber identity module fϋSϊM).

4. A. method for securely presenting content in a mobile station as defined in claim 1, -wherein, the smart module is a removable user identity module R-UlM.

5. A method for securely presenting content in a mobile station as defined in claim I 5 wherein the smart module is a cdma2000 stibscήber identity module (CSIM).

6. A xnethod for securely presenting content in a. mobile station aa defined In claim 1, wherein at least one content presentation unit defines an allowed proxy capability of the proxy content rights manager.

7. A method for securely presenting content in a .mobile station as defined in claim 1, wherein at least one content presentation unit is a token indicating a right for presenting secure content,

8. A method for securely presenting content in a mobile station as defined in claim 1, wherein at least one content presentation unit is a. credit, granting a right for presenting secure content.

9. A method for securely presenting content in a mobile station as defined in claim L further comprising transferring, using the air interface, secure content, usage information from the proxy content rights manager to the remote content rights manager when the mobile station is able to communicate with the remote content manager using the air interface.

10. A method tor securely presenting content iti a mobile station as defined in claim 1, further comprising transferring, using the air interface, secure content usage information from the proxy content rights manager to the content provider when the mobile station is able to communicate with the remote content manager using the air interface.

I L A. method for securely presenting content in a mobile station as defined in claim 1, further comprising: maintaining content segment usage statistics covering each presentation of a content segment; and reporting the content segment usage statistics.

12, A method for securely presenting content in a mobile station as defined in claim L further comprising: maintaining program usage statistics covering each presentation, of a program; and reporting the program usage statistics.

13. A method for securely presenting content in a mobile station as defined in claim 1 , wherein the content provider is a broadcast content provider.

1.4, A method for securely presenting content in a mobile station as defined in claim 1, wherein the content, provider is a multicast content provider.

15. A method for securely presenting content in a mobile station as defined in claim I- wherein the secure content keys are encrypted by the remote content rights .manager, and the smart module decrypts the encrypted secure content keys and provides the decrypted secure content keys to the mobile station based on one or more available content presentation units.

16. A mobile station, comprising: an air interface for communicating with a content provider and with a remote content rights manager; a user interface for receiving content requests and presenting content; a smart module for storing content presentation units, the smart module having a proxy content rights manager for issuing secure content keys when the mobile terminal, is unable to receive secure content keys from the remote content rights manager using the air interface; a security agent for securely receiving secure content keys from the remote content rights manager and for securely transferring secure content keys between the remote content rights manager and the smart module;

.means for transferring using the air interface and the security agent, content presentation units from the remote content rights manager to the smart module for storage;

means for requesting secure content, keys from the smart module for allowing presentation, of the requested content while the mobile station is unable to communicate with the remote content .manager using the air interface; and means for transferring secure content keys, based on. one or more of the stored content presentation units . , from tine proxy content lights manager to die security agent for allowing presentation of the requested content,

17. A mobile station as defined in claim 16, wherein the smart module is a removable smartcard.

IS, A mobile station, as defined in ci&im 1.6, wherein the smart module is a universal subscriber identity module (USIM).

19. A mobile station as defined in claim 36, wherein the smart module is a removable user identity module R-UJM.

20. A mobile station as defined in claim I6 > wherein the smart module is a cdma2000 subscriber identity module (CSlM).

21. A. mobile station as defined in claim .16, wherein at least one content presentation unit defines an allowed proxy capability of the proxy content rights manager.

22. A mobile station as defined in claim 16, wherein at least one content presentation unit is a token indicating a right for presenting secure content,

23. A mobile station as defined in claim 16, wherein at least one content presentation unit is a credit granting a right for presenting secure content.

24. A mobile station as defined in claim 16, further comprising means for transferring secure content usage .information from the proxy content rights manager to the remote content rights manager, using the air interface, when the mobile station is able to communicate witli the remote content manager using the air interface.

25. A mobile station as defined in. claim \6 y .further comprising mans for transferring secure content usage information from the proxy content rights manager to the content provider, using the air interface, when the mobile station is able to communicate with the remote content manager using the air interface.

26. A mobile station as defined in claim 16, further comprising: means for maintaining content segment usage statistics covering each presentation of a content segment; and means for reporting the content segment usage statistics.

27. A mobile station as defined in claim 16, further comprising; means for maintaining program usage statistics covering each presentation of a program; and means for reporting the program usage statistics,

28. A mobile station as defined in claim 16, wherein the content provider is a broadcast content provider.

29. A mobile station as defined in claim 16, wherein the content provider is a multicast content provider.

30. A mobile station as defined in claim 16, wherein; the secure content keys are encrypted by the remote content rights manager; and the smart module includes means for decrypting the encrypted secure content keys and providing the decrypted secure content, keys to the mobile station based on one or more available content presentation xmits.

3 1.. A computer program product, comprising: computer readable medium comprising: code for causing a computer to transfer, using a air interface and a security agent of a mobile station, content presentation units from a remote content rights manager to a smart, module of the mobile station for storage; code for causing a computer to request secure content keys from the smart module for allowing presentation of requested content while the mobile station is unable to communicate with tlie remote content manager using the air interface; and code for causing a computer to securely transfer secure content keys, based on one or more of the stored content presentation units, from the proxy content rights manager to the security agent for allowing presentation of the requested content.

Description:

METHOD AND APPARATUS FOR CONTENT

PROTECTION IN WIRELESS COMMUNICATIONS

Clft.ni of Priority imifer 35 TJ.S.C §119

1 . 0001} The present Application for Patent claims priority to; Provisional Application

No. 60/764,879 entitled "METHOD AND APPARATUS FOR CONTENT PROTECTION BNi WIRELESS COMMϋMCATIONS" filed February 3, 2006; Provisional Application No. 60/778,742 entitled "METHOD AND APPARATUS FOR CONTENT PROTECTION IN WIRELESS COMMUNICATIONS" filed March 3, 2006; and Provisional. Application No, 60/802,556 entitled ".METHOD AND APPARATUS FOR CONTENT PROTECTION IN WIRELESS COMMUNICATIONS" filed May 19, 2006. These Provisional Applications are assigned to the assignee hereof and are hereby expressly incorporated by reference herein.

BACKGROUND Field

\W02] The present invention relates generally to wireless communications, and more specifically to content protection.

Background

10003) Tiie field of communications lias many applications including, e.g., paging, wireless local loops,. Internet telephony, and satellite communication systems. AJI exemplary application is a cellular telephone system for mobile subscribers. (As used herein, the term "cellular' system encompasses both cellular and personal communications services (PCS) system frequencies.) Modem comrmmi cation systems, such as a wireless communication system, designed to allow multiple users to access a. common communications medium have been developed, for such cellular systems. These modem communication systems may be based on multiple access techniques such as code division multiple access (CDMA), time division multiple access (TDMA), frequency division multiple access (FDlVIA) 5 space division multiple access (SDMA), polarization division multiple access (PDMA)., or other modulation techniques known in

the art. These modulation techniques demodulate signals received from multiple users of a communication system, thereby enabling an increase in the capacity of the communication system, ϊn connection therewith, various wireless communication systems have been established including, e.g., Advanced Mobile Phone Service (AMPS), Giobal System for Mobile communication (GSVJ). and other wireless systems.

}0004| In FDMA. systems, the total frequency spectrum k divided into a number of smaller sub-bands and each user is given its own. sub-band to access the communication medium. Alternatively, in TDMA systems, the total frequency spectrum is divided into a number of smaller sub-bands, each sub-band is shared among a number of users, and each user is allowed to transmit in predetermined time slots using that sub-band. A CDMA system provides potential advantages over other types of systems, including increased system capacity, In CDMA systems, each user is given the entire frequency spectrum for all of the time, but distinguishes its transmission through the use of a unique, code.

(0005J A CDMA system may be designed to support one or more CDMA standards such as (1) the "TϊA/EIA.-95-B Mobile Station-Base Station Compatibility Standard for Dual-Mode Wideband Spread Spectrum Cellular System" (the IS-95 standard), (2) the standard offered by a consortium named "3rd Generation Partnership Project" (3GPP ) and embodied in a set of documents including Document Nos. 3G TS 25.21 1, 3G TS 25.212, 3G TS 25.213, and 3G TS 25.214 (the W-CDMA standard), and (3) the standard offered by a consortium named "3rd Generation Partnership Project 2" (3GPP2) and embodied in "TR-45.5 Physical Layer Standard for cdma2000 Spread Spectrum Systems" (the IS-2000 standard).

}θ006| In the above named CDMA coimmuii cation systems and standards, the available spectrum is shared simultaneously among a number of users, and suitable techniques are available to provide services, such as voice and data services.

{0007] Typical mobile subscribers use a mobile station or terminal such as a mobile phone or a laptop to access the wireless communication system. A mobile station may receive and play or store broadcast or multicast, content protected under a digital rights management scheme requiring communication with a tights issuer. However, the mobile station may be outside of the coverage area of the cellular telephone system, preventing play of stored content. There is therefore a need in the art for a mobile

station configured to permit play of pxOtected stored content, even -when outside of a coverage area.

SUMMARY jOOOSJ An aspect of the present invention may reside in a method for securely presenting content in a mobile station. The mobile station may have an air interface for communicating with a content provider and with a remote content rights manager, a user interface for receiving content requests and presenting content, a smart module, and a security agent. The smart module stores content presentation units and has a proxy content rights manager for issuing secure content keys when ihs mobile station, is unable to receive secure content keys from the remote content rights manager using the air interface. The security agent securely receives secure content keys from the remote content rights manager and securely transfers secure content, keys between the remote content rights manager and the smart, module. In the method, content presentation units are transferred from the remote content rights manager to the smart module, for storage, using the air interface and the security agent. A content presentation request is received while the mobile station is unable to communicate with the remote content manager using the air interface. Secure content, keys are requested from the smart module for allowing presentation of the requested content. The secure content keys are transferred, based on one or more of the stored content presentation units, from the proxy content rights manager to the security agent for allowing presentation of the requested content.

[0009] In more detailed aspects of the invention, the smart module may be a removable smartcard. The smart module may be a universal subscriber identity module (US IM), a removable user identity module R-ULM, or a cdma2000 subscriber identity module (CSJM). At least one content presentation unit may define an allowed proxy capability of the proxy content rights manager, may be a token indicating a right for presenting secure content; or may be a credit granting & right for presenting secure content.

JOOlOj Additionally, the content provider may be a broadcast content provider and/or a ttiuUicasr content provider. The method may further include transferring secure content usage information from the prosy content rights manager to the remote content rights manager, and/or to the content provider, when the mobile station is able to communicate with the remote content manager using the air .interface. Usage statistics covering each.

presentation of a content segment and/or program may be maintained. The content segment or program usage statistic may be reported. jϋϋU.) In another more detailed aspect of the invention, the secure content keys may be encrypted by the remote content rights manager. The smart module may decrypt, the encrypted secure content, keys and provide the decrypted secure content keys to the mobile station based on one or more available content presentation units.

1.0012) Another aspect of the invention may reside in a mobile station including a.π air interface for communicating with a content provider and with a remote content rights manager, a user interface for receiving content requests and presenting content a. smart module, and a security agent. The smart module stores content presentation units and has a prosy content rights manager for issuing secure content keys when the mobile terminal is unable to receive secure content keys from the remote content rights manager using the air interface. The security agent securely receives secure content keys from the remote content rights manager and securely transfers secure content keys between the remote content rights manager and the smart module. The mobile station further includes means for transferring, using the air Interface and the security agent, content, presentation units from the remote content rights manager to the smart module for storage, means For requesting secure content, keys from the smart module for allowing presentation of the requested content while the mobile station is unable to communicate with the remote content manager using the air interface, and means for transferring secure content keys, based on one or more of the stored content presentation units, from the proxy content rights manager to the security agent for allowing presentation of the requested content.

J00I3J Yet another aspect of the invention may reside is computer program product comprising computer readable medium comprising code for causing a computer to transfer, using a air interface and a security agent of a mobile station, content presentation units from a remote content rights manager to a smart module of the mobile station for storage;, code for causing a computer to request secure content keys from the smart module for allowing presentation of requested content while the mobile station is unable to communicate with the remote content manager using the air interface, and code for causing a computer to securely transfer secure content: keys, based on one or more of the stored content presentation units, from the prosy content rights manager to the security agent, for allowing presentation of the requested content-

BRIEF DESCRIPTION OF THE DRAWINGS J 00l4{ FIG. I is an. example of a wireless communication system;

[Oi)IS] FlG, 2 is a block diagram of a mobile station having a proxy content rights manager, in accordance with an aspect, of the invention; }0O26j FIG. 3 is a flow diagram of a method for securely presenting content in a mobile station; and 1.0017} FIG. 4 is a block diagram of a system of BCMCS-based content protection for playing previously streamed content.

DETAILED DESCRIPTION

}(M3ϊ.β| The word "exemplary" is used herein to mean "serving as an example, instance, or illustration," Any embodiment described herein as "exemplary" is not necessarily to be construed as preferred or advantageous over other embodiments.

|0O1.9| A remote station, also known as a mobile station (MS), an access terminal (AT). user equipment or subscriber unit, may be mobile or stationary; and may communicate with one or more base stations, also known as base transceiver stations (BTSs) or node Bs. A remote station txa.nsm.its and receives data packets through one or more base stations to a base station controller, also known as radio network controllers (RNCs). Base stations and base station controllers are parts of a network called an access network. An access network transports data packets between multiple remote stations. The access network may be further connected to additional networks outside the access network, such as a corporate intranet or the Internet, and may transport data packets between each remote station and such outside networks. A remote station that has established an active traffic channel connection with one or more base stations is called an active remote station, and is said to be in a traffic state. A remote station that is in the process of establishing an active traffic channel connection with one or more base stations is said to be in a connection setup state. A remote station may be any data device that communicates through a wireless channel. A remote station may further be any of a number of types of devices including but not. limited to .PC card, compact flash, external or internal modem, or wireless phone. The communication link through which the remote station sends signals to the base station is called an uplink, also known as a

reverse link. The communication link through which a base station sends signals fo a .remote station is called a downlink, also known as a forward link.

J0020J With, reference to Figure 1, a wireless commuxii cation system .100 includes one or more wireless mobile stations (MS) 102, one or more base stations (BS) .104, one or more base station controllers (BSC) 106, and a core network 10S. Core network .may be connected to an Internet 110 and a Public Switched Telephone. Network (PSTN) i 12 via suitable bacfchauls. A typical wireless mobile station .may include a handheld phone, or a laptop computer. Wireless communication system 100 may employ any one of a number of multiple access techniques such as code division multiple access (CDMA), time division .multiple access (TDMA)., frequency division multiple access (FDMA) 5 space division multiple access (SDMA) 5 polarization division multiple access (PDMA), or other modulation techniques known in the art.

|0021] With reference to FIGS, 2 and 3, one aspect of the present invention may reside in a method 300 (FIG. 3) for securely presenting content, in a mobile station 102 (FJG. 2). The mobile station may have an air interface 202 for communi eating with a. content provider 204 arid with a remote content rights manager 206, a user interface 20S for receiving content requests and presenting content 210,, a smart module 212, and a security agent 214. Tlie smart, module stores content, presentation units 216 and has a proxy content rights manager 208 for issuing secure coHtent keys 220 when the mobile station is unable to receive secure content keys from the remote content .lights manager using the air interface. The security agent, securely receives secure content keys from the remote content rights manager and securely transfers secure content keys between the remote content rights manager and the smart module. In tlie method 300, content presentation units are transferred from the remote content rights manager to the smart module, for storage, using the ear interface mά tlie security agent (step 302). A content presentation recμiest is received while the mobile station is unab?e to communicate with the remote content manager using the air interface (step 304). Secure content keys are requested from the smart module for allowing presentation of the requested content (step 306). The secure content keys are transferred, based on one or more of the stored content presentation units, front the proxy content rights manager to the security agent for allowing presentation of the requested content (step 308).

(00221 In more detailed aspects of the iovention, the content provider 204 may be a broadcast content provider and/or a ' multicast content provider. The method may further

include transferring secure content usage information 222 from the proxy content rights manager 218 to the remote content rights manager 206, and/or to the content provider, when the mobile station 102 is able to communicate with the remote content manager using the air interface 202.

} ' θG23f The smart module 212 may be a removable smartcard. The smart module may be a universal subscriber identity module (USIM), a removable user identity module R- UIM, or a cdma2000 subscriber identity module (CSIM). At least one content presentation unit 216 may define an allowed proxy capability of the proxy content rights manager, may be a token indicating a right for presenting secure content, or may be a credit granting a right for presenting secure content.

10024) The technique provides for efficient broadcast and multicast content rights enforcement. The smart module 212 may act as a proxy rights issuer, rights enforcer, and usage reporter. The remote rights manager 206 may load allowed proxy capabilities to the smart module. The smart, module may issue a rights object. RO to the mobile station 102. and may send Ae rights objects to the remote rights manager periodically, or when in the coverage of a base station .104 serving the .mobile station 102. A secure communication channel 224 may permit secure Communications between the smart module and the security agent 214. The secure content 2.10 may be stored in a secure content store 226 of the mobile station 102.

|O025| The remote content rights manager 206 may reside in the core network .108

(FIG. I) . , or in a network server available through the internet UO. Likewise, the content provider may reside in the core network 108, or in a network server available through the internet 1 10.

}002<S{ The remote content rights manager 206 may encrypt the secure content keys

.220. The secure content keys 220 may be stored in the encrypted form in the mobile station 102. An. encryption key used to protect the secure content keys .may be provided to the smart module 212 through secure bootstrapping via the mobile station. When the mobile station plays encrypted content 210, it may present the encrypted secure content keys to the smart module, which decrypts the keys one by one and supplies them to the mobile station, provided that content presentation units 21.6 are available.

} ( H ) 27| Another aspect of the invention may reside in. a mobile station 102 (F1ϊ3. 2} including an air interface 202 for communicating with a content provider 204 and with a remote content .rights manager 206, a user interface 2OS for receiving content, requests

and presenting content 210, a smart module 232 t and a security agent 214. The smart module stores content presentation units 216 and has a proxy content, rights manager 21 S for issuing secure content keys 220 when the mobile station is unable to receive secure content keys from the remote content, rights manager using the air interface. The security agent securely receives secure content keys from the remote content lights manager and securely transfers secure content keys between the remote content rights .manager and the smart module. The mobile station further includes means for transferring, using the air interface and the security agent content presentation units from the remote content rights manager to the smart, module for storage, means for requesting secure content keys from the smart module for allowing presentation of the requested content while the mobile station is unable to communicate with the remote content manager using the air interface, and means for transferring secure content keys, based on one or more of the stored content presentation units, from the proxy content rights manager to the security agent for allowing presentation of the requested content

}002Sj Yet another aspect of the invention, may reside is computer program product comprising computer readable medium comprising code for causing a computer to transfer, using a air interface 202 and a security agent 21.4 of a mobile station J 02, content presentation units 216 from a remote content rights manager 206 to a smart, module 212 of the mobile station for storage, code, for causing a computer to request secure content keys 220 from the smart module for allowing presentation of requested content 210 while the mobile station, is unable to communicate with the remote content manager using the air interface, and. code for causing a computer to securely transfer secure content keys, based on one or more of the stored content presentation units, from the proxy content rights manager to the security agent for allowing presentation of the requested content.

[ϋυ29] One option for BCMCS-based content protection for stored previously streamed content 402 may be described with reference to FIG. 4. A. terminal 404 (sucli as the mobile station iO2) asks, permission to play the recorded content from a smartcard 406 or module. The smartcard acts as a. proxy rights issuer 4OS for the terminal. The smartcard sends previously stored traffic encryption keys (TEKs) based on permission in a rights object (RO) 41.0 received from the smartcard. This may happen even if the terminal i$ out of the BCMCS coverage area. When network coverage is available, the

terminal sends a report 412 of usage statistics to a BCMCS controller 414 or other network server 416.

Iθ030J Another option for BCM€S-based content protection for stored previously streamed content 402 may be described with respect to FKr, 4. When network, coverage is available, the terminal 404 receives ROs from a content provider 416 over a channel that is https (hypertext transport protocol secure) protected. The terminal asks permission to play the recorded content from the stnartcard 406. The smartcard acts as a proxy rights issuer 4OS for the terminal. The smartcard sends previously stored TEKs based on permission in a RO .received from the smartcard. This may happen even if the terminal is out of the BCMCS coverage area. When network coverage is available, the terminal may send a report of usage statistics to the BCMCS controller or other network server. The report may contain detailed statistics such as separate play once and repeat play cases. The service provider may or may not charge for reuse of the stored content. The terminal may send a report 412 " of usage statistics to the content provider 416, which may allow the content provider to cross-check usage statistics reported by the service provider.

[(MBl] The usage statistic may include TEK count, time-based accounting, packet- based accounting, or a cørnbinaliønt thereof. The terminal 404 may piggyback the report, on other signaling messages so that a separate report message may not be required. The usage statistics in ay be able to distinguish between live streaming content, play of recorded content from beginning to end, and user rewinding of content in the middle of the content. Usage statistics covering each presentation of a content segment and/or program may be maintained. The content segment or program usage statistic may be reported,

}øG32{ The BCMCS controller 414 may send a broadcast access key (BAK) to the smartcard 406 via the mobile terminal 404. A short-term key message (STKsVI) may be sent from the RCMCS controller to the smartcard 406, or it may be sent by a. BCAST service distribution/adaptation (BSDA) unit. The srπartcard may send the short-term key (SK) to the security agent 41 S on the terminal. The security agent is trusted to discard the SK after use.

[0033] Another option for BCMCS-based content protection for stored previously streamed content 402 may be described again with reference to FIO. 4. When network coverage is available, the terminal 404 receives ROs 410 from a content provider 416

:ιo over a channel that is https protected. The terminal may be able to store content encryption keys locally. The terminal asks permission to play the recorded content from the smartcard 406. The smartcard acts as a proxy rights issuer 408 for the terminal. In another variation, the smartcard (C SIKd or R-UlM) computes and sends content, encryption keys to the terminal based on permission, in a RO received from the content, provider. The encryption keys may be sent over a secure channel 420. This may happen even if the terminal is out of the BCMCS coverage area. When network coverage is available, the terminal sends a report of play once usage statistics to the BCMCS controller or other network server. The service provider may not (or is unable to ) charge for multi-play or reuse of the stored content. The terminal may send a report 412 ! of usage statistics to the content provider, which may allow the content provider to cross-check usage statistics repotted by the service provider.

[CMB4] The smartøard-b&sed RO control may be sent via a key message (STKLM or long- term key message (LTKM). The RO may indicate rights to play once, record, play multiple times, etc. The technique may be used for both multimedia broadcast multicast sen-ice (MBMS) and broadcast imύ multicast service (BCMCS).

JlWBSj Those of skill in the art would understand that information and signals may be represented using any of a variety of different: technologies and techniques. For example, data, instructions, commands, information, signals, bits, symbols, and chips thai .may be referenced throughout the above description may be represented by voltages, currents, electromagnetic waves, magnetic fields or particles, optical fields or particles, or any combination thereof.

Jθ036J Those of skill would further appreciate that the various illustrative logical blocks, modules, circuits, and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, computer software, or combinations of both. To clearly illustrate this inter changeability of hardware and software, various illustrative components, blocks, modules, circuits, and steps have been described above generally in terms of their functionality. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the overall system. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present, invention.

π

J0037J The various illustrative logical blocks, modules, and circuits described in connection with the embodiments disclosed, herein may be implemented or performed with a general purpose processor, a digital signal processor (DSP), an application specific integrated circuit (.ASIC), a field programmable gate array (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components, or any combination thereof designed to perform the functions described .herein. A general purpose processor may be a microprocessor, but hi the alternative, the processor may be any conventional processor, controller, microcontroller, or state machine. A processor may also be implemented as a combination of computing devices, e.g., a combination of a DSP and a microprocessor, a plurality of microprocessors, one or more microprocessors in conjunction with a DSP core, or any other such configuration.

1.0038} The steps of a method or algorithm described in connection with the embodiments disclosed herein may be embodied directly in hardware, in a software module executed by a processor, or in a combination of the two. A software module may reside in RAM memory, .flash memory, ROM memory, EPROM memory. EEPROM memory, registers, hard disk, a removable disk, a CD-ROM 7 or any other form of storage medium known in the art. An exemplary storage medium is coupled f.o the processor such the processor can read information from, and write information to, the storage medium, In the alternative, the- storage medium may be integral to the processor. The processor and the storage medium may reside in an ASIC. The ASIC may reside m a user terminal. In the alternative, the processor and the storage medium may reside as discrete components in a user terminal.

J0039] In one or more exemplary embodiments, the functions described may be implemented in hardware, software, firmware, or any combination thereof. If implemented, in software as a computer program product, the functions may be stored on or transmitted over as one or more instructions or code on a computer-readable medium. Computer-readable media includes both computer storage media anά communication media including any medium that facilitates transfer of a computer program from one place to another. A storage media may be any available media that can be accessed by a computer. By way of example, and not limitation, such computer- readable media can comprise RAM, ROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage or other .magnetic storage devices, or any other medium

that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer Aiso. any connection is properly termed a computer-readable medium For example, if the software is transmitted from a website, server, or other remote souice using a coaxial coble, fiber optic cable, twisted pasr. digital subscriber line (DSL), or wireless technologies such a<« infrared, radio, and microwave, then the coaxial cable, lϊber optic cable, twisted pair. DSL, oi wireless technologies such as infrared, radio, and microwave ate included in the definition of medium Disk and disc, as used herein. Includes compact disc (CD), laser disc, optical disc, digital versatile disc (D\ ϋ), floppy disk and blu-ray disc where disks usually iepioduce data magnetically, while discs tεpioduee data opϋcall> with lasers. Combinations of the above should also be included within the scope of computer-readable media,

[(HMO] The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present invention. Various modifications to those embodiments be i cadi Iy appaient to those skilled m the ait, and the gcπcne principles defined herein may be applied to other embodiments without departing f∑om the spirit or scope of the invention Thus, the present invention is not intended to be limited to the embodiments shown herein but is to be accorded the voidest scope consistent "with the principles and novel features disclosed herein