Paid television system with advance payment

FIELD: receivers/decoders of services, provided with certain conditions, in particular in a system for accessing an encrypted data stream, priced per time unit.

SUBSTANCE: system contains control center (2), which transmits a data stream through a broadcasting channel, encrypted by means of control words, which are included in composition of access control messages, and meant for receipt by at least one user device (1), connected to safety block (3), having unique address and containing credit, which is reduced with purchase of products or consumption of data stream, where safety block (3) is provided with means for reducing credit for value, dependent on product, or for value, dependent on duration of access to data stream, where aforementioned values and/or duration are determined in access control messages or in conditional access messages, and system contains means, made independent from user device (1), for transmitting identifier, representing a unique number, and price code which indicates size of credit subject to load, in control center (2), and control center (2) additionally contains devices for receipt and verification of price code and for transmission of an encrypted message through broadcasting channel, having a unique address, corresponding to identifier, and giving a command to the safety block (3) to load the credit in defined amount.

EFFECT: development of a new approach to provision of access to paid television for broad clientele, substantially reduced subscriber management related costs.

5 cl, 1 dwg

 

The technical field to which the invention relates.

The present invention relates to receivers/decoders services provided to certain conditions, in particular to the system of access to encrypted data stream, measured per unit time.

As an example of such a data stream can be called information services in the field of stock data, weather forecasts, TV programs for a wide audience, sporting events, etc. Such data streams can be broadcast to the user device type decoder pay television (TV), computer, portable phone, handheld computer, personal digital assistant (PDA), a radio, a TV receiver or multimedia terminal.

The level of technology

In order to control the use of digital stream or to determine the conditions of such use, the digital stream is encrypted. This encryption is performed using the control words that are replaced at regular time intervals (components with 5-30) in order to make unattractive any attack aimed at the definition of the control word.

In order for the user device is able to decrypt (decode) the data stream is encrypted by means of the control with the ova, it is sent to the device regardless of the data flow in the form of messages access control (ECM messages), the encrypted key, convenient for use of the transmission system between the control center and security block user device.

In fact, the operations associated with data protection, run in the security block. The security block is typically a smart card (chip card), considered to be inaccessible to unauthorized access. This unit can be either removable or integrated into the user device, receiving signals, such as a decoder for pay-TV or DAB receiver (DAB=Digital Audio Broadcasting). In this implementation of the present invention makes it possible to use custom device without a removable security block.

During the decryption of the ECM messages in the security block is the verification of entitlement to access to the corresponding data stream. The management of such rights by means of conditional access messages (EMM messages)that load data rights in the security block. Other variants are possible, for example, sending the decryption keys.

Payments for the use of such data streams in real time based on the principles of subscription, acquisition of rights to specific property is to know or to pay on time.

The subscription allows you to define the rights associated with one or more broadcasting channels, and gives the user the opportunity to purchase these channels in decrypted form, provided that the rights entered in the security block.

At the same time, rights can be defined specifically for a certain content, e.g. a movie or a football match. The user can acquire such a right, for example, by purchase, and it will provide exactly the selected content. This method is known under the name "pay per view" (PPV - pay-per-view).

With regard to the payment on time, the security block has a loan that debited in accordance with the actual consumption by the user. For example, such debits will occur every minute, regardless of the enabled channel. With appropriate technical realization becomes possible to vary the unit of account either in length or in the calculation of the time available, or even by combining these two parameters for adaptation of invoice to the type of the transmitted product.

When the decryption of the control words is verification that the security block has access to the appropriate thread.

The control word is returned Paul is iowatelecom device in decrypted form only in case of positive result of the verification.

This principle requires that the control center was a known user, its physical address, Bank details, as well as all of his payment traffic, what is the condition of the pack of his rights.

In fact, the principle of subscription-based renewable obligations; in other words, the right expires if not renewed. This behavior avoids the danger that any person can subscribe to all available channels, and then to terminate your subscription so that the message of termination will not reach the user device. Therefore, provided the right is a temporary border, so if it is not renewed, this right shall automatically terminate with respect to any channel, for example, at the end of the relevant month.

It is easy to imagine the amount of work required to monitor thousands of subscribers who regularly pay their bills each month, you must send notice of the renewal. In this case, this message should be repeated for several days, because the control center is unknown whether the corresponding user device or not.

It often happens that the user is absent at the time of its release and is respectively, shut down your device, upon returning detects that the user device has been locked. In this case, that he was sent a personal message of renewal, it must call the control center.

Thus, a significant part of resources and cost control center spent on subscribers.

The first known solution using e-wallet that is described in the document US 6282293. The smart card contains the loan debited, when there is access to the encrypted content. Accounting information included in the transmitted signal and thereby enables recording. To load a loan, the user device causes the control center, sending him a list of consumed events and producing the loading of the loan in accordance with the terms and conditions agreed upon with the user, for example, using a credit card.

In many cases, the user device does not have a communication channel to communicate with the control center; on the other hand, it is desirable to avoid registration in the database of all users with their payment instruments. Therefore, reviewed the technical solution does not allow to achieve the purpose of the present invention, which consists in creating the idea is that the user devices, do not use the feedback channel, and to avoid the necessity of information about each owner of such devices.

Disclosure of inventions

Thus, the main task, which is aimed invention is to develop a new approach to providing access to pay TV for a broad clientele and due to this, the sharp decline in the costs associated with the subscriber management.

The problem is solved by the creation of a system of pay-per containing the control center, transmitting a data stream encrypted by control words, which are included in the message access control (ECM messages), and designed to receive at least one user device connected to the security block having a unique address and contains the credit, which decreases as the purchase of products or consumption of the data stream. The system according to the invention is characterized by the fact that the security block provided with means to reduce the loan amount depending on the product, or by an amount depending on the duration. The magnitude and/or duration are defined in the ECM messages or conditional access messages (EMM messages). The system contains also independent from the user device, means for transmitting the ID manually is Katara, representing a unique number, and a code value representing the amount of credit to be loaded in the control center. The control center further comprises means for receiving and verifying the code value, and to transmit the encrypted message with the specified unique address and gives the unit safety instructions to download the loan in the specified size.

Thus, according to the invention means loading the loan is made independent from the user device; at the same time, the control center monitors the operations of the download. In addition, the transmission code value eliminates billing the user, since this code value already contains information regarding the acquisition of user rights on an appropriate cost. In contrast, in the known solutions of the control center operates with a credit user (billing, credit card, regardless of the transfer instructions to download via modem.

In accordance with the invention, the code value is transmitted in one of the modes that will be described later, and the download instruction is sent as part of the encrypted data stream, in particular, in the composition of the EMM message.

The code value can have several different forms.

1. On the map, under the erasable coating is written to a unique number, which determines the amount paid for the loan. I like cards of value Code Cards - VC-maps), which are sold in stores, there is a part, are hidden under a layer that is easily removed with a fingernail or coin. Opening number corresponds to a single unique number generated by the cryptosystem, i.e. the format of this number meets strict rules. Self-generate this number, which will be recognized by the control center as valid (valid), it is almost impossible (or rather, the probability of such events is extremely low). With this number of associated costs paid by the user when purchasing VC-card. After this number has been used, it becomes impossible to re-present it to the control center.

2. Bank account or credit card number and the amount (amount), you want to load. In accordance with the conditions adopted by the management centre and agreed with the banking institutions, the user can transmit the number of your Bank card and specify the amount he wants to debatovat from your account. In this embodiment, it becomes possible to use a removable security block and install it in the terminal for this purpose. This terminal allows the floor is to cash (for example, in the form of Bank notes or to read a credit card (and even a credit card). When the amount selected by the user, will be duly tested (either on the notes entered in the slot of the terminal, or by authorization from the banking organization), the terminal communicates with the control center and the message about downloading the loan is sent to the terminal, which transmits it to the security block. During this operation it is possible to obtain consumption data of the user based on the data stored in the security block.

3. Phone number or identifying number of the wireless (mobile) phone. The user can simply send the desired value for download at the address of the control center. In this message will be automatically included the phone number of the user, and based on the agreement between the telephone operator and the control center of the loaded value will be debetowa phone bill.

In accordance with a selected embodiment, the user informs the Central control code value, followed by the identifier of the user device. In this embodiment, the unique address of the security block will be treated as non group formed by the user device and the security block. To simplify the work submitted is Xia possible to generate a representative simplified the code a unique address. In fact, the unique address is typically a number that contains a large number of digits that are required for the system (creation date, version, and so on), but without which you can do in the identification block. For this reason, with this security block may be associated with a shorter number that is bound to the security block and sufficient to distinguish it from all other blocks.

In accordance with the specific option the user has the ability to pass control center other number instead of the number, shortened during initialization.

For example, the new number will refer to the user's phone number. The control center shall verify that this new number is unique, and associates it with a unique address. As a result, it becomes possible to replace the identity of the user device by the user's phone number.

To download your loan, the user can use a voice server and a classic phone, which sends a signal via touchtone. Buying a map value (VC-map corresponding to option 1 code value), it calls the voice server control center. Then they are asked to enter a unique address and the code value shown on the map.

This operation does not take much time: the center of the Board verifies that the code value and the identifier, and if the data is correct, prepares a message addressed to the user device of the user.

The message is transmitted over the channel broadcast in encrypted form, and only the appropriate security block has the means to decrypt the message.

As a result, in the user device with the specified unique address, loan amount, specified in the submitted message, is added to the remainder of the loan.

The term "control center" in the context of this description should be interpreted expansively. In practice, this center is divided into several modules, which can be in different places. As these modules are, in particular, the encryption module messages access control (ECM messages) and the cryptographic module of the conditional access messages (EMM messages), which are responsible for loading of the loan. The module working with codes cost may be in the banking institution. In relation to option 2, he, in particular, may be in cooperation with the credit center. In relation to option 3, which users send short messages on their mobile phones, this module can reside on the territory of the telephone operator. Once the code value bude is identified and treated, the encryption module may be notified via a secure channel that the appropriate recipient should be directed control message, which in turn send messages about loading the loan.

The user has the option at any time to display on your TV for the remainder of your loan.

In accordance with one variant of the use of mobile phone to download enough credit to send a simple short text message containing the code value and the ID of the corresponding user devices. However, if the user has changed the ID number of your phone, it is enough to send only the code value as the telephone number will be transferred to the recipient of the message automatically.

When the credit available in the security block is large enough, there are various modes of operation, namely:

pulse - subscription: the user decides to use all of your credit or part of it to buy a subscription to one or more channels; as a consequence, in the user device that is intended to receive these channels, creates a new right, and no further action in respect of credit to the user do not want;

impulse buying: the user can decide to purchase the front and or group of transmission (for example, series or retrospective), and the security block is created, a corresponding law;

- the loan on time: the user may decide to pay only what he actually consumes; in this case, the loan is spent in accordance with the method of payment, controlled by timer.

The first two modes are preferably controlled via the EMM messages as they create rights in the security block. In contrast, the third mode can only work with the ECM messages, which indicate the cost per unit of time, and also acquired the duration.

When the ESM message arrives in a security block, check the rights in hierarchical order, starting from the wide rights to the most narrow. For example, it first checks whether the user has a subscription to these rights; if not, it is checked whether there is a right to an impulse purchase; finally, as a last resort, made debits credit per unit time.

Brief description of drawing

The drawing shows a variant embodiment of the invention.

The implementation of the invention

Shown in the drawing, the embodiment of the invention corresponds to option 3 code value. The center 2 are: telephone operator 9, module 5 encryption of transmitted e is the R D, module 6 control of the encryption keys, are responsible for generating messages for access control (ECM), and the module Manager 7, responsible for generating the boot messages of the loan, send blocks of security. Each decoder 1 contains the block 3 security, which stores in memory the loan granted to the user.

In this example, the code value corresponds to a map from scratch coating, which contains a unique number (VC-map). The user uses his mobile phone 4 for connecting to the telephone operator 9, send him this unique number. Telephone operator, upon receiving this information, transmits it to the module Manager 7 together with the user's phone number. Verification of reality (acceptability) of a given number is provided using the 8 data containing all acceptable number. When this number is used for the first time, the base 8 data returns the corresponding value of the loan. Then this number becomes invalid without the possibility of recovery.

The telephone number notified by the telephone operator 9, the module Manager 7 sets the unique address of a block of 3 security. After that, he can be sent a message by the classical broadcast channel (cable, radio etc). This message usually repeated for several days. It should in this connection be noted that the block 3 security tool contains only one reading this message. This condition is ensured by the presence in the message ID, which is also encrypted keys used in the transmission of information. This ID is stored in the security block, due to what is accepted and processed only the corresponding message. Since then, the security block waiting for another ID or identifier of a higher level.

When operating according to the described method, the database maintains a record of the amount loaded in each block 3 security. It is possible to check the consumption of each user device 1 and to detect fraud attempts. The total loaded amount must be always less than the total value of VC-cards in circulation.

1. The transmission system prepaid, containing the center (2) administration, transmitting the data stream on the channel broadcasting, encrypted by control words, which are included in the message to access control, and intended for receiving at least one user device (1)connected to the unit (3) be the danger having a unique address and contains the credit, which decreases as the purchase of products or consumption data stream, characterized in that the block (3) security provides the tools to reduce the loan amount depending on the product, or by an amount dependent on the duration of access to the data stream, with the specified magnitude and/or duration are defined in the message to access control or conditional access messages, the system includes a tool made independent from the user device (1)for transmission of the identifier that represents a unique number, and a code value representing the loan amount to be loaded to the center (2) control, and the center (2) management further comprises means for receiving and verification code value and for transmission over the channel broadcast an encrypted message having a unique address corresponding to the identifier, and providing unit (3) safety instruction to load the loan in the specified size.

2. The system according to claim 1, characterized in that the code value contains the number of the Bank or the credit account and the credit amount is to be loaded.

3. The system according to claim 1, characterized in that the code value represents a unique code, preset center (2) control and the corresponding CR is perfectskin rules with center (2) management has the tools to check the code and extract the loan amount, which is transferable to the security block.

4. The system according to claim 1, characterized in that the system includes means for associating a unique address with the phone number of the user, and the code value is transmitted to the center (2) control with the specified telephone number, and the center (2) control is equipped with means for transmitting the specified encrypted message block (3) security, a unique address which is associated with the specified phone number.

5. System according to any one of the preceding paragraphs, characterized in that the specified product is a term subscription to pay TV or the transfer or group of transfers to be purchased in order impulsive buying.



 

Same patents:

FIELD: receivers/decoders of services, provided in conditional access mode, in particular, receivers having storage block (memorization device), such as a hard drive.

SUBSTANCE: method is claimed for storing an event, encrypted with usage of at least one control word (CW) in receiver/decoder (STB), connected to safety block (SC), where at least one control word and access privileges for aforementioned event are contained in access control messages (ECM-messages), method includes following operations: recording of encrypted event, and also of at least one ECM-message in storage block; transmission of at least one ECM-message into safety block (SC), verification of the fact that safety block (SC) contains access privileges for aforementioned event, generation of receipt (Q), which contains data related to management of event in reproduction mode, where receipt (Q) contains signature (SGN), generated on basis of the whole ECM-message or its part with usage of secret key (K) contained in safety block (SC) and specific for every safety block, where during later consumption of event the authenticity of the receipt (Q) is verified in prioritized manner compared to conventional access privileges, stored in safety block (SC), storage of aforementioned receipt (Q) in storage block.

EFFECT: provision of method for storing an event.

6 cl, 3 dwg

FIELD: cryptographic protocols, in particular, efficient encoding at content level.

SUBSTANCE: method is provided for generation of digital data with cryptographic protection, encoding content and composed into messages. Encoding of at least a part of the message is performed and encoded messages are provided in form of output signal in format, allowing the interface of server service to compose a message in form of at least one packet, including at least one header and useful load, where at least one header includes information, which allows the service interface in the client to assemble each message for decoding application using useful load of packets. Each message is divided onto the first and at least one additional section of the message. At least one of the message sections is encoded in such a way that it may be decoded independently from other message sections. Assembly of encrypted message is performed by addition of resynchronization marker, separating the message section from adjacent message section and including precise information about synchronization, at least for additional sections of the message.

EFFECT: synchronized decoding process in case of data loss.

14 cl, 8 dwg

FIELD: copy/access protection.

SUBSTANCE: audio/video stream processing system includes module for inputting audio/video stream, which receives audio/video stream, containing field of information about audio/video content, including first copy control information, and audio/video content field, including second copy control information; reading module which extracts first and second copy control information from received audio/video stream and determines whether first copy control information is modified; and module for decoding audio/video stream, which processes received audio/video stream in accordance to predetermined criteria, if first copy control information is modified.

EFFECT: protection of content, prevented unsanctioned processing of content.

15 cl, 8 dwg

FIELD: engineering of systems for loading and reproducing protective unit of content.

SUBSTANCE: in accordance to invention, in receiving device 110 for protected preservation of unit 102 of content on carrier 111 of information unit 102 of content is stored in protected format and has associated license file, file 141 of license being encrypted with usage of open key, associated with a group of reproduction devices 120,121, and, thus, each reproduction device 121 in group can decrypt file 141 of license and reproduce unit 102 of content, and devices not belonging to group can not do that, while device 121 for reproduction may provide the open key, specific for given device, to system for controlling content distribution, and then system for controlling content distribution returns secret key for group, encrypted with open key of device 121 for reproduction, after that device 121 of reproduction by protected method receives secret key of group and may decrypt file 141 of license.

EFFECT: creation of system for loading and reproducing protected unit of content, making it possible to constantly control usage of unit of content.

3 cl, 4 dwg

FIELD: digital audio and video technologies.

SUBSTANCE: device for storing information is made with possible receipt of data carrier, decoder is made with possible receipt of compressed encoded signals from data carrier and transmitting signals to decrypter. Decrypter is made with possible decryption of compressed encoded data encrypted data and transmitting these to decompressor. Decompressor is made with possible receipt of compressed encoded signals from decrypter and decompression of compressed encoded signals to reproduce the image.

EFFECT: higher precision, higher efficiency.

3 cl, 17 dwg

FIELD: broadcasting systems.

SUBSTANCE: method includes broadcasting of message, including text portion intended to reach user, while said message is transferred in form of conditional access message.

EFFECT: broader functional capabilities.

5 cl, 7 dwg

FIELD: television.

SUBSTANCE: device converts signals to digital video information. Compression device is made in such a way, that it receives digital video data, coming from source data generator, and compresses digital images. Encoding device receives compressed digital video data coming from compression device and encodes compressed digital video data. Recording device stores encoded compressed digital audio data at data carrier.

EFFECT: higher data transfer speed.

3 cl, 17 dwg

FIELD: access control systems.

SUBSTANCE: proposed signal processing method involves reception of digital input signal incorporating first component of scrambled signal and second component of scrambled signal; binding of input signal with detachable intelligent card unit for processing first scrambled signal component and generation of first descrambled signal which is internal with respect to intelligent card unit and for processing second scrambled signal component in case of response to first descrambled signal to generate second descrambled signal and to integrate first scrambled signal component of input signal and second descrambled signal so as to produce output signal; reception of output signal from intelligent card unit and processing of second descrambled signal to shape signal adapted for display.

EFFECT: improved control of access.

1 cl, 9 dwg

The invention relates to an electronic audiovisual processing

The invention relates to scramblers device, in particular for digital TV systems

FIELD: access control systems.

SUBSTANCE: proposed signal processing method involves reception of digital input signal incorporating first component of scrambled signal and second component of scrambled signal; binding of input signal with detachable intelligent card unit for processing first scrambled signal component and generation of first descrambled signal which is internal with respect to intelligent card unit and for processing second scrambled signal component in case of response to first descrambled signal to generate second descrambled signal and to integrate first scrambled signal component of input signal and second descrambled signal so as to produce output signal; reception of output signal from intelligent card unit and processing of second descrambled signal to shape signal adapted for display.

EFFECT: improved control of access.

1 cl, 9 dwg

FIELD: television.

SUBSTANCE: device converts signals to digital video information. Compression device is made in such a way, that it receives digital video data, coming from source data generator, and compresses digital images. Encoding device receives compressed digital video data coming from compression device and encodes compressed digital video data. Recording device stores encoded compressed digital audio data at data carrier.

EFFECT: higher data transfer speed.

3 cl, 17 dwg

FIELD: broadcasting systems.

SUBSTANCE: method includes broadcasting of message, including text portion intended to reach user, while said message is transferred in form of conditional access message.

EFFECT: broader functional capabilities.

5 cl, 7 dwg

FIELD: digital audio and video technologies.

SUBSTANCE: device for storing information is made with possible receipt of data carrier, decoder is made with possible receipt of compressed encoded signals from data carrier and transmitting signals to decrypter. Decrypter is made with possible decryption of compressed encoded data encrypted data and transmitting these to decompressor. Decompressor is made with possible receipt of compressed encoded signals from decrypter and decompression of compressed encoded signals to reproduce the image.

EFFECT: higher precision, higher efficiency.

3 cl, 17 dwg

FIELD: engineering of systems for loading and reproducing protective unit of content.

SUBSTANCE: in accordance to invention, in receiving device 110 for protected preservation of unit 102 of content on carrier 111 of information unit 102 of content is stored in protected format and has associated license file, file 141 of license being encrypted with usage of open key, associated with a group of reproduction devices 120,121, and, thus, each reproduction device 121 in group can decrypt file 141 of license and reproduce unit 102 of content, and devices not belonging to group can not do that, while device 121 for reproduction may provide the open key, specific for given device, to system for controlling content distribution, and then system for controlling content distribution returns secret key for group, encrypted with open key of device 121 for reproduction, after that device 121 of reproduction by protected method receives secret key of group and may decrypt file 141 of license.

EFFECT: creation of system for loading and reproducing protected unit of content, making it possible to constantly control usage of unit of content.

3 cl, 4 dwg

FIELD: copy/access protection.

SUBSTANCE: audio/video stream processing system includes module for inputting audio/video stream, which receives audio/video stream, containing field of information about audio/video content, including first copy control information, and audio/video content field, including second copy control information; reading module which extracts first and second copy control information from received audio/video stream and determines whether first copy control information is modified; and module for decoding audio/video stream, which processes received audio/video stream in accordance to predetermined criteria, if first copy control information is modified.

EFFECT: protection of content, prevented unsanctioned processing of content.

15 cl, 8 dwg

FIELD: cryptographic protocols, in particular, efficient encoding at content level.

SUBSTANCE: method is provided for generation of digital data with cryptographic protection, encoding content and composed into messages. Encoding of at least a part of the message is performed and encoded messages are provided in form of output signal in format, allowing the interface of server service to compose a message in form of at least one packet, including at least one header and useful load, where at least one header includes information, which allows the service interface in the client to assemble each message for decoding application using useful load of packets. Each message is divided onto the first and at least one additional section of the message. At least one of the message sections is encoded in such a way that it may be decoded independently from other message sections. Assembly of encrypted message is performed by addition of resynchronization marker, separating the message section from adjacent message section and including precise information about synchronization, at least for additional sections of the message.

EFFECT: synchronized decoding process in case of data loss.

14 cl, 8 dwg

FIELD: receivers/decoders of services, provided in conditional access mode, in particular, receivers having storage block (memorization device), such as a hard drive.

SUBSTANCE: method is claimed for storing an event, encrypted with usage of at least one control word (CW) in receiver/decoder (STB), connected to safety block (SC), where at least one control word and access privileges for aforementioned event are contained in access control messages (ECM-messages), method includes following operations: recording of encrypted event, and also of at least one ECM-message in storage block; transmission of at least one ECM-message into safety block (SC), verification of the fact that safety block (SC) contains access privileges for aforementioned event, generation of receipt (Q), which contains data related to management of event in reproduction mode, where receipt (Q) contains signature (SGN), generated on basis of the whole ECM-message or its part with usage of secret key (K) contained in safety block (SC) and specific for every safety block, where during later consumption of event the authenticity of the receipt (Q) is verified in prioritized manner compared to conventional access privileges, stored in safety block (SC), storage of aforementioned receipt (Q) in storage block.

EFFECT: provision of method for storing an event.

6 cl, 3 dwg

FIELD: receivers/decoders of services, provided with certain conditions, in particular in a system for accessing an encrypted data stream, priced per time unit.

SUBSTANCE: system contains control center (2), which transmits a data stream through a broadcasting channel, encrypted by means of control words, which are included in composition of access control messages, and meant for receipt by at least one user device (1), connected to safety block (3), having unique address and containing credit, which is reduced with purchase of products or consumption of data stream, where safety block (3) is provided with means for reducing credit for value, dependent on product, or for value, dependent on duration of access to data stream, where aforementioned values and/or duration are determined in access control messages or in conditional access messages, and system contains means, made independent from user device (1), for transmitting identifier, representing a unique number, and price code which indicates size of credit subject to load, in control center (2), and control center (2) additionally contains devices for receipt and verification of price code and for transmission of an encrypted message through broadcasting channel, having a unique address, corresponding to identifier, and giving a command to the safety block (3) to load the credit in defined amount.

EFFECT: development of a new approach to provision of access to paid television for broad clientele, substantially reduced subscriber management related costs.

5 cl, 1 dwg

FIELD: information encryption.

SUBSTANCE: system contains an encrypted data broadcasting centre, at least one control centre, a terminal device, a decoder located between the encrypted data broadcasting centre and the terminal device, the decoder includes an encrypted data reception and decryption module and a data access authority control module; the data access authority control module contains a protection module.

EFFECT: provision of system allowing to simplify access authority control at broadcasting centre level and ensuring optimal data security.

12 cl, 2 dwg

Up!