Media storage and playback of encrypted content

ABSTRACT

A content distribution system is disclosed that supports verification of transmission. In some embodiments, a remote probe device captures content and sends the content to a decrypting device so that decryption may be performed. The decrypting device may archive the content and may subsequently send the content to the probe device or to a playback device so that the content may be displayed. Consequently, the content distribution system can verify that specified content (e.g., an advertisement) was correctly distributed according to scheduled information.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. application Ser.No.13/150,934 filed on Jun. 1, 2011 and entitled “MEDIA STORAGE ANDPLAYBACK OF ENCRYPTED CONTENT.”

TECHNICAL FIELD

Aspects of the disclosure relate to storage and playback of encrypteddata or media content in a content access or distribution system toverify transmission of the encrypted data or media content.

BACKGROUND

Many operators provide media as well as high speed interne access, videoon demand (VOD), Voice over IP (VoIP) telephone, and numerous otherservices to end-users. To provide such services, system operators mustmanage and maintain increasingly complex networks. FIG. 1 depicts ablock diagram showing an example of such a network. A national orgeneral processing center 101 (e.g., a central office or headend) mayinclude elements such as VOD servers, servers for receiving andencapsulating programming content, management servers, and the like.Processing center 101 communicates with multiple regional processingcenters 103 over a backbone network 105, with regional processingcenters 103 also including facilities for VOD and programmingreception/encapsulation. Each regional processing center 103communicates over a regional access network 107 with multiple hubs 109.Each hub 109 includes a termination system, devices for quadratureamplitude modulation/demodulation (QAM), and other elements fortransmission and reception of information.

From hubs 109, individual homes or other end-user locations are reachedvia an end-user distribution network 111, which may comprise, forexample, an optical fiber, wireless, or a hybrid fiber coaxial cable(HFC) access network. A fiber optic portion 113 of end-user distributionnetwork 111 may include multiple nodes 117. A transmission line portion115 of end-user distribution network 111 may include feeder lines 119extending from nodes 117. Drop end-user lines 121 typically extend fromtaps in feeder lines 119 and connect to the end-user premises.Amplifiers are often distributed along the feeder lines. Alternatingcurrent (AC) power may also be input into the feeder cables so as toprovide a power source for the amplifiers. For simplicity, FIG. 1 onlyshows a very small part of transmission line portion 115 of an end-userdistribution network associated with a single node. Typically,distribution plants 123 associated with hubs may be the largest part ofthe system, and there may be many end-users receiving service through aparticular hub.

Communication through a transmission line may be affected in many ways.For example, temperature changes can affect signal quality intransmission lines. To detect, prevent and correct communicationproblems, signal quality measurements from the transmission line part ofan end-user distribution network can be very useful in assessingtransmission quality. In addition, a media distribution operator mayneed to verify that specific media content is delivered to end users inaccordance with schedule information, for example, in order to meetcontractual obligations.

BRIEF SUMMARY

The following presents a simplified summary of the disclosure in orderto provide a basic understanding of some aspects. It is not intended toidentify key or critical elements of the disclosure or to delineate thescope of the disclosure. The following summary merely presents someconcepts of the disclosure in a simplified form as a prelude to the moredetailed description provided below.

In one aspect, a content distribution system supports verification ofencrypted transmissions through the content distribution system using aprobe controller, at least one remote probe/playback device, and adecrypting device. A remote probe device captures encrypted content andsends the encrypted content to the decrypting device so that decryptionmay be performed by the separately located decrypting device. Thedecrypting device may archive the resulting decrypted content andsubsequently send the decrypted content to the same probe device or to adifferent playback device so that the decrypted content may bedisplayed. Consequently, the content distribution system can verify thatspecified content (e.g., an advertisement) was correctly distributedaccording to scheduled information.

In another aspect of the disclosure, encrypted content from a pluralityof probe devices is sent to the decrypting device and is stored at thedecrypting device for subsequent retrieval for display at a playbackdevice. The decrypting device may be configured by a conditional accessserver to decrypt encrypted content using a current decryption key inaccordance with an encryption scheme supported by a content distributionsystem.

The foregoing and other embodiments can be partially or whollyimplemented on a computer-readable medium, for example, by storingcomputer-executable instructions or modules, or by utilizingcomputer-readable data structures.

The details of these and other embodiments are set forth in theaccompanying drawings and the description below. Other features andadvantages of the disclosure will be apparent from the description anddrawings, and from the claims.

BRIEF DESCRIPTION OF THE DRAWINGS

The present disclosure is illustrated by way of example and not limitedin the accompanying figures in which like reference numerals indicatesimilar elements and in which:

FIG. 1 shows a block diagram showing selected elements of a mediadistribution network according to prior art.

FIG. 2 shows a content distribution system for capturing and analyzingmedia content in accordance with some aspects of the disclosure.

FIG. 3 shows communications between elements in a content distributionsystem in accordance with some aspects of the disclosure.

FIG. 4 shows a flow chart for a process performed in a contentdistribution system in accordance with some aspects of the disclosure.

FIG. 5 shows a flow chart for a process performed at a probe controllerin accordance with some aspects of the disclosure.

FIG. 6 shows a flow chart for a process performed at a probe/playbackdevice in accordance with some aspects of the disclosure.

FIG. 7 shows a flow chart for a process performed at a decrypting devicein accordance with some aspects of the disclosure.

FIG. 8 shows an apparatus that supports a probe controller in accordancewith some aspects of the disclosure.

FIG. 9 shows an apparatus that supports a probe/playback device inaccordance with some aspects of the disclosure.

FIG. 10 shows an apparatus that supports a decrypting device inaccordance with some aspects of the disclosure.

DETAILED DESCRIPTION

Traditional systems often require playback equipment to monitortransmitted media content in a distribution system. The playback systemprovides an output from a gateway (e.g., a settop box) that decrypts thereceived transmission when the transmission is encrypted. The gatewaymay be connected to an auxiliary apparatus (e.g., a sling box) thatretransmits the decrypted transmission via the Internet or Intranetusing an Internet Protocol (IP) to a remote viewer. With sometraditional systems, a video catcher may be used to convert atransmission (e.g., IP or USB) received through a content distributionsystem to a modulated signal (e.g., quadrature amplitude modulation(QAM)) for a video display when the video is not encrypted. Moreover,traditional systems are typically not scalable and are often expensive,single use devices that do not comply with standards.

Aspects of the disclosure provide a capability to verify encryptedtransmissions through a content distribution system using a remoteprobe/playback device and a decrypting device. In an embodiment, aremote probe device may capture encrypted content and send the encryptedcontent to the decrypting device for decryption. The decrypting devicemay archive the resulting decrypted content and subsequently send thedecrypted content to the same probe device or to a different playbackdevice so that the decrypted content may be displayed. Consequently, thecontent distribution system may verify that specified content (e.g., anadvertisement) was correctly distributed according to scheduledinformation.

In some embodiments, a playback device may verify that the decryptedcontent is substantially the same (i.e., matches) as the expectedcontent (e.g., a scheduled advertisement).

FIG. 2 shows content distribution system 200 for monitoring/capturingand analyzing media content in accordance with aspects of thedisclosure. In some embodiments, the content distribution system 200supports first market (e.g., IP video, voice, and/or data) 201 andsecond market 202. Media content may originate from content source 221and is distributed to end-user devices (not explicitly shown) over IProuters 215, 206, and 213. In second market 202, the content may bedistributed through termination system 211 or encrypter 212 (when thecontent is to be encrypted) and through distribution network 210.Distribution network 210 may be a hybrid fiber-coaxial (HFC) network,digital subscriber line (DSL) network, satellite transmission network,wireless network, optical fiber network, or any other type of network.In first market 201, content may be distributed through terminationsystem/encrypter 205 and network 204. Embodiments may support differenttypes of networks 204 as discussed above. For example, network 204 maycomprise a distribution or an access network.

Distributed content may be captured by probe/playback device 203 infirst market 201 and by probe/playback device 209 in second market 202.After content has been collected by a probe device 203 or 209, the probedevice may send the content to decrypting device 216 or 218 through oneor more of IP routers 206, 213, and 215, either as illustrated in FIG. 2or via a more direct path, so that encrypted content can be decrypted inaccordance with the scheme being used. (For example, probe device 203 or209 may collect content by receiving, processing, and storing thecontent.) For example, if markets 201 and 202 use different encryptionschemes, decrypting device 218 may be associated with market 201 anddecrypting device 216 may be associated with market 202. However, withsome embodiments, the same encryption/decryption scheme may be used forboth markets 201 and 202. In such a case, only one decrypting device maybe used or both decrypting devices 216 and 218 may be used in order todistribute tasks to enhance decryption performance.

Decrypting devices 216 and 218 may be configured to store media contenton databases 217 and 219, respectively. For example, decrypting device216 may store portions of encrypted content received from probe/playbackdevice 209 if the decrypting device cannot decrypt the encrypted contentin real-time. Also, decrypting device 216 may store decrypted content ondatabase 217, for example, until instructed to retrieve the decryptedcontent by a playback device. Decrypting device 216 or 218 may receiveencrypted content that is decrypted and subsequently stored. However,with some embodiments decrypting device 216 or 218 may also receiveunencrypted content that is stored in an associated database and thatmay be later retrieved if requested by a playback device.

While devices 203, 208, and 209 may support both probing (collecting)distributed content and playing back content, devices 203, 208, and 209may also support only one of the two functions or additional functions.For example, device 209 may collect encrypted content and instructdecrypting device 216 to decrypt encrypted content, which is stored ondatabase 217. Playback device 208 may then request the decrypted contentfrom decrypting device 216. Consequently, device 216 may retrieve thedecrypted content and send the content to playback device 208 forviewing.

A business that is purchasing advertisement time with a content providermay request that the provider verify that the advertisement wastransmitted when and where the business expected it to be. An entity mayalso wish to verify that an application or another type of datatransmission was actually transmitted and/or received when and wherethat entity expected. Verification may be expanded to have a loginprocedure so that the business or business may view the content forthemselves (e.g., through playback device 208) to ascertain that theiradvertisement or other data was transmitted.

Content distribution system 200 may verify the scheduled transmissionand delivery of different types of content or data, includingadvertisements and video on demand, in accordance with scheduleinformation. Verification of content delivery may ascertain that aservice was successfully completed so that customer (e.g., advertiser orend-user) is obligated to pay for the service. Consequently, bothcustomer satisfaction as well as revenues to the content provider may beenhanced. Verification may be based on the scheduled quantity and/orquality of the delivered content as well as the timeliness of thedelivery. For example, verification may ascertain that specificcontent/data was successfully delivered with a measured number of bitsand a measured error rate within a scheduled time duration.

In some embodiments, characteristics such as transmission quality may beassessed from transmission parameters maintained at a probe device(e.g., device 203), or an associated device, that are indicative of thequality of the received signal at the probe device. The transmissionparameters may be later retrieved and evaluated to assess thetransmission quality.

In some embodiments, device 209 has the ability to playback varioustypes of data or content such as a video stream/packet identifier (PID)or group of video streams (e.g., Multiprogram Transport Stream (MPTS))via either through local connection 251 (e.g., Ethernet, wireless,Bluetooth, Universal Serial Bus (USB), and the like) or through networkreturn 252 (e.g., Data Over Cable Service Interface Specification(DOCSIS 3.0)). If the captured content is encrypted, device 209 may sendthe encrypted content to decrypting device 216 through Ethernetconnection 251, network return 252, or another type of communicationlink. Sending the encrypted content over Ethernet connection 251 may beadvantageous because distribution network 210 is circumvented.Similarly, decrypted content may be sent to device 209 throughconnections 251 or 252 so that the content may be remotely viewed.

In some embodiments, decrypting devices 216 and 218 may be authorized,having correct entitlements, to decrypt media content by the conditionalaccess (CA) servers 214 and 207, respectively, from a network, such asthe Region/Market/Optical Transport Network (OTN), that is associatedwith the source (e.g., IP source 221) of the media stream.

With some embodiments, decryption devices 216 or 218 may comprise anarray of circuit cards or downloadable security software as themechanism to decrypt the media streams. Decryption may be configured tosupport the associated encryption/decryption scheme with the currentdecryption key. However, decrypting devices 216 or 218 may besubsequently reconfigured to have a different decryption key or tosupport a different encryption scheme. Consequently, decrypting devices216 or 218 may support one or more decryption keys at a particularinstance of time to support one or more encryption schemes or may bereconfigured to support a different encryption scheme at a subsequenttime.

FIG. 3 shows communications between elements in a content distributionsystem in accordance with aspects of the disclosure. In order toconfigure decrypting device 305, conditional access server 307 mayauthorize decrypting device 305 to decrypt encrypted content fromprobe/playback devices along content distribution system 301 byproviding the current decryption key (which may include, for example, alifetime of the current decryption key) during connection session 351.

A probe controller 304 may instruct probe/playback device 302 to capturedistributed content that is distributed by content distribution system301 or other sources. Probe controller 304 may instruct device 302 ordevice 303 over connection 352 or 354, respectively, to tune to aspecified channel or a specified group of media streams and obtainstream components associated with specified packet identifiers (PIDs).Controller 304 may further specify, for example, a start time and stoptime and/or time duration. The captured content may be time stamped andstored in storage and subsequently sent to decrypting device 305 overconnection 353, for example, after the scheduled stop time. In someembodiments, the captured content may be decrypted before being storedin media storage.

Decrypting device 305 may decrypt the received encrypted content andarchive the decrypted content in storage 306. In some embodiments,storage 306 may be co-located with decrypting device 305 or may belocated in a separate location. When decrypting device 305 and storagedevice 306 are separate entities or in separate locations, device 305may interact with device 306 through content distribution system 301 orthrough separate communication facilities, e.g., a direct Ethernet orwireless connection.

38 FIG. 4 shows flow chart 400 for an example of a process performed incontent distribution system 200 in accordance with aspects of thedisclosure. As previously discussed, content distribution system 200 maycomprise content source 221, decrypting device 216, database 217,conditional access server 214, probe controller 220, and probe/playbackdevice 209 as shown in FIG. 2.

At step 401 decrypting device 216 is configured, e.g., by conditionalaccess server 214, to decrypt encrypted content in accordance with theencryption scheme supported by content distribution system 200. Forexample, server 214 may provide the current decryption key, which may besubsequently changed. With some embodiments, decrypting device 216 isstatically configured to support only one encryption scheme and may bereconfigured to support a different encryption supported by contentdistribution system 200. However, with some embodiments, decryptingdevice 216 may support a plurality of encryption schemes if contentdistribution system 200 supports the plurality of encryption schemes orif decrypting device 216 decrypts content for a plurality of contentdistribution systems having different encryption schemes.

At step 402, probe controller 220 instructs a device, such as theprobe/playback device 209, to capture encrypted content at, for example,a scheduled time or elapsed time into a piece of content. For example,device 209 may be instructed to tune to channel 20 from 8:03 to 8:05 pmand capture the data, e.g., video, component (associated with aparticular PID). For example, probe controller 220 may obtain scheduleinformation based on scheduled advertisements. Probe/playback device 209extracts the identified content, or data representing such content,according to the schedule information at step 403 and may store thecaptured content in a memory device.

Captured content, as captured by probe 209, may just be some datarepresentative of that content, e.g., an entire advertisement need notbe captured; rather some small amount of representative data may becaptured.

At step 404 probe/playback device 209 determines if there is additionalcontent (e.g., another advertisement) to capture. If so, probe/playbackdevice 209 repeats steps 402 and 403. However, with some embodiments,probe/playback device 209 may send the captured content, or datarepresenting such content, to decrypting device 216 without waiting tocapture additional content.

When probe/playback device 209 has captured the content as instructed byprobe controller 220, probe/playback device 209 sends the encryptedcontent to decrypting device at step 405. Decrypting device 216 thendecrypts the content and stores the decrypted content in archive memory217.

At step 406 probe/playback device 209 subsequently requests thedecrypted content from decrypting device 216, which retrieves thecontent from archive memory 217. The content is then sent toprobe/playback device 209 so that a user can view the content, or datarepresentative of such content, to verify that the content is or wastransmitted/consumed as required, for example, in accordance with theschedule information. However, the content may also be sent to non-probedevices, e.g., playback device 208.

FIG. 5 shows flow chart 500 for an example of a process performed atprobe controller 220 in accordance with some aspects of the disclosure.At step 501, probe controller 220 accesses schedule information forinstructing probe devices 203 and 209. The schedule information mayoften be updated by a service provider based on commitments with acontent provider or an advertiser, and may be accessed from a memorydevice (e.g., memory 909 as shown in FIG. 9) or an input device.

At step 502, probe controller 220 sends the schedule information to theappropriate probe device (probe 203 and or probe 209) throughdistribution system 200 so that the probe device will capture encryptedcontent or associated data, at the instructed time and channel. Theinstructions may be sent though IP routers 215, 206, and 213 and throughnetwork 204, 210, or over a transmission facility (local connection 251)bypassing a distribution network. At step 503 probe controller 220repeats steps 501 and 502 so that instructions are send to allappropriate probe devices.

FIG. 6 shows flow chart 600 for an example process performed at aprobe/playback device (e.g., device 209) in accordance with some aspectsof the disclosure, where the content captured by the device isencrypted. At step 601 the probe device receives instructions to capturecontent based on schedule data from probe controller 220. Based on theschedule data, the probe device tunes to or otherwise locates content atstep 602 in order to capture the content, which may be encrypted, atstep 603. The probe device may store the captured content in memory(e.g., media storage 905 as shown in FIG. 9) and subsequently send theencrypted content to a decrypting device at step 604. However, with someembodiments, the probe device may send the captured content to thedecrypting device as soon as the content has been captured to reducestorage requirements at the probe device. At step 605, the probe devicerepeats steps 602-604 when additional content is to be captured.

The probe device may also support playback capabilities as determined atstep 606. If so, at step 607 the probe/playback device will subsequentlyrequest decrypted content from the associated decrypting device wheninstructed by a user so that the user can view the content forverification. However, with some embodiments, the encrypted content maybe captured by one device and the corresponding decrypted content may beviewed on a different device.

FIG. 7 shows flow chart 700 for an example process performed at adecrypting device (e.g., device 216) in accordance with aspects of thedisclosure. The decrypting device is configured at step 701 so that thedecrypting device is able to encrypt content, for example, in accordancewith the encryption scheme for distribution system 200. For example, CAserver 214 may provide decrypting device 216 with the current decryptionkey so that the decrypting device can decrypt encrypted content. Withsome embodiments, the decrypting device may support a plurality ofencryption schemes (e.g., when distribution system 200 supportsdifferent types of gateways, user devices, or when the decrypting devicesupports different distribution systems).

At steps 702-703 when the decrypting device receives encrypted content,the decrypting device decrypts the encrypted content at step 703 andstores the decrypted content in media storage at step 704. The decryptedcontent can be subsequently retrieved at step 706 if requested by aplayback device at step 705.

FIG. 8 shows an example apparatus 800 that supports probe controller 220in accordance with some aspects of the disclosure. With someembodiments, apparatus 800 supports the functionalities shown in flowchart 500 as shown in FIG. 5, and other functionalities. Processingdevice 801 may execute computer executable instructions from acomputer-readable medium, e.g., memory 805, in order to perform adecryption process. Computer storage media may be any type includingvolatile and nonvolatile, removable and non-removable media implementedin any method or technology for storage of information such as computerreadable instructions, data structures, program modules or other data.Computer storage media include, but is not limited to, random accessmemory (RAM), read only memory (ROM), electronically erasableprogrammable read only memory (EEPROM), flash memory or other memorytechnology, CD-ROM, digital versatile disks (DVD) or other optical diskstorage, magnetic cassettes, magnetic tape, magnetic disk storage orother magnetic storage devices, or any other medium that can be used tostore the desired information and that can be accessed by processingdevice 801. The executable instructions may carry out any or all of themethod steps described herein. With some embodiments, processing device801 may comprise one or more processing devices.

Probe controller apparatus 800 may instruct a probe device to captureselected encrypted content, or data representative of such content,based on schedule data stored in memory 807 or other parameters. Theschedule data may include scheduled times, tuning information, contentinformation, and the identification of the probe device (e.g., theassigned IP address) so that instructions can be routed to theappropriate probe device through network interface 803.

FIG. 9 shows an example apparatus 900 that supports probe/playbackdevice 209 in accordance with some aspects of the disclosure. With someembodiments, apparatus 900 supports the functionalities shown in flowchart 600 as shown in FIG. 6, and other functionalities. Processingdevice 901 may execute computer executable instructions from acomputer-readable medium, e.g., memory 907, in order to perform adecryption process. Computer storage media may include volatile andnonvolatile, removable and non-removable media implemented in any methodor technology for storage of information such as computer readableinstructions, data structures, program modules or other data. Computerstorage media include, but is not limited to, random access memory(RAM), read only memory (ROM), electronically erasable programmable readonly memory (EEPROM), flash memory or other memory technology, CD-ROM,digital versatile disks (DVD) or other optical disk storage, magneticcassettes, magnetic tape, magnetic disk storage or other magneticstorage devices, or any other medium that can be used to store thedesired information and that can be accessed by processing device 901.The executable instructions may carry out any or all of the method stepsdescribed herein. With some embodiments, processing device 901 maycomprise one or more processing devices.

Processing device 901 configures tuner 911 (e.g., channel number, PIDs,start time, and end time) to extract encrypted content based on scheduleinformation received from the probe controller through network interface903 and stored in memory 909. The captured content may be stored inmedia storage 905 and subsequently retrieved to that the capturedencrypted content can be sent to a decrypting device through networkinterface 903.

Decrypted content may be later retrieved from the decrypting devicethrough network interface 903 and displayed on display device 913 forverification.

FIG. 10 shows an example apparatus 1000 that supports decrypting device216 or 218 in accordance with some aspects of the disclosure. With someembodiments, apparatus 1000 supports the functionalities shown in flowchart 700 as shown in FIG. 7 and other functionalities. Processingdevice 1001 may execute computer executable instructions from acomputer-readable medium, e.g., memory 1009 in order to perform adecryption process. Computer storage media may include volatile andnonvolatile, removable and non-removable media implemented in any methodor technology for storage of information such as computer readableinstructions, data structures, program modules or other data. Computerstorage media include, but is not limited to, random access memory(RAM), read only memory (ROM), electronically erasable programmable readonly memory (EEPROM), flash memory or other memory technology, CD-ROM,digital versatile disks (DVD) or other optical disk storage, magneticcassettes, magnetic tape, magnetic disk storage or other magneticstorage devices, or any other medium that can be used to store thedesired information and that can be accessed by processing device 1001.The executable instructions may carry out any or all of the method stepsdescribed herein. With some embodiments, processing device 1001 maycomprise one or more processing devices.

With some embodiments, sub-processor 1005, alone or in conjunction withprocessing device 1001, supports decrypting functionality. Archivestorage 1007 may archive captured media content (corresponding with thefunctionality of archive database 217 for example). However, someembodiments may archive media content through a separate entity (notexplicitly shown).

While the exemplary embodiments have been discussed, the disclosure maybe configured for other devices, implementations, and/or networkingenvironments.

I claim:
 1. An apparatus comprising: at least one processor; and atleast one memory having stored therein machine executable instructions,the at least one memory and stored instructions configured to, with theat least one processor, cause the apparatus to: receive instructionsfrom a first device for capturing a scheduled transmission, wherein thescheduled transmission comprises encrypted content; based on theinstructions, capture first encrypted content, wherein the firstencrypted content is received from a second device via a network; sendthe first encrypted content to a third device to be decrypted, whereinthe third device is remotely located from the apparatus; retrieve firstdecrypted content from the third device, wherein the first decryptedcontent comprises a decrypted representation of the first encryptedcontent; and verify the scheduled transmission by comparing the firstdecrypted content to expected content.
 2. The apparatus of claim 1,wherein the at least one memory and the stored instructions furthercause the apparatus to: output, for display, the first decryptedcontent.
 3. The apparatus of claim 1, wherein the instructions from thefirst device enable capture of the first encrypted content in accordancewith schedule information.
 4. The apparatus of claim 3, wherein thecapture of the first encrypted content comprises capture of the firstencrypted content in accordance with the schedule information.
 5. Theapparatus of claim 1, wherein the at least one memory and the storedinstructions further cause the apparatus to: verify the scheduledtransmission by determining that the first encrypted content comprisesan expected size and was captured within a scheduled time duration. 6.The apparatus of claim 1, wherein the received instructions specify achannel or a packet identifier (PID) for use in the capture of the firstencrypted content.
 7. The apparatus of claim 1, wherein the scheduledtransmission comprises an advertisement or video on demand (VOD)content.
 8. The apparatus of claim 1, wherein the first encryptedcontent is sent to the third device with instructions to causedecrypting of the first encrypted content.
 9. An apparatus comprising:at least one processor; and at least one memory having stored thereinmachine executable instructions, the at least one memory and storedinstructions configured to, with the at least one processor, cause theapparatus to: receive instructions from a first device for capturing ascheduled transmission, wherein the scheduled transmission comprisesencrypted content; capture first encrypted content received from asecond device via a network; send the first encrypted content to a thirddevice to be decrypted; retrieve first decrypted content from the thirddevice, wherein the first decrypted content comprises a decryptedrepresentation of the first encrypted content; and verify the scheduledtransmission by outputting, for display, at least a portion of the firstdecrypted content.
 10. The apparatus of claim 9, wherein the at leastone memory and the stored instructions further cause the apparatus to:store the first encrypted content; and capture second encrypted contentreceived from the second device, wherein the first encrypted content issent responsive to the capture of the second encrypted content and thestored instructions further cause the apparatus to send the secondencrypted content to the third device.
 11. The apparatus of claim 9,wherein the at least one memory and the stored instructions furthercause the apparatus to: verify the scheduled transmission by determiningthat the first encrypted content comprises an expected size and wascaptured within a scheduled time duration.
 12. The apparatus of claim 9,wherein the received instructions specify a channel or a packetidentifier (PID) for use in the capture of the first encrypted content.13. The apparatus of claim 9, wherein the scheduled transmissioncomprises an advertisement or video on demand (VOD) content.
 14. Theapparatus of claim 9, wherein the first encrypted content is sent to thethird device with instructions to cause decrypting of the firstencrypted content.
 15. A system comprising: a first computing device; asecond computing device; and a third computing device, wherein the firstcomputing device comprises one or more non-transitory computer readablemedia storing one or more computer-executable instructions that, whenexecuted by the first computing device, cause the first computing deviceto: receive instructions from the second computing device for capturinga scheduled transmission, wherein the scheduled transmission comprisesencrypted content; based on the instructions, capture first encryptedcontent, wherein the first encrypted content is received from a fourthcomputing device via a network; send the first encrypted content to thethird computing device to be decrypted, wherein the third computingdevice is remotely located from first computing device; retrieve firstdecrypted content from the third computing device, wherein the firstdecrypted content comprises a decrypted representation of the firstencrypted content; and verify the scheduled transmission by comparingthe first decrypted content to expected content.
 16. The system of claim15, wherein the one or more non-transitory computer readable mediastoring the one or more computer-executable instructions, when executedby the first computing device, further cause the first computing deviceto: verify the scheduled transmission by determining that the firstencrypted content comprises an expected size and was captured within ascheduled time duration.
 17. The system of claim 15, wherein the one ormore non-transitory computer readable media storing the one or morecomputer-executable instructions, when executed by the first computingdevice, further cause the first computing device to: output, fordisplay, the first decrypted content.
 18. The system of claim 15,wherein the one or more non-transitory computer readable media storingthe one or more computer-executable instructions, when executed by thefirst computing device, further cause the first computing device to:store the first encrypted content; and capture second encrypted contentreceived from the fourth computing device, wherein the first encryptedcontent is sent responsive to the capture of the second encryptedcontent and the one or more computer-executable instructions, whenexecuted by the first computing device, cause the first computing deviceto send the second encrypted content to the third computing device. 19.The system of claim 15, wherein the one or more non-transitory computerreadable media storing the one or more computer-executable instructions,when executed by the first computing device, further cause the firstcomputing device to: send instructions to the third computing device tocause decrypting of the first encrypted content.
 20. The system of claim15, wherein the first computing device, the second computing device andthe third computing device are components in a hybrid fiber coaxialcable (HFC) access network.