Method and system for encrypting and storing content to a user

ABSTRACT

Systems and methods are provided for encrypting content sent to a user. The user terminal is assigned a serial number. When content is received by the user terminal, it is encrypted and the serial number is embedded into the encrypted content. The content is decrypted if the serial number embedded in the encrypted content is the serial number associated with the user terminal. Content may also be simultaneously stored and displayed.

CROSS REFERENCE TO RELATED APPLICATIONS

This application is related to and claims priority to U.S. ProvisionalApplication No. 60/222,804 filed Aug. 3, 2000, and entitled, “UniversalDigital Tuner System for Personal Computers.” This application isrelated to two applications filed simultaneously herewith entitled,“Method and System for Program Guide Delivery,” and “Method and Systemfor Controlling Content to a User.” The above applications are herebyincorporated by reference herein in their entirety.

BACKGROUND OF THE INVENTION

1. Field of the Invention

The invention relates to a system and method for encrypting content sentto a user. Content includes any electronic file or application,including video, audio, datacast, video games, and other computerprograms. More specifically, the invention relates to software forencrypting packets received at a user terminal and restrictingdecryption of the packets to the user terminal where the packets werereceived and encrypted.

2. Description of the Background

Media content is sent to users in a variety of methods. For example,terrestrial television signals are broadcast through the airwaves usinga radio frequency signal, which is received by a user with a receiverconnected to a television display. A terrestrial television receiverincludes an antenna for receiving the signal, which must be placed in aposition where it can receive the signals. Television reception from aradio frequency signal is often poor if the user is located far from thesignal broadcast or if the user has difficulty placing the antenna inthe correct position to receive the signal. Radio frequency signalsreceived by a television set are also sent to all television receiversin a geographic area, and therefore it is not possible to control whichusers have access to specific media content. It is also difficult tomonitor what content users are viewing.

Cable broadcasts employ a path to a user terminal without many of theinterferences of terrestrial television. Satellite offers a digitalrepresentation of a signal with more of a line-of-sight path to the userterminal. As used herein, a “user terminal” is an electronic device forreceiving media content such as a television, personal computer (“PC”)or set top box. Cable and satellite broadcasters are also able controlwhich users have access to specific content. Cable and satellitebroadcast signals may be encrypted, or “scrambled,” such that only userswith a de-encryption code or “key” may view the content.

By controlling which users are allowed to view content, cable andsatellite broadcasters are able to charge users based on the contentthat the viewer wishes to receive. For example, cable and satelliteproviders often charge a set periodic fee, normally a monthly fee, for acontent package. Each content package contains a specified number ofchannels to which the user is given access for a set fee. In addition,cable and satellite broadcasters can charge users to see a singleprogram. In other words, if a user wants to see a specific movie, he orshe can order the movie on a “pay-per-view” basis.

Such present day conventional televisions use, for example, NTSC or PALsystem signals, and provide fairly good color pictures if receivingconditions are good. Such pictures, however, do not come close to havingthe sharpness, realism and visual impact as might be found, for example,in a motion picture film or a magazine-quality picture. To providedramatically better television picture quality, experimental studieshave been performed and components have been developed in an attempt toprovide digital television pictures that approach the quality of a35-millimeter color film. Such high-resolution television had beendeemed especially advantageous for use, for example, in wide-screentheater and home television projection, and for theatrical motionpicture production and projection using magnetic tape instead of film.

Several High-definition Digital Television, i.e., “HDTV” systems havealready been proposed, the parameters of which are generally disclosedin a number of articles. In such systems, the lines per frame range from1023 to 2125, the aspect ratios (picture width to picture height) rangefrom 4:3 to 16:9 and luminance bandwidths range from 20 to 50 MHz.Recommendations have been made that an HDTV signal should be capable ofstandards conversions that would provide service to NTSC, PAL and SECAMdomestic services.

Other techniques labeled as either high-definition or high-resolutiontelevision systems have modified the transmission of the conventionaltelevision signal to, for example, provide increased horizontal lineresolution or better luminance resolution with less objectionablesub-carrier pattern.

Yet still another technique for improving the horizontal and verticaldefinition and reducing low frequency flicker in a conventional pictureinvolves using digital signal processing technologies. Offset samplingis used to improve horizontal definition, and a double-rate stored imagereadout at the receiver selects the appropriate signal portions tosubjectively increase the vertical definition and reduce low frequency(25 Hz) flicker.

Because of these efforts, high-definition digital television signals mayeventually be delivered as the standard throughout the United States.

Like a standard television signal, HDTV may be broadcast over radiofrequency (“RF”) airwaves, cable or satellite. However, to view an HDTVbroadcast, users must buy an HDTV display and HDTV tuner. HDTV's areprohibitively expensive for many users when compared to standardtelevision sets.

Simultaneously with the developments in high definition television,there has been an explosion in use and delivery of information, images,etc. through the Internet. As Internet broadband applications havegrown, there has been a convergence between the Internet andconventional television. Thus, it is foreseen that eventuallyconventional television programming and permutations thereof, will bedelivered to consumers through the Internet directly via broadbandconnectivity onto their computer monitor.

In addition, techniques are being developed to increase user controlover the display of media content. One system currently available underthe brand name “Tivo™ receives a standard television signal,simultaneously stores and displays the signal, and accepts user inputssuch that the broadcast signal may be paused, rewound, or replayed basedon user inputs. The system converts a standard television signal intoMoving Pictures Experts Group (“MPEG”) format and parses the MPEG streaminto video and audio components. The audio and video components arestored and then reassembled and decoded for delivery to a televisionreceiver for display. The system accepts inputs from a user whichcontrols when the stored, disassembled MPEG stream is reassembled,decoded and displayed. Such a system is described in U.S. Pat. No.6,233,389, which is hereby incorporated in its entirety by reference.However, this technique is not applicable to a digital mediaenvironment.

In addition, current content distribution does not provide adequatecontrol to send specific content to specific users and encrypt thecontent at the user level to avoid unauthorized distribution. These andother problems are avoided and numerous advantages are provided by thesystem and method described herein.

SUMMARY OF THE INVENTION

In accordance with the invention, systems and methods for encryptingcontent received by a user terminal are provided to enable personalcomputers (PCs) to tune, receive, record, encrypt, and display digitaltelevision, including HDTV on their computer monitor, or to a connecteddigital display. The system includes a web portal, server database, andclient application for control, interaction, and communication betweenand across the Internet, analog and digital transport streams (allaudio, video, and data transport streams), and the PC. A method forencrypting the content after it is sent to the user terminal isprovided. The user terminal has a serial number associated therewith.The encrypted content has a user serial number embedded such that thecontent is decrypted only if the serial number of the user terminaldecrypting the content is the same as the user terminal that encryptedthe content.

In one aspect, a user terminal is assigned a serial number. The serialnumber is a unique identifier. The user terminal receives and encryptscontent. The user terminal also embeds the serial number in theencrypted content. The content is decrypted if the serial numberembedded in the encrypted content is the serial number associated withthe user terminal.

The serial number may be embedded in a packet “tag.” As used herein, theterm “tagging” means a marker inserted into data or into the packet ID.A packet can be tagged with various types of information, including theserial number(s) of users who have the ability to view the content ofthe packets. A packet is a short block of data transmitted in a packetswitching network environment. “Packet switching” is a protocol in whichdata bits are organized in packets before it is routed. Each packet isthen transmitted individually and can follow different routes to itsdestination. Once all the packets forming a message arrive at thedestination, they are recompiled into the original data. The destinationof the data is contained in the packet ID. When reassembled, the packetsinclude content. The term “content” refers to any electronic file orapplication, including video, audio, datacast, video games, and othercomputer programs.

In another aspect, the user terminal encrypts the content by wrappingthe content. “Wrapping” refers to using a first piece of code, or a“wrapper,” which is combined with a second piece of code to determinehow the first code is executed. The wrapper acts as an interface betweenthe second code and the first “wrapped” code. A wrapper adds security,e.g. to prevent a calling program from executing certain functions.Thus, the wrapped code can only be accessed via the wrapper. In yetanother aspect, the user terminal encrypts the content by scrambling thecontent.

In still another aspect, the user terminal stores the content.Preferably, the user terminal simultaneously stores and displays thecontent. More preferably, the user terminal displays the content at anypoint in time after it has been stored.

In yet another aspect, a system for encrypting content to a user isprovided. The system comprises a user terminal, content receivable bythe user terminal and a processor module configured to implement themethod described above.

The invention provided encrypts content on a user terminal such thatonly the user terminal that received and encrypted the content maydecrypt the content. Therefore, content cannot be copied and distributedoutside the user terminal, for example, with the user serial numberwhere the content was originally received and encrypted.

These and other advantages will become apparent to those of ordinaryskill in the art with reference to the detailed description anddrawings.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a block diagram of an embodiment of a system.

FIG. 2 is a block diagram of a network of user terminals connected bythe Internet to the server.

FIG. 3 is a block diagram of an embodiment of a system.

FIG. 4 is a flow diagram of an embodiment of the user terminal showingsteps for receiving, viewing, and recording content.

FIG. 5 is a block diagram of the encryption elements.

FIG. 6 is a block diagram of the decryption elements.

FIG. 7 is a block diagram of an embodiment of a system.

FIG. 8 is a flow diagram of an embodiment of the user terminal.

DETAILED DESCRIPTION

Systems and methods are provided for encrypting the content sent to auser. Digital content is sent in packets, which include a packet ID andcontent. The packet ID is tagged, or marked with a packet tag by abroadcaster or other computer server to enable specific users to viewthe content. The packets are sent by either a computer server or abroadcaster to the user terminal. The “packet tag” is an identifier thatmarks and identifies the content associated with the packet. The packettag may also include information about the user terminal to which it issent, such as a user serial number associated with the user terminal.The packet tag is used by software applications, or “modules,” forcontrolling the content at the user terminal. The software applicationsenable user viewing permissions according to the packet tags, which mayinclude providing access to a decryption algorithm if the user serialnumber is included in the tag, and recording information about thecontent if the content is viewed or read by the user terminal.

As used herein, a “module” refers to a software program, application,routine, or subroutine, or a programmable processor or chip. As would beunderstood by one of ordinary skill in the art, modules may beconfigured in many combinations to accomplish the same function. Forexample, an example of a software module is any block of code that maybe logically grouped together and may or may not use the conventionalsubroutine interfaces as defined by typical programming languages. Aprogram routine or subroutine is generally understood as a stylisticconvention of programming, and thus different routines or subroutinesmay be written in multiple combinations and accomplish the samefunction. As used herein, a “module” includes any block of code orprogrammable processor or chip having a function that may be logicallygrouped together regardless of whether conventional subroutineinterfaces as defined by typical programming languages are used orspecific processors or chip configurations are used.

FIG. 1 is a block diagram of a system according to the invention. Thesystem includes a broadcast station 11. The broadcast station 11 sendscontent to a user terminal 13. The content is broken into packets, eachhaving a packet ID containing a destination address, and sent to theuser terminal 13. The content includes any electronic file orapplication, including video, audio, datacast, video games, and othercomputer programs. Preferably, the content is in motion picture expertgroup (“MPEG”) format. As used herein, “MPEG” includes any version ofMPEG format, including MPEG2 format.

The user terminal 13 includes a hardware serial number that identifiesthe hardware included in the user terminal 13. The user terminal 13 isin communication with a web portal to the Internet 15. The user terminal13 is a personal computer (“PC”) or a set top box or other electronicdevice for receiving content. In addition, any computer network such asa local area network (“LAN”) or wide area network (“WAN”) may besubstituted for the Internet 15.

The user terminal 13 is in communication with a server 17 through theInternet 15. As will become better understood by the followingdiscussion, the server contains information about users such as userserial numbers and subscription information. The subscriptioninformation includes the content ordered by the user, for example,specific channels, “pay-per-view” programs, or video games. Thesubscription information also includes whether the user has paid for thecontent or is past due on payments.

Alternatively, content may be sent by other means, for example, cabletelevision (“CATV”), satellite television (“SATV”), or the world wideweb.

FIG. 2 is a block diagram of a network of user terminals 13 a–13 nconnected by the Internet 15 to the server 17. The server 17 is incommunication with a network console 21. The network console acceptsinputs from an administrator. The inputs include user information andcontent information.

FIG. 3 is a detailed block diagram of an embodiment of a system inaccordance with the invention. The user terminal 13 is in communicationwith the server 17 through the Internet 15.

The server 17 includes a serialization module 45. The serializationmodule 45 includes a list of the user serial numbers, and informationabout each serialized receiver. The serialization module 45 performsauthorization checks by checking if the user serial number correspondsto a user that has access to certain content or content information. Thesubscription management module 47 contains user information. The userinformation includes the subscription ordered or paid for by the userand a corresponding user serial number. The server 17 also includes aprocess request module 49 and an execute request module 51. The processrequest module 49 receives requests from a user or an administrator toenable or disable content viewing permissions. The process requestmodule 49 includes processing payment information, such as credit cardsales, from the user. The execute request module 51 performs the usersrequest if the user has properly paid for the requested service. Theexecute request module 51 sends information to the user terminal 13through the Internet 15. The information sent by the execute requestmodule 51 includes content schedules and user viewing permissionenablement information. The processing and execution of requests will bebetter understood by the following discussion.

The server 17 is in communication with a secondary server 31. Theexecute request module 51 obtains information regarding schedules anduser viewing information from a secondary server 31. The secondaryserver 31 may be included in the same physical server machine as theserver 17 or the secondary server 31 may be a separate machine. Thesecondary server includes an encryption control module 31, a remoteon/off module 55, a data mining module 57, and an application brandingmodule 59. The secondary server may include other modules 63.

The encryption control module 31 sends encryption keys to the userterminal 13 to enable viewing permissions. For example, the userrequests a specific program (“content”), and sends this information tothe process request module 49. The execute request module 51 requeststhe appropriate encryption keys from the encryption control module 31 toenable the user viewing permission. The execute request module 51 sendsthe appropriate encryption key to the user terminal 13. Preferably, theencryption key includes the user serial number such that the encryptionkey only works if used by the user terminal corresponding to the userserial number.

The remote on/off module 55 sends information to the user terminal 13 toturn viewing permission on or off remotely. For example, anadministrator can terminate a user's viewing permission by entering therequest into the process request module 49. The execute request module51 communicates with the remote on/off module 55 to turn off all of theuser's viewing permissions. The remote on/off module communicates withthe user terminal 13 via the Internet or via datacast to either deletecontent files, delete applications for viewing the content files, or todisable the encryption keys.

The data mining module 57 receives information about user viewing habitsand subscription information and searches for relationships among thedata collected. The data mining module 57 may use conventional analysistechniques to monitor data collected. For example, when the user viewsspecific content from the user terminal 13, information about thecontent viewed is sent to the server 17 by the Internet 15 and stored bythe server 17. The information about the content viewed includes thecontent and the time the content was viewed. This information may becollected about many user terminals. The data mining module 57 receivesthe information and analyzes it for relationships. For example, the datamining module 57 might determine that users who view stock car racesregularly are also likely to view a high number of symphony concerts.This information could be of interest to advertisers, who might havebeen unaware of the correlation between stock car racing and symphonyconcert viewers. Based on such a correlation, advertisers may decide toadvertise stock car racing and related merchandise during symphonyconcert broadcasts.

The application branding module 59 communicates branding information tothe user terminal 13. The branding information includes whichcommercials should be sent to the user terminal 13 and whichadvertisements should be displayed on the user terminal 13. The brandinginformation may be based on instructions from an administrator to theserver 17 and can include correlations derived from the data miningapplication 57. For example, an administrator can input a request to theprocess request module 49 to have a banner offering stock car racingmerchandise for sale displayed on the user terminal 13 if the userwatches more than a predefined number of stock car races.

The server may include other modules 63 for processing and analyzingdata received from the user terminal 13.

The user terminal 13 displays a graphical user interface (“GUI”) 33which displays information to a user and receives inputs from a user.The user terminal includes a scheduling module 37. The scheduling module37 includes information about the content sent to the user terminal 13and a display mechanism for showing schedules of content on the GUI 33.The content information includes the schedule of content, descriptionsof content, and related web sites. The display mechanism shows aschedule of content on the GUI 33 and may include links to web sitesrelated to the content displayed.

The viewing module 39 displays content to the user on a display or GUI33. Content, which comprises tagged packets, is viewed by the viewingmodule 39, and the packet information is sent from the user terminal 13to the server 17 by the Internet 15. As previously discussed,information about the viewed content may be analyzed by the server 17,and more specifically, by the data mining module 57.

The organizing module 41 organizes content based on user specifications.For example, the user may enter a request through the GUI 33 to see aschedule of every stock car race available. The organizer module 47would display such a schedule.

The customizing module 43 customizes the content based on userspecifications. The customizing module accepts inputs from the user todefine search and query functions. For example, a user can definecriteria and the customizing module 43 will search the contentinformation for content that matches the user-defined criteria.

The tuner module 44 tunes broadcasts received by the user terminal 13.Tuning refers to choosing a particular channel or specific content to bedownloaded or received by the user terminal 13. The operation of thetuner module is described in greater detail in FIG. 8 and theaccompanying discussion.

The user terminal 13 may include additional modules 61 for controllingand viewing content.

FIG. 4 is a block diagram of an embodiment of the user terminal 13showing steps for receiving, viewing, and recording content. The userterminal 13 includes a GUI 33. Analog content 93 is received and decodedat step 95. The analog content 93 is then viewed at step 97. Digitalcontent 73 is also received by the user terminal 13. The user can inputinstruct the GUI to either view the digital content 73 at step 75,record the digital content 73 at step 77, “time shift” the digitalcontent 73 at step 79, or playback the recorded digital content 73 atstep 81. The user chooses the input options from a menu displayed by theGUI. The user chooses either step 75, 77, 79, or 81 by entering anoption into the menu from a keyboard, touch sensitive screen, or mouse.

If the user instructs the GUI 33 to view digital content at step 75, thesignal is decoded at step 91 and viewed at step 97. If the userinstructs the GUI 33 to record digital content at step 77 or to timeshift the content at step 79, the content is encrypted at step 83 andstored as a file in file storage 85. When the user instructs the GUI 33to play back the content at step 81, the content is retrieved from filestorage 85 and decrypted at step 87. The decrypted file is digitallydecoded at step 91 and viewed at step 97. Alternatively, the encryptionand decryption at steps 83 and 87, respectively, may be omitted. If theencryption and decryption steps are omitted, the content is stored as afile in file storage 85 without being encrypted at step 83. Unlike themethods and systems described in U.S. Pat. No. 6,233,389, the content isnot parsed into audio and video signals. The file is decoded at step 91without being decrypted at step 87 and viewed at step 97, subject to theuser's choice in input options to view the digital content 73 at step75, record the digital content 73 at step 77, “time shift” the digitalcontent 73 at step 79, or playback the recorded digital content 73 atstep 81.

FIG. 5 is a block diagram of the encryption elements. A tuner 101receives content, preferably from a broadcaster. An example of a tunerfor receiving content on a PC is a digital television PC (“DTVPC”) cardsuch as a DTVPC card available under the trade name Janus. The signal issent to a demodulator 103 where it is downloaded into a bit stream. Thebit stream is put in a wrapper 105. A wrapper is data that precedes orframes the main data or program. The wrapper sets up another program sothat the data can be read or so that the program can run successfully.

The bit stream is sent as input to a capture filter 107. The capturefilter 107 identifies bits from the demodulator 103 before sending thebits to the appropriate destination. The bits are recorded or capture bya capture bit stream module 109. Bits are removed from the bit stream bya remove bits module 111. By the term “removed,” it is meant that bitsare scrambled according to the encryption algorithm.

An encryption algorithm module 113 retrieves an encryption algorithmfrom electronic programmable read only memory (“EPROM”) 115. As would beunderstood by one of ordinary skill in the art, EPROM is typicallyincluded on a processor. In the embodiment illustrated in FIG. 5, EPROMis included on the user terminal. The encryption algorithm module 113encrypts the files, which are then sent to a Peripheral ComponentInterconnect (“PCI”) 117 for storage on a hard drive 119.

FIG. 6 is block diagram of the elements of the decryption process. Theencrypted files are retrieved from the hard drive 119 through a PCI 117.The wrapper 105 is removed by the following elements. The encryptedfiles are sent as input to a capture filter 107. This capture filter 107identifies bits from the point of origin, such as a storage medium,before sending the bits to a destination, such as a decoder. Thedecryption algorithm restoration module 121 retrieves the decryptionalgorithm from the EPROM 115. The bits are re-inserted by the re-insertbits module 123. By the term “re-insert,” it is meant that bits areunscrambled, or placed back in the order of the bit stream prior toencryption.

A DTV decode module 125 decodes the decrypted bits into audio bits131,video bits 129 and data bits 127. The audio bits 131,video bits 129and data bits 127 may be viewed at the user terminal.

FIG. 7 is a block diagram of an embodiment of the system. Content,“video-on-demand” 201, computer games 203, and other types of software205 are sent by an Internet connection to a server 17. Alternatively,the video-on-demand” 201, computer games 203, and other types ofsoftware 205 may be sent to a broadcaster 11. The “video-on-demand” 201,computer games 203, and other types of software 205 is then sent to theuser terminal 13 from the server 17 by an Internet connection, or fromthe broadcaster 11 by terrestrial means. Terrestrial means includescable, satellite, and radio frequency (RF) signals.

The server 17 includes a header encryption module for encrypting thecontent into encrypted packets. The server 17 and the broadcaster 11 arein communication by an Internet connection. Therefore, the encryptedpackets may be transferred from the server 17 directly to the userterminal 13, or the encrypted packets may be sent to the broadcaster 11and then sent to the user terminal 13.

The user terminal 13 is in communication with a decryption module 213.The decryption module 213 decrypts the packets such that the user canview the “video-on-demand” 201, computer games 203, and other software205. Preferably, the header encryption includes a tag with the userserial number. The decryption module 213 checks the header encryptionfor the tag with the user serial number. If the user serial number isnot included in the tag, the decryption module 213 does not decrypt thepacket. Alternatively, the decryption module 213 can delete packets thatdo not include a tag with the user serial number.

FIG. 8 is a flow diagram of an example of the user terminal's processingof content packets through the tuner module. The relationship of thetuner module 44 in a system is depicted in FIG. 3. At step 141, the userterminal receives encrypted, tagged packets. The tag includes the serialnumbers for users who have permission to view the content in the packet.The user terminal receives user input choosing which content to view orrecord at step 143. The user input may be received through conventionalmeans, such as a GUI, keyboard, mouse, or touch screen. The input isreceived by the tuner module.

The tuner module checks the packet ID tag for the serial number of theuser terminal at step 145. If the user serial number is not in thepacket ID tag, the tuner module ends at step 155 without displaying orrecording the content associated with the packet.

If the user serial number is in the packet ID tag, the tuner modulede-encrypts the packet at step 147, reassembles the packet bits at step149, and displays the packet at step 151. At step 153, the tuner modulesends the user serial number and packet information to the server. Thepacket information includes the information identifying the contentassociated with the packet and the time at which the user viewed thecontent. The tuner module is finished at step 155.

It will be apparent to those with skill in the art that there are manyalterations that may be made in the embodiments of the inventiondescribed above without departing from the spirit and scope of theinvention. For example, there are many ways that circuits and electronicelements may be combined to implement the system and method describedherein in various systems and hardware environments. There are similarlymany ways that independent programmers might provide software to providethe functionality associated with the present invention as taught hereinwithout departing from the spirit and scope of the invention.

Having thus generally described the invention, the same will becomebetter understood from the following claims in which it is set forth ina non-limiting manner.

1. A method for encrypting content to a user, comprising: receivingcontent at a user terminal, said content being a broadcast medialsignal; demodulating the broadcast signal and creating a downloadablebit stream; at the user terminal, placing the downloaded bit stream intoa wrapper; before storage, randomly recovering bits according to apredetermined unique encryption algorithm with the user terminalassigned a unique identifier that dictates its unique encryptionalgorithm; embedding the terminal identifier and encrypting it withinthe encryption algorithm and storing it within the content when stored;and decrypting the content if the terminal identifier embedded in theencrypted content is the terminal identifier associated with the userterminal.
 2. The method of claim 1, wherein said encrypting furthercomprises: wrapping the content.
 3. The method of claim 1, wherein saidencrypting further comprises: scrambling the content.
 4. The method ofclaim 1, wherein the content comprises bits.
 5. The method of claim 1,further comprising: storing the content.
 6. The method of claim 1,further comprising: simultaneously storing and displaying the content.7. The method of claim 1, further comprising: simultaneously storing anddisplaying the content receiving commands from a user, wherein thecommands affect the time at which the content is displayed.
 8. A methodfor staring and retrieving content to a user, comprising: receivingcontent in the form of a digital media signal at a user terminal, saidcontent being a broadcast signal; demodulating the broadcast signal andcreating a downloadable bit stream; at the user terminal, placing thedownloaded bit stream into a wrapper; before storage, randomly removingbits according to a predetermined unique encryption algorithm with theuser terminal assigned a unique identifier that dictates its uniqueencryption algorithm; embedding the terminal identifier and encryptingit within the encryption algorithm and storing it within the contentwhen stored; simultaneously storing and displaying the content at a userterminal; and receiving commands from a user, wherein the commandsaffect the time at which the content is displayed.
 9. A system forstoring and retrieving content to a user comprising: a user terminal; atuner in communication in said user terminal configured for receivingcontent which is a broadcast media signal, in the form of a digitalmedia signal; a processor module in communication with said userterminal, wherein the processor module is configured to assign a uniqueidentifier to said user terminal, receive said content, encrypt saidcontent, embed the unique identifier in said content at the userterminal, and decrypt said content if the unique identifier embedded inthe encrypted content is the unique identifier associated with the userterminal, said processor being further configured for prior toencrypting said content, demodulating the broadcast media signal andcreating a downloadable bit stream, at the user terminal, placing thedownloadable bit stream into a wrapper, before storage, randomlyremoving bits according to a predetermined unique encryption algorithmwith the user terminal assigned the unique identifier that dictates itsunique encryption algorithm, and embedding the terminal identifier andencrypting it, within the encryption algorithm and storing it within thecontent for storage therewith; a storage device for in communicationwith said user terminal, for storing the content simultaneous to thedisplaying of the content; a display in communication with said userterminal for displaying the content; and wherein said user terminal isconfigured for receiving commands from a user, wherein the commandsaffect the time at which the content is displayed at the user terminal.10. A system for encrypting content to a user, comprising: a userterminal; content which is a broadcast media signal receivable by saiduser terminal; and a processor module in communication with said userterminal, wherein said processor module is configured to assign a uniqueidentifier to said user terminal, receive said content, encrypt saidcontent, embed the unique identifier in said content at the userterminal, and decrypt said content if the serial number embedded in theencrypted content is the serial number associated with the userterminal, said processor module further configured prior to encryptingsaid content, for demodulating the broadcast media signal and placingthe downloadable bit stream into a wrapper, before storage, randomlyremoving bits according to a predetermined unique encryption algorithmwith the user terminal assigned a unique identifier that dictates itsunique encryption algorithm, and embedding the terminal identifier andencrypting it within the content for storage therewith.
 11. The systemof claim 10, wherein said processor module is further configured to wrapsaid content.
 12. The system of claim 10, wherein said processor moduleis further configured to scramble said content.
 13. The system of claim10, wherein said content comprises bits.
 14. The system of claim 10,wherein said user terminal further comprises: a storage drive incommunication with said processor module, wherein said processor moduleis further configured to store said content on said processor module.15. The system of claim 14, wherein said processor module is furtherconfigured to simultaneously store and display said content.