System and method for controlling access to protected content

ABSTRACT

A receiver includes a first interface to receive content, a second interface to be coupled to a device, and a processor to determine whether the device is a compliant device and to prevent decryption of at least a portion of the content received through the first interface when the device is determined to be a non-compliant device.

FIELD

One or more embodiments described herein relate to content protection.

BACKGROUND

Various forms of digital and multimedia content can only be accessed byauthorized (or so-called compliant) devices. When authorized, decryptiontechniques are used to give users access on a temporary or permanentbasis. However, when a device cannot be authenticated, access is blockedin order to protect the copyright of the content provider. In spite ofon-going efforts to develop more sophisticated security schemes,backdoor or unforeseen loopholes exist that allow protected content tobe illegally accessed.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 shows an example of a system for downloading protected content.

FIG. 2 shows one embodiment of a receiver of protected content.

FIG. 3 shows a method for controlling access to protected content.

FIG. 4 shows another method for controlling access to protected content.

FIG. 5 shows another embodiment of a receiver of protected content.

FIG. 6 shows another method for controlling access to protected content.

FIG. 7 shows another example of a system for downloading protectedcontent.

FIG. 8 shows an embodiment of a device to control decrypting of content.

DETAILED DESCRIPTION

FIG. 1 shows an example of a system for downloading content. The systemincludes a content provider 10, a communications network 20, a receiver30, and a non-compliant device 40 in communication with the receiver.

The content provider 10 may provide any type of content including datasubject to copyright protection and/or information that conforms to aspecific type of format. One type of content includes data subject tohigh-bandwidth digital copyright protection (HDCP). This data mayinclude pre-recorded or live music, image files, video files, chatand/or video conferencing images, games, digital documents, electronicbooks, ring tones, podcasts, applications, or other types of programs ordigital content.

The video files may be broadcast, cable, or satellite televisionprograms, Moving Picture Expert Group (MPEG) files, AVI files, Flashfiles, or files that conform to other types of formats including but notlimited to High-Definition Multimedia Interface (HDMI), Digital VisualInterface (DVI), or other high-definition or video formats. The audiofiles may be Moving Picture Experts Group Layer-III (MP3) files, WindowsWave (.Wav) files, or ones that conform to other audio file formats.

The data from the content provider may be made available for downloadfor a one-time price or subscription fee, but payment is not necessarilyrequired. Also, in other embodiments, the data may be subject to formsof content protection different from HDCP including but not limited toDigital Transmission Content Protection (DTCP), Content Protection forRecordable Media (CPRM), Content Protection for Pre-Recorded Media(CPPM), Conditional Access (CA) technologies, Content Scramble System(CSS), and Digital Rights Management (DRM).

In order to protect the content, the content provider may include orhave access to various types of encryption software. This software mayencrypt content based on various digital certificates, public, and/orprivate keys that conform to or otherwise correspond to the formats andfile types mentioned herein.

The content provider may include or otherwise be coupled to atransmitter for transmitting the protected content through the networkafter encryption and authentication has taken place. According to oneexample, the transmitter may be an HDCP/HDMI interface for transmittingvideo content to a mobile phone.

The communications network 20 may be any type of network including theInternet, a mobile communications network, a satellite network or acombination thereof. The type of connection 15 to the content providermay depend on the type of network. For example, if the network is theInternet, connection 15 may be a wireless connection or a hardwiredconnection such as but not limited to a cable or fiber-optic connection.Alternatively, the connection may be a wireless connection if thenetwork is a satellite or mobile network.

The receiver 30 may be user terminal such as a mobile phone, smartphone, personal digital assistant, handheld computer, mobile tablet orpad, notebook or desktop computer, digital video recorder (DVR), or anyother electronic device equipped with communication capability forreceiving downloaded information. In other embodiments, the receiver maybe a set-top box from a cable or satellite company, which box is coupledto a monitor, television, projector, speakers or other device foroutputting the downloaded content. In other embodiments, the receivermay be any one of a number of commercially available game consoles. Theconnection 25 to the communication network may be any of the same typesthat correspond to connection 15.

The non-compliant device 40 is a device having a data storage capabilityand/or an ability to display, output, or otherwise reproduce theprotected content transmitted to the receiver from the content provider.Device 40 is unauthorized in the sense that it is one which has not beenauthenticated for access to receive the protected content transmitted tothe receiver. As will be explained in greater detail below, the user ofthis device may therefore be able to view, use, or otherwise obtainaccess to the protected content in violation of copyright or otherprotection laws.

Examples of the non-compliant device include an external display device,a flash memory drive, hard-disk drive, digital video recorder (when, forexample, the user terminal is a set-top box coupled to a television), amobile terminal (e.g., phone, smart phone, PDA, iPod, iPhone, etc.), ora notebook or other type of computer.

The non-compliant device 40 may be coupled to the receiver throughconnection 35, which may be a short-range wireless connection such as awireless fidelity (WiFi), Bluetooth, or wireless local area network(WLAN) link, removable or local interface connections such as aUniversal Serial Bus (USB) or Firewire interface, Serial AdvancedTechnology Attachment (SATA) interface, a high-definition cable such asan HDMI cable, or any one of a number of other types of serial orparallel data connections.

In some systems, a content receiver such as a user terminal may continueto decrypt protected content when an unauthorized (non-compliant) deviceis attached to the terminal after the user terminal has beenauthenticated (determined to be compliant) by the contentprovider/transmitter and/or the receiver and after the content provider(or other content source) and/or the receiver has begun to encryptand/or transmit the protected content. This situation may allow theattached device to access the protected content through connection 35 inspite of is non-compliant status, which would amount to theft of thecopyrighted or protected material.

This loophole may also potentially allow a display driver of the userterminal (e.g., one residing in the operating system (OS) space) to beused by the attached device to display the content that it illegallyacquired. For example, if the authorized device is a flash memory, adisplay driver of the terminal may be used to display the protectedcontent stored in the flash memory.

In accordance with one or more embodiments described herein,unauthorized access and/or display of the protected content by theattached device may be prevented using a technique which has thereceiver detect attachment of the unauthorized device as a condition todecrypting (or as a condition to continuing to decrypt) the content.

FIG. 2 shows one embodiment of a receiver 30 that is equipped toimplement the aforementioned technique. The receiver includes a firstinterface 31, a processor 32, a second interface 33, and memory 34, andan output device 36. These elements may implement one embodiment of amethod for controlling access to protected content. Operations of thismethod are shown in FIG. 3 to be described with the receiver elements.While the receiver of FIG. 2 is suitable to implement this method, adifferent type of receiver may be used in other embodiments.

The first interface 31 is compatible with the format of the data to bereceived from the content provider and the network to which the receiveris coupled. According to one example, the first interface may beHDCP/HDMI compatible as is the transmitter in or coupled to the contentprovider used to transmit protected content. In this case, interface 25may be an HDMI cable.

The processor 32 performs various operations including exchangingsignals with the content provider during an authentication process andcontrolling receipt and decryption of the protected content afterauthentication and detection of the non-compliant status of device 40.The processor may logic to perform these and other functions to bediscussed. This logic may be implemented in hardware, software, or acombination.

The authentication process may involve, for example, performance of ahandshake sequence with the content provider. (Block 310). Thishandshake sequence may be accomplished in several ways. One example isto perform a SIGMA session establishment. Another way involvesexchanging certificates if provision is made for a pre-shared secret keyor pre-established public/private key exchange between the serviceprovider and receiver device.

After the receiver has been authenticated, the content provider beginsto encrypt and transmit and the receiver begins to receive the protectedcontent. The protected content may be sent to the receiver, for example,in response to a request for the content from the receiver to thecontent provider. This may occur, for example, when a request sends arequest to the content provider to download a movie, video clip, musicfile, application, or other form of content. Additionally, oralternatively, the content may be scheduled to be automatically sentfrom the content provider to the receiver (e.g., in the case of asubscription or Really Simple Syndication (RSS) feed), or sent based onthe occurrence of a predetermined event in the receiver or according toa pre-programmed schedule (e.g., a record operation initiated using anelectronic program guide). Other examples may also apply.

After or during encryption, the receiver begins to receive the protectedcontent. (Block 320). A decision is then made as to whether theprotected content should be decrypted. (Block 330). In accordance withone embodiment, this decision is based on whether an external device 40has been connected (e.g., either physically or through a wireless link)to second interface 33 shortly before or after decryption of theprotected content has begun (Block 340) and whether the external deviceis detected to be a compliant device (Block 350).

In accordance one embodiment, a compliant device may be one that hasbeen authorized to receive copyright or other protected data (e.g., onethat has a license to receive this data), one that is capable ofreproducing the data in a specific format (e.g., high-definitionformat), or both. Compliance may be determined based on differentcriteria in other embodiments, e.g., whether the data is in a differentformat or is subject to a type of protection different from HDCP.

If the device is detected to be a compliant device, the processor allowsdecryption of the protected content to begin. (Block 360). The decryptedcontent may be stored in memory 34 to be output on output device 36,either immediately such as in the case of streaming content or at somelater time which may either be predetermined or in response to a usercommand. The output device may be any device capable of outputting orotherwise reproducing the decrypted content, including a display,speakers, or another type of device as previously indicated.

If the device is detected to be a non-compliant device, the processorwill prevent the decryption process from being performed. (Block 370).As indicated, in accordance with one embodiment, a device may bedetermined to be non-compliant if it is non-HDCP compliant and/ornon-HDMI compliant. The former instance may exist, for example, whenexternal device does not have a license to receive the protectedcontent. The latter instance may exist, for example, when externaldevice 40 is unable to display high-definition content. Of course, bothinstances may exist simultaneously, i.e., external device 40 may be anon-HDCP and non-HDMI compliant device.

Preventing decryption will prevent the content from being output to theuser of the receiver. To prevent this situation from happening and, atthe same time, prevent the non-compliant device from receiving theprotected content, several optional operations may be performed afterdecryption has been prevented or terminated.

For example, if the protected content is received in one (e.g.,high-definition) format, the processor may convert the content intoanother (e.g., lower-resolution) format that does not requiredecryption. (Block 380). The content in the converted format may then besend to the output device 36 for presentation to the user with orwithout it first being stored in memory. (Block 385). This conversionalleviates the need to perform decryption and allows the user to accessall or a portion of the content, albeit in a different form or format.At the same time, all or a portion of the converted content may beallowed to be transferred to or otherwise stored in the non-compliantdevice in the unprotected or converted (e.g., compatible) form orformat. (Block 390).

If a conversion to a lower-resolution or different format is notpossible, the processor may prevent any version of the data from beingtransmitted to the non-compliant device.

If an external device is not detected to be connected to the receiver inBlock 340, then the protected content is decrypted, stored in memory,and/or sent to the output device for presentation to the user. (Block395). The output device is shown as being included in the receiver ofFIG. 2. In other embodiments, the output device may be an external unitcoupled to the receiver through an appropriate link or interface.

FIG. 4 shows operations in another embodiment of a method forcontrolling access to protected content. This embodiment is similar tothe embodiment of FIG. 3 except that steps are taken to prevent thenon-compliant device from accessing, or fully accessing, the protectedcontent after decryption has already begun.

According to this alternative method, decryption of the protectedcontent begins (Block 425). Then, a determination is made as to whetherthe decryption process should be stopped. (Block 435). Decryption willcontinue if an external device is detected to be connected to thereceiver and the external device is determined to be compliant (Block460), or will continue if an external device is not detected to beconnected to the receiver (Block 495).

The decryption process will be stopped by the processor if an externaldevice is detected to be connected to the receiver and the externaldevice is determined to be a non-compliant device. (Block 470). In thiscase, the entire process may be terminated or the operations in optionalBlocks 380, 385, and 390 may be performed.

FIG. 5 shows another embodiment of a receiver that may be included inthe system of FIG. 1. This receiver includes a first interface 510, asystem controller 520, a power manager 530, a security processor 540,and a memory 550. The first interface may be coupled to thecommunications network 20 to receive protected content, and the systemcontroller may control storage of the protected content in memory and/ormay send a control signal to a display controller 560 for outputting theprotected content on a display 570. Although the display is shown asbeing an internal display, in different embodiments the displaycontroller may be coupled to an external display or other device foroutputting the protected content.

The display controller is coupled to a second interface 580 forcommunicating with external device 40. The display controller may detectwhether device 40 is a compliant device and then send a control signalto a power manager 530 indicating the same. Based on this controlsignal, the power manager sends information to a security processor 590,which controls decryption of the protected content received through thefirst interface. The system controller may communication with thesecurity processor, for example, through an inter-process communication(IPC) mechanism 595.

By way of example, the power manager may be included in the NorthComplex or Bridge of some device architectures and the system controllermay be included in the South Complex or Bridge of those architectures.

FIG. 6 shows operations included in another embodiment of a method forcontrolling access to protected content. This method may be performed bythe receiver of FIG. 5 or another device. An initial operation includesdetecting a connection of external device 40 to the second interface 580of the receiver. (Block 610). This detection operation may be performedby the display controller based on, for example, on use of a displayenable interrupt mechanism in the power unit. As previously indicated,the connection between the external device and receiver may be any oneof a number of wired or wireless connections.

Once a connection to the external device is detected, the displaycontroller 560 may generate and send an interrupt signal to the powermanager 530. (Block 620). The interrupt signal may be, for example, inthe form of a hotplug event interrupt. In response to the interruptsignal, the power manager generates a notification signal to inform thesystem controller 520 that an external device has been connected to thesecond interface. (Block 630).

The system controller performs a predetermined processing operation inresponse to the attach notification signal. (Block 640). This operationincludes determining whether a display change event notification hasbeen set or otherwise indicated. (Block 650). According to one scheme, asecurity engine may choose to ignore such interrupt notification, forexample, when not in protected-content playback mode. When this occurs,a flag can be set to prevent the system control unit (SCU) fromreceiving the interrupt notification. Alternatively, all such interruptscan be forwarded to the security engine for processing to take place.During processing, the security engine (e.g., security processor 590)may choose to do nothing in the example mentioned above.

If a display change event notification is not detected, then the systemcontroller continues to perform, for example, operations based on userinteraction or ones being performed before the attachment was detected.(Block 660).

If a display change event notification is detected, the systemcontroller sends a notification signal to the security processor 590indicating the same. (Block 670). The notification signal may be sent tothe security processor through IPC 595 or along another path. Oncereceived, the security processor performs interrupt processing in aninterrupt service routine. (Block 680).

A determination is then made as to whether external device 40 is acompliant device. (Block 690). This may involve, for example,determining whether device 40 is HDCP compliant, HDMI compliant, orboth. This determination may be made based on, for example, informationincluded in the notification signal set to the security processor fromthe system controller. Alternatively, the compliance determination maybe made based on signals sent through an established mailbox mechanismbetween the system controller and security processor.

According to another example, the security processor may determinewhether device 40 is an HDCP-compliant device by using a mailbox form ofcommunication between the security processor, system controller, andpower manager. According to this approach, the security processor sendsan interrupt to the system controller after requesting this informationusing a predetermined protocol in the mailbox. The security processormay then format this information to the power manager or other powerunit, which responds with appropriate compliance information back to thesystem controller, which then communicates this information to thesecurity processor. For example, in the case where the attached deviceis an external display, the compliance information may be a type of thedisplay, e.g., HD display or not. Of course, compliance to formats orforms of protection other than HDMI and HDCP may be determined in otherembodiments.

If the device is determined to be a non-compliant device, then thesecurity processor may set a Do_Not_DCRYPT flag to cause the securityprocessor either to prevent decryption of the protected content frombeing initiated or to stop decrypting the protected content ifdecryption has already begun. (Block 700). As a result, access to theprotected content by the device 40 may be denied, thereby preventingtheft or other forms of unauthorized access to the protected content.

After decryption is prevented or stopped, the content may be convertedto a non-protected form of content (e.g., from HDMI to lower-resolutioncontent), and this converted content may then be output on display 570and transmitted to device 40 also for display and/or storage in a mannersimilar to one or more previously described embodiments. Alternatively,if such a conversion cannot be performed, the security processor maystop transmitting content to device 40 and/or prevent any furthercommunication with this device.

Once set, the flag may be cleared in various ways. For example, the flagmay be cleared when the display controller detects that device 40 hasbeen disconnected from the receiver. In this case, the displaycontroller may generate a signal to be received by the securityprocessor for resetting the flag. Alternatively, the flag may be clearedwhen a compliant device is subsequently connected to the secondinterface of the receiver. Clearing the flag may also allow decryptingof the protected content to be completed for output on the display 570to a user.

If the device is determined to be a compliant device, the flag is notset and decryption may be initiated or allowed to continue to beperformed. The decrypted content may then be output on the display 570for viewing by a user and may also be routed to the external device 40which may also include a display for displaying the now-decryptedcontent. The content may, for example, be high-definition video or othercontent as described herein and may be stored in memory 550 in eitherencrypted or decrypted or otherwise converted form as described herein.The operations in FIG. 7 may optionally be preceded by or include anauthentication process of the receiver as a condition to receiving thecontent.

FIG. 7 shows another embodiment of a system for downloading content. Thesystem includes a content source 710, a receiver 720, and an externaldevice 730 attached to the receiver. The content source may be a set-topbox, a digital versatile disk (DVD) player, a high-definition or Blu-rayplayer, a digital video recorder, a computer game console or video card,a video camera or still camera, or another source of digital content.The receiver may correspond to and perform the functions of the receiverin accordance with any of the embodiments described herein, and the sameis true of the attached device.

FIG. 8 shows an embodiment of a device 800 to control decrypting ofcontent. The device includes an input line 801 to receive a first signalon content received from a first interface, an input line 802 to receivea second signal indicative of a connection of an external device to asecond interface 803; and a processor 804 coupled between the firstinterface and the second interface. The processor may correspond, forexample, to processor 32 in the receiver of FIG. 2 or security processor590 in the receiver of FIG. 5 or another processor.

In operation, the processor determines whether the external device is anon-compliant device after receipt of at least the second signal andprevents decryption of the content when the device is determined to be anon-compliant device. The first signal may include the content itself ora signal notifying the processor that content has been received.Furthermore, the processor may be a hardware circuit or may be aprocessor which executes a program to determine whether the externaldevice is a non-compliant device or to prevent decryption of thecontent, or both. In another embodiment, the processor may be acombination of hardware or software.

In addition, while two input lines 801 and 802 are shown, a single inputline may be used to receive the first and second signals. Moreover, thecontent may be subject to a type of digital copyright protection, and inthis case the processor may determine that the device to benon-compliant with this type of digital copyright protection.Additionally, or alternatively, the content may be a high-definitionvideo format, and in this case the processor may determine that thedevice is non-compliant with the high-definition video format.

In addition, the processor may prevent decryption of the content beforeany portion of the content is decrypted, or may prevent decryption of asecond portion of the content after a first portion of the content isdecrypted. In this latter case, the first portion of the content may bedecrypted before the processor is to determine that the external deviceis a non-compliant device.

In addition, the input line to receive the first signal, the input lineto receive the second signal, and the processor may all be located on asame chip. In this case, the input lines may be traces on the chip ordifferent input ports or leads or even the same port or lead of thechip.

In accordance with another embodiment, a computer-readable medium maystore a program for controlling a receiver. The program may be stored inmemory 34 in FIG. 2, memory 550 in FIG. 5, or another memory includingbut not limited to an internal memory of any of the processors orcontrollers mentioned heretofore.

The program may include first code to detect connection of a device tothe receiver, second code to determine the device to be a non-compliantdevice, and third code to prevent decryption of content received throughan interface when the device is determined to be said non-compliantdevice. The content may be subject to a type of digital copyrightprotection, may be in a high-definition video format, or may beconfigured in accordance with any one of the other formats or protectedforms described herein. The program may also include additional code forperforming the other operations included the embodiments describedherein.

In accordance with at least one embodiment, the decision as to whetheror not to decrypt protected content is made by the security processor,which is considered to be one of the most trusted portions of the entirereceiver and thus which provides an increased chance that no loopholecan be exploited that could result in theft or other form ofunauthorized access of protected content.

In accordance with at least one embodiment, the term “processor” may beconsidered to cover a single device or may generically be used tocorrespond to a combination of devices (e.g., display controller 560,power manager 530, security processor 590, etc.) that perform processingfunctions or other operations as described herein. Also, the term“coupling” may correspond to a direct wired or wireless connection, anindirect wired or wireless connection, or a combination thereof.

Any reference in this specification to an “embodiment” means that aparticular feature, structure, or characteristic described in connectionwith the embodiment is included in at least one embodiment of theinvention. The appearances of such phrases in various places in thespecification are not necessarily all referring to the same embodiment.Further, when a particular feature, structure, or characteristic isdescribed in connection with any embodiment, it is submitted that it iswithin the purview of one skilled in the art to effect such feature,structure, or characteristic in connection with other ones of theembodiments. The features of any one embodiment may be combined withfeatures of one or more other embodiments described herein to formadditional embodiments.

Furthermore, for ease of understanding, certain functional blocks mayhave been delineated as separate blocks; however, these separatelydelineated blocks should not necessarily be construed as being in theorder in which they are discussed or otherwise presented herein. Forexample, some blocks may be able to be performed in an alternativeordering, simultaneously, etc.

Although the present invention has been described herein with referenceto a number of illustrative embodiments, it should be understood thatnumerous other modifications and embodiments can be devised by thoseskilled in the art that will fall within the spirit and scope of theprinciples of this invention. More particularly, reasonable variationsand modifications are possible in the component parts and/orarrangements of the subject combination arrangement within the scope ofthe foregoing disclosure, the drawings and the appended claims withoutdeparting from the spirit of the invention. In addition to variationsand modifications in the component parts and/or arrangements,alternative uses will also be apparent to those skilled in the art.

We claim:
 1. An apparatus comprising: a first interface to receivecontent; a second interface to be coupled to a device; and a processorto determine whether the device is a compliant device and to preventdecryption of at least a portion of the content received through thefirst interface when the device is determined to be a non-compliantdevice.
 2. The apparatus of claim 1, wherein: at least the portion ofthe content is subject to a type of digital copyright protection, andthe processor is to determine the device to be non-compliant with thetype of digital copyright protection.
 3. The apparatus of claim 1,wherein: at least the portion of the content is in a high-definitionvideo format, and the processor is to determine the device isnon-compliant with the high-definition video format.
 4. The apparatus ofclaim 1, wherein the processor is to prevent decryption of the contentbefore any portion of the content is decrypted.
 5. The apparatus ofclaim 1, wherein: the processor is to prevent decryption of a secondportion of the content after a first portion of the content isdecrypted, and the first portion of the content is decrypted before theprocessor is to determine that the device is a non-compliant device. 6.The apparatus of claim 1, further comprising: a power manager coupled tothe processor, wherein the power manager is to send a signal to theprocessor indicative of the coupling of the device and wherein theprocessor is to determine that the device is a non-compliant deviceafter receiving the signal from the power manager.
 7. The apparatus ofclaim 1, further comprising: a controller to detect the coupling betweenthe second interface and the device, wherein the processor is todetermine that the device is a non-compliant device after the controlleris to detect the coupling between the second interface and thenon-compliant device.
 8. The apparatus of claim 1, wherein the secondinterface is coupled to the device over a wired link.
 9. The apparatusof claim 1, wherein the second interface is coupled to the device over awireless link.
 10. The apparatus of claim 1, wherein the processor is toconvert at least the portion of the content to a non-compliant formatafter the device is determined to be a non-compliant device, and whereinat least the portion of the content is to be produced through an outputdevice in the non-compliant format.
 11. The apparatus of claim 1,wherein the processor is to convert at least the portion of the contentto a non-compliant format after the device is determined to be anon-compliant device, and wherein at least the portion of the content isto be sent to the non-compliant device through the second interface inthe non-compliant format.
 12. A method comprising: receiving contentthrough a first interface; detecting coupling of a device to a secondinterface; determining the device to be a non-compliant device; andpreventing decryption of at least a portion of the content receivedthrough the first interface when the device is determined to be saidnon-compliant device, wherein the first and second interfaces areincluded within a same receiver.
 13. The method of claim 12, wherein: atleast the portion of the content is subject to a type of digitalcopyright protection, and the device is determined to be non-compliantwith the type of digital copyright protection.
 14. The method of claim12, wherein: at least the portion of the content is in a high-definitionvideo format, and the device is determined to be non-compliant with thehigh-definition video format.
 15. The method of claim 12, wherein saidpreventing includes: preventing decryption of the content before anyportion of the content is decrypted.
 16. The method of claim 12, whereinsaid preventing includes: preventing decryption of a second portion ofthe content after a first portion of the content is decrypted, whereinthe first portion of the content is decrypted before the device isdetermined to be a non-compliant device.
 17. The method of claim 12,wherein the second interface is coupled to the device over a wired link.18. The method of claim 12, wherein the second interface is coupled tothe device over a wireless link.
 19. The method of claim 12, furthercomprising: converting at least the portion of the content to anon-compliant format after the device is determined to be saidnon-compliant device; and producing at least the portion of the contentthrough an output device in the non-compliant format.
 20. The method ofclaim 12, further comprising: converting at least the portion of thecontent to a non-compliant format after the device is determined to besaid non-compliant device, and sending at least the portion of thecontent through the second interface in the non-compliant format.
 21. Adevice comprising: first logic to receive a first signal on content tobe received from a first interface; second logic to receive a secondsignal indicative of a coupling of an external device to a secondinterface; and third logic coupled between the first interface and thesecond interface, wherein the third logic is to determine whether theexternal device is a non-compliant device after receipt of at least thesecond signal and to prevent decryption of at least a portion of thecontent when the device is determined to be a non-compliant device. 22.The device of claim 21, wherein the first signal includes at least theportion of the content.
 23. The device of claim 21, wherein the thirdlogic executes a program to determine whether the external device issaid non-compliant device or to prevent decryption of at least theportion of the content, or both.
 24. The device of claim 21, wherein: atleast the portion of the content is subject to a type of digitalcopyright protection, and the third logic is to determine the device tobe non-compliant with the type of digital copyright protection.
 25. Thedevice of claim 21, wherein: at least the portion of the content is in ahigh-definition video format, and the third logic is to determine thedevice is non-compliant with the high-definition video format.
 26. Thedevice of claim 21, wherein the third logic is to prevent decryption ofthe content before any portion of the content is decrypted.
 27. Thedevice of claim 21, wherein the third logic is to prevent decryption ofa second portion of the content after a first portion of the content isdecrypted, and wherein the first portion of the content is decryptedbefore the third logic is to determine that the external device is anon-compliant device.
 28. A computer-readable medium storing a programfor controlling a receiver, the program comprising: first code todetermine that a device to be coupled the receiver is a non-compliantdevice; second code to prevent decryption of at least a portion of thecontent received through an interface when the device is determined tobe a non-compliant device.
 29. The computer-readable medium of claim 28,wherein at least the portion of the content is subject to a type ofdigital copyright protection.
 30. The computer-readable medium of claim28, wherein at least the portion of the content is in a high-definitionvideo format.