Electronic support allowing access to remote audio/video assets

ABSTRACT

A physical device, the possession of which may provide access to digital media content in a fashion similar to the possession of a DVD providing access to the media content stored thereupon on a suitable DVD player. The possession of the physical device grants access to digital content stored on a remote server using a suitable device such as e.g., a set-top box or media player having Internet connectivity. The physical device provides for convenient and possibly anonymous access to content stored on a remote server and has certain advantages over known techniques for storing rights to access the content.

CROSS REFERENCE TO RELATED APPLICATIONS

This application claims the benefit of U.S. Provisional ApplicationsNos. 61/775,733, filed Mar. 11, 2013, 61/775,802, filed Mar. 11, 2013and 61/775,737, filed Mar. 11, 2013. All of the foregoing areincorporated by reference in their entireties.

TECHNICAL FIELD

The embodiments disclosed herein generally relate to the field ofdigital right management. More specifically, the embodiments disclosedherein relate to innovations in the way digital rights for particulardigital media assets may be managed in terms of their verification,transferring, lending or storing. The embodiments also relate tomanaging access rights where different levels of access to particularassets may be provided depending on a person's identity, or access todifferent assets or applications may be given depending on theparticular device used to request such access and how that device isused.

STATE OF THE ART

Near field communication (NFC) is a set of standards for smart phonesand similar devices, such as tablet computers, to establish radiocommunication with each other by touching them together or bringing theminto close proximity, usually no more than a few centimeters. Presentand anticipated applications include contactless transactions, dataexchange, and simplified setup of more complex communications such ase.g., Wi-Fi. Communication is also possible between an NFC device and anon-powered NFC chip, called a “tag”.

NFC standards cover the NFC communication protocols and data exchangeformats and are based on existing standards for radio frequencyidentification (RFID) such as ISO/IEC 14443, FeliCa and ISO/IEC 18092.They include standards defined by the “NFC Forum”, which was founded in2004 by Nokia, Philips and Sony and includes more than 180 members. TheForum also promotes NFC and certifies device compliance.

NFC builds upon RFID systems by allowing two-way communication betweenendpoints, whereas earlier systems such as contactless smart cardsallowed only one-way communication.

NFC technology is usable only over a short distance of a fewcentimeters, which implies a voluntary use and prevents unintentionaluse.

NFC devices can be active or passive. A passive NFC device, such as atag, a smart card or a simple chip affixed to an object containsinformation only readable by other NFC-enabled devices. A passive NFCdevice is powered by the electromagnetic field generated by a reader(active device) and therefore does not need its own power supply.

An active NFC device, however, is a device that generates anelectromagnetic field. This generation can be done to communicate with apassive device (described above) or to establish a communication channelbetween two active devices.

The fact that a device like a smartphone has a power supply does notnecessarily mean that it will work in active mode only. That is, asmartphone can handle the NFC interface in active or passive modes. Inpassive mode, the device emulates a chip card. In this mode, thesmartphone (or any other portable device such as tablets) will store, ina secure memory, information that is normally stored in a card. Thus,when the smartphone detects an electromagnetic field, it can access thesecure memory and a corresponding device having NFC capacities will beable to read information in passive mode from the secure memory.

Since non-powered NFC “tags” can also be read by NFC devices, NFCapplications using such “tags” may be used to replace earlier one-wayapplications.

As well as having NFC capabilities embedded therein, state of the artsmartphones and the like usually include some kind of sensor fordetecting spatial position of the device such as e.g., positionaldetectors, tilt sensors, angle detectors, movement detectors oraccelerometers. In the state of the art, for example, the accelerometermay be used to perform automatic picture rotation, provide input tomotion-sensitive mini-games or to correct for shaking when takingphotographs.

In a digital rights management context, there are different ways for aconsumer to acquire rights to view a movie, for example, and ways forthat consumer to prove that he/she has acquired such rights. Forexample, a consumer may either buy a DVD then view a movie on the DVDusing a physical DVD player, or he/she may buy a right to view the movieon-line through streaming. In the latter case, the right is a virtualright and the consumer has nothing physical to prove ownership orotherwise prove legitimate acquisition of the right enabling him accessthe movie. This would be particularly problematic if the consumer'scomputer equipment breaks, causing him/her to lose the virtual proof ofthe acquired access rights, which generally would have been stored onthe computer equipment. Furthermore, the consumer cannot pass the righton to his friends, nor could he/she exchange, donate or resell the rightas he/she can do with a physical DVD.

In a context of parental control, access rights to certain content orapplications may be controlled or otherwise managed by a designatedperson. In the state of the art, parental control is usually achieved bya parent (i.e., the designated person) inputting a PIN code using aremote control device. This technique is not secure in the sense that itis possible for the PIN code to be discovered by an unscrupulous childwho spies on the parent when entering the PIN code.

SUMMARY

It can be seen that there is a need for convenient, yet secure means forproviding access to remote video assets. The embodiments disclosedherein attempt to address such issues, using NFC technology to provideconvenience as well as security in terms of the authentication andmanagement of access rights.

According to an aspect of the embodiments disclosed herein, a system forproviding access to conditional access digital media content isprovided. The system comprising:

a receiver to receive the digital media content;

a media player, local to the receiver, for playing the digital mediacontent;

a streaming server having access to the stored digital media content;and

a secure element for providing authorization to access the storeddigital media content;

wherein:

the receiver is configured to receive the digital media content from thestreaming server via a remote connection;

the secure element is a physical element separate from the receiver, thesecure element comprising a memory in which a cryptogram is prerecorded,the cryptogram comprising a right to access the digital media content;and

the receiver is configured to receive the cryptogram from the secureelement, the receiver being further configured to provide said accessupon authentication of the cryptogram.

Embodiments disclosed herein therefore allow for the re-establishment ofthe ability to keep, display, collect, share, trade, lend and reselldigital rights more reliably than virtual rights (e.g., even when acomputer breaks down). This is made possible by having the right in theform of a physical item. Further embodiments disclosed herein providefor enhanced security for parental controls. Moreover, furtherembodiments comprise spatial positional detectors that may be used toactivate functions such as the NFC function in a smartphone when asmartphone is used as a movie card or secure element—e.g., phone upsidedown activates application A, phone on its side activates application B.Other sensors can be used e.g., a microphone to input commands by voice,sensors for detecting e.g., an angle of the device. Other embodimentsare disclosed wherein the receiver is connected to an NFC-enabled table,allowing e.g., for the selection of a channel by placing an NFC-enabledmovie card for that channel on a table. For example, picture-in-picturemode may be invoked using two movie cards.

BRIEF DESCRIPTION OF THE DRAWINGS

Embodiments disclosed herein and their advantages will be betterunderstood with reference to the enclosed drawing and to the followingdetailed description, in which:

FIG. 1 illustrates a system in which a movie card according to anembodiment disclosed herein may be used; and

FIG. 2 illustrates a schematic diagram of a cryptogram with managementdata as used in an embodiment disclosed herein.

DETAILED DESCRIPTION

According to an aspect of the embodiments disclosed herein, provisionsare made for an item that contains the digital right for an asset. Thiswould be in the form of a physical, tactile item that the consumer cankeep, share or resell, for example. Advantages of using a physical,tactile item to hold the right over a virtual right include (withoutlimitation) the ability to keep, display, collect, share, trade, lendand resell the item simply and efficiently.

In order to address the problems remaining in the prior art, related tothe management of rights to digital assets, the disclosed embodimentsprovide a specific sellable device, such as a card or the like,comprising a passive NFC system. The device is used to securely storeand communicate information such as e.g., a film identifier, streamingsystem identifier, protocol identifier or any necessary information thatwill be used to get access to the film via online means (such as rights,etc.). The device may have some specific packaging reminiscent of atraditional DVD (e.g., a film jacket or cover), since it is a physical,non-personalised object intended to show that whoever has physicalpossession of the object will be able to view the film depicted on thecover.

According to an embodiment disclosed herein, an active NFC-enableddevice, connected to the Internet and a TV, is able to read the card ortag having the passive NFC system and retrieve information related tothe film from the card, connect to the streaming server over theInternet (e.g., an ultraviolet streaming server), and thereby allow forthe movie to be presented. The active NFC-enabled device mentionedherein is often referred to as a reader.

To start the movie, the user simply needs to present the card(hereinafter referred to as a “movie card”) to the reader. According todifferent embodiments disclosed herein, further security may be addedwhereby certain authentication steps are carried out. Suchauthentication may use identity checking or other checks involving theuse of positional sensors and the like in the card. These otherembodiments are described in more detail below.

According to different embodiments, the reader may be an active NFCreader on a set-top box connected to a TV or the TV itself may beNFC-enabled and therefore serve as the reader. In both cases the TV isconnected to the Internet.

Although NFC is mentioned herein as the communication-enabling featurein the context of the disclosed embodiments, other systems such as e.g.,RFID may be used instead; RFID being another short-range wirelesscommunication protocol. According to another embodiment disclosedherein, the movie card may be in the form of a physical card and maycomprise a secure element such as a SIM card to store the informationrelated to the film as described above. Consequently, the reader wouldhave a SIM card reader to read the information allowing identificationof the film to be downloaded. It is possible for the movie card to havethe passive NFC system and the SIM card on-board.

According to yet another embodiment, it is possible for a suitablyprogrammed Conditional Access Module (CAM), which is already widely usedin the domain of broadcast of conditional access content, to function asa movie card. The STB or TV would have a suitable CAM reader, whichwould serve as the reader described above for reading the movie card anddownloading the requested film.

Smartphones and tablet computers are handheld communication devices thatgenerally come with NFC functionality and therefore may serve asconvenient ways to perform the role of the movie card in the context ofthe embodiments described above.

Alternatively, using a movie card comprising a passive NFC system asdescribed above, the movie purchased by the user of the movie card canbe downloaded and visualized on an NFC-enabled smartphone, orNFC-enabled tablet computer, having access to the Internet. In thiscase, the movie card is read by the smartphone or tablet computer, whichthen may authenticate the information it reads using any of thetechniques described below, and transmit the (authenticated) informationto a central controller. The information includes a reference to arequested movie. If the information is valid, then the requested moviecan be downloaded from the central controller to the phone or tabletcomputer, where it is made available for presentation.

The movie card system of the disclosed embodiments provides advantagesin that the user is in possession of a physical entity related to aparticular movie that was purchased. Depending on the embodiment, thephysical entity is anonymous in the sense that it need not bearinformation associating the entity to a particular user. The user isthen free to do what he/she wants with the right purchased via the moviecard—i.e., the user is free to give the movie card to someone else toallow them to watch the film or the user can watch the film on anyappropriate device. This is different from having purchased rightsstored somewhere on a computer, perhaps being a personalized right, andbeing susceptible to loss, damage or corruption depending on the fate ofthe computer on which it is stored (e.g., crash, reformatting, etc.).Having a physical movie card of this sort is similar to having thephysical DVD in one's possession even though the movie card is forstreaming the movie from a server.

FIG. 1 shows a schematic diagram of a system in which an embodimentdisclosed herein may be deployed. A movie card, according to anembodiment, may be in the physical form of a smartcard. In FIG. 1, themovie card is denoted SC. According to different embodiments, the moviecard (in this case a smartcard) may be of the ISO7816 type (i.e., it haselectrical contacts for communicating with a host device) or it may bean NFC-enabled card adapted to communicate with a host device using NFC.The movie card (SC) comprises a memory for storing a cryptogramrepresenting an authorization to have access to a particular asset, suchas a movie, a piece of music, a game, etc. In FIG. 1, the host device islabeled STB and indeed may be a set top box known in the pay-TV field.The host (STB) comprises a suitable reader for communicating with themovie card (SC), i.e., an ISO7816 reader, NFC reader, or a readerconfigured to operate with whatever communication protocol is used bythe movie card (SC). The host (STB) is connected, via the Internet, to acentral system (CS), which has access to a database (DB) where assetsare stored. The host (STB) can therefore read information, including thecryptogram, from the movie card (SC) and send it to the central system(CS). The host (STB) may also send identification information, includingan address, to the central system (CS) thereby allowing the centralsystem to send the requested asset back to the host (STB).

Once the cryptogram is received by the host (STB), it is verified orotherwise authenticated. Various methods exist for checking theauthenticity of a cryptogram, for example, known methods based on knownasymmetric cryptography techniques or using an X.509 signature may beused.

FIG. 2 shows a diagram representing a cryptogram used in embodimentsdisclosed herein. The cryptogram comprises a unique identifier of theasset, or asset identifier, (A_ID) and a signature (SIG). Once theverification is successfully carried out, the central system fetches therequested asset from the database (DB) and transmits it back to the host(STB).

In the case where the requested asset is a film, the host device isconnected to a display device such as e.g., a TV. The requested asset,once received at the host, is then sent to the TV to be displayed.

The content that is transferred back to the host may be in encryptedform as known in the art. The purchaser of the movie card will haveauthorization, by virtue of the purchase of the right to view the movie,to decrypt the content. As is known, to be authorized a right has to bepresent in the set-top box (usually in a security device, which could bepart of the movie card). With the right being present, the set-top boxis allowed to decrypt the content.

As mentioned above, the normal procedure is for the host device (STB) toread the cryptogram from the movie card (SC). In a non-authorized mode,the host (STB) could store the cryptogram and then perform a repeatrequest to the central system for an asset by re-sending the storedcryptogram instead of reading the cryptogram from a movie card. In orderto prevent unauthorized repeated use of an already performed request foran asset, whereby the host (STB) stores the purchased cryptogram and,after having already used the cryptogram once to make a request to thecentral system (CS) for the purchased asset, the host repeats therequest to the central system (CS) for the same asset, the cryptogramfurther comprises a variable portion (VAR), which should necessarily bechanged between requests. It follows that no two cryptograms should haveexactly the same content.

Changing the cryptogram after it has been used can be achieved using agenerator of pseudo-random values, the generator residing on the moviecard. Cryptograms processed in this way will comprise a variable portionthat is different for each cryptogram. The variable portion (VAR) may beauthenticated by the signature (SIG) so that it cannot be changed on thefly by the host (STB) without such change being detected by the centralsystem (CS) during authentication of the cryptogram. Alternatively, thehost (STB) could generate the pseudo-random value to be included in thecryptogram requested from the movie card.

The cryptograms presented to the central system are stored at thecentral system (CS) to be used for further checking whenever a newcryptogram is presented. If the same cryptogram is received a secondtime, or if a cryptogram is received whose variable portion is the sameas the variable portion of a previously received cryptogram, theauthorization for the requested asset is not given.

The central system (CS) can track and build statistics of the use of theassets. These statistics can be used to reward the copyright owner ofthe asset.

Embodiments disclosed herein provide further advantages to be realized,for example, in the management of trailers, thereby ensuring that suchtrailers are always valid and up-to-date. A trailer typically could be ashort extract of soon-to-be-released asset for example. In a DVD, thetrailers are always the same and may become quickly out of date (e.g.,“Available in your theater in May 2010”). The central system can selectthe proper up-to-date trailers from the database according to variouscriteria, such as the type of asset, the current policy agreement withthe copyright owners, the assets previously viewed by the same host,etc., and send the correct trailers before sending the requested asset.

Advantages are also realized in the management of the advertisementmaterial. The user could have the choice of different movie cards, beingsold at different prices, for the same film. For a lower price, the userhas to view advertisements and, for a higher price, the film may bewatched ad free. For this purpose, the cryptogram not only contains thedescription of the asset, but also a description of the management ofthe asset (M_DATA). FIG. 2 shows the structure of a cryptogram withmanagement data according to this embodiment. It should be appreciatedthat, although FIG. 2 is used to illustrate the current embodiment aswell as the previous embodiment, the current embodiment may be combinedwith the previous embodiment. Alternatively, the current embodiment maybe implemented separately from the previous embodiment. One example ofthe management data (M_DATA) is to change the advertisement policy. Inone example, there will be no advertisements, no trailers and the assetis immediately available without interruption, whereas in anotherexample, the other management data (M_DATA) can allow trailers and theinterruption of the asset for advertisement purposes.

The management data (M_DATA) can also comprise a maximum number ofpresentations. The central system keeps track of each request for theasset based on a given cryptogram and denies further requests when thatthe maximum number of presentations has been reached.

According to another embodiment, the reader may take the form of anNFC-enabled table upon which the movie card may be placed. The table issufficiently large to allow for a plurality of movie cards to be placedthereupon. Moreover, the surface area of the table may be configuredsuch that different portions of the surface of the table may havedifferent significances, thereby allowing for different commands to beformulated depending on which movie cards are placed on certain portionsof the table.

According to another embodiment, instead of the movie card correspondingto a particular movie, the movie card could give the right to viewprograms from a certain channel. Placing a first movie card on the tablewould give the user the right to view programs from a first channel. TheNFC-enabled table could be connected to a set-top box. In thisembodiment, the set-top box is no longer the reader because theNFC-enabled table is the reader. The set-top box then functions in thenormal way—i.e., it receives the rights from the table which reads thecryptogram from the movie card, and allows the decryption of the programfrom the requested channel. Of course, closely related to theembodiments where the host device (i.e., the set top box) is the reader,in these embodiments the movie card may still correspond to a particularmovie and placing the movie card on the table simply replaces the stepof having the host device read the movie card, since the table is nowthe reader. In such a case, placing the movie card on the table isequivalent to making a request for a particular movie.

The NFC-enabled table of the embodiment described above effectivelyallows for an intuitive selection of media content on a screen.According to an embodiment, instead of having a table on which the moviecards are placed, it is the screen itself which is NFC-enabled, andplacing a movie card close to the screen is the way that the request ismade for the movie. Again, the request can be further interpreteddepending on where on the screen the approach of the movie card is made.Similarly, further interpretation may be provided depending on thenumber of movie cards presented at a time. For example, placing twodifferent movie cards close to the screen (or on the table in theembodiments where an NFC-enabled table is used) may be equivalent toissuing a command to view two channels (or two films) in apicture-in-picture mode and a suitably adapted set-top box would be madeto interpret the gesture as such. A first channel (or movie),corresponding to the first movie card, may then be displayed in a mainwindow, while a second channel (or movie), corresponding to the secondmovie card, may be displayed on a second window, perhaps a smaller one.Furthermore, the position at which each tag/card was presented could beinterpreted as being an indication of where on the screen (or table) thecorresponding channel or movie is to be presented.

Different types of authentication methods may be used in combinationwith any of the embodiments described herein, especially when a moviecard is not anonymous. One example of a non-anonymous type of movie cardis when a smartphone is used as the movie card. In this case, the moviecard may be used to identify its user. When a movie card is used toidentify its user, it is possible to include features such as e.g.,personalization per user or parental control, whereby a child using amovie card to view content from a certain channel, for example, willonly be allowed to view content that has been approved for him/her toview, which may be a subset of the content available on that channel.

When a movie card is placed near the screen or on the table, itsidentification and possibly its position can be passed to the set-topbox and appropriate action is taken. Such appropriate action may bee.g.:

selecting a particular channel;

selecting a user's profile (parental control, preferred channel list);

organizing the display of channels on various part of the display, inparticular when more than one tag is detected; and/or

selecting a mode such as PVR, EPG.

The movie cards can also be the physical token of a purchased game,giving access to the gaming environment according to the rights attachedto the card. Multiple players on the same table or parental control canbe associated with these cards, each relating to a set of on-line gameswith specific access rules and restrictions.

Another application is to use the movie cards as loyalty cards orcustomer identification for doing on-line shopping (e.g., to getdiscount or collect rewards points) or to access a reward environmentwhere multiple rewards are presented on the display table according thecards left on the table and the available reward points. Another way touse the table is to recognize a plurality of NFC loyalty cards on thetable (e.g., one per friend, family member, etc.) and to sum all of thereward points to collectively choose a reward from the proposed choiceson the table.

Another possibility is to have the cards associated with variousingredients available in the home and by recognizing the cards, thetable launches an application with a selection of menus that can becooked with the available ingredients. This removes the burden ofentering the available ingredients by hand on a computer. Instead, theapplication makes proposals based on what was put on the table.According to another embodiment, the NFC-enabled table is used toestimate the weight of the objects that are put on it and thus,calculate the available quantities of each of the added ingredients.

The NFC-enabled table then becomes the entry point for multiple familyapplications through the use of movie cards (it should be appreciatedthat the movie cards are no longer specifically attached to movies inthese latter embodiments and may simply be referred to as cards) andpossible extensions like the estimation of weight or size due to therelevant sensors included in the NFC-enabled table. Sensing can be donethrough a touch-sensitive screen of the table by estimating the weightand size of the area pressed, when adding a new ingredient; the screencalculates the addition in size and weight. Other technologies such ase.g., an electric field may be used to estimate the weight as well aspiezoelectric supports of the screen for the weight estimation. Thetable or the screen may therefore be described as being touch-sensitive.It should be appreciated that “touch-sensitive” can also encompass aproximity sensitivity such that even if physical contact is not madewith the screen or the table, the NFC configuration provides proximitysensitivity equivalent to touch without actually requiring a physicaltouch to be made.

Additionally or alternatively, according to still another embodimentdisclosed herein, the position of a card on the screen or table beingsignificant in the interpretation of an associated command, the carditself may comprise electronic circuitry, including one or more sensorssuch as a camera, microphone, tilt sensor, an accelerometer or an angledetector. A movie card according to this embodiment may have any or allof these features within it. When a smartphone is used as a movie cardfor the purpose disclosed herein it is easy to see how such features maybe incorporated. Using such a movie card, it is now possible for theposition, attitude or movement of the card to be significant inproviding a command or selecting an application. Shaking the smartphone,for example, may activate the NFC device. Placing the smartphone on thetable in an upside down configuration could select application A, whileplacing the smartphone on its side would select application B. Themicrophone may be used to convey to the card which application toexecute. Turning the card through 90 degrees could select differentdefault applications. For example, in a first position a firstapplication is a default application to be selected, whereas turning thecard through 90 degrees would select a different application as thedefault and another 90 degrees for another application and so on.

According to yet a further embodiment, each angle from a set ofpredetermined angles could correspond to an application from a set ofdifferent predetermined applications. In this case, when a phone (i.e.,card in this context) recognizes that it is being held at 35 degrees thephone will launch a first application, while recognizing a differentangle, e.g., 52 degrees, the phone will launch a different application.One of the applications could be an authentication routine, for example,or the sending of the cryptogram to the host. In this embodiment, thetable could be configured so that when the card is placed thereon atexactly the 35 degree angle, the cryptogram is sent to the host, therebybeginning the process of requesting the movie.

Any of the embodiments described herein may include an authenticationstep. A further embodiment takes advantage of the fact that the moviecard, when in the form of a device such as e.g., a smartphone comprisesinformation associating the card to its owner and therefore can be usedin the authentication process and may be used to facilitate parentalcontrol techniques. The usual way of configuring parental controlfeatures is via a remote control device. Remote control devices, whenused for entering parental control features are not very secure,especially when used to enter a supposedly secret PIN code, for example.A curious child, strategically positioned at the time a careless parentis entering his PIN number, may be able to detect and reproduce the PINnumber thereby gaining access to the parental control settings. AnNFC-enabled smartphone, on the other hand, used as a card in thisembodiment, allows for its user to be identified when close to theNFC-enabled host device (STB), thereby allowing the host device torestore a previously stored configuration related to the card (SC). Theconfiguration may include parental control information, favoritechannels, user-specific profiles and so on. As such, purchases ofcertain paying services may be restricted depending on which card ispresented near the host device (STB). Targeted advertising also becomespossible in this embodiment since the owner of the card is identifiable.

The invention claimed is:
 1. A system for providing access toconditional access digital media content, the system comprising: areceiver adapted to receive the conditional access digital media contentfrom a streaming server having access to the conditional access digitalmedia content; a media player, connected to the receiver, for playingthe conditional access digital media content; and a secure element forproviding authorization to access the conditional access digital mediacontent, the secure element being a portable physical element separatefrom both the media player and the receiver; wherein: the receiver isconfigured to receive the conditional access digital media content fromthe streaming server via a remote connection; the secure elementcomprises a memory and is configured to store in the memory a singleprerecorded cryptogram, the cryptogram comprising a single uniqueidentifier and a signature for verifying an authenticity of thecryptogram, the single unique identifier identifying the conditionalaccess digital media content; the receiver is configured to receive thecryptogram from the secure element, the receiver being furtherconfigured to provide said access upon authentication of the cryptogram;and the secure element comprises a wireless interface and the receivercomprises a reader having a wireless interface to receive the cryptogramfrom the secure element, the wireless interface of the reader and thewireless interface of the secure element are configured to operateaccording to a short-range wireless communication protocol.
 2. Thesystem according to claim 1, wherein the wireless interface of thereader and the wireless interface of the secure element are configuredto operate according to an NFC standard protocol.
 3. The systemaccording to claim 1, wherein the secure element comprises a SIM cardand the reader comprises a SIM card reader for reading from the secureelement.
 4. The system according to claim 1, further comprising: atouch-sensitive element comprising a further reader configured tooperate according to an NFC standard protocol for reading the cryptogramfrom the secure element, the touch-sensitive element being connected tothe receiver; and wherein the receiver is configured to receive thecryptogram from the touch-sensitive element.
 5. The system according toclaim 4, wherein the touch-sensitive element is a screen.
 6. The systemaccording to claim 5, wherein the screen is a part of the media player.7. The system according to claim 4, wherein the touch-sensitive elementis a table upon which the secure element may be placed.
 8. The systemaccording to claim 1, wherein the secure element further comprises asensor to detect an orientation of the secure element, the orientationbeing used to formulate a command for the receiver.
 9. The systemaccording to claim 1, wherein the secure element further comprises amotion detector to detect a movement of the secure element, the movementbeing used to formulate a command for the receiver.
 10. The systemaccording to claim 4, wherein the touch-sensitive element is configuredto interpret a plurality of secure elements simultaneously placed inclosed proximity thereto.
 11. The system according to claim 1, whereinthe secure element comprises information pertaining to a particularuser, said information being used to authenticate a communicationbetween the secure element and the receiver.
 12. A device for providingaccess to conditional access digital media content, the devicecomprising: a receiver adapted to receive the conditional access digitalmedia content from a streaming server via a remote connection, thereceiver being configured to receive a cryptogram from a secure element,the receiver being further configured to provide said access uponauthentication of the cryptogram; and a media player, connected to thereceiver, for playing the conditional access digital media content;wherein the secure element is a portable physical element separate fromboth the media player and the receiver, the secure element comprising amemory and being configured to store in the memory a single prerecordedcryptogram, the cryptogram comprising a single unique identifier of asingle digital media content and a signature for verifying anauthenticity of the cryptogram, the single unique identifier identifyingthe conditional access digital media content; and wherein the secureelement comprises a wireless interface and the receiver comprises areader having a wireless interface to receive the cryptogram from thesecure element, said wireless interface being configured to operateaccording to a short-range wireless communication protocol.
 13. Thedevice according to claim 12, wherein the wireless interface of thereader and the wireless interface of the secure element are configuredto operate according to an NFC standard protocol.
 14. The deviceaccording to claim 12, wherein the secure element comprises a SIM cardand the reader comprises a SIM card reader for reading from the secureelement.
 15. The device according to claim 12, wherein the receiver isconfigured to receive the cryptogram from a touch-sensitive elementconnected to the receiver.
 16. The device according to claim 12, whereinthe secure element further comprises a sensor to detect an orientationof the secure element, the orientation being used to formulate a commandfor the receiver.
 17. The device according to claim 12, wherein thesecure element further comprises a motion detector to detect a movementof the secure element, the movement being used to formulate a commandfor the receiver.
 18. The device according to claim 12, wherein thesecure element comprises information pertaining to a particular user,said information being used to authenticate a communication between thesecure element and the receiver.