Patent classifications
G11B20/00
Securing protected content during video playback
The disclosed embodiments provide a system that drives a display from a computer system. During operation, the system writes graphical output to protected memory and drives the display from the protected memory. If the graphical output lacks protection, the system discontinues the driving of the display from the protected memory. In particular, upon detecting a lack of protection in the graphical output, the system continues to drive the display from the protected memory during a grace period associated with the lack of protection in the graphical output. The system then discontinues driving of the display from the protected memory if protection of the graphical output does not resume during the grace period.
Multimedia Distribution System for Multimedia Files with Packed Frames
A multimedia file and methods of generating, distributing and using the multimedia file are described. Multimedia files in accordance with embodiments of the present invention can contain multiple video tracks, multiple audio tracks, multiple subtitle tracks, data that can be used to generate a menu interface to access the contents of the file and ‘meta data’ concerning the contents of the file. Multimedia files in accordance with several embodiments of the present invention also include references to video tracks, audio tracks, subtitle tracks and ‘meta data’ external to the file. One embodiment of a multimedia file in accordance with the present invention includes a series of encoded video frames and encoded menu information.
VIDEO PROCESSING METHOD AND VIDEO PROCESSING SYSTEM
A video processing method and a video processing system for processing an original video are provided. The original video includes a plurality of original frames. The video processing method includes the following steps: A dynamic object is detected in the original video and a plurality of interesting regions in some of the original frames is obtained according to the dynamic object. Some of the original frames are cropped to obtain a plurality of cropped sub-frames according to the interesting regions. Each of the cropped sub-frames is resized to obtain a plurality of resized sub-frames whose resolutions are identical. The resized sub-frames are compressed to be an interesting video.
Authenticating a hardware chip using an intrinsic chip identifier
Embodiments of the present invention provide an authenticating service of a chip having an intrinsic identifier (ID). In a typical embodiment, an authenticating device is provided that includes an identification (ID) engine, a self-test engine, and an intrinsic component. The intrinsic component is associated with a chip and includes an intrinsic feature. The self-test engine retrieves the intrinsic feature and communicates it to the identification engine. The identification engine receives the intrinsic feature, generates a first authentication value using the intrinsic feature, and stores the authentication value in memory. The self-test engine generates a second authentication value using an authentication challenge. The identification engine includes a compare circuitry that compares the first authentication value and the second authentication value and generates an authentication output value based on the results of the compare of the two values.
Systems and methods for managing digital identities
Systems and methods for managing digital identities. In some embodiments, a method is provided, comprising acts of: receiving a request to validate at least one statement about a user; identifying, from the request, a reference to a distributed ledger, the reference comprising an identifier for the distributed ledger and an identifier for a transaction recorded on the distributed ledger; identifying, based at least in part on the identifier for the distributed ledger, at least one node of a network of nodes managing the distributed ledger; and communicating with the at least one node to validate the at least one statement about the user.
Crowd sourcing for file recognition
Methods for identifying encrypted content in ones of a plurality of encrypted data files in a library of encrypted files without decrypting the data files utilize crowd sourcing for content identification. A method includes selecting, by a computer, content titles for presenting with ones of identifiers for the data files in a data structure. Each of the identifiers includes a hash of metadata for one of the data files and the content titles include a character string that identifies each file's content. The user selection data identifies the content titles that correspond to the data files. The computer determines which content titles satisfy a minimum confidence threshold for associating with one of the identifiers, based on a quality or quantity of the multiple independent clients supplying the user selection data. An apparatus for performing the method includes a memory holding instructions for performing steps of the method as summarized above.
Encoding and Decoding Selectively Retrievable Representations of Video Content
A system and method disposed to enable encoding, decoding and manipulation of digital video with substantially less processing load than would otherwise be required. In particular, one disclosed method is directed to generating a compressed video data structure that is selectively decodable to a plurality of resolutions including the full resolution of the uncompressed stream. The desired number of data components and the content of the data components that make up the compressed video data, which determine the available video resolutions, are variable based upon the processing carried out and the resources available to decode and process the data components. During decoding, efficiency is substantially improved because only the data components necessary to generate a desired resolution are decoded. In variations, both temporal and spatial decoding are utilized to reduce frame rates, and hence, further reduce processor load. The system and method are particularly useful for real-time video editing applications.
Method and system for watermarking video media to trace video distribution
An approach is provided for a segment-based viewing of a watermarked recording. The approach involves receiving a request, from an evaluator, to access one of a plurality of media associated with a plurality of interviewees, wherein each of the plurality of media represents a recording of an interview of a corresponding interviewee; and wherein the request relates to evaluation of the corresponding interviewee for admission or hiring. The approach also involves determining source-identifying information associated with the evaluator. The approach further involves determining source-identifying information associated with the request. The approach additionally involves generating a watermark based on the source-identifying information, wherein the watermark is configured to depict an identifier of the evaluator during a presentation of the requested media. The approach further involves modifying the one media to superimpose the watermark on the recording. The approach also involves initiating transmission of the requested media with the generated watermark to a target device associated with the evaluator.
IMAGE SENSOR, IMAGE PICKUP APPARATUS, IMAGE SENSOR-IDENTIFYING METHOD, IMAGE FORGERY-PREVENTING METHOD, AND IMAGE ALTERNATION-LIMITING METHOD
An image sensor 30 includes an image information processing unit 4 that forms integrated information in which image sensor identification information capable of identifying the image sensor 30 and image information obtained by an analog/digital conversion unit 25 are associated with each other, and an image information output unit 24 that outputs the integrated information to an external unit.
System and method for rules-based control of custody of electronic signature transactions
Techniques for electronic signature processes are described. Some embodiments provide an electronic signature service (“ESS”) configured to facilitate the creation, storage, and management of electronic signature documents. In one embodiment, an electronic signature document may be associated with custody transfer rules that facilitate transfers of custody of an electronic signature document from one user or party to another. A custody transfer may results in a transfer of rights or capabilities to operate upon (e.g., modify, view, send, delete) an electronic signature document and/or its associated data. A custody transfer rule may be trigged by the occurrence of a particular event, such as the receipt of an electronic signature.