H04L9/36

System and method of motion detection on encrypted or scrambled video data streams

Systems and methods of motion detection on encrypted or scrambled video data streams are provided. Some methods can include identifying macroblock size information for an encrypted/scrambled video data stream and using the identified macroblock size information to determine a presence of motion in the encrypted/scrambled video data stream without decrypting and descrambling the encrypted/scrambled video data stream.

METHODS AND APPARATUS TO IDENTIFY MEDIA
20250125979 · 2025-04-17 ·

Methods and apparatus for identifying media are described. An example apparatus includes at least one memory, instructions in the apparatus; and processor circuitry to execute the instructions to: determine application identification information for a media presentation application executing on a media device; determine a first watermark for the application identification information from a lookup table; request media identification information for media from the media presentation application; determine a second watermark for the media identification information from the lookup table; insert the first watermark in the media prior to output of the media by the media device; and insert the second watermark in the media prior to the output of the media by the media device.

METHODS AND APPARATUS TO IDENTIFY MEDIA
20250125979 · 2025-04-17 ·

Methods and apparatus for identifying media are described. An example apparatus includes at least one memory, instructions in the apparatus; and processor circuitry to execute the instructions to: determine application identification information for a media presentation application executing on a media device; determine a first watermark for the application identification information from a lookup table; request media identification information for media from the media presentation application; determine a second watermark for the media identification information from the lookup table; insert the first watermark in the media prior to output of the media by the media device; and insert the second watermark in the media prior to the output of the media by the media device.

ENHANCED ENCRYPTION WITH FORMAT PRESERVATION AND REFERENTIAL INTEGRITY FOR USE WITH A LARGE LANGUAGE MODEL
20250254051 · 2025-08-07 ·

A method of encrypting information provided to a large language model (LLM) can include receiving first unencrypted information, identifying a first word within the first unencrypted information that is to be encrypted, replacing the first word within the first unencrypted information with an automatically generated first key to create first encrypted information, automatically replacing all instances of the first word with the first key to maintain referential integrity amongst the first word and the first encrypted information, and providing the first encrypted information to the LLM along with a first prompt requesting that the LLM generate a first encrypted output dependent upon the first encrypted information. The example method can further include receiving, from the LLM, the first encrypted output dependent upon the first encrypted information and replacing, using the first word-key pair database, all instances of the first key with the first word to create a first unencrypted output.

ENHANCED ENCRYPTION WITH FORMAT PRESERVATION AND REFERENTIAL INTEGRITY FOR USE WITH A LARGE LANGUAGE MODEL
20250254051 · 2025-08-07 ·

A method of encrypting information provided to a large language model (LLM) can include receiving first unencrypted information, identifying a first word within the first unencrypted information that is to be encrypted, replacing the first word within the first unencrypted information with an automatically generated first key to create first encrypted information, automatically replacing all instances of the first word with the first key to maintain referential integrity amongst the first word and the first encrypted information, and providing the first encrypted information to the LLM along with a first prompt requesting that the LLM generate a first encrypted output dependent upon the first encrypted information. The example method can further include receiving, from the LLM, the first encrypted output dependent upon the first encrypted information and replacing, using the first word-key pair database, all instances of the first key with the first word to create a first unencrypted output.

TRANSMISSION DEVICE, RECEPTION DEVICE, INFORMATION PROCESSING METHOD, PROGRAM, AND COMMUNICATION SYSTEM
20250310101 · 2025-10-02 ·

The present technology relates to a transmission device, a reception device, an information processing method, a program, and a communication system capable of easily updating a key used for security processing performed on data output by a sensor.

A transmission device according to an embodiment of the present technology controls security processing performed on output data of each of frames output by a sensor and transmission of information indicating an update timing of a key used for the security processing to a reception device that is a transmission destination of the output data and transmitting frame data in a predetermined format used for transmission of the output data subjected to the security processing. The present technology can be applied to devices that perform communication based on an SLVS-EC standard.