H04L2209/601

Encrypted audio streaming
11394699 · 2022-07-19 · ·

The disclosed technology relates to broadcasting encrypted data to multiple receiver devices, where some receiver devices have long-term access to the encrypted data and some receiver devices have a temporary access to the encrypted data. Receivers having long-term access are part of a “member group” because these member group devices have a master key and the master key enables the member group devices to derive the necessary information to decrypt the encrypted broadcast. In contrast, devices with temporary access possess only a guest key and not master key, without a master key the devices need to receive the guest key from another device to decrypt the broadcast. Access to the encrypted stream can also be based on broadcasting multiple or single diversifiers, where a diversifier can include group identification information to assist in restricting access to the encrypted stream.

Caching and delivering media content from multiple streaming providers

In a system and method for distribution of media content, a cable provider gateway cooperates with a broker API, one or more streaming provider gateways, and one or more streaming applications to locally cache and display media content from the streaming provider gateways even when the streaming applications do not have connectivity to their gateways.

SECURE BROADCAST DELIVERY AND VERIFICATION

A vehicle receives a first portion of content via ATSC broadcast, generates a random nonce, responsive to receiving the content, and sends the nonce and a request for content verification to a remote server. The vehicle receives a message from the remote server indicating whether the first portion of content is likely valid, the message including a second portion of content and a hash value when the content is likely valid. The vehicle then calculates a second hash value, using the random nonce and the first portion of content. The vehicle compares the second hash value to the first hash value, and responsive to the second hash value matching the first hash value, combines the second portion of content and the first portion of content to create combined content. The vehicle then uses a security strategy to convert the combined content into utilizable content, and utilizes the content.

CACHING AND DELIVERING MEDIA CONTENT FROM MULTIPLE STREAMING PROVIDERS
20220094522 · 2022-03-24 ·

In a system and method for distribution of media content, a cable provider gateway cooperates with a broker API, one or more streaming provider gateways, and one or more streaming applications to locally cache and display media content from the streaming provider gateways even when the streaming applications do not have connectivity to their gateways.

SYNCHRONOUS CONTENT PRESENTATION

In embodiments of systems and methods for synchronous content presentation, an Edge server device may receive a decryption key for an encrypted content segment that is or will be delivered to a plurality of wireless devices over the wireless communication network, and may send the decryption key to the plurality of wireless devices after the encrypted content segment has been received by the plurality of wireless devices in a manner that enables the plurality of wireless devices to decrypt the encrypted content segment approximately simultaneously. A wireless device may receive, and optionally temporarily store, the encrypted content segment from the wireless communication network, receive the decryption key from the Edge server device after receiving the encrypted content segment, and decrypt the stored encrypted content segment using the received decryption key.

Electronic apparatus, server and method of controlling the same
11272234 · 2022-03-08 · ·

Disclosed are an electronic apparatus, a server, and a method of controlling the same, the server including: a communicator configured to connect with an electronic apparatus and an external server; and a processor configured to: generate first encrypted information by encrypting first decryption information received from the electronic apparatus, the first decryption information for reproducing content, control the communicator to transmit, to the external server, the generated first encrypted information, generate second decryption information by decrypting second encrypted information received from the external server, the second encrypted information generated based on the first decryption information, and control the communicator transmit the generated second decryption information to the electronic apparatus to scramble the content by a scrambler of the electronic apparatus.

SECURE PERSONAL INFORMATION EXCHANGE OVER C-V2X

A toll advertisement message (TAM) broadcast from a roadside unit of a roadway is received. The TAM may include a public key of a toll charger cloud. Responsive to receipt of the TAM, a tolling usage message (TUM) is sent. The TUM may include information encrypted with a public key of a toll service provider, information encrypted with the public key of the toll charger cloud, and a public key of the telematics control unit. Responsive to broadcast of the TUM, a toll usage message acknowledgement (TUM-ACK message. A toll receipt message (TRM) is also received. The TRM is encrypted with the public key of the telematics control unit. The TRM is decrypted using a private key of the telematics control unit corresponding to the public key of the telematics control unit.

Sending Secure Communications Using a Local Ephemeral Key Pool
20210328976 · 2021-10-21 ·

A method, system, and non-transitory computer readable medium are described for providing a sender a plurality of ephemeral keys such that a sender and receiver can exchange encrypted communications. Accordingly, a sender may retrieve information, such as a public key and a key identifier, for the first receiver from a local storage. The retrieved information may be used to generate a key-encrypting key that is used to generate a random communication encryption key. The random communication encryption key is used to encrypt a communication, while the key-encrypting key encrypts the random communication key. The encrypted communication and the encrypted random communication key are transmitted to the first receiver.

Renewable traitor tracing

A system, method, and computer program product to renewably prevent traitors in a broadcast encryption system from re-using compromised keys. A license agency assigns individual receivers a set of Sequence Keys preferably at manufacture, and assigns Sequence Key Blocks (SKBs) to protected content files to be distributed. The files may be distributed on prerecorded media and typically include several file modifications. The particular modifications in a pirated version of a file can help identify which traitors contributed to its theft. SKBs assigned to new files distributed after traitors have been identified cannot be usefully processed using the compromised keys employed in previous content piracy. Innocent receivers that happen to have compromised key(s) in common with traitors can use a replacement uncompromised Sequence Key from the set to usefully decrypt content. Traitors will however step through all their Sequence Keys without reaching one that will work.

Transmission data protection system, method, and apparatus

A system for transmission data protection includes user equipment (UE) and an access point. The access point sends a broadcast message that carries a public key for encryption. The UE receives and stores the public key for encryption. The UE obtains a global public key or a private key corresponding to the UE, and protects transmission data using the public key for encryption and the global public key or the private key corresponding to the UE.