H04L2209/606

SYSTEMS AND METHODS FOR REAL-TIME DIGITAL VIDEO PIRACY MONITORING
20240346336 · 2024-10-17 ·

Systems and methods for performing video piracy monitoring are disclosed. One computer-implemented method may include: detecting, at a digital media platform associated with a piracy monitoring system, a request to transmit a video stream to a user computing device associated with a user; transmitting the video stream to the user computing device and responsive to determining that the user is a subscriber to the digital media platform; retrieving activity data associated with the video stream using a content delivery network (CDN) associated with the piracy monitoring system; providing, responsive to the retrieving, the activity data to a trained machine-learning model configured to recognize a video piracy pattern; and performing a mitigating action to address piracy of the video stream responsive to receiving an output result from the trained machine-learning model indicating that the activity log data shares a predetermined level of similarity with the video piracy pattern.

SYSTEMS AND METHODS FOR REAL-TIME DIGITAL VIDEO PIRACY MONITORING
20240346336 · 2024-10-17 ·

Systems and methods for performing video piracy monitoring are disclosed. One computer-implemented method may include: detecting, at a digital media platform associated with a piracy monitoring system, a request to transmit a video stream to a user computing device associated with a user; transmitting the video stream to the user computing device and responsive to determining that the user is a subscriber to the digital media platform; retrieving activity data associated with the video stream using a content delivery network (CDN) associated with the piracy monitoring system; providing, responsive to the retrieving, the activity data to a trained machine-learning model configured to recognize a video piracy pattern; and performing a mitigating action to address piracy of the video stream responsive to receiving an output result from the trained machine-learning model indicating that the activity log data shares a predetermined level of similarity with the video piracy pattern.

MODEL ANTI-COLLUSION WATERMARK
20180144434 · 2018-05-24 ·

Embedding a watermark payload in content, including: a counter configured to store a random seed; a permutation generator configured to receive and process the watermark payload and the random seed, and generate a shuffled payload based on the random seed; and a watermark embedder configured to receive and embed the shuffled payload into the content. Key words include watermark payload and collusion.

ENHANCED SYSTEMS AND METHODS FOR PIRATE DECODER IDENTIFICATION
20240372696 · 2024-11-07 · ·

The disclosed technology relates to a method and system for detecting pirated decryption keys. The method involves the use of a computer tracer apparatus, comprising a translator algorithm and a query generator algorithm. The translator algorithm receives a decoder program and generates responses to queries based on a set of rules, including a state repair procedure. The query generator algorithm generates an initial and subsequent sets of queries based on inputs from the translator algorithm. The final output identifies potential traitor users. The system is executed on a quantum computer and includes modules configured for the same operations.

Unified broadcast encryption system

A system and method is disclosed for performing unified broadcast encryption and traitor tracing for digital content. In one embodiment a media key tree is divided into S subtrees, the media key tree including media keys and initial values, which may be random values. The digital content is divided into a plurality of segments and at least some of the segments are converted into a plurality of variations. The random values are transformed into media key variations and a separate media key variant is assigned to each of the subdivided subtrees. A unified media key block including the media key tree is stored on the media.

Model anti-collusion watermark

Embedding a watermark payload in content, including: a counter configured to store a random seed; a permutation generator configured to receive and process the watermark payload and the random seed, and generate a shuffled payload based on the random seed; and a watermark embedder configured to receive and embed the shuffled payload into the content. Key words include watermark payload and collusion.

Unified Broadcast Encryption System
20170317822 · 2017-11-02 ·

A system and method is disclosed for performing unified broadcast encryption and traitor tracing for digital content. In one embodiment a media key tree is divided into S subtrees, the media key tree including media keys and initial values, which may be random values. The digital content is divided into a plurality of segments and at least some of the segments are converted into a plurality of variations. The random values are transformed into media key variations and a separate media key variant is assigned to each of the subdivided subtrees. A unified media key block including the media key tree is stored on the media.

Unified broadcast encryption system

A system and method is disclosed for performing unified broadcast encryption and traitor tracing for digital content. In one embodiment a media key tree is divided into S subtrees, the media key tree including media keys and initial values, which may be random values. The digital content is divided into a plurality of segments and at least some of the segments are converted into a plurality of variations. The random values are transformed into media key variations and a separate media key variant is assigned to each of the subdivided subtrees. A unified media key block including the media key tree is stored on the media.

Unified broadcast encryption system

A system and method is disclosed for performing unified broadcast encryption and traitor tracing for digital content. In one embodiment a media key tree is divided into S subtrees, the media key tree including media keys and initial values, which may be random values. The digital content is divided into a plurality of segments and at least some of the segments are converted into a plurality of variations. The random values are transformed into media key variations and a separate media key variant is assigned to each of the subdivided subtrees. A unified media key block including the media key tree is stored on the media.

Countering server-based attacks on encrypted content

Embodiments of the present invention relate to providing encrypted content to authorized content consumers while providing robust traitor tracing. In some embodiments, at least one device key is read. A key block is read. A media key precursor is determined from the key block and the at least one device key. At least one encrypted block key is read. A block master key is determined from the media key precursor. A security program is executed to determine a decrypted block key from the media key precursor, the block master key, and the encrypted block key. The decrypted block key is provided for application to the encrypted content to obtain decrypted content.