Patent classifications
H04L2209/606
RENEWABLE TRAITOR TRACING
A system, method, and computer program product to renewably prevent traitors in a broadcast encryption system from re-using compromised keys. A license agency assigns individual receivers a set of Sequence Keys preferably at manufacture, and assigns Sequence Key Blocks (SKBs) to protected content files to be distributed. The files may be distributed on prerecorded media and typically include several file modifications. The particular modifications in a pirated version of a file can help identify which traitors contributed to its theft. SKBs assigned to new files distributed after traitors have been identified cannot be usefully processed using the compromised keys employed in previous content piracy. Innocent receivers that happen to have compromised key(s) in common with traitors can use a replacement uncompromised Sequence Key from the set to usefully decrypt content. Traitors will however step through all their Sequence Keys without reaching one that will work.
Computerized, copy detection and discrimination apparatus and method
An engine identifying segments or portions of one source material or source file common to or found in another source material or file. The engine may receive a first data stream in binary form as well as a second stream in binary form. The engine may include a data stream processor or pre-processor programmed to translate the first and second data streams to generate respective first and second processed data streams. The commonality between the first and second processed data streams may be greater than the commonality between the first and second data streams themselves. Also, a comparator may be programmed to compare the first and second process data streams and identify binary segments found in both the first and second processed data streams.
Systems and methods for real-time digital video piracy monitoring
Systems and methods for performing video piracy monitoring are disclosed. One computer-implemented method may include: detecting, at a digital media platform associated with a piracy monitoring system, a request to transmit a video stream to a user computing device associated with a user; transmitting the video stream to the user computing device and responsive to determining that the user is a subscriber to the digital media platform; retrieving activity data associated with the video stream using a content delivery network (CDN) associated with the piracy monitoring system; providing, responsive to the retrieving, the activity data to a trained machine-learning model configured to recognize a video piracy pattern; and performing a mitigating action to address piracy of the video stream responsive to receiving an output result from the trained machine-learning model indicating that the activity log data shares a predetermined level of similarity with the video piracy pattern.
Systems and methods for real-time digital video piracy monitoring
Systems and methods for performing video piracy monitoring are disclosed. One computer-implemented method may include: detecting, at a digital media platform associated with a piracy monitoring system, a request to transmit a video stream to a user computing device associated with a user; transmitting the video stream to the user computing device and responsive to determining that the user is a subscriber to the digital media platform; retrieving activity data associated with the video stream using a content delivery network (CDN) associated with the piracy monitoring system; providing, responsive to the retrieving, the activity data to a trained machine-learning model configured to recognize a video piracy pattern; and performing a mitigating action to address piracy of the video stream responsive to receiving an output result from the trained machine-learning model indicating that the activity log data shares a predetermined level of similarity with the video piracy pattern.