Patent classifications
H04N7/167
Device for secure video streaming
A device comprising: at least two interfaces for interconnecting between a video source and a video display, wherein each of said interfaces comprises at least a video data channel and a display settings channel; and unidirectional circuitry; wherein said unidirectional circuitry is configured to allow transmission over said video data channel only from said video source to said video display, and wherein said device is configured to (i) receive, over said display settings channel, display settings data from said video display, and (ii) transmit, over said display settings channel, said display settings data to said video source.
Device for secure video streaming
A device comprising: at least two interfaces for interconnecting between a video source and a video display, wherein each of said interfaces comprises at least a video data channel and a display settings channel; and unidirectional circuitry; wherein said unidirectional circuitry is configured to allow transmission over said video data channel only from said video source to said video display, and wherein said device is configured to (i) receive, over said display settings channel, display settings data from said video display, and (ii) transmit, over said display settings channel, said display settings data to said video source.
Systems and Methods for Precision Downstream Synchronization of Content
Systems and methods for precision downstream synchronization of digital streaming content on an edge content processor in the absence of access to pixel-level data by a video player app operative on the edge content processor are disclosed. Encrypted video streams are synchronized to unencrypted video streams using acquired knowledge of the edge content processor's latency, i.e., the time elapsed between a command to render a video frame and that frame being displayed by the edge content processor. Once a predicted time of display of an encrypted video is obtained by a video player app operative on the edge content processor, a corresponding RGBA video frame is delayed by an amount of time equal to that predicted time minus the edge content processor's latency before a command to render it is issued by the video player app, thereby ensuring both frames are displayed simultaneously.
Systems and Methods for Precision Downstream Synchronization of Content
Systems and methods for precision downstream synchronization of digital streaming content on an edge content processor in the absence of access to pixel-level data by a video player app operative on the edge content processor are disclosed. Encrypted video streams are synchronized to unencrypted video streams using acquired knowledge of the edge content processor's latency, i.e., the time elapsed between a command to render a video frame and that frame being displayed by the edge content processor. Once a predicted time of display of an encrypted video is obtained by a video player app operative on the edge content processor, a corresponding RGBA video frame is delayed by an amount of time equal to that predicted time minus the edge content processor's latency before a command to render it is issued by the video player app, thereby ensuring both frames are displayed simultaneously.
Multimedia streaming techniques using different security policies
There is disclosed a streaming technique in which a distributed playback, DP, master device receives a media stream from a content provider and transmits the media stream to a plurality of DP client devices. The DP master device may follow different policies. In case one DP client device has not a level of security sufficient for a particular quality, one policy provides that the stream is degraded, while another policy provides that the stream is to be transmitted by a content provider at a reduced quality.
Digital image inference system with enhanced privacy protection
A system for inferring features in a digital image includes a vision sensor for capturing and optically encrypting an image of a visual scene so as to shroud any human-perceivable features contained therein. An image interpreter in communication with the vision sensor is programmed to recognize and classify features in the encrypted image without prior decryption, thereby ensuring the privacy of any subjects depicted therein. The vision sensor is encoded with a calibration key that applies a unique transformation function to optically encrypt the captured image. The image interpreter is permitted access to the calibration key and applies a convolutional network constructed using the calibration key, a source convolutional network, and a set of private layer keys in order to infer features in the encrypted image without prior decryption. For applications requiring enhanced privacy protection, the inference output produced by the image interpreter remains encrypted but available for further feature detection.
Systems, methods, and devices for media content tamper protection and detection
Techniques for media content tamper protection and detection are described. In some embodiments, the protection method is performed at an encoder. The encoder obtains a first sequence of signatures within a group of pictures and a second sequence of signatures for audio frames corresponding to the group of pictures. The encoder then combines the first sequence of signatures and the second sequence of signatures to generate a combined signature, and the combined signature is then embedded in a transport stream for transmission to a client device. In some embodiments, the detection method is performed at a client device, where the client device, in response to detecting a first message in the transport stream, starts calculation of signatures for a group of pictures and corresponding audio frames. The client device then uses the calculated signatures to validate an expected signature for the group of pictures and the corresponding audio frames.
SYSTEMS AND METHODS FOR MANAGING LOCAL STORAGE OF ON-DEMAND CONTENT
On-demand systems and methods are provided to manage locally-stored on-demand content. A user's equipment controls the deletion of and/or access to on-demand content from a local storage device based on constraining criteria that may include rental conditions, dynamic factors, and keys.
Reduced Hierarchy Key Management System and Method
A controller receives an encrypted media stream (“EMS”) and an identifier indicative of a selected content key from a headend. The EMS is encrypted with an encryption key and can be decrypted with a corresponding decryption key which is determinable from the selected content key. The controller receives indexes and content keys from the headend prior to receiving the EMS. Each index respectively corresponds to an identifier with one index corresponding to the identifier indicative of the selected content key. The content keys correspond to the indexes with one content key corresponding to the index corresponding to the identifier indicative of the selected content key. The controller selects the index corresponding to the identifier indicative of the selected content key upon receiving the EMS, determines the selected content key from the selected index, determines the decryption key from the selected content key, and decrypts the EMS with the decryption key.
BEHAVIORAL BIOMETRIC PROTECTION FOR WIRELESS CARRIER SUBSCRIBERS
A video stream from a user device that is destined for a recipient device is received at a core network of a wireless carrier network. The video stream has a video quality that at least meets a quality threshold for behavioral biometric analysis. A determination of whether a video privacy policy for the user device permits transmission of the video stream of the video quality to the recipient device is made. In response to the video privacy policy not permitting the transmission of the video stream of the video quality, the video quality of the video stream is downgraded to generate a downgraded video stream that prevents behavioral biometric analysis for transmission to the recipient device. However, in response to the video privacy policy permitting the transmission of the video stream of the video quality, the video stream of the video quality is transmitted to the recipient device.