Patent classifications
H04N7/167
Method, device, system, and storage medium for live broadcast detection and data processing
The present disclosure provides methods, devices, systems, and storage mediums for live broadcast detection and data processing. In one exemplary embodiments, a user terminal device cooperates with a server and a camera device in a live broadcast system. The terminal device turns towards the camera device and outputs detection content within a detection time. It can be determined whether live broadcast content uploaded/captured by the camera device includes the detection content captured by the camera device within the detection time. If the detection content is found in the live broadcast content, it can be determined that unauthorized live broadcasting exists. Accordingly, corresponding measures can be taken to stop the unauthorized live broadcasting in a timely manner, which helps improve the security of user information.
Systems and Methods for Secure Playback of Encrypted Elementary Bitstreams
Systems and methods for providing multimedia content from one process or component to another process or component over an unsecured connection are provided. One embodiment includes obtaining the cryptographic information, extracting the at least partially encrypted video data from the container file to create an elementary bitstream, enciphering the cryptographic information, inserting the cryptographic information in the elementary bitstream, providing the elementary bitstream to a video decoder, extracting the cryptographic information from the elementary bitstream at the video decoder, deciphering the cryptographic information, decrypting the elementary bitstream with the cryptographic information and decoding the elementary bitstream for rendering on a display device using the video decoder.
Method for reading a video stream
This method for reading a video stream comprises a step of comparing a datum characteristic of a behavior of a user with a set of predetermined thresholds, each of which, when it is crossed, characterizes an abnormal behavior of the user, a step of signaling an abnormal behavior if at least one predetermined part of these thresholds is crossed, and, otherwise, the absence of this signaling of an abnormal behavior, and a step of executing a counter-measure which makes it more difficult or impossible to access the set of information items contained in a first baseband video stream on the basis of various proofs of a second baseband video stream composed by a first terminal, this execution step being triggered automatically in response to the signaling of an abnormal behavior and not being triggered in the absence of this signaling of an abnormal behavior.
Reduced hierarchy key management system and method
A controller receives an encrypted media stream (“EMS”) and an identifier indicative of a selected content key from a headend. The EMS is encrypted with an encryption key and can be decrypted with a corresponding decryption key which is determinable from the selected content key. The controller receives indexes and content keys from the headend prior to receiving the EMS. Each index respectively corresponds to an identifier with one index corresponding to the identifier indicative of the selected content key. The content keys correspond to the indexes with one content key corresponding to the index corresponding to the identifier indicative of the selected content key. The controller selects the index corresponding to the identifier indicative of the selected content key upon receiving the EMS, determines the selected content key from the selected index, determines the decryption key from the selected content key, and decrypts the EMS with the decryption key.
Systems and methods for managing local storage of on-demand content
On-demand systems and methods are provided to manage locally-stored on-demand content. A user's equipment controls the deletion of and/or access to on-demand content from a local storage device based on constraining criteria that may include rental conditions, dynamic factors, and keys.
Providing subscriber specific content in a network
.[.A unified system of programming communication. The system encompasses the prior art (television, radio, broadcast hardcopy, computer communications, etc.) and new user specific mass media. Within the unified system, parallel processing computer systems, each having an input (e.g., 77) controlling a plurality of computers (e.g., 205), generate and output user information at receiver stations. Under broadcast control, local computers (73, 205), combine user information selectively into prior art communications to exhibit personalized mass media programming at video monitors (202), speakers (263), printers (221), etc. At intermediate transmission stations (e.g., cable television stations), signals in network broadcasts and from local inputs (74, 77, 97, 98) cause control processors (71) and computers (73) to selectively automate connection and operation of receivers (53), recorder/players (76), computers (73), generators (82), strippers (81), etc. At receiver stations, signals in received transmissions and from local inputs (225, 218, 22) cause control processors (200) and computers (205) to automate connection and operation of converters (201), tuners (215), decryptors (224), recorder/players (217), computers (205), furnaces (206), etc. Processors (71, 200) meter and monitor availability and usage of programming..]. .Iadd.A method is described for controlling a receiver station using stored data specific to a user. By receiving a computer program transmitted from a transmitter station, the computer program is stored at the receiver station. Upon execution of the computer program, the data specific to a user is processed to generate information content at an output device..Iaddend.
Technique for securely communicating and storing programming material in a trusted domain
A “trusted domain” is established within which content received from a communications network, e.g., a cable TV network, is protected from unauthorized copying thereof, in accordance with the invention. In an illustrative embodiment, the trusted domain includes a device associated with a user which receives content from the cable TV network. The content may be encrypted using a content key in accordance, e.g., with a 3DES encryption algorithm before it is stored in the device. In addition, a first encrypted content key version and a second encrypted content key version are generated by respectively encrypting the content key with a public key associated with the device and another public key associated with the user, in accordance with public key cryptography. The first and second encrypted content key versions are stored in association with the encrypted content in the device storage. The encrypted content can be migrated from a first device to a second device, and can be decrypted in the second device in the second device is associated with the same user, and also provided with the second encrypted content key version.
Providing enhanced content
Methods, systems, computer readable media, and apparatuses for providing enhanced content are presented. Data including a first program, a first caption stream associated with the first program, and a second caption stream associated with the first program may be received. The second caption stream may be extracted from the data, and a second program may be encoded with the second caption stream. The first program may be transmitted with the first caption stream including first captions and may include first content configured to be played back at a first speed. In response to receiving an instruction to change play back speed, the second program may be transmitted with the second caption stream. The second program may include the first content configured to be played back at a second speed different from the first speed, and the second caption stream may include second captions different from the first captions.
Systems and methods for secure playback of encrypted elementary bitstreams
Systems and methods for providing multimedia content from one process or component to another process or component over an unsecured connection are provided. One embodiment includes obtaining the cryptographic information, extracting the at least partially encrypted video data from the container file to create an elementary bitstream, enciphering the cryptographic information, inserting the cryptographic information in the elementary bitstream, providing the elementary bitstream to a video decoder, extracting the cryptographic information from the elementary bitstream at the video decoder, deciphering the cryptographic information, decrypting the elementary bitstream with the cryptographic information and decoding the elementary bitstream for rendering on a display device using the video decoder.
Content rental system
A content rental system includes one data store for storing rental content. The content rental system also includes a content server for transferring content to one viewing device based upon a received request. The content server is further configured to authorize the transfer of the content from the viewing device to another viewing device.