Patent classifications
H04N7/1675
Method to watermark a compressed content encrypted by at least one content key
A system and method to watermark a compressed content encrypted by at least one content key, said content key as well as pre-marking data forming Conditional Access System (CAS) data, said CAS Data being encrypted by a transmission key and comprising at least one signature to authenticate all or part of the CAS Data, said compressed content being received by a client device comprising: a Descrambler having an input to receive the encrypted compressed content and an output to produce an compressed content, a Watermark (WM) inserter directly connected to the output of the Descrambler, said Descrambler and said WM inserter being connected with a Conditioner, said Conditioner executing the following steps: receiving the CAS Data, decrypting the CAS Data with the transmission key, verifying the signature of the CAS Data, and if the signature is valid, transferring the content key to the descrambler and the pre-marking data to the WM inserter, and watermarking by the WM inserter, the decrypted content received by the descrambler using the pre-marking data and the identifier.
Realtime wireless synchronization of live event audio stream with a video recording
Systems and methods are presented herein that facilitate temporally synchronizing, in real time, a separately sourced high quality audio segment of a live event with a video segment that is generated by a recording device associated with a member of the audience. An A-V Synchronization Application may synchronize a video segment of a live event that is generated from a personal electronic device of an audience member with a high quality audio segment that is separately sourced and generated by professional sound recording equipment at the live event. The result of the temporal synchronization is a high fidelity digital audio visual recording of the live event. In various, the audience member may stream, in real-time, the high fidelity digital audio visual recording to an additional electronic device at a different geo-location. In some examples, narrative audio segments may be also included as part of the high fidelity digital audio visual recording.
Content security for a video stream
A video capturing device configured to capture video data, the image capturing device comprising: an image processing pipeline configured to generate a video stream from the captured video data; an encryption key activating module configured to, upon request, activate an encryption key and deactivate any previously activated encryption key used for encrypting the video stream, such that only one encryption key is activated to be used for encryption of the video stream at each instance in time; an encryption scheduler module configured to, at a predetermined time interval, instruct the encryption key activating module to activate an encryption key; an event handling module configured to, as a response to receiving indications of a detected event, instruct the encryption key activating module to activate an encryption key; an encryption module configured to encrypt the video stream using the one activated encryption key.
Video encryption method and apparatus, image capture device and readable storage medium
The present disclosure discloses a video encryption method comprising: acquiring image frames continuously by using an image acquisition component, and storing the image frames into a frame buffer; acquiring a time encryption sequence, and using the time encryption sequence to obtain an address encryption sequence; and reading each of the image frames in the frame buffer according to the address encryption sequence to obtain an encrypted video when the frame buffer is full. The method continuously acquires the image frames and uses the time encryption sequence to obtain the address encryption sequence, and when the frame buffer is full, each of the image frames in the frame buffer is read according to the address encryption sequence to obtain an encrypted video. In addition, the present disclosure also provides a video encryption apparatus, an image capture device, and a computer readable storage medium, which also have the above-mentioned beneficial effects.
Securing media content using interchangeable encryption key
An embodiment of a system for securing media content includes a digital media device comprising a memory associated with a secure element. The memory contains a private key and storage for at least one group key. The private key is used to decrypt transmissions from a remote access control system that are encrypted by a corresponding public key. The digital media device further comprises logic configured to respond to a first message received from the remote access control system encrypted by the public key and including a first group key, the logic responding to the first message by decrypting the first group key and storing the first group key in the memory of the secure element. The digital media device further comprises logic configured to decrypt a content key with the first group key. The content key is used to encrypt media content stored on a medium accessible by the digital media device.
SYSTEM AND A METHOD FOR PROCESSING AN IMAGE
A system and a method for processing an image. The method includes the steps of: receiving a source image having at least one sensitive portions arranged to present intelligible sensitive information; and processing, with a predetermined redacting method, the at least one sensitive portions of the source image to generate an output image including the intelligible sensitive information being transformed into an unintelligible form; wherein the sensitive information in the unintelligible form is adapted to be restored to an intelligible form.
Systems and methods for transcoding and place shifting media content
A set-top box (STB), digital video recorder (DVR), video player or other host device receives and interacts with a transcode module to provide enhanced transcoding capabilities that may be useful in placeshifting or other applications. The transcode module includes a host interface that couples to and communicates with the host device. The transcode module also includes a processor that receives an encrypted media stream from the host device via the bus interface, decrypts the encrypted media stream, transcodes the encrypted media stream to a different format, re-encrypts the transcoded stream, and provides the re-encrypted media stream to the host device via the host interface. The transcoded media content may be placeshifted to a remote player, stored at the host, or used for any other purpose.
Method and apparatus for delivering encoded content
A method and system for delivering encoded content are provided. A holdback representing a portion of the encoded content is extracted, thereby damaging the encoded content. The damaged encoded content is distributed. The holdback is transmitted to enable reintegration of the holdback with the damaged encoded content to restore the encoded content.
Method and system for providing content
Methods and systems for providing content. A selection of a single virtual channel may be received from the user. Virtual programming data for the single virtual channel may be accessed. The virtual programming data may define content to be provided over the single virtual channel. The content may be provided over the single virtual channel in accordance with the virtual programming data.
Digital image inference system with enhanced privacy protection
A system for inferring features in a digital image includes a vision sensor for capturing and optically encrypting an image of a visual scene so as to shroud any human-perceivable features contained therein. An image interpreter in communication with the vision sensor is programmed to recognize and classify features in the encrypted image without prior decryption, thereby ensuring the privacy of any subjects depicted therein. The vision sensor is encoded with a calibration key that applies a unique transformation function to optically encrypt the captured image. The image interpreter is permitted access to the calibration key and applies a convolutional network constructed using the calibration key, a source convolutional network, and a set of private layer keys in order to infer features in the encrypted image without prior decryption. For applications requiring enhanced privacy protection, the inference output produced by the image interpreter remains encrypted but available for further feature detection.