H04N7/1675

SYSTEMS AND METHODS FOR MANAGING LOCAL STORAGE OF ON-DEMAND CONTENT
20210368229 · 2021-11-25 ·

On-demand systems and methods are provided to manage locally-stored on-demand content. A user's equipment controls the deletion of and/or access to on-demand content from a local storage device based on constraining criteria that may include rental conditions, dynamic factors, and keys.

Reduced Hierarchy Key Management System and Method
20220021930 · 2022-01-20 ·

A controller receives an encrypted media stream (“EMS”) and an identifier indicative of a selected content key from a headend. The EMS is encrypted with an encryption key and can be decrypted with a corresponding decryption key which is determinable from the selected content key. The controller receives indexes and content keys from the headend prior to receiving the EMS. Each index respectively corresponds to an identifier with one index corresponding to the identifier indicative of the selected content key. The content keys correspond to the indexes with one content key corresponding to the index corresponding to the identifier indicative of the selected content key. The controller selects the index corresponding to the identifier indicative of the selected content key upon receiving the EMS, determines the selected content key from the selected index, determines the decryption key from the selected content key, and decrypts the EMS with the decryption key.

Content Rental System
20220007081 · 2022-01-06 ·

A content rental system includes one data store for storing rental content. The content rental system also includes a content server for transferring content to one viewing device based upon a received request. The content server is further configured to authorize the transfer of the content from the viewing device to another viewing device.

Secure provisioning, by a client device, cryptographic keys for exploiting services provided by an operator
11785315 · 2023-10-10 · ·

A method for securely receiving a multimedia content by a client device operated by one or more operator(s) involving a dedicated provisioning server of a security provider managing symmetric secrets used by the client devices and operators license servers. The provisioning server provides to the client device one or more generations of operator specific unique device secrets, which are then exploited by the various operators' license servers to deliver licenses such that authorized client devices can consume protected multimedia contents.

Secure provisioning, by a client device, cryptographic keys for exploiting services provided by an operator
11575977 · 2023-02-07 · ·

A method for securely receiving a multimedia content by a client device operated by one or more operator(s) involving a dedicated provisioning server of a security provider managing symmetric secrets used by the client devices and operators license servers. The provisioning server provides to the client device one or more generations of operator specific unique device secrets, which are then exploited by the various operators' license servers to deliver licenses such that authorized client devices can consume protected multimedia contents.

REAL-TIME WIRELESS SYNCHRONIZATION OF LIVE EVENT AUDIO STREAM WITH A VIDEO RECORDING
20220393014 · 2022-12-08 ·

Systems and methods are presented herein that facilitate temporally synchronizing, in real time, a separately sourced high quality audio segment of a live event with a video segment that is generated by a recording device associated with a member of the audience. An A-V Synchronization Application may synchronize a video segment of a live event that is generated from a personal electronic device of an audience member with a high quality audio segment that is separately sourced and generated by professional sound recording equipment at the live event. The result of the temporal synchronization is a high fidelity digital audio visual recording of the live event. In various, the audience member may stream, in real-time, the high fidelity digital audio visual recording to an additional electronic device at a different geo-location. In some examples, narrative audio segments may be also included as part of the high fidelity digital audio visual recording.

Systems and methods for managing local storage of on-demand content

On-demand systems and methods are provided to manage locally-stored on-demand content. A user's equipment controls the deletion of and/or access to on-demand content from a local storage device based on constraining criteria that may include rental conditions, dynamic factors, and keys.

Methods, systems, and devices for detecting over-the-top piracy

Techniques for detection over-the-top piracy are described. In some embodiments, a piracy detection method is performed at a server by a piracy detector. The piracy detector obtains records associated with requests for access from a plurality of client devices. The piracy detector further distributes the records to a plurality of nodes according to distribution keys extracted from the records, where each of the plurality of nodes receives a respective set of records associated with a respective distribution key and generates a set of respective watch session records based on the respective set of records. The piracy detector also generates watch session records associated with the distribution keys by aggregating the respective watch session records from the plurality of nodes. The piracy detector additionally identifies one or more pirated client devices among the plurality of client devices based on clusters established from the watch session records.

Pre-entitlement enforcement
11451846 · 2022-09-20 · ·

A method of transmitting entitlement messages to content consumption devices in a access control system, the method comprising periodically transmitting entitlement messages to content consumption devices in a access control system and periodically extending an expiry time comprised in the entitlement messages. The entitlement messages comprise indicator data indicating to the content consumption devices that subsequent entitlement messages loaded into a content consumption device after a first entitlement message is loaded into the content consumption device shall not be used by the content consumption device to access protected media content.

Downloadable security and protection methods and apparatus

Methods and apparatus for control of data and content protection mechanisms across a network using a download delivery paradigm. In one embodiment, conditional access (CA), digital rights management (DRM), and trusted domain (TD) security policies are delivered, configured and enforced with respect to consumer premises equipment (CPE) within a cable television network. A trusted domain is established within the user's premises within which content access, distribution, and reproduction can be controlled remotely by the network operator. The content may be distributed to secure or non-secure “output” domains consistent with the security policies enforced by secure CA, DRM, and TD clients running within the trusted domain. Legacy and retail CPE models are also supported. A network security architecture comprising an authentication proxy (AP), provisioning system (MPS), and conditional access system (CAS) is also disclosed, which can interface with a trusted authority (TA) for cryptographic element management and CPE/user device authentication.