H04N7/1675

Apparatus for managing members of at least one group of decoders having access to broadcast data
10878848 · 2020-12-29 · ·

A technique to manage members of a group of decoders having access to broadcast data, each group member sharing a common broadcast encryption scheme (BES) comprising the steps of, in a stage for a decoder to become a group member, receiving keys pertaining to the position in the group according to the BES, receiving a current group access data comprising a current group access key, and in a stage of accessing broadcast data, using the current group access data to access the broadcast data, and in a stage of renewing the current group access key, sending a first group message comprising at lease a next group access key encrypted so that only non-revoked decoders can access it, said group message being further encrypted by the current group access key, updating the current group access key with the next group access key.

SECURE PROVISIONING, BY A CLIENT DEVICE, CRYPTOGRAPHIC KEYS FOR EXPLOITING SERVICES PROVIDED BY AN OPERATOR
20200404392 · 2020-12-24 · ·

A method for securely receiving a multimedia content by a client device operated by one or more operator(s) involving a dedicated provisioning server of a security provider managing symmetric secrets used by the client devices and operators license servers. The provisioning server provides to the client device one or more generations of operator specific unique device secrets, which are then exploited by the various operators' license servers to deliver licenses such that authorized client devices can consume protected multimedia contents.

ELECTRONIC DEVICE AND CONTROL METHOD THEREFOR
20200404346 · 2020-12-24 ·

The present disclosure relates to an electronic apparatus. The electronic apparatus includes a signal receiving unit that may receive a video signal; an interface unit that may communicates with a security processing module; a signal processing unit; and a processor that transmits first data of the video signal received by the signal receiving unit to the security processing module through the interface unit and receives secured second data from the security processing module, controls the signal processing unit to process the received second data for displaying a video, identifies whether continuity of processing of second data by the signal processing unit is limited based on a ratio of a transmission amount of the first data and a transmission amount of the second data transmitted and received between the interface unit and the security processing module, and performs subsequent processing according to the identification.

Single pass parallel encryption method and apparatus

Apparatuses, methods and storage medium associated with single pass parallel encryption are disclosed herein. In embodiments, an apparatus for computing may comprise an encryption engine to encrypt a video stream. The encryption engine may comprise a plurality of encryption pipelines to respectively encrypt a plurality of video sub-streams partitioned from the video stream in parallel in a single pass as the video sub-streams are being generated. The plurality of encryption pipelines may use a corresponding plurality of multi-part encryption counters to encrypt the corresponding video sub-streams as the video sub-streams are being generated. Each of the multi-part encryption counters used by one of the encryption pipelines may comprise a sub-portion that remains constant while encoding the corresponding video sub-stream, but the sub-key is unique for the one encryption pipeline, and differs from corresponding sub-portions of the multi-part encryption counters used by the other encryption pipelines. Other embodiments may be disclosed or claimed.

Privacy preserving monitoring

According to an example aspect of the present invention, there is provided an apparatus (160, 170) comprising a receiver configured to receive anonymized sensor information, at least one processing core configured to convert the anonymized sensor information into personal sensor information based at least partly on personal information, and a memory interface configured to, under control of the at least one processing core, access the personal information.

Method and system for configurable security and surveillance systems

A method and system for a configurable security and surveillance system are provided. A configurable security and surveillance system may comprise at least one programmable sensor agent and/or at least one programmable content analysis agent. A plurality of processing features may be offered by the configurable security and surveillance system by programming configurable hardware devices in the programmable sensor agents and/or the programmable content analysis agents via a system manager. Device programming files may be utilized to program the configurable hardware devices. The device programming files may be encrypted and decryption keys may be requested to enable the programming of different processing features into the programmable sensor agents and/or the programmable content analysis agents. The device programming files and/or the decryption keys may be received via a network transfer and/or via a machine-readable media from an e-commerce vendor.

Technique for securely communicating programming content

A technique for securely transferring content from a first device in a first layer to a second device in a second layer. In one embodiment, the first device is a device in a trusted domain and the second device is outside of the trusted domain. Transfer of protected content to another device may require authentication of the receiving device. A rights file which specifies the rights of the receiving device to use the protected content, according to its security level is also transferred. These rights may concern, e.g., the number of times the receiving device may transfer the protected content to other devices, the time period within which the receiving device may play the protected content, etc. The higher the security level of the receiving device, the more rights accorded thereto. A minimum security level requirement may be imposed in order for protected content to be transferred to a device.

DELIVERY OF ENCRYPTED MULTIPLEXES VIA HYPER TEXT TRANSFER PROTOCOL

A method and system provide the ability to deliver media content. A packager receives an original encrypted transport stream, and segments the stream into multiple fixed-duration transport stream files (chunks). The packager further generates a manifest file that describes the chunks and is consistent with a hypertext transfer protocol (HTTP) live streaming (HLS) protocol. The manifest file and chunks are delivered to a content delivery network (CDN). An enhanced HLS client is embed in an integrated receiver decoder (IRD). The enhanced HLS client retrieves the manifest file and the chunks from the CDN, and reconstructs the original encrypted transport stream for use by a service provider network.

Parental control in a networked environment

Methods, systems, and products control presentation of media content within a networked environment of multiple devices. Interaction rules are used to determine which ones of the devices interact with each other. Further rules may define what media content is playable by each one of the devices in the networked environment.

System and method to deliver video content

Aspects of the subject disclosure may include, for example, identifying video content having a scheduled broadcast time during a first viewing period that satisfies a viewership threshold and facilitating a transfer of the video content to a multimedia storage device. The video content is transferred to the multimedia storage device during a second viewing period prior to the first viewing period. The video content includes the data to prevent the multimedia storage device from sending the video content to another device prior to the time when the program is scheduled to be broadcast. Other embodiments are disclosed.