Patent classifications
H04N7/1675
Systems and Methods for Secure Playback of Encrypted Elementary Bitstreams
Systems and methods for providing multimedia content from one process or component to another process or component over an unsecured connection are provided. One embodiment includes obtaining the cryptographic information, extracting the at least partially encrypted video data from the container file to create an elementary bitstream, enciphering the cryptographic information, inserting the cryptographic information in the elementary bitstream, providing the elementary bitstream to a video decoder, extracting the cryptographic information from the elementary bitstream at the video decoder, deciphering the cryptographic information, decrypting the elementary bitstream with the cryptographic information and decoding the elementary bitstream for rendering on a display device using the video decoder.
METHOD FOR READING A VIDEO STREAM
This method for reading a video stream comprises a step of comparing a datum characteristic of a behavior of a user with a set of predetermined thresholds, each of which, when it is crossed, characterizes an abnormal behavior of the user, a step of signaling an abnormal behavior if at least one predetermined part of these thresholds is crossed, and, otherwise, the absence of this signaling of an abnormal behavior, and a step of executing a counter-measure which makes it more difficult or impossible to access the set of information items contained in a first baseband video stream on the basis of various proofs of a second baseband video stream composed by a first terminal, this execution step being triggered automatically in response to the signaling of an abnormal behavior and not being triggered in the absence of this signaling of an abnormal behavior.
CONTENT SECURITY FOR A VIDEO STREAM
A video capturing device configured to capture video data, the image capturing device comprising: an image processing pipeline configured to generate a video stream from the captured video data; an encryption key activating module configured to, upon request, activate an encryption key and deactivate any previously activated encryption key used for encrypting the video stream, such that only one encryption key is activated to be used for encryption of the video stream at each instance in time; an encryption scheduler module configured to, at a predetermined time interval, instruct the encryption key activating module to activate an encryption key; an event handling module configured to, as a response to receiving indications of a detected event, instruct the encryption key activating module to activate an encryption key; an encryption module configured to encrypt the video stream using the one activated encryption key.
Entitlement access token
A top-level service executes a procedure call to at least one dependent service to determine an entitlement result for a user device making a request of the top-level service. A processing device generates an entitlement token comprising the entitlement result, encrypts the entitlement token and sends the entitlement token to the user device. The user device can return the entitlement token when making additional requests of the top-level service to prevent the top-level service from having to make additional procedure calls to the at least one dependent service.
PRE-ENTITLEMENT ENFORCEMENT
A method of transmitting entitlement messages to content consumption devices in a access control system, the method comprising periodically transmitting entitlement messages to content consumption devices in a access control system and periodically extending an expiry time comprised in the entitlement messages. The entitlement messages comprise indicator data indicating to the content consumption devices that subsequent entitlement messages loaded into a content consumption device after a first entitlement message is loaded into the content consumption device shall not be used by the content consumption device to access protected media content.
METHOD AND APPARATUS FOR SUPPORTING MULTIPLE BROADCASTERS INDEPENDENTLY USING A SINGLE CONDITIONAL ACCESS SYSTEM
A method and apparatus for brokering the enablement of the communication of encrypted media programs from a plurality of independent broadcasters to a plurality of receivers is disclosed. The system makes use of a pairing key for each provided service, which is differently encrypted by a pairing server and by the broadcaster providing the service. The encrypted versions of the pairing key are decrypted in a first receiver module using information known to the pairing service but not the broadcaster and in a second receiver module using information known to the broadcaster. The pairing key is used to cryptographically bind the first and second receiver modules.
METHOD AND APPARATUS FOR SUPPORTING MULTIPLE BROADCASTERS INDEPENDENTLY USING A SINGLE CONDITIONAL ACCESS SYSTEM
A method and apparatus for brokering the enablement of the communication of encrypted media programs from a plurality of independent broadcasters to a plurality of receivers is disclosed. The system makes use of a pairing key for each provided service, which is differently encrypted by a pairing server and by the broadcaster providing the service. The encrypted versions of the pairing key are decrypted in a first receiver module using information known to the pairing service but not the broadcaster and in a second receiver module using information known to the broadcaster. The pairing key is used to cryptographically bind the first and second receiver modules.
Streaming piracy detection method and system
In one embodiment, a command is received from a video provider at a media rendering device, the command being a command to embed a subscriber ID in at least one video frame in a video stream. A random key, k is also received from the video provider at the media rendering device. An injective transformation is invoked for k and the subscriber ID, the injective transformation generating a sequence of pairs of: near-transparent patterns and corresponding time periods. Logical blocks of the at least one video frame in the video stream are overlaid with one of the near-transparent patterns for its one of the corresponding time periods. Related apparatus, systems, and methods are also described.
Surveillance server, method of processing data of surveillance server, and surveillance system
A surveillance server connected to a camera through a network is provided, the camera acquiring an image of a surveillance area. The surveillance server includes: a data acquisition unit configured to acquire from the camera image data of the image that is encrypted; a mode selection unit configured to select a processing mode of the image data; and a decryption control unit configured to decrypt the image data in response to selection of a first mode.
Video copy prevention systems with interaction and compression
Disclosed are systems and methods for providing video content while inhibiting the copying of that content for later viewing. Video images may be made difficult to copy for presentation at later times by the omission or addition of content developed in relation to the particular initial viewing. For instance, video information may be customized by omitting information that is not likely to be substantially perceived by the initial viewer but that is substantially likely to be perceived as missing by at least some other viewers. As another example, video information may be customized for a particular viewing instance so that it contains modified, selected or injected information that is likely to be perceived as non-disruptive or unnoticeable by the original viewer but that would be perceived as substantially noticeable and/or disruptive by some other viewers, including when parts of more than one such video information are combined in an effort to remove customization related to their respective original viewings. Various means and methods for accomplishing the forgoing in a variety of settings are disclosed including also for providing privacy related to what is viewed. In some examples higher-resolution images are provided for the region near the viewer's point-of-regard and lower resolution images are provided elsewhere, which also has the effect of reducing the bandwidth required. For interactive content rendered from digital models, a model for a central foveal region may be provide greater detail and have greater computational requirements than a model for a peripheral view, providing both economy/performance in rendering and protection against copying.