Patent classifications
H04N21/2351
Real-time cloud-based video watermarking systems and methods
A video generation system is configured to provide streaming video as a cloud processed service to viewers over a computing network. In response to a request from a viewer, a video source is configured to provide video and an identifier source is configured to provide an identifier for inclusion in the video. A video encoder is configured to convert the video from a first format to a second format, apply the identifier to the video, and otherwise encode the video in real-time while streaming the encoded video to the viewer. The identifier may be stored in association with the account information of the viewer and used for identifying the viewer a source of an unauthorized video copy.
System and methods for permitting open access to data objects and for securing data within the data objects
A system and methods for permitting open access to data objects and for securing data within the data objects is disclosed. According to one embodiment of the present invention, a method for securing a data object is disclosed. According to one embodiment of the present invention, a method for securing a data object is disclosed. The method includes the steps of (1) providing a data object comprising digital data and file format information; (2) embedding independent data into a data object; and (3) scrambling the data object to degrade the data object to a predetermined signal quality level. The steps of embedding and scrambling may be performed until a predetermined condition is met. The method may also include the steps of descrambling the data object to upgrade the data object to a predetermined signal quality level, and decoding the embedded independent data.
Electronic device, image processing method thereof, and non-transitory computer readable recording medium
An electronic device, an image processing method thereof, and a non-transitory computer readable recording medium are provided. The image processing method for the electronic device includes receiving an image signal; extracting, by a middleware layer, an entitlement management message (EMM) from the image signal; transmitting the extracted EMM to a web browser based application of an application layer; confirming, by the application, a user authority using the extracted EMM; extracting, by the middleware layer, a control word (CW) if the authority for the image signal is confirmed; and descrambling the image signal using the extracted control word.
Systems and Methods for Secure Playback of Encrypted Elementary Bitstreams
Systems and methods for providing multimedia content from one process or component to another process or component over an unsecured connection are provided. One embodiment includes obtaining the cryptographic information, extracting the at least partially encrypted video data from the container file to create an elementary bitstream, enciphering the cryptographic information, inserting the cryptographic information in the elementary bitstream, providing the elementary bitstream to a video decoder, extracting the cryptographic information from the elementary bitstream at the video decoder, deciphering the cryptographic information, decrypting the elementary bitstream with the cryptographic information and decoding the elementary bitstream for rendering on a display device using the video decoder.
Signal processing apparatus and methods
A unified system of programming communication. The system encompasses the prior art (television, radio, broadcast hardcopy, computer communications, etc.) and new user specific mass media. Within the unified system, parallel processing computer systems, each having an input (e.g., 77) controlling a plurality of computers (e.g., 205), generate and output user information at receiver stations. Under broadcast control, local computers (73, 205), combine user information selectively into prior art communications to exhibit personalized mass media programming at video monitors (202), speakers (263), printers (221), etc. .[.At intermediate transmission stations (e.g., cable television stations), signals in network broadcasts and from local inputs (74, 77, 97, 98) cause control processors (71) and computers (73) to selectively automate connection and operation of receivers (53), recorder/players (76), computers (73), generators (82), strippers (81), etc..]. At receiver stations, signals in received transmissions and from local inputs (225, 218, 22) cause control processors (200) and computers (205) to automate connection and operation of converters (201), tuners (215), decryptors (224), recorder/players (217), computers (205), furnaces (206), etc. Processors (71, 200) meter and monitor availability and usage of programming.
METHOD AND DEVICE FOR CHECKING AUTHENTICITY OF A HBBTV RELATED APPLICATION
A conditional access module receives a multimedia stream transporting multimedia content and application data forming an application to be executed in relation to the multimedia content. At reception of the multimedia stream by the conditional access module, the application data is separated from the multimedia stream by an input filter included in the conditional access module. The application data includes a current authentication code. The input filter forwards the application data with the current authentication code to a quarantine memory associated with an application checker included in the conditional access module. The application checker verifies the current authentication code by using a reference authentication code previously acquired by the conditional access module. Upon successful verification of the authentication code, the application data is retrieved from the quarantine memory and merged by a merging module with the multimedia content previously separated by the input filter.
System and method of generating subtitling for media
A method for media subtitling is described, wherein subtitles and/or captions for media are first created on a web interface in a first language along with the appropriate synchronization information with respect to the media. The document content may be created via the web interface, or it may be created locally and uploaded to the interface. Subsequent to creation and/or upload of at least a portion of the subtitling, personnel in different locations (e.g., different terminals or different countries) then access the web interface, which includes the first language and the synchronization information, to create foreign/alternative subtitling.
Signal processing apparatus and methods
A unified system of programming communication. The system encompasses the prior art (television, radio, broadcast hardcopy, computer communications, etc.) and new user specific mass media. Within the unified system, parallel processing computer systems, each having an input (e.g., 77) controlling a plurality of computers (e.g., 205), generate and output user information at receiver stations. Under broadcast control, local computers (73, 205), combine user information selectively into prior art communications to exhibit personalized mass media programming at video monitors (202), speakers (263), printers (221), etc. .[.At intermediate transmission stations (e.g., cable television stations), signals in network broadcasts and from local inputs (74, 77, 97, 98) cause control processors (71) and computers (73) to selectively automate connection and operation of receivers (53), recorder/players (76), computers (73), generators (82), strippers (81), etc..]. At receiver stations, signals in received transmissions and from local inputs (225, 218, 22) cause control processors (200) and computers (205) to automate connection and operation of converters (201), tuners (215), decryptors (224), recorder/players (217), computers (205), furnaces (206), etc. Processors (71, 200) meter and monitor availability and usage of programming.
SECURELY PAIRED DELIVERY OF ACTIVATION CODES BETWEEN REMOVABLE AND INTEGRATED SECURITY PROCESSORS
Described herein are systems and methods for hardware enforcement of hardware functionality in a television receiver. An activation message containing an activation code for a specific hardware component within the television receiver can be transmitted from a television service provider system to a television receiver having an associated smart card. The smart card can decrypt the activation message, security check the activation message, confirm the activation message is intended for the television receiver, encrypt the activation message with a local key, and transmit the activation message to a security processor on the television receiver. The security processor can decrypt the activation message, security check the activation message to ensure it is from the smart card and has not been tampered with, and enable the hardware component within the television receiver based on the activation code within the activation message.
SECURE ACTIVATION OF CLIENT RECEIVER BY HOST RECEIVER SMART CARD
Described herein are systems and methods for hardware enforcement of hardware functionality in a client television receiver. An activation message containing an activation code for a specific hardware component within the client television receiver can be transmitted from a television service provider system to a host television receiver having an associated smart card. The smart card can decrypt the activation message, identify the client television receiver as the destination of the activation message, security check the activation message, encrypt the activation message with a local key, and transmit the activation message to a security processor on the client television receiver. The security processor can decrypt the activation message, security check the activation message to ensure it is from the smart card and has not been tampered with, and enable the hardware component within the client television receiver based on the activation code within the activation message.