Patent classifications
H04N21/2351
Systems and methods for secure playback of encrypted elementary bitstreams
Systems and methods for providing multimedia content from one process or component to another process or component over an unsecured connection are provided. One embodiment includes obtaining the cryptographic information, extracting the at least partially encrypted video data from the container file to create an elementary bitstream, enciphering the cryptographic information, inserting the cryptographic information in the elementary bitstream, providing the elementary bitstream to a video decoder, extracting the cryptographic information from the elementary bitstream at the video decoder, deciphering the cryptographic information, decrypting the elementary bitstream with the cryptographic information and decoding the elementary bitstream for rendering on a display device using the video decoder.
Securely paired delivery of activation codes from smart card to remote client set-top box
Described herein are systems and methods for hardware enforcement of hardware functionality in a client television receiver. An activation message containing an activation code for a specific hardware component within the client television receiver can be transmitted from a television service provider system to a host television receiver having an associated smart card. The smart card can decrypt the activation message, identify the client television receiver as the destination of the activation message, security check the activation message, encrypt the activation message with a local key, and transmit the activation message to a security processor on the client television receiver. The security processor can decrypt the activation message, security check the activation message to ensure it is from the smart card and has not been tampered with, and enable the hardware component within the client television receiver based on the activation code within the activation message.
Securely paired delivery of activation codes from smart card to host set-top box
Described herein are systems and methods for hardware enforcement of hardware functionality in a television receiver. An activation message containing an activation code for a specific hardware component within the television receiver can be transmitted from a television service provider system to a television receiver having an associated smart card. The smart card can decrypt the activation message, security check the activation message, confirm the activation message is intended for the television receiver, encrypt the activation message with a local key, and transmit the activation message to a security processor on the television receiver. The security processor can decrypt the activation message, security check the activation message to ensure it is from the smart card and has not been tampered with, and enable the hardware component within the television receiver based on the activation code within the activation message.
SYSTEM AND METHOD OF CONTROLLING ACCESS TO AUDIO AND VIDEO FEEDS IN A CLOSED NETWORK
The system and method disclosed herein comprise a transmitter circuit and a receiver circuit that are programmed by a system administrator. The transmitter circuit receives audio and visual non-SMPTE formatted data signal via Serial Data Interface that it encodes to prevent unauthorized access. The scrambled and encoded data signal is transmitted to users within a closed network. The receiver circuit decodes the data signal allowing authorized access the data signal.
SECURE DIGITAL DATA COLLECTION
Systems and methods for generating certified images and incident reports are disclosed. An image capture device can be used to capture an image and integrate metadata from camera sensors as well as other ancillary device sensors into the image. The image and its metadata can then be certified upon a check that the image and its metadata are authentic and unaltered. The image and its metadata can then be included in or as a part of an incident or other report describing an incident or event such as an accident or a crime. The image and/or incident report may be maintained at a cloud-based server for viewing, authorized editing, and subsequent distribution.
Method and device allowing an access control system to be applied to the protection of streamed video
Some embodiments are directed to a method and to a device allowing an access control system to be applied to the protection of streamed video. The inventive system and associated method allow an existing access control system of Marlin type to be used innovatively based on the execution of two successive operation phases allowing DRM rights to be acquired followed by the delivery of content and the decryption thereof.
Secure session-based video watermarking for online media streaming
A method includes generating a first media file that includes a plurality of first media file segments, generating a second media file as a copy of the first media file, the second media file includes a plurality of second media file segments, embedding a first watermark with the plurality of first media file segments, embedding at least one second watermark with the plurality of second media file segments, generating a manifest file based on a portion of the plurality of first media file segments and a portion of the plurality of second media file segments, the manifest file including a plurality of addresses each referencing a media file segment, and encrypting each of plurality of addresses.
Method and system for unified mobile content protection
Media content is delivered to a variety of mobile devices in a protected manner based on client-server architecture with a symmetric (private-key) encryption scheme. A media preparation server (MPS) encrypts media content and publishes and stores it on a content delivery server (CDS), such as a server in a content distribution network (CDN). Client devices can freely obtain the media content from the CDS and can also freely distribute the media content further. They cannot, however, play the content without first obtaining a decryption key and license. Access to decryption keys is via a centralized rights manager, providing a desired level of DRM control.
TRANSMISSION DEVICE, TRANSMISSION METHOD, RECEPTION DEVICE, AND RECEPTION METHOD
The present technology relates to a transmission device, a transmission method, a reception device, and a reception method that can improve transmission efficiency. An encoded signal is generated based on realtime data indicated by a waveform L using a predetermined fixed bit rate as a maximum code amount Sx and the encoded signal into which non-realtime data with an insufficient code amount is inserted is transmitted at the fixed bit rate, as indicated by a range Z12, when a code amount of the generated encoded signal is insufficient for the maximum code amount Sx. The present technology can be applied to broadcasting communication.
Digital Enveloping for Digital Right Management and Re-broadcasting
An apparatus includes a memory storing a digital envelope and a wavefront demultiplexing (WFD) device which receives M input streams concurrently, M being an integer greater than 1, performs a WFD transformation on the M input streams, and generates M output streams concurrently. A first input stream includes wavefront multiplexed digital identifiers for digital right management. A second input stream is the digital envelope. The first input stream presented in a digital format appears to human perception as having identical features to the digital envelope presented in the digital format. Each output stream is a linear combination of the M input streams such that the digital identifiers are recovered from at least one of the M output streams. The digital envelope is a data file used by a sender to send the M input streams and is scaled with a magnification factor greater than 1 in the WFD transformation.