H04N21/2351

Method for sharing private video streams with first responders
20190268627 · 2019-08-29 ·

A video surveillance service server shares image streams with first responder agencies in the event of emergency. Nominated agencies establish access credentials at the surveillance service data center. A camera is shared by a customer administrator's selection of permissions on each camera via privileged web-browser or mobile device. Permissions enable selection by static meta data such as type, audio, location, motion, recognition, PTZR, spectrum, and epoch. Video streams of present and past epochs are controlled by ranges of time. A responding agency receives an electronic notification from the administrator to present their access credential and a handle for each shared camera of interest. A notification is customized for each responding agency and each event by dynamically generating a link to a secure webserver which records geo-location or network identifiers for validation. Video servers include virtual machines dedicated to each responding agency under control by a customer administrator.

Apparatus for sharing private video streams with first responders and mobile method of operation
20190268626 · 2019-08-29 ·

A video surveillance service shares image streams with mobile first responders in the event of emergency. Nominated agencies establish access credentials at the surveillance service data center. A camera is shared by a customer administrator's selection of permissions on each camera via privileged web-browser or mobile device. Permissions enable selection by static meta data such as type, audio, location, motion, recognition, PTZR, spectrum, and epoch. Video streams of present and past epochs are controlled by ranges of time. A responding agency receives an electronic notification from the administrator to present their access credential and a handle for each shared camera of interest. A notification is customized for each responding agency and each event by dynamically generating a link to a secure webserver which records geo-location or network identifiers for validation or sanity checking. Video servers include virtual machines dedicated to each responding agency under control by a customer administrator.

Transmission device, transmission method, and reception device
10397642 · 2019-08-27 · ·

A predetermined number of pieces of high-quality format image data are successfully transmitted together with basic format image data. A basic video stream including encoded image data of basic format image data and an extended video stream including encoded image data of each of a predetermined number of pieces of high-quality format image data are generated, or a video stream including encoded image data of basic format image data and encoded image data of each of a predetermined number of pieces of high-quality format image data is generated. A container of a predetermined format including the generated video stream is transmitted. Identification information identifying a corresponding format is inserted into the encoded image data of the basic format image data and each of a predetermined number of pieces of high-quality format image data.

MEDIA STREAMING
20240152642 · 2024-05-09 ·

A media playback system for presenting to a user a composition of a plurality of media streams. It has a media selection component configured to receive a scenario dataset, to receive user input for selecting viewing times defining segments of media and composition selections, and to output a list of segments of media from the scenario dataset that are authorized to be viewed by the user. The system has a playback control component configured to retrieve from media storage at least the segments of media from the output list of segments, to decode the segments of media, and to compile composition instructions. The system has a media playback component configured to receive the rendered media and the composition instructions.

STREAMING IMAGE ENCRYPTION METHOD AND COMPUTER PROGRAM, STREAMING IMAGE DECRYPTION METHOD AND COMPUTER PROGRAM

A method of decrypting a streaming image includes: receiving a packet including at least an item which is encrypted, the item including at least one parameter used for decoding image data included in the streaming image; decrypting the item; and decoding the image data included in the streaming image based on the decrypted item, wherein the image data is not encrypted.

METHOD OF BROADCASTING OF SAME DATA STREAM TO MULTIPLE RECEIVERS THAT ALLOWS DIFFERENT VIDEO RENDERING OF VIDEO CONTENT TO OCCUR AT EACH RECEIVER
20190238909 · 2019-08-01 ·

A remote server generates a data stream that is broadcasted to a plurality of receivers. The broadcasted data stream includes a video track having a video data stream, a control track, and a plurality of ancillary data tracks including ancillary data. A specific template is assigned to each of the receivers. Each of the receivers renders a composite video image for display on a display device. Each of the composite video images includes the same video data stream, but each receiver uses its assigned template and selected ancillary data to render its own unique composite video image from the same video data stream.

MANAGING ENCRYPTION KEYS FOR CONTENT
20190238321 · 2019-08-01 ·

Disclosed are systems and methods for encryption key management. Content items, or portions thereof, can be assigned to a plurality of partitions. Each of the plurality of partitions can correspond to a timeframe of encryption key rotation. Cache control can be applied to manifests and/or content based on the timeframe of encryption key rotation.

Downloadable security and protection methods and apparatus

Methods and apparatus for control of data and content protection mechanisms across a network using a download delivery paradigm. In one embodiment, conditional access (CA), digital rights management (DRM), and trusted domain (TD) security policies are delivered, configured and enforced with respect to consumer premises equipment (CPE) within a cable television network. A trusted domain is established within the user's premises within which content access, distribution, and reproduction can be controlled remotely by the network operator. The content may be distributed to secure or non-secure output domains consistent with the security policies enforced by secure CA, DRM, and TD clients running within the trusted domain. Legacy and retail CPE models are also supported. A network security architecture comprising an authentication proxy (AP), provisioning system (MPS), and conditional access system (CAS) is also disclosed, which can interface with a trusted authority (TA) for cryptographic element management and CPE/user device authentication.

Transmission device, transmission method, reception device, and reception method

The present technology relates to a transmission device, a transmission method, a reception device, and a reception method that can improve transmission efficiency. An encoded signal is generated based on realtime data indicated by a waveform L using a predetermined fixed bit rate as a maximum code amount Sx and the encoded signal into which non-realtime data with an insufficient code amount is inserted is transmitted at the fixed bit rate, as indicated by a range Z12, when a code amount of the generated encoded signal is insufficient for the maximum code amount Sx. The present technology can be applied to broadcasting communication.

Conditional access method and system for intelligent operating system

The present invention provides a conditional access method for an intelligent operating system that comprises a trusted execution environment. A digital TV module acquires all channel messages and a control management message. A media play module distributes a DescramblerId and sends the acquired videoPid, audioPid, casId, ecmPid and emmPid and the descrambler message DescramblerId to a conditional access module. The conditional access module selects a registered conditional access application module according to the casId. The conditional access application module acquires corresponding ecm Data and emm Data from the digital TV module, and sends the ecm Data and emm Data to the conditional access module. The conditional access module sends the messages to a trusted application module. The trusted application module performs parse to acquire EK1, EK2 and ECW. The security chip controls a descrambler corresponding to the DescramblerId to perform descrambling according to the acquired messages.