H04N21/2351

Real-Time Cloud-Based Video Watermarking Systems and Methods
20180160197 · 2018-06-07 ·

A video generation system is configured to provide streaming video as a cloud processed service to viewers over a computing network. In response to a request from a viewer, a video source is configured to provide video and an identifier source is configured to provide an identifier for inclusion in the video. A video encoder is configured to convert the video from a first format to a second format, apply the identifier to the video, and otherwise encode the video in real-time while streaming the encoded video to the viewer. The identifier may be stored in association with the account information of the viewer and used for identifying the viewer a source of an unauthorized video copy.

Apparatus and methods for providing content to an IP-enabled device in a content distribution network

Apparatus and methods for providing content to IP-enabled devices in a content distribution network. In one embodiment, a network architecture is disclosed which enables delivery of content to such IP-enabled devices without the use of a high-speed data connection This capability allow the managed network operator to provide content services to an IP-enabled device associated with a non-data subscriber. In one implementation, requests for content from user IP-enabled devices are received, authenticated, and content processed into a series of encrypted segments. Once the requesting user/device is authenticated, the segments are provided with a playlist. The rendering device is also provided access to a decryption key (e.g., via a URL to a managed key server). Variants providing (i) user access to the MSO distribution network via an indigenous modem or gateway; and (ii) user access to the MSO core via a gateway and a third party unmanaged network are described.

METHOD AND SYSTEM FOR UNIFIED MOBILE CONTENT PROTECTION
20180144107 · 2018-05-24 ·

Media content is delivered to a variety of mobile devices in a protected manner based on client-server architecture with a symmetric (private-key) encryption scheme. A media preparation server (MPS) encrypts media content and publishes and stores it on a content delivery server (CDS), such as a server in a content distribution network (CDN). Client devices can freely obtain the media content from the CDS and can also freely distribute the media content further. They cannot, however, play the content without first obtaining a decryption key and license. Access to decryption keys is via a centralized rights manager, providing a desired level of DRM control.

DISTRIBUTED DATABASE MANAGEMENT SYSTEM
20180144044 · 2018-05-24 ·

A distributed database management system provides a central database resident on a server that contains database objects. Objects, e.g., program guide data, to be replicated are gathered together into distribution packages called slices, that are transmitted to client devices. A slice is a subset of the central database which is relevant to clients within a specific domain, such as a geographic region, or under the footprint of a satellite transmitter. The viewer selects television programs and Web content from displayed sections of the program guide data which are recorded to a storage device. The program guide data are used to determine when to start and end recordings. Client devices periodically connect to the server using a phone line and upload information of interest which is combined with information uploaded from other client devices for statistical, operational, or viewing models.

Methods and apparatus to collect distributed user information for media impressions and search terms

An example method to monitor usage of a device includes collecting first and second identifiers based on use of an application that does not employ cookies, the first identifier identifying at least one of the device or a user of the device to a first database proprietor, and the second identifier identifying the at least one of the device or the user of the device to a second database proprietor; sending the first identifier to a first server associated with the first database proprietor, sending the second identifier to a second server associated with the second database proprietor; and sending to a data collection server at least one of a media identifier indicative of media accessed via the application at the device or a search term used via the application at the device.

Accelerating the Processing of a Stream of Media Data Using a Client Media Engine

A technique processes a stream of media data in an accelerated manner using a media engine provided by a client system. The media engine performs this task, under direction of a local controller, using a pipeline of integrated inline media-processing operations having access to local memory. The operations include: decrypting received encrypted media data to produce decrypted media data; decoding the decrypted media data to produce decoded media data; and enhancing the decoded media data to produce enhanced media data. In some cases, the enhanced media data has a resolution that is greater than the resolution of the received decrypted media data. In some implementations, the client system is implemented as a system-on-chip, and the media engine is a component of the system-on-chip.

SECURE DIGITAL DATA COLLECTION
20240386142 · 2024-11-21 ·

Systems and methods for generating certified images and incident reports are disclosed. An image capture device can be used to capture an image and integrate metadata from camera sensors as well as other ancillary device sensors into the image. The image and its metadata can then be certified upon a check that the image and its metadata are authentic and unaltered. The image and its metadata can then be included in or as a part of an incident or other report describing an incident or event such as an accident or a crime. The image and/or incident report may be maintained at a cloud-based server for viewing, authorized editing, and subsequent distribution.

SECURE DIGITAL DATA COLLECTION
20240386143 · 2024-11-21 ·

Systems and methods for generating certified images and incident reports are disclosed. An image capture device can be used to capture an image and integrate metadata from camera sensors as well as other ancillary device sensors into the image. The image and its metadata can then be certified upon a check that the image and its metadata are authentic and unaltered. The image and its metadata can then be included in or as a part of an incident or other report describing an incident or event such as an accident or a crime. The image and/or incident report may be maintained at a cloud-based server for viewing, authorized editing, and subsequent distribution.

SECURE DIGITAL DATA COLLECTION
20240386144 · 2024-11-21 ·

Systems and methods for generating certified images and incident reports are disclosed. An image capture device can be used to capture an image and integrate metadata from camera sensors as well as other ancillary device sensors into the image. The image and its metadata can then be certified upon a check that the image and its metadata are authentic and unaltered. The image and its metadata can then be included in or as a part of an incident or other report describing an incident or event such as an accident or a crime. The image and/or incident report may be maintained at a cloud-based server for viewing, authorized editing, and subsequent distribution.

Downloadable security and protection methods and apparatus

Methods and apparatus for control of data and content protection mechanisms across a network using a download delivery paradigm. In one embodiment, conditional access (CA), digital rights management (DRM), and trusted domain (TD) security policies are delivered, configured and enforced with respect to consumer premises equipment (CPE) within a cable television network. A trusted domain is established within the user's premises within which content access, distribution, and reproduction can be controlled remotely by the network operator. The content may be distributed to secure or non-secure output domains consistent with the security policies enforced by secure CA, DRM, and TD clients running within the trusted domain. Legacy and retail CPE models are also supported. A network security architecture comprising an authentication proxy (AP), provisioning system (MPS), and conditional access system (CAS) is also disclosed, which can interface with a trusted authority (TA) for cryptographic element management and CPE/user device authentication.