H04N21/2351

Method and apparatus for secure video manifest/playlist generation and playback
11647237 · 2023-05-09 · ·

A method to provide secure delivery of a manifest file for use in playback of a video signal on a video player. The method includes establishing a connection with the video player, wherein the connection has a session identifier identifying the connection with the video player, receiving a request from the video player for the video signal, wherein the video signal is associated with the manifest file created for the video signal, customizing, using the session identifier identifying the connection with the video player, the manifest file created for the video player to provide a customized manifest file that is unique to the video player, the customized manifest file to be used in playback of the video signal on the video player, encrypting the customized manifest file using a manifest encryption key which is based on the session identifier identifying the connection with the video player, and transmitting the encrypted manifest file to the video player.

Online Streamer Image Picture Transmission in Live Interaction
20230209108 · 2023-06-29 ·

This application provides an online streamer image picture transmission method and computing device in live interaction. The method applied to a server, the method includes: receiving an online streamer image picture sent by a first online streamer end, and obtaining a target obfuscation key; performing encryption processing on the online streamer image picture based on the target obfuscation key and picture information of the online streamer image picture, to obtain an encrypted online streamer image picture; and in response to determining that a live interaction request for the first online streamer end and a second online streamer end is received, sending the encrypted online streamer image picture and the target obfuscation key to the second online streamer end.

METHODS OF ADDING AND VALIDATING A DIGITAL SIGNATURE IN A VIDEO DATA SEGMENT
20230188732 · 2023-06-15 · ·

A method for verifying a digital signature in a video data segment generated by a video delivery chain comprises: obtaining the video data segment comprising encoded image frames and a plurality of node device datasets associated with respective labels; wherein one or more node device datasets include respective digital signatures; wherein the one or more node device datasets comprises a first node device dataset which includes a first digital signature generated by a first node device based on a first number of node device datasets that have been last added to the video data segment before the first node device dataset; locating the labels; identifying , using the labels, the first number of node device datasets; and verifying the first digital signature. The application also discloses a method of adding a digital signature to a video data segment.

METHOD AND SYSTEM FOR DATACASTING AND CONTENT MANAGEMENT

A method and system for datacasting and content management. Such a system may have, as its core, a dashboard system for managing data feeds. A dashboard system may receive data feeds from one or more associated devices, such as the hardware devices of first responders or other public safety officers, and may aggregate and prioritize them. The dashboard system may then manage, prioritize and encrypt the video, files and other data in preparation for broadcast over the television or satellite transmitter, via, for example, a television broadcasting station, and may then broadcast the video, files, or other data to a plurality of users. Alerts and notifications may be created, files attached and links to video streams distributed over this same broadcast network. The broadcasting system may be able to send multiple streams of content simultaneously, may be able to target specific users to be broadcast to, and may be able to incorporate data from public data sources, such as public security cameras.

PROTECTING CONTENT-STREAM PORTIONS FROM MODIFICATION OR REMOVAL

Systems and methods are described to enable delivery of streaming content while inhibiting or preventing removal, blocking, or skipping of portions within that streaming content. A content delivery system can generate a manifest indicating content portions that form the streaming content. Each content portion can be identified in the manifest using a concealed identifier, which conceals the actual identifier of the content portion from the client to inhibit or prevent the client from automatically removing or modifying the content portion. On receiving a request for a content portion, the content delivery system can convert the concealed identifier into the actual identifier, and return the appropriate content portion to the client. In some instances, the specific identifiers included within a concealed manifest may be modified or adapted based on monitoring information of the client device, to ensure clients view given portions of streaming content.

METHOD AND DEVICE ALLOWING AN ACCESS CONTROL SYSTEM TO BE APPLIED TO THE PROTECTION OF STREAMED VIDEO

Some embodiments are directed to a method and to a device allowing an access control system to be applied to the protection of streamed video. The inventive system and associated method allow an existing access control system of Marlin type to be used innovatively based on the execution of two successive operation phases allowing DRM rights to be acquired followed by the delivery of content and the decryption thereof.

Securely paired delivery of activation codes between removable and integrated security processors

Described herein are systems and methods for hardware enforcement of hardware functionality in a television receiver. An activation message containing an activation code for a specific hardware component within the television receiver can be transmitted from a television service provider system to a television receiver having an associated smart card. The smart card can decrypt the activation message, security check the activation message, confirm the activation message is intended for the television receiver, encrypt the activation message with a local key, and transmit the activation message to a security processor on the television receiver. The security processor can decrypt the activation message, security check the activation message to ensure it is from the smart card and has not been tampered with, and enable the hardware component within the television receiver based on the activation code within the activation message.

SYSTEM AND METHODS FOR PERMITTING OPEN ACCESS TO DATA OBJECTS AND FOR SECURING DATA WITHIN THE DATA OBJECTS
20170294206 · 2017-10-12 · ·

A system and methods for permitting open access to data objects and for securing data within the data objects is disclosed. According to one embodiment of the present invention, a method for securing a data object is disclosed. According to one embodiment of the present invention, a method for securing a data object is disclosed. The method includes the steps of (1) providing a data object comprising digital data and file format information; (2) embedding independent data into a data object; and (3) scrambling the data object to degrade the data object to a predetermined signal quality level. The steps of embedding and scrambling may be performed until a predetermined condition is met. The method may also include the steps of descrambling the data object to upgrade the data object to a predetermined signal quality level, and decoding the embedded independent data.

INTERLEAVED WATERMARKING
20170289561 · 2017-10-05 ·

In one embodiment, a system includes a Headend apparatus including a watermark processor to generate secondary video streams from sections of a primary video stream, group the secondary video streams in groups of at least two secondary video streams, the secondary video streams including units of data for use in watermarking across cryptoperiods in an end-user device which selects one secondary video stream in each group for rendering as part of a composited video stream in order to embed units of data of an identification in the composited video stream, wherein in each cryptoperiod, the watermark processor is operative to generate different groups of the secondary video streams from different non-overlapping portions of the primary video stream, and an encryption processor to generate control words, encrypt each secondary video stream with a different control word, and change the control word of each secondary video stream every cryptoperiod.

Reducing start-up delay in streaming media sessions
09781084 · 2017-10-03 · ·

A method is provided for delivering a streaming media asset to a client device. For the method, a request is received over a communication network from a client device for playing a media asset in accordance with a streaming media technique. Prior to fully authorizing the client device to play the media asset, the client device is provided with access to a first cryptographic key that decrypts a subset of the media asset so that the client device is able to render the subset of the media asset before completion of the authorization. The subset of the media asset is less than all of the media asset. Subsequent to successfully fully authorizing the client device to play the media asset, the client is provided with access to at least one additional cryptographic key that decrypts a remainder of the media asset.