H04N21/2351

Device for short-range communication, adapted to provide access to a remote service
09924448 · 2018-03-20 · ·

A hub device is configured for communicating with a terminal by using a short-range wireless connection. The hub device is further configured for connecting to a remote service. More particularly, the device is configured for: receiving from the terminal a request to access the remote service, the access request comprising identification parameters for said service; temporarily storing in memory the identification parameters of the request received, in order to send to the remote service a second access request comprising the identification parameters; and upon response from the remote service to the second request, transferring data relating to the service.

Shuffled media content
09918143 · 2018-03-13 · ·

In one embodiment, a method for providing media content implemented on a broadcast headend includes defining at least one metablock of media content according to a number of media content data blocks, where the media content data blocks are ordered in accordance with associated serial numbers, reordering the media content data blocks in the at least one metablock of media content to generate reordered data blocks, obfuscating the associated serial numbers in the reordered data blocks, providing details of the reordering to a receiving device, and transmitting the reordered data blocks to a receiving device.

Hidden replaceable media slots
12160631 · 2024-12-03 · ·

Determining and hiding a replaceable period of a MP (Media Presentation). A method for determining includes receiving a first MPD (Media Presentation Description) that identifies a predetermined period and at least one media segment of the MP to be presented during the predetermined period. A determination is made as to whether the first MPD includes additional data to be resolved by an application. The additional data is provided to the application when the first MPD is determined to include the additional data. Additional period information is received from the application. A second MPD is generated based on the received additional period information. The MP is output for display to a user based on the second MPD. Each of a subset of the at least one media segment for a replaceable sub-period of the MP is replaceable with an alternate media segment.

Real-time cloud-based video watermarking systems and methods

A video generation system is configured to provide streaming video as a cloud processed service to viewers over a computing network. In response to a request from a viewer, a video source is configured to provide video and an identifier source is configured to provide an identifier for inclusion in the video. A video encoder is configured to convert the video from a first format to a second format, apply the identifier to the video, and otherwise encode the video in real-time while streaming the encoded video to the viewer. The identifier may be stored in association with the account information of the viewer and used for identifying the viewer a source of an unauthorized video copy.

Systems and methods for secure playback of encrypted elementary bitstreams

Systems and methods for providing multimedia content from one process or component to another process or component over an unsecured connection are provided. One embodiment includes obtaining the cryptographic information, extracting the at least partially encrypted video data from the container file to create an elementary bitstream, enciphering the cryptographic information, inserting the cryptographic information in the elementary bitstream, providing the elementary bitstream to a video decoder, extracting the cryptographic information from the elementary bitstream at the video decoder, deciphering the cryptographic information, decrypting the elementary bitstream with the cryptographic information and decoding the elementary bitstream for rendering on a display device using the video decoder.

MANAGING ENCRYPTION KEYS FOR CONTENT
20250038955 · 2025-01-30 ·

Disclosed are systems and methods for encryption key management. Content items, or portions thereof, can be assigned to a plurality of partitions. Each of the plurality of partitions can correspond to a timeframe of encryption key rotation. Cache control can be applied to manifests and/or content based on the timeframe of encryption key rotation.

Distributed database management system
09858334 · 2018-01-02 · ·

A distributed database management system provides a central database resident on a server that contains database objects. Objects, e.g., program guide data, to be replicated are gathered together into distribution packages called slices, that are transmitted to client devices. A slice is a subset of the central database which is relevant to clients within a specific domain, such as a geographic region, or under the footprint of a satellite transmitter. The viewer selects television programs and Web content from displayed sections of the program guide data which are recorded to a storage device. The program guide data are used to determine when to start and end recordings. Client devices periodically connect to the server using a phone line and upload information of interest which is combined with information uploaded from other client devices for statistical, operational, or viewing models.

Method and system for unified mobile content protection
09858396 · 2018-01-02 · ·

Media content is delivered to a variety of mobile devices in a protected manner based on client-server architecture with a symmetric (private-key) encryption scheme. A media preparation server (MPS) encrypts media content and publishes and stores it on a content delivery server (CDS), such as a server in a content distribution network (CDN). Client devices can freely obtain the media content from the CDS and can also freely distribute the media content further. They cannot, however, play the content without first obtaining a decryption key and license. Access to decryption keys is via a centralized rights manager, providing a desired level of DRM control.

System and methods for permitting open access to data objects and for securing data within the data objects
09843445 · 2017-12-12 · ·

A system and methods for permitting open access to data objects and for securing data within the data objects is disclosed. According to one embodiment of the present invention, a method for securing a data object is disclosed. According to one embodiment of the present invention, a method for securing a data object is disclosed. The method includes the steps of (1) providing a data object comprising digital data and file format information; (2) embedding independent data into a data object; and (3) scrambling the data object to degrade the data object to a predetermined signal quality level. The steps of embedding and scrambling may be performed until a predetermined condition is met. The method may also include the steps of descrambling the data object to upgrade the data object to a predetermined signal quality level, and decoding the embedded independent data.

METHOD AND SYSTEM FOR DATACASTING AND CONTENT MANAGEMENT

A method and system for datacasting and content management. Such a system may have, as its core, a dashboard system for managing data feeds. A dashboard system may receive data feeds from one or more associated devices, such as the hardware devices of first responders or other public safety officers, and may aggregate and prioritize them. The dashboard system may then manage, prioritize and encrypt the video, files and other data in preparation for broadcast over the television or satellite transmitter, via, for example, a television broadcasting station, and may then broadcast the video, files, or other data to a plurality of users. Alerts and notifications may be created, files attached and links to video streams distributed over this same broadcast network. The broadcasting system may be able to send multiple streams of content simultaneously, may be able to target specific users to be broadcast to, and may be able to incorporate data from public data sources, such as public security cameras.