Patent classifications
H04N21/2351
SECURE DIGITAL DATA COLLECTION
Systems and methods for generating certified images and incident reports are disclosed. An image capture device can be used to capture an image and integrate metadata from camera sensors as well as other ancillary device sensors into the image. The image and its metadata can then be certified upon a check that the image and its metadata are authentic and unaltered. The image and its metadata can then be included in or as a part of an incident or other report describing an incident or event such as an accident or a crime. The image and/or incident report may be maintained at a cloud-based server for viewing, authorized editing, and subsequent distribution.
Digital Encryption of Tokens Within Videos
Embedding of digital tokens within a digital video can occur cryptographically using a public key in some embodiments. The digital video may be altered in a variety of ways so that the video itself contains an integrated token that can represent various quantities. Audiovisual data can be altered to contain both a token and a perceptible user auditory or visual cue as to the presence of the encrypted digital token. A video with an embedded digital token may be sent to users on the Internet. A video recipient may be able to view the video and also take additional action or gain additional functionality from the digital token embedded in the video. Tokens can be embedded by altering video metadata so that the perceptible video content itself is not changed in some embodiments.
CONTENT RECOGNITION SYSTEMS AND METHODS FOR ENCRYPTED DATA STRUCTURES
A system for maximizing storage of encrypted content in a storage system includes one or more processors; and a storage medium storing instructions. When executed, the instructions may configure the one or more processors to: receive, from a first client device, a first data structure encrypted commutatively with a first key and a common key, the receiving system lacking access to the common key; receive the first key and a first segment identifier; receive, from a second client device, a second data structure encrypted commutatively with a second key and the common key; receive a second segment identifier; using the first key, partially decrypt the first data structure; storing the partially decrypted first data structure; and selectively storing a copy of the second data structure based on whether content of the first data structure corresponds to content of the second data structure.
SYSTEMS AND METHODS FOR FACILITATING ADAPTIVE CONTENT ITEMS FOR DELIVERY IN A PACKET STREAM
Systems, methods, and machine-readable media for containerizing and adapting content items for delivery in a packet stream from a content provider system via one or more networks to an endpoint media device are disclosed. A content composite may be created for delivery in a packet stream from a content provider system to an endpoint media device. A containerization object may be configured with a container flag that indicates a content item and containerization specifications to facilitate performance of operations by the endpoint media device with respect to the content item. The content composite may be transmitted in accordance with composite transmission specifications. The endpoint media device may perform the operations facilitated by the containerization object of the content composite.
Signal processing apparatus and methods
A unified system of programming communication. The system encompasses the prior art (television, radio, broadcast hardcopy, computer communications, etc.) and new user specific mass media. Within the unified system, parallel processing computer systems, each having an input (e.g., 77) controlling a plurality of computers (e.g., 205), generate and output user information at receiver stations. Under broadcast control, local computers (73, 205), combine user information selectively into prior art communications to exhibit personalized mass media programming at video monitors (202), speakers (263), printers (221), etc. At intermediate transmission stations (e.g., cable television stations), signals in network broadcasts and from local inputs (74, 77, 97, 98) cause control processors (71) and computers (73) to selectively automate connection and operation of receivers (53), recorder/players (76), computers (73), generators (82), strippers (81), etc. At receiver stations, signals in received transmissions and from local inputs (225, 218, 22) cause control processors (200) and computers (205) to automate connection and operation of converters (201), tuners (215), decryptors (224), recorder/players (217), computers (205), furnaces (206), etc. Processors (71, 200) meter and monitor availability and usage of programming.
Media streaming
A media playback system for presenting to a user a composition of a plurality of media streams. It has a media selection component configured to receive a scenario dataset, to receive user input for selecting viewing times defining segments of media and composition selections, and to output a list of segments of media from the scenario dataset that are authorized to be viewed by the user. The system has a playback control component configured to retrieve from media storage at least the segments of media from the output list of segments, to decode the segments of media, and to compile composition instructions. The system has a media playback component configured to receive the rendered media and the composition instructions.
VIDEO ENCRYPTION METHOD AND APPARATUS, IMAGE CAPTURE DEVICE AND READABLE STORAGE MEDIUM
The present disclosure discloses a video encryption method comprising: acquiring image frames continuously by using an image acquisition component, and storing the image frames into a frame buffer; acquiring a time encryption sequence, and using the time encryption sequence to obtain an address encryption sequence; and reading each of the image frames in the frame buffer according to the address encryption sequence to obtain an encrypted video when the frame buffer is full. The method continuously acquires the image frames and uses the time encryption sequence to obtain the address encryption sequence, and when the frame buffer is full, each of the image frames in the frame buffer is read according to the address encryption sequence to obtain an encrypted video. In addition, the present disclosure also provides a video encryption apparatus, an image capture device, and a computer readable storage medium, which also have the above-mentioned beneficial effects.
Apparatus for sharing private video streams with first responders and mobile method of operation
A video surveillance service shares image streams with mobile first responders in the event of emergency. Nominated agencies establish access credentials at the surveillance service data center. A camera is shared by a customer administrator's selection of permissions on each camera via privileged web-browser or mobile device. Permissions enable selection by static meta data such as type, audio, location, motion, recognition, PTZR, spectrum, and epoch. Video streams of present and past epochs are controlled by ranges of time. A responding agency receives an electronic notification from the administrator to present their access credential and a handle for each shared camera of interest. A notification is customized for each responding agency and each event by dynamically generating a link to a secure webserver which records geo-location or network identifiers for validation or sanity checking. Video servers include virtual machines dedicated to each responding agency under control by a customer administrator.
Reprogramming of a programmable device of a specific version
.[.A unified system of programming communication. The system encompasses the prior art (television, radio, broadcast hardcopy, computer communications, etc.) and new user specific mass media. Within the unified system, parallel processing computer systems, each having an input (e.g., 77) controlling a plurality of computers (e.g., 205), generate and output user information at receiver stations. Under broadcast control, local computers (73, 205), combine user information selectively into prior art communications to exhibit personalized mass media programming at video monitors (202), speakers (263), printers (221), etc. At intermediate transmission stations (e.g., cable television stations), signals in network broadcasts and from local inputs (74, 77, 97, 98) cause control processors (71) and computers (73) to selectively automate connection and operation of receivers (53), recorder/players (76), computers (73), generators (82), strippers (81), etc. At receiver stations, signals in received transmissions and from local inputs (225, 218, 22) cause control processors (200) and computers (205) to automate connection and operation of converters (201), tuners (215), decryptors (224), recorder/players (217), computers (205), furnaces (206), etc. Processors (71, 200) meter and monitor availability and usage of programming..]. .Iadd.A method and apparatus to reprogram a receiver station, where the receiver station includes a receiver and a programmable device of a specific version having a memory. The receiver station receives an electronic digital information transmission including operating system instructions and a digital control signal that designates a designated hardware version of a programmable device. The received operating system instructions are communicated to the memory if a match occurs between the designated hardware version included in the transmission and the specific version of the programmable device resident at the receiver station..Iaddend.
Digital encryption of tokens within videos
Embedding of digital tokens within a digital video can occur cryptographically using a public key in some embodiments. The digital video may be altered in a variety of ways so that the video itself contains an integrated token that can represent various quantities. Audiovisual data can be altered to contain both a token and a perceptible user auditory or visual cue as to the presence of the encrypted digital token. A video with an embedded digital token may be sent to users on the Internet. A video recipient may be able to view the video and also take additional action or gain additional functionality from the digital token embedded in the video. Tokens can be embedded by altering video metadata so that the perceptible video content itself is not changed in some embodiments.