H04N21/2351

Cryptographic content delivery network
10728301 · 2020-07-28 · ·

An edge server of a content delivery network (CDN) can serve as a proxy for an origin server. The edge server can remove distinguishing characteristics of the origin server. As a result, an end user system may be prevented from blocking content from the origin server based on the distinguishing characteristics. Additionally or alternatively, the edge server can encrypt a portion a uniform resource locator (URL) referencing the origin server so that the clear text of the URL does not follow a recognizable pattern. The path can be decrypted by the edge server when the edge server communicates with the origin server to retrieve the content from the origin server.

Custom data indicating nominal range of samples of media content

A media processing tool adds custom data to an elementary media bitstream or media container. The custom data indicates nominal range of samples of media content, but the meaning of the custom data is not defined in the codec format or media container format. For example, the custom data indicates the nominal range is full range or limited range. For playback, a media processing tool parses the custom data and determines an indication of media content type. A rendering engine performs color conversion operations whose logic changes based at least in part on the media content type. In this way, a codec format or media container format can in effect be extended to support full nominal range media content as well as limited nominal range media content, and hence preserve full or correct color fidelity, while maintaining backward compatibility and conformance with the codec format or media container format.

Real-Time Cloud-Based Video Watermarking Systems and Methods
20200213681 · 2020-07-02 ·

A video generation system is configured to provide streaming video as a cloud processed service to viewers over a computing network. In response to a request from a viewer, a video source is configured to provide video and an identifier source is configured to provide an identifier for inclusion in the video. A video encoder is configured to convert the video from a first format to a second format, apply the identifier to the video, and otherwise encode the video in real-time while streaming the encoded video to the viewer. The identifier may be stored in association with the account information of the viewer and used for identifying the viewer a source of an unauthorized video copy.

Protecting content-stream portions from modification or removal

Systems and methods are described to enable delivery of streaming content while inhibiting or preventing removal, blocking, or skipping of portions within that streaming content. A content delivery system can generate a manifest indicating content portions that form the streaming content. Each content portion can be identified in the manifest using a concealed identifier, which conceals the actual identifier of the content portion from the client to inhibit or prevent the client from automatically removing or modifying the content portion. On receiving a request for a content portion, the content delivery system can convert the concealed identifier into the actual identifier, and return the appropriate content portion to the client. In some instances, the specific identifiers included within a concealed manifest may be modified or adapted based on monitoring information of the client device, to ensure clients view given portions of streaming content.

METADATA DISTRIBUTION AND MANAGEMENT VIA TRANSACTIONAL BLOCKCHAIN TECHNOLOGY
20200204876 · 2020-06-25 ·

Systems and methods are described for securely distributing metadata using a block chain. The system generates a block for a distributed blockchain ledger such that the block includes an encrypted metadata item of a media asset. The system, at a first time, transmits the block for storage in the distributed blockchain ledger such that a copy of the distributed blockchain ledger is stored by the first computing device and a second computing device. The system generates a smart contract that includes a decryption key for the encrypted metadata item and an identifier of the second computing device. The system transmits the smart contract for storage in the distributed blockchain ledger. The smart contract is configured to be automatically executed at the execution time that is later than the first time, to provide the second computing device with the decryption key for the encrypted metadata item.

METHOD AND SYSTEM FOR STORING VIDEO, AND METHOD FOR ACCESSING VIDEO
20200195979 · 2020-06-18 ·

A video storage, a video access method, and a video storage system is disclosed. The video storage method includes: determining user information corresponding to a video to be stored; sending a video storage instruction to a network storage server, wherein, the instruction includes the user information and time information corresponding to the video to be stored; generating an access identifier according to an address information of the network storage server, the user information and the time information corresponding to the video to be stored; and providing the access identifier to a user corresponding to the video to be stored.

ELECTRONIC APPARATUS, SERVER AND METHOD OF CONTROLLING THE SAME
20200186856 · 2020-06-11 · ·

Disclosed are an electronic apparatus, a server, and a method of controlling the same, the server including: a communicator configured to connect with an electronic apparatus and an external server; and a processor configured to: generate first encrypted information by encrypting first decryption information received from the electronic apparatus, the first decryption information for reproducing content, control the communicator to transmit, to the external server, the generated first encrypted information, generate second decryption information by decrypting second encrypted information received from the external server, the second encrypted information generated based on the first decryption information, and control the communicator transmit the generated second decryption information to the electronic apparatus to scramble the content by a scrambler of the electronic apparatus.

METHODS AND APPARATUS TO COLLECT DISTRIBUTED USER INFORMATION FOR MEDIA IMPRESSIONS AND SEARCH TERMS

An example method includes receiving a media identifier and a first impression identifier from a media device, the media identifier being indicative of media presented at the media device, receiving the first impression identifier in association with first user information from a first database proprietor as a result of the first database proprietor obtaining a first identifier encrypted with a first encryption key by the media device, and receiving a second impression identifier in association with second user information from a second database proprietor as a result of the second database proprietor obtaining a second identifier encrypted with a second encryption key. The example method further includes identifying the first user information as associated with a user based on the first impression identifier, identifying the second user information as not associated with the user based on the second impression identifier and discarding the second user information.

Integrated Receiver Decoder Management in HTTP Streaming Networks
20200162778 · 2020-05-21 ·

A method is provided to provide configuration information from a broadcast network controller (BNC) to a decoder in an HTTP live streaming (HLS) network. The method includes the steps of: (a) initiating a configuration event notification by the BNC; (b) writing the configuration information as file; (c) announcing the configuration information as a SCTE-104 request; (d) translating the SCTE-104 request into an SCTE-35 message; (e) translating the SCTE-35 message into an HLS playlist file; and (f) retrieving the HLS playlist file at the decoder.

SECURE DIGITAL DATA COLLECTION
20200151363 · 2020-05-14 ·

Systems and methods for generating certified images and incident reports are disclosed. An image capture device can be used to capture an image and integrate metadata from camera sensors as well as other ancillary device sensors into the image. The image and its metadata can then be certified upon a check that the image and its metadata are authentic and unaltered. The image and its metadata can then be included in or as a part of an incident or other report describing an incident or event such as an accident or a crime. The image and/or incident report may be maintained at a cloud-based server for viewing, authorized editing, and subsequent distribution.