H04N21/26606

APPARATUS AND METHOD FOR PROCESSING CONDITIONAL ACCESS SYSTEM-BASED CONTENT

Provided are an apparatus and a method for processing conditional access system (CAS)-based content. A method of operating a broadcast receiving apparatus includes: receiving a broadcast stream that includes content encrypted based on a CAS; extracting, from the received broadcast stream, CAS information for decrypting the encrypted content; receiving an entitlement control message (ECM) having a preset format based on the CAS information generated in a different format for each broadcasting business operator; and displaying the content decrypted based on the ECM.

Method for controlling access to broadcast content

The present invention relates to the domain of control of access to audiovisual content transmitted to a receiver, in particular control based on the localization of the receiver. This invention proposes a method of control of access to content transmitted to a receiver, said receiver being part of an access geographic control system comprising verification means and security means, the method comprising the following steps: acquisition of a current localization by a portable device, transfer of the current localization to the verification means, extraction, in a memory of the verification means, of a localization data set defining at least one area, verification, by the verification means, that the current localization is included in said area, and if so, transmission of an authorization message for the reception of the audiovisual content to the security means relative to the receiver.

SYSTEMS AND METHODS FOR OPTIMIZING BANDWIDTH FOR DATA TRANSMISSION

Systems and methods are disclosed herein for optimizing bandwidth for broadcast transmission. The disclosed techniques herein provide for receiving first and second content for transmission to subscriber devices on a first and second channels. The system then determines whether the first and second content contain a common segment. If so, the system updates metadata schema (e.g., homogeneous channel descriptor, homogeneous switch descriptor) to indicate there is a common segment. The system may generate a transport stream during multiplexing of the first and second channels based on the updated metadata schema. The transport stream, for a time duration based on the at least one common segment, includes a first audio feed of the first content and a first video feed of the first content to be provided on the second channel. The system then transmits the transport stream to the one or more subscriber devices.

Constructing a transport stream
11025977 · 2021-06-01 · ·

A plurality of sets of primary product keys is established or generated, each set containing at least two different primary product keys. One primary product key of each set is made available to each receiver or group of receivers, such that each receiver or group of receivers is provided with a different combination of said primary product keys. For each set of primary product keys, the plurality of receivers or groups of receivers is provided with a different primary entitlement control message corresponding to each primary product key of said set, each such primary entitlement control message distributing a primary control word for recovery through decryption using the corresponding primary product key. The primary control words can then be used for purposes such as tracing compromise of the conditional access system, or arranging for differently fingerprinted content to be decoded at different receivers or groups of receivers.

CONTENT PROTECTION

Devices, servers, systems and methods for content protection are provided. Disclosed embodiments improve temporal granularity of controlling access to the protected content and increase resilience against attacks attempting to prevent re-evaluation of conditions of access. Enforcement of re-evaluation may be based on the receipt and/or verification of tokens. In some embodiments, re-evaluation is enforced by periodically rendering content keys required for content decryption unuseable and/or clearing content keys already in use.

Providing Advanced Playback And Control Functionality To Video Client
20210136464 · 2021-05-06 ·

Systems and methods for providing playback features to a device are disclosed. A manifest may be generated, which may comprise data associated with a content asset. A state file may be generated, which may comprise data associated with the manifest. Using one or more of the manifest and the state file, a device may modify segments of the content asset or may playback segments of the content asset.

Entitlement management message epoch as an external trusted time source

An external trusted time source is implemented over a network for conditional access system (CAS)/digital rights management (DRM) client devices. A client device includes untrusted software and a trusted execution environment (TEE) for processing an entitlement management message (EMM) that includes an epoch sequence number (ESN) transmitted from an EMM server using a first network connection. A remaining client key set (CKS) lifetime value is stored and updated in the TEE based on the ESN processed.

Systems and methods for optimizing bandwidth for data transmission

Systems and methods are disclosed herein for optimizing bandwidth for broadcast transmission. The disclosed techniques herein provide for receiving first and second content for transmission to subscriber devices on a first and second channels. The system then determines whether the first and second content contain a common segment. If so, the system updates metadata schema (e.g., homogeneous channel descriptor, homogeneous switch descriptor) to indicate there is a common segment. The system may generate a transport stream during multiplexing of the first and second channels based on the updated metadata schema. The transport stream, for a time duration based on the at least one common segment, includes a first audio feed of the first content and a first video feed of the first content to be provided on the second channel. The system then transmits the transport stream to the one or more subscriber devices.

Digital Encryption of Tokens Within Videos

Embedding of digital tokens within a digital video can occur cryptographically using a public key in some embodiments. The digital video may be altered in a variety of ways so that the video itself contains an integrated token that can represent various quantities. Audiovisual data can be altered to contain both a token and a perceptible user auditory or visual cue as to the presence of the encrypted digital token. A video with an embedded digital token may be sent to users on the Internet. A video recipient may be able to view the video and also take additional action or gain additional functionality from the digital token embedded in the video. Tokens can be embedded by altering video metadata so that the perceptible video content itself is not changed in some embodiments.

Techniques for securing live positioning signals
10955560 · 2021-03-23 · ·

A pay television satellite broadcast includes validation data that can be used to validate authenticity of live global positioning system (GPS) data. The validation data may be included within entitlement messages and encrypted for security and selective reception by authorized receivers. A navigation system may compute checksums of received live GPS data and compare with the validation data for a match. A decision about whether or not to use the live GPS data may be taken based on whether or not the computed checksums match the validation data received via the pay television satellite broadcast signals.