H04N21/26613

Database layer caching for video communications
11496777 · 2022-11-08 · ·

An apparatus includes a network interface and a processor. The network interface receives event data that identifies a content ID and a message authentication code. The content ID identifies a content within a webcast or a virtual event. The processor generates a content hash, at least in part based on the content ID. The network interface transmits a content request and receives the content. The content request identifies the content hash and the message authentication code.

METHOD, APPARATUS AND SYSTEM FOR PLAYING MEDIA DATA, AND DEVICE AND STORAGE MEDIUM
20220345774 · 2022-10-27 ·

Provided is a method for playing media data. The method includes: receiving a trigger instruction; generating a second count value based on a stored first count value and a preset algorithm, and storing the second count value to overwrite the first count value, wherein the second count value is different from the first count value; generating audio data carrying a pre-stored authority identifier and the second count value; and playing the audio data, wherein the audio data is configured to instruct a second terminal to acquire the authority identifier and the second count value carried in the audio data, and send the authority identifier and the second count value to a server, and the second terminal is a terminal that has received the audio data.

SECURE CONTENT DELIVERY TO MULTIPLE CLIENT DEVICES VIA A LOCAL SERVER

Aspects of the subject disclosure may include, for example, a local server coupled to a plurality of client devices. The local server may receive encrypted content from one or more content sources and provide the content to the client devices. The local server and client devices may be part of a multi-client environment such as a hotel or conference center. The local server does not decrypt and re-encrypt content, thereby allowing the use of low cost equipment. Other embodiments are disclosed.

MPD CHAINING IN A LIVE CMAF/DASH PLAYER USING W3C MEDIA SOURCE AND ENCRYPTED EXTENSIONS
20230093237 · 2023-03-23 · ·

A method and apparatus may be provided for building a linear media source extension (MSE) buffer from two or more nonlinear media sources using MPD chaining. The method may include parsing at least one obtained media presentation segment (MPD), and obtain a live MPD based on the at least one URL, the live MPD comprising one or more live media segments. The method may include appending the one or more ad media segments to a first MSE source buffer based on a first timing model and chaining the one or more live media segments to the one or more ad media segments by appending the one or more live media segments to the first buffer based on a second timing model. The one or more ad media segments may be dispatched and the one or more live media segments based on the first timing model and the second timing model.

Method and device to transfer a video stream between a host device and an electronic descrambling device
11611791 · 2023-03-21 · ·

A method to transfer a video stream from a host device comprising a controller configured for bulk transfers to a descrambling device, comprises: forming a chain out transfer comprising a chain out header linked with multiple chain out descriptors, the first chain out descriptor pointing to an out description packet containing at least one producer ID, the second and subsequent chain out descriptor pointing to chunks from the video stream, the last chain out descriptor being configured to generate an interrupt; forming a chain in transfer comprising a chain in header linked with a plurality of chain in descriptors, each chain in descriptor pointing to a descrambled chunk; requesting the controller to process the chain; receiving the description packet by the descrambling device and using key data associated with the chunks to descramble them; receiving by the controller the descrambled chunks and triggering an interrupt on the last chunk.

Methods, Systems, and Devices for Detecting Over-the-Top Piracy

Techniques for detection over-the-top piracy are described. In some embodiments, a piracy detection method is performed at a server by a piracy detector. The piracy detector obtains records associated with requests for access from a plurality of client devices. The piracy detector further distributes the records to a plurality of nodes according to distribution keys extracted from the records, where each of the plurality of nodes receives a respective set of records associated with a respective distribution key and generates a set of respective watch session records based on the respective set of records. The piracy detector also generates watch session records associated with the distribution keys by aggregating the respective watch session records from the plurality of nodes. The piracy detector additionally identifies one or more pirated client devices among the plurality of client devices based on clusters established from the watch session records.

Pattern addressing for session-based DASH operations
11638056 · 2023-04-25 · ·

A method of session-based DASH operations can include receiving a media presentation description (MPD) referencing a session-based description (SBD) and indicating a key name during a media access session. The SBD includes a first repeating pattern element that includes a first sequence of timed key values of the key name. The first repeating pattern element indicates that the first sequence of the timed key values of the key name is relocated along a timeline or an orderline. A first key value of the key name corresponding to a timing or a segment number of a current segment of a sequence of segments can be determined based on the first repeating pattern element in the SBD. A request for the current segment can be transmitted to a media content server. The request includes a pair of the key name and the first key value.

Digital encryption of tokens within videos

Embedding of digital tokens within a digital video can occur cryptographically using a public key in some embodiments. The digital video may be altered in a variety of ways so that the video itself contains an integrated token that can represent various quantities. Audiovisual data can be altered to contain both a token and a perceptible user auditory or visual cue as to the presence of the encrypted digital token. A video with an embedded digital token may be sent to users on the Internet. A video recipient may be able to view the video and also take additional action or gain additional functionality from the digital token embedded in the video. Tokens can be embedded by altering video metadata so that the perceptible video content itself is not changed in some embodiments.

SECURE DIGITAL DATA COLLECTION
20230161914 · 2023-05-25 ·

Systems and methods for generating certified images and incident reports are disclosed. An image capture device can be used to capture an image and integrate metadata from camera sensors as well as other ancillary device sensors into the image. The image and its metadata can then be certified upon a check that the image and its metadata are authentic and unaltered. The image and its metadata can then be included in or as a part of an incident or other report describing an incident or event such as an accident or a crime. The image and/or incident report may be maintained at a cloud-based server for viewing, authorized editing, and subsequent distribution.

Fine grain rights management of streaming content
11627119 · 2023-04-11 · ·

The present invention provides methods, apparatuses, and systems for delivering protected streaming content to a receiving device. In an aspect of the present invention, a broadcaster provides streaming content. To ensure viewers are properly authorized, the streaming content is encrypted with a traffic key. The traffic key is provided to the users via a key stream message, which is encrypted with a service key. The user obtains at least one rights object from a rights issuers and the at least one rights object includes the service key so that the streaming content may be used. The at least one rights object also contains information regarding usage rights that may be configured by the rights issuer so that, depending on the user and/or the receiving device, different rights may be available. The key stream message may include a program category variable value that indicates the type of content and in conjunction with the rights object, determines what usage rights exist for the streaming content.