H04N21/4408

Display device, control method and program

A display device connected to a signal source outputting a video signal using an encryption protocol and that transmits the encryption key to the signal source includes: a transmission unit that transmits an own encryption key uniquely set for the display device and an encryption key transmitted from another display device connected to the display device as a lower device to the signal source and another display device connected as an upper device; and a stop instruction unit that instructs another display device corresponding to a predetermined encryption key included in an encryption key group based on the order of the own encryption keys included in the encryption key group to stop transmitting the encryption key received when the own encryption key is included in the encryption key group including a plurality of encryption keys transmitted from another display device connected as the lower device.

Secure offline streaming of content

Methods, systems, and computer-readable media for secure offline transmission of a plurality of data segments from a sending device to one or more receiving devices. The sending device and the one or more receiving devices may communicate via an offline local network. A secure, encrypted container may be created at the receiving device to temporarily cache the received data segments one at a time and the encrypted storage container prevents access by one or more applications of the receiving device to data stored therein based on storage instructions from the sending device. The encrypted container may be configured to store the data segments such that less than all of the data segments are stored at the receiving device at any one time.

Signature retrieval and matching for media monitoring

An example apparatus includes a first query processor to obtain a first hash key, first qualifier data and first value data associated with the first hash key, the first value data including a second hash key and a third hash key; a candidate qualifier to use the first value data to prequalify the first hash key as a candidate for subsequent signature processing associated with a first site signature, the candidate qualifier to: determine prequalification of the first hash key is successful in response to a determination that the second hash key matches a second site signature preceding the first site signature in time and that the third hash key matches a third site signature following the first site signature in time; and determine the prequalification of the first hash key is unsuccessful in response to a determination that at least one of the second hash key fails to match the second site signature or the third hash key fails to match the third site signature.

Signature retrieval and matching for media monitoring

An example apparatus includes a first query processor to obtain a first hash key, first qualifier data and first value data associated with the first hash key, the first value data including a second hash key and a third hash key; a candidate qualifier to use the first value data to prequalify the first hash key as a candidate for subsequent signature processing associated with a first site signature, the candidate qualifier to: determine prequalification of the first hash key is successful in response to a determination that the second hash key matches a second site signature preceding the first site signature in time and that the third hash key matches a third site signature following the first site signature in time; and determine the prequalification of the first hash key is unsuccessful in response to a determination that at least one of the second hash key fails to match the second site signature or the third hash key fails to match the third site signature.

Video output controlling apparatus and video output controlling method

A video output controlling apparatus and a video output controlling method that can reduce the possibility that a video for which encryption is required may be outputted in a non-encrypted state are provided. A first acceptance unit (40) accepts a video and an encryption necessity signal indicative of whether or not encryption of the video is required via a first route. A second acceptance unit (44) accept a control signal via a second route different from the first route. A video conversion unit (46) converts, in accordance with the control signal, the video accepted by the first acceptance unit (40) into one of a video that is different in a format from that of the video and is in an encrypted state and a video that is different in a format from that of the video and is not in an encrypted state. An output controlling unit (48) performs control regarding whether or not the video is to be outputted based on the encryption necessity signal and whether or not the video after conversion by the video conversion unit (46) is in an encrypted state.

TECHNIQUES FOR SECURE VIDEO FRAME MANAGEMENT

Embodiments of the present disclosure can provide devices, methods, and computer-readable medium for secure frame management. The techniques disclosed herein provide an intelligent method for detecting triggering items in one or more frames of streaming video from an Internet Protocol camera. Upon detection, the camera transmits one or more frames of the video over a network to a computing device. Upon detecting a triggering item in a frame of the video stream, the computing device can begin a streaming session with a server and stream the one or more frames of video and accompanying metadata to the server. The frames, metadata, and associated keys can all be encrypted prior to streaming to the server. For each subsequent segment of video frames that includes the triggering item, the server can append the frames of that segment to the video clip in an encrypted container. Once the triggering item is no longer detected, the streaming session can be closed.

Techniques for secure video frame management

Devices, methods, and computer-readable medium for secure frame management. The techniques disclosed herein provide an intelligent method for detecting triggering items in one or more frames of streaming video from an Internet Protocol camera. Upon detection, the camera transmits one or more frames of the video over a network to a computing device. Upon detecting a triggering item in a frame of the video stream, the computing device can begin a streaming session with a server and stream the one or more frames of video and accompanying metadata to the server. The frames, metadata, and associated keys can all be encrypted prior to streaming to the server. For each subsequent segment of video frames that includes the triggering item, the server can append the frames of that segment to the video clip in an encrypted container. Once the triggering item is no longer detected, the streaming session can be closed.

SIGNATURE RETRIEVAL AND MATCHING FOR MEDIA MONITORING

Example apparatus disclosed herein are to obtain a first hash key, a second hash key and a third hash key representative of first reference media in response to a first query of a first table, the second hash key associated with a second time preceding a first time associated with the first hash key, the third hash key associated with a third time following the first time associated with the first hash key. Disclosed example apparatus are also to prequalify the first hash key as a candidate for subsequent signature processing associated with a first site signature in response to a determination that the second hash key corresponds to a second site signature preceding the first site signature in time and that the third hash key corresponds to a third site signature following the first site signature in time.

SIGNATURE RETRIEVAL AND MATCHING FOR MEDIA MONITORING

Example apparatus disclosed herein are to obtain a first hash key, a second hash key and a third hash key representative of first reference media in response to a first query of a first table, the second hash key associated with a second time preceding a first time associated with the first hash key, the third hash key associated with a third time following the first time associated with the first hash key. Disclosed example apparatus are also to prequalify the first hash key as a candidate for subsequent signature processing associated with a first site signature in response to a determination that the second hash key corresponds to a second site signature preceding the first site signature in time and that the third hash key corresponds to a third site signature following the first site signature in time.

Fine grain rights management of streaming content
11627119 · 2023-04-11 · ·

The present invention provides methods, apparatuses, and systems for delivering protected streaming content to a receiving device. In an aspect of the present invention, a broadcaster provides streaming content. To ensure viewers are properly authorized, the streaming content is encrypted with a traffic key. The traffic key is provided to the users via a key stream message, which is encrypted with a service key. The user obtains at least one rights object from a rights issuers and the at least one rights object includes the service key so that the streaming content may be used. The at least one rights object also contains information regarding usage rights that may be configured by the rights issuer so that, depending on the user and/or the receiving device, different rights may be available. The key stream message may include a program category variable value that indicates the type of content and in conjunction with the rights object, determines what usage rights exist for the streaming content.