Patent classifications
H04N21/4408
Electronic device and method of transmitting content item
According to one embodiment, an electronic device includes a content transmitter. The content transmitter is configured to output a content item including first data and second data to one transmission path, by applying a first copyright protection system to copyright protection of the first data and applying a second copyright protection system to copyright protection of the second data. The first copyright protection system involves encryption of data to be copyright-protected. The second copyright protection system involves no encryption of data to be copyright-protected.
Electronic device and method of transmitting content item
According to one embodiment, an electronic device includes a content transmitter. The content transmitter is configured to output a content item including first data and second data to one transmission path, by applying a first copyright protection system to copyright protection of the first data and applying a second copyright protection system to copyright protection of the second data. The first copyright protection system involves encryption of data to be copyright-protected. The second copyright protection system involves no encryption of data to be copyright-protected.
Method to identify video applications from encrypted over-the-top (OTT) data
Aspects of the subject disclosure may include, for example, a processing system that performs operations including collecting encrypted network traffic flow data from user interaction with an application, deriving a first set of traffic feature vectors from the encrypted network traffic flow data collected, training a machine learning algorithm on the first set of traffic feature vectors to classify each traffic feature vector in the first set of traffic feature vectors as associated with a type of the application or not associated with the type of the application, and classifying whether an encrypted network traffic flow as the type of the application by applying the machine learning algorithm to a traffic feature vector of the encrypted network traffic flow. Other embodiments are disclosed.
Method to identify video applications from encrypted over-the-top (OTT) data
Aspects of the subject disclosure may include, for example, a processing system that performs operations including collecting encrypted network traffic flow data from user interaction with an application, deriving a first set of traffic feature vectors from the encrypted network traffic flow data collected, training a machine learning algorithm on the first set of traffic feature vectors to classify each traffic feature vector in the first set of traffic feature vectors as associated with a type of the application or not associated with the type of the application, and classifying whether an encrypted network traffic flow as the type of the application by applying the machine learning algorithm to a traffic feature vector of the encrypted network traffic flow. Other embodiments are disclosed.
SOURCE DEVICE AND METHOD OF TRANSMITTING CONTENT
A source device and a method of transmitting content are provided. The source device includes a controller configured to check a version of a content protection method supported by a sink device from the repeater, to encrypt the content based on a version of the content protection method applied to the content, and to set a value of type information of the content protection method based on the version of the content protection method applied to the content and the version of the content protection method supported by the sink device, and a communicator including communication circuitry configured to transmit the encrypted content and the type information of the content protection method to the repeater, wherein the type information of the content protection method for determining whether the content received from the source device is output to the sink device from the repeater, based on the version of the content protection method supported by the sink device.
SOURCE DEVICE AND METHOD OF TRANSMITTING CONTENT
A source device and a method of transmitting content are provided. The source device includes a controller configured to check a version of a content protection method supported by a sink device from the repeater, to encrypt the content based on a version of the content protection method applied to the content, and to set a value of type information of the content protection method based on the version of the content protection method applied to the content and the version of the content protection method supported by the sink device, and a communicator including communication circuitry configured to transmit the encrypted content and the type information of the content protection method to the repeater, wherein the type information of the content protection method for determining whether the content received from the source device is output to the sink device from the repeater, based on the version of the content protection method supported by the sink device.
Method and terminal for reproducing content
A method of reproducing content is provided. The method performed by a terminal includes operations of obtaining metadata corresponding to a predetermined portion of the content, selecting, based on the metadata, at least one external device to reproduce the predetermined portion of the content, transmitting a control command to the at least one external device, and reproducing the predetermined portion of the content by interoperation of the terminal with the at least one external device to which the control command is transmitted.
Method and terminal for reproducing content
A method of reproducing content is provided. The method performed by a terminal includes operations of obtaining metadata corresponding to a predetermined portion of the content, selecting, based on the metadata, at least one external device to reproduce the predetermined portion of the content, transmitting a control command to the at least one external device, and reproducing the predetermined portion of the content by interoperation of the terminal with the at least one external device to which the control command is transmitted.
Systems and methods for data processing, storage, and retrieval from a server
A method of authenticating data received from a user device by a service provider may include receiving user credentials from the user device via a secure communication channel; upon verifying the user credentials, providing to the user device via the secure channel a permission token, where the permission token includes at least a shared secret, where a data within the permission token is not observable to the user device and a shared secret data outside the data of the permission token, the shared secret data observable to the user device; and receiving a request from the user device via a non secure communication channel, where the request may include at least the permission token and a hash digest formed using at least a portion of the shared secret data.
Systems and methods for data processing, storage, and retrieval from a server
A method of authenticating data received from a user device by a service provider may include receiving user credentials from the user device via a secure communication channel; upon verifying the user credentials, providing to the user device via the secure channel a permission token, where the permission token includes at least a shared secret, where a data within the permission token is not observable to the user device and a shared secret data outside the data of the permission token, the shared secret data observable to the user device; and receiving a request from the user device via a non secure communication channel, where the request may include at least the permission token and a hash digest formed using at least a portion of the shared secret data.