Patent classifications
H04N21/44236
Systems and methods for video content security
The present disclosure provides systems and methods for video content security and for detecting and preventing unauthorized playback. According to an exemplary method, a device performing a video playback can acquire a set of video frames from a decoder during the video playback, and generate, based on the set of video frames, a first video identifier. The first video identifier can be sent to a server. In response to the server determining that the first video identifier matches a second video identifier stored in the server, the device can receive a list of authorized playback sources associated with the second video identifier. The device can determine whether a source of the video playback is included in the list of authorized playback sources, and control the video playback based on the determination.
Method of and a device for rendering content data of a content data stream based on a level of toxicity of the content data stream
A method (1) of and a device for rendering content data of a content data stream. From content data identified in the content data stream, a level of toxicity is determined (4). The level of toxicity represents a measure of authenticity of the received content data stream. Content data of the received content data stream is rendered (6) based on an aggregated level of toxicity.
Audio-visual portion generation from a live video stream
A system and method are presented for sharing an audio-visual stream from a server system with a plurality of participant computer systems and for the automated generation of portions. Each participant computer system provides audio and visual data which is converted into the audio-visual stream by the server system. The server system then shares the audio-visual stream with the participant computer systems. During the audio-visual stream, a participant computer can request a portion at a time T. The server will automatically generate a portion audio-visual file using audio and visual data from the stream extending from before time T to after time T. After creation of the portion, the participant computer can modify the timing of the portion and can modify the visual presentation of the portion.
SYSTEMS AND METHODS FOR VIDEO CONTENT SECURITY
The present disclosure provides systems and methods for video content security and for detecting and preventing unauthorized playback. According to an exemplary method, a device performing a video playback can acquire a set of video frames from a decoder during the video playback, and generate, based on the set of video frames, a first video identifier. The first video identifier can be sent to a server. In response to the server determining that the first video identifier matches a second video identifier stored in the server, the device can receive a list of authorized playback sources associated with the second video identifier. The device can determine whether a source of the video playback is included in the list of authorized playback sources, and control the video playback based on the determination.
Chain-of-manipulation tracking of audio-video content
A device for use in a system for tracking a chain-of-manipulation (CoM) of audio-video (AV) content includes a hardware processor, and a system memory storing a CoM tagging software code and an AV processing application. The hardware processor executes the CoM tagging software code to detect manipulation of the AV content by the AV processing application that modifies at least one of video or audio of the AV content, and to generate, when the manipulation is detected, one or more CoM tag(s) including a device identification tag identifying the device used for modifying the AV content. The hardware processor also executes the CoM tagging software code to insert the CoM tag(s) in each modified segment of the AV content modified by the AV processing application, the inserted CoM tag(s) being human and machine imperceptible when the AV content is played back by a playback device on a display.
Method, apparatus, and system for copyright rights defense detection
A method, an apparatus, and a system for copyright rights defense detection are provided. The method includes: sending a metadata query request to a copyright handling apparatus; receiving a metadata query response that is sent by the copyright handling apparatus and that includes feature metadata; obtaining a rights-to-be-defended content feature corresponding to the feature metadata from a feature database; sending a license query request to a license processing apparatus; receiving a license query response that is sent by the license processing apparatus and that includes license information; and performing rights defense detection for a copyright based on the obtained rights-to-be-defended content feature and the license information. Rights defense detection can be performed for a copyright by any rights defense detection service apparatus.
Security monitoring with attack detection in an audio/video processing device
A security-monitoring system includes a data-collection module, a security-monitoring module and an attack-detection module. The data-collection module can collect data associated with a data stream. The security-monitoring module monitors a number of activities within a device. The attack-detection module can detect one or more attacks on the device based on the monitored plurality of activities by using one or more trusted processors. The collected data includes one or more security parameters associated with the data stream. The attack-detection module identifies the attacks based on the security parameters and data from the one or more trusted processors.
DYNAMIC ADAPTATION OF INTERACTIVE VIDEO PLAYERS USING BEHAVIORAL ANALYTICS
Methods and supporting systems collect data associated with interactive videos user engagement and dynamically adapt an interactive video application and/or interactive video content and detect anomalous behaviors based on the data.
System and method for using a website containing video playlists as input to a download manager
Systems and methods for enabling the download of a set of media files with a specific order and specific contents and, more particularly, to enabling a download manager to automatically receive the information it requires to retrieve those elements required to replicate a streaming edit through local playback after the downloads complete.
Method and apparatus for feedback-based piracy detection
Watermarking of a content stream is accomplished in a session-based manner to provide watermarking based on a uniquely generated manifest that will result in a stream that allows for unique identification of information. The manifest specifies a sequence of watermarks for successive segments of a content stream designated for a specific receiver. The system and method leverages existing content distribution infrastructure and has many of the benefits of conventional head-end watermarking, allows unique identification of small segments of the data stream and reduces content distribution network storage requirements. Groups of nodes can be provided with unique watermark patterns and detection and watermark pattern reconfiguration can be accomplished in an iterative manner to find a specific node without the need to create unique watermark patterns for each node.