Patent classifications
H04N21/64715
Systems and methods for distributing content using a common set of encryption keys
Systems and methods for performing adaptive bitrate streaming using alternative streams of protected content in accordance with embodiments of the invention are described. One embodiment of the invention includes a processor, and memory containing a client application. In addition, the client application configures the processor to: request a top level index file identifying a plurality of alternative streams of protected content, where each of the alternative streams of protected content are encrypted using common cryptographic information; obtain the common cryptographic information; request portions of content from at least the plurality of alternative streams of protected content; access the protected content using the common cryptographic information; and playback the content.
Method for transmitting encrypted packet in communication system
Provided is a method for transmitting a packet in a communication system, comprising the steps of: identifying the packet according to a packet identification criterion; reallocating frames included in the identified packet and encrypting the packet in which the frames have been rearranged; and transmitting the encrypted packet.
Systems and methods for simultaneous compression and encryption
Embodiments of reversible systems and methods for fast, secure and efficient transmission, storage, and protection of digital multimedia are disclosed. The embodiments may have the ability to simultaneously compress and encrypt digital data in order to concurrently reduce data size and prevent reconstruction without the proper encryption key. Embodiments of a method may include pre-processing data to optimize the size of data segments to be compressed, transforming the data for improving the compressibility of the before-mentioned data segments, processing the data sequentially to generate predictive statistical models, encoding the data for simultaneously encrypting and compressing data segments using a keystream, and increasing both the compression ratio and security of these encoding processes using a block cipher. Embodiments of these methods may be suitable for use on both encrypted and unencrypted media.
Content individualization
Content individualization, including: encrypting a first part of a source data set using a first key creating a first encrypted data set; encrypting a second part of the source data set using a second key creating a second encrypted data set; encrypting the second part of the source data set using a third key creating a third encrypted data set; and combining the first encrypted data set, the second encrypted data set, and the third encrypted data set to form a final encrypted data set. Key words include watermarking and content individualization.
ON-DEMAND GENERATION AND PERSONALIZATION OF VIDEO CONTENT
Various embodiments for dynamically generating an advertisement in a video stream are disclosed. In one embodiment, video stream content associated with a video stream for a user device is received. Video analytics data is obtained for the video stream content, which indicates a scene recognized in the video stream content. An advertisement to be generated and inserted into the video stream content is then selected based on the scene recognized in the video stream content, and an advertisement template for generating the selected advertisement is obtained. Video advertisement content corresponding to the advertisement is then generated based on the advertisement template and the video analytics data. The video advertisement content is then inserted into the video stream content, and the modified video stream content is transmitted to the user device.
Method and apparatus for publishing work in network
The present application provides a method for publishing work in a network, including: obtaining, by an end-user device associated with a current user, a prior work file that is not published by the current user in a network, where the prior work file includes a digital signature of a prior author and a prior work; generating, by the end-user device and based on an operation of the current user, a new work file that includes the prior work, the digital signature of the prior author, and content added based on the operation of the current user; and publishing, by the end-user device, the new work file in the network. This solution ensures the prior work cannot be used out of context, and modifications to the prior work are easy to identify, thereby improving integrity and authenticity of a work propagated on the internet.
METHOD AND DEVICE TO PROVIDE RECEIVER PERSPECTIVE FOR MOBILE STREAMING VIDEO
A method and device to provide receiver perspective for mobile streaming video is provided. In one aspect, an example method includes receiving, by a video receiver device, an encoded video stream transmitted over a wireless communications link. The method includes decoding the encoded video stream. The method further includes generating a decoding log. The decoding log stores metadata associated with the decoding. The method further includes signing the decoding log. The method further includes sending the signed decoding log to a Digital Evidence Management System (DEMS) for storage.
METHOD FOR READING A VIDEO STREAM
This method for reading a video stream comprises a step of comparing a datum characteristic of a behavior of a user with a set of predetermined thresholds, each of which, when it is crossed, characterizes an abnormal behavior of the user, a step of signaling an abnormal behavior if at least one predetermined part of these thresholds is crossed, and, otherwise, the absence of this signaling of an abnormal behavior, and a step of executing a counter-measure which makes it more difficult or impossible to access the set of information items contained in a first baseband video stream on the basis of various proofs of a second baseband video stream composed by a first terminal, this execution step being triggered automatically in response to the signaling of an abnormal behavior and not being triggered in the absence of this signaling of an abnormal behavior.
GATEWAY FOR NETWORKED VIDEO MANAGEMENT SYSTEM
A number of variations may include providing a computer system for networked video management, the computer system may include at least one computer having non-transitory memory for storing machine instructions that are to be executed by the computer, the machine instructions when executed by the computer implement the following web service proxy protocol: opening at least one first network connection from at least one video gateway device to at least one web service proxy application and opening at least one second network connection from the at least one video gateway device to at least one network camera on a server network; performing a scan for network cameras on the server network via the at least one gateway device and transmitting the results of the scan to the web service proxy application; and establishing at least one tunnel between the at least one network camera and the web service proxy application.
NETWORKED VIDEO MANAGEMENT AND RECORDING SYSTEM
A number of variations may include a method comprising a computer system for networked video management, the computer system comprising at least one computer having non-transitory memory for storing machine instructions that are to be executed by the at least one computer, the machine instructions when executed by the at least one computer implements functions. The functions may include compiling a list of available network cameras on a network in at least one work queue; requesting a tunnel from a web service proxy container; receiving the tunnel request at the web service proxy container; requesting the tunnel from at least one video gateway device; establishing the tunnel with the available network cameras; and recording video data from the available network cameras.