Patent classifications
H04N21/64715
NETWORKED VIDEO MANAGEMENT SYSTEM
A number of variations may include a computer system for networked video management. The computer system may include a computer having non-transitory memory for storing machine instructions that may be executed by the computer. The machine instructions when executed by the computer may implement the following functions: scanning a network for network cameras connected to the network to obtain a list of connected network cameras; transmitting the list of connected network cameras; receiving a tunnel request between the connected network cameras on the list and a video recorder application; establishing a tunnel with each connected network camera; and offering the tunnel to applications on the network
Enabling content protection over broadcast channels
A method, receiver, and server enable content protection over broadcast channels. A method for receiving a media license includes receiving broadcast media data including at least a portion that is protected and requesting a message from a content decryption module (CDM) of the receiver. The method includes receiving a license signaling message including encrypted license data and identifying one or more hash codes in the license signaling message. Additionally, the method includes identifying the encrypted license data for the receiver based on a mapping between the one or more hash codes and a hash of the message from the CDM. A server for providing a media license sends, to a receiver or a group of receivers, a license signaling message including encrypted license data and a license message hash indicating a hash code used to identify the receiver or the group of receivers for the encrypted license data.
CONTENT DISTRIBUTION PIPELINE WATERMARKING
Methods, computer-readable media, and devices for tracking an accessing of a media content via a watermark embedded by a network node are disclosed. For example, a processing system including at least one processor may receive, from a first network node, a first copy of a watermark that is embedded by the first network node in a media content. The processing system may further receive a notification comprising a second copy of the watermark and an identification of a first endpoint device, the notification associated with an accessing of the media content by the first endpoint device, and record the accessing of the media content by the first endpoint device.
Systems and Methods for Distributing Content Using a Common Set of Encryption Keys
Systems and methods for performing adaptive bitrate streaming using alternative streams of protected content in accordance with embodiments of the invention are described. One embodiment of the invention includes a processor, and memory containing a client application. In addition, the client application configures the processor to: request a top level index file identifying a plurality of alternative streams of protected content, where each of the alternative streams of protected content are encrypted using common cryptographic information; obtain the common cryptographic information; request portions of content from at least the plurality of alternative streams of protected content; access the protected content using the common cryptographic information; and playback the content.
METHOD AND APPARATUS FOR PUBLISHING WORK IN NETWORK
The present application provides a method for publishing work in a network, including: obtaining, by an end-user device associated with a current user, a prior work file that is not published by the current user in a network, where the prior work file includes a digital signature of a prior author and a prior work; generating, by the end-user device and based on an operation of the current user, a new work file that includes the prior work, the digital signature of the prior author, and content added based on the operation of the current user; and publishing, by the end-user device, the new work file in the network. This solution ensures the prior work cannot be used out of context, and modifications to the prior work are easy to identify, thereby improving integrity and authenticity of a work propagated on the internet.
VERIFYING THE RENDERING OF VIDEO CONTENT AT CLIENT DEVICES USING TRUSTED PLATFORM MODULES
Systems and methods for verifying the rendering of video content on information resources are provided herein. A server can transmit a video content element having a first bit stream corresponding to a predesignated frame to a client device. The client device can identify the first bit stream as corresponding to the predesignated frame. The client device can decode the first bit stream corresponding to the predesignated frame of the video content element to generate a second bit stream. The client device can transmit, to the server, a tracking message including the second bit stream. The server can compare the second bit stream included in the tracking message from the client device with a third bit stream maintained at a database. The server can determine that the video content element is rendered at the client device responsive to the second bit stream matching the third bit stream.
Systems and methods for performing transport I/O
Systems and methods for implementing a Transport I/O system are described. Network encrypted content may be received by a device. The device may provide the network encrypted content to a secure processor, such as, for example, a smart card. The secure processor obtains a network control work that may be used to decrypt the network encrypted content. The secure processor may decrypt the network encrypted content to produce clear content. In embodiments, the secure processor may then use a local control word to generate locally encrypted content specific to the device. The device may then receive the locally encrypted content from the secure processor and proceed to decrypt the locally encrypted content using a shared local encryption key. The transport I/O system ensures the protection of the network control word by maintaining the network control word on the secure processor.
CONTENT INDIVIDUALIZATION
Content individualization, including: encrypting a first part of a source data set using a first key creating a first encrypted data set; encrypting a second part of the source data set using a second key creating a second encrypted data set; encrypting the second part of the source data set using a third key creating a third encrypted data set; and combining the first encrypted data set, the second encrypted data set, and the third encrypted data set to form a final encrypted data set. Key words include watermarking and content individualization.
Systems and methods for distributing content using a common set of encryption keys
Systems and methods for performing adaptive bitrate streaming using alternative streams of protected content in accordance with embodiments of the invention are described. One embodiment of the invention includes a processor, and memory containing a client application. In addition, the client application configures the processor to: request a top level index file identifying a plurality of alternative streams of protected content, where each of the alternative streams of protected content are encrypted using common cryptographic information; obtain the common cryptographic information; request portions of content from at least the plurality of alternative streams of protected content; access the protected content using the common cryptographic information; and playback the content.
Methods and systems for re-securing a compromised channel in a satellite signal distribution environment
A method implemented by a set top box that encrypts communications for a channel stacking switch (CS) using a public key of the CSS, the method comprising: obtaining a message from a head end; extracting electronic counter measure (ECM) data from the message; sending the ECM data to the CSS; receiving, in response to the sending, a new public key of the CSS; encrypting communications for the CSS using the new public key of the CSS. Also, a method for implementation by a CSS, comprising: maintaining a private key and a public key; obtaining ECM data sent by a set top box in communication with the CSS; obtaining an identifier of the CSS; formulating a new public key based on the private key, the identifier and the ECM; rendering the new public key available to the set top box.