Patent classifications
H04N21/23476
Streaming image encryption method and computer program, streaming image decryption method and computer program
A method of decrypting a streaming image includes: receiving a packet including at least an item which is encrypted, the item including at least one parameter used for decoding image data included in the streaming image; decrypting the item; and decoding the image data included in the streaming image based on the decrypted item, wherein the image data is not encrypted.
ENCRYPTED AUDIO STREAMING
The disclosed technology relates to broadcasting encrypted data to multiple receiver devices, where some receiver devices have long-term access to the encrypted data and some receiver devices have a temporary access to the encrypted data. Receivers having long-term access are part of a “member group” because these member group devices have a master key and the master key enables the member group devices to derive the necessary information to decrypt the encrypted broadcast. In contrast, devices with temporary access possess only a guest key and not master key, without a master key the devices need to receive the guest key from another device to decrypt the broadcast. Access to the encrypted stream can also be based on broadcasting multiple or single diversifiers, where a diversifier can include group identification information to assist in restricting access to the encrypted stream.
METHOD FOR ENCRYPTING DATA STREAMS WITH NEGOTIABLE AND ADAPTABLE ENCRYPTION LEVELS
Described embodiments provide systems and methods for data encryption. A server communicating data with a client can determine a level of data encryption on the data that the server is capable of handling according to resources available to the server. A level of data encryption can include a type of encryption and a strength of the type of data encryption. The server can receive a level of data encryption on the data that the client is capable of handling according to resources available to the client. The server can identify a level of data encryption with which the server and the client agree to proceed, according to the determined level of data encryption and the received level of data encryption. The server, following a predefined interval, can identify an updated level of data encryption with which the server and the client agree to proceed.
PRIVACY-PRESERVING VIDEO ANALYTICS
Generally discussed herein are devices, systems, and methods for privacy-preserving video. A method can include identifying which classes of objects are present in video data, for each class of the classes identified in the video data, generating respective video streams that include objects of the class and exclude objects not of the class, and providing each of the respective video streams to a content distribution network.
Privacy-preserving video analytics
Generally discussed herein are devices, systems, and methods for privacy-preserving video. A method can include identifying which classes of objects are present in video data, for each class of the classes identified in the video data, generating respective video streams that include objects of the class and exclude objects not of the class, and providing each of the respective video streams to a content distribution network.
SYSTEMS AND METHODS FOR MANAGING ACCESS TO CONTENT ASSETS
Delay in output of a requested content asset by a user device may be reduced by sending a portion of the content asset to the user device in a particular type of format, such as an unsecured format. The unsecured portion of the content asset may be sent to the user device while a license for the content asset is being processed. The size of the unsecured portion of the content asset may be determined based on a time for the user device to receive the license. The time for the user device to receive the license may be determined based on a time to process the license. After sending the license to the user device, another portion of the content asset may be sent to the user device in a secured format. The user device may use the license to access the secured portion of the content asset.
Video recording method and video recording apparatus
This application discloses a video recording apparatus and a video recording method. The video recording apparatus includes a first demultiplexer, configured to: separate program information, audio data, and video data from a transport stream; a marker, configured to: mark the separated audio data and the separated video data, and transmit a mixed stream to an encryption processor, where the mixed stream includes the program information, the marked audio data, and the marked video data; and the encryption processor, configured to: identify the marked audio data and the marked video data in the mixed stream, encrypt the identified audio data and the identified video data to obtain encrypted audio data and encrypted video data, and transmit the encrypted audio data, the encrypted video data, and the program information to a memory in a rich execution environment REE for storage, so as to implement video recording.
Constructing a transport stream
A plurality of sets of primary product keys is established or generated, each set containing at least two different primary product keys. One primary product key of each set is made available to each receiver or group of receivers, such that each receiver or group of receivers is provided with a different combination of said primary product keys. For each set of primary product keys, the plurality of receivers or groups of receivers is provided with a different primary entitlement control message corresponding to each primary product key of said set, each such primary entitlement control message distributing a primary control word for recovery through decryption using the corresponding primary product key. The primary control words can then be used for purposes such as tracing compromise of the conditional access system, or arranging for differently fingerprinted content to be decoded at different receivers or groups of receivers.
Method for encrypting data streams with negotiable and adaptable encryption levels
Described embodiments provide systems and methods for data encryption. A server communicating data with a client can determine a level of data encryption on the data that the server is capable of handling according to resources available to the server. A level of data encryption can include a type of encryption and a strength of the type of data encryption. The server can receive a level of data encryption on the data that the client is capable of handling according to resources available to the client. The server can identify a level of data encryption with which the server and the client agree to proceed, according to the determined level of data encryption and the received level of data encryption. The server, following a predefined interval, can identify an updated level of data encryption with which the server and the client agree to proceed.
VIDEO COMMUNICATION DATA SECURITY
A processing system including at least one processor may obtain a portion of a video stream, identify a first region of the portion of the video stream that contains a first item that is designated for obscuring, replace the first item in the first region of the portion of the video stream with an obscured version of the first item, and encrypt the portion of the video stream with a first encryption key. The processing system may further generate an executable package comprising the first item in the first region of the portion of the video, where the executable package is encrypted with a second encryption key, and transmit the portion of the video stream that is encrypted with the first encryption key and the executable package that is encrypted with the second encryption key to a recipient device.