Patent classifications
H04N21/2585
System and method for identifying leaked data and assigning guilt to a suspected leaker
A system and method for identifying a leaked data file and assigning guilt to one or more suspected leakers proceeds through a plurality of levels. At a first level, primary watermark detection occurs. Data is inserted into a subset of data to determine correlation with data in the suspected leaked file. The guilt probability that results is then weighted based on the number of bits matched. In a second level, another search process is performed for detecting additional salt-related patterns. The guilt score is then computed for every detected recipient identifier for the suspected leaked data file, and the relative guilt of these recipients is weighted. In a third layer, the statistical distribution of data in the suspected leaked file is compared with that of corresponding data in the reference files. After this layer is complete, the average of guilt scores across each of the layers is calculated.
PRESERVING TRANSMISSION PROPERTIES OF REAL-TIME SCENES IN AN ENVIRONMENT WHEN AN INCREASING NUMBER OF USERS JOIN A SESSION
Preserving transmission properties of real-time scenes in an environment when an increasing number of users join a session may be provided. A plurality of metrics associated with transmission of scenes having a Coarse Grain (CG) layer and a Fine Grain (FG) layer may be determined. Then a current client, based on a first one of a plurality of metrics, may be revoked. One of the following may then be performed: blocking a new client based on a second one of a plurality of metrics; and allowing the new client based on the second one of a plurality of metrics.
Media data modification management system
A processor may manage media modification within a participant network. A processor may generate the participant network having a participant. The participant may be associated with one or more media data. A processor may enforce one or more rules on the participant network using an artificial intelligence (AI) based governance system. The one or more rules may manage the modification of the one or more media data by the participant. A processor may restrict the participant from modifying the one or more media data based, at least in part, on the AI based governance system.
Anti-Piracy Methods, Devices, and Systems
Anti-piracy techniques described herein are performed on a server that includes one or more processors and a non-transitory memory. The server enters a state to accumulate a portion of a bitstream extracted from parts of a clip obtained from a pirate service. The server then identifies a set of suspected piracy devices for the piracy service based on a confidence score of suspected piracy calculated for each client using the accumulated portion of the bitstream exceeding a threshold set relative to the state. The server additionally determines whether or not the set of suspected piracy devices for the pirate service satisfies a stable collusion state criterion corresponding to the state. The server enters a next state to iteratively perform the accumulating and the identifying upon determining the set of suspected piracy devices for the pirate service not satisfying the stable collusion state criterion corresponding to the state.
SYSTEM AND METHOD FOR PREVENTING STREAMING INFIDELITY
A spoiler prevention system and method on streaming applications and other interactive platforms whereby hen the spoiler prevention system is active, spouses, friends, or other groups having multiple members, will not be able to watch new episodes of selected programs unless both parties are present at the location that the program is being viewed which may be determined by two separate codes entered by the parties, or that a computing device belonging to both parties is in proximity with one another or a streaming device, or by the parties logging into the mobile application on their computing devices.
PRESERVING TRANSMISSION PROPERTIES OF REAL-TIME SCENES IN AN ENVIRONMENT WHEN AN INCREASING NUMBER OF USERS JOIN A SESSION
Preserving transmission properties of real-time scenes in an environment when an increasing number of users join a session may be provided. A plurality of metrics associated with transmission of scenes having a Coarse Grain (CG) layer and a Fine Grain (FG) layer may be determined. Then a current client, based on a first one of a plurality of metrics, may be revoked. One of the following may then be performed: blocking a new client based on a second one of a plurality of metrics; and allowing the new client based on the second one of a plurality of metrics.
REMOTE AUDIENCE PARTICIPATION AT LIVE EVENTS
A method of enabling remote audience participation at a live venue event includes receiving, at an aggregator, media inputs from one or more user device of one or more users in a subscription roster for participation in a live event; generating an aggregated media stream by processing the media inputs; and forwarding the aggregated media stream to a venue of the live event.
Apparatus and methods for device authorization in a premises network
Apparatus and methods for enabling protected premises networking capabilities. In one embodiment, a white list of devices authorized to access a premises network and a black list of device not authorized to access a premises network are utilized. The black and white lists may be stored at a database in communication with an authorization manager or may be stored at the manager itself. When a client device is connected to a premise, the manager determines, based on the premises and/or device identity, whether the device is entitled to access. The authorization manager makes this determination based on whether the device is on the white or black list. If the device is on neither list, the manager may add the device to the white list upon appropriate verification. The manager may also facilitate removal of a device from the white list to the black list upon request or automatically.
SYSTEM AND METHOD FOR SECURE CONTENT STREAMING, GOVERNANCE, FRAUD PREVENTION, AND THE EMBEDDING ARTIFICIAL INTELLIGENCE INTO CONTENT
An automated system configured for streamed contents, to be self-aware in preventing fraudulent tactics, during real-time and offline usages, while communicating with its owner for accurate decision making, comprising: a content player module, and a content streaming service module; configured using a codec module to embed logic, encryptions, heuristics data, associated meta data, and management data into the content format; configured to use symmetric encryption keys, public keys, biometrics, and payload data; configured to authenticate the user and content owner; configured to request, receive, send, stream content, and analytics through a secure communication; configured to provide secure virtual communications between users and content owners; configured to use a call-home data, to enable the content and content owner to communicate and update one another securely; Configured to provide real-time, and offline, fraud prevention heuristics using artificial intelligence.
Device and Method for GPU-based Watermarking
A method and system for watermarking content utilizing a user device GPU. Embodiments include receiving on a processing server a request from a video server for a video to be played on the user's device. The processing server may extract a set of identifying information, such as user information, from the request for the video. The processing server may further prepare shader software code which is to be executed on a GPU present on the user's device. The code preparation may include creating a watermarking procedure to be executed during playback on the user device. The processing server may further transmit the shader software code to the streaming video server to be transmitted to the user device for execution during video playback.