H04N21/2585

Secure and disruption-tolerant communications for unmanned underwater vehicles

An underwater communications system includes a network communication interface, one or more computer processors, and a memory containing computer program code that, when executed by operation of the one or more computer processors, performs an operation. The operation includes storing a plurality of data packets to be transmitted to a destination device, determining that data communications over the network communication interface have become available for a first network node, and determining that the first network node has a valid security credential. Additionally, the operation includes, upon determining that the first network node has the valid security credential, transmitting the stored plurality of data packets over the network communication interface to the first network node. The first network node is configured to employ store-carry-and-forward data messaging techniques to transmit the plurality of data packets towards the destination device.

Apparatus for managing members of at least one group of decoders having access to broadcast data
10878848 · 2020-12-29 · ·

A technique to manage members of a group of decoders having access to broadcast data, each group member sharing a common broadcast encryption scheme (BES) comprising the steps of, in a stage for a decoder to become a group member, receiving keys pertaining to the position in the group according to the BES, receiving a current group access data comprising a current group access key, and in a stage of accessing broadcast data, using the current group access data to access the broadcast data, and in a stage of renewing the current group access key, sending a first group message comprising at lease a next group access key encrypted so that only non-revoked decoders can access it, said group message being further encrypted by the current group access key, updating the current group access key with the next group access key.

Device and method for GPU-based watermarking
10805693 · 2020-10-13 · ·

A method and system for watermarking content utilizing a user device GPU. Embodiments include receiving on a processing server a request from a video server for a video to be played on the user's device. The processing server may extract a set of identifying information, such as user information, from the request for the video. The processing server may further prepare shader software code which is to be executed on a GPU present on the user's device. The code preparation may include creating a watermarking procedure to be executed during playback on the user device. The processing server may further transmit the shader software code to the streaming video server to be transmitted to the user device for execution during video playback.

FRAUD PREVENTION METHOD, OPERATION DETECTION METHOD AND APPARATUS, AND ELECTRONIC DEVICE
20200288201 · 2020-09-10 ·

Embodiments of the present application provide a theft prevention method and apparatus, a method and apparatus for detecting operations, and an electronic device. The theft prevention method comprises: monitoring each operation of an account logged into a live broadcasting platform; for each operation of the account, detecting whether the operation is a preset operation that can obtain an asset reward from the live broadcasting platform; if the operation is the preset operation, determining whether the operation meets a preset normal operation rule; and if the operation does not meet the preset normal operation rule, freezing an asset of the account. With the embodiments of the present application, theft of live broadcasting platform assets can be effectively prevented, and losses of platform can be avoided.

System and method for providing fraud control
10757099 · 2020-08-25 · ·

A system and method for detecting fraud in a network is disclosed. The network includes cable modems, a network collector, cable modem termination systems (CMTS), and a network data converger. The network collector scans a first cable modem and receives and sends to the network data converger device identification for the first modem and an address of a first CMTS connected to the first cable modem. The network collector adds this information to a devices inventory. The network collector scans a second cable modem and receives and sends to the network data converger device identification and an address of a second CMTS connected to the second cable modem. The network data converger compares this information to the information in the devices inventory and may determine fraud based on the comparison.

Content reproduction method and device

Disclosed herein is a method and apparatus for managing license information for playing secure high definition content. The method includes receiving a certificate revision list (CRL) from a license server, receiving encrypted license information allowing a playback of the content through a first session established between a storage device and the license server wherein the first session is identified by session identification information, and playing the content based on the license information.

Location-Based Tagging and Retrieving of Media Content
20200244717 · 2020-07-30 · ·

Systems, apparatuses, components, methods, and techniques for location-based tagging and retrieving of media content are provided. Some embodiments include a media-playback device. The media-playback device includes a location-determining device that determines a geographical location of the media-playback device, a media-output device that plays media content items, at least one computer readable data storage device. The media-playback device operates to receive a selection of a location-based media playlist, the location-based media playlist including playlist data that identifies a set of media content items and defines a route. A geographic location of the media-playback device is determined using the location-determining device. A media content item of the location-based playlist is identified based on the determined geographic location and the route. The media-playback device plays the media content item.

Selectively delaying control word delivery for piracy identification

Systems, devices and automated processes detect piracy of broadcast television signals through selective delay of decrypted code words that are used to render satellite or other received television signals. Smart cards or similar access control hardware are programmed to selectively delay delivery of cryptographic code words based upon the identity of the receiver device. The delayed delivery of the code words produces intentional glitches in the content rendered by the receiver, thereby allowing viewers of the rendered content to ascertain the identity of the device.

METHOD AND SYSTEM FOR PERFORMING BROADCAST ENCRYPTION WITH REVOCATION CAPABILITY
20200186347 · 2020-06-11 ·

A broadcast encryption method that allows a broadcaster to send encrypted content to a set of users such that only a subset of authorized users can decrypt the content, and to perform both temporary and permanent revocation of users. Accordingly, during a Setup stage, a Key Service generates a public key and a Master Secret Key (MSK) and sends the Public Parameters PP used to generate the public key to a broadcaster and to all users. The broadcaster uses the Public Parameters PP to create a message M, with which the broadcaster encrypts the content, and further creates a Cipher Text (CT), which is sent to all users. During a Key Gen stage, whenever a user wishes to decrypt the message M for decrypting the content, the user sends a request with his ID1 to the Key Service. The Key Service generates a corresponding secret key SK.sub.ID1 and the secret key SK.sub.ID1 is sent to the user ID1 via a secure data channel. During a Decrypt stage, the user uses the secret key SK.sub.ID1, to decrypt the Cipher Text (CT) and obtain the message M. During a Revoke stage of k users (k=1, 2, 3, . . . ) a State Update Message (SUM) which is sent to all users, is provided and each user updates his state with the SUM he received, such that the k users having identities ID.sub.1, ID.sub.2, . . . ID.sub.k will not be able to update their state and will be permanently revoked, while all the remaining users being admitted users will be able to update their state and will not be revoked. Temporary revocation is done by inserting a list of IDs (ID.sub.1, ID.sub.2, . . . ID.sub.k) to be revoked into the CT.

Ad media management system

A system for managing advertising media by a cable network provider includes a content provider interface for downloading advertising media from advertising media content providers. A database stores the advertising media. A processor configures an advertising media management system responsive to a stored set of instructions. A memory coupled to the processor has data and a set of instructions for implementing an advertising media management system. The data includes the advertising inventory data and the set of instructions configuring the processor to provide a number of controllers. A management dashboard controller controls a presentation of a plurality of graphical reports relating to available advertising media within the database using a management dashboard controller. A required media controller generates a list of received advertising media that have not been encoded. A queue controller groups the advertising media stored within the database to be processed by the advertising media management system according to a first queue of all advertising media to be processed and a plurality of second queues each comprising a portion of all of the advertising media of the first queue, wherein at least one advertising media is contained within multiple ones of the plurality of second queues. A media library controller displays all approved advertising media stored within the database and an associated status of the approved advertising media. An audit logs controller tracks all user interaction with each of the advertising media stored within the database through the advertising media management system and tracks all functional tasks preformed on each of the advertising media stored within the database. An application administration controller controls of system application settings.