H04N21/2585

Controlling access to IP streaming content
10623409 · 2020-04-14 · ·

There is described a method of controlling access to IP streaming content by a plurality of receivers. The method comprises the steps of (a) for each receiver in the plurality of receivers, providing that receiver with access to first control information for that receiver to enable that receiver to access a first portion of the content; (b) identifying a receiver from the plurality of receivers as an identified receiver; (c) updating the first control information so as to provide updated control information for each receiver, the updated control information being associated with a second portion of the content; and (d) configuring each receiver to fetch the updated control information for that receiver. For the identified receiver, the updated control information is invalid such that the identified receiver is unable to fully access the second portion of the content. A server configured to carry out the method is also described.

System and Method for Identifying Leaked Data and Assigning Guilt to a Suspected Leaker

A system and method for identifying a leaked data file and assigning guilt to one or more suspected leakers proceeds through a plurality of levels. At a first level, primary watermark detection occurs. Data is inserted into a subset of data to determine correlation with data in the suspected leaked file. The guilt probability that results is then weighted based on the number of bits matched. In a second level, another search process is performed for detecting additional salt-related patterns. The guilt score is then computed for every detected recipient identifier for the suspected leaked data file, and the relative guilt of these recipients is weighted. In a third layer, the statistical distribution of data in the suspected leaked file is compared with that of corresponding data in the reference files. After this layer is complete, the average of guilt scores across each of the layers is calculated.

Location-based tagging and retrieving of media content
10587667 · 2020-03-10 · ·

Systems, apparatuses, components, methods, and techniques for location-based tagging and retrieving of media content are provided. Some embodiments include a media-playback device. The media-playback device includes a location-determining device that determines a geographical location of the media-playback device, a media-output device that plays media content items, at least one computer readable data storage device. The media-playback device operates to receive a selection of a location-based media playlist, the location-based media playlist including playlist data that identifies a set of media content items and defines a route. A geographic location of the media-playback device is determined using the location-determining device. A media content item of the location-based playlist is identified based on the determined geographic location and the route. The media-playback device plays the media content item.

SECURE AND DISRUPTION-TOLERANT COMMUNICATIONS FOR UNMANNED UNDERWATER VEHICLES

An underwater communications system includes a network communication interface, one or more computer processors, and a memory containing computer program code that, when executed by operation of the one or more computer processors, performs an operation. The operation includes storing a plurality of data packets to be transmitted to a destination device, determining that data communications over the network communication interface have become available for a first network node, and determining that the first network node has a valid security credential. Additionally, the operation includes, upon determining that the first network node has the valid security credential, transmitting the stored plurality of data packets over the network communication interface to the first network node. The first network node is configured to employ store-carry-and-forward data messaging techniques to transmit the plurality of data packets towards the destination device.

Secure and disruption-tolerant communications for unmanned underwater vehicles

An underwater communications system includes a network communication interface, one or more computer processors, and a memory containing computer program code that, when executed by operation of the one or more computer processors, performs an operation. The operation includes storing a plurality of data packets to be transmitted to a destination device, determining that data communications over the network communication interface have become available for a first network node, and determining that the first network node has a valid security credential that has not been revoked by an access granting authority. Additionally, the operation includes, upon determining that the first network node has the valid security credential, transmitting the stored plurality of data packets over the network communication interface to the first network node. The first network node is configured to employ store-carry-and-forward data messaging techniques to transmit the plurality of data packets towards the destination device.

Device and Method for GPU-based Watermarking
20190141414 · 2019-05-09 · ·

A method and system for watermarking content utilizing a user device GPU. Embodiments include receiving on a processing server a request from a video server for a video to be played on the user's device. The processing server may extract a set of identifying information, such as user information, from the request for the video. The processing server may further prepare shader software code which is to be executed on a GPU present on the user's device. The code preparation may include creating a watermarking procedure to be executed during playback on the user device. The processing server may further transmit the shader software code to the streaming video server to be transmitted to the user device for execution during video playback.

APPARATUS AND METHODS FOR DEVICE AUTHORIZATION IN A PREMISES NETWORK

Apparatus and methods for enabling protected premises networking capabilities. In one embodiment, a white list of devices authorized to access a premises network and a black list of device riot authorized to access a premises network are utilized. The black and white lists may be stored at a database in communication with an authorization manager or may be stored at the manager itself. When a client device is connected to a premise, the manager determines, based on the premises and/or device identity, whether the device is entitled to access. The authorization manager makes this determination based on whether the device is on the white or black list. If the device is on neither list, the manager may add the device to the white list upon appropriate verification. The manager may also facilitate removal of a device from the white list to the black list upon request or automatically.

SECURE AND DISRUPTION-TOLERANT COMMUNICATIONS FOR UNMANNED UNDERWATER VEHICLES

An underwater communications system includes a network communication interface, one or more computer processors, and a memory containing computer program code that, when executed by operation of the one or more computer processors, performs an operation. The operation includes storing a plurality of data packets to be transmitted to a destination device, determining that data communications over the network communication interface have become available for a first network node, and determining that the first network node has a valid security credential that has not been revoked by an access granting authority. Additionally, the operation includes, upon determining that the first network node has the valid security credential, transmitting the stored plurality of data packets over the network communication interface to the first network node. The first network node is configured to employ store-carry-and-forward data messaging techniques to transmit the plurality of data packets towards the destination device.

Location profiling
10171871 · 2019-01-01 · ·

One or more of a system, method, apparatus, and computer-program product to identify or approximate or estimate where a particular television receiver is geographically located using spot beam transport information as described in the specification and/or shown in any of the drawings.

Preserving transmission properties of real-time scenes in an environment when an increasing number of users join a session

Preserving transmission properties of real-time scenes in an environment when an increasing number of users join a session may be provided. A plurality of metrics associated with transmission of scenes having a Coarse Grain (CG) layer and a Fine Grain (FG) layer may be determined. Then a current client, based on a first one of a plurality of metrics, may be revoked. One of the following may then be performed: blocking a new client based on a second one of a plurality of metrics; and allowing the new client based on the second one of a plurality of metrics.