Patent classifications
H04N21/42623
Set-top box for changing channels and system and method for use of same
A set-top box for changing channels and method for use of the same are disclosed. In one embodiment, the set-top box includes a network interface controller that is configured to receive a source internet protocol television signal, which includes two channels, from an external source and at least partially prepare the source internet protocol signal in order to forward the tuned signal to a television. The set-top box saves in a buffer the at least partially prepared second channel beginning at a recent periodic, sequential signal access point. In response to receiving a channel change instruction when the set-top box is forwarding the at least partially prepared first channel signal, the set-top box causes the television tuner to forward the at least partially prepared signal based on the second channel stored in the buffer beginning at the recent periodic, sequential signal access point.
Cable modem with embedded video transmitter
A cable modem with an embedded video transmitter for supporting all-IP end-to-end services in a cable network is disclosed. A cable modem is provided with a video converter/modulator feature. The cable modem receives Internet protocol (IP) packets carrying video streams from a network. A video extractor in the cable modem extracts video packets from the IP packets, and a video modulator in the cable modem modulates the extracted video packets per video format supported by a customer premise equipment (CPE). The cable modem then sends the modulated video packets to the CPE. With this feature, all-IP end-to-end services may be implemented without being dependent on an existing CPE's capability for supporting IP at the customer premises.
Forced execution of authenticated code
Described herein are systems and methods for providing hardware based security to software applications in a television receiver. The system can include a television receiver having a trusted hardware environment that includes a security processor and a standard environment that includes an application processor. The security processor can ensure that at least a portion of the software application executed by the application processor is secure. A portion of the software application code can be placed in an interrupt service routine memory space. During execution of the software application, the security processor can security check the portion of the software application in the interrupt service routine memory space, making it trusted code. The security processor can force the application processor to execute the trusted code by triggering an interrupt. Such forced execution can allow the security processor to not only ensure that code is trusted, but that it is executed.
AVOIDING LINK INTEGRITY FAILURES ON DISPLAYPORT DURING HCDP 2.2 BY USING SINK SIDE OPTIMIZATIONS
Techniques for operating a receiver are provided. An example method according to these techniques includes receiving a content type indicator from a transmitter indicating that a content stream from the transmitter comprises a first content type, performing a first integrity check on the content stream by decrypting content from the content stream based in part on the content type indicator, incrementing a counter responsive to the first integrity check failing due to a mismatch between the content type indicator and the content of the content stream, performing a second integrity check on the content stream by decrypting the content from the content stream based in part on a second content type responsive to the counter exceeding a threshold, and decrypting the content stream based in part on the second integrity check being successful.
Display component activation
A device configuration for determining whether to send an activation notification based on whether a signal can be decoded by a tuner or codec are described herein. For example, a device may include a tuner, activated in response to receiving the user indication, to attempt to decode a signal corresponding to a channel, and a processor to execute instructions that: detect, prior to a start of a delay period, that the tuner is required to decode the signal, determine, during the delay period, whether the signal can be decoded by the tuner, deactivate the tuner after the delay period without sending a tuner activation notification, in response to a determination that the signal cannot be decoded by the tuner, and send the tuner activation notification to a remote server after the delay period, in response to a determination that the signal can be decoded by the tuner.
System and method for transitioning from decompressing one compressed media stream to decompressing another media stream
A computer system generates a first decompressed media stream based on a first compressed media stream and provides the first decompressed media stream to a presentation device. While providing the first decompressed media to the presentation device: the computer system receives a content-transition indication indicating that a second decompressed media stream is to be provided to the presentation device instead of the first decompressed media stream. The computer system stores first buffered data corresponding to the first decompressed media stream and receives a second compressed media stream corresponding to the second decompressed media stream. After receiving the second compressed media stream, the computer system provides the first buffered data corresponding to the first decompressed media stream to the presentation device while preparing to generate the second decompressed media stream, and after preparing to generate the second decompressed media stream, provides the second decompressed media stream to the presentation device.
Techniques for secure provisioning of a digital content protection scheme
Techniques for improved decryption of an encrypted media stream are described. In one embodiment, a system may include a receiver to receive an encrypted media stream, an extraction module to extract an encryption characteristic of the encrypted media stream, a first processor to produce configuration commands from the extracted encryption characteristic, a second processor to receive the encrypted media stream and the configuration commands, and to produce decrypted media based upon a decryption scheme indicated by the configuration commands, and a key distribution module, to distribute a decryption key to the second processor.
METHOD AND DEVICE FOR SECURE PROCESSING OF ENCRYPTED DATA
A method for secure processing of encrypted data within a receiver includes receiving a packet of encrypted compressed data and allocating a region of memory for storing a decrypted version of the packet of encrypted compressed data. The allocation is in response to, and after, reception of the encrypted compressed data. A size of the region of the memory allocated is equal to a size of the packet of encrypted compressed data that is received. The method further includes modifying a configuration of an access authorization filter for defining access rights to the allocated region, decrypting the packet of encrypted compressed data, and storing, in the allocated region, the decrypted compressed data of the packet. The aforementioned allocation, modification, decryption, and storage steps are repeated in response to each new reception of a packet of encrypted compressed data so as to dynamically modify the configuration of the access authorization filter.
System and method for selecting a transition point for transitioning between media streams
A computer system generates a first decompressed media stream based on a first compressed media stream. While providing the first decompressed media stream to the presentation device, the computer system receives a content-transition indication to switch to a second decompressed media stream. In response to receiving the content-transition indication, the computer system selects a first transition point in first content corresponding to the first compressed media stream and selects a second transition point in second content corresponding to the second compressed media stream. The second transition point is selected in accordance with a bandwidth available for receiving the second compressed media stream and the first transition point is selected based on the second transition point. The computer system requests the second compressed media stream starting at the second transition point and ceases to provide the first decompressed media stream at the first transition point in the first content.
SET-TOP BOX FOR CHANGING CHANNELS AND SYSTEM AND METHOD FOR USE OF SAME
A set-top box for changing channels and method for use of the same are disclosed. In one embodiment, the set-top box includes a network interface controller that is configured to receive a source internet protocol television signal, which includes two channels, from an external source and at least partially prepare the source internet protocol signal in order to forward the tuned signal to a television. The set-top box saves in a buffer the at least partially prepared second channel beginning at a recent periodic, sequential signal access point. In response to receiving a channel change instruction when the set-top box is forwarding the at least partially prepared first channel signal, the set-top box causes the television tuner to forward the at least partially prepared signal based on the second channel stored in the buffer beginning at the recent periodic, sequential signal access point.