H04N21/44055

Security of paired storage drives

Robust, computationally-efficient and secure systems, devices and automated processes are described for storing content on a disk drive or other storage device that is supplied to a media encoder or other host device. The user-supplied drive may be used, for example, to store content in a digital video recorder (DVR) or the like. The host device creates two separate digital identifiers that separately identify the host device and the user, respectively, so that subsequent pairing can be performed based upon either identifier. The two identifiers are stored on the storage device and rendered upon subsequent pairing for validation by the host device.

PRIVACY PROTECTION METHOD FOR TRANSMITTING END AND RECEIVING END, ELECTRONIC DEVICE AND COMPUTER READABLE STORAGE MEDIUM
20220215071 · 2022-07-07 ·

Provided are a privacy protection method for a transmitting end and a receiving end, an electronic device, and a computer-readable storage medium. The method includes acquiring an initial image, acquiring an area to be scrambled in the initial image, performing backup and scrambling for the initial image based on the area to be scrambled to obtain a scrambled image and backup information, encrypting the backup information to obtain an encrypted result, and transmitting the scrambled image and the encrypted result.

Electronic device for reproducing data and operation method thereof
11284150 · 2022-03-22 · ·

An electronic device and an operation method thereof, according to various embodiments, may: receive first data and second data compressed in a designated compression scheme; decompress the received first data and the received second data on the basis of at least the designated compression scheme; decrypt the decompressed second data; detect success of the decryption; and reproduce the decompressed first data and the decrypted second data.

Method and apparatus for redacting video for compression and identification of releasing party
11155725 · 2021-10-26 · ·

A method and system for protecting video and image files processes from original files to detect skin tones of persons appearing in the media. Pixels determined to contain skin tones are blurred or blacked out, and the pixel locations and their original color values are stored in a metadata file. The metadata file is encrypted and stored with the redacted video file. Thereafter, when an authorized person wants to see an unredacted version of the video, the system decrypts the metadata and reconstituted the video, replacing the redacted pixels with their original color values, and inserting a unique watermark into the video that identifies the requesting person. The watermarked video is then provided to the requesting person.

Streaming image encryption method and computer program, streaming image decryption method and computer program

A method of decrypting a streaming image includes: receiving a packet including at least an item which is encrypted, the item including at least one parameter used for decoding image data included in the streaming image; decrypting the item; and decoding the image data included in the streaming image based on the decrypted item, wherein the image data is not encrypted.

Constructing a transport stream
11025977 · 2021-06-01 · ·

A plurality of sets of primary product keys is established or generated, each set containing at least two different primary product keys. One primary product key of each set is made available to each receiver or group of receivers, such that each receiver or group of receivers is provided with a different combination of said primary product keys. For each set of primary product keys, the plurality of receivers or groups of receivers is provided with a different primary entitlement control message corresponding to each primary product key of said set, each such primary entitlement control message distributing a primary control word for recovery through decryption using the corresponding primary product key. The primary control words can then be used for purposes such as tracing compromise of the conditional access system, or arranging for differently fingerprinted content to be decoded at different receivers or groups of receivers.

Digital Encryption of Tokens Within Videos

Embedding of digital tokens within a digital video can occur cryptographically using a public key in some embodiments. The digital video may be altered in a variety of ways so that the video itself contains an integrated token that can represent various quantities. Audiovisual data can be altered to contain both a token and a perceptible user auditory or visual cue as to the presence of the encrypted digital token. A video with an embedded digital token may be sent to users on the Internet. A video recipient may be able to view the video and also take additional action or gain additional functionality from the digital token embedded in the video. Tokens can be embedded by altering video metadata so that the perceptible video content itself is not changed in some embodiments.

ELECTRONIC DEVICE FOR REPRODUCING DATA AND OPERATION METHOD THEREOF
20210084364 · 2021-03-18 ·

An electronic device and an operation method thereof, according to various embodiments, may: receive first data and second data compressed in a designated compression scheme; decompress the received first data and the received second data on the basis of at least the designated compression scheme; decrypt the decompressed second data; detect success of the decryption; and reproduce the decompressed first data and the decrypted second data.

Digital encryption of tokens within videos

Embedding of digital tokens within a digital video can occur cryptographically using a public key in some embodiments. The digital video may be altered in a variety of ways so that the video itself contains an integrated token that can represent various quantities. Audiovisual data can be altered to contain both a token and a perceptible user auditory or visual cue as to the presence of the encrypted digital token. A video with an embedded digital token may be sent to users on the Internet. A video recipient may be able to view the video and also take additional action or gain additional functionality from the digital token embedded in the video. Tokens can be embedded by altering video metadata so that the perceptible video content itself is not changed in some embodiments.

METHOD OF PLAYING SYSTEM STREAM FILES WITH DIFFERENT RECORDING FORMATS

A non-transitory tangible recording medium stores recorded AV data. The AV data includes a system stream file played by a playback device and a management information file having management information corresponding to the system stream file. The system stream file includes a first segment including repeated a first data unit that be decrypted using a first decryption key that the playback device individually has and a second data unit that cannot be decrypted by the first decryption key. The system stream file also includes a second segment which can be decrypted using a second decryption key that the playback device has in common with another playback device. The management information file has a start source packet number, which identifies a start source packet out of a plurality of source packets storing an I-picture that is a random access point, and the start source packet is situated in the second segment.