H04N21/63775

SYSTEM AND METHOD FOR TRANSCODING MEDIA STREAM
20240406465 · 2024-12-05 ·

A system for transcoding a media stream includes at least one network interface; at least one memory; and at least one processor each coupled to one or more of the at least one network interface and one or more of the at least one memory. The at least one processor is configured to publish, via a messaging bus, a segment transcode request in a segment transcode request queue, retrieve the segment transcode request by a transcode worker thread, wherein the first transcode worker thread monitors the segment transcode request queue, transcode by a second transcode worker thread a segment referenced by the segment transcode request, determine by the manifest processor whether the second transcode worker thread has completed transcoding the segment and is still operating, and, if not, transcode the segment by a third transcode worker thread, and store the transcoded segment.

SYSTEM AND METHOD FOR CONVERTING ADAPTIVE STREAM TO DOWNLOADABLE MEDIA
20240406464 · 2024-12-05 ·

A system for converting an adaptive media stream to downloadable media includes at least one network interface, at least one memory, and at least one processor. The at least one processor is configured to receive, from a requesting device, a request for converting at least a portion of a media stream into a downloadable multimedia container, initialize a plurality of worker threads, retrieve, via one of the plurality of worker threads, a segment of the media stream from a storage location, concatenate, via the one of the plurality of worker threads, the retrieved segment into a multimedia container, determine that each segment of the media stream associated with the at least a portion of the media stream is included in the multimedia container, and transmit, via the at least one network interface, the multimedia container to the requesting device.

METHODS FOR THE COVERT TRANSMISSION OF DATA
20170339373 · 2017-11-23 ·

A method for determining an identifier of a conditional access card used in a conditional access system, in which the conditional access card autonomously modulates the timing of data packets sent by the conditional access card, to form a timing sequence that corresponds to the identifier of the card. The sequence is generated by a predefined non-linear function stored on the conditional access card, and the predefined non-linear function depends on both the identifier of the conditional access card and a non-linear random sequence that is known to the conditional access card and a monitoring station that receives transmissions from the conditional access card.

Multimedia network system with content importation, content exportation, and integrated content management
09805174 · 2017-10-31 ·

This system provides wired and/or wireless access throughout a multimedia network built on a distributed architecture which can be transparent to the user. This multimedia network includes content which is imported or generated within the network. The system allows for the content provider to determine the license status of content and update the license status of content which was previously provided by that provider. The external content can be accessed in real time or downloaded and stored within the system for later access at the convenience of the user. The usage of some content is controlled by the use of encryption and other protection methods. The system allows for storage of live video by storing the digitized video and allowing the user to control how, when and where the content is viewed. The system makes available multiple multimedia services to all users in the network or connected via the internet.

System and method for asynchronous uploading of live digital multimedia with guaranteed delivery
09602846 · 2017-03-21 · ·

A system for asynchronous uploading of live digital multimedia with guaranteed delivery is provided. The system comprises a video encoder and a remote server, wherein the video encoder includes instructions for acquiring video and audio, encoding the video and audio, creating a manifest file, storing the manifest file, adding the manifest file to an upload queue, creating a segment file, storing the segment file, adding the segment file to the upload queue, initiating at least one upload worker thread, taking a first file from the upload queue, attempting to transmit the first file to the remote server, determining if an instability with the connection to the remote server exists, and, if so, repeating the attempting and determining steps, executing a data integrity test on the first file upon a successful upload of the first file, and repeating, if the data integrity test fails, the attempting, determining, and executing steps.

Multimedia network system with content importation, content exportation, and integrated content management
09600640 · 2017-03-21 · ·

This system provides wired and/or wireless access throughout a multimedia network built on a distributed architecture which can be transparent to the user. This multimedia network includes content which is imported or generated within the network. The system allows for the content provider to determine the license status of content and update the license status of content which was previously provided by that provider. The external content can be accessed in real time or downloaded and stored within the system for later access at the convenience of the user. The usage of some content is controlled by the use of encryption and other protection methods. The system allows for storage of live video by storing the digitized video and allowing the user to control how, when and where the content is viewed. The system makes available multiple multimedia services to all users in the network or connected via the internet.

Efficient key hierarchy for delivery of multimedia content

A Digital Rights Management (DRM) system provides a lightweight layering of encryption and decryption of keys that allows efficient use of different cryptographic techniques to effect the secure delivery of multimedia content. Asymmetric cryptography, where a public key is used to encrypt information that can only be decrypted by a matched private key, is used by the DRM system to deliver symmetric keys securely.

Transmission method and system for terminal unique information
09553731 · 2017-01-24 · ·

A terminal unique information transmission method including: receiving, by a server, from a terminal, a terminal unique information acquisition request including a terminal unique public key certificate of the terminal; generating an encrypted terminal unique public key certificate by encrypting the terminal unique public key certificate of the terminal; checking, by the server, whether the generated encrypted terminal unique public key certificate is described in a discarded terminal information table; and transmitting, by the server, when the generated encrypted terminal unique public key certificate is not described in the discarded terminal information table, a terminal unique information of the terminal to the terminal.

SIGNATURE DEVICE AND SIGNATURE METHOD
20170011235 · 2017-01-12 · ·

A signature device including a storage unit configured to store moving image data, and a processor configured to extract original metadata from moving image data for the image data of each of a plurality of images forming the moving image data, the original metadata including location data of the image data and identification data of the moving image data, to encode the image data of each of the images into still image data in accordance with an image format, to write the still image data into a first area, to write the original metadata extracted by the extractor into a second area, the first area and the second area being included in a storage area of a still image data file in which the still image data is filed, and to generate summary data for the still image data file.

Secure remote-less configuration of a media playback device
12464178 · 2025-11-04 · ·

The present disclosure is directed to embodiments for securely reconfiguring a media playback device. For example, a method may include determining whether a media playback device is being controlled by a user. In response to determining that the media playback device is not being controlled by the user, the method may further include: causing display of a pictograph that includes an encrypted payload with information for wirelessly connecting to the media playback device and is configured to be scanned by a client device; determining whether a request from the client device to wirelessly connect to the media playback device is a valid request; in response to the request being valid, wirelessly connecting the client device to the media playback device via a soft access point; and receiving, at the media playback device, information for reconfiguring the media playback device.