Patent classifications
H04N21/63345
VIDEO PLAYBACK SYSTEM BASED ON APPROVAL OF PLAYBACK APPROVER
Provided is a video playback system based on approval of a playback approver. A decryption key that can decrypt an encrypted and stored recorded video is generated only when video playback is approved by a playback approver using an appointed playback approval method and transmitted to the video recording device so that it is possible to prevent leakage of the recorded video with sensitive personal information.
METHOD AND APPARATUS FOR OPERATING AN ON-DEMAND VIDEO GATEWAY
Aspects of the subject disclosure may include, for example, a user device that attaches to a radio access network of a mobile network and requests services. The user device creates a virtual network function on the device to support the service. The virtual network function may include a user plane virtual network function, a control plane virtual network function, or both. Other embodiments are disclosed.
CONTENT VIEWING METHOD AND MOBILE INFORMATION TERMINAL USED FOR SAME
A content viewing method uses a viewing system including a content distribution server distributing contents, a mobile information terminal, and a viewing device reproducing a content. The mobile information terminal transmits user identification information and a user password to the content distribution server. The content distribution server authenticates the mobile information terminal based on the user identification information and the user password. The mobile information terminal transmits an account issue request requesting an account for reproducing a desired content to the content distribution server. The content distribution server issues the account based on the account issue request and transmits the account to the mobile information terminal. The mobile information terminal stores the account. The mobile information terminal transmits the account by short-range wireless communication. The viewing device stores the account received by short-range wireless communication. The viewing device reproduces the desired content using the stored account.
Improvements to a Television Signal Reception Device and System
The present invention allows the combination and adaptation of a broadcast data reception system with a Conditional Access System which may be embedded in the receiving device, such as a television, or can be provided as a module which is connected to the receiving device and which allows service provider controlled, typically cloud based, interactivity via the same CAS with different Multi Channel video programming distributors (MVPD) service providers.
LIMITING KEY REQUEST RATES FOR STREAMING MEDIA
Techniques and a system are provided for protecting content (or media item) streamed over a network from unauthorized access. As an example, the streaming protection system generates statistics when a client requests a media item. The statistic may be generated based on various factors. The media item is divided into different portions, each portion requiring a different key to decrypt the portion so that it may be viewed by a user. Based on the generated statistic, the streaming protection system determines whether or not to allow the client access to the decryption key for a portion of the media item.
Real-time enablement of OTT applications
Disclosed herein are system, method, and computer program product embodiments for real-time enablement of over-the-top media service applications. An embodiment operates by receiving a device identifier from a customer device including a disabled third-party over-the-top (OTT) application, determining a verification status of the customer device based on the device identifier, determining a customer identifier associated with the customer device, and determining an entitlement status based on the customer identifier. The embodiment further operates by assigning a vendor-issued identifier to the customer identifier, generating a third-party token based on the verification status and the entitlement status, and sending the third-party token to the customer device and a third-party service associated with the disabled third-party OTT application. In some embodiments, the customer device and the third-party service may perform a handshake using the third-party token to enable the disabled OTT third-party application on the customer device.
MECHANISMS AND APPARATUS FOR SECURING BROADCAST CONTENT DISTRIBUTION OF TIME-SENSITIVE DATA
Aspects of the subject disclosure may include, for example, authenticating a user device based on communication over a data plane of a network, generating a decryption key, transmitting the decryption key to the user device, and transmitting encrypted content to the user device. The encrypted content may be accessible at the user device via the encryption key, potentially as a function of location and/or time. Other embodiments are disclosed.
METHOD AND APPARATUS FOR PROVIDING BROADCAST SERVICE
A method for providing a broadcast service is provided. The method includes transmitting a user datagram protocol (UDP)/internet protocol (IP) packet including a first message, the first message containing information about a message to be signed and transmitted, and transmitting a moving picture experts group (MPEG) media transport protocol (MMTP) packet including a second message, the second message containing information about the broadcast service and information indicating whether the information about the broadcast service is signed. The first message includes an identifier of a key used to verify a signature of the message to be transmitted and signed and an identifier of a hash algorithm used to calculate a hash value of the message to be transmitted and signed.
METHOD AND DEVICE ALLOWING AN ACCESS CONTROL SYSTEM TO BE APPLIED TO THE PROTECTION OF STREAMED VIDEO
Some embodiments are directed to a method and to a device allowing an access control system to be applied to the protection of streamed video. The inventive system and associated method allow an existing access control system of Marlin type to be used innovatively based on the execution of two successive operation phases allowing DRM rights to be acquired followed by the delivery of content and the decryption thereof.
Blackbox security provider programming system permitting multiple customer use and in field conditional access switching
A method, apparatus, article of manufacture, and a memory structure for securely providing data for use by a hardware device of a receiver. The method utilizes a product provisioning key (PPV) held secure from other entities that can be unlocked and used with a secret value securely and unchangeably stored in the hardware device.