Patent classifications
H04N2005/91342
Light weight transport stream streaming protocol for live transcoding system
A robust, computationally-efficient and secure system is described for streaming content from a server to a client device via the Internet or another digital network. Various aspects relate to automated processes, systems and devices for securing a media stream with efficient yet effective digital cryptography. In particular, content may be transmitted in transport stream (TS) format in which all packets are encrypted (e.g., using a cipher block chain), in which control packets are exempted from encryption (e.g., using an electronic codebook), or in any other manner.
DEVICE AND A METHOD FOR SIGNING A VIDEO SEGMENT COMPRISING ONE OR MORE GROUPS OF PICTURES
A device, and method of signing a video segment comprising one or more groups of pictures, GOPs, wherein each GOP comprises a header and one or more frames, are disclosed. For each of the one or more GOPs a GOP hash is produced and the GOP hash is digitally signed by means of a digital signature to produce a signed GOP hash. For each GOP except a last GOP of the one or more GOPs the respective signed GOP hash is saved in the header of a subsequent GOP. An additional GOP is added to the video segment after the last GOP of the one or more GOPs, wherein the additional GOP comprising a header and one or more frames. The signed GOP hash of the last GOP of the one or more GOPs is saved in the header of the additional GOP.
ELECTRONIC DEVICE WITH A CAMERA AND MOLECULAR DETECTOR
Examples of a method to use in an electronic device, an electronic device, and machine-readable non-transitory storage medium at disclosed herein. An example of the machine-readable non-transitory storage medium includes instructions executable by processor of an electronic device to generate a molecular signature to based on molecular signature data representative of a determined molecular structure of an object scanned by a molecular detector of the electronic device and to embed the molecular signature tag in metadata of an image file based on a captured image of the object by a camera of the electronic device.
Digital ledger camera and image functions
A camera module includes an imaging sensor that outputs raw image sensor data representative of a scene and an imaging logic engine that processes the raw image sensor data into image data in a predetermined image format. The imaging logic engine carries out a hash function to generate a hash of the image data and adds a genesis block of a digital ledger as part of the image data so that the genesis block is part of the image data in an image file output by the camera module, the genesis block containing the hash.
Authentication Module for Sensor Data
An authentication module for a time series of sensor data, is provided that comprises at least one data interface which can be connected to at least one sensor. An authentication interface and an authentication logic are provided which is coupled to the data interface and the authentication interface. The authentication logic is configured to receive at least one data set (21a-24a) via the at least one data interface from at least one sensor, form one or more compressed products (21b-24b) from one or more received data sets, create an authentication which contains the compressed products and respectively contains a reference to the associated data set, or at least a part of the associated data set, and output the authentication via the authentication interface.
Systems and methods for tracking and transferring ownership of connected devices using blockchain ledgers
The disclosed embodiments include computerized systems and methods that generate secured blockchain-based ledger structures that facilitate event-based control of tracked assets. In one embodiment, an apparatus associated with a centralized authority of the secured blockchain-based ledger may detect an occurrence of an event, and may access and decrypt a set of rules hashed into the secured blockchain-based ledger using a confidentially-held master cryptographic key. The apparatus may identify a rule associated with the detected event, and perform one or more operations consistent with the rule and involving at least one of assets tracked within the secured blockchain-based ledger or an owner of a portion of the tracked assets. By way of example, the detected event may triggering a sale, transfer, and/or re-allocation of an ownership interest in a tracked asset, and the identified rule may specify a distribution of proceeds derived from the sale, transfer, and/or re-allocation.
Secure real-time product ownership tracking using distributed electronic ledgers
A processor receives a signal representing data including event information detailing an event involving an entity having a registered ownership interest in a product and loads a portion of a distributed electronic ledger for tracking ownership information associated with the product. The distributed electronic ledger includes, within a block thereof and associated with the product, an event trigger list including entity data associated with each entity having a registered ownership interest in the product and a rules engine including rules associated with event triggers in the event trigger list. The processor determines whether a triggering event corresponding to the event is stored in the event trigger list and, when the event has a corresponding triggering event, determines the associated rule within the rules engine. The processor updates and saves the distributed electronic ledger by performing an action specified by the determined associated rule.
Systems and methods for tracking subdivided ownership of connected devices using block-chain ledgers
The disclosed embodiments include computerized systems and methods for generating secured block-chain-based ledger data structures that track subdivide ownership and usage of one or more assets, such as Internet-connected devices. In one instance, an apparatus associated with a rules authority of the secured block-chain-based ledger may detect an occurrence of a triggering event related to at least one of partial ownership interests in the assets, and may access and decrypt a set of rules hashed into the secured block-chain-based ledger using a confidentially-held master cryptographic key. The apparatus may identify a rule associated with the detected event, and perform one or more operations consistent with the rule, including a generation of additional data blocks reflecting a change in at least one of the partial ownership interests, and additionally or alternatively, processes that adaptively monitor a compliance of one or more partial owners with an imposed usage restriction.
Systems and method for tracking enterprise events using hybrid public-private blockchain ledgers
The disclosed embodiments include computerized systems and methods for generating secured blockchain-based ledger data structures that track occurrences of events across fragmented and geographically dispersed lines-of-business of an enterprise. In one instance, an apparatus associated with a rules authority of the secured blockchain-based ledger may detect an occurrence of a triggering event, and may access and decrypt a set of rules hashed into the secured blockchain-based ledger using a confidentially-held master cryptographic key. The apparatus may identify a rule associated with the detected event, and perform one or more operations consistent with the rule, including a disbursement of various rewards to employees in response to customer-specific interactions with the enterprise. The disclosed embodiments provide a rules process for aggregating mutually incompatible enterprise data that specifies the events, and for tracking the events in uniform data structures accessible across the enterprise.
Storage drive protection using file system level encryption
Systems, devices and automated processes provide robust, computationally-efficient and secure protection of media content or other electronic data stored on a user-supplied storage device through the use of efficient file system encryption. Only certain portions of the content are encrypted by the host device, thereby reducing the computational demand in comparison to encrypting all of the content. By selecting the particular portions to encrypt, the formatting and structure of the stored data can be concealed, thereby making the use of the unencrypted content very difficult, if not impossible. In implementations based upon the XFS file system, for example, the superblocks that store header information about the files stored on the drive can be encrypted, thereby rendering the unencrypted content