H04N21/2585

Location-based tagging and retrieving of media content
11582281 · 2023-02-14 · ·

Systems, apparatuses, components, methods, and techniques for location-based tagging and retrieving of media content are provided. Some embodiments include a media-playback device. The media-playback device includes a location-determining device that determines a geographical location of the media-playback device, a media-output device that plays media content items, at least one computer readable data storage device. The media-playback device operates to receive a selection of a location-based media playlist, the location-based media playlist including playlist data that identifies a set of media content items and defines a route. A geographic location of the media-playback device is determined using the location-determining device. A media content item of the location-based playlist is identified based on the determined geographic location and the route. The media-playback device plays the media content item.

SPORTS BETTING APPARATUS AND METHOD
20230024852 · 2023-01-26 ·

An apparatus, including a processor which provides an electronic forum capable of providing a video or audio broadcast of a sporting event to users and capable of allowing the users to communicate with one another before, during, or after, the sporting event via text messaging, video conferencing, or audio conferencing, place a bet or bets on an outcome of, or on an event occurring during, the sporting event, and receive information regarding bets available, betting odds, changes in betting odds, or analytics information; a transmitter which transmits the electronic forum to a user communication device; and a receiver which receives information transmitted from the user communication device. The apparatus provides, via the electronic forum, player performance tracking data and betting activity information or betting market activity information. The player performance tracking data is obtained by an optical camera. a local positioning, or a GPS/GNSS, player performance tracking system.

MEDIA DATA MODIFICATION MANAGEMENT SYSTEM
20220417613 · 2022-12-29 ·

A processor may manage media modification within a participant network. A processor may generate the participant network having a participant. The participant may be associated with one or more media data. A processor may enforce one or more rules on the participant network using an artificial intelligence (AI) based governance system. The one or more rules may manage the modification of the one or more media data by the participant. A processor may restrict the participant from modifying the one or more media data based, at least in part, on the AI based governance system.

System and method for secure content streaming, governance, fraud prevention, and the embedding artificial intelligence into content
11526906 · 2022-12-13 ·

An automated system configured for streamed contents, to be self-aware in preventing fraudulent tactics, during real-time and offline usages, while communicating with its owner for accurate decision making, comprising: a content player module, and a content streaming service module; configured using a codec module to embed logic, encryptions, heuristics data, associated meta data, and management data into the content format; configured to use symmetric encryption keys, public keys, biometrics, and payload data; configured to authenticate the user and content owner; configured to request, receive, send, stream content, and analytics through a secure communication; configured to provide secure virtual communications between users and content owners; configured to use a call-home data, to enable the content and content owner to communicate and update one another securely; Configured to provide real-time, and offline, fraud prevention heuristics using artificial intelligence.

Preserving transmission properties of real-time scenes in an environment when an increasing number of users join a session

Preserving transmission properties of real-time scenes in an environment when an increasing number of users join a session may be provided. A plurality of metrics associated with transmission of scenes having a Coarse Grain (CG) layer and a Fine Grain (FG) layer may be determined. Then a current client, based on a first one of a plurality of metrics, may be revoked. One of the following may then be performed: blocking a new client based on a second one of a plurality of metrics; and allowing the new client based on the second one of a plurality of metrics.

Distributed white list for security renewability

To provide for security and robustness in distribution of high value video content such as UHD video, a white list is provided that does not grant default access to content like a revocation listing does, but rather forces a software update on potentially compromised devices to bring them back into copy protection compliance, eliminating, e.g., the use of certain outputs that have been compromised. Prior to outputting content, a source device determines whether the receiving device is on a white list, whether the output is still valid, whether the version number of the receiving device is still valid, and that the receiving device does not have insecure outputs on which it could re-output content.

CONTENT REPRODUCTION METHOD AND DEVICE

Disclosed herein is a method and apparatus for managing license information for playing secure high definition content. The method includes receiving a certificate revision list (CRL) from a license server, receiving encrypted license information allowing a playback of the content through a first session established between a storage device and the license server wherein the first session is identified by session identification information, and playing the content based on the license information.

Apparatus for managing members of at least one group of decoders having access to broadcast data
09730057 · 2017-08-08 · ·

A technique to manage members of a group of decoders having access to broadcast data, each group member sharing a common broadcast encryption scheme (BES) comprising the steps of, in a stage for a decoder to become a group member, receiving keys pertaining to the position in the group according to the BES, receiving a current group access data comprising a current group access key, and in a stage of accessing broadcast data, using the current group access data to access the broadcast data, and in a stage of renewing the current group access key, sending a first group message comprising at lease a next group access key encrypted so that only non-revoked decoders can access it, said group message being further encrypted by the current group access key, updating the current group access key with the next group access key.

Media network environment

A network media environment includes a first hub network and a second hub network. The first hub network encompasses a first local environment based on a first server which is coupled to a first client. The second hub network encompasses a second local environment based on a second server which is also coupled to the first client. The first local environment and the second local environment overlap. The second local environment is movable with a movement of the second server.

Method and system for performing broadcast encryption with revocation capability

A broadcast encryption method that allows a broadcaster to send encrypted content to a set of users such that only a subset of authorized users can decrypt the content, and to perform both temporary and permanent revocation of users. Accordingly, during a Setup stage, a Key Service generates a public key and a Master Secret Key (MSK) and sends the Public Parameters PP used to generate the public key to a broadcaster and to all users. The broadcaster uses the Public Parameters PP to create a message M, with which the broadcaster encrypts the content, and further creates a Cipher Text (CT), which is sent to all users. During a Key Gen stage, whenever a user wishes to decrypt the message M for decrypting the content, the user sends a request with his ID1 to the Key Service. The Key Service generates a corresponding secret key SK.sub.ID1 and the secret key SK.sub.ID1 is sent to the user ID1 via a secure data channel. During a Decrypt stage, the user uses the secret key SK.sub.ID1, to decrypt the Cipher Text (CT) and obtain the message M. During a Revoke stage of k users (k=1, 2, 3, . . . ) a State Update Message (SUM) which is sent to all users, is provided and each user updates his state with the SUM he received, such that the k users having identities ID.sub.1, ID.sub.2, . . . ID.sub.k will not be able to update their state and will be permanently revoked, while all the remaining users being admitted users will be able to update their state and will not be revoked. Temporary revocation is done by inserting a list of IDs (ID.sub.1, ID.sub.2, . . . ID.sub.k) to be revoked into the CT.