H04N21/43856

SMARTPHONE-BASED CONDITIONAL ACCESS SYSTEM
20220353572 · 2022-11-03 ·

Techniques for a smartphone-based conditional access (CA) system are described. In some embodiments, a headend in the CA system obtains a security profile associated with a pair of receiving devices used by a user, e.g., a first device (e.g., a smartphone) and a second device (e.g., a set-top-box or a TV). The headend dynamically regulates user access to requested media content during each entitlement period by assigning and distributing separate keys to the first and second device based on the security profile. The headend also uses the distributed keys to protect the media content before broadcasting. On the receiving end, one receiving device receives the media content and determines whether it is decryptable by the device. If decryptable, the receiving device (e.g., the set-top-box/TV) decrypts the media content using the keys assigned by the headend. Otherwise, the receiving device forwards the media content to the pairing device for decryption.

ENCODER, DECODER AND METHODS EMPLOYING PARTIAL DATA ENCRYPTION
20170279604 · 2017-09-28 ·

A method of encoding and encrypting input data (D1) to generate corresponding encoded and encrypted data (E2) is provided. The input data (D1) is encoded to generate intermediate encoded data streams. The intermediate encoded data streams include at least one critical data stream that is critical and essential for subsequent decoding of one or more remaining data streams of the intermediate encoded data streams. The at least one critical data stream is encrypted using one or more encryption algorithms to generate at least one intermediate encrypted data stream. Subsequently, unencrypted portions of the intermediate encoded data streams are merged together with the at least one intermediate encrypted data stream to generate the encoded and encrypted data (E2).

Smartphone-based conditional access system

Techniques for a smartphone-based conditional access (CA) system are described. In some embodiments, a headend in the CA system obtains a security profile associated with a pair of receiving devices used by a user, e.g., a first device (e.g., a smartphone) and a second device (e.g., a set-top-box or a TV). The headend dynamically regulates user access to requested media content during each entitlement period by assigning and distributing separate keys to the first and second device based on the security profile. The headend also uses the distributed keys to protect the media content before broadcasting. On the receiving end, one receiving device receives the media content and determines whether it is decryptable by the device. If decryptable, the receiving device (e.g., the set-top-box/TV) decrypts the media content using the keys assigned by the headend. Otherwise, the receiving device forwards the media content to the pairing device for decryption.

SMARTPHONE-BASED CONDITIONAL ACCESS SYSTEM
20230156274 · 2023-05-18 ·

Techniques for a smartphone-based conditional access (CA) system are described. In some embodiments, a headend in the CA system obtains a security profile associated with a pair of receiving devices used by a user, e.g., a first device (e.g., a smartphone) and a second device (e.g., a set-top-box or a TV). The headend dynamically regulates user access to requested media content during each entitlement period by assigning and distributing separate keys to the first and second device based on the security profile. The headend also uses the distributed keys to protect the media content before broadcasting. On the receiving end, one receiving device receives the media content and determines whether it is decryptable by the device. If decryptable, the receiving device (e.g., the set-top-box/TV) decrypts the media content using the keys assigned by the headend. Otherwise, the receiving device forwards the media content to the pairing device for decryption.

SENSOR DEVICE AND ENCRYPTION METHOD
20220109556 · 2022-04-07 ·

Image encryption in which excessive concealment of information is prevented while reduction in cost is achieved by eliminating a need for a receiving side of an image to take measures against leakage of personal information is realized. In one example, a sensor device includes an array sensor with pixels having a light receiving element of visible or invisible light. A detector detects a target area on the basis of an image signal obtained by the array sensor. The target area in the image signal is encrypted on the basis of information from the detector. Thus, encryption of the image signal can be performed in the image sensor at least to the extent that no individual can be identified. Also, depending on a decryption key on a receiving side of the image, a part of the content of the image can be visually recognized while personal information is concealed.

Streaming image encryption method and computer program, streaming image decryption method and computer program

A method of decrypting a streaming image includes: receiving a packet including at least an item which is encrypted, the item including at least one parameter used for decoding image data included in the streaming image; decrypting the item; and decoding the image data included in the streaming image based on the decrypted item, wherein the image data is not encrypted.

Smartphone-Based Conditional Access System
20210297732 · 2021-09-23 ·

Techniques for a smartphone-based conditional access (CA) system are described. In some embodiments, a headend in the CA system obtains a security profile associated with a pair of receiving devices used by a user, e.g., a first device (e.g., a smartphone) and a second device (e.g., a set-top-box or a TV). The headend dynamically regulates user access to requested media content during each entitlement period by assigning and distributing separate keys to the first and second device based on the security profile. The headend also uses the distributed keys to protect the media content before broadcasting. On the receiving end, one receiving device receives the media content and determines whether it is decryptable by the device. If decryptable, the receiving device (e.g., the set-top-box/TV) decrypts the media content using the keys assigned by the headend. Otherwise, the receiving device forwards the media content to the pairing device for decryption.

Signaling for Picture In Picture In Media Container File and In Streaming Manifest
20240022786 · 2024-01-18 · ·

This disclosure relates to signaling of picture-in-picture (PiP) in media container files and in streaming media manifest. In one aspect, signaling of PiP experience in container files are disclosed, where the PiP experience consists of two or more media tracks. A media track group is used to define a picture-in-picture experience, wherein the main media track or tracks and the substitute/overlay media tracks are defined. The PiP experience is identified with a Role scheme. The media tracks in the PiP can be decoded independently, or if the coding scheme supports, the substitute coded stream can replace the corresponding regions in the main picture stream in a merge mode, for which an order of importance of the substitute picture and the specific regions of the main picture are also signaled. In another aspect, a picture-in-picture experience may be signaled in streaming manifest. Such signaling may include identifying the adaptation sets with a picture-in-picture descriptor as well as using a role descriptor to identify the PiP experience, and further annotating the subpicture in a manifest where one or more subpictures are identified as one or more regions for substitutions.

Smartphone-based conditional access system

Techniques for a smartphone-based conditional access (CA) system are described. In some embodiments, a headend in the CA system obtains a security profile associated with a pair of receiving devices used by a user, e.g., a first device (e.g., a smartphone) and a second device (e.g., a set-top-box or a TV). The headend dynamically regulates user access to requested media content during each entitlement period by assigning and distributing separate keys to the first and second device based on the security profile. The headend also uses the distributed keys to protect the media content before broadcasting. On the receiving end, one receiving device receives the media content and determines whether it is decryptable by the device. If decryptable, the receiving device (e.g., the set-top-box/TV) decrypts the media content using the keys assigned by the headend. Otherwise, the receiving device forwards the media content to the pairing device for decryption.

Reinforced interleaved watermarking

In one embodiment, an apparatus includes a processor to receive a primary video, select first sections of the primary video in which to include units of data for use in watermarking, select second sections of the primary video, each second section including a first data item without which at least one video unit of the primary video cannot be rendered or rendered correctly, replace each first section with at least two watermark variants, replace each second section with at least two watermark variant decoys, wherein the apparatus is operative to operate in an environment including an end-user device operative to select one of the watermark variants for each first section and one of the watermark variant decoys for each second section for rendering as part of an interleaved video stream including the primary video in order to embed units of data of an identification in the interleaved video stream.