Patent classifications
H04N21/44236
METHOD OF IDENTIFYING AN ABRIDGED VERSION OF A VIDEO
A computer-implemented method of identifying whether a target video comprises an abridged version of a reference video includes evaluating condition a) that the target video does not comprise all shots of the reference video; condition b) that the target video includes groups of consecutive shots also included in the reference video; and condition c) that all shots which are present in both the target video and the reference video are in the same order. The method further includes identifying whether the target video comprises an abridged version of the reference video; and outputting a result of the identifying. The target video is identified as comprising an abridged version of the reference video on condition that conditions a), b) and c) are met. Also provided is a data processing apparatus for performing the method; and a computer program and computer readable storage medium comprising instructions to perform the method.
Methods and apparatus to identify media based on watermarks across different audio streams and/or different watermarking techniques
Example apparatus disclosed herein are to detect a first watermark embedded in an audio stream associated with media, the first watermark embedded and detected based on a first watermarking technique; and detect a second watermark embedded in the audio stream, the second watermark embedded and detected based on a second watermarking technique. Disclosed example apparatus are also to assign the first watermark to a first monitoring track and to a second monitoring track, the first monitoring track limited to watermarks embedded in the audio stream based on the first watermarking technique, the second monitoring track limited to watermarks embedded in the audio stream based on any of the first or second watermarking techniques; group the first and second watermarks to form a media detection event when the second watermark is assigned to the second monitoring track; and cause transmission of the media detection event to a data collection facility.
THREAT CONTROL AND PREVENTION FOR ANDROID SYSTEMS
A method is provided that determines whether to allow an application (app) for use or restrict the app on a set top box (STB). The method includes the steps of measuring at the STB, one or more resources used by the app; comparing at the STB, one or more thresholds set by an operator; and determining if the one or more resources used by the app exceed one or more thresholds set by the operator. Another method is provided that monitors applications (apps) that are installed a set top box (STB) for illegal or harmful activity by a policy manager. This method includes downloading and copying an app from an external source; installing or uninstalling the app into an application folder; providing a notification informing the policy manager of the installing or uninstalling of the app; and evaluating the app be installed or uninstalled.
SYSTEM AND METHOD FOR FACILITATING A VIRTUAL SCREENING
A system for facilitating a virtual screening is disclosed. The system identifies a user for participating in a virtual screening of media content. The system generates a unique link for the user to facilitate access to the media content. When the user interacts with the link, the system prompts the user to authenticate with the system and determines whether the authentication was successful. If authentication is successful, the link is associated with an identifier of the user and/or a user device. A request for a key for decrypting the media content and a request for a digitally signed file accessing the media content pursuant to parameters are made. If the digitally signed file is valid, the system applies a watermark to the media content to track the use of the media content and streams the media content to the user. Feedback on the media content is obtained from the user.
COGNITIVE COMPUTER CONTROLLED DISPLAY OF DIGITAL CONTENT TO AVOID UNWANTED DISPLAY CAPTURE
A computer presents digital content securely. The computer identifies a display device presenting digital content to an observation zone. The computer receives a feed from a sensor monitoring the observation zone. The computer identifies content of the feed using a convolutional neural network (CNN). The computer, upon detecting a trigger condition associated with said observation zone in response the identification by the CNN, takes at least one substantially-contemporaneous remedial action.
Methods, Systems, and Devices for Detecting Over-the-Top Piracy
Techniques for detection over-the-top piracy are described. In some embodiments, a piracy detection method is performed at a server by a piracy detector. The piracy detector obtains records associated with requests for access from a plurality of client devices. The piracy detector further distributes the records to a plurality of nodes according to distribution keys extracted from the records, where each of the plurality of nodes receives a respective set of records associated with a respective distribution key and generates a set of respective watch session records based on the respective set of records. The piracy detector also generates watch session records associated with the distribution keys by aggregating the respective watch session records from the plurality of nodes. The piracy detector additionally identifies one or more pirated client devices among the plurality of client devices based on clusters established from the watch session records.
IN-BAND METADATA FOR AUTHENTICITY AND ROLE-BASED ACCESS IN ENTERPRISE VIDEO STREAMING SERVICES
In various embodiments, a device receives a video stream. One or more frames of the video stream include embedded metadata that is embedded directly into the one or more frames. The device extracts the embedded metadata from the one or more frames. The device makes an authentication determination regarding the video stream, based on whether the embedded metadata includes a digital signature associated with a sender of the video stream. The device controls, based on the authentication determination, presentation of the video stream to a recipient user.
Automated piracy detection
Motion pictures or other digital media content can be encoded with visible, yet obscured, digital codes that can be optically detected by a camera or other automated image processing device. If a code is recognized in captured media content, further capture, playback and/or distribution can be halted, as desired. Because the code is visible (albeit hidden) in the digital imagery itself, capture by another camera or other optical device will not typically negate the usefulness of the code. That is, the code is visibly present within the imagery itself, so subsequent capture of the video imagery will also capture the code, thereby allowing for detection and/or prevention.
Threat control and prevention for android systems
A method is provided that determines whether to allow an application (app) for use or restrict the app on a set top box (STB). The method includes the steps of measuring at the STB, one or more resources used by the app; comparing at the STB, one or more thresholds set by an operator; and determining if the one or more resources used by the app exceed one or more thresholds set by the operator. Another method is provided that monitors applications (apps) that are installed a set top box (STB) for illegal or harmful activity by a policy manager. This method includes downloading and copying an app from an external source; installing or uninstalling the app into an application folder; providing a notification informing the policy manager of the installing or uninstalling of the app; and evaluating the app be installed or uninstalled.
SYSTEMS AND METHODS FOR GENERATING BOOKMARK VIDEO FINGERPRINTS
Systems and methods for replacing original media bookmarks of at least a portion of a digital media file with replacement bookmarks is described. A media fingerprint engine detects the location of the original fingerprints associated with the portion of the digital media file and a region analysis algorithm characterizes regions of media file spanning the location of the original bookmarks by data class types. The replacement bookmarks are associated with the data class types and are overwritten or otherwise are substituted for the original bookmarks. The replacement bookmarks then are subjected to a fingerprint matching algorithm that incorporates media timeline and media related metadata.