H04N21/44236

TELEVISION RECEIVER PRIVACY CONTROL
20170339448 · 2017-11-23 ·

Controlling or limiting visibility into particular metadata associated with the transfer of media content from a source device or system to a receiving device or system.

METHOD AND DEVICE FOR ENHANCING THE PROTECTION OF A SIGNAL, IN PARTICULAR A MULTIMEDIA SIGNAL, AGAINST A MALICIOUS ATTACK
20170329941 · 2017-11-16 · ·

A signal is protected against an attack by an enhancement process that checks the conformity of an actual state of the signal with respect to an expected state. A protective action is exercised on the signal if the actual state of the signal is not in conformity with the expected state, so as to neutralize or nullify said attack.

Securely paired delivery of activation codes between removable and integrated security processors

Described herein are systems and methods for hardware enforcement of hardware functionality in a television receiver. An activation message containing an activation code for a specific hardware component within the television receiver can be transmitted from a television service provider system to a television receiver having an associated smart card. The smart card can decrypt the activation message, security check the activation message, confirm the activation message is intended for the television receiver, encrypt the activation message with a local key, and transmit the activation message to a security processor on the television receiver. The security processor can decrypt the activation message, security check the activation message to ensure it is from the smart card and has not been tampered with, and enable the hardware component within the television receiver based on the activation code within the activation message.

TRACING PIRACY OF LIVE BROADCASTS
20170251254 · 2017-08-31 ·

Methods, devices, systems and computer program products enable generation, distribution and management of live broadcast content in such a way so as to allow identification of a pirate device or subscriber quickly and efficiently. Content is divided into content blocks, where each content block is divided into content units. Each of the content units is selectable from n variations of the content unit and a majority of ail possible combinations of content unit variations are permissible to be selected for production of the uniquely identifiable content. The content blocks, including the n variations of the content units, a media block key, and at least one device key is delivered to an authorized device. A particular pattern of content units is generated that identifies which of the n content unit variations must be used by the authorized device for constructing each content block.

System and method for monitoring and managing video stream content

A system and method for managing and monitoring video stream content. The method including: receiving a traffic flow; determining if the traffic flow is a video streaming traffic flow; if the traffic flow is a video streaming traffic flow; determine at least one attribute associated with the video streaming traffic flow; determine a probability that the traffic flow is fraudulent based on a heuristic analysis of the at least one associated attribute; if the probability is above a predetermined threshold, flag the traffic flow as a fraudulent video streaming traffic flow, otherwise allow the traffic flow to proceed to its destination without being flagged; if the traffic flow is not a video streaming traffic flow, allow the traffic flow to proceed to its destination.

Method and electronic device for controlling content integrity using numerical data
09729815 · 2017-08-08 · ·

A method and an apparatus for controlling content integrity. A method for operating in an electronic device can include including unique information of content in a watermark image, and inserting the watermark image to the content.

System, method, and infrastructure for real-time live streaming content

Implementations of the system and method use an existing management server infrastructure to deliver video-on-demand or streaming content, including real-time live streaming. Existing client content playback devices, such as IPTVs, may be employed to stream content items, obtain advertisements, track user's viewing behaviors, and the like. By reusing existing client devices, there is no need for additional hardware purchases on the user side. By reusing existing management server infrastructures, capital expenses are also reduced. In such a system, a user can watch both video-on-demand and streaming audiovisual content.

Defensive routing and related techniques

Techniques are disclosed for defensive routing of guard wires for security-critical wires in an integrated circuit (IC). Defensive routing provides a routing-centric and preventive layout-level defense against IC fabrication time attacks against security-critical wires within an IC. An example methodology implementing the techniques includes identifying at least one security-critical wire in an IC design, identifying at least one unblocked surface of the identified at least one security-critical wire, and guarding the identified at least one surface of the identified at least one security-critical wire with a guard wire. In one example, the guard wire may be a natural guard wire. In another example, the guard wire may be a synthetic guard wire.

System and method for monitoring and managing video stream content

A system and method for managing and monitoring video stream content. The method including: receiving a traffic flow; determining if the traffic flow is a video streaming traffic flow; if the traffic flow is a video streaming traffic flow; determine at least one attribute associated with the video streaming traffic flow; determine a probability that the traffic flow is fraudulent based on a heuristic analysis of the at least one associated attribute; if the probability is above a predetermined threshold, flag the traffic flow as a fraudulent video streaming traffic flow, otherwise allow the traffic flow to proceed to its destination without being flagged; if the traffic flow is not a video streaming traffic flow, allow the traffic flow to proceed to its destination.

SYSTEMS AND METHODS FOR DETECTING A MIMICKED VOICE INPUT SIGNAL

Methods and systems are disclosed herein for training a network to detect mimicked voice input, so that it can be determined whether a voice input signal is a mimicked voice signal. First voice data is received. The first voice data comprises at least a voice signal of a first individual and another voice signal. The voice signal of the first individual and at least one other voice signal is combined to create a composite voice signal. Second voice data is received. The second voice data comprises at least a voice signal of the first individual. The network is trained using at least the composite voice signal and the second voice data to determine whether a voice input signal is a mimicked voice input signal.