H04N7/1675

SURVEILLANCE CAMERA SYSTEM
20230050027 · 2023-02-16 · ·

A method, performed by an image processing device, of encrypting image data includes: selecting an encryption target unit from among a plurality units constituting an image; generating a table including identification information about the encryption target unit; generating a first encryption unit including data obtained by encrypting the encryption target unit; generating a second encryption unit including data obtained by encrypting the table; and generating a bitstream including the first encryption unit, the second encryption unit, and units other than the encryption target unit among the plurality of units constituting the image.

STREAMING PIRACY DETECTION METHOD AND SYSTEM
20180014089 · 2018-01-11 ·

In one embodiment, a command is received from a video provider at a media rendering device, the command being a command to embed a subscriber ID in at least one video frame in a video stream. A random key, k is also received from the video provider at the media rendering device. An injective transformation is invoked for k and the subscriber ID, the injective transformation generating a sequence of pairs of: near-transparent patterns and corresponding time periods. Logical blocks of the at least one video frame in the video stream are overlaid with one of the near-transparent patterns for its one of the corresponding time periods. Related apparatus, systems, and methods are also described.

Encryption method, decryption method, encryption system and decryption system

An encryption method includes an operation method of an encryption system and is a method of encrypting encryption target information.

Video output controlling apparatus and video output controlling method

A video output controlling apparatus and a video output controlling method that can reduce the possibility that a video for which encryption is required may be outputted in a non-encrypted state are provided. A first acceptance unit (40) accepts a video and an encryption necessity signal indicative of whether or not encryption of the video is required via a first route. A second acceptance unit (44) accept a control signal via a second route different from the first route. A video conversion unit (46) converts, in accordance with the control signal, the video accepted by the first acceptance unit (40) into one of a video that is different in a format from that of the video and is in an encrypted state and a video that is different in a format from that of the video and is not in an encrypted state. An output controlling unit (48) performs control regarding whether or not the video is to be outputted based on the encryption necessity signal and whether or not the video after conversion by the video conversion unit (46) is in an encrypted state.

SECURE PROVISIONING, BY A CLIENT DEVICE, CRYPTOGRAPHIC KEYS FOR EXPLOITING SERVICES PROVIDED BY AN OPERATOR
20230033476 · 2023-02-02 · ·

A method for securely receiving a multimedia content by a client device operated by one or more operator(s) involving a dedicated provisioning server of a security provider managing symmetric secrets used by the client devices and operators license servers. The provisioning server provides to the client device one or more generations of operator specific unique device secrets, which are then exploited by the various operators' license servers to deliver licenses such that authorized client devices can consume protected multimedia contents.

Methods, Systems, and Devices for Detecting Over-the-Top Piracy

Techniques for detection over-the-top piracy are described. In some embodiments, a piracy detection method is performed at a server by a piracy detector. The piracy detector obtains records associated with requests for access from a plurality of client devices. The piracy detector further distributes the records to a plurality of nodes according to distribution keys extracted from the records, where each of the plurality of nodes receives a respective set of records associated with a respective distribution key and generates a set of respective watch session records based on the respective set of records. The piracy detector also generates watch session records associated with the distribution keys by aggregating the respective watch session records from the plurality of nodes. The piracy detector additionally identifies one or more pirated client devices among the plurality of client devices based on clusters established from the watch session records.

Fine grain rights management of streaming content
11627119 · 2023-04-11 · ·

The present invention provides methods, apparatuses, and systems for delivering protected streaming content to a receiving device. In an aspect of the present invention, a broadcaster provides streaming content. To ensure viewers are properly authorized, the streaming content is encrypted with a traffic key. The traffic key is provided to the users via a key stream message, which is encrypted with a service key. The user obtains at least one rights object from a rights issuers and the at least one rights object includes the service key so that the streaming content may be used. The at least one rights object also contains information regarding usage rights that may be configured by the rights issuer so that, depending on the user and/or the receiving device, different rights may be available. The key stream message may include a program category variable value that indicates the type of content and in conjunction with the rights object, determines what usage rights exist for the streaming content.

Encryption and decryption of media data

The embodiments herein relate to encryption and decryption of media data transmitted between an Unmanned Aerial Vehicle (UAV) and a ground controlling base, when recording and playing back the media data by combining symmetric and asymmetric cryptography.

SINGLE PASS PARALLEL ENCRYPTION METHOD AND APPARATUS

Apparatuses, methods and storage medium associated with single pass parallel encryption are disclosed herein. In embodiments, an apparatus for computing may comprise an encryption engine to encrypt a video stream. The encryption engine may comprise a plurality of encryption pipelines to respectively encrypt a plurality of video sub-streams partitioned from the video stream in parallel in a single pass as the video sub-streams are being generated. The plurality of encryption pipelines may use a corresponding plurality of multi-part encryption counters to encrypt the corresponding video sub-streams as the video sub-streams are being generated. Each of the multi-part encryption counters used by one of the encryption pipelines may comprise a sub-portion that remains constant while encoding the corresponding video sub-stream, but the sub-key is unique for the one encryption pipeline, and differs from corresponding sub-portions of the multi-part encryption counters used by the other encryption pipelines. Other embodiments may be disclosed or claimed.

METHOD AND APPARATUS FOR SUPPORTING MULTIPLE BROADCASTERS INDEPENDENTLY USING A SINGLE CONDITIONAL ACCESS SYSTEM

A method and apparatus for brokering the enablement of the communication of encrypted media programs from a plurality of independent broadcasters to a plurality of receivers is disclosed. The system makes use of a pairing key for each provided service, which is differently encrypted by a pairing server and by the broadcaster providing the service. The encrypted versions of the pairing key are decrypted in a first receiver module using information known to the pairing service but not the broadcaster and in a second receiver module using information known to the broadcaster. The pairing key is used to cryptographically bind the first and second receiver modules.