H04N7/1675

METHOD AND DEVICE ALLOWING AN ACCESS CONTROL SYSTEM TO BE APPLIED TO THE PROTECTION OF STREAMED VIDEO

Some embodiments are directed to a method and to a device allowing an access control system to be applied to the protection of streamed video. The inventive system and associated method allow an existing access control system of Marlin type to be used innovatively based on the execution of two successive operation phases allowing DRM rights to be acquired followed by the delivery of content and the decryption thereof.

SYSTEM AND METHODS FOR PERMITTING OPEN ACCESS TO DATA OBJECTS AND FOR SECURING DATA WITHIN THE DATA OBJECTS
20170294206 · 2017-10-12 · ·

A system and methods for permitting open access to data objects and for securing data within the data objects is disclosed. According to one embodiment of the present invention, a method for securing a data object is disclosed. According to one embodiment of the present invention, a method for securing a data object is disclosed. The method includes the steps of (1) providing a data object comprising digital data and file format information; (2) embedding independent data into a data object; and (3) scrambling the data object to degrade the data object to a predetermined signal quality level. The steps of embedding and scrambling may be performed until a predetermined condition is met. The method may also include the steps of descrambling the data object to upgrade the data object to a predetermined signal quality level, and decoding the embedded independent data.

DATA TRANSMISSION METHOD AND APPARATUS
20170295029 · 2017-10-12 ·

The present disclosure discloses a data transmission method and apparatus. User equipment (UE) measures and transmits a transmission delay to a group communication service application server (GCS AS), or the GCS AS itself determines a transmission delay, so that the GCS AS may determine, according to the transmission delay, a time of sending a packet on a multicast path or a unicast path. Therefore, a problem of out of order of packets or a loss of a packet due to a transmission delay is resolved, and continuity of a communication service is maintained.

METHODS FOR THE COVERT TRANSMISSION OF DATA
20220053169 · 2022-02-17 ·

A method for determining an identifier of a conditional access card used in a conditional access system, in which the conditional access card autonomously modulates the timing of data packets sent by the conditional access card, to form a timing sequence that corresponds to the identifier of the card. The sequence is generated by a predefined non-linear function stored on the conditional access card, and the predefined non-linear function depends on both the identifier of the conditional access card and a non-linear random sequence that is known to the conditional access card and a monitoring station that receives transmissions from the conditional access card.

Pre-event repository associated with individual privacy and public safety protection via double encrypted lock box

A method substantially as shown and described the detailed description and/or drawings and/or elsewhere herein. A circuitry substantially as shown and described the detailed description and/or drawings and/or elsewhere herein.

Reducing start-up delay in streaming media sessions
09781084 · 2017-10-03 · ·

A method is provided for delivering a streaming media asset to a client device. For the method, a request is received over a communication network from a client device for playing a media asset in accordance with a streaming media technique. Prior to fully authorizing the client device to play the media asset, the client device is provided with access to a first cryptographic key that decrypts a subset of the media asset so that the client device is able to render the subset of the media asset before completion of the authorization. The subset of the media asset is less than all of the media asset. Subsequent to successfully fully authorizing the client device to play the media asset, the client is provided with access to at least one additional cryptographic key that decrypts a remainder of the media asset.

Methods for the covert transmission of data for identification
09749589 · 2017-08-29 ·

A method for determining an identifier of a conditional access card used in a conditional access system, in which the conditional access card autonomously modulates the timing of data packets sent by the conditional access card, according to a sequence that depends on the identifier of the card. The sequence is generated by a predefined non-linear function stored on the conditional access card, and the predefined non-linear function depends on both the identifier of the conditional access card and a non-linear random sequence that is known to the conditional access card and a monitoring station that receives transmissions from the conditional access card.

System and method for distributing software updates

A system includes a control server, a data package server, a home storage device, and a set-top box. The control server is configured to provide information related to a data package. The data package server is configured to provide the data package. The home storage device is configured to receive the data package as a multicast from the data package server. Additionally, the home storage device is configured to store the data package in a storage. The set-top box is configured to receive information related to the data package from the control server and retrieve the data package from the home storage device.

Authoring system for IPTV network

In an embodiment, a system and method permit an IPTV subscriber to display on a channel of an IPTV network video data from a subscriber video database. The system may include, in addition to the IPTV network and the subscriber database, an IPTV server and an IPTV set top box. The IPTV set top box is configured to receive commands causing the IPTV set top box to retrieve video data from an IPTV subscriber database, display the video data on an IPTV display unit; and to transmit the video data over an IPTV network to an IPTV server. The IPTV server is configured to transmit the video data from the IPTV server over the IPTV network such that the video data is displayable on a channel of the IPTV network.

Apparatus for managing members of at least one group of decoders having access to broadcast data
09730057 · 2017-08-08 · ·

A technique to manage members of a group of decoders having access to broadcast data, each group member sharing a common broadcast encryption scheme (BES) comprising the steps of, in a stage for a decoder to become a group member, receiving keys pertaining to the position in the group according to the BES, receiving a current group access data comprising a current group access key, and in a stage of accessing broadcast data, using the current group access data to access the broadcast data, and in a stage of renewing the current group access key, sending a first group message comprising at lease a next group access key encrypted so that only non-revoked decoders can access it, said group message being further encrypted by the current group access key, updating the current group access key with the next group access key.