Inventors list

Assignees list

Classification tree browser

Top 100 Inventors

Top 100 Assignees


VIDEO CRYPTOGRAPHY

Subclass of:

380 - Cryptography

Patent class list (only not empty are listed)

Deeper subclasses:

Class / Patent application numberDescriptionNumber of patent applications / Date published
380210000 Video electric signal modification (e.g., scrambling) 177
380201000 Copy protection or prevention 60
380205000 Video electric signal masking 12
Entries
DocumentTitleDate
20080260148Encryption Processor - One chip encryption processor is disclosed, in which a password process unit for processing a data encryption and an interface for managing a password needed for an encryption are integrated into one chip. The encryption processor includes an encryption interface for connecting an externally connected apparatus and an internal data process apparatus, a password process unit for encrypting the inputted data, a memory unit for temporarily storing the data. The above elements are integrated into one chip, so that a desired data security, non-error operation and stable user verification are obtained.10-23-2008
20130028416SYSTEM AND METHOD FOR MEDIA TRANSCODING AND PRESENTATION - A method and apparatus for presenting a media data stream complying with a broadcast encryption standard is disclosed. A dongle is removably coupleable to a rendering device, with the dongle performing transcoding so as to allow presentation of the media in a secure manner without modification of the rendering device software or hardware.01-31-2013
20130083922VIDEO RECEIVING APPARATUS AND VIDEO RECEIVING METHOD - According to one embodiment, a video receiving apparatus includes: a receiving module for receiving identifiers of respective video transmitting apparatus and key information to be used for permitting a wireless communication with the video receiving apparatus; a connecting module for establishing a wireless connection with each video transmitting apparatus; a registering module for registering all or part of the one or more video transmitting apparatus; a first display control module for displaying identification information of the one or more video transmitting apparatus, selection images, registration information indicating whether or not the one or more video transmitting apparatus are registered, and connection information indicating whether or not wireless connections are established on a display screen; a video receiving module for receiving video from the specified video transmitting apparatus using the established wireless connection; and a second display control module for displaying the received video on the display screen.04-04-2013
20120183137Augmented Collaboration System - A method and apparatus for displaying information. A camera system generates video data for an object from a viewpoint of the camera system at a location of the object. Information is identified about the object. The information is displayed on images in the video data on a display system at a number of locations. The display of the images with the information on the images in the video data at the number of locations is from the viewpoint of the camera system.07-19-2012
20130070922TECHNIQUE FOR SECURELY COMMUNICATING AND STORING PROGRAMMING MATERIAL IN A TRUSTED DOMAIN - A “trusted domain” is established within which content received from a communications network, e.g., a cable TV network, is protected from unauthorized copying thereof, in accordance with the invention. In an illustrative embodiment, the trusted domain includes a device associated with a user which receives content from the cable TV network. The content may be encrypted using a content key in accordance, e.g., with a 3DES encryption algorithm before it is stored in the device. In addition, a first encrypted content key version and a second encrypted content key version are generated by respectively encrypting the content key with a public key associated with the device and another public key associated with the user, in accordance with public key cryptography. The first and second encrypted content key versions are stored in association with the encrypted content in the device storage. The encrypted content can be migrated from a first device to a second device, and can be decrypted in the second device in the second device is associated with the same user, and also provided with the second encrypted content key version.03-21-2013
20130058480SYSTEMS AND METHODS FOR SAVING ENCODED MEDIA STREAMED USING ADAPTIVE BITRATE STREAMING - Systems and methods for saving encoded media streamed using adaptive bitrate streaming in accordance with embodiments of the invention are disclosed. In one embodiment of the invention, a playback device configured to perform adaptive bitrate streaming of media includes a video decoder application and a processor, where the video decoder application configures the processor to select a download stream from a set of alternative streams of video data, measure streaming conditions and request a stream of video data from the alternative streams of video data, receive portions of video data from the requested stream of video data, decode the received video data, save the received video data to memory, when the received video data is from the download stream and separately download and save the corresponding portion of video data from the download stream to memory, when the received video data is not from the download stream.03-07-2013
20090268906Method and System for Authorized Decryption of Encrypted Data - The present invention relates to a method and a system for authorized decryption of encrypted data. First, the encrypted data is provided. Then the validity of at least two certificates is verified. If the validity check is positive, a key is provided, which can be used to decrypt the encrypted data.10-29-2009
20090268905ELECTRONIC DEVICE, CONTENT REPRODUCTION CONTROL METHOD, PROGRAM, STORAGE MEDIUM, AND INTEGRATED CIRCUIT - In order to play back a content while managing the right on use of the content, such as a total time of playback of the content, an electronic device stores right information in a right temporary storage unit 10-29-2009
20130163756VISUAL UNIVERSAL DECRYPTION APPARATUS AND METHODS - Disclosed is a virtual universal decryption (VUD) service that provides a mechanism for allowing users of camera enabled mobile devices to use their camera to decrypt messages. The VUD service can provide a mechanism for a user of a VUD enabled device to authorize one or more other users of VUD enabled and camera enabled devices to use their cameras to decrypt messages sent by the authorizing user. The VUD service may then provide mechanisms for the authorized users to decrypt messages, which have been encrypted by the authorizing users, by simply capturing an image/video of the encrypted text with a camera of their VUD enabled devices.06-27-2013
20090046855Method and apparatus for caching access information for faster digital cable tuning - A method and apparatus is presented for providing faster tuning of a digital television channel. Specifically, the present invention is directed to a digital television receiver including a tuner, at least one demodulator, a detachable security module such as a point of deployment (POD) module, a transport demultiplexer, and a microprocessor having a cache or memory device for storing “conditional access program map table” (CA_PMT) information. The cache or memory device is used to store the CA_PMT for each channel, so that upon a channel change requested by a user, the receiver may extract the stored CA_PMT from the cache rather than wait for the full program map table (PMT) to be transmitted by the broadcaster (see FIG. 02-19-2009
20090010429APPARATUS AND METHOD FOR TRANSMITTING AND RECEIVING VIDEO DATA IN DIGITAL BROADCASTING SERVICE - A method and apparatus for transmitting and receiving video data in a digital broadcast are provided. The digital broadcast transmitting method includes encrypting selected frames of video data into digital broadcast data, and transmitting the digital broadcast data. The digital broadcast receiving method includes receiving video data in a digital broadcast, decrypting encrypted frames of the received video data, and decoding the encrypted frames of the received video data and reproducing the decoded video data.01-08-2009
20120237027MULTIPLE STREAM DECRYPTING AND DECODING SYSTEMS AND RELATED METHODS THEREOF - A method for setting the bandwidth of a multiple stream decrypting and decoding system includes at least the following steps: authenticating a multiple transport stream decryption card; sending a transport stream through the system; extracting program information from the transport stream; utilizing the program information to set a bandwidth limit to the system; and enabling the multiple transport stream decryption card.09-20-2012
20120237026DATA STRUCTURE OF MULTIMEDIA FILE FORMAT, ENCRYPTING METHOD AND DEVICE THEREOF, AND DECRYPTING METHOD AND DEVICE THEREOF - In a data structure of a multimedia file format, a movie box and a media data box are provided. In each box, a non-encrypted size field, a non-encrypted type field and box data field are provided. In box data of the movie box, information data regarding multimedia data is stored. The multimedia data is encrypted and stored in box data of the media data box. The information data is obtained by referring to the container in the movie box. This information data is held as encryption and encoding information data. By referring to the information data, a data unit of the encrypted multimedia data in the media data box is obtained, and the unit data is decrypted.09-20-2012
20100014665REMANUFACTURE OF ENCRYPTED CONTENT USING A REPLICATED MEDIUM - Embodiments of the invention provide a method for creating a source for remanufacture of encrypted content using a replicated medium. A content encrypting engine obtains a first set of meta data from a multimedia content and stores the first set of meta data in a database. A content encrypting engine obtains a second set of meta data from a signed encrypted version of the multimedia content, and stores the second set of meta data in the database. An encrypted replica duplication engine then extracts encrypted data from a first replicated medium, and combines the encrypted data with the first set of meta data and the second set of meta data. Advantageously, embodiments of the invention allow a manufacturer or replication facility to use a replica disc, which is inexpensive and abundant, as a data archive for source material.01-21-2010
20100278338CODING DEVICE AND METHOD WITH RECONFIGURABLE AND SCALABLE ENCRYPTION/DECRYPTION MODULES - A reconfigurable and scalable cryptography (encryption/decryption) system architecture and related method are described. The system utilizes a multiple-pass approach, each pass applying one cryptography algorithm with its own cryptography keys. The encrypted data can only be fully and correctly decrypted with the correct algorithms in the correct sequence (as determined by one or more security level parameters) and the correct cryptography keys. The system includes a multiple cryptography algorithm set section which is reconfigurable to perform multiple cryptography algorithms sequentially, and a cryptography controller which receives an input key set and a security level parameter. The cryptography controller reconfigures the multiple cryptography algorithm set section based on the security level parameter to perform multiple selected cryptography algorithms in a selected sequence. The cryptography controller also generates cryptography keys based on the input key set and provide the cryptography keys to the multiple cryptography algorithm set section.11-04-2010
20110299680Methods and Apparatuses for Securing Playback Content - An apparatus for secured playback is presented. In one embodiment, the apparatus includes a controller that includes a key derivation module to manage authentication and key derivation. In one embodiment, the apparatus provides a video decryption key to a graphics engine if video data portions in a data stream are retrievable without having to decrypt the data stream. In one embodiment, the apparatus also includes a decryption module to decrypt a part of data in conjunction with an encryption key to generate video information and video data. The controller then writes an encrypted version of the video data to a video buffer of a graphics engine.12-08-2011
20090161867METHOD AND SYSTEM FOR AUTHENTICATING A USER RECEIVING DEVICE INTO A PRIMARY SERVICE PROVIDER SYSTEM TO COMMUNICATE WITH A PARTNER SERVICE PROVIDER - A method and system for authenticating a user receiving device to communicate with a partner service device includes a primary service provider. A user receiving device generates a request for a first encrypted token. The user receiving device communicates the request for the first encrypted token to an authentication web service of the primary service provider. The authentication web service generates the first encrypted token. The primary service provider communicates the first encrypted token to the user receiving device. The user receiving device communicates the first encrypted token to the partner service provider. The partner service provider communicates data to the user receiving device after receiving the first encrypted token.06-25-2009
20110013772Method and Apparatus for Fast Switching Between Source Multimedia Devices - A multimedia sink apparatus and method thereof, for fast switching between a plurality of source multimedia devices. The apparatus comprises a plurality of input ports, each of the plurality of input ports is connected to a source multimedia device through a high bandwidth multimedia interface; and a plurality of high-bandwidth digital content protection (HDCP) receivers, each of the plurality of the HDCP receivers is connected to an input port, wherein each of the plurality of the HDCP receivers is adapted to perform a first authentication part of a HDCP authentication process, and upon reception of an indication that a respective source device connected to the respective input was selected, to perform a third authentication part of the HDCP authentication process.01-20-2011
20110150215FAST SWITCHING BETWEEN DIGITAL VIDEO SOURCES - A sink may be to used to process multimedia digital data. The sink may include a plurality of input ports, an output port, a switchably-enabled selector to select an input port from a plurality of HDMI input ports to couple to an output port, a control circuit to detect encrypted data in a channel of the input ports; and a plurality of decryption engines. Each of the decryption engines may be coupled to respective input ports to synchronize with a corresponding encryption engine of a data source after the control circuit detects encrypted data in the channel of the respective input port. Additional circuitry may be included to operate the sink in a power saving mode. Also, methods for processing the data in both power saving and non-power saving modes.06-23-2011
20080267397DATA SURVEY DEVICE, INTEGRATED WITH A COMMUNICATION SYSTEM, AND RELATED METHOD10-30-2008
20110170687CONTENT DECODING APPARATUS, CONTENT DECODING METHOD AND INTEGRATED CIRCUIT - The content decrypting apparatus 07-14-2011
20090290709HARDWARE-BASED OUTPUT PROTECTION OF MULTIPLE VIDEO STREAMS - Computer-readable media, computerized methods, and computer systems for managing dynamic allocation of one or more protected memory segments for storing content of secure data are provided. Initially, the secure data is recognized as being carried by a media stream being communicated from a media-reading device. One or more protected target segments and protected target segments are instantiated, where these protected memory segments are protected from illicit access by hardware-based rules. Regions of hardware memory are dynamically allocated to hold these protected memory segments and the secure data is iteratively written thereto. The protected source segments are associating with the media stream based on a license attached thereto, while the protected target segments are associating with presentation devices based on a standard of output protection supported thereby. Accordingly, the protected source segments are mapped to the protected target segments according to whether the license encompasses the standard of the output protection.11-26-2009
20080247541METHODS AND APPARATUS FOR CONNECTING A CABLE NETWORK TO OTHER NETWORK AND/OR DEVICES - Methods and apparatus for connecting, e.g., bridging, a cable network to other networks and/or devices is described. A bridge device facilitates the distribution of cable provider content to end users operating IP based devices. The bridge device performs one of more of the following: interface protocol conversions, user device controlled tuner selection, transcoding of data, transrating of a data stream, decryption in accordance with a conditional access protocol and re-encryption in accordance with an authorized service domain protocol.10-09-2008
20100135488SVC ENCRYPTION APPARATUS AND METHOD AND CONTENTS PROVIDING SYSTEM AND METHOD - An SVC encryption apparatus includes: an encoding/encryption unit for performing SVC (Scalable Video Coding) encoding on input data contents and carrying out encryption for data in accordance with a first encryption condition to generate a corresponding SVC bitstream; and a NAL (Network Adaptation Layer) data analysis unit for analyzing NAL data of the generated SVC bitstream to find out NAL data satisfying a second encryption condition. Further, the SVC encryption apparatus includes a conditional NAL data encryption unit for encrypting the extracted NAL data in accordance with the second encryption condition; and a bitstream transmitting unit for transmitting the SVC bitstream with encrypted NAL data.06-03-2010
20100278337Encryption-Based Location Masking - The subject matter disclosed herein provides methods and apparatus, including computer program products, for masking locations, such as uniform resource locators. In one aspect, there is provided a computer-implemented method. The method may include receiving one or more blocks; inserting one or more characters into at least one of the blocks to fill the block to a predetermined block size; and encrypting the one or more blocks, the encryption of the first block using an initialization vector that does not result in a shift of the first block when processed. Related apparatus, systems, methods, and articles are also described.11-04-2010
20080205642IMAGE CAPTURE APPARATUS - An image capture apparatus captures an image, and performs an authentication process with an external device. The image capture apparatus encrypts a captured image to generate an encrypted image if the authentication unit succeeds in performing the authentication process, and stores the encrypted image in a recording medium. The image capture apparatus displays whether the authentication unit succeeded in performing the authentication process, and whether the external device includes key information used in encrypting the captured image.08-28-2008
20080212773Parallel data stream decryption device - A parallel data stream decryption device which allows a user to decrypt radar video data obtained from a missile seeker which was encrypted while in a parallel data format. The decryption device has a computer program which decryptes the radar video data contained in an encrypted data file and creates a decrypted binary data file. The computer software then extracts data from the decrypted binary data file and converts the extracted data to an ASCII text file.09-04-2008
20080267398METHOD AND APPARATUS FOR ASSISTING WITH CONTENT KEY CHANGES - A process may be utilized by the DVR. The process receives a plurality of segments of a set of content and a plurality of corresponding content rule sets. Further, the process provides one or more instructions to record and encrypt the plurality of segments of the set of content on a storage medium. In addition, the process provides the plurality of content rule sets to the DRM component to be inserted into a locally generated and secured content license associated with the encryption of the set of content. The secured content license includes a master key and a list of the plurality of corresponding content rule sets that have been received in order of reception. The process receives a plurality of marker tokens from the DRM component in order to facilitate trick mode playback.10-30-2008
20090180612Authentication Method Employing Elliptic Curve Cryptography - Disclosed is an authentication method employing elliptic curve cryptography (ECC), applicable to a mobile broadcast TV system having one or more head end systems, at least a transmitter, and at least a mobile set. The authentication method comprises at least one request message from mobile sets simultaneously or in a short period of time arriving at a head end system for authentication; manipulating each broadcast authentication message by ECC; manipulating each service request message by ECC and pairing operation; performing a mutual authentication between the head end system and mobile sets by ECC and pairing operation; and broadcasting one group of authentication messages to all the mobile sets of many requests arrived at the head end system simultaneously or in a short period of time for the same service.07-16-2009
20090285391Communicating media content from a DVR to a portable device - In a method for communicating media content stored on a digital video recorder (DVR) protected by a first DRM system to a portable multimedia device (PMD) using a second DRM system, in which the first DRM system differs from the second DRM system, a request for communication of a media content item stored on the DVR to the PMD is received. In addition, a portable content key is employed to encrypt the media content item to a PMD format suitable content version and the encrypted PMD format suitable content version is communicated to the PMD along with a portable content identifier (ID).11-19-2009
20090052667NEAR FIELD REGISTRATION OF HOME SYSTEM AUDIO-VIDEO DEVICE - A near field communication (NFC) sticker which stores a key is attached to a new client device. A remote commander in a home network reads the key using a NFC interface and IR-transmits it to a home network server. Once the client is connected to the network, it encrypts its own device information with the key and sends the encrypted information to the server, which decrypts the data with the key sent from the remote commander. In this way, client device registration is executed easily and securely.02-26-2009
20090097643Security and transcoding system for transfer of content to portable devices - A system for passing content data from a subscription service to a portable media device is provided. The system has a set-top box for receiving the content data from the subscription service. A data storage device is operatively connected with the set-top box. A preprocessor is operatively connected to the data storage device. It applies encryption to the content data and has an output to the portable media device.04-16-2009
20090097644PLAYBACK APPARATUS AND PLAYBACK CONTROL METHOD - According to one embodiment, there is provided a playback apparatus which plays back content including an encrypted video object and an encrypted resource file, including a memory including a file cache area, a module configured to decrypt the video object, a playback process module configured to play back the decrypted video object and to output a resource file acquisition request, a module configured to determine whether the resource file is decrypted, to decrypt the resource file, to write the decrypted resource file over the encrypted resource file, to update the management information, and to send the decrypted resource file to the playback process module, and a module configured to determine whether the resource file is decrypted, to encrypt the decrypted resource file, to write the encrypted resource file over the decrypted resource file, to update the management information, and to send the encrypted resource file to the storage.04-16-2009
20090252324METHOD AND APPARATUS FOR PROVIDING BROADCAST SERVICE USING ENCRYPTION KEY IN A COMMUNICATION SYSTEM - A method and apparatus for providing a broadcast service in a communication system is provided. The method includes creating a seed key pair including a first key and a second key, transmitting the seed key pair to a terminal to which the broadcast service is to be provided, creating a certain number of encryption keys using the seed key pair, the certain number corresponding to a lifetime of the seed key pair, encrypting broadcast service data for the lifetime using the encryption keys, and broadcasting the encrypted broadcast service data.10-08-2009
20120195425SECURITY VIDEO TRANSMISSION APPARATUS, VIDEO DATA RECEPTION APPARATUS, AND KEY GENERATION METHOD THEREOF - There is provided a security video transmission apparatus for generating and updating an encryption key by using video data, having a property of a random number which is continuously generated in real time, as random number data in order to generate a key, encrypting the video data using the encryption key, and then transmitting the encrypted video data.08-02-2012
20100177891Digital video protection for authenticity verification - A method and apparatus for verifying the authenticity and integrity of an ordered sequence of digital video frames, without having access to the original recording, by embedding therein a respective series of digital signatures based on a secret key, or keys, and on the video content of respective frames. Signatures are camouflaged by embedding in transform coefficients of a transformed representation of the video data in parts of the frame corresponding to motion. If there is sufficient motion to contain all of the signature bits, a supplementary technique embeds in high-texture areas of a frame. A final fall-back is to embed in a pre-defined default zone. A method of predicting when supplementary embedding is needed enables the process to be applied in a single pass allowing real-time operation. Verification is done during decoding by comparing, for identity, embedded signatures with signatures calculated anew using the method employed to embed.07-15-2010
20120140924VIDEO INPUT DEVICE AND VIDEO DISPLAY SYSTEM - An input processing circuit decodes a digital video signal selected by an input signal selector. Decryption circuits each decrypt the encryption of a video signal output from the input processing circuit, and generate an authentication key of the encryption. A video signal selector selects and outputs one of the video signals output from the decryption circuits, to a monitor. The decryption circuits each include a pseudo-signal generation circuit which extracts information from the video signal, and based on the extracted information, generates a pseudo-video signal.06-07-2012
20100098250MOVIE BASED FORENSIC DATA FOR DIGITAL CINEMA - A method and apparatus are described for embedding information in digital cinema content, including accepting a scene from a digital cinema content file, selecting a scene object in the scene to be modified with the information, determining a characteristic for the selected scene object and generating a scene build based on the characteristic, wherein the characteristic is representative of the information. The method and apparatus further include time-stamping, compressing and storing the scene build. Further, a method and apparatus are described for embedding forensic information in digital cinema content, accepting a digital cinema content file having therein a plurality of scene builds, accepting a forensic code and selecting a scene build from the digital cinema content file based on the forensic code. The scene build, having forensic information, is thereafter displayed.04-22-2010
20080273698Device for and a Method of Processing a Data Stream Having a Sequence of Packets and Timing Information Related to the Packets11-06-2008
20090110194VISUAL UNIVERSAL DECRYPTION APPARATUS AND METHODS - Disclosed is a virtual universal decryption (VUD) service that provides a mechanism for allowing users of camera enabled mobile devices to use their camera to decrypt messages. The VUD service can provide a mechanism for a user of a VUD enabled device to authorize one or more other users of VUD enabled and camera enabled devices to use their cameras to decrypt messages sent by the authorizing user. The VUD service may then provide mechanisms for the authorized users to decrypt messages, which have been encrypted by the authorizing users, by simply capturing an image/video of the encrypted text with a camera of their VUD enabled devices.04-30-2009
20110235801SECURE TRANSCODING OF CONTENT - A source device determines content rights for encrypted content in the first encoding standard using a first rights data file. The source device creates a second rights data file for transcoded content in the second encoding standard. The source device performs a key management operation including communicating a decryption key for the encrypted content in the first encoding standard to a transcoder. The source device transfers the encrypted content in the first encoding standard to the transcoder. The transcoder decrypts the encrypted content, transcodes the content from the first encoding standard to the content in the second encoding standard, and re-encrypts the content in the second encoding standard using a second encryption key. The transcoder then transfers the encrypted content in the second encoding standard to an indicated device.09-29-2011
20100329457METHOD FOR DISPLAYING A VIDEO OF A SCENE - Method of displaying a video of a scene onto a display with enhanced image quality, the video of the scene having first subframes and second subframes wherein the first subframes correspond to a first region of an image-presentation element of the display and the second subframes correspond to a second region of the image-presentation element; and selecting an access key corresponding to the first subframes. The method further includes encoding the access key into one or more of the second subframes; providing the second subframes to the display using a first data transport; the display, decoding the access key and receiving the corresponding first subframes using a second data transport different from the first data transport; and selectively providing the first and second subframes from the first and second data transports to corresponding regions in the image-presentation element of the display, whereby the displayed image has enhanced image quality.12-30-2010
20110044452METHOD AND DEVICE FOR THE PARTIAL ENCRYPTION OF A DIGITAL CONTENT - The present invention concerns a method of enciphering the digital content intended to be deciphered and retrieved on mobile terminals which makes it possible to limit the computing power necessary for the deciphering and therefore the energy used to do this. The broadcast content is partially enciphered. A signature of the headers of the pictures ensures the integrity of the data.02-24-2011
20110123023APPARATUS FOR VIDEO ENCRYPTION BY RANDOMIZED BLOCK SHUFFLING AND METHOD THEREOF - An apparatus for video encryption by randomized block shuffling according to an embodiment of the present invention includes: a random number and key manager that stores a key shared between a video encryption apparatus and a video decryption apparatus and generates a random number by using the key; and a block shuffling processor that analyzes encoded video data, classifies the encoded video data in accordance with a predetermined rule, generates a shuffling group in accordance with classification information, and changes positions of components in the shuffling group in accordance with the shuffling rule generated by using the random number generated by the random number and key manager.05-26-2011
20110243323ENDOSCOPE APPARATUS AND CONNECTION UNIT THEREFOR - An endoscope apparatus includes an endoscope apparatus body portion which includes a first connector, and which is connectable to an insertion portion having an image pickup device disposed at a distal end portion. The endoscope apparatus further includes a connection unit which includes a second connector which is removably connectable to the endoscope apparatus body portion by communicating the second connector with the first connector, a non-volatile memory which stores a program for processing image data inputted from the image pickup device via the second connector, a CPU which controls the processing of the image data in accordance with the stored program to produce processed data, and a display data output section configured to output the processed data.10-06-2011
20090214031UNIFIED BROADCAST ENCRYPTION SYSTEM - A system and method is disclosed for performing unified broadcast encryption and traitor tracing for digital content. In one embodiment a media key tree is divided into S subtrees, the media key tree including media keys and initial values, which may be random values. The digital content is divided into a plurality of segments and at least some of the segments are converted into a plurality of variations. The random values are transformed into media key variations and a separate media key variant is assigned to each of the subdivided subtrees. A unified media key block including the media key tree is stored on the media.08-27-2009
20090323945IMAGE DISPLAY DEVICE - An authentication/decryption unit authenticates and decrypts video signals received from a video signal output device. An open-condition detector detects the open condition of a cabinet. A memory stores therein one of a first flag indicating that an authentication operation of the authentication/decryption unit is enabled and a second flag indicating that an authentication operation of the authentication/decryption unit is disabled. A micro-controller controls whether the authentication operation of the authentication/decryption unit will be enabled or disabled according to the flag in the memory. When the open-condition detector detects that the cabinet is opened, the micro-controller writes the second flag into the memory.12-31-2009
20090323946ENCRYPTION AND UTILIZATION OF HARD DRIVE CONTENT - Examples of a system, method, and apparatus for encrypting and recording content are presented. When content is recorded to storage media, the content is encrypted with a content instance key. This content instance key is encrypted with the public key of a first set-top box and a duplicate of the content instance key is encrypted with the public key of other than said first set-top box. A private key corresponding with the public key of the first set-top box may be used to decrypt the content instance key, or a private key corresponding to the public key of other than the first set-top box may be used to decrypt the duplicate of the content instance key so that the encrypted content from the removable storage media may be made available in the clear.12-31-2009
20100061553VIDEO COPY PREVENTION SYSTEMS WITH INTERACTION AND COMPRESSION - Disclosed are systems and methods for providing video content while inhibiting the copying of that content for later viewing. Video images may be made difficult to copy for presentation at later times by the omission or addition of content developed in relation to the particular initial viewing. For instance, video information may be customized by omitting information that is not likely to be substantially perceived by the initial viewer but that is substantially likely to be perceived as missing by at least some other viewers. As another example, video information may be customized for a particular viewing instance so that it contains modified, selected or injected information that is likely to be perceived as non-disruptive or unnoticeable by the original viewer but that would be perceived as substantially noticeable and/or disruptive by some other viewers, including when parts of more than one such video information are combined in an effort to remove customization related to their respective original viewings. Various means and methods for accomplishing the forgoing in a variety of settings are disclosed including also for providing privacy related to what is viewed. In some examples higher-resolution images are provided for the region near the viewer's point-of-regard and lower resolution images are provided elsewhere, which also has the effect of reducing the bandwidth required. For interactive content rendered from digital models, a model for a central foveal region may be provide greater detail and have greater computational requirements than a model for a peripheral view, providing both economy/performance in rendering and protection against copying.03-11-2010
20110075841DIGITAL RIGHTS MANAGEMENT PROTECTION FOR CONTENT IDENTIFIED USING A SOCIAL TV SERVICE - A method is provided for viewing a bookmarked video clip. The method includes establishing communication over a broadband network with a first network element on which at least one bookmark resides. The bookmark includes metadata identifying a bookmarked video clip of a video program and specifies a network address at which the bookmarked video clip is located. Upon user request, metadata associated with a specified bookmark is received. Communication is established with a second network element on which the specified bookmarked video clip is located using the network address of the specified bookmarked video clip provided in the metadata. The bookmarked video clip is received from the second network element. The bookmarked video clip is encrypted in accordance with a digital rights management scheme. The bookmarked video clip is decrypted and rendered.03-31-2011
20110211693METHOD AND AN APPARATUS FOR KEY MANAGEMENT IN A COMMUNICATION NETWORK - The present invention relates to a method of key management and to an apparatus (09-01-2011
20110150214COORDINATED VIEWING EXPERIENCE AMONG REMOTELY LOCATED USERS - A method of viewing a content item is provided. The method includes receiving an encrypted content item and a network address of a key management system from a primary client device over a communications network. A session key is obtained over the communications network and the primary client device is notified that the session key has been obtained. An encrypted version of a content key is received over the communication network to decrypt the content item and content rights that determine access to the content item. The content rights restrict the content item from being rendered unless it is rendered in coordination with the rendering of the content item by the primary client device. The encrypted version of a content key is decrypted with the session key. The content item is rendered in accordance with the content rights by decrypting the content item with the content key.06-23-2011
20080253563Systems and Methods for Executing Encrypted Programs - Systems and methods for secure program execution are described. At least one embodiment includes a system for securely executing software comprising a host configured to accept a disc containing encrypted content to be accessed and store an encrypted program used to access the content on the disc. The system further comprises a secure coprocessor communicatively coupled to the host and configured to receive the encrypted program, decrypt and execute the encrypted program, and communicate an output generated by the program back to the host.10-16-2008
20110135089IMAGE ENCRYPTING/DECRYPTING SYSTEM AND METHOD - The present invention relates to an image encrypting/decrypting system and method devised in such a way that: a transmitter and a receiver for transmitting and receiving moving images share a seed for encrypting and decrypting the moving images; the transmitter transmits moving images after encrypting the moving images by dividing them into segment units and mixing the time sequencing of the images in each of the segments in accordance with a random number generated by means of the seed; and the receiver decrypts the moving images which it receives, by sorting them in segment units and then restoring the time sequencing of the images in each of the segments in accordance with the random number generated by means of the seed. The present invention makes it possible to effectively implement the function of encrypting after having carried out transcoding even in cases involving an alteration to the frame or an increase in resolution in an encrypted moving image, and also makes it possible to resolve the problem of having to encrypt/decrypt before/after carrying out transcoding in cases where a compressed moving image is being encrypted.06-09-2011
20100080384Systems and Methods for Integrating Interactive Features Into Multiple Media Content Sources - One embodiment, among others, includes a method for editing video. The method comprises receiving a plurality of media files and receiving specified special effects corresponding to each of the plurality of media files. Based on the received plurality of media files and the specified special effects for each of the plurality of media files, a single output is generated whereby the special effects are incorporated and where the plurality of media files are unmodified.04-01-2010
20100195826SYSTEM FOR PERSONAL IP BROADCASTING SERVICE WITH PERSONAL DRM AND METHOD USING THE SAME - A system for personal Internet protocol (IP) broadcasting to which a personal digital rights management (DRM) is applied, and a method thereof are provided. The system for personal IP broadcasting includes: a personal broadcasting transmission unit generating content, storing the content, applying personal DRM encryption to the content, and transmitting the content; a personal broadcasting reception unit receiving the transmitted content, DRM-decoding the content based on a personal DRM certificate corresponding to the content, and reproducing the content; a channel management unit allocating a channel through which the personal broadcasting transmission unit transmits broadcasting, then managing the channel, and transmitting information of a predetermined broadcasting transmission unit requested by the personal broadcasting reception unit; and an authentication server unit verifying validity of each of the personal broadcasting transmission unit and the personal broadcasting reception unit, and issuing and managing the personal DRM certificate. According to the system and method, DRM is applied to the content authored and broadcast by an individual person, thereby enabling the person to claim digital rights. Accordingly, illegal copying of the personal broadcasting content can be prevented and only authenticated users can use the service, thereby preventing broadcasting of inappropriate content or illegal use of the service by an unauthorized user.08-05-2010
20100195827METHOD AND APPARATUS FOR ENCRYPTING TRANSPORT STREAM OF MULTIMEDIA CONTENT, AND METHOD AND APPARATUS FOR DECRYPTING TRANSPORT STREAM OF MULTIMEDIA CONTENT - A method of transporting an encrypted stream of multimedia content is provided. In the method, when a packet contains data of a predetermined length including selected data from pieces of data corresponding to the multimedia content and a header, key information, and first time information from among pieces of information included in a selected packet from among at least one packet are received, and encryption information is determined from the key information and the first time information, according to a key derivation function. The first time information is variable with time. The at least one packet including data corresponding to the multimedia content is encrypted using the encryption information. The at least one encrypted packet and the key information are transported.08-05-2010
20110142233SERVER AND CAMERA FOR VIDEO SURVIELLANCE SYSTEM AND METHOD FOR PROCESSING EVENTS IN THE SAME SYSTEM - A method for processing events in a server for a video surveillance system, includes: when the server detects occurrence of an event, transmitting a collection command to one or more cameras; analyzing specifications of the cameras, determining a set value for functions of cameras capable of processing the event, and transmitting a setting command to cameras; transmitting an execution command to the cameras, and processing and storing video data received from the cameras; and transmitting a completion command to the cameras, and completing the event processing. Each of the cameras including function units for performing different functions includes common frameworks which enable function units to perform the different function in a uniform manner.06-16-2011
20090097642Secure Content Distribution with Distributed Hardware - This document describes tools capable of securely distributing entertainment content among and using distributed hardware. These tools may do so robustly by rebinding entertainment content between distributed hardware units. The tools, for example, may distribute content protection in hardware between a policy unit, a transcryption unit, a graphics processing unit, and a playback unit. By so doing the tools enable, among other things, users to select from many graphics cards rather than rely on the graphics capabilities of an integrated (e.g., SOC) hardware solution.04-16-2009
20090208006Encryption system for satellite delivered television - A television content delivery system consistent with certain embodiments has a receiver system that receives television content from a plurality of content suppliers. A selective multiple encrypter selectively multiple encrypts the television content, wherein the resultant selectively multiple encrypted content stream is encrypted under at least one conditional access system (CAS) and at least one digital rights management system (DRMS). A transmitter transmits the selectively multiple encrypted television content stream to multiple receivers, so that the selectively multiple encrypted television content stream can be decrypted under either a system using at least one CAS or at least one DRMS. This abstract is not to be considered limiting, since other embodiments may deviate from the features described in this abstract.08-20-2009
20100020968Protection Scheme for AACS Keys - A method for protecting a software video player having Advanced Access Content System (AACS) includes reading segments of an encrypted first key from noncontiguous regions of memory, assembling the segments to form the encrypted first key, decrypting the encrypted first key with a second key to form a first key, extracting AACS key data from a pack file, decrypting the AACS key data to retrieve AACS Device Keys, generating an AACS Title Key using the AACS Device Key, clearing the AACS Device Keys and the first key from memory after the AACS Title Key is generated, decrying encrypted AACS content with the AACS Title Key to form AACS content, and displaying the AACS content.01-28-2010
20110110515METHODS AND APPARATUS FOR AUDIENCE DATA COLLECTION AND ANALYSIS IN A CONTENT DELIVERY NETWORK - Methods and apparatus for collection and processing of data relating to users of a content-delivery network. In one embodiment, the content delivery network is a cable or satellite or HFCu network, and the apparatus includes an architecture for routinely harvesting, parsing, processing, and storing data relating to the activities of the users (e.g., subscribers) of the network. In one variant, at least portions of the data are anonymized to protect subscriber privacy.05-12-2011
20090136028SECURE CONTENT DISTRIBUTION APPARATUS, SYSTEMS, AND METHODS - Various embodiments facilitate program content access management. One embodiment is a system with a secure content provider communicatively coupled to a first system and a second system, operable to stream encrypted content over the first system, and operable to communicate access control information over the second system; and a receiving device coupled to the first system and the second system, operable to receive the encrypted program content from the first system, operable to receive the access control information over the second system such that the encrypted program content is decrypted based on the access control information to generate program content, and operable to communicate the program content to a presentation device.05-28-2009
20090060181Local Content Security System - The present invention is a system for securing broadcasting content locally at receiving stations that may be remote to a broadcaster. Embodiments of this invention implement controllable and renewable security measures, compatible with many other content processing and display systems. These security measures may include re-encrypting received broadcast content using locally generated keys, watermarking the received broadcast content, and logging both processing and display of broadcast content.03-05-2009
20120163593On-Demand Switched Content Encryption - A number of encryption system types utilized by subscriber terminal devices currently requesting tuning to a particular switched digital video (SDV) content selection is determined in response to each change in a number of the subscriber terminals requesting tuning to the particular SDV content selection. SDV content associated with the particular SDV content selection is encrypted as either encrypted SDV content or multiply partially encrypted SDV content based upon the determined number of encryption system types beginning from a current play location indicated for the SDV content selection within an electronic program guide (EPG). Either the encrypted SDV content or the multiply partially encrypted SDV content is distributed as part of an outgoing SDV content stream to the subscriber terminals currently requesting tuning to the particular SDV content selection. This abstract is not to be considered limiting. Other embodiments may deviate from the features described in this abstract.06-28-2012
20110182425Secure Connected Digital Media Platform - An embodiment of the invention provides a system including a secure media device having one or more security keys stored therein. The secure media device is housed in a device that is connected to a television unit and a network. Secure application environments are housed in the device, wherein each secure application environment is operationally isolated from one another. The secure application environments receive and process information sent over the network only if the information includes a security code corresponding to the security key in the secure media device. The security code is obtained from a clearinghouse when the information satisfies predetermined criteria. More specifically, the clearinghouse receives a copy of the security key from a manufacturer of the secure media device and creates the security code based on the security key.07-28-2011
20120163594SECURITY LABEL GENERATION METHOD AND APPARATUS FOR SCALABLE CONTENT DISTRIBUTION - A security label generation apparatus for scalable content distribution, includes a scalable content transmitter for receiving service level requirements of a user and network bandwidth information over a network and generating security labels and encrypted scalable units. Further, the security label generation apparatus includes a scalable content receiver for receiving the encrypted scalable units and the security labels from the scalable content transmitter and for decrypting, decoding, playing, modifying, storing or redistributing the encrypted scalable units based on the security labels. Furthermore, the security label generation apparatus includes scalable content storage for searching for scalable content and metadata corresponding to a request of the scalable content transmitter.06-28-2012
20090080653Partial encryption storage medium - An electronic storage device facilitates transmission or reception of multiple partial encrypted digital video has a segment of digital video content recorded on the electronic storage device as a data structure with a first set of data packets encrypted under a first encryption process so that the first set of data packets can be decrypted by a first decryption process; a second set of data packets encrypted under a second encryption process so that the second set of data packets can be decrypted under a second decryption process. The first set of video data packets and the second set of video data packets, when unencrypted, represent duplicate copies of the same video information. A third set of data packets contains unencrypted video data that is contextually contiguous to the first set of data packets and the second set of data packets. The first set of data packets together with the third set of data packets represents all video content in the segment of digital video content as does the second set of data packets together with the third set of data packets. The data structure enables the first set, the second set, and the third set of digital video content to be read out of the electronic storage device in an order that facilitates decryption of the segment of digital video content by use of a decrypter having capabilities for decryption of encrypted information under the first decryption or by use of a decrypter having capabilities for decryption of encrypted information under the second decryption process, at either a transmission facility or a receiver.03-26-2009
20120082309METHOD AND APPARATUS OF PROCESSING THREE-DIMENSIONAL VIDEO CONTENT - The present invention introduces methods and apparatus of encrypting/decrypting three-dimensional (3D) video content. The inventive methods and apparatus can achieve a flexible payment/authorization mechanism for the 3D video content. A user can choose to view only 2D images corresponding to the video content, or pay an authorization fee that allows the user to view the entire 3D video content.04-05-2012
20120257748METHODS AND SYSTEMS FOR RE-SECURING A COMPROMISED CHANNEL IN A SATELLITE SIGNAL DISTRIBUTION ENVIRONMENT - A method implemented by a set top box that encrypts communications for a channel stacking switch (CS) using a public key of the CSS, the method comprising: obtaining a message from a head end; extracting electronic counter measure (ECM) data from the message; sending the ECM data to the CSS; receiving, in response to the sending, a new public key of the CSS; encrypting communications for the CSS using the new public key of the CSS. Also, a method for implementation by a CSS, comprising: maintaining a private key and a public key; obtaining ECM data sent by a set top box in communication with the CSS; obtaining an identifier of the CSS; formulating a new public key based on the private key, the identifier and the ECM; rendering the new public key available to the set top box.10-11-2012
20090016525ENCODING/DECODING APPARATUS - An encoding/decoding apparatus comprises a central processing unit and an encryption/decryption accelerator coupled to the central processing unit. The accelerator comprises an input for input data to be encrypted/decrypted, an arithmetic logic unit coupled to said input for performing selectable operations on data obtained from said input data and an output for encrypted/decrypted data coupled to said arithmetic logic unit.01-15-2009
20080310627ASYNCHRONOUS DOWNLOAD - The claimed subject matter provides a system and/or method that asynchronously disseminates multimedia content to disparate clients. The disclosed system can include a component that receives multimedia content supplied by a multimedia publisher, encrypts or applies a time sensitive lock to the received multimedia content, disseminates the encrypted or locked multimedia content to the disparate clients, and a time subsequent, generates and distributes to the disparate clients a counterpart to the time sensitive lock necessary to unlock and play the disseminated and encrypted or locked multimedia content on the clients.12-18-2008
20100202610SYSTEMS AND METHODS FOR ENABLING CONSUMPTION OF COPY-PROTECTED CONTENT ACROSS MULTIPLE DEVICES - Various systems and methods for distributing rights managed content objects arc disclosed. For example, some embodiments of the present invention provide methods for distribution that include providing a mobile storage device that includes a wireless interface and a storage component maintaining a rights managed content object. A first request to provide the rights managed content object to a first mobile application device via the wireless interface is received, and a second request to provide the rights managed content object to a second mobile application device via the wireless interface is received. The rights managed content object is accessed from the storage component, and a digital rights management tool associated with the accessed content object is accessed. The rights managed content object is decrypted using the digital rights management tool, and streamed to both the first mobile application device and the second mobile application device via the wireless interface.08-12-2010
20100172497Partial multiple encryption - A partial multiple encryption device consistent with certain embodiments has an input for receiving a unencrypted video signal. An encryption arrangement produces a partially multiple encrypted video signal from the unencrypted video signal. An output provides the partially multiple encrypted video signal. This abstract is not to be considered limiting, since other embodiments may deviate from the features described in this abstract.07-08-2010
20110158406ZERO SIGN-ON AUTHENTICATION - A authenticating system and process for authenticating user devices to a access a media service where access to certain portions of the media service may be limited according to a gateway or other device used by a user device to facilitate interfacing a user with the media service. The authentication may be achieved without directly assessing a trustworthiness of the user devices, and optionally, without requiring a user thereof to complete a sign-on operation.06-30-2011
20080253564METHOD AND APPARATUS FOR FILE SHARING OF MISSING CONTENT BETWEEN A GROUP OF USER DEVICES IN A PEER-TO-PEER NETWORK - A communication system 10-16-2008
20080226067Method and Circuit for Encrypting a Data Stream - Current legislation requires the possibility of encryption when storing television programmes received by broadcast. However, legacy playback apparatuses will not be able to play back such encrypted data in a regular way, but possibly in a wrong way. This may result in problems like damage of speakers. Therefore, the application intends to hide any of such possibly damaging streams by intentionally providing such streams with a wrong identification during the encryption process. The application provides among others a method and circuit for encryption and a method and circuit for decryption. The application is especially suitable for DVD recorders, but may also be employed for other video and/or audio recorders. The invention may even be used for encrypting non-audiovisual data.09-18-2008
20110222687APPARATUS AND METHOD FOR ENCRYPTING IMAGE DATA, AND DECRYPTING THE ENCRYPTED IMAGE DATA, AND IMAGE DATA DISTRIBUTION SYSTEM - An apparatus (09-15-2011
20130202109CONTAINER AGNOSTIC ENCRYPTION DEVICE AND METHODS FOR USE THEREWITH - A video processing device for encrypting a compressed video signal that includes a key storage device for storing at least one encryption key. An encryption processing device retrieves the at least one encryption key from the key storage device, and directly encrypts an elementary bit stream into at least one encrypted elementary bit stream.08-08-2013
20130202110CONTAINER AGNOSTIC DECRYPTION DEVICE AND METHODS FOR USE THEREWITH - A video processing device for decrypting a compressed video signal includes a key storage device for storing at least one decryption key. A decryption processing device retrieves the at least one decryption key from the key storage device, and decrypts an encrypted elementary bit stream into at least one elementary bit stream, wherein first portions of the encrypted elementary bit stream are encrypted and second portions of the encrypted elementary bit stream are unencrypted.08-08-2013
20110293090AV DATA RECEIVING DEVICE, AV DATA RECEIVING METHOD, AND AV DATA TRANSMISSION AND RECEIVING SYSTEM - A conventional AV data receiving device switches to a key for distribution to an outdoor device when a network environment is switched to an outdoor network environment, thus resulting in high key switching frequency. In view of this, an AV data receiving device according to the present invention determines, after switching the network environment from indoors to outdoors as a result of moving the AV data receiving device, whether or not key switching should be performed, before a command for restricting a hop count on a route from an AV data transmission device located indoors is transmitted, and performs authentication and key exchange processing for outdoor device distribution, so as to switch to the key for outdoor device distribution.12-01-2011
20120014522METHOD AND DEVICE FOR RECEPTION OF CONTROL WORDS, AND DEVICE FOR TRANSMISSION THEREOF - Delivery of conditional access data to a receiver that is able to connect to a plurality of scrambled programs. Conditional access for a current channel is handled using standard ECMs delivered with the channel. In parallel, the receiver retrieves an ECM for a separate stream comprising control words for every channel. The control word of this ECM is used to descramble the separate stream to access the control words for every channel. In a preferred embodiment, these control words are super-encrypted using channel keys and the receiver is only able to obtain channel keys for channels for which it has access rights. In case the control words are super-encrypted, they are decrypted. Upon channel change, the relevant retrieved control word is used to descramble the new channel. Also provided is a receiver device and a transmitter device. According to a variant, the control words received in the separate stream is treated only upon a change of channel. The invention enables a reduction or removal of the CA delay when switching between channels.01-19-2012

Patent applications in class VIDEO CRYPTOGRAPHY

Patent applications in all subclasses VIDEO CRYPTOGRAPHY