Class / Patent application number | Description | Number of patent applications / Date published |
380201000 | Copy protection or prevention | 77 |
20080199006 | Method and Apparatus for Accessing Proteceted Data - Consumers of content protected multimedia data, such as e.g. commercially available video DVDS, want to take backup copies of these data, and want to be free to play the data on any suitable playback device, while content providers want to protect these data against pirate copying. The disclosed method for accessing application data from a first storage medium, e.g. CD, uses an electronic key for decoding or converting the application data. One or more content identifiers are attached to the application data or the first storage medium. The key is stored on a copy-protected separate second storage medium, e.g. RFID tag, and compared with the content identifier. Playback or format conversion of the application data is only possible when the second storage medium is available. This allows the application data to be copied, distributed or format converted, while simultaneously preserving the content rights of the data because only one copy can be used at a time. | 08-21-2008 |
20080199007 | Identification of a compromised content player - A system and method for identifying the player that leaked content encryption keys by loading a set of player keys into individual content players and determining the number of encryptions and the number of encryption keys to use in multiple encrypting critical content. The method produces copies of critical data content packets, each copy of which is separately encrypted using any one of a set of encryption keys that are related to one another through a mathematical algorithm. The related set of encryption keys and data describing key relationship and content player identity are transmitted to a previously determined license management agency. The transmitted encrypted content is written to a receiving device or file, or streamed to an individual player for non-synchronous playback. This abstract is not to be considered limiting, since other embodiments may deviate from the features described in this abstract. | 08-21-2008 |
20080212774 | Device for and a Method of Processing an Encrypted Data Stream in a Cryptographic System | 09-04-2008 |
20080247542 | Apparatus for and a method of providing content data - Apparatus and a method are described to enable reading apparatus to access content data of an optical disc such as a DVD where the content data carried by the DVD is encrypted by an encryption technique that requires a decryption key or keys. Reproduced content data corresponding to the encrypted content data is provided and this reproduced content data, at least some of which may be encrypted using a different technique, is made available for access by a reading apparatus. The reproduced content data may be stored on the same optical disc as the encrypted content data or at a different location, for example on a storage medium which may be coupled to the reading apparatus or at a location on a network that can be accessed by the reading apparatus. | 10-09-2008 |
20080247543 | METHOD AND APPARATUS FOR PROTECTING DIGITAL RIGHTS OF COPYRIGHT HOLDERS OF PUBLICLY DISTRIBUTED MULTIMEDIA FILES - A video network includes public kiosks having digital storage capacity. Centralized inventory control manages the video files stored at individual kiosks or network LANs. A user requests a multimedia file for download, and selects various ancillary files and control features, such as languages, subtitles, control of nudity, etc. The requested file is encrypted according to an encryption key, watermarked, and downloaded from a high-speed port of a public kiosk to a hand-held proprietary high speed memory device of a user. Payment is received at the time of request or at the time of download, and royalties are distributed by the video network to copyright holders. Computer applications or playback devices allow users to store and/or play video files that have been downloaded to a hand-held device while managing and enforcing digital rights of content providers through the watermarking and/or encryption. | 10-09-2008 |
20080267399 | Method and Apparatus for Secure Content Recording - A method is provided that establishes a secure tunnel with a content acquisition processor that acquires encrypted content from a content source and decrypts the encrypted content to obtain content. The content acquisition processor is not trusted for providing digital rights management. Further, the method transmits a request through the secure tunnel to the content acquisition processor to re-encrypt the content with a content encryption key so that re-encrypted content is generated and stores the re-encrypted content on a storage medium. The request includes the content encryption key. | 10-30-2008 |
20080279375 | Service card adapter - An interface adapter device consistent with certain embodiments has a first electrical connector adapted to connect to a conditional access service card to receive encrypted television signals therefrom. A second electrical connector is adapted to connect to a television receiver device in order to provide the encrypted television signals to the television receiver device. An interface circuit receives the encrypted television signals from the first electrical connector and adapts the signals for transmission to a television receiver device over the second electrical connector. This abstract is not to be considered limiting, since other embodiments may deviate from the features described in this abstract. | 11-13-2008 |
20080285750 | DECRYPTION DEVICE - A decryption device includes: an internal-key storage section for storing an internal-key; a content-key storage section for storing a content-key; a determination section for determining whether or not a value of the content-key storage section in its initial state and a current value of the content-key storage section are different; and an operation section, the operation section including a first decrypting section which, when an encrypted content-key is input to the operation section, decrypts the encrypted content-key using the internal-key so as to obtain a content-key and stores the content-key in the content-key storage section, and a second decrypting section which, when an encrypted content is input to the operation section and the determination section determines that the value of the content-key storage section in its initial state and the current value of the content-key storage section are different, decrypts the encrypted content using the current value of the content-key storage section as a content-key so as to obtain a first output data and outputs the first output data to outside of the decryption device. | 11-20-2008 |
20080310628 | Backup Management Device, Backup Management Method, Computer Program, Recording Medium, Integrated Circuit, and Backup System - To provide a backup management device that deletes a content so as to be restorable in the future while protecting a copyright of the content, in a case where there exists a backup of the content. In an HD recorder | 12-18-2008 |
20080310629 | Multibit Forensic Watermark with Encrypted Detection Key - The invention relates to embedding auxiliary data in the form of a multibit payload in a host signal, and encrypting the associated detection key. Moreover, the invention relates to extracting the auxiliary data in the form of the multibit payload from a data signal. Auxiliary data is embedded in a host signal by the following steps. First a reference watermark is provided, subsequently an encrypted detection key associated only with the reference watermark is generated. The encrypted detection key may be a scrambled version of the watermark. In a further step, the multibit watermark is generated and a multibit payload is encoded into the reference watermark. Finally, the multibit watermark is embedded into the host signal. | 12-18-2008 |
20090060182 | Apparatus and method for enhancing the protection of media content - An aspect of the current invention involves an apparatus and method for protecting media content from being read and copied by an unauthorized party. In one embodiment of the invention, this is accomplished by storing keys for decrypting encrypted media content on a secure memory device located in proximity to a computer processor. A secure memory device located in proximity to a computer processor allows for decryption keys to be sent to a user of the computer processor in advance of the user receiving an encrypted media content that will be decrypted with the decryption keys. With the secure memory device, the decryption keys can be stored indefinitely without an unauthorized party gaining access to them. Another embodiment of the invention allows for multiple media content providers to store their own decryption keys for their own encrypted media content simultaneously on a secure memory device located with a user's personal computer. A further embodiment of the invention involves using a secure memory device located with a means for displaying media content—such as a monitor or speaker—to allow for secure transfer of decrypted, decompressed media content from a computer processor used to play media content, a stand-alone media content player, or a set-top box media content player to a media content display | 03-05-2009 |
20090067625 | Method for protection of digital rights at points of vulnerability in real time - As transmitted digital content is vulnerable commodity, its protection from piracy is receiving significant attention. It is possible today to extract the digital content from the temporary storage during processing and also form interfaces during transfer between blocks in a receiver system. When content is processed and frames are temporarily stored in external memory, when frames are transmitted to the display through a LVDS, or other screen/panel interface, they are transmitted non-secured. When captured at these points of vulnerability, the full resolution image is available for reproduction. According to the present invention additional security protection is enabled at these points of vulnerability. The disclosed practice of randomized scrambling of bits or groups of bits at the points of vulnerability in a digital transmit-receive system prevent pirating of useable content. | 03-12-2009 |
20090080654 | Method to track the downloading and playing of audible presentations - A method for detecting playing of unauthorized downloading of digital data files having soundtracks by an Internet enabled machine including the steps of: (a) applying identification signals to the soundtracks at frequencies outside of human audible range; (b) encrypting the digital data files in a format requiring appropriate software to be played by media players; and (c) freely providing the appropriate software for playing the digital data files to generally available media players as an add on configured as a plug in downloadable form from an Internet website, where the appropriate software includes:
| 03-26-2009 |
20090092249 | Media key-transformation obfuscation in advanced access content system - A modified media key used to decrypt protected media content stored on an optical disc, such as an HD-DVD or Blu-ray disc, is created through application of a transformation using a constant value which is programmatically generated by procedural code that runs on a player. The transformation is obfuscated through application of a random value to the constant value through a logical XOR operation. The programmatically-generated constant, called Soft Key Conversion Data (“SKCD”) is used by a security layer to derive the modified media key, called a Soft Media Key. At the player, a conventionally calculated media key is used to decrypt the first title, while the Soft Media Key is used to decrypt subsequent titles. Optionally, the SKCD may be updated one or more times so that the Soft Media Key is repeatedly transformed and respectively applied, for example, on a title-by-title basis, or to groups of subsequent titles. | 04-09-2009 |
20090097645 | PLAYING CONTROL FILES FOR PERSONAL VIDEO RECORDERS - The certificate with specified conditions under which copyright did material can be played. Copyrighted material, such as videos are stored in a storage unit. They are stored along with a policy that indicates when the information can be played. The information can, for example be encrypted one stored, and the decryption key is available only when characteristics of the policy are met. When those characteristics are not met, the information can not be retrieved at all or only can be retrieved in some very limited format. | 04-16-2009 |
20090136029 | SYSTEM AND METHOD FOR CONTROLLING DISPLAY OF COPY-NEVER CONTENT - A method and system for controlling the use of unauthorized content, and specifically for controlling the display of content that is marked as “copy-never.” A compliant signal source transmits a video signal along with a secure timestamp to a compliant display device. The compliant display device determines whether the video signal is authorized to be displayed by determining the content management usage rights status in the video signal and the delay between when the video signal was transmitted and when it was received. In an embodiment of the invention, copy-never content that exceeds a defined delay between transmission and reception is prevented from being displayed. | 05-28-2009 |
20090141893 | RECORDATION OF ENCRYPTED DATA TO A RECORDABLE MEDIUM - Systems and methods of recording data are disclosed herein. A secure storage area is received from a host device. The secure storage area is indicative of a portion of a memory of the recordable medium to be recorded with encrypted data. A write command is received from the host device. The write command can include at least one data block to be written to the recordable medium and a memory address indicative of a start address where the at least one data block is to be written on the recordable medium. The memory address and the secure storage area can be compared to determine whether the at least one data block falls within the secure storage area. An encryption indicator in the at least one data block can be checked to determine whether the data on the at least one data block is encrypted. If the encryption indicator indicates that the data in the at least one data block is encrypted and if the at least one data block falls within the data range an encryption bit associated with the at least one data block can be set. | 06-04-2009 |
20090175445 | Electronic Device, Home Network System and Method for Protecting Unauthorized Distribution of Digital Contents - The present invention relates to an electronic device, a home network system and a method for protecting unauthorized distribution of digital contents. The electronic device for protecting the unauthorized distribution of the digital contents includes an encryption key generator generating an encryption key; a contents player playing first digital contents; a contents regenerator generating second digital contents by converting the first digital contents played by the contents player into a predetermined data format; and a controller controlling the contents regenerator to encrypt the second digital contents by the use of the encryption key generated by the encryption key generator at the time when the contents regenerator generates the second digital contents. | 07-09-2009 |
20090185682 | SYSTEMS AND METHODS FOR IMPROVING HIGH- BANDWIDTH DIGITAL CONTENT PROTECTION (HDCP) AUTHENTICATION WITH DIGITAL VIDEO INTERFACE (DVI) OR HIGH-DEFINITION MULTIMEDIA INTERFACE (HDMI) RECEIVER DEVICES - Systems and methods for improving HDCP (High-Bandwidth Digital Content Protection) authentication with DVI or HDMI receiver devices are provided. An HDCP transmitting apparatus according to the invention may include a computer and a look-up table accessible by the computer. The look-up table may include a database for storing an interoperability characteristic for an HDCP receiving device. The computer can communicate with the HDCP receiving device. The computer may also insert a delay in an initiation of the authentication and/or communication of content between the HDCP transmitting apparatus and the HDCP receiving device. The magnitude of the delay may be based on an interoperability characteristic retrieved from the look-up table that corresponds to the HDCP receiving device. The inserting may occur prior to the implementation of authentication initiation and ongoing link integrity checking between the transmitting apparatus and the HDCP receiving device. | 07-23-2009 |
20090202071 | RECORDING APPARATUS, REPRODUCING APPARATUS, AND COMPUTER PROGRAM PRODUCT FOR RECORDING AND REPRODUCING - A recording apparatus stores first secret information uniquely allocated to the recording apparatus, reads media identification information for specifically identifying a recordable medium and encrypted disk key information encrypted by master key information from the recordable medium, and transmits these pieces of information to an authentication server. The recording apparatus receives an encrypted content encrypted by title key information and encrypted title key information from the authentication server. Further, the recording apparatus receives first certificate information for certifying that the authentication server permits recording of the content on the recordable medium from the authentication server, generates second certificate information by using the first certificate information and first secret information, and records the encrypted content, the encrypted title key information, and the second certificate information on the recordable medium. | 08-13-2009 |
20090208007 | ENCRYPTION DEVICE, A DECRYPTING DEVICE, A SECRET KEY GENERATION DEVICE, A COPYRIGHT PROTECTION SYSTEM AND A CIPHER COMMUNICATION DEVICE - An encryption device, a decrypting device, a secret key generation device, a copyright protection system and a cipher communication device including: a CRL memory unit memorizing a CRL, a device key ring memory unit memorizing a specific device key KD_A in every IC card used in a decrypting device, a content key memory unit memorizing a content key Kc, which is a secret key for decrypting content, and a hashing function processing unit calculating a hashing value of the CRL memorized in the CRL memory unit. The devices further including an Ex-OR unit carrying out an exclusive OR between the hashing value and the device key KD_A memorized in the device key ring memory unit, and an Enc unit encrypting the content key Kc memorized in the content key memory unit using an output value of an Ex-OR unit. | 08-20-2009 |
20090316889 | HARDWARE-BASED PROTECTION OF SECURE DATA - Computer-readable media, computerized methods, and computer systems for protecting secure data by writing content of the secure data to a protected memory segment are provided. Initially, streaming media is received from a media-reading device and portions of the streaming media are identified as secure data. A data-management process to protect content within the secure data is executed. During execution, the protected memory segment is instantiated, a region of memory is dynamically allocated to hold the protected memory segment, and content of the secure data is written thereto. The protected memory segment is generally a data store that conditionally limits access thereto utilizing hardware-based rules, thereby guarding the content against exposure to unauthorized systems and to attackers. The region of memory may be allocated on CPU hardware, GPU hardware, or a combination thereof. The content may then be encrypted and released for conveyance to one or more presentation devices. | 12-24-2009 |
20090323947 | METHOD OF CONFIRMING DRIVE UNIQUE KEY AND OPTICAL DISC RECORDING/REPRODUCING APPARATUS - In an apparatus which encrypts and records, or decrypts and reproduces content necessitated copyright protection using a plurality of encryption keys, the encryption key unique to a drive apparatus is stored into a memory in the apparatus at the time of manufacturing the apparatus. | 12-31-2009 |
20100008500 | END-USER SYSTEM OF PREVENTING UNAUTHORIZED RERECORDING OF MULTIMEDIA CONTENT - An end-user system for the blocking of recording digital content at during the rendering of encrypted digital multimedia files. Before the process of rendering of encrypted digital multimedia can be started all rendered media stream during playback are opened to ensure that this multimedia content is not recorded. This blocks the usage of the multimedia interfaces including devices and/or ports that can be used to store un-encrypted content that has been decrypted for the purposes of playing or rendering. The method also includes an exception, which allows recording with permission from the present invention. | 01-14-2010 |
20100008501 | ILLEGAL RECORDING PREVENTION APPARATUS - An illegal recording prevention apparatus used for preventing an illegal recording with a video camera in a movie theater, comprises a unit for emitting infrared light which has a center wavelength in a wavelength of 800-980 nm wavelength, so that an automatic-focusing regulating function or automatic exposure regulating function of the video camera is deteriorated. | 01-14-2010 |
20100027789 | COPY CONTROL METHOD - In a reception apparatus for receiving digital content and a plurality of types of copy control information for controlling copying of the digital content, and recording the digital content on a recording medium according to the plurality of types of copy control information, when first information in the received plurality of types of copy control information shows copy generation information permitting one-generation copying, the digital content is allowed to be recorded in a state of being copyable up to a limited number in the case where second information in the received plurality of types of copy control information shows limited-number copy permission, and the digital content is recorded only once in a copy prohibited state in the case where the second information does not show limited-number copy permission. | 02-04-2010 |
20100046751 | PACKET BASED HIGH DEFINITION HIGH-BANDWIDTH DIGITAL CONTENT PROTECTION - A packet based high bandwidth copy protection method is described that includes the following operations. Forming a number of data packets at a source device, encrypting selected ones of the data packets based upon a set of encryption values, transmitting the encrypted data packets from the source device to a sink device coupled thereto, decrypting the encrypted data packets based in part upon the encryption values, and accessing the decrypted data packets by the sink device. | 02-25-2010 |
20100177892 | METHOD, APPARATUS, AND SYSTEM FOR PRE-AUTHENTICATION AND KEEP-AUTHENTICATION OF CONTENT PROTECTED PORTS - A method, apparatus and system for providing pre-authentication and keep-authentication of content protected ports system employing a ratio of one decipher processing engine (e.g., HDCP engine) associated with multiple ports is disclosed is disclosed. In one embodiment, a receiving device is pre-authenticated by a transmitting device, wherein the receiving device to receive a data stream from the transmitting device via a first data path. Further, a first High-Definition Content Protection (HDCP) engine is associated with a first port in the first data path, the first HDCP engine coupled with a second HDCP engine. The second HDCP engine is associated with a plurality of ports in a second data path, each of the plurality of ports associated with a memory pipe having state information relating to each of the plurality of ports, the state information being used to pre-authenticate the receiving device. | 07-15-2010 |
20100239088 | METHOD AND SYSTEM FOR DIGITAL CONTENT PROTECTION - Methods, systems and computer program products for copy protecting content data to be stored on storage media are disclosed. At least one location in the content data is selected for insertion of a predetermined data sequence, which, upon re-trieval from the storage media by a data retrieval apparatus, is capable of rendering the data retrieval apparatus incapable of correctly retrieving the content data from the storage media. The predetermined data sequence is inserted at the at least one selected location in the content data and the content data and predetermined data sequence are processed such that the data retrieval apparatus is capable of correctly retrieving the content data from original storage media the content data is stored on and is incapable of correctly retrieving the content data from a copy of the original storage media. | 09-23-2010 |
20100239089 | METHOD AND DEVICE FOR SUPPLYING OF A DATA SET STORED IN A DATABASE - Method and device for supplying of a data set stored in a database to supply of a data set, e.g. the content of a copy protected audio CD, which is stored in a database, e.g. to a user PC on which said content of a copy protected audio CD cannot be accessed, the following steps are performed: receiving a serial code of a set of serial codes assigned to said data set, verifying of said received serial code, in case of a positive verification, accessing said data set correspond to said received and positively verified serial code from said database and outputting of at least parts of said accessed data. | 09-23-2010 |
20100296652 | INFORMATION RECORDING MEDIUM, INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND COMPUTER PROGRAM - There are provided an information recording medium, an information processing apparatus, an information processing method, and a computer program, which can realize users' convenience for using content in accordance with a license and copyright protection. An information recording medium stores an encrypted content file including encrypted content, usage right information of the encrypted content, and encryption key information necessary for a decrypting process for the encrypted content. Thus, a user can acquire a license (usage right information) and key information necessary for decryption of the content, together with the content, from the information recording medium, without acquiring the license (usage rights) by connection to a license provider. Therefore, it is no longer necessary to perform a process of acquiring the license (usage rights) from the license provider when the content is to be used, whereby user convenience is improved, and license-based content copyright management can also be ensured. | 11-25-2010 |
20110110516 | CONTENT RECEIVER, CONTENT REPRODUCER, MANAGEMENT SERVER, CONTENT USE SYSTEM, CONTENT USE METHOD, METHOD OF WRITE-OUT FROM CONTENT RECEIVER, METHOD OF POSSIBLE VIEWING TIME MANAGEMENT ON CONTENT REPRODUCER, METHOD OF TIME LIMIT FIXATION IN MANAGEMENT SERVER, AND PROGRAM - In a service enabling viewing of a rental content time-limit-managed by a copyright protection system (DRM) for a certain time period from first-time viewing in a video download service through a network, even possible viewing times for the content under the one and another copyright protection systems when the content is exported to a removable medium in conformity with the other system (CPS) before first-time viewing under DRM management are synchronized. When a content time-limit-managed by a copyright protection system is exported to a removable recording medium in conformity with a different content protection system, a URL for a management server is designated and a request is made of the designated management server to fix a possible viewing time if the URL of the management server is designated when the content is viewed for the first time in a content reproducer in conformity with the content protection system. | 05-12-2011 |
20110110517 | CONTENT PLAYBACK DEVICE - To provide a content playback device capable of protecting content according to DRM, when decrypting encrypted content recorded on a recording medium and playing the decrypted content. If key generation information is “00”, a key control unit | 05-12-2011 |
20110150216 | SELECTIVE SWITCHING BETWEEN DATA SOURCES - A sink may be to used to process multimedia digital data. The sink may include a plurality of input ports, an output port, a switchably-enabled selector to select an input port from a plurality of HDMI input ports to couple to an output port, a control circuit to detect encrypted data in a channel of the input ports; and a plurality of decryption engines. Each of the decryption engines may be coupled to respective input ports to synchronize with a corresponding encryption engine of a data source after the control circuit detects encrypted data in the channel of the respective input port. Additional circuitry may be included to operate the sink in a power saving mode. Also, methods for processing the data in both power saving and non-power saving modes. | 06-23-2011 |
20110228931 | DISPERSAL OF PRIORITY DATA IN A DISPERSED STORAGE NETWORK - A method begins by a processing module encoding data into a plurality of sets of encoded data slices in accordance with first error coding dispersal storage function parameters and determining priority data segments of the data. The method continues with the processing module encoding the priority data segments in accordance with second error coding dispersal storage function parameters to produce a plurality of sets of priority encoded data slices. The method continues with the processing module outputting the plurality of sets of encoded data slices and the plurality of sets of priority encoded data slices to a dispersed storage network memory for storage therein. | 09-22-2011 |
20110280398 | SECURED CONTENT DISTRIBUTION SYSTEM - The illustrative embodiments described herein provide a computer implemented method, apparatus, and computer program product for securing streaming electronic media. A playback device is authenticated for receiving encrypted electronic media from a content server. The encrypted electronic media received by the playback device is decrypted to form decrypted electronic media. The decrypted electronic media is imprinted with a set of watermarks to form imprinted electronic media. An output of the imprinted electronic media is secured using at least one of high-bandwidth digital content protection or analog copy protection. | 11-17-2011 |
20110317830 | SELECTIVE STORAGE OF DATA REPRESENTATIVE OF DECRYPTED VIDEO CONTENT - A method of processing video content is provided. In the method, a stream of encrypted video content is received. The encrypted video content stream is decrypted. Storage of an entirety of the decrypted video content for an indefinite period of time is prohibited under a license required to decrypt the encrypted video content. The stream of decrypted video content is processed to generate data representative of at least one aspect of the decrypted video content, wherein storage of the representative data does not violate the license. The representative data is then stored for at least one use other than viewing the entirety of the decrypted video content. | 12-29-2011 |
20110317831 | PROTECTING VIDEO CONTENT USING VIRTUALIZATION - Generally, the present disclosure provides a system and method configured to prevent unauthorized copying of video content in a mobile device. The method may use virtualization technology to prevent unauthorized copying of the premium video content. A user OS may operate in a virtual machine. A hypervisor may be configured to prevent an application and/or a corrupted OS from reading premium video content from video memory. The hypervisor may be configured to prevent direct memory access to the video content in the video memory. | 12-29-2011 |
20110317832 | Dynamic Image Reproduction Code Generation Device, Dynamic Image Distribution System, Execution Format Program, Recording Medium Containing The Program, Server, And Dynamic Image Reproduction Code Generation Method - A video reproduction code generation device has: a data acquisition unit which acquires video data; a code acquisition unit which acquires video reproduction template code configured to enable reproduction of video data stored in a variable in code; and a code generation unit, which divides the acquired video data into two or more data parts, embeds the data parts into the acquired video reproduction template code as variable values of different variables, and generates dedicated video reproduction code for the acquired video data. | 12-29-2011 |
20120039467 | METHOD AND SYSTEM FOR AUTOMATICALLY DETECTING MEDIA AND IMPLEMENTING INTERACTION CONTROL THEREON - A method for automatically detecting media and implementing interaction control thereon. The present method receives a media change notification (MCN) from a non-defeatable autorun. After receiving the MCN of a media event an operation is automatically executed. The operation then initiates a controller for controlling interaction of deliverable electronic media from a media file corresponding to the media event, wherein the receiving, executing, and controlling are automatically implemented and cannot be defeated by a user. | 02-16-2012 |
20120045052 | Theft deterrence of motion picture films employing damaged-video files - A method and apparatus for deterrence of the theft of video files is described. A partial file is downloaded such that it does not contain all of the necessary information to run the file. When a user wants to purchase the file, the difference between the working and non-working file is downloaded to the user. A randomized and watermark overlaid on the file. The watermark is unique to the purchased file, so that if anyone attempts to illegally copy it, both the fact that the file is illegally copied and the user who owned the file legally can be determined. | 02-23-2012 |
20120057700 | PROTECTING VIDEO CONTENT USING VIRTUALIZATION - Generally, the present disclosure provides a system and method configured to prevent unauthorized copying of video content in a mobile device. The method may use virtualization technology to prevent unauthorized copying of the premium video content. A user OS may operate in a virtual machine. A hypervisor may be configured to prevent an application and/or a corrupted OS from reading premium video content from video memory. The hypervisor may be configured to prevent direct memory access to the video content in the video memory. | 03-08-2012 |
20120163595 | METHOD AND SYSTEM FOR PROVIDING LAYERED ACCESS CONTROL FOR SCALABLE MEDIA - An encryption method for providing layered access control for scalable media includes encrypting the scalable media using different encryption keys for respective layers of the scalable media to create a protected content; providing the protected content to a first user terminal; selectively inserting part or all of the encryption keys into a key area of a right object based on the grade of the first user terminal to generate a first right object; and providing the first right object to the first user terminal. | 06-28-2012 |
20120237028 | MISSION PLANNING INTERFACE FOR ACCESSING VEHICLE RESOURCES - In an aspect, the invention features a method for mission planning The method includes displaying a graphical representation of a geographical area and displaying a graphical representation of one or more regions within the geographical area. The method also includes accepting a specification of geographical regions from a user, accepting a specification of a set of one or more receivers from the user, and accepting a specification of resource access rights associated with the specific one of the geographical regions from the user. The method also includes remotely causing access to a vehicle's resources to be provided or denied to the specified set of one or more receivers based on their association with the specific one of the geographical regions specified by the user when the vehicle is within the specific one of the geographical regions specified by the user. | 09-20-2012 |
20120321080 | TV Receiver Device with Multiple Decryption Modes - A digital television receiver device supporting two or more different conditional access systems has a content receiver that obtains an encrypted content stream and a processor. A content stream decrypter decrypts an encrypted content stream for conditional access or copy protection from at least one of the following interfaces: an interface to a CableCARD, an interface to a Common Interface Module consumer replaceable module for use with conditional access key management and content stream conditional access decryption and content stream copy protection re-encryption, and at least one of the following interfaces: an interface to a USB2 compatible consumer replaceable module, an interface to an enhanced SIM consumer replaceable card. Other variations are disclosed. This abstract is not to be considered limiting, since other embodiments may deviate from the features described in this abstract. | 12-20-2012 |
20120321081 | Identification of a Compromised Content Player - A system and method for identifying the player that leaked content encryption keys by loading a set of player keys into individual content players and determining the number of encryptions and the number of encryption keys to use in multiple encrypting critical content. The method produces copies of critical data content packets, each copy of which is separately encrypted using any one of a set of encryption keys that are related to one another through a mathematical algorithm. The related set of encryption keys and data describing key relationship and content player identity are transmitted to a previously determined license management agency. The transmitted encrypted content is written to a receiving device or file, or streamed to an individual player for non-synchronous playback. This abstract is not to be considered limiting, since other embodiments may deviate from the features described in this abstract. | 12-20-2012 |
20130101115 | METHOD, APPARATUS, AND SYSTEM FOR PROCESSING AND DELIVERING MEDIA CONTENT - A method for facilitating the live broadcast of special events includes receiving an equipment rental request, dispatching the equipment including a live media transmitter, receiving a live digital video transmission from the live media transmitter, watermarking the live digital video transmission, and transmitting the live digital stream. A method includes initiating a video conference between a media content coordinator and a media content owner, thereby memorializing a media content distribution agreement, including a record of the conference and electronic signatures formalizing the agreement. A user interface includes a rotatable globe for selecting a country or region of interest to access digital media content from the area of interest. A live media transmitter | 04-25-2013 |
20130129089 | INFORMATION PROCESSING APPARATUS, INFORMATION STORAGE APPARATUS, INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING METHOD, AND PROGRAM - An information storage apparatus includes a storage unit configured to store an encrypted content and an encryption key to be applied to decryption of the encrypted content, the storage unit including a protected area in which a converted encryption key is stored and to which access restrictions are set, the converted encryption key being a data item acquired through conversion of the encryption key, and a general purpose area storing the encrypted content and an encrypted content signature file set correspondingly to the encrypted content, the encrypted content signature file containing, as a recorded data item, a block identifier indicating in which of areas in the protected area storage of the converted encryption key is permitted, to permit a reproducing apparatus to execute content reproduction possibility judgment applying the block identifier, the reproducing apparatus being configured to read the encrypted content from the storage unit and execute a reproducing process. | 05-23-2013 |
20130272522 | DIGITAL VIDEO PROTECTION FOR AUTHENTICITY VERIFICATION - A method for verifying the authenticity and integrity of an ordered sequence of digital video frames, without having access to the original recording, by embedding therein a respective series of digital signatures based on a secret key, or keys, and on the video content of respective frames. Signatures are camouflaged by embedding in transform coefficients of a transformed representation of the video data in parts of the frame corresponding to motion. If there is sufficient motion to contain all of the signature bits, a supplementary technique embeds in high-texture areas of a frame. A final fall-back is to embed in a pre-defined default zone. A method of predicting when supplementary embedding is needed enables the process to be applied in a single pass allowing real-time operation. Verification is done during decoding by comparing, for identity, embedded signatures with signatures calculated anew using the method employed to embed. | 10-17-2013 |
20140037090 | SYSTEM AND METHOD OF DIGITAL RIGHTS MANAGEMENT - A method and a system of digital right management on a computer system. Protected video content is decrypted where encoded frames of data are buffered and overwritten after decoding to prevent the unauthorized copying. The system includes a software client that has a user identifiable key for tracing any unauthorized copying of the client and decrypted video file. | 02-06-2014 |
20140064484 | METHODS AND APPARATUS FOR PERSISTENT CONTROL AND PROTECTION OF CONTENT - A novel method and apparatus for protection of streamed media content is disclosed. In one aspect, the apparatus includes control means for governance of content streams or content objects, decryption means for decrypting content streams or content objects under control of the control means, and feedback means for tracking actual use of content streams or content objects. The control means may operate in accordance with rules received as part of the streamed content, or through a side-band channel. The rules may specify allowed uses of the content, including whether or not the content can be copied or transferred, and whether and under what circumstances received content may be “checked out” of one device and used in a second device. The rules may also include or specify budgets, and a requirement that audit information be collected and/or transmitted to an external server. In a different aspect, the apparatus may include a media player designed to call plugins to assist in rendering content. A “trust plugin” is disclosed, along with a method of using the trust plugin so that a media player designed for use with unprotected content may render protected content without the necessity of requiring any changes to the media player. In one aspect, the streamed content may be in a number of different formats, including MPEG-4, MP3, and the RMFF format. | 03-06-2014 |
20140146968 | Enabling/Disabling Display Data Channel Access to Enable/Disable High-Bandwidth Digital Content Protection - A switcher device comprises a multiplexer coupled in-between at least one input and output cards. The multiplexer detects the presence of an event signal from an activated sink. In response to the detection of the event signal, a processor changes an address of an HDCP receiver from a first address to a second address for enabling the at least one source to authenticate with the input card and enabling the output card to authenticate with the at least one sink for security protocol encryption. In response to the non-detection of the event signal, the processor changes the address of an HDCP receiver from the second address to the first address for disabling the at least one source from initiating a first authentication with the input card, therefore the output card also does not attempt to initiate a second authentication with the at least one sink for security protocol encryption. | 05-29-2014 |
20140177833 | DOWNLOADABLE SECURITY AND PROTECTION METHODS AND APPARATUS - Methods and apparatus for control of data and content protection mechanisms across a network using a download delivery paradigm. In one embodiment, conditional access (CA), digital rights management (DRM), and trusted domain (TD) security policies are delivered, configured and enforced with respect to consumer premises equipment (CPE) within a cable television network. A trusted domain is established within the user's premises within which content access, distribution, and reproduction can be controlled remotely by the network operator. The content may be distributed to secure or non-secure “output” domains consistent with the security policies enforced by secure CA, DRM, and TD clients running within the trusted domain. Legacy and retail CPE models are also supported. A network security architecture comprising an authentication proxy (AP), provisioning system (MPS), and conditional access system (CAS) is also disclosed, which can interface with a trusted authority (TA) for cryptographic element management and CPE/user device authentication. | 06-26-2014 |
20140211941 | SOURCE DEVICE, CONTENT PROVIDING METHOD USING THE SOURCE DEVICE, SINK DEVICE AND CONTROLLING METHOD OF THE SINK DEVICE - A source device for transmitting content to a sink device is provided. The source device may include an interface configured to perform high-bandwidth digital content protection (HDCP) authentication with the sink device, and a controller configured to determine an HDCP version supported by the sink device, convert the content so as to be encrypted in the HDCP version supported by the sink device in response to a determination that another HDCP version applied to the content is not supported by the sink device, encrypt the converted content in the HDCP version supported by the sink device, and control the interface to transmit the content to the sink device. | 07-31-2014 |
20140270166 | MASTER KEY ENCRYPTION FUNCTIONS FOR TRANSMITTER-RECEIVER PAIRING AS A COUNTERMEASURE TO THWART KEY RECOVERY ATTACKS - A method operational on a receiver device for exchanging and/or generating security keys is provided. A first encrypted master key Km is received at the receiver device from a transmitter device, the first encrypted master key Km secured by a receiver public key Kpub-rx. The first encrypted master key Km may be decrypted with a receiver private key Kpri-rx to obtain the master key Km. The master key Km may be encrypted using a block cipher that applies a receiver secret key Kh to obtain a second encrypted master key. | 09-18-2014 |
20140270167 | VIDEO DATA DELIVERY PROTECTION - An aspect of the subject matter described in this specification can be embodied in one or more computer-implemented methods that include obtaining a master playlist document including references to sub-playlist documents that reference video documents of different video quality for use in a video streaming on demand system, parsing the master playlist document to extract the references, digitally signing the references, generating a protected master playlist document from the digitally signed references, and providing the protected master playlist document for use in the video streaming on demand system. | 09-18-2014 |
20140341376 | METHOD AND APPARATUS FOR AUTOMATICALLY OBTAINING DIGITAL CINEMA DECRYPTION KEYS - A method and system are disclosed for providing decryption key information in a digital cinema package. Information relating to at least the source of a decryption key is included in the digital cinema package. | 11-20-2014 |
20150010150 | SIGNAL SECURITY IN A SATELLITE SIGNAL DISTRIBUTION ENVIRONMENT - Certain embodiments provide a set top box, comprising: a processing entity configured to obtain data for a channel stacking switch, to obtain a security data element and to formulate a message for the channel stacking switch by combining the security data element with the data; a communications interface configured to send the message to channel stacking switch. Other embodiments provide a channel stacking switch, comprising: a communication interface configured to receive a message from a set top box; a processing entity configured to determine whether or not the message is legitimate and to take an action that depends on whether or not the message is legitimate. Still further embodiments provide a satellite signal receiving system comprising a channel stacking switch and at least one set top box in secure communication with the channel stacking switch. | 01-08-2015 |
20150317461 | METHOD OF DISTRIBUTING A DECRYPTION KEY IN FIXED-CONTENT DATA - Secondary content in encrypted for distribution to client terminals by selecting at least a portion of raw encrypted audio-video data (REAVD) that is provided on a media article as an encryption key, encrypting secondary content using the encryption key, and storing encrypted secondary content at a remotely located host. The media article can then be used for providing access to the encrypted secondary content to client terminals by receiving encrypted secondary content at a client terminal, extracting a decryption key from a media article encoded with REAVD, the decryption key being determined by at least a portion of the REAVD, using the decryption key to decrypt the secondary content, and outputting the decrypted secondary content from the client terminal. | 11-05-2015 |
20160191954 | AUTOMATED VIDEO CONTENT PROCESSING - Video content is processed for delivery using an automated process that allows for convenient packaging of encrypted or digital rights management (DRM) protected content in a manner such that the packaged content can be efficiently stored in a content delivery network (CDN) or other content source for subsequent re-use by other media clients without re-packaging, and without excessive storage of unused content data. | 06-30-2016 |
20180027267 | SOURCE DEVICE, CONTENT PROVIDING METHOD USING THE SOURCE DEVICE, SINK DEVICE AND CONTROLLING METHOD OF THE SINK DEVICE | 01-25-2018 |
380202000 | Having origin or program ID | 4 |
20080279376 | SYSTEM, METHOD, AND SERVICE FOR PERFORMING UNIFIED BROADCAST ENCRYPTION AND TRAITOR TRACING FOR DIGITAL CONTENT - A unified broadcast encryption system divides a media key tree into S subtrees, divides digital content into segments, and converts some of the segments into variations; the number of segments and variations is q. The system subdivides each of the subtrees into q/|S| subdivided subtrees, assigns a key media variant to each of the subdivided subtrees, and generates a unified media key block (MKB | 11-13-2008 |
20090232303 | Copy Protection Method for Digital Data Stored on a Medium - A method of protection against the copying of digital data stored on an information carrier envisages, on the basis of a first identification of an encryption of the digital data and of a second identification of a watermarking of digital data, the determination of a first mark if it has been possible to identify the encryption and the watermarking. A third identification of a type of the information carrier is followed by the determination of a second mark if it has been possible to determine the first mark and if has been possible to identify a determined type of information carrier. A fourth identification of cryptographic signature data accompanying the digital data is followed by the determination of a third mark if it has been possible to determine the second mark and if it has been possible to identify a cryptographic signature datum. A permission for digital copying of the digital data is delivered if it has been possible to determine the third mark | 09-17-2009 |
20090245514 | FORENSIC DECRYPTION TOOLS - Providing authorized copies of encrypted media content including: receiving application for authentication to make copies of the media content; providing forensic decryption tools to process the media content; transmitting a permission to make copies of the media content using the forensic decryption tools; performing authorized decryption of the media content; and making and forensically marking copies of the decrypted media content. | 10-01-2009 |
20100067692 | PICTURE-BASED VISIBLE ANTI-PIRACY SYSTEM AND METHOD FOR DIGITAL CINEMA - A system and method for generating and processing forensic information for digital cinema content in an efficient and cost-effective manner while maintaining the integrity and quality of the digital cinema images. Customized forensic content, which includes at least one of visible pictorial and text data, is generated for display with corresponding digital cinema content. The digital cinema content is analyzed for determining at least one of a location and time for incorporating the forensic content with the digital cinema content. Real-time information is incorporated into the customized forensic content, the real-time information including data indicating, e.g., at least one of an actual time, date and location pertaining to each actual showing of the digital cinema content. The customized forensic content having real-time information is unobtrusive yet easily and quickly detectable and decipherable during forensic analysis. | 03-18-2010 |
380203000 | Having copy protect signal | 11 |
20080219442 | Information processing apparatus and method, and a program - Disclosed herein is an information processing apparatus that processes an encrypted content. The apparatus includes a control section configured to control the following processes, such as a generation process, a moving range determination process, a holding process, a copying process, and an inactivation process. Such processes are to be performed independently in a specified order as a process for achieving moving out of at least a part of the encrypted content from a moving source to a moving destination. | 09-11-2008 |
20090268907 | Optical Media Recording Device for Protecting Device Keys and Related Method - To protect device keys, an optical media recording device capable of performing AACS encryption on data does not have any device keys, and the optical media recording device performs AACS encryption by activating recording software stored in a memory the optical media recording device, and utilizing a pre-calculated media key stored in the memory of the optical media recording device to perform AACS encryption on the data. | 10-29-2009 |
20090290710 | UNLOCKING A PROTECTED PORTABLE STORAGE MEDIUM - The invention relates to a method, a media player ( | 11-26-2009 |
20090316890 | TEXT BASED ANTI-PIRACY SYSTEM AND METHOD FOR DIGITAL CINEMA - A system and method for generating and processing forensic information for digital cinema content in an efficient and cost-effective manner while maintaining the integrity and quality of the digital cinema images. Customized forensic content, which includes hidden anti-camcorder text data, is generated for display with corresponding digital cinema content. Real-time information is incorporated into the customized forensic content. The real-time information includes textual data in hidden form indicating, e.g., at least one of an actual time, date and location pertaining to each actual showing of the digital cinema content. The customized forensic content having real-time information is virtually undetectable in authorized copies yet easily and quickly detectable and decipherable in pirated copies during forensic analysis. | 12-24-2009 |
20090316891 | CONTENT REPRODUCTION APPARATUS, RECORDING APPARATUS, RECORDING AND REPRODUCTION APPARATUS, AND REPRODUCTION METHOD - In an apparatus of reproducing contents in which an encryption key is to be changed at predetermined intervals for copyright protection purpose, the contents can be reproduced or specially reproduced with no problem such as fast forward, and fast rewind. For special reproduction, data and key information needed therefor are made ready in advance, and using the data and the key information, the contents are specially reproduced. Alternatively, an encryption key generation rule is defined in advance for use in generation of an encryption key. By making any needed key information ready in advance from this rule, the contents can be reproduced and specially reproduced with no problem. | 12-24-2009 |
20100290620 | METHOD AND APPARATUS FOR MODIFYING A SUBSEQUENTLY GENERATED CONTROL COMMAND IN A CONTENT CONTROL SYSTEM - In record or content control management systems, various selected reference, record control, copy protection or control information signals, or other signifiers, are used to identify control signals, for example, bits, to provide control of subsequent use of data, audio and video signals in the analog and digital domain. Method and apparatus are disclosed for modifying the effects of a content control system as well as for modifying an effect of a copy protection signal. To this end, the reference, record control, copy protection signals, or other control information signals, e.g., content control signals, may be modified to cause an erroneous or unintended reading subsequently of the reference or control signals which in turn correspondingly afters the control command of the record or content control system. Further, where a copy protection signal is being used as a control signal, a modification may be made to the copy protection signal to alter the subsequently generated control command while still maintaining copy protection effects in the analog domain and allowing recording in the digital domain. Also, included are unique methods for providing content control. | 11-18-2010 |
20120224688 | ENFORCING SOFTWARE INDEPENDENT CONTENT PROTECTION IN AN ELECTRONIC DEVICE - A Set Top Box (STB) or client computer includes a communication interface operable to receive digital messages and digital content, memory operable, and processing circuitry coupled to the communication interface and to the memory. The STB is operable to receive a digital message, extract a key portion from the digital message, decrypt the key portion, descramble the digital content using the decrypted key portion, extract a rights portion from the digital message, decrypt the rights portion, determine protected and unprotected digital content based upon the rights portion, write the unprotected digital content to an unprotected portion of the memory, and write the protected digital content to a protected portion of the memory. The decrypted key portion may include a plurality of Program IDs (PIDs) and the decrypted rights portion may include protection data for each PID. A security processor may prevent a central processing unit from accessing the protected portion of the memory. | 09-06-2012 |
20160004847 | ELECTRONIC DEVICE AND METHOD OF TRANSMITTING CONTENT ITEM - According to one embodiment, an electronic device includes a content transmitter. The content transmitter is configured to output a content item including first data and second data to one transmission path, by applying a first copyright protection system to copyright protection of the first data and applying a second copyright protection system to copyright protection of the second data. The first copyright protection system involves encryption of data to be copyright-protected. The second copyright protection system involves no encryption of data to be copyright-protected. | 01-07-2016 |
20160098544 | IMAGE PROCESSING APPARATUS AND CONTROL METHOD THEREOF - An image processing apparatus includes: a signal receiver configured to receive an encrypted image signal; a storage configured to temporarily store the encrypted image signal received in the signal receiver; a signal decryptor configured to convert the encrypted image signal into a decrypted image signal by decrypting the encrypted image signal output from the storage with a preset first secret key; and a decoder configured to decode the decrypted image signal output from the signal decryptor to be displayed an image. | 04-07-2016 |
20160165267 | INFORMATION PROCESSING METHOD, INFORMATION PROCESSOR, AND RECORDING MEDIUM - A method includes: holding a device key provided to an information processing terminal; reading an encrypted content and conversion control information from a recording medium; decoding the read encrypted content using the held device key to obtain a decoded content; converting the decoded content into an export format to obtain an export content; generating playback right information indicating that the information processing terminal can play back the converted export content according to the read conversion control information; and controlling whether the playback right information can be generated according to a first flag. | 06-09-2016 |
20160191993 | SOURCE IDENTIFICATION FOR UNAUTHORIZED COPIES OF CONTENT - Systems and methods for authentication generate keys from secret credentials shared between authenticating parties and authenticators. Generation of the keys may involve utilizing specialized information in the form of parameters that are used to specialize keys. Keys and/or information derived from keys held by multiple authorities may be used to generate other keys such that signatures requiring such keys and/or information can be verified without access to the keys. Keys may also be derived to form a hierarchy of keys that are distributed such that a key holder's ability to decrypt data depends on the key's position in the hierarchy relative to the position of a key used to encrypt the data. Key hierarchies may also be used to distribute key sets to content processing devices to enable the devices to decrypt content such that sources or potential sources of unauthorized content are identifiable from the decrypted content. | 06-30-2016 |
380204000 | Modifying sync signal | 1 |
20100054469 | Method and apparatus for synthesizing copy protection for reducing/defeating the effectiveness or capability of a circumvention device - A new copy protection signal includes resistance to certain circumvention devices and includes improved playability. The new copy protection signal causes the certain circumvention devices to pass substantially the copy protection effects to a video recorder or to allow for content control effectiveness on a compliant device. The new copy protection signal also causes the circumvention device to add or enhance copy protection effectiveness, which is contrary to the circumvention device's original intent of removing or reducing copy protection effectiveness. The new copy protection signal is provided by inserting or adding one or more pseudo sync pulses or one or more pseudo sync/AGC pulse pairs immediately after, or one line after, a vertical sync signal in at least one television line. | 03-04-2010 |