Class / Patent application number | Description | Number of patent applications / Date published |
380205000 | Video electric signal masking | 18 |
20080205643 | Method and Apparatus for Distribution and Synchronization of Cryptographic Context Information - Method and apparatus for distribution and synchronization of cryptographic context information is described. An aspect of the invention relates to synchronizing an encryptor and key management logic in a video distribution system. A request message is received from the encryptor. The request message includes authentication data and stream-dependent parameters associated with an internet protocol (IP) packet stream to be encrypted. Authenticity of the encryptor is verified using the authentication data. A cryptographic context for the IP packet stream is generated having the stream-dependent parameters and at least one encryption key. A reply message is sent to the encryptor having the at least one encryption key. Key stream messages having the cryptographic context are distributed towards user devices. The user devices are receiving an encrypted version of the IP packet stream generated by the encryptor. | 08-28-2008 |
20090074184 | Controlling Data Routing in Integrated Security Systems - An integrated security system integrates broadband and mobile access and control with conventional security systems and premise devices to provide a tri-mode security network having remote connectivity and access. The integrated security system delivers remote premise monitoring and control functionality to conventional monitored premise protection and complements existing premise protection equipment. The integrated security system integrates into the premise network and couples wirelessly with the conventional security panel, enabling broadband access to premise security systems. Automation devices can be added, enabling users to remotely see live video or pictures and control home devices via a personal web portal or other client device. Camera management enables automatic configuration and management of cameras in the premise network. The camera management extends to remote control and monitoring from outside the firewall of the premise network to include routing of images or video from a streaming source device to a requesting client device. | 03-19-2009 |
20090147952 | SYSTEM AND METHOD FOR THE DISPLAY OF SCREEN APPARATUS CONTENT OVERLAYED ON PROTECTED CONTENT - A system and method for the display of screen apparatus content overlayed on protected content is described. An embodiment of a system may include a device connected to a network. The device receives and stores screen apparatus content. The device also receives protected content that is not being altered by a user. The device displays the stored screen apparatus content overlayed on the protected content via a user interface on a display device without altering the protected content by the user. Other embodiments are described and claimed. | 06-11-2009 |
20090208008 | DIGITAL WATERMARKING WITH SPATIOTEMPORAL MASKING - Visually imperceptible distortion, from watermarking or compression, desired for embedding into frames of a video sequence is computed. Within each spatiotemporal region of the frames, points are counted, which have feature information amplitude that at least equals the desired distortion. In each region, a fraction of the points with magnitudes at least equal to desired distortion is determined, in relation to the total number of points and compared to a threshold. Regions with fractions at least equal to the threshold are identified. Visual aspects of features in the identified regions are analyzed for salience related to drawing visual attention. The salience is compared to a threshold. Identified regions that do not exceed the salience threshold may be selected as candidates for hiding the watermark. Spatial and temporal contrast values may relate to the salience, as well as luminance values computed therewith. | 08-20-2009 |
20100040228 | PERSONALIZED MARKING FOR PROTECTING DIGITAL AUDIOVISUAL STREAMS - A process for distributing a video stream to a multitude of destinations including marking by adding to the video stream at least a visual element such that the marking is applied to an original video stream common to selected recipients, and personalized for a least portion of the recipients by addition of a visual element specific to destination equipment. | 02-18-2010 |
20100208891 | METHOD AND SYSTEM FOR THE SECURE DISTRIBUTION OF AUDIOVISUAL DATA BY TRANSACTIONAL MARKING - A process for distributing a marked audiovisual sequence from a nominal audiovisual sequence towards a receiver, said nominal audiovisual sequence having a nominal content, comprising: generating a marked audiovisual sequence according to a first mark applied to initial content at marking positions; generating a modified stream having a modified content different from the nominal content at least at marking positions; generating a complementary stream so that it is possible to reconstitute the marked audiovisual sequence from the modified stream; and transmitting the modified stream and the complementary stream towards the receiver wherein, on the receiver, a reconstitution of the audiovisual sequence, comprises calculating new complementary data according to the marking positions and the complementary stream so that it is possible to create an audiovisual sequence marked with a second mark from the modified stream, wherein the second mark, being different from the first mark, is applied to the initial content at the marking position. | 08-19-2010 |
20110228932 | DATA TRANSMISSION CIRCUIT - A data transmission circuit analyzes video data and a pixel clock input from a video/audio signal processor, and determines whether the signals are valid or not. If a signal is invalid, the data transmission circuit generates and outputs a TMDS signal based on dummy video data and a dummy pixel clock internally generated as pseudo signals. Accordingly, a state in which an invalid signal is being output can be prevented, and the time required to output video can be reduced because an additional device authentication is not performed. | 09-22-2011 |
20120002809 | Video Slice and Active Region Based Multiple Partial Encryption - A television set-top box has a receiver receiving a digital television signal comprising: a plurality of unencrypted packets and a plurality of encrypted packets, where the encrypted packets carry data describing an active region of a video frame. A decrypter decrypts the encrypted packets. A decoder decrypted packets to produce a signal suitable for play on a television set. This abstract is not to be considered limiting since other embodiments can include more, fewer or different features than those described in this abstract. | 01-05-2012 |
20120027207 | COMPOSITE MASKING SYSTEM AND METHOD FOR IMPROVING INVISIBILITY OF HIGH-DEFINITION VIDEO WATERMARKING - A composite masking system and method for improving the invisibility of high-definition video watermarking. The composite masking system includes a watermark generation module, a mask generation module, and watermark embedment means. The watermark generation module generates a basic watermark pattern using a private key, and generate a watermark pattern by repeatedly extending the basic watermark pattern. The mask generation module generates a Noise Visibility Function (NVF) mask using NVF masking means, an adaptive dithering mask using adaptive dithering masking means, and a contour mask using contour masking means. The watermark embedment means generates a composite mask by multiplying the NVF mask, the adaptive dithering mask and the contour mask together, multiplying the composite mask and the extended watermark pattern together, and embedding the result of the second multiplication in the luminance channel of an original image. | 02-02-2012 |
20120076296 | METHOD AND APPARATUS FOR A HIGH BANDWIDTH STREAM CIPHER - A method and apparatus for a high-bandwidth stream cipher. In one embodiment of the invention, the stream cipher has an output function that receives secret state bits from a block cipher and generates an encryption mask. In one embodiment of the invention, the encryption mask has a lesser or smaller number of bits than the secret state bits. The stream cipher uses the encryption mask to encrypt a video data stream to generate an encrypted video data stream. | 03-29-2012 |
20140064485 | METHOD FOR REAL-TIME COMPOSITING OF ENCRYPTED VIDEO STREAMS WITHOUT DECRYPTION - A system, method and device for real-time compositing of encrypted video streams without having to decrypt each video stream is disclosed herein. A shared encryption key is derived to encrypt multiple incoming video streams to an encrypted master video stream, while retaining full interoperability with popular incumbent video encryption standards. Compositing video is then possible without having to decrypt the master video stream, thereby preserving the security of the copyrighted material. The invention preferably genlocks a digital video source to a master video stream. | 03-06-2014 |
20140098954 | DIGITAL VIDEO PROTECTION FOR AUTHENTICITY VERIFICATION - A method for verifying the authenticity and integrity of an ordered sequence of digital video frames, without having access to the original recording, by embedding therein a respective series of digital signatures based on a secret key, or keys, and on the video content of respective frames. Signatures are camouflaged by embedding in transform coefficients of a transformed representation of the video data in parts of the frame corresponding to motion. If there is sufficient motion to contain all of the signature bits, a supplementary technique embeds in high-texture areas of a frame. A final fall-back is to embed in a pre-defined default zone. A method of predicting when supplementary embedding is needed enables the process to be applied in a single pass allowing real-time operation. Verification is done during decoding by comparing, for identity, embedded signatures with signatures calculated anew using the method employed to embed. | 04-10-2014 |
20140177834 | METHOD TO ENFORCE WATERMARKING INSTRUCTIONS IN A RECEIVING DEVICE - A method to enforce watermarking instructions by a security module in a receiving device, comprising the steps of receiving a security message by—a security module, comprising at least a content key, watermark instructions and security message signature, said watermark instruction activates or deactivates a watermarking module, decrypting—a security message with a transmission key, verifying—a security message signature, and in case of successful verification, reading a watermarking data from the watermarking module, verifying the authenticity of the watermarking data, and in case of successful verification, transmitting the watermark instructions to the watermark module and the content key to a descrambling module. | 06-26-2014 |
20140369500 | Utilizing data reduction in steganographic and cryptographic systems - The present invention relates to methods for protecting a data signal using the following techniques: applying a data reduction technique to reduce the data signal into a reduced data signal; subtracting the reduced data signal from the data signal to produce a remainder signal; embedding a first watermark into the reduced data signal to produce a watermarked, reduced data signal; and adding the watermarked, reduced data signal to the remainder signal to produce an output signal. A second watermark may be embedded into the remainder signal before the final addition step. Further, cryptographic techniques may be used to encrypt the reduced data signals and to encrypt the remainder signals before the final addition step. | 12-18-2014 |
20150063567 | METHOD FOR WATERMARKING A CONTENT - A method for preparing a content for watermarking is disclosed, wherein the content is available in different versions on a server for at least a client and wherein the different versions of the content are subdivided into temporally aligned chunks. The method comprises obtaining, for each version of the content, candidate locations for watermarking; determining a watermark payload bit insertion rate according to a minimum path, wherein the minimum path comprises, for all sets of temporally aligned chunks, the chunks with the smallest number of candidate locations; and generating watermark embedding metadata for each version of the content such that the watermark payload bit insertion rate is the same. A device for implementing the method and a non-transitory program storage device are also disclosed. | 03-05-2015 |
20170238030 | Systems and Methods for Saving Encoded Media Streamed Using Adaptive Bitrate Streaming | 08-17-2017 |
380208000 | Including filter for removing masking signal | 1 |
20120243682 | METHOD AND SYSTEM FOR TRANSMITTING DATA FROM A FIRST DATA PROCESSING DEVICE TO A SECOND DATA PROCESSING DEVICE - A method and a system for transmitting data from a first data processing device to a second data processing device, wherein the first data processing device has a display device. The second data processing device generates an encrypted input mask and transmits it to the first data processing device which displays it. The encrypted input mask is decrypted by being viewed through an optical filter having a decryption pattern, and the data to be transmitted are input to the first data processing device using the input mask that has been decrypted by the optical filter and are transmitted to the second data processing device. | 09-27-2012 |
380209000 | Masking signal selectively addressed | 1 |
20090003599 | SYSTEMS AND METHODS FOR PUBLISHING SELECTIVELY ALTERED SENSOR DATA IN REAL TIME - Systems and methods are provided for publishing selectively altered sensor data. One system includes a plurality of sensors coupled to a processor. The sensors are configured to generate data, and the processor is configured to fuse and publish a portion of the data from each of the plurality of sensors in a fused version of the data. Another system includes a sensor coupled to a processor. The sensor is configured to generate data and the processor is configured to modify the data to create a plurality of modified versions of the data. A method includes receiving data from at least one sensor, altering the data to create an altered version of the data, and publishing the altered version of the data in real time. | 01-01-2009 |