Inventors list

Assignees list

Classification tree browser

Top 100 Inventors

Top 100 Assignees


Video electric signal modification (e.g., scrambling)

Subclass of:

380 - Cryptography

380200000 - VIDEO CRYPTOGRAPHY

Patent class list (only not empty are listed)

Deeper subclasses:

Class / Patent application numberDescriptionNumber of patent applications / Date published
380239000 Encrypted code control signal 19
380216000 Image data converted to digital before modification 17
380211000 Interactive TV 11
380212000 Plural video stream multiplexing 10
380236000 Modifying accompanying audio signal 9
380240000 Including addressed decoder control signal 5
20120114121METHOD OF TRANSMITTING AND RECEIVING CONTENT - Provided is a method of transmitting and receiving content. The method includes (a) transferring, at a content server, a service key to a mobile terminal, (b) transferring, at the content server, a number to the mobile terminal, (c) scrambling, at the content server, content and transferring the scrambled content to the mobile terminal, (d) updating, at the mobile terminal, the service key on the basis of the number, and (e) descrambling, at the mobile terminal, the scrambled content using the updated service key.05-10-2012
20090190757EFFICIENT BROADCAST ENTITLEMENT MANAGEMENT MESSAGE DELIVERY MECHANISM USING A SCHEDULED DELIVERY WINDOW - Systems and methods include broadcasting an entitlement management message (EMM) in a communication system using a scheduled delivery window. The systems and methods including receiving a EMM broadcast window from a distribution system, listening for the EMM during the EMM broadcast window, and receiving the EMM from the distribution system during the EMM broadcast window.07-30-2009
20080273699SYSTEM FOR CONTROLLING THE TRANSMISSION OF MASS NOTIFICATIONS - A system for authorizing the mass distribution of a digital message includes a CPU configured to prepare in digital form a message from an initiator, and to distribute the message to a plurality of recipients and/or recipient contact devices. The CPU is further configured to associate with the message data sets selected by the initiator, and: To compare the data sets with a set of authorization criteria, whereby the CPU determines if an authorization threshold has been crossed. To distribute the message if no authorization threshold has been crossed. To wait for authorization if any authorization threshold has been crossed, and, thereafter: to distribute the message if authorization is provided; or to not distribute the message if authorization is not provided.11-06-2008
20080247544Authentication in an Audio/Visual System Having Multiple Signaling Paths - A method and structure for authentication in a system having devices capable of communicating via multiple signal paths. Authentication is carried out between first and second devices. A first device communicates with a second device over a first data signaling path of an interface between the first and second devices in a first portion of an authentication process. A second device communicates with the first device over a second data signaling path of the interface between the first and second devices in a second portion of the authentication process.10-09-2008
20090154698VIDEO PROCESSING SYSTEM FOR SCRAMBLING VIDEO STREAMS WITH DEPENDENT PORTIONS AND METHODS FOR USE THEREWITH - A video processing system includes a video encoder that encodes a video signal into a contiguous video stream having an independent portion and a dependent portion that requires the independent portion for decoding. A scrambling module scrambles the contiguous video stream to produce a scrambled video stream by scrambling the independent video portion and leaving the dependent portion unscrambled.06-18-2009
380231000 Usage or charge determination 3
20090316896METHOD FOR MANAGING THE NUMBER OF VISUALIZATIONS, SECURITY PROCESSOR AND TERMINAL FOR SAID METHOD - The invention relates to a method for managing the number of visualizations of an audiovisual content, that comprises: providing a table containing an equal number of cells and of time segments of the audiovisual content, each cell being associated in a bi-unique manner with a respective segment of the audiovisual content; when a segment of the audio-visual content is read, incrementing (12-24-2009
20120263297METHOD OF PROVIDING AN AUDIO-VIDEO DEVICE TO AN END USER - A semiconductor integrated circuit for the processing of conditional access television signals that includes an input interface for receiving encrypted television signals and an output interface for output of decrypted television signals. The semiconductor integrated circuit is provided with some functionality restricted in some way by preventing one or more hardware circuit elements from operating, such as an MPEG decoder, display engine, IO ports or main CPU. To enable the functionality, a subscriber must pay for a service and then receives an encrypted message broadcast to the semiconductor integrated circuit that is decrypted and instructs functionality to be turned on or off.10-18-2012
20090310780BROADCAST RECEIVING APPARATUS AND BROADCAST RECEIVING METHOD - Before a device key generation procedure is updated in response to execution of revoke, a recorded transport stream is decrypted using an unupdated device key and is stored in a memory unit after being re-encrypted. In this manner, broadcast programs that are recorded before the revoke can be viewed while maintaining a copyright protection function.12-17-2009
380221000 By modifying synchronizing signal 2
20110194689ENCRYPTED SIGNAL DETECTION CIRCUIT AND VIDEO DEVICE USING THE SAME - A video device includes a video signal generation circuit, an encrypted signal detection circuit and a central processing unit (CPU). The encrypted signal detection circuit detects encrypted messages in video signals output from the video signal generation circuit and outputs stable trigger control signals to the CPU, which includes an amplifier circuit, a separation circuit, a reverse circuit, a delay circuit and a trigger circuit. The video signals are amplified via the amplifier circuit and negative phase pulse signals are extracted from the video signals via the separation circuit. The reverse circuit converts the negative phase pulse signals to positive phase pulse signals that are delayed via the delay circuit. The trigger circuit outputs the stable trigger control signals based on the delayed positive phase pulse circuit.08-11-2011
20130083923Systems and Method for Determining Visual Media Information - A processor is configured to receive a digital video stream, calculate a hash of an I-Frame within the digital video stream, and submit the hash to a server. The processor is further configured to receive location information in response to submitting the hash to the server.04-04-2013
380220000 Carrier frequency conversion 1
20120008773PROVIDING CONTROL WORDS TO A RECEIVER - A method and a system of transmitting one or more control words to a receiver system is described, wherein the one or more control words are generated by a scrambling system for scrambling during a crypto period data packets in a service stream. The method involves transmission of at least one service stream and a stream of entitlement control messages associated with said service stream to the receiver system, each entitlement control message comprising at least one encrypted control word; and controlling the processing load of the receiver system by modifying the duration of said crypto period.01-12-2012
380227000 Record or coin controlled 1
20080279379Conditional Access Video Signal Distribution - A video signal distribution system contains a video stream source (11-13-2008
380213000 Chrominance scrambling 1
20090296929PROCESSING VIDEO CONTENT - A method for processing video content is disclosed. The method comprises: receiving, in a hardware device connected in operation to a computer, encrypted, encoded video content; decrypting the encrypted, encoded video content to form decrypted, encoded video content; decoding a first portion of the decrypted, encoded video content to form a decrypted, decoded video content portion; re-encrypting the decrypted, decoded video content portion to form a re-encrypted, decoded video content portion; re-encrypting a second portion of the decrypted, encoded video content to form a re-encrypted, encoded video content portion; and outputting the re-encrypted, decoded video content portion and the re-encrypted, encoded video content portion to the computer.12-03-2009
380218000 Variable time delay modulation of baseband video signal 1
20110243325DISPLAY SYSTEM, CONTROL APPARATUS, DISPLAY METHOD, AND PROGRAM - A display system includes display terminals (10-06-2011
Entries
DocumentTitleDate
20080267400Multiple partial encryption - A method of encrypting a digital television signal carried out in any operative order involves duplicating packets in the digital television signal so as to create first and second duplicate packets; encrypting the first duplicate packets according to a first encryption method to create first encrypted packets; encrypting the second duplicate packets according to a second encryption method to create second encrypted packets; identifying packets in the digital television signal that are of a packet type, while other packets are not of the packet type; replacing the identified packets in the digital television signal with corresponding first and second encrypted packets to produce a multiple partially encrypted digital television signal comprising the other packets that are unencrypted and the first and second encrypted packets; and distributing the multiple partially encrypted digital television signal. This abstract is not to be considered limiting as other embodiments may include more or fewer or differing elements than appear in the abstract.10-30-2008
20080219443APPARATUS AND METHOD FOR AN ITERATIVE CRYPTOGRAPHIC BLOCK - A method and apparatus for an iterative cryptographic block under the control of a CPU and without a fixed number of stages. In one embodiment, a first cryptographic block descrambles received information using an internal key or a preprogrammed key to form a descrambled key or descrambled data. A data feedback path stores the descrambled data as internal data and provides the internal data or the external data as data input to the first cryptographic block. A key feedback path stores the descrambled key as an internal key and provides the internal key or the preprogrammed key to a key input of the first cryptographic block. A second cryptographic block descrambles received content using a final descrambling key. Other embodiments are described and claimed.09-11-2008
20100046752System and Method for Security Processing Media Streams - A system for multi-stream security processing and distributing digital media streams includes a headend, a network, and at least one receiver. The headend is generally configured to generate encrypted digital media streams. The network may be coupled to the headend and configured to receive the encrypted digital media streams. The at least one receiver may be coupled to the network and configured to receive the encrypted digital media streams and present a decrypted version of the encrypted digital media streams. At least one of the headend and the at least one receiver include a security processor that may be configured to provide at least one of simultaneous multiple encryption and simultaneous multiple decryption processing of the digital media streams.02-25-2010
20090154697DIGITAL RIGHTS MANAGEMENT SYSTEM AND METHOD - A system and a method for providing variable security mechanisms for securing digital content, in which a single security mechanism is not used for all content. Instead, at least one characteristic or feature of the security mechanism is varied between units, instances or categories of content. Therefore, even if unauthorized access is gained to a single unit of content, the overall integrity and security of the system for content distribution is not compromised. Preferably, security is provided though a general mechanism, which is then varied in order to provide variable, dissimilar security schemes for different types of content. By “type of content”, it is meant any of a single unit of content, a single instance of content or a single category of content. For example, for a category of content, the content may be characterized according to the identity of the content itself, such as the title of a movie for example, and/or according to the owner of a particular copy of the content. Thus, different security schemes may optionally and preferably be generated from a particular root structure. Related apparatus and methods are also provided.06-18-2009
20130070923SERVER, CLIENT DEVICE, METHOD FOR GENERATING A TRANSPORT STREAM THEREOF AND PROCESSING THE TRANSPORT STREAM THEREOF - A method for generating a transport stream of a server is provided. The method for generating a transport stream of a server which sends broadcasting content to a client device comprises: scrambling broadcasting content by using a specific key; adding at least one content-encryption message which includes the specific key and a device key for obtaining the specific key from the at least one content-encryption message to the broadcasting content so as to generate a transport stream; and sending the generated transport stream to the client device.03-21-2013
20130058481FUZZY PROTECTION OF VISUAL CONTENT - A method and system for scrambling visual information are, described. An image, preferably in an incompressed format, is divided into a number of patterns having a different aspect ratio. Each pattern is mapped on a matrix i.e positioned on X and Y-axis. The patterns are then arranged in a different and new shape for e.g. a rectangle, preferably, fitting the size of manoblocks in a MPEG video, to that of the original shape of the image but having the same number of patterns or same area. The patterns of pixels are then relocated in the new shape and a matrix is again mapped for the new arrangement of patterns. A key is then generated comprising the information of the encrypted and earlier image. The player decrypts the encrypted visual content or image by means of the information provided by the key.03-07-2013
20110058669UNIQUE IDENTIFIER PER CHIP FOR DIGITAL AUDIO/VIDEO DATA ENCRYPTION/DECRYPTION IN PERSONAL VIDEO RECORDERS - The invention provides techniques to implement unique identifier for an integrated chip and how this ID can be employed to enhance the security of content in personal video recorder type systems. The storage device can be a hard disk, a removable storage medium or any other type of storage medium. An integrated circuit (IC) within the personal video recorder stores a unique identifier that is used in for encryption and decryption of data stored on the storage device. Several embodiments are disclosed herein that maintain the secrecy of the unique ID such that it is not easily accessible thereby defeating the security scheme.03-10-2011
20110013773USE OF COPYRIGHT TEXT IN KEY DERIVATION FUNCTION - Consistent with embodiments of the present invention, systems and methods are disclosed for deriving a secure key. In some embodiments, a method for deriving a key may be provided comprising: generating a first input value; loading a first register with the first input value; generating a second input value; loading a second register with the second input value; updating the first register and the second register at the same time, where the step of updating comprises: applying a first update function to the current value of the second register to determine a third input value; applying an XOR function to the third input value and a fixed string to determine a fourth input value, wherein the fixed string contains a legal notice; incrementing an offset to the fixed string; storing the fourth input value in the first register; applying a second update function to the current values of the first register and the second register to determine a fifth input value; storing the fifth input value in the second register; repeating the step of updating the first register and the second register a predetermined number of times; and outputting the value of the second register as the key.01-20-2011
20090232304PROGRAM EXECUTABLE IMAGE ENCRYPTION - The invention provides for a method of encrypting and executing an executable image, comprising; flagging sections of the executable image to be encrypted using commands in source files and compiling said executable images so as to generate object files, linking one or more of said executable images using a linker to produce a final executable image, passing said linked executable images to a post-linker encryption engine to encrypt a relocation fix-up patch table and sections of executable images flagged for encryption, and at load time decrypting relocating and executing the executable images.09-17-2009
20080298585Smartcard Dynamic Management - A method for securing a portable security module for use with a decoding element, the portable security module and the decoding element allowing to descramble scrambled audiovisual information. The method comprises analyzing at the portable security module a sequence of command messages, the command messages of the sequence being received at the portable security module at distinct times.12-04-2008
20120237029METHOD AND SYSTEM FOR MAINTAINING SECURE DATA INPUT AND OUTPUT - Methods and systems for enhancing the security of data during input and output on a client computer system are provided to prevent attempts by unauthorized code to access, intercept, and/or modify data. Example embodiments provide obfuscation techniques and security enhanced drivers that use these obfuscation techniques to prohibit unauthorized viewing/receiving of valid data. When the drivers are used together with the various obfuscation techniques, the security enhanced drivers provide mechanisms for “scheduling” the content of the storage areas used to store the data so that valid data is not available to unauthorized recipients. When unauthorized recipients attempt to access the “data,” they perceive or receive obfuscated data. The obfuscation techniques described include “copy-in,” and “replace and restore.”09-20-2012
20100014666Method and Apparatus for Protecting Scalable Video Coding Contents - Disclosed are a method and apparatus capable of reducing the computational complexity of encryption and decryption by encrypting only data of scalable video coding contents for each coding layer in terms of temporal, spatial, and SNR scalabilities to provide a service for protected scalable video coding contents, and capable of protecting contents by generating and distributing an encryption key for encryption and decryption depending on a class of a contents consumer.01-21-2010
20110293092SECURITY METHOD FOR PREVENTING THE UNAUTHORIZED USE OF MULTIMEDIA CONTENTS - A method embeds tracing secret data into multimedia contents delivered to particular users. The method descrambles a first scrambled video stream having alternate values to obtain a personalized video stream corresponding to an original video stream by a decoder comprising at least a security unit and a descrambling unit, the personalized video stream being obtained by restoring the alternate values by personalized values taking into account an internal parameter on the security unit and received control data containing the original values and their location in the modified stream.12-01-2011
20110293091Method and apparatus for decrypting encrypted content - The present invention provides a method for decrypting encrypted content transmitted from an operator to a plurality of users where said operator further provides security information allowing for the decryption of said content. The method has the advantage of satisfying the goal of providing the capability for detecting a fraudulent user who retransmits control words extracted from the security information to other users. The method provides for the achievement of the goal without incurring extra overhead in addition to the transmitted content and security information. The method makes use of control words which are based on multiple solutions provided by collisions in mathematical functions and involves the observation of choices of control words retransmitted by the fraudulent user.12-01-2011
20100260336HDCP VIDEO OVER USB - A system includes an HDCP-over-USB controller including an HDCP module for encrypting or decrypting video data according to an HDCP standard prior to transmission or display of said video data.10-14-2010
20100040229METHOD AND SYSTEM FOR TUNING TO ENCRYPTED DIGITAL TELEVISION CHANNELS - A method and system for tuning to a scrambled television channel is provided. One implementation involves receiving a channel selection from a user, tuning to the selected scrambled channel, checking a cache for Conditional Access (CA) descrambling information associated with the selected channel, and in case of a cache hit, then retrieving the descrambling information associated with the selected channel from the cache for descrambling the scrambled channel.02-18-2010
20100027791FUZZY PROTECTION OF VISUAL CONTENT - A method and system for encoding visual information are described. An image is divided in to n number of patterns. Each pattern is mapped on a matrix i.e positioned on X and Y-axis. The patterns are then arranged in a different and new shape for e.g. a rectangle, to that of the original shape of the image but having the same number of patterns or same area. The patterns of pixels are then relocated in the new shape and a matrix is again mapped for the new arrangement of patterns. A key is then generated comprising the information of the encrypted and earlier image. In order to decrypt the encrypted visual content or the encrypted image, the player reads the key or encrypted visual content and decrypts the encrypted visual content or image by means of the information provided by the key.02-04-2010
20110135090ELEMENTARY BITSTREAM CRYPTOGRAPHIC MATERIAL TRANSPORT SYSTEMS AND METHODS - Systems and methods for providing multimedia content from one process or component to another process or component over an unsecured connection are provided. One embodiment includes obtaining the cryptographic information, extracting the at least partially encrypted video data from the container file to create an elementary bitstream, enciphering the cryptographic information, inserting the cryptographic information in the elementary bitstream, providing the elementary bitstream to a video decoder, extracting the cryptographic information from the elementary bitstream at the video decoder, deciphering the cryptographic information, decrypting the elementary bitstream with the cryptographic information and decoding the elementary bitstream for rendering on a display device using the video decoder.06-09-2011
20090097646Digital Video Recorder Anti-Skip System - A method for producing scrambled content (FIG. 04-16-2009
20100246820MODULAR BROADCAST RECEIVER SYSTEM AND METHOD - The construction of a receiving apparatus for receiving a broadcast from a plurality of broadcasting providers is simplified. In a receiving apparatus for receiving a broadcast from a plurality of broadcasting providers, of the function blocks which constitute the receiving apparatus, a block used in common irrespective of the broadcasting provider is formed as a common block, and a block different from one broadcasting provider to another is formed as an independent block. These blocks are connected to each other through an IEEE1394 interface, and the common block is shared among the plurality of blocks which are not used in common, so that a receiving process is performed.09-30-2010
20090147953System and method for conditional access key encryption - A system for processing multimedia channels is described comprising: transmitting decryption keys for decrypting the multimedia channels, the keys encrypted in both a first encryption format and a second encryption format; the keys encrypted in the first encryption format being decryptable by a first type of multimedia receiver; and the keys encrypted in the second encryption format being decryptable by a second type of multimedia receiver.06-11-2009
20100128871METHOD AND SYSTEM FOR THE SECURED DISTRIBUTION OF AUDIOVISUAL DATA BY TRANSACTION MARKING - The application relates to a method for distributing a marked audiovisual sequence from a nominal audiovisual sequence, said nominal audiovisual sequence having a nominal content, wherein 05-27-2010
20110170688CLIENT-SIDE PROTECTION OF BROADCAST OR MULTICAST CONTENT FOR NON-REAL-TIME PLAYBACK - A system and method are disclosed for providing client-side protection of broadcast or multicast multimedia content for non-real-time playback. A set-top box function receives a request to record multimedia content and determines whether recording of the multimedia content is restricted. Upon receiving the multimedia content, the set-top box decrypts the multimedia content for real-time playback. If recording of the multimedia content is restricted, the set-top box re-encrypts the multimedia content and generates a packaged file including the re-encrypted multimedia content and one or more of a content identifier, a set-top identifier, a network reference to a copyright policy server, and a record policy of the multimedia content. The packaged file is either stored locally or transferred to remote storage. A remote system having access to the packaged file obtains the packaged file and enforces a copyright policy of the multimedia content before releasing the multimedia content for non-real-time playback.07-14-2011
20090185684MOTION PICTURE DISTRIBUTION SYSTEM AND RELATED METHOD - A motion picture distribution system, the system including a central computer, an exhibitor computer, a communication channel, and a back channel. The central computer is located at a central site and configured to distribute a digital version of the motion picture. The exhibitor computer is located at an exhibitor location that is remote from the central site. The exhibitor computer is configured both to receive the digital version of the motion picture from the central computer, and to display the motion picture. The communication channel is configured to facilitate the electronic transfer of the digital version of the motion picture from the central computer to the exhibitor computer. The back channel is coupled between the central computer and the exhibitor computer, and configured to allow for the transfer of information between the exhibitor computer and the central computer.07-23-2009
20090103727Sync-bit Insertion for Timing Reference Signals to Prevent Long Runs of Static Data in Serial Digital Interfaces - In accordance with the teachings described herein, systems and methods are provided for inserting 2-bit codes into the least significant bit positions of timing reference signal code words, to prevent long runs of zeros from entering the scrambling polynomial. By preventing the long runs of ones and zeros in the scrambled data stream, the receive-end DC-restoration circuits can be simplified, reducing complexity and increasing system performance. A serial digital interface prevents long runs of ones and zeros by replacing the values of the two least significant bits of the data stream prior to the scrambler. The two least significant bits are changed from 11b or 00b to 01b or 10b.04-23-2009
20100278339ENCRYPTION- AND DECRYPTION-ENABLED INTERFACES - Decryption apparatus includes an input memory (11-04-2010
20090169000Encryption device and medium, decryption device and method, data delivery device, data receiving device, and data delivery system - A data delivery device divides data representing a single entity into a plurality of data items, encrypts the data items, and delivers the encrypted data items to a data receiving device. The encryption device in the data delivery device includes a first encryptor that encrypts a first set of the data items, leaving a second set of the data items unencrypted. A storage unit stores the encrypted first set of data items and the unencrypted second set of data items, pending delivery to the data receiving device. A second encryptor encrypts the second set of data items in real time when they are taken from the storage unit and delivered to the data receiving device. By combining pre-encryption and real-time encryption, the encryption device attains a high level of security with only a moderate real-time processing load.07-02-2009
20080279377METHOD AND SYSTEM FOR SCRAMBLING MEDIA DATA IN REAL TIME - A method for scrambling media data in real time solves the problems of heavy load on related devices and high requirements on their performance when multiple scrambling components scramble the same media data and scrambling associated data need be generated for each scrambling component in the related art. The method includes: acquiring scrambling associated data including an ECM and sending it to scrambling components based on the media data to be scrambled, in which the multiple components that scramble the same media data share the same scrambling associated data; the scrambling components scramble media data by using the scrambling associated data. Embodiments of the invention also solve the problem of failure to effectively scramble programs demanded by subscribers in the VOD system in the related art. In addition, embodiments of the invention disclose a system for scrambling media data.11-13-2008
20080285751Deterring Theft of Media Recording Devices by Encrypting Recorded Media Files - Techniques are disclosed for deterring theft of media recording devices. Input received from a sensor, or some portion of the input, is encrypted prior to storing a media file. A decryption key must be provided when the media file is to be played back. If the key is not provided, then the file is preferably still played back, but is played back in a degraded manner. For example, a background color or other filler may be rendered in place of the encrypted portion. Additional parts of the file may also be degraded during playback. By making the playback unpleasant for the listener/viewer, theft of the recording device will be much less desirable—yet recording can continue uninterrupted, thereby minimizing disruption to legitimate users. The disclosed techniques may also be used to deter theft of the recorded media.11-20-2008
20090052668METHOD FOR PROVIDING A VIDEO SIGNAL AND DESCRAMBLE CARD AND VIDEO APPARATUS USING THE SAME - A method for providing a video signal, and a descramble card and a video apparatus using the same are disclosed. The video apparatus includes a first interface which receives a scrambled video signal, and outputs the scrambled video signal, a second interface which transmits the scrambled video signal to a storage medium connected with the video apparatus, and a controller which controls the first interface to transmit the scrambled video signal to the second interface. Accordingly, a personal video recorder (PVR) function is provided to a premium broadcast content.02-26-2009
20100135489Eliminating Plaintext Video from External Memory - In an embodiment, an integrated circuit comprises a decompressor, an encrypt unit, and an on-chip image buffer coupled to the decompressor and the encrypt unit. The decompressor is configured to receive a compressed video stream, and to reconstruct a first frame of the video stream in the on-chip buffer. The encrypt unit is configured to generate one or more pixel block streams from pixel blocks of the first frame in the on-chip buffer according to sequence data describing an order of access of the pixel blocks to reconstruct subsequent frames of the video stream. The sequence data was previously generated via processing of the video stream by the integrated circuit, and the encrypt unit is configured to encrypt the pixel block streams to be written to an external memory. In an embodiment, an integrated circuit comprises a decrypt unit configured to decrypt an encrypted, compressed video stream; an on-chip buffer; and a decompressor coupled to the decrypt unit and the on-chip buffer. The decompressor is configured decompress the video stream, and to store a first portion of each of a first plurality of frames decompressed from the video stream in the on-chip buffer. The decompressor is further configured to store a remaining portion of each of the first plurality of frames in an external memory, wherein each frame as stored in the external memory is incomplete because the first portion is not stored in the external memory.06-03-2010
20120195426DISPLAY WITH SECURE DECRYPTION OF IMAGE SIGNALS - A display securely decrypts an encrypted image signal. Pixels are disposed between the display substrate and cover in a display area, and provide light to a user in response to a drive signal. Control chiplets disposed between the display substrate and cover in the display area are each connected to one or more of the plurality of pixels. Each receives a respective control signal and produce respective drive signal(s) for the connected pixel(s). A decryption chiplet is disposed between the display substrate and cover. It includes means for receiving the encrypted image signal and a decryptor for decrypting the encrypted image signal to produce a respective control signal for each of the control chiplets.08-02-2012
20090190756Systems and Methods for Securing a Digital Communications Link - A digital data signal, such as a digital video signal, is intentionally pre-distorted before being sent over a network. In one embodiment, this pre-distortion may be performed in accordance with a pre-distortion pattern or algorithm which is shared with only intended receivers. The pre-distortion pattern may be used to vary the pre-distortion on a periodic basis, as frequently as on a symbol-by-symbol basis. The pre-distortion function may include distorting the phase and/or the amplitude of the digital signal's modulation.07-30-2009
20090185683ENCODING AND DETECTING APPARATUS - An encoding data processor generates a video material item marked copy by representing a payload data word as a code word embedded into a copy of the video material item. A preprocessor forms plural initial values having the same predetermined length, by representing one or more parts of the payload data word in one or more of the initial values, each including a field index, and setting remaining parts of the initial value to a predetermined value. An encryption processor receives each initial value and generates an encrypted data stream therefrom using a payload encryption key to provide plural encrypted data streams. The parts of the encrypted data streams are combined with frames of the material item. Plural initial values include the same part of the payload data, and a field index value for the initial value including the same payload data is changed with respect to other initial values.07-23-2009
20130121489System And Method For Providing Content Protection Of Linearly Consumed Content With A Bidirectional Protocol For License Acquisition - Embodiments may include a content provider system configured to provide electronic content that includes multiple encrypted content items to a playback device. A playback device may be configured to acquire root licenses and/or content licenses from a license server; such licenses may cryptographically protect the content items that a playback device receives from a content provider system. In various embodiments, the electronic content may be content that is to be linearly consumed, such as a channel within a broadcast environment. In various embodiments, the playback device may explicitly request a license for one or more of the content items that it receives; such request may be issued to a license server. The license server may evaluate the request and respond to the playback device with the license for a content item. In various embodiments, the playback device may utilize the received license to decrypt and consume the respective content item.05-16-2013
20090202072CONTROL MESSAGE PROCESSING METHOD - This invention relates to a method for processing control messages from a set of control messages intended to access an encrypted content received in the form of a stream by a multimedia unit. These messages include at least a discrimination parameter having a different value for two consecutive messages in the stream and access data to encrypted content. The method comprises steps for receiving a current control message, for reading the discrimination parameter from the current control message, for retrieving in a memory, the discrimination parameter from the message processed previously to the current message, for comparing the discrimination parameter of the current message with the previously processed message discrimination parameter, and for blocking said current control message by the filter if the comparison step indicates that the discrimination parameter of the current message is identical to the discrimination parameter of the previously processed message.08-13-2009
20090257587AV DATA TRANSMISSION APPARATUS, AV DATA RECEPTION APPARATUS, AND AV DATA TRANSMISSION AND RECEPTION SYSTEM - An AV data transmission apparatus comprising: an encryption unit which encrypts AV data; an AV data transmission unit which transmits the encrypted AV data; a cipher-type-information switching unit which switches cipher type information indicating a cipher scheme used for the AV data, to other cipher type information; and a cipher-type-information transmission unit which transmits cipher type information. When transmitting AV data which is prohibited from being used in a reception apparatus that does not support new usage control information, the AV data transmission apparatus assigns different cipher type information to be notified to the reception apparatus, so that even the reception apparatus which cannot recognize the new usage control information can recognize that being unable to perform decryption is due to new encryption performed by the AV data transmission apparatus.10-15-2009
20090316892Crypto micro-module using IEEE 1394 for stream descrambling - In certain embodiments, a television receiver circuit has a tuner circuit and a demodulator circuit that cooperatively produce a digital transport stream for a tuned channel as an output therefrom. A transport processor in an SOC receives the digital transport stream and switches the digital transport stream to an IEEE1394 bus if it is conditional access encrypted, or else if the content is unencrypted, the content is sent to a decoder residing in the SOC. A connector is permanently affixed to the circuit board that is in communication with the IEEE1394 bus. A removable crypto micro-module is installed in the connector, having an IEEE1394 compliant bus providing interconnections to the connector, receiving the digital transport stream for the tuned channel and managing conditional access keys for descrambling the tuned channel and for descrambling the tuned channel, and copy protecting the clear channel for delivery across the IEEE 1394 bus back to the transport processor in the SOC. A copy protection decrypter forms a part of the transport processor in the SOC that decrypts the copy protected stream and sends it to the decoder in the SOC. This abstract is not to be considered limiting, since other embodiments may deviate from the features described in this abstract.12-24-2009
20090316895CONDITIONAL ACCESS SYSTEM AND METHOD FOR PREVENTION OF REPLAY ATTACKS - In a conditional access system, a headend transmits content to one or more receivers in encrypted transport streams. The system provides a multi-layer security architecture, rendering the system resistant to key replay attacks; if one layer is circumvented, subsequent layers remain intact. A first layer prevents unencrypted keys from being recorded by shielding the unencrypted keys from users and encrypting the path from the receiver's conditional access module to the transport decryption module; a second layer prevents a key recorded on one receiver from being played back to the transport decryption module on a second receiver; a third layer prevents a user from decrypting transport streams without the encryption module by encrypting the stream a second time prior to being passed through any user-accessible memory or processor.12-24-2009
20090316894METHOD AND APPARATUS FOR CHECKING CONSISTENCY BETWEEN DIGITAL CONTENTS - The present invention discloses a method and apparatus for checking consistency between digital contents, pertaining to digital rights management technologies. The method includes: extracting feature values from an original digital content; extracting feature values from a digital content under check; comparing the feature values of the original digital content with the feature values of the digital content under check; and determining whether the digital content under check is consistent with the original digital content according to a comparison result. The apparatus includes: a first extracting module, a second extracting module, a comparing module, and a first determining module. With the present invention, it is feasible to determine whether a digital content under check is illegal according to a user policy. The check process does not require any change to the terminal. The user experience is assured and the security is high.12-24-2009
20090316893Address Generating Method and Broadcast Receiving Apparatus - A broadcast receiving apparatus comprises a broadcast receiving unit (12-24-2009
20100183149METHOD FOR SIMULCRYPTING SCRAMBLED DATA TO A PLURALITY OF CONDITIONAL ACCESS DEVICES - One embodiment of the invention relates to an apparatus comprising an input, a descrambler unit and a re-scrambler unit. The input is adapted to receive scrambled content. The descrambler unit is coupled to the input. The descrambler unit descrambles the scrambled content in order to recover unscrambled content and concurrently routes both the unscrambled content over a first communication link for display on a display device and the unscrambled content over a second communication link. The re-scrambler unit is coupled to the second communication link. The re-scrambler unit is adapted to scramble the unscrambled content to produce re-scrambled content for transmission.07-22-2010
20100208892Methods and devices for digital content protection - Methods and devices for controlling access to digital content. The digital content is split into at least one code part and one scrambled part. A codec of a user device finds that the first part is not scrambled and plays it. The first part comprises code to be retrieved and entered by a user. Using the input code, the codec generates a corresponding scrambling key, possibly also using additional information such as a current time. The codec then detects an upcoming scrambled part and uses the generated scrambling key to descramble and display the scrambled section. In a preferred embodiment, instead of entering part of the code itself, the codec generates, using e.g. metadata and time, to generate part of the code to display to the user.08-19-2010
20100220858CORRELATION-BASED SYSTEM FOR WATERMARKING CONTINUOUS DIGITAL MEDIA - A correlation-based system for watermarking continuous digital media at the system application level. It is a post-compression process for watermarking where no a priori knowledge of the underlying compression algorithm is required. Per each compressed media frame, a current unique digital signature is generated based on the data from the current compressed frame plus the digital signature that has been previously generated. The signature thus generated is then used in conjunction with the next compressed frame to generate the next unique digital signature. All digital signatures are correlated according to the above process until a “reset” signal is issued. A new chain of correlated digital signatures is produced by the system with a pre-determined initial signature.09-02-2010
20100303231UPDATING CRYPTOGRAPHIC KEY DATA12-02-2010
20110085661CONTENT RECEIVING TERMINAL, CONTENT REPRODUCING TERMINAL, CONTENT WRITE-OUT METHOD, AND PROGRAM - During the export processing for the video content (S04-14-2011
20130156186PARTIAL MULTIPLE ENCRYPTION - A partial multiple encryption device consistent with certain embodiments has an input adapted to receive a unencrypted video signal. An encryption arrangement produces a partially multiple encrypted video signal from the unencrypted video signal. An output is adapted to provide the partially multiple encrypted video signal. This abstract is not to be considered limiting, since other embodiments may deviate from the features described in this abstract.06-20-2013
20090214032Method and apparatus for detection of loss of cipher synchronization - Detecting loss of stream cipher synchronization between a transmitter and a receiver in a video processing system may be achieved by receiving, by the receiver, an encrypted video frame from the transmitter, obtaining an encrypted value for a selected pixel in the encrypted video frame, decrypting the encrypted pixel value using a first portion of the receiver's current key stream, re-encrypting the pixel value using a second portion of the receiver's current key stream, sending the re-encrypted pixel value from the receiver to the transmitter, obtaining, by the transmitter, a plaintext value for the selected pixel from a corresponding original video frame and encrypting the plaintext pixel value using a second portion of the transmitter's current key stream, and comparing the re-encrypted pixel value received from the receiver with the encrypted pixel value generated by the transmitter and detecting a loss of cipher synchronization when the values do not match.08-27-2009
20090323948Stream Generation Method, Broadcast Receiving Apparatus, and Display Method - Provided is a system far receiving a initialization packet containing an initial vector for initializing stream encryption algorithm and an identifier of a key for decrypting an encrypted stream, initializing a decryption modules and decrypting the encrypted stream, wherein the system stores an identifier of a key which is needed to decrypt a next program in a initialization packet of a current program and informs a user of whether a desired key has been acquired or not at timing close to start time of the next program.12-31-2009
20100008503Secure Terminal Data Loader Apparatus and Method for a Mobile Platform - A terminal data loading device on a mobile platform includes a media unit for receiving a transportable media element containing media data and outputting a media signal to a control processor unit. The control processor unit outputs an information signal to a wireline communication unit. The wireline communication unit outputs a wireline signal to a network on the mobile platform.01-14-2010
20110096924ANTIPIRACY KEY SEGMENTATION FOR HFC MULTICAST DISTRIBUTION FROM MASTER HEADEND TO CABLE HUBS - A method of segregating a hybrid fiber cable network involves assigning a packet identifier (PID) to each of a plurality of hubs on the hybrid fiber cable network; assigning a distinct decryption method to each of the plurality of hubs, so that each of the plurality of hubs is identifiable by its associated decryption method and PID; generating selectively multiple encrypted content for transmission to the hubs, where content encrypted for use by each hub is identified by the hub's assigned PID; and transmitting the selectively multiple encrypted content over the hybrid fiber cable network to the plurality of hubs. This abstract is not to be considered limiting, since other embodiments may deviate from the features described in this abstract.04-28-2011
20120148042REMOTE ENTITLEMENT PROCESSING MODULE INTEGRATION PROCESSING DEVICE AND METHOD - There is provided a remote entitlement processing module integration processing device. The remote entitlement processing module integration processing device includes: a remote entitlement processing module generating and managing remote smart cards (RSCs) having the number corresponding to the number of host terminals managed by the remote entitlement processing module integration processing device; and a descrambler transferring channel selection information in response to a selection of a pay channel by a user to the remote entitlement processing module and descrambling a scrambled channel signal using a control word (CW) received as a response to the channel selection information, thereby making it possible to minimize dependency between a subscriber device and a conditional access system.06-14-2012
20110150217METHOD AND APPARATUS FOR PROVIDING VIDEO CONTENT, AND METHOD AND APPARATUS REPRODUCING VIDEO CONTENT - A method of providing video content, the method comprising generating a basement layer and a plurality of enhancement layers by performing scalable video coding on a piece of video content; encrypting the basement layer and the plurality of enhancement layers by using different encryption keys, respectively; and transmitting one of the encryption keys to the second device, together with a video content package that comprises the encrypted basement layer and enhancement layers. The encryption keys include a random encryption key generated randomly and chain encryption keys generated sequentially by performing a Hash function on the random encryption key at least one time.06-23-2011
20110255690REPROGRAMMABLE SECURITY FOR CONTROLLING PIRACY AND ENABLING INTERACTIVE CONTENT - Technologies are disclosed to transfer responsibility and control over security from player makers to content authors by enabling integration of security logic and content. An exemplary optical disc carries an encrypted digital video title combined with data processing operations that implement the title's security policies and decryption processes. Player devices include a processing environment (e.g., a real-time virtual machine), which plays content by interpreting its processing operations. Players also provide procedure calls to enable content code to load data from media, perform network communications, determine playback environment configurations, access secure nonvolatile storage, submit data to CODECs for output, and/or perform cryptographic operations. Content can insert forensic watermarks in decoded output for tracing pirate copies. If pirates compromise a player or title, future content can be mastered with security features that, for example, block the attack, revoke pirated media, or use native code to correct player vulnerabilities.10-20-2011
20080240431Dynamically shifting control word - A method for generating a plurality of control words, each control word controlling access to an object. The method includes providing a control word packet (CWP), generating a first control word (CW) from the CWP, providing a second CW generation input and producing a second CW based, at least in part, on both of the following the first CW and the second CW generation input. Control word generating apparatus for generating a plurality of control words is also disclosed.10-02-2008
20110164747METHOD TO ENFORCE BY A MANAGEMENT CENTER THE ACCESS RULES FOR A BROADCAST PRODUCT - A method to enforce by a management center access rules for a broadcast product accessed by an access key, the management center managing a plurality of Boolean positive and negative attributes, comprising the steps: associating one positive Boolean attribute to a receiver entitled to the attribute and loading the same; associating one negative Boolean attribute to a receiver not entitled to the attribute and loading the same; defining at least a second broadcast encryption scheme for the negative Boolean attributes and associating each negative Boolean attribute corresponding decryption key material; expressing access conditions on a product as a Boolean expression by combining at least one positive Boolean attribute and at least one negative Boolean attribute by at least one Boolean conjunction or disjunction; generating and broadcasting at least one cryptogram to a receiver, encrypting the access key with the two combined broadcast encryption schemes according to the Boolean expression.07-07-2011
20120121085System and Method for Content Distribution with Broadcast Encryption - A content distribution method with broadcast encryption, comprising an encryption process that includes the computation of a ciphertext using a differential ciphertext generation method. The ciphertext needs to be recomputed whenever the subscriber set changes. The differential ciphertext generation method computes the new ciphertext by reusing previously preserved computational results of a previous ciphertext, thereby improving the efficiency of the system. A content distribution method with broadcast encryption also comprises a decryption process that includes the reconstruction of the encryption secret that is used for decrypting the encrypted content. A wide window point addition method is used in the encryption secret reconstruction. The wide window point addition method reuses previously preserved computational results of group-divided point additions of public parameters, thereby improving the efficiency of the system. A clustering solution with multiple instances of key server and entitlement server allows the expansion of user population in the content distribution network.05-17-2012
20100202611SYSTEMS AND METHODS FOR PROTECTING INFORMATION - Systems and methods for protecting information provided to an agent via a communication network are provided. In this regard, a representative method comprises, receiving information related to a transaction, wherein the information includes video. Additionally, the method includes initiating a recording of the video and identifying visual content in the video that is to be protected. The method further comprises preventing unauthorized access to the visual content during replay of the recording of the video.08-12-2010
20110188652ENCRYPTION APPARATUS, DECRYPTION APPARATUS, ENCRYPTION METHOD, AND DECRYPTION METHOD - An encryption part (08-04-2011
20100027790METHODS FOR AUTHENTICATING A HARDWARE DEVICE AND PROVIDING A SECURE CHANNEL TO DELIVER DATA - A method for delivering audio/video data through a hardware device using a software application comprises, at the hardware end, receiving an encrypted application key, an encrypted random session key, and encrypted audio/video data from the software. The hardware then decrypts the encrypted application key using a secret encryption key, decrypts the encrypted random session key using the application key, and decrypts the encrypted audio/video data using the random session key. The hardware may then deliver the unencrypted audio/video data by way of a display and speakers. The secret encryption key is securely embedded within the hardware device at an earlier point in time.02-04-2010
20110064218METHOD, APPARATUS AND SYSTEM FOR ANTI-PIRACY PROTECTION IN DIGITAL CINEMA - A digital cinema anti-piracy system includes a modulator configured to convert an input signal to a desired disruptive frequency and to analyze a brightness, B, of each input pixel in an input frame of the signal, the modulator for determining at least the amount of brightness Bj of each pixel to be displayed in each frame j of a set of N frames, wherein the average of all the brightness values Bj in the N set of frames is substantially equal to B, and N is substantially equal to the number of frames output for each input frame. A brightness of a pixel in a second region Bf(j) can be displayed ‘out of phase’ with the brightness Bj to create a disruptive effect which is distinguishable from the first flicker effect.03-17-2011
20110317833GENERATING A SCRAMBLED DATA STREAM - A method and a system for generating a scrambled data stream is described, wherein the method comprises: providing a code book comprising code information for scrambling data in data stream comprising one or more service streams; generating a control word request associated with at least one crypto period in at least one of said service streams; in response to said control word request, generating on the basis of said code information at least one control word associated with said crypto period in said service stream; and, scrambling data associated with at least one of said service streams using said control word.12-29-2011
20120250860ENCRYPTION PROCEDURE AND DEVICE FOR AN AUDIOVISUAL DATA STREAM - Apparatus for encrypting a stream of audiovisual data generated by an encoder (10-04-2012
20090136031METHOD FOR PROTECTING CONTENT AND METHOD FOR PROCESSING INFORMATION - Disclosed are a method of protecting content and a method of processing information. The method of protecting content can include service related information including revocation application information of content from the outside by employing a content management and protection system, and apply or not apply a content revocation process on the content according to the revocation application information. Accordingly, whether to apply a content revocation process can be controlled according to revocation application information.05-28-2009
20090136030Video monitoring system with video signal encrypted and the and method for the same - Techniques pertaining to a security system are disclosed. According to one aspect of the techniques, secured communication of video data between a monitoring system including a monitoring camera and a monitoring terminal is established by encrypting the video data. The monitoring camera is configured to encrypt digital image data before the image data is transmitted to the monitoring terminal. Instead of using commonly used encryption schemes, encryption rules are generated in accordance with an encryption key corresponding to a predetermined encryption algorithm. On the side of the monitoring terminal, decryption rules are generated in accordance with a received description key corresponding to a predetermined decryption algorithm. Depending on implementation, the image data may be encrypted/decrypted line by line, block by block or frame by frame.05-28-2009
20120300926VALID REPLACEMENT DATA IN ENCODED VIDEO - A security method for H.264 video streams and the like is provided that comprises: coding video data with incorrect or missing bytes, whereby the coded video is corrupted or distorted; generating replacement data that corrects the coded video during decoding; and distributing the replacement data to users.11-29-2012
20080212775Novel Trick Mode System - A method is described for trick mode playback, the method including selecting a key-frame in a recording substantially in the vicinity of a trick mode playback starting position, preparing a decryption key associated with a key period including the selected key-frame, sending the prepared decryption key to a descrambler, thereby enabling decryption of video beginning at the selected key-frame, sending a first number P seconds of decrypted video frames, starting at the selected key-frame, at a predetermined speed for a predetermined number of seconds, to a video decoder, in parallel to the sending P seconds of video frames, choosing at least a second video section to stream to the video decoder, sending a decryption key associated with the chosen second video section to the descrambler, and repeating the steps of selecting, preparing, sending the prepared decryption key, and sending a first number P seconds of decrypted video frames. Related apparatus and methods are also described.09-04-2008
20100246819Method to upgrade content encryption - Generation of secret keys is carried out in a smartcard for use by a receiver device's main processor, or alternatively, decryption processing for selectively encrypted content is carried out in the smartcard itself in order to thwart hacking and pirating of protected video content. This abstract is not to be considered limiting, since other embodiments may deviate from the features described in this abstract.09-30-2010
20100246821MODULAR BROADCAST RECEIVER SYSTEM AND METHOD - The construction of a receiving apparatus for receiving a broadcast from a plurality of broadcasting providers is simplified. In a receiving apparatus for receiving a broadcast from a plurality of broadcasting providers, of the function blocks which constitute the receiving apparatus, a block used in common irrespective of the broadcasting provider is formed as a common block, and a block different from one broadcasting provider to another is formed as an independent block. These blocks are connected to each other through an IEEE1394 interface, and the common block is shared among the plurality of blocks which are not used in common, so that a receiving process is performed.09-30-2010
20100067693SYSTEM AND METHOD OF ENABLING CONTENT OUTPUT ON A DIGITAL DEVICE - In one embodiment the present invention includes a system and method of distributing content. Authorization information is encoded with the content. When received and decoded, if a particular device output is authorized by the authorization information, then the content is output. By encoding the authorization information along with the content, unauthorized display of the content is reduced.03-18-2010
20120134496PARTIAL ENCRYPTION USING VARIABLE BLOCK-SIZES PARAMETERS - A method for data processing, comprising providing a sequence of image frames that is encoded by identifying intra and inter frames in the sequence and applying a variable block size motion compensation (VBSMC) procedure to the inter frames, thereby generating respective parameters representing the inter frames; selectively encrypting the block sizes, using an encryptor, without encrypting all of the parameters representing the inter frames; and outputting encoded data representing the sequence of the image frames and comprising the encrypted block sizes.05-31-2012
20120250861BROADCAST RECEPTION TERMINAL AND BROADCAST RECEPTION METHOD - A broadcast receiving terminal includes a conditional access system (CAS) module that acquires key information from a broadcast signal and a renderer that plays back video/audio data in the broadcast signal. The CAS module includes a history information storage unit that stores playback history information and a playback time calculation unit that calculates playback remaining time information related to the video/audio data and sends a scrambling key and the playback remaining time information to the renderer. The renderer includes a descrambling unit and a decoding unit that decrypts the video/audio with the scrambling key to play them back and send history information related to the playback to the CAS module and a preview control unit that performs control to decrypt the video/audio data only for the time indicated by the playback remaining time information. The terminal achieves playback control in accordance with an actual playback time.10-04-2012
20120170741SECURE LIVE TELEVISION STREAMING - A client device implements a media player and a proxy application. The media player controls playback of media content on the client device. The proxy application is implemented to request a playlist from a media server, where the playlist corresponds to the media content. The proxy application receives the playlist from the media server, and the playlist includes encryption key reference parameters to obtain an encryption key. The proxy application modifies the playlist to include local encryption key access parameters for the media player, and the modified playlist is communicated to the media player. The proxy application can then receive a request for the encryption key from the media player that utilizes the local encryption key access parameters included in the modified playlist, and the proxy application securely communicates the encryption key to the media player.07-05-2012
20120177197VIDEO PROCESSING SYSTEM FOR SCRAMBLING LAYERED VIDEO STREAMS AND METHODS FOR USE THEREWITH - A video processing system includes a video encoder that encodes a video stream into an independent video layer stream and a first dependent video layer stream that requires the independent video layer for decoding. A scrambling module scrambles the independent video layer stream to produce a scrambled independent video layer stream and leaves the first dependent video layer stream unscrambled.07-12-2012
20100008502CONTENT DISTRIBUTION SYSTEM, CONTENT RECEPTION TERMINAL, CONTENT DISTRIBUTION METHOD AND PROCESSING METHOD PERFORMED WHEN VIEWING STREAMING CONTENTS - There is provided a system including a plurality of content distribution servers for distributing scrambled contents and streaming-distributing an encrypted scramble key used for releasing the scrambling, a license server for providing a work key for decoding the encrypted scramble key distributed from the predetermined content distribution server, a portal server for providing address information of the predetermined content distribution server, and a content reception terminal for obtaining address information of the predetermined content distribution server from the portal server, referring to the address information to obtain the contents and the scramble key from the predetermined distribution server, decoding the scramble key by using the work key obtained from the license server and descrambling the scrambled contents by using the scramble key.01-14-2010
20120082311CONTENT PROTECTION USING BLOCK REORDERING - An apparatus and method for protecting a content item such as a digitally encoded movie, an electronic programming guide, or the like, by reordering blocks of the content item prior to transmitting it to a receiving device. The receiving device constructs a block reordering structure which is used to access the reordered content item, to facilitate retrieval of a desired block from the original content item. The reordering may be done responsive to an identifier value of the receiving device, such as a serial number.04-05-2012
20120082310CONTENT PROTECTION USING BLOCK REORDERING - An apparatus and method for protecting a content item such as a digitally encoded movie, an electronic programming guide, or the like, by reordering blocks of the content item prior to transmitting it to a receiving device. The receiving device constructs a block reordering structure which is used to access the reordered content item, to facilitate retrieval of a desired block from the original content item. The reordering may be done responsive to an identifier value of the receiving device, such as a serial number.04-05-2012
20120257749METHOD AND PROCESSING UNIT FOR SECURE PROCESSING OF ACCESS CONTROLLED AUDIO/VIDEO DATA - A method for verifying access conditions performed by two conditional access devices consecutively on a control message before releasing a control word to a descrambler. The control message includes a first part including first access conditions and a second part structured as a control message including at least second access conditions and a control word. A first conditional access device is configured for decrypting the control message with a common key specific to units having a first conditional access device and verifying the authenticity of said message. When the verification succeeds, the second part and a second right is transmitted to a second conditional access device, which decrypts the second part with a common key specific to units having a second conditional access device and verifies the authenticity of said second part and the second access conditions in relation to the second right encrypted by a personal key embedded therein.10-11-2012
20080298586Decryption System and Method for Video Data - The disclosed embodiments relate to a system that processes video data. An exemplary embodiment of the system includes a module that initiates a channel search procedure on a transport stream, a module that determines an encryption level of a first channel in the transport stream based on a control bit within the transport stream, and a module that adds the first channel and its associated encryption level to a channel map.12-04-2008
20100189255IMAGE PROCESSING APPARATUS AND METHOD - Encrypted video data is decrypted as first image data. If a first image processing module includes an output processing to an outside of a first secure memory which an access from an outside of an apparatus is restricted, the first image processing module is converted to a second image processing module including the output processing invalidated. The first image data is processed using the second image processing module, by accessing the first secure memory, and second image data is generated. If a first rendering module includes an output processing to an outside of a second secure memory which an access from the outside of the apparatus is restricted, the first rendering module is converted to a second rendering module including the output processing invalidated. The second image data is rendered using the second rendering module, by accessing the second secure memory.07-29-2010
20100189254Slice mask and moat pattern partial encryption - A selective encryption encoder consistent with certain embodiments of the invention has vertical and/or horizontal stripes encrypted. In one embodiment, packets are examined in the digital video signal to identify a specified packet type, the specified packet type being both packets carrying intra-coded data representing a pattern of horizontal stripes across an image and packets carrying intra-coded data representing a pattern of vertical stripes across an image. The packets identified as being of the specified packet type are encrypted using a first encryption method to produce first encrypted packets. These first encrypted packets are then used to replace the unencrypted packets in the digital video signal to produce a partially encrypted video signal. The packets of the specified type can also be multiple encrypted and replaced in the data stream to produce a multiple encrypted video data stream. This abstract is not to be considered limiting since embodiments consistent with the present invention may incorporate more, fewer or differing elements than mentioned in this abstract.07-29-2010
20100232604CONTROLLING ACCESS TO CONTENT USING MULTIPLE ENCRYPTIONS - Controlling access to content using multiple encryptions, including: receiving content comprising media data; first encrypting a substantial portion of the content using a primary key; selecting a subset of the substantial portion of the content; and second encrypting the selected subset of the content using a secondary key different from the primary key.09-16-2010
20120087499Read/write encrypted media and method of playing - A new media device including a decryption device that is operable to create a decryption key to read media. The decryption device is itself a read/write device that allows reducing or decrementing each time the decryption key is used.04-12-2012
20120087498Method and Apparatus for Using Counter-Mode Encryption to Protect Image Data in Frame Buffer of a Video Compression System - Certain aspects for protecting image data in a video compression system may include encrypting image data utilizing counter-mode scrambling. The encrypted image data may be buffered in at least one frame buffer. The buffered encrypted image data may be decrypted by utilizing counter-mode descrambling.04-12-2012
20120087497CONTENT PROTECTION MESSAGE EXTRACTION - A system for extracting a video-watermark embedded in a video sequence, comprising a decryption and decoding engine to receive the video sequence in a video-codec-encoded format and encrypted, then decrypt the video sequence yielding a decrypted video sequence, then decode the decrypted video sequence yielding a decrypted decoded video sequence, and then output the decrypted decoded video sequence to a display device for rendering thereon, a measurement module to measure memory usage utilized by the engine decoding at least part of the video sequence yielding measurements of memory usage, a memory usage analyzer to analyze the measurements to determine an arrangement of video frames of at least one frame type in the video sequence, and an encoding feature analyzer to analyze the arrangement of the video frames to extract the video-watermark from the video sequence. Related apparatus and methods are also described.04-12-2012
20120087496HOME USE ACTIVE REMOTE ENCRYPTION AND SWITCHING DEVICE - A home use active remote encryption and switching device is revealed. Transmission of remote images and information as well as switching of home appliances is controlled by wireless communication. The home use active remote encryption and switching device includes at least one video mobile phone with specific permission, a signal receiving interface receiving signals from the mobile phone, a digital signal processor that decrypts and modulates signals from the mobile phone, a central processing unit that integrates and converts decrypted signals into switching signals, and a storage device storing audio/video signals. Thereby signals from the video mobile phone are transmitted to the remote signal receiving interface by wireless communication equipments. Then the signals are decrypted by the digital signal processor, converted into switching signals by the central processing unit, and sent to home appliances. Thus remote switching of home appliances is achieved under the control of the video mobile phone.04-12-2012
20120321082FRAME INDEXING TECHNIQUE TO IMPROVE PERSONAL VIDEO RECORDING FUNCTIONALITY AND SECURITY OF TRANSMITTED VIDEO - Systems and methods of efficiently indexing a digitized video stream are presented. In one embodiment, the method comprises receiving a coded video stream containing non-scrambled frame location indicators and scrambled video data, filtering the non-scrambled frame location indicators, and generating a database used for indexing frames. In one embodiment, the apparatus comprises a processor such as a hardware and/or software capable of generating a database used for improving video playback functionality by way of filtering non-scrambled indicators that define the start of frames in a digitized video stream.12-20-2012
20120288091CONTENT RECEIVING DEVICE, CONTENT REPRODUCING DEVICE, CONTENT RECEIVING AND REPRODUCING DEVICE, CONTENT RECEIVING METHOD, AND PROGRAM - Provided is a content receiving device that can reduce processing loads at a time when an encrypted stream is decrypted. A video recording and reproducing device 11-15-2012
20130142330BINDING OF PROTECTED VIDEO CONTENT TO VIDEO PLAYER WITH BLOCK CIPHER HASH - A video player sends a video content identifier and a video player identifier through a network to a server. The video content identifier identifies video content. The video player identifier identifies the video player. Further, a first subset of encrypted video content and an initialization vector are received from a server. In addition, a hash of the video player identifier is generated. The first subset of the encrypted video content is decrypted with a decryption key to generate a first result. Further, a first operation on the initialization vector and the hash is performed to generate a second result. In addition, a second operation is performed on the first result and the second result to generate a first subset of plaintext of video content.06-06-2013
20080205644Method for encrypting and decrypting an image frame - An apparatus for encrypting an image frame generates a key frame, performs XOR with the image frame and the key frame to generate a temporary image frame, and changes positions of blocks of the temporary image frame according to a first key to generate an encrypted image frame.08-28-2008
20120275597Extending data confidentiality into a player application - In a content protection scheme, and in response to a request for a content segment received by a server, the server generates and associates with the segment a message that confers entitlement to a session-specific key from which one or more decryption keys may be derived. The decryption keys are useful to decrypt the segment at runtime as it is about to be rendered by a player. Before delivery, the server encrypts the segment to generate an encrypted fragment, and it then serves the encrypted fragment (and the message) in response to the request. At the client, information in the message is used to obtain the session-specific key. Using that key, the decryption keys are derived, and those keys are then used to decrypt the received encrypted fragment. The decryption occurs at runtime. The approach protects content while in transit to and at rest in the client browser environment.11-01-2012
20130156185SURVEILLANCE VIDEO TRANSMISSION APPARATUS AND METHOD AND SURVEILLANCE VIDEO RECEIVING APPARATUS AND METHOD - A surveillance video transmission apparatus, includes a video input unit configured to collect physical videos and make the collected physical videos informative; a video analysis unit configured to analyze content of the collected video by recognizing the collected video and detecting an event; and an encryption selection unit configured to select one of a non-encryption mode, a regions-of-interest encryption mode and a full video encryption mode based on the analysis result of the collected video. Further, the surveillance video transmission apparatus includes a video process unit configured to perform one of a non-encryption, a regions-of-interest encryption and a full video encryption and encoding on the collected video according to the selected encryption mode; and a video transmission unit configured to transmit the encoded video and encryption-related information to a surveillance video receiving apparatus.06-20-2013
20120281828PROTECTION OF AUDIO OR VIDEO DATA IN A PLAYBACK DEVICE - Method and apparatus to prevent hacking of encrypted audio or video content during playback. Hackers, using a debugging attachment or other tools, can illicitly access encrypted data in memory in a playback device when the data is decrypted during playback and momentarily stored in digital form. This hacking is defeated here by methodically “poisoning” the encrypted data so that it is no longer playable by a standard decoder. The poisoning involves deliberate alteration of certain bit values. On playback, the player invokes a special secure routine that provides correction of the poisoned bit values, for successful playback.11-08-2012
20110311045Partial Multiple Encryption - A partial multiple encryption device consistent with certain embodiments has an input adapted to receive a unencrypted video signal. An encryption arrangement produces a partially multiple encrypted video signal from the unencrypted video signal. An output is adapted to provide the partially multiple encrypted video signal. This abstract is not to be considered limiting, since other embodiments may deviate from the features described in this abstract.12-22-2011
20110311044PROVIDING CONTROL WORDS TO A RECEIVER - A method and a system for providing control words to at least one a receiver are described wherein said receiver is associated with a secure module. The method comprises the steps of receiving at least part of a code book comprising code information for descrambling one or more service streams in a scrambled data stream sent to said receiver; providing a control word request associated with at least one crypto period in at least one of said service streams; and, in response to said control word request, generating on the basis of said code information at least one control word for descrambling data in said service stream and associated with said crypto period.12-22-2011
20120027208CONDITIONAL ACCESS SYSTEM AND METHOD FOR PREVENTION OF REPLAY ATTACKS - In a conditional access system, a headend transmits content to one or more receivers in encrypted transport streams. The system provides a multi-layer security architecture, rendering the system resistant to key replay attacks; if one layer is circumvented, subsequent layers remain intact. A first layer prevents unencrypted keys from being recorded by shielding the unencrypted keys from users and encrypting the path from the receiver's conditional access module to the transport decryption module; a second layer prevents a key recorded on one receiver from being played back to the transport decryption module on a second receiver; a third layer prevents a user from decrypting transport streams without the encryption module by encrypting the stream a second time prior to being passed through any user-accessible memory or processor. Event tables are transmitted with the transport stream, either unencrypted for immediate use or encrypted, to prevent unauthorized use.02-02-2012
20120063595METHOD AND APPARATUS FOR SELECTIVE DATA ENCRYPTION - A layered audiovisual packet data stream, such as one obtained by a JPEG2000 encoder, is received together with information (metadata) about the contribution of each packet to the reduction of image distortion. The distortion-to-rate ratio for each packet is calculated and the packets are ordered in descending ratio. The non-encrypted packet having the highest ratio is encrypted until the target distortion is obtained. Also provided is an apparatus. In a variant, the data in the packets are substituted by dummy data instead of encrypted.03-15-2012

Patent applications in class Video electric signal modification (e.g., scrambling)

Patent applications in all subclasses Video electric signal modification (e.g., scrambling)