Verimatrix, Inc. Patent applications |
Patent application number | Title | Published |
20160119329 | DEVICE AUTHENTICATION FOR SECURE KEY RETRIEVAL FOR STREAMING MEDIA PLAYERS - Systems and methods are disclosed that authenticate devices or users, and enable playback of secured streaming content through a media player. In one embodiment, the invention is a system for receiving secure content over an unmanaged network, including a security application configured operate on a user device with access to a network, where the security application is configured to receive a request for playlist data from the media player, send a playlist request to a content server, receive playlist data from the content server, send playlist data to a media player, receive a security access request from the media player, send a security access request to a security server, receive security access data from the security server; and send security access data to a media player. | 04-28-2016 |
20160105719 | Systems and Methods for Performing Semantic Analysis of Media Objects - System and method for identification of ownership to media objects through analysis of semantic information in the media objects are disclosed. Semantic information is a term that can be used to describe aspects of the content of a media object that are apparent to a human viewing or listening to the content. In many embodiments, the media object is analyzed for semantic information that are indicative of media ownership such as, but not limited to, station identification logos, franchise logos (e.g., the title credits of a popular television series), theme songs, the distinctive voice of a news presenter, the face and/or voice of an actor and/or other characteristics of the media object are used as a basis for determining entities associated with the media object. One embodiment of the invention includes extracting semantic information from a specified media object, matching said semantic information of the specified media object against known semantic information of known media objects, and taking action based on the result of the comparison. | 04-14-2016 |
20160099944 | Digital Rights Domain Management for Secure Content Distribution in a Local Network - Systems and methods for secure content distribution to playback devices connected to a local network via a residential gateway using secure links are disclosed. One embodiment of the invention includes a content server, a rights management server, a residential gateway configured to communicate with the content server and the rights management server via a network, and a playback device configured to communicate with the residential gateway via a local network. In addition, the residential gateway is configured to receive protected content from the content server, the playback device is configured to request access to the protected content from the residential gateway, the residential gateway is configured to request access to the protected content from the rights management server and the request includes information uniquely identifying the playback device, the rights management server is configured to provide access information to the residential gateway when the information uniquely identifying the playback device satisfies at least one predetermined criterion with respect to playback devices associated with the residential gateway, the residential gateway and the playback device are configured to create a secure link between the residential gateway and the playback device via the local network, and the residential gateway is configured to decrypt the protected content using the access information provided by the rights management server and to encrypt the decrypted content for distribution to the playback device via the secure link. | 04-07-2016 |
20140281489 | SECURITY AND KEY MANAGEMENT OF DIGITAL CONTENT - Managing access to digital content within a particular domain, including: receiving the digital content at a first client device; decrypting the received digital content at the first client device using a first key; transcoding the digital content to another format; re-encrypting the transcoded content using a second key, wherein the second key is obtained by one of: (1) directly from a server; or (2) indirectly by deriving it locally based on information received from the server; and transmitting the re-encrypted content to a second client device, wherein the second client device obtains the second key and decrypts the re-encrypted content at the second client device. | 09-18-2014 |
20140270705 | REFORMATTING MEDIA STREAMS TO INCLUDE AUXILIARY DATA - Reformatting a media stream to include auxiliary data, the method including: receiving the auxiliary data to be inserted into the media stream; determining the amount of data in the auxiliary data; identifying media data in the media stream to be reduced in size; reformatting the media stream to reduce the amount of data in the media data such that the amount of data removed from the media data is at least equal to the amount of data in the auxiliary data while providing minimal impact to the quality of the media data; and adding the auxiliary data to the media stream which maintains a consistent size. | 09-18-2014 |
20140026052 | SYSTEMS AND METHODS FOR RAPID CONTENT SWITCHING TO PROVIDE A LINEAR TV EXPERIENCE USING STREAMING CONTENT DISTRIBUTION - Systems and methods for rapid content switching between pieces of content presented in a plurality of stations using streaming content distribution in accordance with embodiments of the invention are disclosed. One embodiment includes processing a portion of a station manifest that includes identifiers for content stations and identifiers for pieces of content associated with content stations, selecting jump points that are associated with specific locations within pieces of content, determining a current content station, playing a portion of a current piece of content associated with the current content station, determining alternative pieces of content using the station manifest, preparing additional content for playback at each of the jump points by preparing alternative pieces of content during playback of the current content, receiving a user instruction during playback, selecting a target jump point based upon the user instruction, and commencing playback of additional content starting from the target jump point. | 01-23-2014 |
20130329941 | EFFICIENT WATERMARKING APPROACHES OF COMPRESSED MEDIA - Systems and methods are described for imperceptibly embedding information by identifying locations that can be imperceptibly modified, where the imperceptible modification by replacing original content using replacement content derived from elsewhere in the compressed bitstream to remove at least a portion of the original content, generating at least one piece of replacement data for each identified location, where overwriting a portion of the compressed bitstream with replacement data prevents a decoder from decoding original content due to decoding replacement content derived from elsewhere in the compressed bitstream, selecting pieces of replacement data using an embedding device, where overwriting portions of the compressed bitstream using pieces of replacement data encodes payload information in accordance with a predetermined coding scheme, and embedding the payload information in the compressed bitstream by using the embedding device to overwrite at least a portion of the compressed bitstream with the selected replacement data. | 12-12-2013 |
20130179680 | DIGITAL RIGHTS DOMAIN MANAGEMENT FOR SECURE CONTENT DISTRIBUTION IN A LOCAL NETWORK - Systems and methods for secure content distribution to playback devices connected to a local network via a residential gateway using secure links are disclosed. One embodiment of the invention includes a content server, a rights management server, a residential gateway configured to communicate with the content server and the rights management server via a network, and a playback device configured to communicate with the residential gateway via a local network. In addition, the residential gateway is configured to receive protected content from the content server, the playback device is configured to request access to the protected content from the residential gateway, the residential gateway is configured to request access to the protected content from the rights management server and the request includes information uniquely identifying the playback device, the rights management server is configured to provide access information to the residential gateway when the information uniquely identifying the playback device satisfies at least one predetermined criterion with respect to playback devices associated with the residential gateway, the residential gateway and the playback device are configured to create a secure link between the residential gateway and the playback device via the local network, and the residential gateway is configured to decrypt the protected content using the access information provided by the rights management server and to encrypt the decrypted content for distribution to the playback device via the secure link. | 07-11-2013 |
20130174271 | DEVICE AUTHENTICATION FOR SECURE KEY RETRIEVAL FOR STREAMING MEDIA PLAYERS - Systems and methods are disclosed that authenticate devices or users, and enable playback of secured streaming content through a media player. In one embodiment, the invention is a system for receiving secure content over an unmanaged network, including a security application configured operate on a user device with access to a network, where the security application is configured to receive a request for playlist data from the media player, send a playlist request to a content server, receive playlist data from the content server, send playlist data to a media player, receive a security access request from the media player, send a security access request to a security server, receive security access data from the security server; and send security access data to a media player. | 07-04-2013 |
20110069836 | OFF-LINE CONTENT DELIVERY SYSTEM WITH LAYERED ENCRYPTION - Systems and methods are described for over-encrypting symmetrically pre-encrypted content for off-line delivery to playback devices using portable media drives in accordance with embodiments of the invention. One embodiment of the method of the invention includes symmetrically pre-encrypting the content, receiving a request to issue content for playback on at least one playback device associated with a user account, where each playback device includes a processor containing a private key assigned to the playback device by a conditional access system, generating a content key and over-encrypting at least a portion of the symmetrically pre-encrypted content in response to the request, obtaining a public key for each playback device, encrypting a copy of the content key using the public key of each playback device associated with the user account, and delivering the over-encrypted content and the at least one encrypted copy of the content key to a playback device associated with the user account. | 03-24-2011 |
20110030065 | SYSTEMS AND METHODS FOR DETECTING CLONE PLAYBACK DEVICES - Systems and methods are described for aggregating information obtained from messages between playback devices and content protection systems, including but not limited to conditional access systems, downloadable conditional access systems, and digital rights management systems, that include a unique identifier and applying user modifiable rules to the aggregated information to identify abnormal behavior associated with the unique identifier including but not limited to one or more clone playback devices utilizing the unique identifier or a rogue playback device utilizing a unique identifier. One embodiment includes a plurality of playback devices connected to a headend via a network, where the headend includes at least one content protection system, and a clone monitor configured to register playback devices based upon a unique identification supplied by each playback device, when communicating with the at least one content protection system. In addition, the clone monitor is configured to aggregate information associated with each playback device over time, where the information is obtained from messages that are transmitted between the playback device and the headend and that include a unique identifier, and the clone monitor is configured to apply rules to the aggregated information to identify at least one pattern of abnormal behavior in the aggregated information associated with a specific unique identifier. | 02-03-2011 |
20100268771 | NETWORK SECURITY SYSTEM AND METHOD - In a security system for network communications with client devices, each client device has a communication module for communicating with at least one server over a network, a data storage module for storing one or more covert data values of one or more operational events at the client device, and a covert identifier generating module which creates at least one covert identifier based on the stored covert data values. The covert identifier is provided in one or more network messages to the server, or otherwise sent to the service provider, and may be provided in response to a specific request received over the network, or routinely in one or more messages normally involved in network communications. The server compares covert identifiers received from client devices having the same client identifier in order to detect possible clones. | 10-21-2010 |
20090100465 | CONTENT DELIVERY PROXY SYSTEM AND METHOD - A content delivery proxy system and method delivers content to an unsupported client device within a content delivery system by converting messages and data from the unsupported client device into content delivery system supported messages and data. Client log-in messages received from the unsupported client device are converted into a content delivery system supported format and sent to the content delivery system, and user entitlement information of a user of the unsupported client device is requested from the content delivery system. If the user is a subscriber of the content provider, an unsupported client device identifier is created for the client device. A user interface for selecting content from the content delivery system is displayed on the client device in a client device supported format, and selections on the user interface are sent to the content delivery system. Selected content is provided to the client device in the proper format for playback on the client device. | 04-16-2009 |
20090037388 | NETWORK-BASED CONTENT DISTRIBUTION SYSTEM - A method and system for transferring electronic media information over a public network in such a way as to provide safeguards for inappropriate distribution of copyright or otherwise protected materials are described. The media information is transparently watermarked with a unique ID, such as one generated from X.509 Digital Certificate and public-key cryptography public/private key pairs, such that the information can be identified as belonging to a particular individual. A system and method for monitoring the movement of such watermarked files, positively identifying people who have inappropriately distributed copyright materials over a public network without permission, and taking appropriate enforcement action against such people. | 02-05-2009 |
20080288771 | SYSTEM AND METHOD FOR DEFINING PROGRAMMABLE PROCESSING STEPS APPLIED WHEN PROTECTING THE DATA - Systems and methods for protecting data being sent between a client and a server include the capability of defining programmable processing steps that are applied by the server when protecting the data and the same steps are applied by the client when unprotecting the data. The programmable processing steps can be defined uniquely for each client, and the programmable processing steps are selected from a number of functions using sequencing data that defines the processing steps. The programmable processing steps allow for each client to process encrypted data in a different manner and the programmable processing steps are defined by what is called a digital rights management (DRM) Sequencing Key, and as such the system and method introduces a key-able DRM whereby each DRM message can be processed in a unique (or pseudo unique) manner. | 11-20-2008 |
20080280677 | Pre-Programmed Optical Disc Designed For Secure Game Players Allowing For Pay Television Services - A game cartridge includes instructions designed to transform a state-of-the-art game player device into a platform for numerous pay television-related services and offerings. In one aspect the systems and methods described may include the leveraging of emerging state-of-the-art and highly secure game players to create applications targeted toward Pay Television subscribers. The system may generate a log configured to create a user profile based upon previous tendencies of the user. The log may be used to recommend offerings for products or services to the user. | 11-13-2008 |
20080201747 | System and Method for Aggregating, Editing, and Distributing Content - A system and method for the distribution of content to subscribers while maintaining the distribution rights associated with the content. Tags identifying aspects and features, including distribution rights, of the content are associated with the content. The tagged content is aggregated into a centralized data center that receives requests from subscribers to access the content. The tags associated with the requested content are evaluated to determine if the subscriber is authorized to access the content before the content is provided to the subscriber. | 08-21-2008 |