Class / Patent application number | Description | Number of patent applications / Date published |
380216000 | Image data converted to digital before modification | 19 |
20090147954 | Partial Dual-Encryption Using Program Map Tables - Systems and method for partial encryption are disclosed. One example method comprises: creating a program association table to include a first program number which identifies a program encrypted in accordance with a first encryption scheme, and a second program number which identifies the same program encrypted in accordance with a second encryption scheme; and creating a program map table for the same program to include first audio and video identifiers associated with the first encryption scheme and second audio and video identifiers associated with the second encryption scheme. | 06-11-2009 |
20090257589 | MONITORING CAMERA SYSTEM, IMAGING DEVICE, AND VIDEO DISPLAY DEVICE - An imaging device ( | 10-15-2009 |
20100272257 | METHODS AND APPARATUS FOR SECURING COMMUNICATIONS BETWEEN A DECRYPTION DEVICE AND A TELEVISION RECEIVER - Techniques are described herein for securing communications in a television transmission network. A television receiver receives encrypted content from a transmission network and the encrypted content is input into a decryption device. The decryption device decrypts the encrypted content and generates supplemental data in order to pad the size of the decrypted content. The padded content may then be output from the decryption device to other components of the television receiver, for further processing, such as decoding and output to an associated presentation device. | 10-28-2010 |
380217000 | Having compression (e.g., MPEG) | 16 |
20080226068 | Scrambling for Anonymous Visual Communication - A video communication system is disclosed which allows one or more of the participants to selectively participate anonymously by scrambling regions of the video of arbitrary shape, such as the face of the participant. Initially, the video content is analyzed to locate an arbitrary shape of interest, such as a human face or part of a human body. Once the region of interest is located, it is scrambled, for example, in conjunction with two well known video coding schemes; MPEG-4 and Motion JPEG-2000. The arbitrary regions can be scrambled in the image-domain prior to coding, in the transform-domain during coding, or in the bit stream domain after coding. | 09-18-2008 |
20080267401 | METHOD AND APPARATUS FOR SYNCHRONIZING AUDIO AND VIDEO IN ENCRYPTED VIDEOCONFERENCES - The invention provides a system that preserves the synchronization of the audio and video presented at a secure conferencing site without necessitating decryption, decompression, compression, and encryption of signals at the hub. The presently preferred embodiment of the invention provides an apparatus and method for synchronizing audio and video in encrypted videoconferences that comprises a plurality of conference sites; and a hub for receiving a compressed and encrypted, composite audio and video signal from each site, for determining a currently active site, and for transmitting said composite audio and video signal from said currently active site to all other sites; said hub receiving a compressed and encrypted audio only signal from each site; wherein said hub routes all incoming compressed and encrypted audio only signals to each site. | 10-30-2008 |
20080279378 | Transmitting Apparatus and Receiving Apparatus - A transmitter of the present invention includes: an encrypting unit operable to encrypt at least one of digital AV information and descriptor information relating to the digital AV information, and to generate encrypted information; a tool list generating unit operable to generate tool list information having a tool ID indicating a tool required for decrypting the encrypted information; a control graph generating unit operable to generate control graph information indicating an incorporating position of the tool in a receiver; an IPMP protection information generating unit operable to generate IPMP descriptor information for describing the tool list information and the control graph information with a descriptor having a name space indicating IPMP or IPMP protection information; and a packaging unit operable to package the digital AV information including the encrypted information and the IPMP descriptor information, and outputting package information. | 11-13-2008 |
20080310630 | Selective encryption to enable trick play with enhanced security - Certain embodiments consistent with the present invention involve a method of selectively encrypting digital video content that involves receiving a plurality of packets containing the digital video content; identifying packets containing start of frame (SOF) headers; inserting padding into the packets containing SOF headers to move the content of the packets containing the SOF headers to a previous or subsequent packet and create padded packets containing the SOF headers; selecting certain of the packets for encryption according to a selection criterion, wherein the selected packets exclude the padded packets containing SOF headers; encrypting the selected packets; and retaining the padded packets containing the SOF headers unencrypted to form selectively encrypted digital video content. Corresponding decoding method as well as encoding and decoding apparatus are also taught. This abstract is not to be considered limiting, since other embodiments may deviate from the features described in this abstract. | 12-18-2008 |
20090003600 | PROGRESSIVE DOWNLOAD OR STREAMING OF DIGITAL MEDIA SECURELY THROUGH A LOCALIZED CONTAINER AND COMMUNICATION PROTOCOL PROXY - Various embodiments are directed towards employing a container and communication protocol proxy component within a client device to receive securely real-time streamed, progressively downloaded, or adaptively streamed container over a network using one container and communication protocol, and to securely decrypt the container and provide it to a media player using a different container and communications protocol. In one embodiment, the container is in Flash Video (FLV) file format. A browser or the media player on the client device may be used to request the container. The requested container is sent over one communication protocol and intercepted by the container and communication protocol proxy component. The container may be received as selectively encrypted container. The container and communication protocol proxy component then may enable decryption of the container and providing of it to the media player using another container and communication protocol combination. | 01-01-2009 |
20090010430 | Streaming system for distributing encrypted compressed image data, and streaming method therefor - The present invention is directed to a streaming system for encrypting compression-encoded image data to distribute it via network of a predetermined transport protocol, and a streaming server used in this system transmits, to a client terminal, on the RTP packet basis, stream data encrypted so that encryption is performed every encryption block size from the leading portion of each GOP without encrypting the last data having less than encryption block size. In this instance, portions of prior and/or posterior stream data are stored into an extended area of RTP header so that size of stream data transmitted every RTP packet is integral multiple of encryption block size. Further, size information of added prior additional data and/or posterior additional data are also stored into the extended area. This streaming server suppresses increase in size by encryption to have ability to support both real time production and down-load reproduction without replacement of encryption. | 01-08-2009 |
20090067626 | REGION-BASED TRANSFORM DOMAIN VIDEO SCRAMBLING - A video communication system, for example, video surveillance and video conferencing, is disclosed in which regions of interest of video scenes are scrambled to protect privacy and/or allow anonymous participation. The regions of interest may be arbitrary and selectable by the participant or user, such as the face of the participant. Initially, the video content is analyzed to locate an arbitrary shape of interest, such as a human face or part of a human body. Once the region of interest is located, it is scrambled, for example, in conjunction with two well known video coding schemes; MPEG-4 and Motion JPEG-2000. The arbitrary regions can be scrambled in the transform-domain during coding and reversibly encrypted to allow authorized users to decrypt and decode the regions of interest. | 03-12-2009 |
20090169001 | System and Method for Encryption and Secure Transmission of Compressed Media - A method comprises receiving a bit sequence associated with at least one file, the bit sequence comprising payload data in a compressed format and characterization data that maps the compressed format of the payload data. The method continues by encrypting the characterization data that maps the compressed format of the payload data. The method concludes by transmitting the bit sequence such that the characterization data is encrypted and at least a portion of the payload data is unencrypted. | 07-02-2009 |
20090169002 | ROTATION OF KEYS DURING ENCRYPTION/DECRYPTION - An encrypted program received in an MPEG transport stream is decrypted by receiving an address in the MPEG transport stream, reading a key from a memory in accordance with the received address, and decrypting the encrypted program based on the key. | 07-02-2009 |
20100189256 | APPARATUS AND METHOD FOR STORING AND READING A FILE HAVING A MEDIA DATA CONTAINER AND METADATA CONTAINER - An apparatus for recording a file having a related media data container and a metadata container, the apparatus a receiver for receiving first data packets having packetized first media data samples based on a first clock, and for receiving second data packets having second media data samples based on a second clock different from the first clock, wherein the second media data samples are associated to the first media data samples, and for receiving first control packets including information for indicating a relationship of the first clock to a reference clock and for receiving second control packets including information for indicating a relationship of the second clock to the reference clock, and a recorder for storing the received first and second data packets and at least a portion of the received first and second control packets in the media data container, and for storing associated metadata in the metadata container, the associated metadata having timing information of the received first and second data packets and the received first and second control packets and location information indicating a location of the stored first and second data packets and the stored first and second control packets in the media data container. | 07-29-2010 |
20110064220 | METHOD AND SYSTEM FOR PROTECTING 3D VIDEO CONTENT - A video receiver receives a compressed 3D video comprising a base view video and an enhancement view video. The base view video and the enhancement view video are encrypted using same encryption engine and buffered into corresponding coded data buffers (CDBs), respectively. The buffered base view and enhancement view videos are decrypted using same decryption engine corresponding to the encryption engine. The decrypted base view and enhancement view videos are decoded for viewing. The video receiver is also operable to encrypt video content of the received compressed 3D video according to corresponding view information and/or coding layer information. The resulting encrypted video content and unencrypted video content of the received compressed 3D video are buffered into corresponding CDBs, respectively. The buffered encrypted video content are decrypted and are decoded together with the buffered unencrypted video content of the received compressed 3D video for reviewing. | 03-17-2011 |
20110103582 | System for securing access to data streams - A method and an apparatus for protecting digital content, in which an output format for received compressed encrypted digital content is determined based, at least in part, on a rule determining whether clear compressed output format is allowed. When the clear compressed output format is not allowed, the content is received in a form in which it has been encrypted by at least two different encryption methods, and processing of the content comprises a combination of decrypting in accordance with one of the encryption methods and decompression in an atomic operation. | 05-05-2011 |
20110194688 | Method and System Making it Possible to Protect After Compression the Confidentiality of the Data of a Video Stream During Its Transmission - A method is provided for visually encrypting at least one part of an at least partially compressed video stream or video sequence, it being possible for said stream to be decomposed into a first type of objects and a second type of objects, the method being applied on each of the images contained in a video sequence, including at least the following steps:
| 08-11-2011 |
20130064368 | METHODS AND DEVICES FOR SELECTIVE FORMAT-PRESERVING DATA ENCRYPTION - Selective data encryption of a file, in particular an H.264/MPEG-4 AVC data stream. If a first unit in the data stream is to be encrypted, it is encrypted and the encryption is put into a further unit, preferably in the data stream. A substitution unit is generated and put in the place of the first unit; if necessary, at least one header value is taken from the first unit for use in the substitution unit. A decryptor receives the encrypted data stream, extracts and decrypts the further unit and replaces the substitution unit with a regenerated first unit. | 03-14-2013 |
20160013930 | CONTAINER AGNOSTIC DECRYPTION DEVICE AND METHODS FOR USE THEREWITH | 01-14-2016 |
20160156970 | FAST PROCESSING AND ENCRYPTION METHOD AND SYSTEM FOR COMPRESSED VIDEO | 06-02-2016 |