Patents - stay tuned to the technology

Inventors list

Assignees list

Classification tree browser

Top 100 Inventors

Top 100 Assignees


Video electric signal modification (e.g., scrambling)

Subclass of:

380 - Cryptography

380200000 - VIDEO CRYPTOGRAPHY

Patent class list (only not empty are listed)

Deeper subclasses:

Class / Patent application numberDescriptionNumber of patent applications / Date published
380239000 Encrypted code control signal 25
380216000 Image data converted to digital before modification 19
380211000 Interactive TV 18
380212000 Plural video stream multiplexing 12
380236000 Modifying accompanying audio signal 11
380240000 Including addressed decoder control signal 6
380227000 Record or coin controlled 3
20140112471Method and Apparatus for Building a Hardware Root of Trust and Providing Protected Content Processing Within an Open Computing Platform - A system architecture provides a hardware-based root of trust solution for supporting distribution and playback of premium digital content. In an embodiment, hardware root of trust for digital content and services is a solution where the basis of trust for security purposes is rooted in hardware and firmware mechanisms in a client computing system, rather than in software. From this root of trust, the client computing system constructs an entire media processing pipeline that is protected for content authorization and playback. In embodiments of the present invention, the security of the client computing system for content processing is not dependent on the operating system (OS), basic input/output system (BIOS), media player application, or other host software.04-24-2014
20080279379Conditional Access Video Signal Distribution - A video signal distribution system contains a video stream source (11-13-2008
20150334351METHOD AND APPARATUS FOR SUPPORTING MULTIPLE BROADCASTERS INDEPENDENTLY USING A SINGLE CONDITIONAL ACCESS SYSTEM - A method and apparatus for brokering the enablement of the communication of encrypted media programs from a plurality of independent broadcasters to a plurality of receivers is disclosed. The system makes use of a pairing key for each provided service, which is differently encrypted by a pairing server and by the broadcaster providing the service. The encrypted versions of the pairing key are decrypted in a first receiver module using information known to the pairing service but not the broadcaster and in a second receiver module using information known to the broadcaster. The pairing key is used to cryptographically bind the first and second receiver modules.11-19-2015
380221000 By modifying synchronizing signal 3
20150372815SYSTEMS, METHODS, AND APPARATUSES FOR CIPHERING ERROR DETECTION AND RECOVERY - Systems, methods, and apparatuses are provided for ciphering error detection and recovery. A method may include using a first set of one or more cipher input parameters to decipher ciphered data ciphered using a second set of one or more cipher input parameters. The method may further include comparing a value of at least a portion of the deciphered data to an expected value. The method may additionally include determining an occurrence of a ciphering error when the value of the at least a portion of the deciphered data is not equal to the expected value. The method may also include initiating a ciphering resynchronization procedure in response to the determination that a ciphering error occurred so as to resynchronize at least one of the first set of cipher input parameters with at least one of the second set of cipher input parameters. Corresponding systems and apparatuses are also provided.12-24-2015
20110194689ENCRYPTED SIGNAL DETECTION CIRCUIT AND VIDEO DEVICE USING THE SAME - A video device includes a video signal generation circuit, an encrypted signal detection circuit and a central processing unit (CPU). The encrypted signal detection circuit detects encrypted messages in video signals output from the video signal generation circuit and outputs stable trigger control signals to the CPU, which includes an amplifier circuit, a separation circuit, a reverse circuit, a delay circuit and a trigger circuit. The video signals are amplified via the amplifier circuit and negative phase pulse signals are extracted from the video signals via the separation circuit. The reverse circuit converts the negative phase pulse signals to positive phase pulse signals that are delayed via the delay circuit. The trigger circuit outputs the stable trigger control signals based on the delayed positive phase pulse circuit.08-11-2011
20130083923Systems and Method for Determining Visual Media Information - A processor is configured to receive a digital video stream, calculate a hash of an I-Frame within the digital video stream, and submit the hash to a server. The processor is further configured to receive location information in response to submitting the hash to the server.04-04-2013
380231000 Usage or charge determination 3
20090316896METHOD FOR MANAGING THE NUMBER OF VISUALIZATIONS, SECURITY PROCESSOR AND TERMINAL FOR SAID METHOD - The invention relates to a method for managing the number of visualizations of an audiovisual content, that comprises: providing a table containing an equal number of cells and of time segments of the audiovisual content, each cell being associated in a bi-unique manner with a respective segment of the audiovisual content; when a segment of the audio-visual content is read, incrementing (12-24-2009
20090310780BROADCAST RECEIVING APPARATUS AND BROADCAST RECEIVING METHOD - Before a device key generation procedure is updated in response to execution of revoke, a recorded transport stream is decrypted using an unupdated device key and is stored in a memory unit after being re-encrypted. In this manner, broadcast programs that are recorded before the revoke can be viewed while maintaining a copyright protection function.12-17-2009
20120263297METHOD OF PROVIDING AN AUDIO-VIDEO DEVICE TO AN END USER - A semiconductor integrated circuit for the processing of conditional access television signals that includes an input interface for receiving encrypted television signals and an output interface for output of decrypted television signals. The semiconductor integrated circuit is provided with some functionality restricted in some way by preventing one or more hardware circuit elements from operating, such as an MPEG decoder, display engine, IO ports or main CPU. To enable the functionality, a subscriber must pay for a service and then receives an encrypted message broadcast to the semiconductor integrated circuit that is decrypted and instructs functionality to be turned on or off.10-18-2012
380219000 Carrier phase shift 1
20140241526DATA SAMPLING AND DATA ENCRYPTION/DECRYPTION METHOD AND ELECTRONIC DEVICE UTILIZING THE METHODS - In one embodiment of the present invention, a signal sampling method is provided. It comprises: (a) sampling an input signal with respect to a sampling clock signal; (b) calculating a maximum transition timing and a minimum transition timing of the input signal according to a relation between the sampling in step (a) and a reference timing clock; (c) defining a voltage level transition interval according to the maximum transition timing and the minimum transition timing; and (d) determining phase of the sampling clock signal or phase of the input signal according to the voltage level transition interval.08-28-2014
380218000 Variable time delay modulation of baseband video signal 1
20110243325DISPLAY SYSTEM, CONTROL APPARATUS, DISPLAY METHOD, AND PROGRAM - A display system includes display terminals (10-06-2011
380220000 Carrier frequency conversion 1
20120008773PROVIDING CONTROL WORDS TO A RECEIVER - A method and a system of transmitting one or more control words to a receiver system is described, wherein the one or more control words are generated by a scrambling system for scrambling during a crypto period data packets in a service stream. The method involves transmission of at least one service stream and a stream of entitlement control messages associated with said service stream to the receiver system, each entitlement control message comprising at least one encrypted control word; and controlling the processing load of the receiver system by modifying the duration of said crypto period.01-12-2012
380213000 Chrominance scrambling 1
20090296929PROCESSING VIDEO CONTENT - A method for processing video content is disclosed. The method comprises: receiving, in a hardware device connected in operation to a computer, encrypted, encoded video content; decrypting the encrypted, encoded video content to form decrypted, encoded video content; decoding a first portion of the decrypted, encoded video content to form a decrypted, decoded video content portion; re-encrypting the decrypted, decoded video content portion to form a re-encrypted, decoded video content portion; re-encrypting a second portion of the decrypted, encoded video content to form a re-encrypted, encoded video content portion; and outputting the re-encrypted, decoded video content portion and the re-encrypted, encoded video content portion to the computer.12-03-2009
Entries
DocumentTitleDate
20080205644Method for encrypting and decrypting an image frame - An apparatus for encrypting an image frame generates a key frame, performs XOR with the image frame and the key frame to generate a temporary image frame, and changes positions of blocks of the temporary image frame according to a first key to generate an encrypted image frame.08-28-2008
20080212775Novel Trick Mode System - A method is described for trick mode playback, the method including selecting a key-frame in a recording substantially in the vicinity of a trick mode playback starting position, preparing a decryption key associated with a key period including the selected key-frame, sending the prepared decryption key to a descrambler, thereby enabling decryption of video beginning at the selected key-frame, sending a first number P seconds of decrypted video frames, starting at the selected key-frame, at a predetermined speed for a predetermined number of seconds, to a video decoder, in parallel to the sending P seconds of video frames, choosing at least a second video section to stream to the video decoder, sending a decryption key associated with the chosen second video section to the descrambler, and repeating the steps of selecting, preparing, sending the prepared decryption key, and sending a first number P seconds of decrypted video frames. Related apparatus and methods are also described.09-04-2008
20080219443APPARATUS AND METHOD FOR AN ITERATIVE CRYPTOGRAPHIC BLOCK - A method and apparatus for an iterative cryptographic block under the control of a CPU and without a fixed number of stages. In one embodiment, a first cryptographic block descrambles received information using an internal key or a preprogrammed key to form a descrambled key or descrambled data. A data feedback path stores the descrambled data as internal data and provides the internal data or the external data as data input to the first cryptographic block. A key feedback path stores the descrambled key as an internal key and provides the internal key or the preprogrammed key to a key input of the first cryptographic block. A second cryptographic block descrambles received content using a final descrambling key. Other embodiments are described and claimed.09-11-2008
20080240431Dynamically shifting control word - A method for generating a plurality of control words, each control word controlling access to an object. The method includes providing a control word packet (CWP), generating a first control word (CW) from the CWP, providing a second CW generation input and producing a second CW based, at least in part, on both of the following the first CW and the second CW generation input. Control word generating apparatus for generating a plurality of control words is also disclosed.10-02-2008
20080267400Multiple partial encryption - A method of encrypting a digital television signal carried out in any operative order involves duplicating packets in the digital television signal so as to create first and second duplicate packets; encrypting the first duplicate packets according to a first encryption method to create first encrypted packets; encrypting the second duplicate packets according to a second encryption method to create second encrypted packets; identifying packets in the digital television signal that are of a packet type, while other packets are not of the packet type; replacing the identified packets in the digital television signal with corresponding first and second encrypted packets to produce a multiple partially encrypted digital television signal comprising the other packets that are unencrypted and the first and second encrypted packets; and distributing the multiple partially encrypted digital television signal. This abstract is not to be considered limiting as other embodiments may include more or fewer or differing elements than appear in the abstract.10-30-2008
20080279377METHOD AND SYSTEM FOR SCRAMBLING MEDIA DATA IN REAL TIME - A method for scrambling media data in real time solves the problems of heavy load on related devices and high requirements on their performance when multiple scrambling components scramble the same media data and scrambling associated data need be generated for each scrambling component in the related art. The method includes: acquiring scrambling associated data including an ECM and sending it to scrambling components based on the media data to be scrambled, in which the multiple components that scramble the same media data share the same scrambling associated data; the scrambling components scramble media data by using the scrambling associated data. Embodiments of the invention also solve the problem of failure to effectively scramble programs demanded by subscribers in the VOD system in the related art. In addition, embodiments of the invention disclose a system for scrambling media data.11-13-2008
20080285751Deterring Theft of Media Recording Devices by Encrypting Recorded Media Files - Techniques are disclosed for deterring theft of media recording devices. Input received from a sensor, or some portion of the input, is encrypted prior to storing a media file. A decryption key must be provided when the media file is to be played back. If the key is not provided, then the file is preferably still played back, but is played back in a degraded manner. For example, a background color or other filler may be rendered in place of the encrypted portion. Additional parts of the file may also be degraded during playback. By making the playback unpleasant for the listener/viewer, theft of the recording device will be much less desirable—yet recording can continue uninterrupted, thereby minimizing disruption to legitimate users. The disclosed techniques may also be used to deter theft of the recorded media.11-20-2008
20080298585Smartcard Dynamic Management - A method for securing a portable security module for use with a decoding element, the portable security module and the decoding element allowing to descramble scrambled audiovisual information. The method comprises analyzing at the portable security module a sequence of command messages, the command messages of the sequence being received at the portable security module at distinct times.12-04-2008
20080298586Decryption System and Method for Video Data - The disclosed embodiments relate to a system that processes video data. An exemplary embodiment of the system includes a module that initiates a channel search procedure on a transport stream, a module that determines an encryption level of a first channel in the transport stream based on a control bit within the transport stream, and a module that adds the first channel and its associated encryption level to a channel map.12-04-2008
20090052668METHOD FOR PROVIDING A VIDEO SIGNAL AND DESCRAMBLE CARD AND VIDEO APPARATUS USING THE SAME - A method for providing a video signal, and a descramble card and a video apparatus using the same are disclosed. The video apparatus includes a first interface which receives a scrambled video signal, and outputs the scrambled video signal, a second interface which transmits the scrambled video signal to a storage medium connected with the video apparatus, and a controller which controls the first interface to transmit the scrambled video signal to the second interface. Accordingly, a personal video recorder (PVR) function is provided to a premium broadcast content.02-26-2009
20090097646Digital Video Recorder Anti-Skip System - A method for producing scrambled content (FIG. 04-16-2009
20090103727Sync-bit Insertion for Timing Reference Signals to Prevent Long Runs of Static Data in Serial Digital Interfaces - In accordance with the teachings described herein, systems and methods are provided for inserting 2-bit codes into the least significant bit positions of timing reference signal code words, to prevent long runs of zeros from entering the scrambling polynomial. By preventing the long runs of ones and zeros in the scrambled data stream, the receive-end DC-restoration circuits can be simplified, reducing complexity and increasing system performance. A serial digital interface prevents long runs of ones and zeros by replacing the values of the two least significant bits of the data stream prior to the scrambler. The two least significant bits are changed from 11b or 00b to 01b or 10b.04-23-2009
20090136030Video monitoring system with video signal encrypted and the and method for the same - Techniques pertaining to a security system are disclosed. According to one aspect of the techniques, secured communication of video data between a monitoring system including a monitoring camera and a monitoring terminal is established by encrypting the video data. The monitoring camera is configured to encrypt digital image data before the image data is transmitted to the monitoring terminal. Instead of using commonly used encryption schemes, encryption rules are generated in accordance with an encryption key corresponding to a predetermined encryption algorithm. On the side of the monitoring terminal, decryption rules are generated in accordance with a received description key corresponding to a predetermined decryption algorithm. Depending on implementation, the image data may be encrypted/decrypted line by line, block by block or frame by frame.05-28-2009
20090136031METHOD FOR PROTECTING CONTENT AND METHOD FOR PROCESSING INFORMATION - Disclosed are a method of protecting content and a method of processing information. The method of protecting content can include service related information including revocation application information of content from the outside by employing a content management and protection system, and apply or not apply a content revocation process on the content according to the revocation application information. Accordingly, whether to apply a content revocation process can be controlled according to revocation application information.05-28-2009
20090147953System and method for conditional access key encryption - A system for processing multimedia channels is described comprising: transmitting decryption keys for decrypting the multimedia channels, the keys encrypted in both a first encryption format and a second encryption format; the keys encrypted in the first encryption format being decryptable by a first type of multimedia receiver; and the keys encrypted in the second encryption format being decryptable by a second type of multimedia receiver.06-11-2009
20090154697DIGITAL RIGHTS MANAGEMENT SYSTEM AND METHOD - A system and a method for providing variable security mechanisms for securing digital content, in which a single security mechanism is not used for all content. Instead, at least one characteristic or feature of the security mechanism is varied between units, instances or categories of content. Therefore, even if unauthorized access is gained to a single unit of content, the overall integrity and security of the system for content distribution is not compromised. Preferably, security is provided though a general mechanism, which is then varied in order to provide variable, dissimilar security schemes for different types of content. By “type of content”, it is meant any of a single unit of content, a single instance of content or a single category of content. For example, for a category of content, the content may be characterized according to the identity of the content itself, such as the title of a movie for example, and/or according to the owner of a particular copy of the content. Thus, different security schemes may optionally and preferably be generated from a particular root structure. Related apparatus and methods are also provided.06-18-2009
20090169000Encryption device and medium, decryption device and method, data delivery device, data receiving device, and data delivery system - A data delivery device divides data representing a single entity into a plurality of data items, encrypts the data items, and delivers the encrypted data items to a data receiving device. The encryption device in the data delivery device includes a first encryptor that encrypts a first set of the data items, leaving a second set of the data items unencrypted. A storage unit stores the encrypted first set of data items and the unencrypted second set of data items, pending delivery to the data receiving device. A second encryptor encrypts the second set of data items in real time when they are taken from the storage unit and delivered to the data receiving device. By combining pre-encryption and real-time encryption, the encryption device attains a high level of security with only a moderate real-time processing load.07-02-2009
20090185683ENCODING AND DETECTING APPARATUS - An encoding data processor generates a video material item marked copy by representing a payload data word as a code word embedded into a copy of the video material item. A preprocessor forms plural initial values having the same predetermined length, by representing one or more parts of the payload data word in one or more of the initial values, each including a field index, and setting remaining parts of the initial value to a predetermined value. An encryption processor receives each initial value and generates an encrypted data stream therefrom using a payload encryption key to provide plural encrypted data streams. The parts of the encrypted data streams are combined with frames of the material item. Plural initial values include the same part of the payload data, and a field index value for the initial value including the same payload data is changed with respect to other initial values.07-23-2009
20090185684MOTION PICTURE DISTRIBUTION SYSTEM AND RELATED METHOD - A motion picture distribution system, the system including a central computer, an exhibitor computer, a communication channel, and a back channel. The central computer is located at a central site and configured to distribute a digital version of the motion picture. The exhibitor computer is located at an exhibitor location that is remote from the central site. The exhibitor computer is configured both to receive the digital version of the motion picture from the central computer, and to display the motion picture. The communication channel is configured to facilitate the electronic transfer of the digital version of the motion picture from the central computer to the exhibitor computer. The back channel is coupled between the central computer and the exhibitor computer, and configured to allow for the transfer of information between the exhibitor computer and the central computer.07-23-2009
20090190756Systems and Methods for Securing a Digital Communications Link - A digital data signal, such as a digital video signal, is intentionally pre-distorted before being sent over a network. In one embodiment, this pre-distortion may be performed in accordance with a pre-distortion pattern or algorithm which is shared with only intended receivers. The pre-distortion pattern may be used to vary the pre-distortion on a periodic basis, as frequently as on a symbol-by-symbol basis. The pre-distortion function may include distorting the phase and/or the amplitude of the digital signal's modulation.07-30-2009
20090202072CONTROL MESSAGE PROCESSING METHOD - This invention relates to a method for processing control messages from a set of control messages intended to access an encrypted content received in the form of a stream by a multimedia unit. These messages include at least a discrimination parameter having a different value for two consecutive messages in the stream and access data to encrypted content. The method comprises steps for receiving a current control message, for reading the discrimination parameter from the current control message, for retrieving in a memory, the discrimination parameter from the message processed previously to the current message, for comparing the discrimination parameter of the current message with the previously processed message discrimination parameter, and for blocking said current control message by the filter if the comparison step indicates that the discrimination parameter of the current message is identical to the discrimination parameter of the previously processed message.08-13-2009
20090214032Method and apparatus for detection of loss of cipher synchronization - Detecting loss of stream cipher synchronization between a transmitter and a receiver in a video processing system may be achieved by receiving, by the receiver, an encrypted video frame from the transmitter, obtaining an encrypted value for a selected pixel in the encrypted video frame, decrypting the encrypted pixel value using a first portion of the receiver's current key stream, re-encrypting the pixel value using a second portion of the receiver's current key stream, sending the re-encrypted pixel value from the receiver to the transmitter, obtaining, by the transmitter, a plaintext value for the selected pixel from a corresponding original video frame and encrypting the plaintext pixel value using a second portion of the transmitter's current key stream, and comparing the re-encrypted pixel value received from the receiver with the encrypted pixel value generated by the transmitter and detecting a loss of cipher synchronization when the values do not match.08-27-2009
20090232304PROGRAM EXECUTABLE IMAGE ENCRYPTION - The invention provides for a method of encrypting and executing an executable image, comprising; flagging sections of the executable image to be encrypted using commands in source files and compiling said executable images so as to generate object files, linking one or more of said executable images using a linker to produce a final executable image, passing said linked executable images to a post-linker encryption engine to encrypt a relocation fix-up patch table and sections of executable images flagged for encryption, and at load time decrypting relocating and executing the executable images.09-17-2009
20090257587AV DATA TRANSMISSION APPARATUS, AV DATA RECEPTION APPARATUS, AND AV DATA TRANSMISSION AND RECEPTION SYSTEM - An AV data transmission apparatus comprising: an encryption unit which encrypts AV data; an AV data transmission unit which transmits the encrypted AV data; a cipher-type-information switching unit which switches cipher type information indicating a cipher scheme used for the AV data, to other cipher type information; and a cipher-type-information transmission unit which transmits cipher type information. When transmitting AV data which is prohibited from being used in a reception apparatus that does not support new usage control information, the AV data transmission apparatus assigns different cipher type information to be notified to the reception apparatus, so that even the reception apparatus which cannot recognize the new usage control information can recognize that being unable to perform decryption is due to new encryption performed by the AV data transmission apparatus.10-15-2009
20090316892Crypto micro-module using IEEE 1394 for stream descrambling - In certain embodiments, a television receiver circuit has a tuner circuit and a demodulator circuit that cooperatively produce a digital transport stream for a tuned channel as an output therefrom. A transport processor in an SOC receives the digital transport stream and switches the digital transport stream to an IEEE1394 bus if it is conditional access encrypted, or else if the content is unencrypted, the content is sent to a decoder residing in the SOC. A connector is permanently affixed to the circuit board that is in communication with the IEEE1394 bus. A removable crypto micro-module is installed in the connector, having an IEEE1394 compliant bus providing interconnections to the connector, receiving the digital transport stream for the tuned channel and managing conditional access keys for descrambling the tuned channel and for descrambling the tuned channel, and copy protecting the clear channel for delivery across the IEEE 1394 bus back to the transport processor in the SOC. A copy protection decrypter forms a part of the transport processor in the SOC that decrypts the copy protected stream and sends it to the decoder in the SOC. This abstract is not to be considered limiting, since other embodiments may deviate from the features described in this abstract.12-24-2009
20090316893Address Generating Method and Broadcast Receiving Apparatus - A broadcast receiving apparatus comprises a broadcast receiving unit (12-24-2009
20090316894METHOD AND APPARATUS FOR CHECKING CONSISTENCY BETWEEN DIGITAL CONTENTS - The present invention discloses a method and apparatus for checking consistency between digital contents, pertaining to digital rights management technologies. The method includes: extracting feature values from an original digital content; extracting feature values from a digital content under check; comparing the feature values of the original digital content with the feature values of the digital content under check; and determining whether the digital content under check is consistent with the original digital content according to a comparison result. The apparatus includes: a first extracting module, a second extracting module, a comparing module, and a first determining module. With the present invention, it is feasible to determine whether a digital content under check is illegal according to a user policy. The check process does not require any change to the terminal. The user experience is assured and the security is high.12-24-2009
20090316895CONDITIONAL ACCESS SYSTEM AND METHOD FOR PREVENTION OF REPLAY ATTACKS - In a conditional access system, a headend transmits content to one or more receivers in encrypted transport streams. The system provides a multi-layer security architecture, rendering the system resistant to key replay attacks; if one layer is circumvented, subsequent layers remain intact. A first layer prevents unencrypted keys from being recorded by shielding the unencrypted keys from users and encrypting the path from the receiver's conditional access module to the transport decryption module; a second layer prevents a key recorded on one receiver from being played back to the transport decryption module on a second receiver; a third layer prevents a user from decrypting transport streams without the encryption module by encrypting the stream a second time prior to being passed through any user-accessible memory or processor.12-24-2009
20090323948Stream Generation Method, Broadcast Receiving Apparatus, and Display Method - Provided is a system far receiving a initialization packet containing an initial vector for initializing stream encryption algorithm and an identifier of a key for decrypting an encrypted stream, initializing a decryption modules and decrypting the encrypted stream, wherein the system stores an identifier of a key which is needed to decrypt a next program in a initialization packet of a current program and informs a user of whether a desired key has been acquired or not at timing close to start time of the next program.12-31-2009
20100008502CONTENT DISTRIBUTION SYSTEM, CONTENT RECEPTION TERMINAL, CONTENT DISTRIBUTION METHOD AND PROCESSING METHOD PERFORMED WHEN VIEWING STREAMING CONTENTS - There is provided a system including a plurality of content distribution servers for distributing scrambled contents and streaming-distributing an encrypted scramble key used for releasing the scrambling, a license server for providing a work key for decoding the encrypted scramble key distributed from the predetermined content distribution server, a portal server for providing address information of the predetermined content distribution server, and a content reception terminal for obtaining address information of the predetermined content distribution server from the portal server, referring to the address information to obtain the contents and the scramble key from the predetermined distribution server, decoding the scramble key by using the work key obtained from the license server and descrambling the scrambled contents by using the scramble key.01-14-2010
20100008503Secure Terminal Data Loader Apparatus and Method for a Mobile Platform - A terminal data loading device on a mobile platform includes a media unit for receiving a transportable media element containing media data and outputting a media signal to a control processor unit. The control processor unit outputs an information signal to a wireline communication unit. The wireline communication unit outputs a wireline signal to a network on the mobile platform.01-14-2010
20100014666Method and Apparatus for Protecting Scalable Video Coding Contents - Disclosed are a method and apparatus capable of reducing the computational complexity of encryption and decryption by encrypting only data of scalable video coding contents for each coding layer in terms of temporal, spatial, and SNR scalabilities to provide a service for protected scalable video coding contents, and capable of protecting contents by generating and distributing an encryption key for encryption and decryption depending on a class of a contents consumer.01-21-2010
20100027790METHODS FOR AUTHENTICATING A HARDWARE DEVICE AND PROVIDING A SECURE CHANNEL TO DELIVER DATA - A method for delivering audio/video data through a hardware device using a software application comprises, at the hardware end, receiving an encrypted application key, an encrypted random session key, and encrypted audio/video data from the software. The hardware then decrypts the encrypted application key using a secret encryption key, decrypts the encrypted random session key using the application key, and decrypts the encrypted audio/video data using the random session key. The hardware may then deliver the unencrypted audio/video data by way of a display and speakers. The secret encryption key is securely embedded within the hardware device at an earlier point in time.02-04-2010
20100027791FUZZY PROTECTION OF VISUAL CONTENT - A method and system for encoding visual information are described. An image is divided in to n number of patterns. Each pattern is mapped on a matrix i.e positioned on X and Y-axis. The patterns are then arranged in a different and new shape for e.g. a rectangle, to that of the original shape of the image but having the same number of patterns or same area. The patterns of pixels are then relocated in the new shape and a matrix is again mapped for the new arrangement of patterns. A key is then generated comprising the information of the encrypted and earlier image. In order to decrypt the encrypted visual content or the encrypted image, the player reads the key or encrypted visual content and decrypts the encrypted visual content or image by means of the information provided by the key.02-04-2010
20100040229METHOD AND SYSTEM FOR TUNING TO ENCRYPTED DIGITAL TELEVISION CHANNELS - A method and system for tuning to a scrambled television channel is provided. One implementation involves receiving a channel selection from a user, tuning to the selected scrambled channel, checking a cache for Conditional Access (CA) descrambling information associated with the selected channel, and in case of a cache hit, then retrieving the descrambling information associated with the selected channel from the cache for descrambling the scrambled channel.02-18-2010
20100046752System and Method for Security Processing Media Streams - A system for multi-stream security processing and distributing digital media streams includes a headend, a network, and at least one receiver. The headend is generally configured to generate encrypted digital media streams. The network may be coupled to the headend and configured to receive the encrypted digital media streams. The at least one receiver may be coupled to the network and configured to receive the encrypted digital media streams and present a decrypted version of the encrypted digital media streams. At least one of the headend and the at least one receiver include a security processor that may be configured to provide at least one of simultaneous multiple encryption and simultaneous multiple decryption processing of the digital media streams.02-25-2010
20100067693SYSTEM AND METHOD OF ENABLING CONTENT OUTPUT ON A DIGITAL DEVICE - In one embodiment the present invention includes a system and method of distributing content. Authorization information is encoded with the content. When received and decoded, if a particular device output is authorized by the authorization information, then the content is output. By encoding the authorization information along with the content, unauthorized display of the content is reduced.03-18-2010
20100128871METHOD AND SYSTEM FOR THE SECURED DISTRIBUTION OF AUDIOVISUAL DATA BY TRANSACTION MARKING - The application relates to a method for distributing a marked audiovisual sequence from a nominal audiovisual sequence, said nominal audiovisual sequence having a nominal content, wherein 05-27-2010
20100135489Eliminating Plaintext Video from External Memory - In an embodiment, an integrated circuit comprises a decompressor, an encrypt unit, and an on-chip image buffer coupled to the decompressor and the encrypt unit. The decompressor is configured to receive a compressed video stream, and to reconstruct a first frame of the video stream in the on-chip buffer. The encrypt unit is configured to generate one or more pixel block streams from pixel blocks of the first frame in the on-chip buffer according to sequence data describing an order of access of the pixel blocks to reconstruct subsequent frames of the video stream. The sequence data was previously generated via processing of the video stream by the integrated circuit, and the encrypt unit is configured to encrypt the pixel block streams to be written to an external memory. In an embodiment, an integrated circuit comprises a decrypt unit configured to decrypt an encrypted, compressed video stream; an on-chip buffer; and a decompressor coupled to the decrypt unit and the on-chip buffer. The decompressor is configured decompress the video stream, and to store a first portion of each of a first plurality of frames decompressed from the video stream in the on-chip buffer. The decompressor is further configured to store a remaining portion of each of the first plurality of frames in an external memory, wherein each frame as stored in the external memory is incomplete because the first portion is not stored in the external memory.06-03-2010
20100183149METHOD FOR SIMULCRYPTING SCRAMBLED DATA TO A PLURALITY OF CONDITIONAL ACCESS DEVICES - One embodiment of the invention relates to an apparatus comprising an input, a descrambler unit and a re-scrambler unit. The input is adapted to receive scrambled content. The descrambler unit is coupled to the input. The descrambler unit descrambles the scrambled content in order to recover unscrambled content and concurrently routes both the unscrambled content over a first communication link for display on a display device and the unscrambled content over a second communication link. The re-scrambler unit is coupled to the second communication link. The re-scrambler unit is adapted to scramble the unscrambled content to produce re-scrambled content for transmission.07-22-2010
20100189254Slice mask and moat pattern partial encryption - A selective encryption encoder consistent with certain embodiments of the invention has vertical and/or horizontal stripes encrypted. In one embodiment, packets are examined in the digital video signal to identify a specified packet type, the specified packet type being both packets carrying intra-coded data representing a pattern of horizontal stripes across an image and packets carrying intra-coded data representing a pattern of vertical stripes across an image. The packets identified as being of the specified packet type are encrypted using a first encryption method to produce first encrypted packets. These first encrypted packets are then used to replace the unencrypted packets in the digital video signal to produce a partially encrypted video signal. The packets of the specified type can also be multiple encrypted and replaced in the data stream to produce a multiple encrypted video data stream. This abstract is not to be considered limiting since embodiments consistent with the present invention may incorporate more, fewer or differing elements than mentioned in this abstract.07-29-2010
20100189255IMAGE PROCESSING APPARATUS AND METHOD - Encrypted video data is decrypted as first image data. If a first image processing module includes an output processing to an outside of a first secure memory which an access from an outside of an apparatus is restricted, the first image processing module is converted to a second image processing module including the output processing invalidated. The first image data is processed using the second image processing module, by accessing the first secure memory, and second image data is generated. If a first rendering module includes an output processing to an outside of a second secure memory which an access from the outside of the apparatus is restricted, the first rendering module is converted to a second rendering module including the output processing invalidated. The second image data is rendered using the second rendering module, by accessing the second secure memory.07-29-2010
20100202611SYSTEMS AND METHODS FOR PROTECTING INFORMATION - Systems and methods for protecting information provided to an agent via a communication network are provided. In this regard, a representative method comprises, receiving information related to a transaction, wherein the information includes video. Additionally, the method includes initiating a recording of the video and identifying visual content in the video that is to be protected. The method further comprises preventing unauthorized access to the visual content during replay of the recording of the video.08-12-2010
20100208892Methods and devices for digital content protection - Methods and devices for controlling access to digital content. The digital content is split into at least one code part and one scrambled part. A codec of a user device finds that the first part is not scrambled and plays it. The first part comprises code to be retrieved and entered by a user. Using the input code, the codec generates a corresponding scrambling key, possibly also using additional information such as a current time. The codec then detects an upcoming scrambled part and uses the generated scrambling key to descramble and display the scrambled section. In a preferred embodiment, instead of entering part of the code itself, the codec generates, using e.g. metadata and time, to generate part of the code to display to the user.08-19-2010
20100220858CORRELATION-BASED SYSTEM FOR WATERMARKING CONTINUOUS DIGITAL MEDIA - A correlation-based system for watermarking continuous digital media at the system application level. It is a post-compression process for watermarking where no a priori knowledge of the underlying compression algorithm is required. Per each compressed media frame, a current unique digital signature is generated based on the data from the current compressed frame plus the digital signature that has been previously generated. The signature thus generated is then used in conjunction with the next compressed frame to generate the next unique digital signature. All digital signatures are correlated according to the above process until a “reset” signal is issued. A new chain of correlated digital signatures is produced by the system with a pre-determined initial signature.09-02-2010
20100232604CONTROLLING ACCESS TO CONTENT USING MULTIPLE ENCRYPTIONS - Controlling access to content using multiple encryptions, including: receiving content comprising media data; first encrypting a substantial portion of the content using a primary key; selecting a subset of the substantial portion of the content; and second encrypting the selected subset of the content using a secondary key different from the primary key.09-16-2010
20100246819Method to upgrade content encryption - Generation of secret keys is carried out in a smartcard for use by a receiver device's main processor, or alternatively, decryption processing for selectively encrypted content is carried out in the smartcard itself in order to thwart hacking and pirating of protected video content. This abstract is not to be considered limiting, since other embodiments may deviate from the features described in this abstract.09-30-2010
20100246820MODULAR BROADCAST RECEIVER SYSTEM AND METHOD - The construction of a receiving apparatus for receiving a broadcast from a plurality of broadcasting providers is simplified. In a receiving apparatus for receiving a broadcast from a plurality of broadcasting providers, of the function blocks which constitute the receiving apparatus, a block used in common irrespective of the broadcasting provider is formed as a common block, and a block different from one broadcasting provider to another is formed as an independent block. These blocks are connected to each other through an IEEE1394 interface, and the common block is shared among the plurality of blocks which are not used in common, so that a receiving process is performed.09-30-2010
20100246821MODULAR BROADCAST RECEIVER SYSTEM AND METHOD - The construction of a receiving apparatus for receiving a broadcast from a plurality of broadcasting providers is simplified. In a receiving apparatus for receiving a broadcast from a plurality of broadcasting providers, of the function blocks which constitute the receiving apparatus, a block used in common irrespective of the broadcasting provider is formed as a common block, and a block different from one broadcasting provider to another is formed as an independent block. These blocks are connected to each other through an IEEE1394 interface, and the common block is shared among the plurality of blocks which are not used in common, so that a receiving process is performed.09-30-2010
20100260336HDCP VIDEO OVER USB - A system includes an HDCP-over-USB controller including an HDCP module for encrypting or decrypting video data according to an HDCP standard prior to transmission or display of said video data.10-14-2010
20100278339ENCRYPTION- AND DECRYPTION-ENABLED INTERFACES - Decryption apparatus includes an input memory (11-04-2010
20100303231UPDATING CRYPTOGRAPHIC KEY DATA12-02-2010
20110013773USE OF COPYRIGHT TEXT IN KEY DERIVATION FUNCTION - Consistent with embodiments of the present invention, systems and methods are disclosed for deriving a secure key. In some embodiments, a method for deriving a key may be provided comprising: generating a first input value; loading a first register with the first input value; generating a second input value; loading a second register with the second input value; updating the first register and the second register at the same time, where the step of updating comprises: applying a first update function to the current value of the second register to determine a third input value; applying an XOR function to the third input value and a fixed string to determine a fourth input value, wherein the fixed string contains a legal notice; incrementing an offset to the fixed string; storing the fourth input value in the first register; applying a second update function to the current values of the first register and the second register to determine a fifth input value; storing the fifth input value in the second register; repeating the step of updating the first register and the second register a predetermined number of times; and outputting the value of the second register as the key.01-20-2011
20110058669UNIQUE IDENTIFIER PER CHIP FOR DIGITAL AUDIO/VIDEO DATA ENCRYPTION/DECRYPTION IN PERSONAL VIDEO RECORDERS - The invention provides techniques to implement unique identifier for an integrated chip and how this ID can be employed to enhance the security of content in personal video recorder type systems. The storage device can be a hard disk, a removable storage medium or any other type of storage medium. An integrated circuit (IC) within the personal video recorder stores a unique identifier that is used in for encryption and decryption of data stored on the storage device. Several embodiments are disclosed herein that maintain the secrecy of the unique ID such that it is not easily accessible thereby defeating the security scheme.03-10-2011
20110064218METHOD, APPARATUS AND SYSTEM FOR ANTI-PIRACY PROTECTION IN DIGITAL CINEMA - A digital cinema anti-piracy system includes a modulator configured to convert an input signal to a desired disruptive frequency and to analyze a brightness, B, of each input pixel in an input frame of the signal, the modulator for determining at least the amount of brightness Bj of each pixel to be displayed in each frame j of a set of N frames, wherein the average of all the brightness values Bj in the N set of frames is substantially equal to B, and N is substantially equal to the number of frames output for each input frame. A brightness of a pixel in a second region Bf(j) can be displayed ‘out of phase’ with the brightness Bj to create a disruptive effect which is distinguishable from the first flicker effect.03-17-2011
20110085661CONTENT RECEIVING TERMINAL, CONTENT REPRODUCING TERMINAL, CONTENT WRITE-OUT METHOD, AND PROGRAM - During the export processing for the video content (S04-14-2011
20110096924ANTIPIRACY KEY SEGMENTATION FOR HFC MULTICAST DISTRIBUTION FROM MASTER HEADEND TO CABLE HUBS - A method of segregating a hybrid fiber cable network involves assigning a packet identifier (PID) to each of a plurality of hubs on the hybrid fiber cable network; assigning a distinct decryption method to each of the plurality of hubs, so that each of the plurality of hubs is identifiable by its associated decryption method and PID; generating selectively multiple encrypted content for transmission to the hubs, where content encrypted for use by each hub is identified by the hub's assigned PID; and transmitting the selectively multiple encrypted content over the hybrid fiber cable network to the plurality of hubs. This abstract is not to be considered limiting, since other embodiments may deviate from the features described in this abstract.04-28-2011
20110135090ELEMENTARY BITSTREAM CRYPTOGRAPHIC MATERIAL TRANSPORT SYSTEMS AND METHODS - Systems and methods for providing multimedia content from one process or component to another process or component over an unsecured connection are provided. One embodiment includes obtaining the cryptographic information, extracting the at least partially encrypted video data from the container file to create an elementary bitstream, enciphering the cryptographic information, inserting the cryptographic information in the elementary bitstream, providing the elementary bitstream to a video decoder, extracting the cryptographic information from the elementary bitstream at the video decoder, deciphering the cryptographic information, decrypting the elementary bitstream with the cryptographic information and decoding the elementary bitstream for rendering on a display device using the video decoder.06-09-2011
20110150217METHOD AND APPARATUS FOR PROVIDING VIDEO CONTENT, AND METHOD AND APPARATUS REPRODUCING VIDEO CONTENT - A method of providing video content, the method comprising generating a basement layer and a plurality of enhancement layers by performing scalable video coding on a piece of video content; encrypting the basement layer and the plurality of enhancement layers by using different encryption keys, respectively; and transmitting one of the encryption keys to the second device, together with a video content package that comprises the encrypted basement layer and enhancement layers. The encryption keys include a random encryption key generated randomly and chain encryption keys generated sequentially by performing a Hash function on the random encryption key at least one time.06-23-2011
20110164747METHOD TO ENFORCE BY A MANAGEMENT CENTER THE ACCESS RULES FOR A BROADCAST PRODUCT - A method to enforce by a management center access rules for a broadcast product accessed by an access key, the management center managing a plurality of Boolean positive and negative attributes, comprising the steps: associating one positive Boolean attribute to a receiver entitled to the attribute and loading the same; associating one negative Boolean attribute to a receiver not entitled to the attribute and loading the same; defining at least a second broadcast encryption scheme for the negative Boolean attributes and associating each negative Boolean attribute corresponding decryption key material; expressing access conditions on a product as a Boolean expression by combining at least one positive Boolean attribute and at least one negative Boolean attribute by at least one Boolean conjunction or disjunction; generating and broadcasting at least one cryptogram to a receiver, encrypting the access key with the two combined broadcast encryption schemes according to the Boolean expression.07-07-2011
20110170688CLIENT-SIDE PROTECTION OF BROADCAST OR MULTICAST CONTENT FOR NON-REAL-TIME PLAYBACK - A system and method are disclosed for providing client-side protection of broadcast or multicast multimedia content for non-real-time playback. A set-top box function receives a request to record multimedia content and determines whether recording of the multimedia content is restricted. Upon receiving the multimedia content, the set-top box decrypts the multimedia content for real-time playback. If recording of the multimedia content is restricted, the set-top box re-encrypts the multimedia content and generates a packaged file including the re-encrypted multimedia content and one or more of a content identifier, a set-top identifier, a network reference to a copyright policy server, and a record policy of the multimedia content. The packaged file is either stored locally or transferred to remote storage. A remote system having access to the packaged file obtains the packaged file and enforces a copyright policy of the multimedia content before releasing the multimedia content for non-real-time playback.07-14-2011
20110188652ENCRYPTION APPARATUS, DECRYPTION APPARATUS, ENCRYPTION METHOD, AND DECRYPTION METHOD - An encryption part (08-04-2011
20110255690REPROGRAMMABLE SECURITY FOR CONTROLLING PIRACY AND ENABLING INTERACTIVE CONTENT - Technologies are disclosed to transfer responsibility and control over security from player makers to content authors by enabling integration of security logic and content. An exemplary optical disc carries an encrypted digital video title combined with data processing operations that implement the title's security policies and decryption processes. Player devices include a processing environment (e.g., a real-time virtual machine), which plays content by interpreting its processing operations. Players also provide procedure calls to enable content code to load data from media, perform network communications, determine playback environment configurations, access secure nonvolatile storage, submit data to CODECs for output, and/or perform cryptographic operations. Content can insert forensic watermarks in decoded output for tracing pirate copies. If pirates compromise a player or title, future content can be mastered with security features that, for example, block the attack, revoke pirated media, or use native code to correct player vulnerabilities.10-20-2011
20110293091Method and apparatus for decrypting encrypted content - The present invention provides a method for decrypting encrypted content transmitted from an operator to a plurality of users where said operator further provides security information allowing for the decryption of said content. The method has the advantage of satisfying the goal of providing the capability for detecting a fraudulent user who retransmits control words extracted from the security information to other users. The method provides for the achievement of the goal without incurring extra overhead in addition to the transmitted content and security information. The method makes use of control words which are based on multiple solutions provided by collisions in mathematical functions and involves the observation of choices of control words retransmitted by the fraudulent user.12-01-2011
20110293092SECURITY METHOD FOR PREVENTING THE UNAUTHORIZED USE OF MULTIMEDIA CONTENTS - A method embeds tracing secret data into multimedia contents delivered to particular users. The method descrambles a first scrambled video stream having alternate values to obtain a personalized video stream corresponding to an original video stream by a decoder comprising at least a security unit and a descrambling unit, the personalized video stream being obtained by restoring the alternate values by personalized values taking into account an internal parameter on the security unit and received control data containing the original values and their location in the modified stream.12-01-2011
20110311044PROVIDING CONTROL WORDS TO A RECEIVER - A method and a system for providing control words to at least one a receiver are described wherein said receiver is associated with a secure module. The method comprises the steps of receiving at least part of a code book comprising code information for descrambling one or more service streams in a scrambled data stream sent to said receiver; providing a control word request associated with at least one crypto period in at least one of said service streams; and, in response to said control word request, generating on the basis of said code information at least one control word for descrambling data in said service stream and associated with said crypto period.12-22-2011
20110311045Partial Multiple Encryption - A partial multiple encryption device consistent with certain embodiments has an input adapted to receive a unencrypted video signal. An encryption arrangement produces a partially multiple encrypted video signal from the unencrypted video signal. An output is adapted to provide the partially multiple encrypted video signal. This abstract is not to be considered limiting, since other embodiments may deviate from the features described in this abstract.12-22-2011
20110317833GENERATING A SCRAMBLED DATA STREAM - A method and a system for generating a scrambled data stream is described, wherein the method comprises: providing a code book comprising code information for scrambling data in data stream comprising one or more service streams; generating a control word request associated with at least one crypto period in at least one of said service streams; in response to said control word request, generating on the basis of said code information at least one control word associated with said crypto period in said service stream; and, scrambling data associated with at least one of said service streams using said control word.12-29-2011
20120027208CONDITIONAL ACCESS SYSTEM AND METHOD FOR PREVENTION OF REPLAY ATTACKS - In a conditional access system, a headend transmits content to one or more receivers in encrypted transport streams. The system provides a multi-layer security architecture, rendering the system resistant to key replay attacks; if one layer is circumvented, subsequent layers remain intact. A first layer prevents unencrypted keys from being recorded by shielding the unencrypted keys from users and encrypting the path from the receiver's conditional access module to the transport decryption module; a second layer prevents a key recorded on one receiver from being played back to the transport decryption module on a second receiver; a third layer prevents a user from decrypting transport streams without the encryption module by encrypting the stream a second time prior to being passed through any user-accessible memory or processor. Event tables are transmitted with the transport stream, either unencrypted for immediate use or encrypted, to prevent unauthorized use.02-02-2012
20120063595METHOD AND APPARATUS FOR SELECTIVE DATA ENCRYPTION - A layered audiovisual packet data stream, such as one obtained by a JPEG2000 encoder, is received together with information (metadata) about the contribution of each packet to the reduction of image distortion. The distortion-to-rate ratio for each packet is calculated and the packets are ordered in descending ratio. The non-encrypted packet having the highest ratio is encrypted until the target distortion is obtained. Also provided is an apparatus. In a variant, the data in the packets are substituted by dummy data instead of encrypted.03-15-2012
20120082310CONTENT PROTECTION USING BLOCK REORDERING - An apparatus and method for protecting a content item such as a digitally encoded movie, an electronic programming guide, or the like, by reordering blocks of the content item prior to transmitting it to a receiving device. The receiving device constructs a block reordering structure which is used to access the reordered content item, to facilitate retrieval of a desired block from the original content item. The reordering may be done responsive to an identifier value of the receiving device, such as a serial number.04-05-2012
20120082311CONTENT PROTECTION USING BLOCK REORDERING - An apparatus and method for protecting a content item such as a digitally encoded movie, an electronic programming guide, or the like, by reordering blocks of the content item prior to transmitting it to a receiving device. The receiving device constructs a block reordering structure which is used to access the reordered content item, to facilitate retrieval of a desired block from the original content item. The reordering may be done responsive to an identifier value of the receiving device, such as a serial number.04-05-2012
20120087496HOME USE ACTIVE REMOTE ENCRYPTION AND SWITCHING DEVICE - A home use active remote encryption and switching device is revealed. Transmission of remote images and information as well as switching of home appliances is controlled by wireless communication. The home use active remote encryption and switching device includes at least one video mobile phone with specific permission, a signal receiving interface receiving signals from the mobile phone, a digital signal processor that decrypts and modulates signals from the mobile phone, a central processing unit that integrates and converts decrypted signals into switching signals, and a storage device storing audio/video signals. Thereby signals from the video mobile phone are transmitted to the remote signal receiving interface by wireless communication equipments. Then the signals are decrypted by the digital signal processor, converted into switching signals by the central processing unit, and sent to home appliances. Thus remote switching of home appliances is achieved under the control of the video mobile phone.04-12-2012
20120087497CONTENT PROTECTION MESSAGE EXTRACTION - A system for extracting a video-watermark embedded in a video sequence, comprising a decryption and decoding engine to receive the video sequence in a video-codec-encoded format and encrypted, then decrypt the video sequence yielding a decrypted video sequence, then decode the decrypted video sequence yielding a decrypted decoded video sequence, and then output the decrypted decoded video sequence to a display device for rendering thereon, a measurement module to measure memory usage utilized by the engine decoding at least part of the video sequence yielding measurements of memory usage, a memory usage analyzer to analyze the measurements to determine an arrangement of video frames of at least one frame type in the video sequence, and an encoding feature analyzer to analyze the arrangement of the video frames to extract the video-watermark from the video sequence. Related apparatus and methods are also described.04-12-2012
20120087498Method and Apparatus for Using Counter-Mode Encryption to Protect Image Data in Frame Buffer of a Video Compression System - Certain aspects for protecting image data in a video compression system may include encrypting image data utilizing counter-mode scrambling. The encrypted image data may be buffered in at least one frame buffer. The buffered encrypted image data may be decrypted by utilizing counter-mode descrambling.04-12-2012
20120087499Read/write encrypted media and method of playing - A new media device including a decryption device that is operable to create a decryption key to read media. The decryption device is itself a read/write device that allows reducing or decrementing each time the decryption key is used.04-12-2012
20120121085System and Method for Content Distribution with Broadcast Encryption - A content distribution method with broadcast encryption, comprising an encryption process that includes the computation of a ciphertext using a differential ciphertext generation method. The ciphertext needs to be recomputed whenever the subscriber set changes. The differential ciphertext generation method computes the new ciphertext by reusing previously preserved computational results of a previous ciphertext, thereby improving the efficiency of the system. A content distribution method with broadcast encryption also comprises a decryption process that includes the reconstruction of the encryption secret that is used for decrypting the encrypted content. A wide window point addition method is used in the encryption secret reconstruction. The wide window point addition method reuses previously preserved computational results of group-divided point additions of public parameters, thereby improving the efficiency of the system. A clustering solution with multiple instances of key server and entitlement server allows the expansion of user population in the content distribution network.05-17-2012
20120134496PARTIAL ENCRYPTION USING VARIABLE BLOCK-SIZES PARAMETERS - A method for data processing, comprising providing a sequence of image frames that is encoded by identifying intra and inter frames in the sequence and applying a variable block size motion compensation (VBSMC) procedure to the inter frames, thereby generating respective parameters representing the inter frames; selectively encrypting the block sizes, using an encryptor, without encrypting all of the parameters representing the inter frames; and outputting encoded data representing the sequence of the image frames and comprising the encrypted block sizes.05-31-2012
20120148042REMOTE ENTITLEMENT PROCESSING MODULE INTEGRATION PROCESSING DEVICE AND METHOD - There is provided a remote entitlement processing module integration processing device. The remote entitlement processing module integration processing device includes: a remote entitlement processing module generating and managing remote smart cards (RSCs) having the number corresponding to the number of host terminals managed by the remote entitlement processing module integration processing device; and a descrambler transferring channel selection information in response to a selection of a pay channel by a user to the remote entitlement processing module and descrambling a scrambled channel signal using a control word (CW) received as a response to the channel selection information, thereby making it possible to minimize dependency between a subscriber device and a conditional access system.06-14-2012
20120170741SECURE LIVE TELEVISION STREAMING - A client device implements a media player and a proxy application. The media player controls playback of media content on the client device. The proxy application is implemented to request a playlist from a media server, where the playlist corresponds to the media content. The proxy application receives the playlist from the media server, and the playlist includes encryption key reference parameters to obtain an encryption key. The proxy application modifies the playlist to include local encryption key access parameters for the media player, and the modified playlist is communicated to the media player. The proxy application can then receive a request for the encryption key from the media player that utilizes the local encryption key access parameters included in the modified playlist, and the proxy application securely communicates the encryption key to the media player.07-05-2012
20120177197VIDEO PROCESSING SYSTEM FOR SCRAMBLING LAYERED VIDEO STREAMS AND METHODS FOR USE THEREWITH - A video processing system includes a video encoder that encodes a video stream into an independent video layer stream and a first dependent video layer stream that requires the independent video layer for decoding. A scrambling module scrambles the independent video layer stream to produce a scrambled independent video layer stream and leaves the first dependent video layer stream unscrambled.07-12-2012
20120195426DISPLAY WITH SECURE DECRYPTION OF IMAGE SIGNALS - A display securely decrypts an encrypted image signal. Pixels are disposed between the display substrate and cover in a display area, and provide light to a user in response to a drive signal. Control chiplets disposed between the display substrate and cover in the display area are each connected to one or more of the plurality of pixels. Each receives a respective control signal and produce respective drive signal(s) for the connected pixel(s). A decryption chiplet is disposed between the display substrate and cover. It includes means for receiving the encrypted image signal and a decryptor for decrypting the encrypted image signal to produce a respective control signal for each of the control chiplets.08-02-2012
20120237029METHOD AND SYSTEM FOR MAINTAINING SECURE DATA INPUT AND OUTPUT - Methods and systems for enhancing the security of data during input and output on a client computer system are provided to prevent attempts by unauthorized code to access, intercept, and/or modify data. Example embodiments provide obfuscation techniques and security enhanced drivers that use these obfuscation techniques to prohibit unauthorized viewing/receiving of valid data. When the drivers are used together with the various obfuscation techniques, the security enhanced drivers provide mechanisms for “scheduling” the content of the storage areas used to store the data so that valid data is not available to unauthorized recipients. When unauthorized recipients attempt to access the “data,” they perceive or receive obfuscated data. The obfuscation techniques described include “copy-in,” and “replace and restore.”09-20-2012
20120250860ENCRYPTION PROCEDURE AND DEVICE FOR AN AUDIOVISUAL DATA STREAM - Apparatus for encrypting a stream of audiovisual data generated by an encoder (10-04-2012
20120250861BROADCAST RECEPTION TERMINAL AND BROADCAST RECEPTION METHOD - A broadcast receiving terminal includes a conditional access system (CAS) module that acquires key information from a broadcast signal and a renderer that plays back video/audio data in the broadcast signal. The CAS module includes a history information storage unit that stores playback history information and a playback time calculation unit that calculates playback remaining time information related to the video/audio data and sends a scrambling key and the playback remaining time information to the renderer. The renderer includes a descrambling unit and a decoding unit that decrypts the video/audio with the scrambling key to play them back and send history information related to the playback to the CAS module and a preview control unit that performs control to decrypt the video/audio data only for the time indicated by the playback remaining time information. The terminal achieves playback control in accordance with an actual playback time.10-04-2012
20120257749METHOD AND PROCESSING UNIT FOR SECURE PROCESSING OF ACCESS CONTROLLED AUDIO/VIDEO DATA - A method for verifying access conditions performed by two conditional access devices consecutively on a control message before releasing a control word to a descrambler. The control message includes a first part including first access conditions and a second part structured as a control message including at least second access conditions and a control word. A first conditional access device is configured for decrypting the control message with a common key specific to units having a first conditional access device and verifying the authenticity of said message. When the verification succeeds, the second part and a second right is transmitted to a second conditional access device, which decrypts the second part with a common key specific to units having a second conditional access device and verifies the authenticity of said second part and the second access conditions in relation to the second right encrypted by a personal key embedded therein.10-11-2012
20120275597Extending data confidentiality into a player application - In a content protection scheme, and in response to a request for a content segment received by a server, the server generates and associates with the segment a message that confers entitlement to a session-specific key from which one or more decryption keys may be derived. The decryption keys are useful to decrypt the segment at runtime as it is about to be rendered by a player. Before delivery, the server encrypts the segment to generate an encrypted fragment, and it then serves the encrypted fragment (and the message) in response to the request. At the client, information in the message is used to obtain the session-specific key. Using that key, the decryption keys are derived, and those keys are then used to decrypt the received encrypted fragment. The decryption occurs at runtime. The approach protects content while in transit to and at rest in the client browser environment.11-01-2012
20120281828PROTECTION OF AUDIO OR VIDEO DATA IN A PLAYBACK DEVICE - Method and apparatus to prevent hacking of encrypted audio or video content during playback. Hackers, using a debugging attachment or other tools, can illicitly access encrypted data in memory in a playback device when the data is decrypted during playback and momentarily stored in digital form. This hacking is defeated here by methodically “poisoning” the encrypted data so that it is no longer playable by a standard decoder. The poisoning involves deliberate alteration of certain bit values. On playback, the player invokes a special secure routine that provides correction of the poisoned bit values, for successful playback.11-08-2012
20120288091CONTENT RECEIVING DEVICE, CONTENT REPRODUCING DEVICE, CONTENT RECEIVING AND REPRODUCING DEVICE, CONTENT RECEIVING METHOD, AND PROGRAM - Provided is a content receiving device that can reduce processing loads at a time when an encrypted stream is decrypted. A video recording and reproducing device 11-15-2012
20120300926VALID REPLACEMENT DATA IN ENCODED VIDEO - A security method for H.264 video streams and the like is provided that comprises: coding video data with incorrect or missing bytes, whereby the coded video is corrupted or distorted; generating replacement data that corrects the coded video during decoding; and distributing the replacement data to users.11-29-2012
20120321082FRAME INDEXING TECHNIQUE TO IMPROVE PERSONAL VIDEO RECORDING FUNCTIONALITY AND SECURITY OF TRANSMITTED VIDEO - Systems and methods of efficiently indexing a digitized video stream are presented. In one embodiment, the method comprises receiving a coded video stream containing non-scrambled frame location indicators and scrambled video data, filtering the non-scrambled frame location indicators, and generating a database used for indexing frames. In one embodiment, the apparatus comprises a processor such as a hardware and/or software capable of generating a database used for improving video playback functionality by way of filtering non-scrambled indicators that define the start of frames in a digitized video stream.12-20-2012
20130058481FUZZY PROTECTION OF VISUAL CONTENT - A method and system for scrambling visual information are, described. An image, preferably in an incompressed format, is divided into a number of patterns having a different aspect ratio. Each pattern is mapped on a matrix i.e positioned on X and Y-axis. The patterns are then arranged in a different and new shape for e.g. a rectangle, preferably, fitting the size of manoblocks in a MPEG video, to that of the original shape of the image but having the same number of patterns or same area. The patterns of pixels are then relocated in the new shape and a matrix is again mapped for the new arrangement of patterns. A key is then generated comprising the information of the encrypted and earlier image. The player decrypts the encrypted visual content or image by means of the information provided by the key.03-07-2013
20130070923SERVER, CLIENT DEVICE, METHOD FOR GENERATING A TRANSPORT STREAM THEREOF AND PROCESSING THE TRANSPORT STREAM THEREOF - A method for generating a transport stream of a server is provided. The method for generating a transport stream of a server which sends broadcasting content to a client device comprises: scrambling broadcasting content by using a specific key; adding at least one content-encryption message which includes the specific key and a device key for obtaining the specific key from the at least one content-encryption message to the broadcasting content so as to generate a transport stream; and sending the generated transport stream to the client device.03-21-2013
20130121489System And Method For Providing Content Protection Of Linearly Consumed Content With A Bidirectional Protocol For License Acquisition - Embodiments may include a content provider system configured to provide electronic content that includes multiple encrypted content items to a playback device. A playback device may be configured to acquire root licenses and/or content licenses from a license server; such licenses may cryptographically protect the content items that a playback device receives from a content provider system. In various embodiments, the electronic content may be content that is to be linearly consumed, such as a channel within a broadcast environment. In various embodiments, the playback device may explicitly request a license for one or more of the content items that it receives; such request may be issued to a license server. The license server may evaluate the request and respond to the playback device with the license for a content item. In various embodiments, the playback device may utilize the received license to decrypt and consume the respective content item.05-16-2013
20130142330BINDING OF PROTECTED VIDEO CONTENT TO VIDEO PLAYER WITH BLOCK CIPHER HASH - A video player sends a video content identifier and a video player identifier through a network to a server. The video content identifier identifies video content. The video player identifier identifies the video player. Further, a first subset of encrypted video content and an initialization vector are received from a server. In addition, a hash of the video player identifier is generated. The first subset of the encrypted video content is decrypted with a decryption key to generate a first result. Further, a first operation on the initialization vector and the hash is performed to generate a second result. In addition, a second operation is performed on the first result and the second result to generate a first subset of plaintext of video content.06-06-2013
20130156185SURVEILLANCE VIDEO TRANSMISSION APPARATUS AND METHOD AND SURVEILLANCE VIDEO RECEIVING APPARATUS AND METHOD - A surveillance video transmission apparatus, includes a video input unit configured to collect physical videos and make the collected physical videos informative; a video analysis unit configured to analyze content of the collected video by recognizing the collected video and detecting an event; and an encryption selection unit configured to select one of a non-encryption mode, a regions-of-interest encryption mode and a full video encryption mode based on the analysis result of the collected video. Further, the surveillance video transmission apparatus includes a video process unit configured to perform one of a non-encryption, a regions-of-interest encryption and a full video encryption and encoding on the collected video according to the selected encryption mode; and a video transmission unit configured to transmit the encoded video and encryption-related information to a surveillance video receiving apparatus.06-20-2013
20130156186PARTIAL MULTIPLE ENCRYPTION - A partial multiple encryption device consistent with certain embodiments has an input adapted to receive a unencrypted video signal. An encryption arrangement produces a partially multiple encrypted video signal from the unencrypted video signal. An output is adapted to provide the partially multiple encrypted video signal. This abstract is not to be considered limiting, since other embodiments may deviate from the features described in this abstract.06-20-2013
20130251146CONTROL WORD PROTECTION - A method for securely obtaining a control word in a chip set of a receiver, said control word for descrambling scrambled content received by the receiver, the method comprising, at the chip set: receiving a secured version of a virtual control word from a conditional access/digital rights management client communicably connected to the chip set; obtaining the virtual control word from the secured version of the virtual control word; and using a first cryptographic function to produce a given output from an input that comprises the virtual control word and either a plurality of signature verification keys or one or more values derived from a plurality of signature verification keys, each signature verification key being associated with a conditional access/digital rights management system, the given output comprising at least one control word, wherein the first cryptographic function has the property that it is infeasible to determine a key pair including a signature key and a signature verification key and an input for the first cryptographic function comprising the determined signature verification key or one or more values derived, at least in part, from the determined signature verification key, such that the first cryptographic function produces the given output from the determined input.09-26-2013
20130301830DEVICE, SYSTEM, AND METHOD OF SECURE ENTRY AND HANDLING OF PASSWORDS - Devices, system, and methods of secure entry and handling of passwords and Personal Identification Numbers (PINs), as well as for secure local storage, secure user authentication, and secure payment via mobile devices and via payment terminals. A mobile electronic device includes: a secure execution environment (SEE) to securely execute code; and a secure video path (SVP) to securely exchange information between the SEE and a touch-screen of the mobile electronic device; wherein the SEE includes a secure password entry module to generate a scrambled on-screen interface, and to send the scrambled on-screen interface to the touch-screen through the SVP.11-14-2013
20130322625METHOD AND APPARATUS FOR PROTECTING THE TRANSFER OF DATA - According to one embodiment, a method of descrambling digital multimedia content starts by sending an out-of-band request for encrypted control data to a headend. A descrambler integrated circuit may then receive digital program data in a scrambled format and the encrypted control data. The encrypted control data may then be decrypted entirely within the descrambler integrated circuit using a multiple-step decryption process starting with a unique key permanently stored in the descrambler integrate circuit and using the partial decryption of control data from the previous decryption step to generate a key to decrypt subsequent encrypted control data. The scrambled digital program data may then be descrambled in the descrambler integrated circuit using the decrypted control data from the last decryption step. Other embodiments are described.12-05-2013
20130336482Secure Fast Channel Changing - A method for communication, including distributing over a communication network multiple channels of digital content, which are encrypted using different, channel- specific control words, and transmitting over the communication network, different, channel-specific entitlement control messages from which the control words are derivable such that each of the different channel-specific control words is derivable from any of the different channel-specific entitlement control messages by authorized receivers of the channels on the communication network. Related methods and apparatus are also included.12-19-2013
20140056426ADAPTABLE ENCRYPTION DEVICE AND METHODS FOR USE THEREWITH - A video processing device includes a data segmentation generator that receives a domain selection, n, and that segments input A/V data into n data blocks. An encryption processing device receives an encryption depth selection, k, and a range selection, m, and sequentially encrypts each of the n data blocks m times using k different keys to generate n encrypted data blocks. An output formatter generates encrypted A/V data from the n encrypted data blocks.02-27-2014
20140086407Conditional Access to Encrypted Media Content - A method and apparatus for processing encrypted content distributed for end users in multiple services includes receiving entitlement information for a subset of at least two of the services separately from the encrypted content for the services and either calculating decryption key information for the subset of services from the entitlement information and storing the decryption key information in memory so that decryption key information for a selected service can subsequently be read from memory, or storing the entitlement information for the subset of services in memory so that the entitlement information for a selected service can subsequently be read from memory and decryption key information for the selected service can be calculated.03-27-2014
20140086408UNIQUE WATERMARKING FOR DIGITAL MEDIA - Systems, methods and computer-readable media for uniquely identifying a digital medium by receiving a request for the digital medium, the request corresponding to a requestor, associating a unique identification with the requestor, encoding the digital medium based on the unique identification to provide a watermarked digital medium, the watermarked digital medium including a watermark that can be used to determine the unique identification, and providing the watermarked digital medium to the requestor.03-27-2014
20140086409PERSONALIZED WHITEBOX DESCRAMBLERS - The invention prevents intercepted keys from being used in unauthorized whitebox descrambler modules for the decryption of a ciphertext. Hereto a receiver with a personalized whitebox descrambler is proposed, whereby a part of the descrambling operation of the personalized descrambler is performed in a preprocessing module external to the descrambler.03-27-2014
20140093075SECURE TRANSMISSION METHOD AND APPARATUS FOR TRANSPORT STREAM - Provided are a secure transmission method and apparatus for transport stream (TS). The method is applied to a receiving terminal of a digital television broadcasting system, comprising: after receiving a TS, a first device in the receiving terminal encrypts the received TS using a key already negotiated with a second device in the receiving terminal and utilizing a determined encryption algorithm, and sends the encrypted TS to the second device in the receiving terminal; after receiving the encrypted TS, the second device in the receiving terminal decrypts the received encrypted TS using the key and utilizing a decryption algorithm corresponding to the encryption algorithm. Using the present invention can protect the security of the TS transmission.04-03-2014
20140105391LEVEL-ONE ENCRYPTION ASSOCIATED WITH INDIVIDUAL PRIVACY AND PUBLIC SAFETY PROTECTION VIA DOUBLE ENCRYPTED LOCK BOX - A method substantially as shown and described the detailed description and/or drawings and/or elsewhere herein. A device substantially as shown and described the detailed description and/or drawings and/or elsewhere herein.04-17-2014
20140105392METHOD FOR SELECTIVELY SCRAMBLING BIT-STREAMS - A method for selectively scrambling a coded bit-stream is disclosed. The method comprises a step of determining at least one modifiable part in the coded bit-stream, wherein the compliance, regarding a coding standard, of a modified coded bit-stream comprising an alternative modifiable part is not affected; a step of selecting at least one modifiable part, wherein the rendering of a compliant modified coded bit-stream comprising selected alternative modifiable part is perceptually affected compared to the rendering of the coded bit-stream; a step of substitution, for each of the at least one selected modifiable part, of original modifiable part in the coded bit-stream by alternative modifiable part resulting in a compliant selectively scrambled bit-stream. An associated method for descrambling, a device for scrambling and a data structure are further disclosed.04-17-2014
20140177835METHOD AND A SECURITY MODULE CONFIGURED TO ENFORCE PROCESSING OF MANAGEMENT MESSAGES - A method and a security module configured to enforce processing of management messages. The security module is associated to a multimedia receiver configured to receive broadcast access controlled multimedia services. The management messages are transmitted by a managing center to the multimedia receiver. The method comprises steps of: receiving by the security module at least one global management message addressed to a plurality of multimedia receivers operated by the managing center, tracing processing of said global management message, receiving at least one positive addressing management message addressed to said security module, checking, by the security module, anterior processing of the global management message through the value of the parameters set during tracing processing of the global message, processing the positive addressing management message only if previous checking gives a result indicating a successful enforcement of the global management message allowing the multimedia receiver accessing the broadcast multimedia services.06-26-2014
20140185802REAL TIME COMPOSITION OF A COMPOSITE WINDOW FROM CONTENT MAINTAINING UNIQUE SECURITY DOMAINS - In general, in one aspect, a multi-content composition pipeline encrypts protected video streams that may be utilized as part of a composite window using different encryption keys so that each encrypted video stream has a unique security domain. The protected video streams may be received as encrypted and compressed video streams that are decrypted and decoded (decompressed) and then the decompressed video streams may be encrypted. The encryption keys used to encrypt the decompressed video stream may be related to the encryption keys used to decrypt the corresponding encrypted compressed video stream. The encrypted decompressed video streams are stored in memory until they are needed for generating the composite window at which point they are read from memory and decrypted. The composite window is generated from the decrypted uncompressed video streams and possibly other content in real time and thus is not stored in memory prior to transmission to a display.07-03-2014
20140270168FORENSICS IN MULTI-CHANNEL MEDIA CONTENT - Embodiments of the invention relate to encoding multi-channel media content. In one embodiment, a set of multi-channel media content is received. The set of multi-channel media content includes a plurality of content frames. Each content frame includes a first channel content frame and second channel content frame. Each of the first channel content frames is grouped into a first group of content frames. Each of the second channel content frames is grouped into a second group of content frames. Each content frame in the first group of content frames is encoded. At least a first content frame in the first group of content frames includes at least one variation, where the variation is a different version of the first content frame. Each content frame in the second group of content frames is also encoded, where the second group of content frames is absent any content frames including a variation.09-18-2014
20140314233PROTECTED MEDIA DECODING USING A SECURE OPERATING SYSTEM - Disclosed herein are representative embodiments of tools and techniques for facilitating decoding of protected media information using a secure operating system. According to one exemplary technique, encoded media information that is encrypted is received at a secure process of a secure operating system of a computing system. At least a portion of the encoded media information that is encrypted is decrypted in the secure process. The portion of the encoded media information includes header information. Additionally, the header information is sent from the secure operating system to a software decoder for control of decoding hardware. The software decoder is included in a process for an application. Also, the decoding hardware is securely provided access to the encoded media information for decoding of the encoded media information to produce decoded media information.10-23-2014
20140314234RECOVERABLE DIGITAL CONTENT DEGRADATION - The disclosure relates generally to processing audio and video signals. One claim recites an apparatus comprising: electronic memory for storing a media signal, the media signal comprising degradation introduced through use of a key, in which the key corresponds to detection criteria in the media signal, and in which the degradation comprises human perceptible degradation, the media signal further comprising the key embedded therein; and a processor programmed for: analyzing the media signal to obtain the key; and removing some of the degradation through use of the key, in which said removing utilizes different detection criteria relative to a process that introduced the degradation into the media signal. Of course, other claims and combinations are provided too.10-23-2014
20140355759Robust Watermark - A method and system for embedding a watermark in block encrypted content, including encoding a bit string, the bit string including n bits, denoted b12-04-2014
20150010151RECEIVER SOFTWARE PROTECTION - A method of obtaining descrambling information at a receiver, the descrambling information for enabling descrambling of scrambled content. A provider verification key is used to access a software image, which has been secured by a provider using a provider signature key corresponding to the provider verification key. A secured version of the descrambling information is received. The accessed software image is used to obtain virtual descrambling information from the secured version of the descrambling information and is provided as inputs to a cryptographic function to produce a given output comprising said descrambling information.01-08-2015
20150030155SURVEILLANCE SERVER, METHOD OF PROCESSING DATA OF SURVEILLANCE SERVER, AND SURVEILLANCE SYSTEM - A surveillance server connected to a camera through a network is provided, the camera acquiring an image of a surveillance area. The surveillance server includes: a data acquisition unit configured to acquire from the camera image data of the image that is encrypted; a mode selection unit configured to select a processing mode of the image data; and a decryption control unit configured to decrypt the image data in response to selection of a first mode.01-29-2015
20150043733SYSTEM AND METHOD OF MOTION DETECTION ON ENCRYPTED OR SCRAMBLED VIDEO DATA STREAMS - Systems and methods of motion detection on encrypted or scrambled video data streams are provided. Some methods can include identifying macroblock size information for an encrypted/scrambled video data stream, and using the identified macroblock size information to determine a presence of motion in the encrypted/scrambled video data stream without decrypting and descrambling the encrypted/scrambled video data stream.02-12-2015
20150086013SYSTEMS AND METHODS FOR SIMULTANEOUS COMPRESSION AND ENCRYPTION - Embodiments of reversible systems and methods for fast, secure and efficient transmission, storage, and protection of digital multimedia are disclosed. The embodiments may have the ability to simultaneously compress and encrypt digital data in order to concurrently reduce data size and prevent reconstruction without the proper encryption key. Embodiments of a method may include pre-processing data to optimize the size of data segments to be compressed, transforming the data for improving the compressibility of the before-mentioned data segments, processing the data sequentially to generate predictive statistical models, encoding the data for simultaneously encrypting and compressing data segments using a keystream, and increasing both the compression ratio and security of these encoding processes using a block cipher. Embodiments of these methods may be suitable for use on both encrypted and unencrypted media.03-26-2015
20150139419Systems and Methods for Playing Back Alternative Streams of Protected Content Protected Using Common Cryptographic Information - Systems and methods for performing adaptive bitrate streaming using alternative streams of protected content in accordance with embodiments of the invention are described. One embodiment of the invention includes a processor, and memory containing a client application. In addition, the client application configures the processor to: request a top level index file identifying a plurality of alternative streams of protected content, where each of the alternative streams of protected content are encrypted using common cryptographic information; obtain the common cryptographic information; request portions of content from at least the plurality of alternative streams of protected content; access the protected content using the common cryptographic information; and playback the content.05-21-2015
20150304522USE OF AMBIENCE LIGHT FOR COPY PROTECTION OF VIDEO CONTENT DISPLAYED ON A SCREEN - The invention provides a method for impeding making a useful copy with an optical recording device of video content displayed on a screen, wherein the method comprises displaying the video content on the screen, illuminating with ambience light of an ambience light source the screen, the ambience light comprises light having a wavelength in the visible part of the spectrum, wherein the ambience light is controlled as function of the video content, and wherein the ambience light is intensity modulated with an intensity modulation having an intensity modulation frequency selected from the range of 40 Hz to 00 Hz.10-22-2015
20150304736TECHNOLOGIES FOR HARDENING THE SECURITY OF DIGITAL INFORMATION ON CLIENT PLATFORMS - Technologies for hardening the security of digital information on a client device are described. In some embodiments, the client device includes a secure processing environment such as a secure enclave, which may be used to protect digital information on a client platform. The secure environment(s) may also protect assets which may be used to access the digital information. Using the secure processing environment(s), the described technologies may protect digital information as it is provided to, stored on, accessed on, and/or processed for display by a client device, even if the client device may be infested with malware or subject to attack by another entity.10-22-2015
20150312524Encrypted Screencasting - Encryption and encoding of video and/or audio may be implemented on an integrated circuit before being transmitted wirelessly to a remote adapter for display.10-29-2015
20160012772DISPLAY WITH SECURE DECRYPTION OF IMAGE SIGNALS01-14-2016
20160014456ADAPTABLE ENCRYPTION DEVICE AND METHODS FOR USE THEREWITH01-14-2016
20160044346SYSTEMS AND METHODS FOR PROTECTING ELEMENTARY BITSTREAMS INCORPORATING INDEPENDENTLY ENCODED TILES - Systems and methods for partial frame encryption in accordance with embodiments of the invention are disclosed. In one embodiment, the method receives a video bitstream that includes several frames, each frame including several independently encoded compression units within the frame, encrypts a portion of each of several compression units in several frames, and generates an output bitstream that includes the several independently encoded compression units including the encrypted portions of the compression units.02-11-2016
20160050454PROTECTION OF DIGITAL CONTENT - Protection of digital content, for example content on an optical disk, is discussed. A first content protection system such as AACS processes its specific content protection information to yield a first result which is differently obscured for different media players. A second content protection system such as BD+ processes the first result and its own specific content protection information to yield a second result which can be used to reproduce protected content such as encrypted video on the optical disk.02-18-2016
20160099921FINE GRAIN RIGHTS MANAGEMENT OF STREAMING CONTENT - The present invention provides methods, apparatuses, and systems for delivering protected streaming content to a receiving device. In an aspect of the present invention, a broadcaster provides streaming content. To ensure viewers are properly authorized, the streaming content is encrypted with a traffic key. The traffic key is provided to the users via a key stream message, which is encrypted with a service key. The user obtains at least one rights object from a rights issuers and the at least one rights object includes the service key so that the streaming content may be used. The at least one rights object also contains information regarding usage rights that may be configured by the rights issuer so that, depending on the user and/or the receiving device, different rights may be available. The key stream message may include a program category variable value that indicates the type of content and in conjunction with the rights object, determines what usage rights exist for the streaming content.04-07-2016
20160105714Secure Internal Control for Encrypting Video Data - In one aspect, a video processing device includes a processor and a transmitter, for example implemented as separate integrated circuits on a printed circuit board. Pins on the processor are coupled to pins on the transmitter via a data channel, for example conductive leads on the printed circuit board. Video data is transmitted from the processor to the transmitter via this data channel, which is high speed enough to accommodate video data. The transmitter also includes an encryption engine used to encrypt the video data. Encryption control data, which determines the encryption to be applied, is transmitted from the processor to the transmitter over the same data channel as the video data. This is more secure than transmitting the encryption control data over a slower separate data channel, because the high speed video channel is harder to tamper with.04-14-2016
20160112382Systems and Methods for Playing Back Alternative Streams of Protected Content Protected Using Common Cryptographic Information - Systems and methods for performing adaptive bitrate streaming using alternative streams of protected content in accordance with embodiments of the invention are described. One embodiment of the invention includes a processor, and memory containing a client application. In addition, the client application configures the processor to: request a top level index file identifying a plurality of alternative streams of protected content, where each of the alternative streams of protected content are encrypted using common cryptographic information; obtain the common cryptographic information; request portions of content from at least the plurality of alternative streams of protected content; access the protected content using the common cryptographic information; and playback the content.04-21-2016
20160119660Selective Picture-Based Encryption of Video Streams - A method for encrypting a video stream in a video encoder is provided that includes receiving the video stream and encrypting randomly selected pictures in the video stream as the video stream is encoded.04-28-2016

Patent applications in class Video electric signal modification (e.g., scrambling)

Patent applications in all subclasses Video electric signal modification (e.g., scrambling)

Website © 2025 Advameg, Inc.