Class / Patent application number | Description | Number of patent applications / Date published |
380236000 | Modifying accompanying audio signal | 11 |
20100034379 | CONTENT ASSESSMENT APPARATUS, CONTENT ASSESSMENT METHOD, INFORMATION REPRODUCING APPARATUS, AND INFORMATION REPRODUCING METHOD - A content assessment apparatus, content assessment method, information reproducing apparatus, and information recording medium are provided that can determine whether digital content has been processed abnormally. The information reproducing apparatus includes a drive ( | 02-11-2010 |
20100135490 | METHOD AND APPARATUS FOR PERFORMING VIDEO COMMUNICATION - A method for performing video communication is provided. The method includes: creating and saving a bio key using a user's biological information before first and second terminals perform the video communication; establishing a session, wherein the first terminal requests voice communication with the second terminal; exchanging bio keys saved in the respective terminals and saving the same; starting a Secure Real-Time Transport Protocol (SRTP) session, wherein the first and second terminals create a session sharing key using the exchanged bio keys; creating a restored bio key by obtaining the biological information from data received by first and second terminals and performing a user certification by comparing the bio key with the restored bio key. | 06-03-2010 |
20100189257 | Lightweight Streaming Protection by Sequence Number Scrambling - Methods and apparatus for securely streaming multimedia packets, such as RTP packets, are disclosed, in which the payloads of the packets are shuffled. This reordering is performed using a shuffling function that depends on sequence numbers associated with each of the packets, a pre-determined group size N, and a pre-determined initialization value; in some embodiments this shuffling function comprises a cryptographic hashing function or other one-way function. A receiving device may reverse the shuffling, using a similar shuffling function, if the pre-determined group size N and the pre-determined initialization value are known. | 07-29-2010 |
20110075843 | UNIT AND METHOD FOR SECURE PROCESSING OF ACCESS CONTROLLED AUDIO/VIDEO DATA - Unit for secure processing access controlled audio/video data capable of receiving control messages(ECM) comprising at least one first control word (CW | 03-31-2011 |
20120008774 | Method and device to enhance video content - A multifunction device for television set and a method to enhance video content provided to a display device of said television set. The multifunction device comprises an input for receiving audio/video data from an audio/video content data source, an output for outputting audio/video data to the display device, and communication means for accessing Internet or a local area network for collecting additional data. The multifunction device being connected and powered by a common interface of the display device further comprises image processing means configured for receiving first image data from the input, a converter configured for receiving additional data from Internet or a local area network and for converting said additional data into additional image data, an image merging module configured for combining said additional image data with all or part of the input first image data to obtain second image data to be forwarded to the output connected to the display device. | 01-12-2012 |
20120155639 | ENCRYPTED CONTENT STREAMING - Encrypted content streaming is provided by a method comprising holding an encrypted content stream that is cryptographically encrypted from a content stream with a content key, and holding an encrypted content key that is cryptographically encrypted from the content key with one or more intermediate encryption keys. The method further comprises serving the encrypted content stream to a plurality of content consumption devices, wherein the encrypted content stream is embedded with a leaf license comprising the encrypted content key, and wherein the encrypted content stream is cryptographically decryptable by a content consumption device having a scalable root license providing one or more intermediate root keys from which the content consumption device derives the one or more intermediate decryption keys paired to the one or more intermediate encryption keys. | 06-21-2012 |
20130142332 | VOICE AND SCREEN CAPTURE ARCHIVE AND REVIEW PROCESS USING PHONES FOR QUALITY ASSURANCE PURPOSES - A voice and screen capture archive and review process that enables a user to manage and evaluate customer service representative interactions with customers. An audio recording and a video recording of the computer screen of the customer service representative are captured and encrypted and merged together into a formatted file. The formatted file is stored on a storage server for access by the user. Through a web based API, the user can access the stored files and playback the interaction between the customer service representative and the customer for evaluation and training purposes. | 06-06-2013 |
20130301831 | DATA STRUCTURE OF MULTIMEDIA FILE FORMAT, ENCRYPTING METHOD AND DEVICE THEREOF, AND DECRYPTING METHOD AND DEVICE THEREOF - In a data structure of a multimedia file format, a movie box and a media data box are provided. In each box, a non-encrypted size field, a non-encrypted type field and box data field are provided. In box data of the movie box, information data regarding multimedia data is stored. The multimedia data is encrypted and stored in box data of the media data box. The information data is obtained by referring to the container in the movie box. This information data is held as encryption and encoding information data. By referring to the information data, a data unit of the encrypted multimedia data in the media data box is obtained, and the unit data is decrypted. | 11-14-2013 |
20140185804 | LEVEL-TWO DECRYPTION ASSOCIATED WITH INDIVIDUAL PRIVACY AND PUBLIC SAFETY PROTECTION VIA DOUBLE ENCRYPTED LOCK BOX - Systems and/or processes related but not limited to a machine configured to create a physical reality of receiving a level-one encrypted output of a surveillance device; a machine configured to create a physical reality of decrypting at least a part of the level-one encrypted output of the surveillance device with a level-one decryption key that is practicably inaccessible by a level-one encryption entity; and a machine configured to create a physical reality of transmitting a plaintext output of the surveillance device. Other machines/processes are also disclosed/claimed. | 07-03-2014 |
380237000 | Including digital audio | 2 |
20100172498 | SECURE PRESENTATION OF MEDIA STREAMS IN RESPONSE TO ENCRYPTED CONTENT - Secure presentation of media streams includes encoding the media streams into digital content, encrypting a portion of that digital content, the portion being required for presentation, in which the encrypted version is substantially unchanged in formatting parameters from the clear version of the digital content. Selecting those portions for encryption so there is no change in distribution of the media stream: packetization of the digital data, or synchronization of audio with video portions of the media stream. When encoding the media stream into MPEG-2, refraining from encrypting information by which the video block data is described, packet formatting information, and encrypting the video block data using a block-substitution cipher. A block-substitution cipher can be used to encrypt each sequence of 16 bytes of video data in each packet, possibly leaving as many as 15 bytes of video data in each packet in the clear. | 07-08-2010 |
20100322417 | DETECTION OF ENCRYPTION UTILIZING ERROR DETECTION FOR RECEIVED DATA - Embodiments of the invention are generally directed detection of encryption utilizing error detection for received data. An embodiment of a method includes selecting a first port for foreground processing of a stream of data received at the first port, the stream of data including content data, and sampling a set of data received at a second port, the second port being not selected for foreground processing, the set of data including a data packet and error correction data. The method further includes performing background processing of the set of data, wherein the background processing includes decrypting data of the data packet and utilizing the error correction data to determine whether the data packet contains an error, and determining whether data received at the second port is encrypted based at least in part on the determination whether the data packet contains an error. | 12-23-2010 |