Patent application number | Description | Published |
20120117123 | ASSIGNING RESOURCES TO A BINARY TREE STRUCTURE - Embodiments of this disclosure relate to binary tree structures, and more specifically to assigning resources to a binary tree structure, such as for content protection. In embodiments, a total number of resources in a first category of resources is identified. The resources may be devices that play encryption protected content such as a CD, a DVD, an HD DVD, a BD, and a Secure Digital card, for example. In embodiments, a minimum number of dummy resources are assigned to a corresponding number of leaf nodes of the binary tree structure before resources in the first category of resources are assigned to leaf nodes in the binary tree structure. Generally, the minimum number of dummy resources is greater than or equal to 1+floor(2̂floor(log2(N)−1)), wherein N is greater than or equal to the total number of resources in the first category of resources. | 05-10-2012 |
20140270168 | FORENSICS IN MULTI-CHANNEL MEDIA CONTENT - Embodiments of the invention relate to encoding multi-channel media content. In one embodiment, a set of multi-channel media content is received. The set of multi-channel media content includes a plurality of content frames. Each content frame includes a first channel content frame and second channel content frame. Each of the first channel content frames is grouped into a first group of content frames. Each of the second channel content frames is grouped into a second group of content frames. Each content frame in the first group of content frames is encoded. At least a first content frame in the first group of content frames includes at least one variation, where the variation is a different version of the first content frame. Each content frame in the second group of content frames is also encoded, where the second group of content frames is absent any content frames including a variation. | 09-18-2014 |
20140280272 | MEDIA CONTENT SUBSTITUTION - Embodiments of the invention relate to managing access to media files and content therein. In one embodiment, a first identifier representing a first media content component in a first set of media content components is identified. The first set of media content components is included within a first media file that has been received from a first source. The identifier is compared with at least a second identifier representing at least a second media content component in a second set of media content components. The second set of media content components is associated with at least a second media file received from a second source. The first source is different than the second source. Responsive to the first digital signature substantially matching the second identifier, the first media content component is replaced with the second media content component. | 09-18-2014 |
20150058995 | SEARCHING FOR SECRET DATA THROUGH AN UNTRUSTED SEARCHER - Embodiments of the present invention relate to searching for secret data through an untrusted searcher without exposing the secret data. In one embodiment, a method of and computer program product for searching for secret data through an untrusted searcher is provided. A secret value is read from a storage medium. The secret value is divided into a plurality of portions. Each of the plurality of portions is ranked. A subset of the secret value is determined from the ranking of the plurality of portions. A search string is constructed from the subset. The search string is transmitted to a searcher via a network. Search results are received from the searcher via the network. The search results are compared to the secret value to determine whether the searcher found the secret value. | 02-26-2015 |
20150110274 | LOW-BANDWIDTH TIME-EMBARGOED CONTENT DISCLOSURE - Embodiments of the present invention relate to time delayed release of previously distributed digital content. In one embodiment, a method of and computer program product for low-bandwidth time-embargoed content disclosure are provided. A first cryptographic key is received. Encrypted content is received, encoded in a computer readable medium. A correction value is received. A predetermined function is applied to the first cryptographic key and the correction value to determine a second cryptographic key. The second cryptographic key is applied to the encrypted content to obtain decrypted content. | 04-23-2015 |