摘要:
There is a performing of digital rights management (DRM), operable in an offline mode with respect to a communications network. The performing includes identifying a stored rights object associated with a stored asset. The stored rights object includes reporting duration information associated with the stored asset. The performing also includes determining, utilizing a processor, whether a transmission of an early status message is a successful communication based on an early status message determination. If a failure in communicating the early status message is determined, utilizing the stored asset. The performing may also include transmitting an early status message and/or later status message after identifying the stored rights object. There is also a performing of digital rights management (DRM) associated with a DRM system and operable in an offline mode with respect to a communications network. There are also client devices, communicating systems, computer readable mediums and protocols.
摘要:
A host device, which may include a DVR, selects to record content on the host device DVR or in a network attached storage (NAS) unit. The recorded content remains bound to the host device from a DRM perspective when it is recorded on the host DVR and on the remotely located NAS. A client device can obtain access to content recorded on the NAS by negotiating DRM rights with the host device instead of the NAS. When access rights are approved, the host device provides access information to the client device so that the content is streamed directly to the client device from the NAS.
摘要:
Items are used to encode or in encoding a stereoscopic video signal. The signal includes first view frames based on a first view associated with a first eye perspective and second view frames based on a second view associated with a second eye perspective. The encoding includes receiving the stereoscopic video signal and determining the first view frames and the second view frames. The encoding also includes encoding the first view frames based on the first view and encoding the second view frames based on the second view and also the first view. In the encoding, a plurality of the encoded second view frames reference at least one first view frame for predictive coding information. Items are also used to decode the encoded stereoscopic video signal.
摘要:
Multiple public/private key pairs of varying levels of security are used to provide a high level of security while still allowing fast processing of encrypted information. The lower-security level includes keys that are small in length, that are changed relatively often, and that require less or fewer resources to implement their functions. When it is required to change key pairs of low security, a key pair at a higher security level (i.e., longer length keys) than the lower-security level keys is used to transfer the new lower-security public keys to devices using those keys. The higher-security keys can, in turn, be changed at a frequency lower than the lower-security keys. The higher-security keys require a higher level of resources to perform their coding operations. This approach of using keys of escalating levels of security to replace lower-security keys, where the higher-security keys require more resources, are more secure, and are replaced less often than the lower-security keys, can be followed as many times as is desired to create a hierarchy of public key uses with the result that the lower-security operations can be performed quickly while the overall system security is high.
摘要:
A method for registering a first device with a second device over a wireless network includes receiving a registration request from the first device and sending one or more user input choices to the first device. The user input choices each specify a user input action available though a user interface associated with the second device. A device description describing the second device is sent to the first device in a manner that allows it to be presented to the user by the first device. At least one of the user input actions are sequentially received through the user interface in response to instructions provided to the user by the first device. The first device is registered with the second device if the user input actions received by the second device correctly reflect the instructions provided to the user by the first device.
摘要:
A method for authenticating a string of data stored remotely from the processor. A bifurcated hash routine can be utilized to provide a check root along with a putative new root for a revised string of data. The check root can be compared with the previously determined initial root. If the check root matches the initial root, the new root is accepted in view of the fact that it was computed concurrently with the check root.
摘要:
Methods and an apparatus for storing information in a processing device with flexible security are disclosed. In one embodiment, a method stores information within the processing device. The method receives a download via a first input path which includes a first breakable link and stores the download within the processing device. At some point, a key is also stored within the processing device. A ciphertext download is received via a second input path which includes a second breakable link. The ciphertext download is decrypted utilizing the key and the resulting plaintext download is stored within the processing device.
摘要:
The present invention provides a transcoding architecture and a consumer set-top box with storage capability that is based on the transcoding architecture and capable of operating efficiently in an all-digital environment. In a preferred embodiment, a digital-VIDEO DEVICE employs an MPEG-2 compliant transcoder that includes a simplified cascaded decoder and encoder, and is capable of performing determinable bitrate re-encoding without conducting motion estimation. During recording, the decoder receives and processes a compressed source bitstream, producing a decoded bitstream that includes reconstructed video and preserved motion vectors. The encoder “re-encodes” the decoded bitstream using the preserved motion vectors and performs any applicable bitrate modifications. The re-encoded bitstream is then stored.
摘要:
A method and apparatus are provided for generating a digital signature that authenticates information of a plurality of different information groups. Information from each group is hashed to produce a separate hash key for each group authenticating the information in that group. Particular combinations of the hash keys are hashed together to produce at least one combined hash key. Each of the hash keys is ultimately combined in a predetermined order with all other hash keys via the combined hash keys to produce the digital signature in a manner that authenticates the information of all of the information groups. The digital signature is reproducible without access to all of the information groups authenticated thereby. Instead, information from a first information group is provided together with a set of hash keys and combined hash keys embodying authenticated information from the other groups. The hash key for the first information group is produced locally and combined with the other hash keys and/or combined hash keys in order to reproduce the digital signature.
摘要:
Error recovery is provided for isochronous data ("isodata") obtained from a data stream. Isodata transport packets are monitored to locate isodata presentation time stamps (PTSs). The presentation of isodata from a buffer is synchronized to a system time clock (STC) using timing information derived from the PTSs. Discontinuity errors between said isodata transport packets are identified and, if a discontinuity of no more than one packet is identified, a write pointer of the buffer is advanced by a suitable number of bits to compensate for the discontinuity, while maintaining the synchronization of the presentation with respect to the STC. Additional error detection and recovery techniques are disclosed, including the maintenance of a presentation unit counter, the use of a PTE extension and PTS offset to verify output timing, the provision of a pair of PTS pointers verifying correct output data timing, the use of a packet elementary stream (PES) count to detect lost data in the transport stream, and the detection and discarding of packets designated as encrypted after any decryption should have already been completed.