Abstract:
According to one embodiment of the invention, a free preview of a program can be provided to client computers in a multicasting system. This can allow viewers in the multicasting system to view a first portion of the program before deciding whether to order the program content. According to another embodiment, various distribution methods can be accomplished using encryption keys to distribute program content. According to yet another embodiment, an initial viewing period can be provided to allow negotiation of the encryption keys. According to another embodiment, rules and conditions for providing content in a multicasting environment can be utilized.
Abstract:
La présente invention se rapporte à un procédé pour la distribution de séquences vidéos numériques selon un format de flux nominal constitués par une succession de trames comprenant chacune au moins un bloc regroupant une pluralité de coefficients correspondant à des éléments visuels simples codés numériquement, le procédé comportant une étape de modification d'au moins un bloc du flux originel caractérisé en ce que ladite étape de modification agit de façon adaptative sur ledit flux originel en fonction d'une partie au moins des caractéristiques représentatives de la structure, du contenu et des paramètres du flux vidéo originel, du profil du destinataire, et d'événements externes. Dans un mode de réalisation particulier, l'étape de modification consiste à remplacer une partie desdits coefficients pour produire d'une part un flux vidéo principal au format nominal et d'autre part une information complémentaire de modification permettant la reconstruction du flux originel par un décodeur de l'équipement destinataire, la portée des modifications étant variable et déterminée par lesdites caractéristiques représentatives. La présente invention se rapporte également à un système pour la mise en oeuvre du procédé.
Abstract:
An apparatus (102) and a receiver (110), which are in a broadband communication system (100), includes the logic (232) necessary for encrypting content (254) through the use of encryption keys. This content is received by the receivers (110). The receiver (110) validates the keys and denies the use of the content (254) if the keys become invalid.
Abstract:
According to the invention, a method for protecting digital television from unauthorized digital receivers within a population of digital receivers is disclosed. Each digital receiver in the population has a unique identifier. In one step, provisioning information is received from a subset of the population of digital receivers indicating that the subset is potentially within range to receive digital television from a broadcaster. First decryption information is distributed to the subset of the population of digital receivers. The first decryption information allows for potentially decrypting a plurality of programs coextensively in time. The unauthorized digital receivers are cryptographically excluded from using the first decryption information. A first program is encrypted using a first method that is cryptographically related to second decryption information. The first program is sent. The second decryption information is distributed and cryptographically secured with the first decryption information.
Abstract:
A method and apparatus that selectively pairs a receiver (132) configured to receive a media program encrypted according to a media encryption key and a conditional access module. In one embodiment, the apparatus comprises a security module (508) for receiving and modifying the media encryption key, and a transport module (412), comprising a decryptor (524) for decrypting the media program. The media encryption key has a portion indicating a first state in which the media program is to be viewable by a set of receivers or a second state in which the media program is to be viewable only by a subset of the set of receivers.
Abstract:
A foreground component image and a background component image of a picked up image are processed at a high speed by utilizing a network. A client computer (27) outputs to a separation server (11) information specifying image data to be separated. The separation server (11) fetches image data specified from an accumulation server (18) and outputs it to a motion detection server (12). After the motion detection processing is performed, the separation server (11) outputs image data, a motion vector, and position information to an area identification server (13). The area identification server (13) generates area information on the area of image data and outputs the area information in addition to the image data, the motion vector, and the position information to a mixture ratio calculation server (14). The mixture ratio calculation server (14) calculates a mixture ratio using the image data, the motion vector, the position information, and the region information, and according to these information, a foreground and background server (15) separates a foreground and a background of the input image. The present invention can be applied to an image processing business model.
Abstract:
L'invention concerne un procédé de contrôle d'accès à un programme crypté diffusé par un opérateur à une pluralité de groupes d'abonnés, chaque groupe d'abonnés étant muni d'une clé de groupe KG, et chaque abonné étant susceptible de recevoir de l'opérateur une clé d'exploitation KT chiffrée par la clé de groupe KG pour décrypter le programme diffusé. Le procédé selon l'invention comporte en outre les étapes suivantes: avant la diffusion du programme crypté, (a) associer la clé d'exploitation KT chiffrée à une valeur aléatoire R pour générer un code secret ;(b) transmettre le code secret aux abonnés, (b) transmettre la valeur aléatoire R aux abonnés pour calculer la clé d'exploitation KT lorsque le programme crypté est diffusé.
Abstract:
The invention aims at secure generation and delivery of certificates, without constraint for the user and guaranteeing the addressee's identity data. This is achieved by a method distributing asymmetrical public and private keys between a key-generating centre and at least a user unit, said unit comprising a security module, said method consisting in: generating certificates comprising a public key and a private key; encrypting with a transport key said certificates; and transmitting them to the security module of a known user, said module comprising the transport key for decrypting the certificate.
Abstract:
The present invention provides software for accomplishing the dynamic management of key information (Ks) for accessing secure (KE) multimedia multicast (k1-kn). The invention additionally concerns computer systems that use such software.
Abstract:
A method and apparatus for enabling session-based conditional access to on-demand content of variable duration by scrambling (314) a program stream provided to a set top terminal via a defined communications channel; communicating (316) to the set top terminal while establishing a session, via one of the defined communications channel and an out-of-band communications channel, an authorization message and descrambling message suitable for determining a descrambling key for descrambling the program stream; and including (330), within the program stream being scrambled, content requested by the set top terminal.