Abstract:
Encrypted content from a content provider is received at a central location of a multichannel video programming distributor (MVPD). The content provider is distinct from the MVPD. The content is decrypted and processed in a virtual set-top application associated with a set- top of a customer of the MVPD. The set-top of the customer is located in a customer premises remote from the central location. The processed content is provided over a secure data link to a conditional-access encoder at the central location. The conditional-access encoder encrypts the processed content, which is then transmitted to the set-top of the customer.
Abstract:
Devices, servers, systems and methods for content protection are provided. Disclosed embodiments improve temporal granularity of controlling access to the protected content and increase resilience against attacks attempting to prevent re-evaluation of conditions of access. Enforcement of re-evaluation may be based on the receipt and/or verification of tokens. In some embodiments, re-evaluation is enforced by periodically rendering content keys required for content decryption unuseable and/or clearing content keys already in use.
Abstract:
The invention relates to a method for distributing multimedia licenses (LIR, LIS) through a server to a plurality of devices in a distribution system of a protected-access multimedia service by first protection (KT1). This method aims to: - verify that the computation resources used by the server do not exceed a maximum threshold, and if they do, generate, then send regular licenses (LIR) including the first protection (KT1) in response to requests from the devices, and if not, switch the server to a singular mode consisting of: - protecting access to the multimedia service by second protection (KT2), independent of the first protection (KT1), - generating and sending to the devices a singular licence (LIS) including the second protection (KT2), - verifying that the computation resources do not exceed the maximum threshold, and if they do, switching from the singular mode to a regular mode so as to protect access to the multimedia service using only said first protection (KT1).
Abstract:
Systems and methods of the present invention provide for one or more server computers communicatively coupled to a network and configured to: receive an imaging data from a medical imaging device; encode a digital video data stream from the video data; transmit the digital video data stream via a wireless channel to at least one terminal output device coupled to the network, the terminal output device comprising: a camera mounted to the terminal output device comprising a lens transmitting, to the terminal output device, a view of a surgical field; and a display attached to the terminal output device and displaying the digital video data stream concurrently with the view of the surgical field.
Abstract:
Several embodiments include an Internet-based video delivery system that retains channel browsing capabilities. The video delivery system can include a backend server system. The backend server system can receive input feeds from channel programming of content providers. The backend server system can encode the input feeds into video streams deliverable over the Internet. The backend server system can transmit a video stream to multiple user devices in substantially real-time. The backend server system can also record the video stream in a media storage protected by an authentication engine. The backend server system can then generate a channel-side control interface, available to an authorized account associated with the content providers, to enable remote management of live distribution of the video streams and/or on-demand distribution of the recorded video streams.
Abstract:
This application discloses a method of provisioning an electronic device. The electronic device proactively broadcasts an advertising packet that includes a device identifier associated with the electronic device. A server receives the device identifier via a client device, and issues a link approval response when it verifies that the electronic device associated with the device identifier is available for provisioning in association with a user account. In response to the link approval response, the electronic device and the client device establish communication via a short range wireless link. The client device encrypts at least a portion of network credentials of a secure wireless network using a password key generated at the server, and provides the encrypted network credentials to the electronic device. The electronic device decrypts the encrypted network credentials using a key generated at the electronic device, and accesses the secure wireless network using the decrypted network credentials.
Abstract:
Digital files are compressed using a process including Schmidt decompositions of matrices using an algorithm, termed 'BSD' herein, which is based on an algebraic method generalizing QR decomposition. Software analyzes an input file and initially identifies a matrix M , with entries within a predefined set of integers, within the file. Next, essential entries are defined, extracted from M , that contain sufficient information to recover Musing BSD. The compressed file includes the essential entries and their positions within M . To achieve an encryption process, software encrypts the pattern matrix that includes the positions of the essential entries of M . To achieve a lossy compression, software identifies essential entries that contain sufficient information to recover an approximation to M for which the quality is determined by an error threshold. For a more efficient lossy compression, software uses singular value decomposition, BSD, and other signal processing of M .