Abstract:
A method and system for using steganographically-encoded time information as a basis to control when a client carries out a content-related action. The client processes for presentation one or more linear media streams, each defining a respective time sequence of frames of media content, and at least one of the streams being steganographically encoded with at least one watermark at a respective time-point within linear media stream, the watermark encoding a timestamp of the respective time-point within the linear media stream according to a server clock. The client extracts the timestamp from the watermark and computes a time offset based on a difference between the extracted timestamp and a current time according to a client clock. And the client uses the computed time offset as a basis to determine when the client should carry out a content-related action in a given one of the one or more linear media streams.
Abstract:
According to an example aspect of the present invention, there is provided a method, comprising: receiving a cryptographic proof of use indicative of decoding of a first media content element by a user device (400), receiving a cryptographic first expected proof of use value (410), and controlling access to an encrypted second media content element associated with the first media content element on the basis of verification of the received cryptographic proof of use and the first expected proof of use value (420).
Abstract:
Disclosed is an electronic apparatus. The electronic apparatus includes: a first receiver, a second receiver and a controller. The first receiver includes circuitry that receives a first broadcast signal transmitted in a first data transmission mode. The second receiver includes circuitry that receives a second broadcast signal transmitted in a second data transmission mode different from the first data transmission mode. The controller is configured to extract first guide information about a first broadcast program from the first broadcast signal, to extract second guide information about a second broadcast program from the second broadcast signal, and to generate and provide integrated guide information about the first and second broadcast programs. Thus, accurate guide information about content may be provided to a user.
Abstract:
Encrypted data transmitted over a data network is decrypted in accordance with a cipher decryption process using a Control Word transmitted with the data. The process is arranged to automatically identify the mode by which the data has been encrypted by identifying (66) the length of the Control Word transmitted with the encrypted data. The Control Word length may be identified (64) from metadata explicitly stating the length, or by analysis of the message in which the Control Word is conveyed. Different encryption modes using Control Words of different lengths can thus be identified, allowing the receiver to identify (67) which of a plurality of decryption modes available to the receiver should be used (69) to decrypt the data.
Abstract:
Generally, aspects of this disclosure are directed to copy protection techniques. Areas in memory may be secured to establish a secure memory area in the memory that is not accessible by unauthorized clients. A request to decode video content stored in the secure memory area may be received. If the video content to be decoded is stored in the secure memory area, a first MMU associated with the hardware decoder may enforce a rule that the video content is to be decoded into one or more output buffers in the secure memory area. A request to display the decoded video content stored in the secure memory area may be received. If the decoded video content is stored in the secure memory area, a second MMU associated with a hardware display processor may enforce a rule that a secure link be established between the hardware display processor and an output device.