WO2009061931A1 - A method for proprietary and licensable protection of a digital stream using copyright - Google Patents

A method for proprietary and licensable protection of a digital stream using copyright Download PDF

Info

Publication number
WO2009061931A1
WO2009061931A1 PCT/US2008/082654 US2008082654W WO2009061931A1 WO 2009061931 A1 WO2009061931 A1 WO 2009061931A1 US 2008082654 W US2008082654 W US 2008082654W WO 2009061931 A1 WO2009061931 A1 WO 2009061931A1
Authority
WO
WIPO (PCT)
Prior art keywords
copyrighted material
stream
data stream
encryption
digital
Prior art date
Application number
PCT/US2008/082654
Other languages
French (fr)
Inventor
Francis Lau
John R. Haggis
Original Assignee
Aerielle Technologies, Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Aerielle Technologies, Inc. filed Critical Aerielle Technologies, Inc.
Publication of WO2009061931A1 publication Critical patent/WO2009061931A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/254Management at additional data server, e.g. shopping server, rights management server
    • H04N21/2541Rights Management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/234Processing of video elementary streams, e.g. splicing of video streams, manipulating MPEG-4 scene graphs
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/44Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream, rendering scenes according to MPEG-4 scene graphs
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/80Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
    • H04N21/83Generation or processing of protective or descriptive data associated with content; Content structuring
    • H04N21/835Generation of protective data, e.g. certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/16Analogue secrecy systems; Analogue subscription systems
    • H04N7/167Systems rendering the television signal unintelligible and subsequently intelligible
    • H04N7/1675Providing digital key or authorisation information for generation or regeneration of the scrambling sequence

Definitions

  • the present invention relates generally to streaming digital media communication systems and methods, and more particularly to a method of protecting a digital stream by interposing digital material protected by copyright into the stream content, and still more particularly to a method of incorporating copyrighted information in a digital stream such that the copyrighted information must be present to decode the digital stream, thus providing means of protecting the stream commercially by requiring a license for use of the copyrighted information.
  • High-speed digital communications devices presently use streams of data to transport vocal communication, text and other data, music, and many other payloads between and among fixed and portable devices. It is advantageous for a company to protect digital streams among its proprietary or standards-based devices for several reasons, not least of which is market control and quality assurance.
  • a secret, proprietary protocol may provide a measure of control while it can be kept secret.
  • a proprietary protocol may be easily reverse-engineered or otherwise compromised over time, as many forms of commercially- viable encryption may be decoded and emulated using common tools.
  • the originator of the protocol may wish to expand its market with licensing, production, and/or distribution, which would necessitate violating the secrecy of their protocol.
  • Protocols are impossible to copyright in the abstract, since copyright protection of software extends only to a single instance of a software-code implementation or the specific content of the stream itself, which often carries content under copyright protection owned by others. Furthermore, protocols are inherently difficult to patent due to limitations in protecting bare algorithms and business methods that do not recite sufficient transformation of a substance or object. Finally, it may often be necessary to protect a stream carried over standards-based protocols to take advantage of existing infrastructure and technology.
  • the present invention addresses these problems by providing a method for ensuring the proprietary and licensable protection of a digital stream using copyright content.
  • the present invention is a novel method for using a digitized artistic copyrighted logo or textual material (i.e., lines of software code) to protect a digital data stream of any kind of digital content.
  • the present invention includes several simple, low-overhead algorithms for carrying out the process, though the possible applications of this technique are legion.
  • the copyrighted logo data extraction scheme described herein is one example of a broader novel method for extracting a limited number of bytes from a digitized copyrighted work for use as a key.
  • the key and the encryption/scrambling algorithms described herein represent one example of a novel way of combining the copyrighted material with a digital stream in such a way that the copyrighted material must be present to decode and/or use the digital stream at its destination, typically in a portable or relatively stationary consumer electronic device.
  • FIG. 1 is a schematic block diagram showing how copyrighted material is combined in a digital stream in the method of the present invention
  • FIG. 2 is a schematic block diagram showing how the copyrighted material is used to "unlock" a receiver for receipt of a digital stream transmission; and [0011]
  • FIG. 3 is a schematic block diagram showing an exclusive-OR scrambling/descrambling process employed in the present invention.
  • the essential element among the steps of the inventive data stream protection method 10 is to combine copyrighted material 12 with the digital data stream 14 from a transmitter 16 into a combined digital stream plus copyrighted material 18, and in such a way that they are inextricable, and such that the stream cannot be decoded and/or used by a receiving device 20 without the copyrighted material itself being present in the receiving entity.
  • this step if the copyrighted material is present in the receiving entity, then that receiving entity must either have been produced by the copyright holder or licensed by the copyright holder to constitute authorized or otherwise legal use.
  • any device or other receiving entity that decodes the stream into the decrypted original digital stream 22 and decrypted copyrighted material 24 is either produced by the copyright holder, is licensed by the holder, or represents an opportunity for licensing arraangements to be made with the holder.
  • the most obvious implementation of this combination requirement is encryption.
  • the present inventors chose a simple exclusive-OR scrambling technique to decrease overhead in the resources of both the encoding and decoding system, although many other techniques may be used.
  • the same copyrighted material comprises both the encryption and the decryption "key.”
  • This application of encryption does not require high security, so it is not a concern that the key is fixed and duplicated in all transmitters and receivers. Since the key may be licensed and distributed, there is a high likelihood it cannot be used legally without licensing because of the copyrighted protection.
  • the purpose of such encryption is therefore not to protect the digital-stream content against unauthorized onlookers or interceptors; the purpose is to control commerce of devices that may participate in the communication stream, and this can be done through copyright-infringement law and licensing.
  • Another novel aspect of the present inventive method is the step of fashioning the copyrighted material and the method by which the copyrighted material can be used as an encryption key.
  • Exclusive-OR keys may be any desired length.
  • a product may call for a key of very limited, conservative length (a few dozen bytes, for instance). This requirement, therefore, calls for the creation of copyrighted material of that limited length or shorter.
  • the essence of creating copyrighted material is that it be a "creative form of expression," such as a poem, an artistic design or image, or other form of art comprising an original work of authorship meeting at least the minimal standards of originality for protection.
  • Any of a number of kinds of work may be protected, including literary works, movies, dances, musical compositions, audio recordings, paintings, drawings, sculptures, photographs, software, radio and television and broadcasts, and so forth.
  • a poem, or even simple lines of prose created by the author and copyright holder could be used as an encryption or scrambling key if the implementation allows long key lengths.
  • any creative written work is suitable for this application as long as the combining algorithm does not demand a limited key length.
  • the best mode of practicing the present invention entails treating the digital stream in such a way that the stream data cannot be used without the application of the copyrighted material.
  • the model of encryption and decryption with a copyrighted key is a common instance of this principle, and exclusive-OR scrambling and descrambling is a very efficient and economical encryption/decryption method.
  • FIG. 3 illustrates the exclusive-OR scrambling (or descrambling) process 40 employed in the present invention.
  • Scrambling and descrambling are perfectly identical: the same key 42 in the same process produces a scrambled stream 44 from a plain data input 46, and derives a plain stream output from scrambled data on the input.
  • Scrambling or descrambling may be done on a byte-by-byte (or larger word- oriented) basis rather than bit-by-bit, as depicted in the diagram.
  • To apply a short key to a relatively longer data stream one need only repeat the sequence of the key once the end is reached. As long as there is a point of synchronization, such as restarting the key sequence at 5 the beginning of each packet of the lower-order protocol, one can keep the cycling of the key synchronized between the transmitter and receiver.
  • the encrypted stream may be encapsulated 0 within another protocol, such as TCP/IP or Bluetooth, without the need for protocol customizations to support unlock codes or some other out-of-band signaling.
  • another protocol such as TCP/IP or Bluetooth
  • the copyrighted material can be as minute as a sequence of bytes forming a bit pattern of a work of creative graphic art.
  • Anyone intending to generate and send or receive and decode a compatible digital stream could therefore be required to obtain a license for the authorized use of the copyrighted material in order to comply with applicable copyright law.
  • This method works even for the complicated case of broadcasting a stream from one source to many recipients, across a wide variety of transport protocols and media. It forms a way of locking up even a universal protocol for proprietary use.

Abstract

A method of protecting a data stream sent by a transmitter, including the steps of combining copyrighted material with a plain digital data stream into a combined digital stream that includes the plain digital data stream and the copyrighted material in such a way that the combined digital data stream cannot be used by a receiving device without the copyrighted material itself being present in the receiving device.

Description

A METHOD FOR PROPRIETARY AND LICENSABLE PROTECTION OF A DIGITAL STREAM USING COPYRIGHT BACKGROUND OF THE INVENTION
Technical Field
[0001] The present invention relates generally to streaming digital media communication systems and methods, and more particularly to a method of protecting a digital stream by interposing digital material protected by copyright into the stream content, and still more particularly to a method of incorporating copyrighted information in a digital stream such that the copyrighted information must be present to decode the digital stream, thus providing means of protecting the stream commercially by requiring a license for use of the copyrighted information.
Background Art
[0002] High-speed digital communications devices presently use streams of data to transport vocal communication, text and other data, music, and many other payloads between and among fixed and portable devices. It is advantageous for a company to protect digital streams among its proprietary or standards-based devices for several reasons, not least of which is market control and quality assurance. A secret, proprietary protocol may provide a measure of control while it can be kept secret. However, a proprietary protocol may be easily reverse-engineered or otherwise compromised over time, as many forms of commercially- viable encryption may be decoded and emulated using common tools. Furthermore, the originator of the protocol may wish to expand its market with licensing, production, and/or distribution, which would necessitate violating the secrecy of their protocol. [0003] Protocols are impossible to copyright in the abstract, since copyright protection of software extends only to a single instance of a software-code implementation or the specific content of the stream itself, which often carries content under copyright protection owned by others. Furthermore, protocols are inherently difficult to patent due to limitations in protecting bare algorithms and business methods that do not recite sufficient transformation of a substance or object. Finally, it may often be necessary to protect a stream carried over standards-based protocols to take advantage of existing infrastructure and technology.
Disclosure of Invention
[0004] The present invention addresses these problems by providing a method for ensuring the proprietary and licensable protection of a digital stream using copyright content. [0005] The present invention is a novel method for using a digitized artistic copyrighted logo or textual material (i.e., lines of software code) to protect a digital data stream of any kind of digital content. The present invention includes several simple, low-overhead algorithms for carrying out the process, though the possible applications of this technique are legion. [0006] The copyrighted logo data extraction scheme described herein is one example of a broader novel method for extracting a limited number of bytes from a digitized copyrighted work for use as a key. The key and the encryption/scrambling algorithms described herein represent one example of a novel way of combining the copyrighted material with a digital stream in such a way that the copyrighted material must be present to decode and/or use the digital stream at its destination, typically in a portable or relatively stationary consumer electronic device.
[0007] There has thus been broadly outlined the more important features of the invention in order that the detailed description thereof that follows may be better understood, and in order that the present contribution to the art maybe better appreciated. There are, of course, additional features of the invention that will be described hereinafter and which will form additional subject matter of the claims appended hereto. Those skilled in the art will appreciate that the conception upon which this disclosure is based readily may be utilized as a basis for the designing of other structures, methods and systems for carrying out the several purposes of the present invention. It is important, therefore, that the claims be regarded as including such equivalent constructions insofar as they do not depart from the spirit and scope of the present invention.
Brief Description of the Drawings
[0008] The invention will be better understood and objects other than those set forth above will become apparent when consideration is given to the following detailed description thereof. Such description makes reference to the annexed drawings wherein: [0009] FIG. 1 is a schematic block diagram showing how copyrighted material is combined in a digital stream in the method of the present invention;
[0010] FIG. 2 is a schematic block diagram showing how the copyrighted material is used to "unlock" a receiver for receipt of a digital stream transmission; and [0011] FIG. 3 is a schematic block diagram showing an exclusive-OR scrambling/descrambling process employed in the present invention.
Best Mode for Carrying Out the Invention
[0012] Referring now to FIG. 1, the essential element among the steps of the inventive data stream protection method 10 is to combine copyrighted material 12 with the digital data stream 14 from a transmitter 16 into a combined digital stream plus copyrighted material 18, and in such a way that they are inextricable, and such that the stream cannot be decoded and/or used by a receiving device 20 without the copyrighted material itself being present in the receiving entity. In effecting this step, if the copyrighted material is present in the receiving entity, then that receiving entity must either have been produced by the copyright holder or licensed by the copyright holder to constitute authorized or otherwise legal use. Therefore, any device or other receiving entity that decodes the stream into the decrypted original digital stream 22 and decrypted copyrighted material 24 is either produced by the copyright holder, is licensed by the holder, or represents an opportunity for licensing arraangements to be made with the holder. [0013] The most obvious implementation of this combination requirement is encryption. The present inventors chose a simple exclusive-OR scrambling technique to decrease overhead in the resources of both the encoding and decoding system, although many other techniques may be used. The same copyrighted material comprises both the encryption and the decryption "key."
[0014] This application of encryption does not require high security, so it is not a concern that the key is fixed and duplicated in all transmitters and receivers. Since the key may be licensed and distributed, there is a high likelihood it cannot be used legally without licensing because of the copyrighted protection. The purpose of such encryption is therefore not to protect the digital-stream content against unauthorized onlookers or interceptors; the purpose is to control commerce of devices that may participate in the communication stream, and this can be done through copyright-infringement law and licensing.
[0015] Another novel aspect of the present inventive method is the step of fashioning the copyrighted material and the method by which the copyrighted material can be used as an encryption key. Exclusive-OR keys may be any desired length. A product may call for a key of very limited, conservative length (a few dozen bytes, for instance). This requirement, therefore, calls for the creation of copyrighted material of that limited length or shorter. [0016] The essence of creating copyrighted material is that it be a "creative form of expression," such as a poem, an artistic design or image, or other form of art comprising an original work of authorship meeting at least the minimal standards of originality for protection. Any of a number of kinds of work may be protected, including literary works, movies, dances, musical compositions, audio recordings, paintings, drawings, sculptures, photographs, software, radio and television and broadcasts, and so forth. For purposes of the present invention, a poem, or even simple lines of prose created by the author and copyright holder could be used as an encryption or scrambling key if the implementation allows long key lengths. In fact, any creative written work is suitable for this application as long as the combining algorithm does not demand a limited key length. [0017] Use of the copyright material as an encryption/decryption key dictates that a small number of bytes be used, so it will generally derive it from a different form of creative work, such as a reduced, pixilated iconic form of a company logo. The logo can be reduced in size and limited to a pure black and white (no grayscale) image so that each pixel can be represented by a zero or a one. When such an object is selected for use, the pixels are gathered into a stream and broken into 8-bit chunks for encoding into software code.
[0018] Referring next to FIG. 2, several different methods are available for combining the copyrighted material with the digital stream. To protect a receiver 30 from competing transmitters, the receiver may rely on a high level protocol in which a plain transmission from a transmitter 32 of the copyrighted material as an "unlock code" 34 simply "unlocks" so that a receiver may begin receiving plain (untreated) transmissions of the digital stream 36. Likewise, in order to stay "unlocked" and to keep transmitting, a transmitter may require a response 38 from a receiver with the copyrighted material in the plain transmission. [0019] Simple exchanges like these may be sufficient to protect and regulate a 1 : 1 protocol (such as one transmitter to one receiver, or exchanges between two peers). However, in the case of a broadcast protocol, it may be possible for unauthorized receivers to ignore the unlock code (the "key") and simply begin receiving the plain digital stream from the transmitter alongside the unit that receives or exchanges the copyrighted material to engage the unlock protocol. [0020] Accordingly, the best mode of practicing the present invention entails treating the digital stream in such a way that the stream data cannot be used without the application of the copyrighted material. The model of encryption and decryption with a copyrighted key is a common instance of this principle, and exclusive-OR scrambling and descrambling is a very efficient and economical encryption/decryption method. [0021] The simplified schematic diagram of FIG. 3 illustrates the exclusive-OR scrambling (or descrambling) process 40 employed in the present invention. Scrambling and descrambling are perfectly identical: the same key 42 in the same process produces a scrambled stream 44 from a plain data input 46, and derives a plain stream output from scrambled data on the input. [0022] Scrambling or descrambling may be done on a byte-by-byte (or larger word- oriented) basis rather than bit-by-bit, as depicted in the diagram. To apply a short key to a relatively longer data stream, one need only repeat the sequence of the key once the end is reached. As long as there is a point of synchronization, such as restarting the key sequence at 5 the beginning of each packet of the lower-order protocol, one can keep the cycling of the key synchronized between the transmitter and receiver.
[0023] The following is a sample Atmel AVR assembly code to illustrate the simplicity and low-overhead nature of the process:
; assuming a loop to move or process the contents of a buffer
, ^ ; outside the loop: initialize X ldi r27,$<hi addr of key string> ; initialize X pointer ldi r26,$<lo addr of key string>
; inside loop, assuming current byte from comm stream is in r0
15 ; after this operation, the transformed byte (scrambled or unscrambled) ; can be found in r0 ld rl,X+ eor rθ,rl [0024] Another advantage of this method is that the encrypted stream may be encapsulated 0 within another protocol, such as TCP/IP or Bluetooth, without the need for protocol customizations to support unlock codes or some other out-of-band signaling. [0025] The foregoing show that intimately combining copyrighted information in a digital stream in such a way that the original copyrighted information must be present to decode the original digital stream, the proposed invention can protect the stream commercially by 5 requiring licensing of the copyrighted information. The copyrighted material can be as minute as a sequence of bytes forming a bit pattern of a work of creative graphic art. Anyone intending to generate and send or receive and decode a compatible digital stream could therefore be required to obtain a license for the authorized use of the copyrighted material in order to comply with applicable copyright law. This method works even for the complicated case of broadcasting a stream from one source to many recipients, across a wide variety of transport protocols and media. It forms a way of locking up even a universal protocol for proprietary use.
[0026] The above disclosure is sufficient to enable one of ordinary skill in the art to practice the invention, and provides the best mode of practicing the invention presently contemplated by the inventor. While there is provided herein a full and complete disclosure of the preferred embodiments of this invention, it is not desired to limit the invention to the exact method steps, or their order or sequence. Various modifications and equivalents will readily occur to those skilled in the art and may be employed, as suitable, without departing from the true spirit and scope of the invention. [0027] Therefore, the above description and illustrations should not be construed as limiting the scope of the invention, which is defined by the appended claims.
[0028] While the particular method herein shown and disclosed in detail is fully capable of attaining the objects and providing the advantages stated herein, it is to be understood that it is merely illustrative of the presently preferred embodiment of the invention and that no limitations are intended to the detail of of the method steps, other than as defined in the appended claims. Accordingly, the proper scope of the present invention should be determined only by the broadest interpretation of the appended claims so as to encompass all such modifications as well as all relationships equivalent to those illustrated in the drawings and described in the specification.

Claims

CLAIMS The invention claimed is:
1. A method of protecting a data stream, comprising the steps of combining copyrighted material with a plain digital data stream sent by a transmitter into a combined digital stream that includes the plain digital data stream and the copyrighted material.
2. The method of claim 1 , wherein the step of combining the plain digital data stream with the copyrighted material is done in such a way that the combined digital data stream cannot be used by a receiving device without the copyrighted material itself being present in the receiving device.
3. The method of claim 1, further including the step of providing an authorized copy of the copyrighted material to the receiving entity for decoding the combined digital stream.
4. The method of claim 3, further including the step of providing the copyrighted material as an encryption/decryption key.
5. The method of claim 5, wherein said encryption/decryption key is provided using an exclusive-OR scrambling technique.
6. The method of claim 6, wherein the copyright material used as an encryption/decryption key is a digitized image of a company logo.
7. The method of claim 1 , wherein the copyrighted material is a digitized company logo.
8. A method of protecting a receiver from unauthorized transmitters, comprising the steps of: providing a receiver that cannot play the content of a digital data stream without first being unlocked by a digital unlock code containing copyrighted material; transmitting a digital data stream from a transmitter; and concurrently transmitting a plain digital stream containing the digital unlock code containing the copyrighted material.
9. The method of claim 8, further including the step of preventing ongoing transmission from the transmitter unless the receiver sends a response containing the copyrighted material.
10. The method of claim 8, further including the step of providing the copyrighted material as an encryption/decryption key.
11. The method of claim 10, further including the step of making the encryption/decryption key with an exclusive-OR scrambling technique.
12. The method of claim 11, wherein the copyright material used as an encryption/decryption key is a digitized image of a company logo.
PCT/US2008/082654 2007-11-08 2008-11-06 A method for proprietary and licensable protection of a digital stream using copyright WO2009061931A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US98656807P 2007-11-08 2007-11-08
US60/986,568 2007-11-08

Publications (1)

Publication Number Publication Date
WO2009061931A1 true WO2009061931A1 (en) 2009-05-14

Family

ID=40626170

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2008/082654 WO2009061931A1 (en) 2007-11-08 2008-11-06 A method for proprietary and licensable protection of a digital stream using copyright

Country Status (1)

Country Link
WO (1) WO2009061931A1 (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6425081B1 (en) * 1997-08-20 2002-07-23 Canon Kabushiki Kaisha Electronic watermark system electronic information distribution system and image filing apparatus
US20050018873A1 (en) * 1993-11-18 2005-01-27 Rhoads Geoffrey B. Method and system for managing, accessing and paying for the use of copyrighted electronic media

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050018873A1 (en) * 1993-11-18 2005-01-27 Rhoads Geoffrey B. Method and system for managing, accessing and paying for the use of copyrighted electronic media
US6425081B1 (en) * 1997-08-20 2002-07-23 Canon Kabushiki Kaisha Electronic watermark system electronic information distribution system and image filing apparatus

Similar Documents

Publication Publication Date Title
CN1186731C (en) Method and apparatus for protecting copyright data in computer system
CN101491078B (en) Method, apparatus and system for secure distribution of content
CN100592683C (en) Protected return path from digital rights management dongle
JP3586146B2 (en) Secure transmission of wideband data messages
CA2322404C (en) Automatic resynchronization of crypto-sync information
CN101719910B (en) Terminal equipment for realizing content protection and transmission method thereof
AU781797B2 (en) Stream continuity enforcement
US20110069864A1 (en) Steganographic method and device
EP2113152B1 (en) A conditional access system
CN101518073A (en) Method for generating the counter block value
KR100336265B1 (en) System and method for copy protection for digital signals
JP2005514717A (en) Generation of unique watermarks for receivers of multimedia multicast transmissions
CN100521771C (en) A conditional reception system merging Internet and cable television network environments
WO2002041101A3 (en) Method and system for transmitting data with enhanced security that conforms to a network protocol
JP2008124935A (en) Transmitter, receiver, and information communication system
WO2009061931A1 (en) A method for proprietary and licensable protection of a digital stream using copyright
EP2829072B1 (en) Encryption-resistant watermarking
CN114726594B (en) Stream media encryption method based on network transmission
KR20060113091A (en) Conditional access system in digital receiver
JP2007181017A (en) System and method for distributing and receiving data
CN104113540A (en) Digital music copy-proof system for android platform
CN114040229B (en) Video encryption and decryption method and device
Kim et al. A study on frame encryption for protecting IPTV contents
KR100429687B1 (en) Method for transmitting and receiving software image
Iyare et al. Improved High Definition Multimedia Interface Authentication Mechanism

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 08846741

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 08846741

Country of ref document: EP

Kind code of ref document: A1