Search Images Maps Play YouTube News Gmail Drive More »
Sign in
Screen reader users: click this link for accessible mode. Accessible mode has the same essential features but works better with your reader.

Patents

  1. Advanced Patent Search
Publication numberUS20040049690 A1
Publication typeApplication
Application numberUS 10/319,096
Publication dateMar 11, 2004
Filing dateDec 13, 2002
Priority dateSep 9, 2002
Also published asCA2498326A1, CA2498326C, CN1682486A, CN1682486B, EP1543650A2, EP1543650A4, EP1543650B1, US7120250, US7151833, US7242773, US20040047470, US20040049691, US20040049694, WO2004023717A2, WO2004023717A3
Publication number10319096, 319096, US 2004/0049690 A1, US 2004/049690 A1, US 20040049690 A1, US 20040049690A1, US 2004049690 A1, US 2004049690A1, US-A1-20040049690, US-A1-2004049690, US2004/0049690A1, US2004/049690A1, US20040049690 A1, US20040049690A1, US2004049690 A1, US2004049690A1
InventorsBrant Candelore, Thomas Poslinski
Original AssigneeCandelore Brant L., Thomas Poslinski
Export CitationBiBTeX, EndNote, RefMan
External Links: USPTO, USPTO Assignment, Espacenet
Selective encryption to enable trick play
US 20040049690 A1
Abstract
Certain embodiments consistent with the present invention involve a method of selectively encrypting and decoding digital video content. Certain of the packets are selected for encryption according to a selection criterion, wherein the selected packets exclude packets containing start of file (SOF) headers. The selected packets are encrypted while retaining the packets containing the SOF headers unencrypted to form selectively encrypted digital video content. In decoding selectively encrypted digital video content, offsets are calculated for at least one of I frames and P frames from the SOF headers and the calculated offsets are stored as an offset table. The offset table can then be accessed to enable trick play of the selectively encrypted digital video content.
Images(5)
Previous page
Next page
Claims(28)
What is claimed is:
1. A method of selectively encrypting digital video content, comprising;
receiving a plurality of packets containing the digital video content;
selecting certain of the packets for encryption according to a selection criterion, wherein the selected packets exclude packets containing start of file (SOF) headers;
encrypting the selected packets; and
retaining the packets containing the SOF headers unencrypted to form selectively encrypted digital video content.
2. The method according to claim 1, further comprising storing the selectively encrypted digital video content on an electronic storage medium.
3. The method according to claim 1, further comprising transmitting the selectively encrypted digital video content to a receiver.
4. The method according to claim 1, wherein the selection criterion comprises selection of all packets except those containing the SOF header.
5. The method according to claim 1, wherein the selection criterion comprises selection of certain packets except those containing the SOF header where the certain packets represent less than all of the remaining packets excluding those containing the SOF header.
6. The method according to claim 1, carried out on a programmed processor.
7. An electronic storage medium storing instructions that, when executed on a programmed processor, carry out the method of selectively encrypting digital video content according to claim 1.
8. A method of decoding selectively encrypted digital video content, comprising:
receiving the selectively encrypted digital video content, wherein the selectively encrypted digital video content has unencrypted packets containing start of file (SOF) headers;
calculating offsets for at least one of I frames and P frames from the SOF headers; and
storing the calculated offsets as an offset table.
9. The method according to claim 8, further comprising accessing the offset table to enable trick play of the selectively encrypted digital video content.
10. The method according to claim 8, wherein the selectively encrypted digital video content is stored on an electronic storage medium.
11. The method according to claim 8, wherein the selectively encrypted digital video content is transmitted from a content provider to a receiver.
12. The method according to claim 8, wherein the encrypted digital video content is fully encrypted except for packets containing the SOF header.
13. The method according to claim 8, wherein packets containing the SOF header as well as certain other packets are unencrypted while certain additional packets are encrypted.
14. The method according to claim 8, carried out on a programmed processor.
15. An electronic storage medium storing instructions that, when executed on a programmed processor, carry out the method of decoding selectively encrypted digital video content according to claim 8.
16. A decoder for decoding selectively encrypted digital video content, comprising:
a receiver that receives the selectively encrypted digital video content, wherein the selectively encrypted digital video content has unencrypted packets containing start of file (SOF) headers;
an offset calculator that calculates offsets for at least one of I frames and P frames from the SOF headers; and
means for storing the calculated offsets as an offset table.
17. The decoder according to claim 16, further comprising means for accessing the offset table to enable trick play of the selectively encrypted digital video content.
18. The decoder according to claim 16, wherein the selectively encrypted digital video content is stored on an electronic storage medium.
19. The decoder according to claim 16, wherein the selectively encrypted digital video content is transmitted from a content provider to a receiver.
20. The decoder according to claim 16, wherein the encrypted digital video content is fully encrypted except for packets containing the SOF header.
21. The decoder according to claim 16, wherein packets containing the SOF header as well as certain other packets are unencrypted while certain additional packets are encrypted.
22. The decoder according to claim 16, wherein the offset calculator is implemented by a programmed processor.
23. The decoder according to claim 16, wherein the offset table is stored in an electronic storage medium.
24. A selective encryption encoder for selective encryption of digital video content, comprising;
means for receiving a plurality of packets containing the digital video content;
a programmed processor that selects certain of the packets for encryption according to a selection criterion, wherein the selected packets exclude packets containing start of file (SOF) headers; and
an encrypter for encrypting the selected packets while retaining the packets containing the SOF headers unencrypted to form selectively encrypted digital video content.
25. The encoder according to claim 24, further comprising an electronic storage medium for storing the selectively encrypted digital video content.
26. The encoder according to claim 24, further comprising a transmitter for transmitting the selectively encrypted digital video content to a receiver.
27. The encoder according to claim 24, wherein the selection criterion comprises selection of all packets except those containing the SOF header.
28. The encoder according to claim 24, wherein the selection criterion comprises selection of certain packets except those containing the SOF header where the certain packets represent less than all of the remaining packets excluding those containing the SOF header.
Description
    CROSS REFERENCE TO RELATED DOCUMENTS
  • [0001]
    This application is related to patent applications docket number SNY-R4646.01 entitled “Critical Packet Partial Encryption” to Unger et al., Ser. No. 10/038,217; patent applications docket number SNY-R4646.02 entitled “Time Division Partial Encryption” to Candelore et al., Ser. No. 10/038,032; docket number SNY-R4646.03 entitled “Elementary Stream Partial Encryption” to Candelore, Ser. No. 10/037,914; docket number SNY-R4646.04 entitled “Partial Encryption and PID Mapping” to Unger et al., Ser. No. 10/037,499; and docket number SNY-R4646.05 entitled “Decoding and Decrypting of Partially Encrypted Information” to Unger et al., Ser. No. 10/037,498 all of which were filed on Jan. 2, 2002 and are hereby incorporated by reference herein.
  • [0002]
    This application is also related to U.S. patent applications Ser. No. 10/273,905, filed Oct. 18, 2002 to Candelore et al., entitled “Video Slice and Active Region Based Dual Partial Encryption”, docket number SNY-R4854.01; Ser. No. 10/273,903, filed Oct. 18, 2002 to Candelore et al., entitled “Star Pattern Partial Encryption”, docket number SNY-S5064.01; Ser. No. 10/274,084, filed Oct. 18, 2002 to Candelore et al., entitled “Slice Mask and Moat Pattern Partial Encryption”, and docket number SNY-S5065.01; Ser. No. 10/274,019, filed Oct. 18, 2002 to Candelore et al., entitled “Video Scene Change Detection”, docket number SNY-S5162.01, which are hereby incorporated by reference.
  • [0003]
    This application is also related to and claims priority benefit of U.S. Provisional patent application Serial No. 60/409,675, filed Sep. 9, 2002, docket number 50S5152, entitled “Generic PID Remapping for Content Replacement”, to Candelore. These applications are also hereby incorporated by reference herein.
  • COPYRIGHT NOTICE
  • [0004]
    A portion of the disclosure of this patent document contains material which is subject to copyright protection. The copyright owner has no objection to the facsimile reproduction of the patent document or the patent disclosure, as it appears in the Patent and Trademark Office patent file or records, but otherwise reserves all copyright rights whatsoever.
  • FIELD OF THE INVENTION
  • [0005]
    This invention relates generally to the field of encryption of digital video content. More particularly, this invention relates to use of selective encryption to permit trick play with digital video content.
  • BACKGROUND OF THE INVENTION
  • [0006]
    When digital video such as MPEG (Moving Pictures Expert Group) digital video is played back in various trick play modes, access to I frames or P frames is generally required. I frames and P frames contain information that can be used to directly represent an image, whereas images are created with B frames by referencing and modifying preceding and/or subsequent I frames and P frames. As an example, when playback is carried out at 2 or 4 speed, the playback algorithm jumps from I frame to I frame or P frame to P frame to speed up the presentation of the video frames while skipping certain frames.
  • [0007]
    Unfortunately, when content is encrypted using traditional encryption techniques, trick play becomes difficult or impossible since content has to be decrypted in order to find the I frames and/or P frames. In the case of unencrypted content, these frames are accessed by calculating an offset from the start of file (SOF).
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • [0008]
    The features of the invention believed to be novel are set forth with particularity in the appended claims. The invention itself however, both as to organization and method of operation, together with objects and advantages thereof, may be best understood by reference to the following detailed description of the invention, which describes certain exemplary embodiments of the invention, taken in conjunction with the accompanying drawings in which:
  • [0009]
    [0009]FIG. 1 is a flow chart showing a selective encryption process and decoding process consistent with certain embodiments of the present invention.
  • [0010]
    [0010]FIG. 2 illustrates one embodiment of a selective encryption and decoding process consistent with certain embodiments of the present invention.
  • [0011]
    [0011]FIG. 3 illustrates another embodiment of a selective encryption and decoding process consistent with certain embodiments of the present invention.
  • [0012]
    [0012]FIG. 4 is a programmed processor which can represent either an encryption processor or a decoder consistent with certain embodiments of the present invention.
  • DETAILED DESCRIPTION OF THE INVENTION
  • [0013]
    While this invention is susceptible of embodiment in many different forms, there is shown in the drawings and will herein be described in detail specific embodiments, with the understanding that the present disclosure is to be considered as an example of the principles of the invention and not intended to limit the invention to the specific embodiments shown and described. In the description below, like reference numerals are used to describe the same, similar or corresponding parts in the several views of the drawings.
  • [0014]
    The terms “scramble” and “encrypt” and variations thereof are used synonymously herein. The term “video” may be used herein to embrace not only true visual information, but also in the conversational sense (e.g., “video tape recorder”) to embrace not only video signals but associated audio and data. The present document generally uses the example of a “dual selective encryption” embodiment, but those skilled in the art will recognize that the present invention can be utilized to realize multiple partial encryption without departing from the invention. The terms “partial encryption” and “selective encryption” are used synonymously herein. Also, the terms “program” and “television program” and similar terms can be interpreted in the normal conversational sense, as well as a meaning wherein the term means any segment of A/V content that can be displayed on a television set or similar monitor device. The term “legacy” as used herein refers to existing technology used for existing cable and satellite systems. The exemplary embodiments disclosed herein are decoded by a television Set-Top Box (STB), but it is contemplated that such technology will soon be incorporated within television receivers of all types whether housed in a separate enclosure alone or in conjunction with recording and/or playback equipment or Conditional Access (CA) decryption module or within a television set itself. The present document generally uses the example of a “dual partial encryption” embodiment, but those skilled in the art will recognize that the present invention can be utilized to realize multiple partial encryption without departing from the invention.
  • [0015]
    The above-referenced commonly owned patent applications describe inventions relating to various aspects of methods generally referred to herein as partial encryption or selective encryption. More particularly, systems are described wherein selected portions of a particular selection of digital content are encrypted using two (or more) encryption techniques while other portions of the content are left unencrypted. By properly selecting the portions to be encrypted, the content can effectively be encrypted for use under multiple decryption systems without the necessity of encryption of the entire selection of content. In some embodiments, only a few percent of data overhead is needed to effectively encrypt the content using multiple encryption systems. This results in a cable or satellite system being able to utilize Set-top boxes or other implementations of conditional access (CA) receivers from multiple manufacturers in a single system—thus freeing the cable or satellite company to competitively shop for providers of Set-top boxes.
  • [0016]
    The present invention applies similar selective encryption techniques to the problem of enabling trick play with encrypted digital video content. The partial encryption processes described in the above patent applications utilize any suitable encryption method. However, these encryption techniques are selectively applied to the data stream, rather than encrypting the entire data stream, using techniques described in the above-referenced patent applications. In general, but without the intent to be limiting, the selective encryption process utilizes intelligent selection of information to encrypt so that the entire program does not have to undergo dual encryption. By appropriate selection of data to encrypt, the program material can be effectively scrambled and hidden from those who desire to hack into the system and illegally recover commercial content without paying. MPEG (or similar format) data that are used to represent the audio and video data does so using a high degree of reliance on the redundancy of information from frame to frame. Certain data can be transmitted as “anchor” data representing chrominance and luminance data. That data is then often simply moved about the screen to generate subsequent frames by sending motion vectors that describe the movement of the block. Changes in the chrominance and luminance data are also encoded as changes rather than a recoding of absolute anchor data. Thus, encryption of this anchor data, for example, or other key data can effectively render the video unviewable.
  • [0017]
    In accordance with certain embodiments consistent with the present invention, the selected video data to be encrypted may be any individual one or combination of the following (described in greater detail in the above applications): video slice headers appearing in an active region of a video frame, data representing an active region of a video frame, data in a star pattern within the video frame, data representing scene changes, I Frame packets, packets containing motion vectors in a first P frame following an I Frame, packets having an intra_slice_flag indicator set, packets having an intra_slice indicator set, packets containing an intra_coded macroblock, data for a slice containing an intra_coded macroblock, data from a first macroblock following the video slice header,packets containing video slice headers, anchor data, and P Frame data for progressively refreshed video data, data arranged in vertical and or horizontal moat patterns on the video frame, and any other selected data that renders the video and/or audio difficult to utilize. Several such techniques as well as others are disclosed in the above-referenced patent applications, any of which (or other techniques) can be utilized with the present invention to encrypt only a portion of the content, so long as the packets containing the SOF header is not encrypted, as will be explained later.
  • [0018]
    Currently there is a problem with delivering content to a personal-video-recorder (PVR) enabled set-top box is that to enable trick play it must be first descrambled. If the content is downloaded “opportunistically” from a carrousel at night, then descrambling (and locally re-scrambling) the content can cause a security problem. Keys used to locally re-scramble the content will not be as secure as those from the conditional access (CA) element. The content on the hard drive might be accessed without paying the appropriate viewing fees. Ideally, content delivered “opportunistically” or speculatively to a local drive of a set-top box would remain CA scrambled on the hard drive.
  • [0019]
    In accordance with certain embodiments consistent with the present invention, selective encryption is utilized to encrypt selective portions of content, but leaves the packets containing the SOF header in the clear (unencrypted). By leaving the SOF header unencrypted, trick play circuits and algorithms can operate properly. The remainder of the content can be encrypted fully or selectively according to any of the selective encryption schemes described in the copending applications, or any other suitable selective encryption content selection criterion.
  • [0020]
    [0020]FIG. 1 describes a process 100, in accord with certain embodiments consistent with the present invention, starting at 104. A packet selection criterion is established at 108 for determining which packets are to be encrypted. Such selection criterion can, for example, be established in accord with any of the above-referenced selective encryption selection criteria (including full encryption of all content except SOF header packets). Once the selection criterion is established, packets can be received at 112. If the packet does not meet the selection criterion at 116, then the packet is not encrypted at 120. If the packet does meet the selection criterion at 116, then control passes to 126 where the packet is examined to determine if it contains the SOF header. If so, the packet is not encrypted at 120. If not, the packet is encrypted at 130. Control passe from 120 or 130 to 134. At 134, if the last packet has not been encountered, the next packet is received at 112. If the last packet has been received at 134, the process stops at 138.
  • [0021]
    Thus, in accord with one embodiment consistent with the invention, a method of selectively encrypting digital video content, involves receiving a plurality of packets containing the digital video content; selecting certain of the packets for encryption according to a selection criterion, wherein the selected packets exclude packets containing start of file (SOF) headers; encrypting the selected packets; and retaining the packets containing the SOF headers unencrypted to form selectively encrypted digital video content. A method of decoding selectively encrypted digital video content, consistent with certain embodiments, involves receiving the selectively encrypted digital video content, wherein the selectively encrypted digital video content has unencrypted packets containing start of file (SOF) headers; calculating offsets for at least one of I frames and P frames from the SOF headers; and storing the calculated offsets as an offset table. The offset table can be accessed to enable trick play of the selectively encrypted digital video content by identifying the location of I and/or P frames.
  • [0022]
    A selective encryption encoder for selective encryption of digital video content, consistent with certain embodiments of the present invention receives a plurality of packets containing the digital video content. A programmed processor selects certain of the packets for encryption according to a selection criterion, wherein the selected packets exclude packets containing start of file (SOF) headers. An encrypter encrypts the selected packets while retaining the packets containing the SOF headers unencrypted to form selectively encrypted digital video content. The selectively encrypted content can then be stored on an electronic storage medium and/or transmitted to a receiver such as a television Set-top box.
  • [0023]
    [0023]FIG. 2 depicts an embodiment of this process wherein a clear stream of data 204 is converted to a selectively encrypted stream of data 208. Clear stream 204 contains a sequence of packets each having program identifier (PID) A. Packets 212 and 214 contain SOF headers, while packets 218, 220, 222, 224 and 226 contain other information that forms a part of the video data stream. As a part of the encryption process of this example, all packets except those containing SOF headers are encrypted. Thus, packets 212 and 214 are transferred directly to the selectively encrypted stream 208. Packets 218, 220, 222, 224 and 226 are encrypted to produce encrypted packets 238, 240, 242, 244 and 246, respectively. At the decoder (e.g., in a television Set-top box (STB)), the fact that the SOF headers are unencrypted enables calculation of offsets for trick play at 240. These offsets can then be stored in a local trick play offset table at 254 to enable rapid access to the proper I and/or P frames, and thus produce trick play.
  • [0024]
    [0024]FIG. 3 depicts an embodiment of this process wherein a clear stream of data 304 is converted to a selectively encrypted stream of data 308. In this example, the selective encryption selection criterion is one that only partially encrypts packets not containing SOF headers. Clear stream 304 contains a sequence of packets each having program identifier (PID) A. Packets 312 and 314 contain SOF headers, while packets 318, 320, 322, 324 and 326 contain other information forming part of the stream of video. As a part of the encryption process of this example, only certain of the packets containing information other than the SOF header are encrypted. As illustrated, packets 312 and 314 are transferred directly to the selectively encrypted stream 308. Packets 318, 322 and 326 are encrypted to produce encrypted packets 338, 342 and 346, respectively. At the decoder (e.g., in a television STB), the fact that the SOF headers are unencrypted enables calculation of offsets for trick play at 340. These offsets can then be stored in a local trick play offset table at 354 to enable rapid access to the proper I and/or P frames, and thus produce trick play.
  • [0025]
    When selectively encrypted digital video content is created as streams 208 or 308, the selectively encrypted digital video content can then be stored on an electronic storage medium or transmitted to one or more recipients (e.g., by downloading, streaming or broadcast by a cable or satellite content provider to subscriber's Set-top boxes serving as receivers and decoders.
  • [0026]
    Thus, certain embodiments of the present invention keep the SOF header packets in the clear. This allows commercially available decoder chips such as the model number 7030 manufactured and sold by Broadcom Corporation to calculate the byte offset to I, P and B frames. For trick play operation, the offset allows a decoder (e.g., a Set-top box) to display, for example, every second I Frame or fourth I frame without decoding other content. While the SOF headers are not encrypted, the rest of the content does not need to be completely encrypted, as described above.
  • [0027]
    The processes above can be carried out on any suitable programmed general purpose processor operating as a server/encoder such as that depicted as computer 400 of FIG. 4. Computer 400 can represent either an encryption processor or a decoder depending upon programming. Computer 400 has one or more central processor units (CPU) 410 with one or more associated buses 414 used to connect the central processor unit 410 to Random Access Memory 418 and Non-Volatile Memory 422 in a known manner. Output devices 426, such as a display and printer, may be provided in order to display and/or print output for the use of the MSO or user as well as to provide a user interface such as a Graphical User Interface (GUI). Similarly, input devices such as keyboard, mouse and removable media readers 430 may be provided for the input of information by the operator. Computer 400 also may incorporate internal and/or external attached disc or other mass storage 434 (e.g., disc and/or optical storage) for storing large amounts of information including, but not limited to, the operating system, encryption processes (for the encryption encoder), or offset calculation and local offset table if computer 400 is used as a decoder (e.g., forming a part of a television STB). The Computer system 400 also has an interface 438 for connection to the cable system if present at the MSO. While depicted as a single computer, the digital content provider may utilize multiple linked computers to carry out the functions described herein.
  • [0028]
    Those skilled in the art will recognize that the present invention has been described in terms of exemplary embodiments based upon use of a programmed processor (e.g., computer 400). However, the invention should not be so limited, since the present invention could be implemented using hardware component equivalents such as special purpose hardware and/or dedicated processors which are equivalents to the invention as described and claimed. Similarly, general purpose computers, microprocessor based computers, micro-controllers, optical computers, analog computers, dedicated processors and/or dedicated hard wired logic may be used to construct alternative equivalent embodiments of the present invention. Moreover, although the present invention has been described in terms of a general purpose personal computer providing a playback mechanism, the playback can be carried on a dedicated machine without departing from the present invention.
  • [0029]
    Those skilled in the art will appreciate that the program steps and associated data used to implement the embodiments described above can be implemented using disc storage as well as other forms of storage such as for example Read Only Memory (ROM) devices, Random Access Memory (RAM) devices; optical storage elements, magnetic storage elements, magneto-optical storage elements, flash memory, core memory and/or other equivalent storage technologies without departing from the present invention. Such alternative storage devices should be considered equivalents.
  • [0030]
    The present invention, as described in embodiments herein, is implemented using a programmed processor executing programming instructions that are broadly described above form that can be stored on any suitable electronic storage medium or transmitted over any suitable electronic communication medium or otherwise be present in any computer readable or propagation medium. However, those skilled in the art will appreciate that the processes described above can be implemented in any number of variations and in many suitable programming languages without departing from the present invention. For example, the order of certain operations carried out can often be varied, additional operations can be added or operations can be deleted without departing from the invention. Error trapping can be added and/or enhanced and variations can be made in user interface and information presentation without departing from the present invention. Such variations are contemplated and considered equivalent.
  • [0031]
    Software code and/or data embodying certain aspects of the present invention may be present in any computer readable medium, transmission medium, storage medium or propagation medium including, but not limited to, electronic storage devices such as those described above, as well as carrier waves, electronic signals, data structures (e.g., trees, linked lists, tables, packets, frames, etc.) optical signals, propagated signals, broadcast signals, transmission media (e.g., circuit connection, cable, twisted pair, fiber optic cables, waveguides, antennas, etc.) and other media that stores, carries or passes the code and/or data. Such media may either store the software code and/or data or serve to transport the code and/or data from one location to another. In the present exemplary embodiments, MPEG compliant packets, slices, tables and other data structures are used, but this should not be considered limiting since other data structures can similarly be used without departing from the present invention.
  • [0032]
    While the invention has been described in conjunction with specific embodiments, it is evident that many alternatives, modifications, permutations and variations will become apparent to those skilled in the art in light of the foregoing description. Accordingly, it is intended that the present invention embrace all such alternatives, modifications and variations as fall within the scope of the appended claims.
Patent Citations
Cited PatentFiling datePublication dateApplicantTitle
US5539823 *Jul 27, 1994Jul 23, 1996General Instrument Corporation Of DelawareSubscription television picture scrambling and descrambling system providing compatibility with different such systems
US5600721 *Jul 27, 1994Feb 4, 1997Sony CorporationApparatus for scrambling a digital video signal
US5805700 *Oct 15, 1996Sep 8, 1998Intel CorporationPolicy based selective encryption of compressed video data
US6057872 *Jul 9, 1997May 2, 2000General Instrument CorporationDigital coupons for pay televisions
US6445738 *Apr 25, 1996Sep 3, 2002Opentv, Inc.System and method for creating trick play video streams from a compressed normal play video bitstream
US6453115 *Aug 31, 2000Sep 17, 2002Keen Personal Media, Inc.Digital video recording system which generates an index data structure for displaying a video stream in trickplay mode
US20020184506 *May 30, 2001Dec 5, 2002Perlman Stephen G.System and method for multimedia content simulcast
Referenced by
Citing PatentFiling datePublication dateApplicantTitle
US7218738 *Oct 18, 2002May 15, 2007Sony CorporationEncryption and content control in a digital broadcast system
US7688978Mar 30, 2010Sony CorporationScene change detection
US7711115Oct 21, 2003May 4, 2010Sony CorporationDescrambler
US7724907Mar 12, 2003May 25, 2010Sony CorporationMechanism for protecting the transfer of digital content
US7730300Mar 11, 2003Jun 1, 2010Sony CorporationMethod and apparatus for protecting the transfer of data
US7747853Mar 31, 2004Jun 29, 2010Sony CorporationIP delivery of secure digital content
US7751560Jun 26, 2006Jul 6, 2010Sony CorporationTime division partial encryption
US7751563Sep 25, 2006Jul 6, 2010Sony CorporationSlice mask and moat pattern partial encryption
US7751564Jul 6, 2010Sony CorporationStar pattern partial encryption method
US7765567Dec 13, 2002Jul 27, 2010Sony CorporationContent replacement by PID mapping
US7773750Apr 30, 2007Aug 10, 2010Sony CorporationSystem and method for partially encrypted multimedia stream
US7792294Feb 20, 2007Sep 7, 2010Sony CorporationSelective encryption encoding
US7823174Oct 26, 2010Sony CorporationMacro-block based content replacement by PID mapping
US7853980Dec 14, 2010Sony CorporationBi-directional indices for trick mode video-on-demand
US7895616Feb 22, 2011Sony CorporationReconstitution of program streams split across multiple packet identifiers
US7895617Feb 22, 2011Sony CorporationContent substitution editor
US7925016Nov 13, 2007Apr 12, 2011Sony CorporationMethod and apparatus for descrambling content
US7991997 *Aug 2, 2011Panasonic Avionics CorporationSystem and method for providing searchable data transport stream encryption
US8041190Dec 1, 2005Oct 18, 2011Sony CorporationSystem and method for the creation, synchronization and delivery of alternate content
US8185921Feb 28, 2006May 22, 2012Sony CorporationParental control of displayed content using closed captioning
US8488788Dec 15, 2009Jul 16, 2013Sony CorporationMethod for simulcrypting scrambled data to a plurality of conditional access devices
US8504825Jun 27, 2011Aug 6, 2013Panasonic Avionics CorporationSystem and method for providing searchable data transport stream encryption
US8572408Oct 11, 2004Oct 29, 2013Sony CorporationDigital rights management of a digital device
US8645988Mar 9, 2006Feb 4, 2014Sony CorporationContent personalization for digital content
US8667525Mar 9, 2006Mar 4, 2014Sony CorporationTargeted advertisement selection from a digital stream
US8818896Apr 1, 2005Aug 26, 2014Sony CorporationSelective encryption with coverage encryption
US20020194613 *Feb 27, 2002Dec 19, 2002Unger Robert AllanReconstitution of program streams split across multiple program identifiers
US20020196939 *Jan 2, 2002Dec 26, 2002Unger Robert AllanDecoding and decryption of partially encrypted information
US20030021412 *Jan 2, 2002Jan 30, 2003Candelore Brant L.Partial encryption and PID mapping
US20030026423 *Jan 2, 2002Feb 6, 2003Unger Robert AllanCritical packet partial encryption
US20030081776 *Jan 2, 2002May 1, 2003Candelore Brant L.Elementary stream partial encryption
US20030123664 *Oct 18, 2002Jul 3, 2003Pedlow Leo M.Encryption and content control in a digital broadcast system
US20030133570 *Oct 18, 2002Jul 17, 2003Candelore Brant L.Star pattern partial encryption
US20030145329 *Dec 13, 2002Jul 31, 2003Candelore Brant L.Selective encryption for video on demand
US20030152226 *Oct 18, 2002Aug 14, 2003Candelore Brant L.Slice mask and moat pattern partial encryption
US20030159139 *Oct 18, 2002Aug 21, 2003Candelore Brant L.Video slice and active region based dual partial encryption
US20030159140 *Dec 13, 2002Aug 21, 2003Candelore Brant L.Selective encryption to enable multiple decryption keys
US20030174837 *Dec 13, 2002Sep 18, 2003Candelore Brant L.Content replacement by PID mapping
US20030174844 *Mar 11, 2003Sep 18, 2003Candelore Brant L.Method and apparatus for protecting the transfer of data
US20030222994 *May 28, 2002Dec 4, 2003Sony Electronics Inc.Method and apparatus for synchronizing dynamic graphics
US20040047470 *Oct 18, 2002Mar 11, 2004Candelore Brant L.Multiple partial encryption using retuning
US20040049688 *Nov 13, 2002Mar 11, 2004Candelore Brant L.Upgrading of encryption
US20040049691 *Mar 19, 2003Mar 11, 2004Candelore Brant L.Selective encryption to enable trick play
US20040049694 *Dec 13, 2002Mar 11, 2004Candelore Brant L.Content distribution for multiple digital rights management
US20040073917 *Mar 31, 2003Apr 15, 2004Sony CorporationSystem and method for partially encrypted multimedia stream
US20040086127 *Mar 12, 2003May 6, 2004Candelore Brant L.Mechanism for protecting the transfer of digital content
US20040088552 *Oct 22, 2003May 6, 2004Candelore Brant L.Multi-process descrambler
US20040088558 *Oct 21, 2003May 6, 2004Candelore Brant L.Descrambler
US20040102379 *Oct 20, 2003May 27, 2004The Johns Hopkins University School Of MedicineFibroblast growth factor homologous factors (FHFs) and methods of use
US20040151314 *Jan 22, 2004Aug 5, 2004Candelore Brant L.Method and apparatus for securing control words
US20040181666 *Mar 31, 2004Sep 16, 2004Candelore Brant L.IP delivery of secure digital content
US20040185564 *Jan 22, 2004Sep 23, 2004Guping TangBiodegradable copolymer and nucleic acid delivery system
US20040187161 *Mar 20, 2003Sep 23, 2004Cao Adrean T.Auxiliary program association table
US20040205812 *May 29, 2001Oct 14, 2004Candelore Brant L.Method and apparatus for routing program data in a program viewing unit
US20040240668 *Jan 29, 2004Dec 2, 2004James BonanContent scrambling with minimal impact on legacy devices
US20050036067 *Aug 5, 2003Feb 17, 2005Ryal Kim AnnonVariable perspective view of video images
US20050063541 *Oct 11, 2004Mar 24, 2005Candelore Brant L.Digital rights management of a digital device
US20050066357 *Sep 22, 2003Mar 24, 2005Ryal Kim AnnonModifying content rating
US20050094808 *Mar 16, 2004May 5, 2005Pedlow Leo M.Jr.Dynamic composition of pre-encrypted video on demand content
US20050094809 *Mar 16, 2004May 5, 2005Pedlow Leo M.Jr.Preparation of content for multiple conditional access methods in video on demand
US20050097596 *Jan 23, 2004May 5, 2005Pedlow Leo M.Jr.Re-encrypted delivery of video-on-demand content
US20050097597 *Mar 16, 2004May 5, 2005Pedlow Leo M.Jr.Hybrid storage of video on demand content
US20050097598 *Apr 21, 2004May 5, 2005Pedlow Leo M.Jr.Batch mode session-based encryption of video on demand content
US20050097614 *Jan 23, 2004May 5, 2005Pedlow Leo M.Jr.Bi-directional indices for trick mode video-on-demand
US20050102702 *Feb 9, 2004May 12, 2005Candelore Brant L.Cablecard with content manipulation
US20050129233 *Apr 13, 2004Jun 16, 2005Pedlow Leo M.Jr.Composite session-based encryption of Video On Demand content
US20050169473 *Oct 13, 2004Aug 4, 2005Candelore Brant L.Multiple selective encryption with DRM
US20050202495 *Apr 20, 2005Sep 15, 2005Fuji Photo Film Co., Ltd.Hybridization probe and target nucleic acid detecting kit, target nucleic acid detecting apparatus and target nucleic acid detecting method using the same
US20050205923 *Mar 21, 2005Sep 22, 2005Han Jeong HNon-volatile memory device having an asymmetrical gate dielectric layer and method of manufacturing the same
US20060115083 *Nov 18, 2005Jun 1, 2006Candelore Brant LPartial encryption and PID mapping
US20060153379 *Nov 18, 2005Jul 13, 2006Candelore Brant LPartial encryption and PID mapping
US20060168616 *Mar 9, 2006Jul 27, 2006Sony Electronics Inc.Targeted advertisement selection from a digital stream
US20060174264 *Mar 9, 2006Aug 3, 2006Sony Electronics Inc.Content personalization for digital conent
US20060198519 *Oct 11, 2004Sep 7, 2006Candelore Brant LDigital rights management of a digital device
US20060262926 *Jun 26, 2006Nov 23, 2006Candelore Brant LTime division partial encryption
US20060271492 *Aug 8, 2006Nov 30, 2006Candelore Brant LMethod and apparatus for implementing revocation in broadcast networks
US20060291803 *Jun 23, 2006Dec 28, 2006Panasonic Avionics CorporationSystem and Method for Providing Searchable Data Transport Stream Encryption
US20070019925 *Jul 18, 2006Jan 25, 2007Macinnis AlexanderSystems, methods, and apparatus for trick mode
US20070098166 *Sep 25, 2006May 3, 2007Candelore Brant LSlice mask and moat pattern partial encryption
US20070160210 *Mar 5, 2007Jul 12, 2007Candelore Brant LStar pattern partial encryption method
US20070204288 *Feb 28, 2006Aug 30, 2007Sony Electronics Inc.Parental control of displayed content using closed captioning
US20070208668 *Mar 1, 2006Sep 6, 2007Candelore Brant LMultiple DRM management
US20070269046 *Mar 5, 2007Nov 22, 2007Candelore Brant LReceiver device for star pattern partial encryption
US20070271470 *Nov 13, 2002Nov 22, 2007Candelore Brant LUpgrading of encryption
US20070291940 *Feb 20, 2007Dec 20, 2007Candelore Brant LSelective encryption encoding
US20070291942 *Feb 20, 2007Dec 20, 2007Candelore Brant LScene change detection
US20080172712 *Jan 10, 2008Jul 17, 2008Matsushita Electric Industrial Co., Ltd.Multimedia data transmitting apparatus, multimedia data receiving apparatus, multimedia data transmitting method, and multimedia data receiving method
US20080273698 *Apr 25, 2006Nov 6, 2008Koninklijke Philips Electronics, N.V.Device for and a Method of Processing a Data Stream Having a Sequence of Packets and Timing Information Related to the Packets
US20090180025 *Jul 16, 2009Sony CorporationMethod and apparatus for overlaying graphics on video
US20100020963 *Jan 28, 2010Sony CorporationMethod and Apparatus for Descrambling Content
US20100183149 *Dec 15, 2009Jul 22, 2010Sony CorporationMethod for simulcrypting scrambled data to a plurality of conditional access devices
EP1746834A2Jul 19, 2006Jan 24, 2007Broadcom CorporationSystems, methods, and apparatus for trick mode
EP1746834A3 *Jul 19, 2006Jun 13, 2007Broadcom CorporationSystems, methods, and apparatus for trick mode
Classifications
U.S. Classification713/193, 348/E07.063, 348/E07.056, 375/E07.02, 386/E09.01, 375/E07.024, 386/E05.004, 348/E07.061, 375/E07.267, 386/E05.052
International ClassificationH04N7/52, H04N7/167, H04N7/16, G06Q50/00, H04L9/00, G06Q30/00, G06F21/24, H04L9/14, H04N7/24, H04N5/783, H04N9/79, H04N5/913
Cooperative ClassificationH04N5/783, H04N21/63345, H04N21/43607, H04N21/8455, H04N2005/91364, H04N21/238, H04N21/835, H04N9/7925, H04N21/434, H04N21/25833, H04N21/440281, H04N7/52, H04N21/4331, H04N21/23476, H04N21/458, H04N21/2347, H04N21/234345, H04N5/913, H04N21/23439, H04N21/44055, H04N7/165, H04N21/25435, H04N21/47202, H04N21/235, H04N21/236, H04N21/440245, H04N21/435, H04N7/1675, H04N21/4623, H04N21/26606, H04N7/163, H04N21/812, H04N21/4333, H04N21/2668
European ClassificationH04N21/434, H04N21/4405P, H04N21/2343P, H04N21/4402P, H04N21/236, H04N21/458, H04N21/4623, H04N21/258C3, H04N21/6334K, H04N21/436C, H04N21/835, H04N21/2668, H04N21/2343V, H04N21/2543V, H04N21/2347P, H04N21/4402T, H04N21/266E, H04N21/81C, H04N21/433C, H04N21/433P, H04N21/472D, H04N21/435, H04N21/235, H04N21/238, H04N21/845P, H04N21/2347, H04N9/79M2, H04N5/913, H04N7/52, H04N7/16E2, H04N7/16E3, H04N7/167D, H04N5/783
Legal Events
DateCodeEventDescription
Mar 3, 2003ASAssignment
Owner name: SONY CORPORATION, JAPAN
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:CANDELORE, BTANT L.;POSLINSKI, THOMAS;REEL/FRAME:013797/0957;SIGNING DATES FROM 20030206 TO 20030211