WO2002015579A1 - Method and apparatus for enabling random access to individual pictures in an encrypted video stream - Google Patents
Method and apparatus for enabling random access to individual pictures in an encrypted video stream Download PDFInfo
- Publication number
- WO2002015579A1 WO2002015579A1 PCT/US2000/011891 US0011891W WO0215579A1 WO 2002015579 A1 WO2002015579 A1 WO 2002015579A1 US 0011891 W US0011891 W US 0011891W WO 0215579 A1 WO0215579 A1 WO 0215579A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- transport packets
- data
- type
- transport
- packets
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/23—Processing of content or additional data; Elementary server operations; Server middleware
- H04N21/238—Interfacing the downstream path of the transmission network, e.g. adapting the transmission rate of a video stream to network bandwidth; Processing of multiplex streams
- H04N21/2389—Multiplex stream processing, e.g. multiplex stream encrypting
- H04N21/23895—Multiplex stream processing, e.g. multiplex stream encrypting involving multiplex stream encryption
- H04N21/23897—Multiplex stream processing, e.g. multiplex stream encrypting involving multiplex stream encryption by partially encrypting, e.g. encrypting only the ending portion of a movie
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/23—Processing of content or additional data; Elementary server operations; Server middleware
- H04N21/234—Processing of video elementary streams, e.g. splicing of video streams, manipulating MPEG-4 scene graphs
- H04N21/2347—Processing of video elementary streams, e.g. splicing of video streams, manipulating MPEG-4 scene graphs involving video stream encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/23—Processing of content or additional data; Elementary server operations; Server middleware
- H04N21/238—Interfacing the downstream path of the transmission network, e.g. adapting the transmission rate of a video stream to network bandwidth; Processing of multiplex streams
- H04N21/2387—Stream processing in response to a playback request from an end-user, e.g. for trick-play
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/47—End-user applications
- H04N21/472—End-user interface for requesting content, additional data or services; End-user interface for interacting with content, e.g. for content reservation or setting reminders, for requesting event notification, for manipulating displayed content
- H04N21/47202—End-user interface for requesting content, additional data or services; End-user interface for interacting with content, e.g. for content reservation or setting reminders, for requesting event notification, for manipulating displayed content for requesting content on demand, e.g. video on demand
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/16—Analogue secrecy systems; Analogue subscription systems
- H04N7/167—Systems rendering the television signal unintelligible and subsequently intelligible
- H04N7/1675—Providing digital key or authorisation information for generation or regeneration of the scrambling sequence
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/16—Analogue secrecy systems; Analogue subscription systems
- H04N7/173—Analogue secrecy systems; Analogue subscription systems with two-way working, e.g. subscriber sending a programme selection signal
- H04N7/17309—Transmission or handling of upstream communications
- H04N7/17318—Direct or substantially direct transmission and handling of requests
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/16—Analogue secrecy systems; Analogue subscription systems
- H04N7/173—Analogue secrecy systems; Analogue subscription systems with two-way working, e.g. subscriber sending a programme selection signal
- H04N7/17309—Transmission or handling of upstream communications
- H04N7/17336—Handling of requests in head-ends
Definitions
- the present invention relates to an encrypted packetized data processing system.
- the invention is particularly suited for use in a video-on-demand (VOD) system wherein motion control ("trick modes"), such as fast forward and fast reverse modes, are required.
- VOD video-on-demand
- VOD is an interactive video service typically provided over a point-to-multipoint distribution system, such as a cable television system.
- a subscriber can order video (such as a movie, sport event or the like) or other types of content at any time, without adhering to a pre-defined showing schedule.
- a full-function VOD system provides the subscriber with Video Cassette Recorder (VCR) -like motion control functions, such as pause (freeze frame) , fast forward, fast reverse, and slow reverse.
- VCR Video Cassette Recorder
- trick play variously known as trick play, trick mode, or motion control
- video servers which are specialized high-capacity file servers .
- the content is played from stored files upon purchase by a subscriber.
- digital video content is typically packetized into fixed-size units. Such is that case in the popular PEG-2 standard (ITU-T Rec. H.222.0 ISO/IEC 13818) used in digital television.
- a video server controller responds to motion control commands from set- top boxes and changes the way content is played back.
- the video server will skip selected pictures to create a sped-up version of the video.
- pictures in fast forward and fast reverse sequences are often extracted in real time from the normal video file, which contains all pictures in the movie or other program.
- the first is to scan the main video file sequentially looking for starts of pictures .
- the other method is to build an auxiliary index file to the start points of pictures in the main video file.
- conditional access is implemented to deny access to services or content by unauthorized parties.
- Conditional access requires a trustworthy mechanism for classifying users into different groups, and an enforcement mechanism for denying access to groups of unauthorized users.
- Encryption is often used to control access to the content carried by carrier signals.
- the conventional approach to encrypting content for VOD distribution is to have real-time encrypting devices on the delivery path between the video server and the subscribers . This approach works well when the number of subscribers is relatively small. However, as the number of subscribers increases, the number of encrypting devices and their physical space requirements become burdensome.
- pre-encryption An alternative to real-time encryption of VOD content is off-line, pre-encryption.
- video content is processed and encrypted before it is loaded into video servers.
- the advantage of pre- encryption is that it removes the need for encrypting devices on the video delivery path, thus making VOD service substantially less expensive and more scalable.
- the pre-encryption can be done centrally at a content preparation site, which is separate from the locations (headends) at which the VOD service is deployed. Once video is pre-encrypted at the central site, the same encrypted copies can be distributed to multiple headends where VOD is deployed.
- VOD content creates a problem: it interferes with the detection of the location of the starting point of individual pictures in a video file.
- video servers do not have the capability or authorization to decrypt pre-encrypted video content. As a result, they cannot locate individual pictures in an encrypted video file just by scanning the file.
- a similar problem is confronted when the encrypted content is stored at a decoder prior to display, where it is time consuming and computationally intensive to have to decrypt all of the pictures to locate specific pictures.
- the system should enable random access to individual pictures in an encrypted video file for use in modes such as fast forward, fast reverse, pause, resume, slow motion (forward or reverse) , frame-by-frame or other incremental frame advance or scan (e.g., advancing N frames at a time, where N>1) , and the like.
- the system should allow a secure video-on-demand system to be deployed at a reduced cost.
- the system should be compatible with packetized data communication schemes, such as MPEG-2.
- the invention should be compatible with a user device that stores an encrypted video file, such as a personal video recorder (PVR) , personal computer hard disk or the like.
- PVR personal video recorder
- the present invention provides a system having the above and other advantages .
- the present invention relates to an encrypted packetized data processing system.
- a particular method for providing at least partially encrypted packetized data includes the step of receiving input digital data from a data source, such as a video server.
- the input digital data includes a plurality of encoded data segments with respective data headers, such as found in an MPEG-compatible Packetized Elementary Stream (PES) packet.
- PES Packetized Elementary Stream
- the input digital data is subdivided for transport in successive transport packets such that at least two types of transport packets are provided, including a first type that includes at least a portion of an associated data header, and a second type that includes at least a portion of an associated encoded data segment but does not include any portion of the data headers .
- the second type of transport packets are encrypted, while leaving the first type of transport packets unencrypted.
- Identifiers are provided for the respective transport packets to indicate whether the respective transport packet is encrypted or unencrypted. This allows the transport packets with the header data to be randomly accessed from a memory, which is particularly advantageous for performing "trick modes", such as fast forward and fast reverse, e.g., in a video- on-demand service. If a packet includes header data, it is suitable for use in a trick mode since it provides data from the start of a video, audio or other data packet .
- a method for decoding at least partially encrypted packetized data includes the step of receiving successive transport packets from a transport stream.
- the transport packets are formed by subdividing digital data that includes a plurality of encoded data segments with respective data headers into a first, encrypted type that includes at least a portion of an associated data header, and a second, unencrypted type that includes at least a portion of an associated encoded data segment but does not include any portion of the data headers .
- Identifiers are provided for the respective transport packets to indicate whether the respective transport packet is encrypted or unencrypted.
- the transport packets are stored in a storage device, and the identifiers are used to randomly access the first type of transport packets from the storage device without performing decryption. For example, a personal video recorder or other user device that stores the partially encrypted transport packets may be used. The packets are subsequently decrypted when the user desires to view the data.
- FIG. 1 illustrates the formation of transport packets in accordance with the present invention.
- FIG. 2 illustrates an encoder in accordance with the present invention.
- FIG. 3 illustrates a user device/decoder in accordance with the present invention.
- the present invention relates to an encrypted packetized data processing system.
- FIG. 1 illustrates the formation of transport packets in accordance with the present invention.
- Video information is digitized and compressed before being encoded.
- the compression can be considered part of the encoding.
- Compressed video from a program 100 is divided into variable-length units called Packetized Elementary
- PES packets 105 and 110 each of which contains a variable number of encoded pictures.
- the PES packet 105 includes encoded pictures 119, 121, . . . , 124.
- the example PES packet 105 has a header 116 and a payload portion 117.
- each picture in the PES packet 105 is prefixed by a header containing information about the picture.
- the picture 119 has a header 118
- the picture 121 has a header 120
- the picture 124 has a header 123.
- PES packets are further broken down into fixed-length units called transport packets, such as transport packets 130, 140 and 150.
- transport packets such as transport packets 130, 140 and 150.
- each transport packets comprises 188 bytes.
- the PES packet length is much larger than the size of a transport stream packet .
- Each transport packet has a header and a payload portion.
- the header of a transport packet contains, among other information, two transport scrambling control bits, which indicates the encryption (scrambling) status of the packet.
- the scrambling control bits are designated by the field
- transport_scrambling_control A scrambling control value of "00" indicate the transport packet is not scrambled, while the values "01", “10", and “11” can be user-defined.
- the value "11” is used herein as an example to designate a scrambled or encrypted transport packet .
- Any type of analogous scheme may be used to indicate the encryption status of a transport packet.
- the transport packet 130 includes a header 131, scrambling control bits 132 (which indicate an unencrypted transport packet), and a payload 133.
- the transport packet 140 includes a header 141, scrambling control bits 142 (which indicate an encrypted transport packet), and a payload 143.
- the transport packet 150 includes a header 151, scrambling control bits 152 (which indicate an unencrypted transport packet) , and a payload 153.
- Each transport packet is formed by subdividing the contents of successive portions of a PES packet.
- the payload 133 of the transport packet 130 comprises the PES header 116, picture header 118, and a portion of the picture data 119 of the PES payload 117.
- the payload 143 of the transport packet 140 comprises a successive portion of the picture data 119 of the PES payload 117.
- the payload 153 of the transport packet 150 comprises the picture header 120, and a portion of the picture data 121 of the PES payload 117, and so on.
- FIG. 1 is shown in simplified form since, in practice, the data from one picture is usually carried in the payloads of several transport packets . Moreover, the amount of picture data (e.g., fields 119, 121, 124) is often much larger than the amount of the corresponding picture header data (e.g., fields 118, 120, 123, respectively) . As a result, the majority of the transport packets will carry only picture data but no picture header data, thereby resulting in most transport packets being encrypted, with relatively few transport packets being unencrypted. Thus, an unauthorized user who tunes to the mostly-encrypted program will not be able to watch the program with appreciable understanding.
- the transport packets are assembled into a transport stream and transmitted to a user terminal (e.g., set-top box) typically via a satellite, cable or hybrid fiber/cable network, although communication via essentially any network, such as a computer network is also possible.
- a user terminal e.g., set-top box
- the transport stream may be provided to one or more headends before being provided to the user terminal .
- the data can be prepared at a central preparation site, such as by a national supplier, at a headend, or each content vendor can arrange for its own content preparation, e.g., according to any special needs of its equipment.
- a transport stream is a multiplex formed by interleaving transport packets belonging to one or more programs .
- FIG. 2 illustrates an encoder in accordance with the present invention.
- the encoder 200 comprises equipment for performing selective packet encryption.
- the depicted equipment may be located at a central content preparation site or at a headend, for example.
- the present invention overcomes the problem of locating picture start points caused by the use of pre- encryption. This is achieved, as discussed, by leaving selected (transport stream) packets unencrypted in a video file.
- the equipment set-up 200 to achieve this includes one or more digital video sources 210, a preprocessing workstation 215 for generating auxiliary data files and for labeling selected packets for encryption, an encryption device 220, an encryption device controller 205, an optional post-processing workstation 225 for processing encrypted video (e.g., to adjust timing information that may be perturbed by the encryption process) , and a storage device 230 for storing the processed data prior to providing it to a headend or end user.
- the digital video source 210 for generating auxiliary data files and for labeling selected packets for encryption
- an encryption device 220 for generating auxiliary data files and for labeling selected packets for encryption
- an encryption device controller 205 for processing encrypted video (e.g., to adjust timing information that may be perturbed by the encryption process)
- a storage device 230 for storing the processed data prior to providing it to a headend or end user.
- the digital video source e.g., the digital video source
- the 210 supplies the digital video stream to be encrypted.
- the video source may be a digital video encoder, or a file server playing back pre-encoded video files.
- the digital video stream is fed into the pre-processing workstation 215, whose main function is to identify and label transport packets for encryption.
- a packet is selected for encryption if it contains no picture header or portion thereof, and therefore need not be examined by the video server during motion control (trick modes) .
- Transport packets selected for encryption are labeled by having the transport scrambling control bits set to some special value (e.g., "11").
- Packets to be left unencrypted are similarly labeled, using a different special value (e.g. "00").
- the pre-processing step may optionally generate auxiliary data files used in the delivery of VOD services.
- Encryption of the pre-processed video stream is performed by the encryption device 220 under the control of the device controller 205, which is, in turn, responsive to encryption control parameters .
- Any suitable encryption scheme may be used.
- the encryption control parameters may include, e.g., information related to the program being encrypted, or the particular encryption session, or both.
- the encryption device 220 examines the transport scrambling control bits of each transport packet. Packets with those two bits set to, e.g., "00" are left unencrypted, while packets with the bits set to, e.g., "ii" are encrypted.
- the output of the encryption device 220 which comprises a selectively-encrypted video stream, is optionally put through a post-processing stage (e.g., workstation 225) before being stored in the storage device 230.
- Post-processing may or may not be needed depending on the design and implementation of the VOD service equipment.
- a video server scans the transport packets in a video file sequentially.
- the transport scrambling control bits in each transport packet headers indicate whether the packet is encrypted. If a packet is encrypted, it can be inferred that it contains no picture header. If a packet is unencrypted, the payload can be examined to locate the picture header.
- a video server can still read other kinds of information embedded in a pre-encrypted video file, such as private data in an adaptation field of a transport packet header .
- FIG. 3 illustrates a user device/decoder in accordance with the present invention.
- the program content can be temporarily stored at a user device/decoder prior to playing.
- the device may be a personal video recorder or other terminal or appliance in a user's home, or even a portable unit carried by the user or used in an automobile.
- a storage device containing the programming may be purchased or rented for subsequent re-play by the user. Under a purchase scenario, the user may enjoy unlimited replays, while under a rental scenario, a fixed number of replays or an expiration date may be enforced.
- the user may be given the option of storing the transport stream prior to playing.
- the user device/decoder 300 can be provided with the capability for providing motion control (e.g., trick modes) .
- the decoder 300 may include a demultiplexer (demux) 302 that receives a transport stream with the encrypted and unencrypted transport packets, such as those previously stored at the storage device 230 in FIG. 2, and optionally other programming services .
- a demultiplexer demux
- Other necessary components e.g., for demodulation, error correction, synchronization and the like are not shown, but should be apparent to those skilled in the art.
- the demux 302 extracts the encrypted and unencrypted packets that belong to a particular program.
- the extracted stream of packets either is stored in the memory 310, or is provided to a second demux 305, which separates the encrypted transport packets from the unencrypted transport packets.
- a second demux 305 which separates the encrypted transport packets from the unencrypted transport packets.
- an entire movie or the like may be stored in the memory 310 for subsequent retrieval and motion control.
- the memory 310 is analogous to the storage device 230 of FIG. 2.
- the demux 305 includes a scrambling control bit identifier/detector 306 that identifies the scrambling control bits of each transport packet to determine if the packet is encrypted or unencrypted.
- a control 335 such as a central processing unit (CPU) , provide oversight of the various functions in the decoder 300.
- CPU central processing unit
- a user interface 340 receives commands from a user, e.g., via a hand-held remote control, to view the content in a regular play mode or in a trick mode. In response to this request, the interface 340 provides a corresponding signal to the control 335, which commands the memory 310 to output the packets to the demux 305.
- a video/audio/data processing function 320 receives unencrypted packets from the decryptor 315 and demux 305. The data from the function 320 is provided to an output device 325, such as a television, personal computer, speakers, and so forth.
- the output device 325 may provide a graphical user interface (GUI) or other mechanism to assist the user in playing the programming content in a normal or trick mode.
- GUI graphical user interface
- An optional upstream transmitter 330 transmits a user request, such as an order for VOD programming, to a headend or other network control facility.
- the user request may travel over the same or different channel from which the transport stream was received.
- the present invention provides a system for providing conditional access to packetized picture, audio or other data.
- the system selectively encrypts packetized data such that transport packets that include header data are unencrypted, while all other transport packets that do not include header data are encrypted.
- This allows the transport packets with the header data to be randomly accessed from a memory, which is particularly advantageous for performing trick modes, such as fast forward and fast reverse, e.g., in a video on demand service.
- transport scrambling and control bits for each packet can be accessed to determine whether the packet is encrypted, and consequently, whether the packet includes header data.
- a packet includes header data, it is suitable for use in a trick mode since it provides data from the start of a video, audio or other data packet.
- the selectively encrypted transport packets need not be transmitted to a subscriber terminal, but may be provided in a storage device for subsequent retrieval by a user, such as in a personal video recorder (PVR) .
- PVR personal video recorder
Abstract
Description
Claims
Priority Applications (6)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020027014574A KR20020091254A (en) | 2000-05-02 | 2000-05-02 | Method and apparatus for enabling random access to individual pictures in an encrypted video stream |
CA002408232A CA2408232C (en) | 2000-05-02 | 2000-05-02 | Method and apparatus for enabling random access to individual pictures in an encrypted video stream |
CN00819492A CN1452840A (en) | 2000-05-02 | 2000-05-02 | Method and apparatus for enabling random access to individual pictures in encrypted video stream |
EP00930295A EP1275250A1 (en) | 2000-05-02 | 2000-05-02 | Method and apparatus for enabling random access to individual pictures in an encrypted video stream |
AU2000248144A AU2000248144A1 (en) | 2000-05-02 | 2000-05-02 | Method and apparatus for enabling random access to individual pictures in an encrypted video stream |
PCT/US2000/011891 WO2002015579A1 (en) | 2000-05-02 | 2000-05-02 | Method and apparatus for enabling random access to individual pictures in an encrypted video stream |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/US2000/011891 WO2002015579A1 (en) | 2000-05-02 | 2000-05-02 | Method and apparatus for enabling random access to individual pictures in an encrypted video stream |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2002015579A1 true WO2002015579A1 (en) | 2002-02-21 |
Family
ID=21741343
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2000/011891 WO2002015579A1 (en) | 2000-05-02 | 2000-05-02 | Method and apparatus for enabling random access to individual pictures in an encrypted video stream |
Country Status (6)
Country | Link |
---|---|
EP (1) | EP1275250A1 (en) |
KR (1) | KR20020091254A (en) |
CN (1) | CN1452840A (en) |
AU (1) | AU2000248144A1 (en) |
CA (1) | CA2408232C (en) |
WO (1) | WO2002015579A1 (en) |
Cited By (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2003105475A1 (en) * | 2002-06-07 | 2003-12-18 | General Instrument Corporation | Seamless switching between multiple pre-encrypted video files |
WO2004006559A2 (en) | 2002-07-09 | 2004-01-15 | Kaleidescape, Inc. | Secure presentation of encrypted digital content |
WO2004046937A1 (en) * | 2002-11-18 | 2004-06-03 | Netac Technology Co., Ltd. | A method of sending command and data to movable storage device |
FR2848372A1 (en) * | 2002-12-09 | 2004-06-11 | Medialive | Secure high quality TV screen picture transmission having digital stream read/generating position identifying server transmitting and server responding with complementary information following position |
WO2004057830A1 (en) * | 2002-12-20 | 2004-07-08 | Koninklijke Philips Electronics N.V. | Apparatus and method for processing streams |
EP1503590A2 (en) | 2003-07-31 | 2005-02-02 | Sony United Kingdom Limited | Access control for digital video stream data |
EP1616401A2 (en) * | 2003-04-21 | 2006-01-18 | RGB Networks, Inc. | Time-multiplexed multi-program encryption system |
WO2006024233A1 (en) | 2004-09-01 | 2006-03-09 | Huawei Technologies Co., Ltd. | Method for protecting broadband video and audio broadcast content |
WO2006034464A1 (en) * | 2004-09-23 | 2006-03-30 | Thomson Licensing | Inserting metadata for trick play in video transport stream |
GB2396989B (en) * | 2001-09-22 | 2006-04-12 | Intel Corp | Method and apparatus for content protection |
EP1684183A1 (en) * | 2003-11-13 | 2006-07-26 | Matsushita Electric Industrial Co., Ltd. | Content distribution system, content server, content receiving apparatus, content distribution method, program and recording medium |
WO2007002340A2 (en) | 2005-06-23 | 2007-01-04 | Panasonic Avionics Corporation | System and method for providing searchable data transport stream encryption |
US7646867B2 (en) * | 2005-09-09 | 2010-01-12 | Netapp, Inc. | System and/or method for encrypting data |
WO2010065320A2 (en) | 2008-11-25 | 2010-06-10 | Cisco Technology, Inc. | Accelerating channel change time with external picture property markings |
CN101453653B (en) * | 2007-12-07 | 2011-01-05 | 中兴通讯股份有限公司 | Method for spreading digital audio and video parameter set |
US7929698B2 (en) | 2007-06-15 | 2011-04-19 | Sony Corporation | Selective encryption to enable trick play with enhanced security |
WO2012027535A2 (en) * | 2010-08-25 | 2012-03-01 | General Instrument Corporation | Transport of partially encrypted media |
US9118941B2 (en) | 2002-02-22 | 2015-08-25 | Cisco Technology Inc. | Scrambled packet stream processing |
EP3013059A4 (en) * | 2013-06-21 | 2017-03-22 | Sony Corporation | Transmission apparatus, transmission method, reproduction apparatus, reproduction method and reception apparatus |
Families Citing this family (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7343013B2 (en) * | 2003-12-16 | 2008-03-11 | Sony Corporation | Composite session-based encryption of video on demand content |
KR101244308B1 (en) * | 2003-12-08 | 2013-03-18 | 삼성전자주식회사 | Encoding Method for moving picture file and the Digital right management using the same |
CN100505866C (en) * | 2004-10-28 | 2009-06-24 | 武汉大学 | A video information encrypting-decrypting method |
CN101079871B (en) * | 2006-09-29 | 2011-05-11 | 腾讯科技(深圳)有限公司 | Transparent transfer method and system of multimedia information stream |
CN102112958A (en) | 2008-05-29 | 2011-06-29 | 惠普开发有限公司 | Replaceable printer component including a memory storing a tag encryption mask |
CN101783789B (en) * | 2009-01-16 | 2013-01-02 | 深圳市维信联合科技有限公司 | Method, device and system for transmitting and processing network packet |
KR101362429B1 (en) * | 2011-07-25 | 2014-02-13 | 주식회사 케이티 | System and method for measuring quality of image contents |
CN102867153B (en) | 2012-08-30 | 2014-04-09 | 腾讯科技(深圳)有限公司 | Methods and devices for encrypting and decrypting video file and mobile terminal |
CN103886106B (en) * | 2014-04-14 | 2017-02-22 | 北京工业大学 | Remote sensing image safe-retrieval method based on spectral feature protection |
CN104581201A (en) * | 2014-12-31 | 2015-04-29 | 乐视网信息技术(北京)股份有限公司 | Video encryption method and device |
CN104639943B (en) * | 2015-01-30 | 2018-02-13 | 中国科学院信息工程研究所 | A kind of generic video encryption method and system based on H.264 coding standard |
CN109561345B (en) * | 2018-12-14 | 2021-08-03 | 上海文广科技(集团)有限公司 | Digital movie packaging method based on AVS + coding format |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0674441A1 (en) * | 1994-03-21 | 1995-09-27 | NOKIA TECHNOLOGY GmbH | A method for scrambling a digitally transmitted television signal |
EP0714204A2 (en) * | 1994-11-26 | 1996-05-29 | Lg Electronics Inc. | Illegal view and copy protection method in digital video system and controlling method thereof |
WO1999037072A2 (en) * | 1998-01-15 | 1999-07-22 | Apple Computer, Inc. | Method and apparatus for media data transmission |
EP0964578A2 (en) * | 1995-07-14 | 1999-12-15 | Oracle Corporation | Method and apparatus for frame accurate access of digital audio-visual information |
-
2000
- 2000-05-02 CA CA002408232A patent/CA2408232C/en not_active Expired - Fee Related
- 2000-05-02 KR KR1020027014574A patent/KR20020091254A/en not_active Application Discontinuation
- 2000-05-02 AU AU2000248144A patent/AU2000248144A1/en not_active Abandoned
- 2000-05-02 WO PCT/US2000/011891 patent/WO2002015579A1/en not_active Application Discontinuation
- 2000-05-02 EP EP00930295A patent/EP1275250A1/en not_active Withdrawn
- 2000-05-02 CN CN00819492A patent/CN1452840A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0674441A1 (en) * | 1994-03-21 | 1995-09-27 | NOKIA TECHNOLOGY GmbH | A method for scrambling a digitally transmitted television signal |
EP0714204A2 (en) * | 1994-11-26 | 1996-05-29 | Lg Electronics Inc. | Illegal view and copy protection method in digital video system and controlling method thereof |
EP0964578A2 (en) * | 1995-07-14 | 1999-12-15 | Oracle Corporation | Method and apparatus for frame accurate access of digital audio-visual information |
WO1999037072A2 (en) * | 1998-01-15 | 1999-07-22 | Apple Computer, Inc. | Method and apparatus for media data transmission |
Cited By (46)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7111169B2 (en) | 2001-03-29 | 2006-09-19 | Intel Corporation | Method and apparatus for content protection across a source-to-destination interface |
GB2396989B (en) * | 2001-09-22 | 2006-04-12 | Intel Corp | Method and apparatus for content protection |
US9118941B2 (en) | 2002-02-22 | 2015-08-25 | Cisco Technology Inc. | Scrambled packet stream processing |
WO2003105475A1 (en) * | 2002-06-07 | 2003-12-18 | General Instrument Corporation | Seamless switching between multiple pre-encrypted video files |
US7317797B2 (en) | 2002-06-07 | 2008-01-08 | General Instrument Corporation | Seamless switching between multiple pre-encrypted video files |
US7609836B2 (en) * | 2002-06-07 | 2009-10-27 | General Instrument Corporation | Seamless switching between multiple pre-encrypted video files |
WO2004006559A2 (en) | 2002-07-09 | 2004-01-15 | Kaleidescape, Inc. | Secure presentation of encrypted digital content |
EP1523822A4 (en) * | 2002-07-09 | 2011-08-31 | Kaleidescape Inc | Secure presentation of encrypted digital content |
EP1523822A2 (en) * | 2002-07-09 | 2005-04-20 | Kaleidescape, Inc. | Secure presentation of encrypted digital content |
WO2004046937A1 (en) * | 2002-11-18 | 2004-06-03 | Netac Technology Co., Ltd. | A method of sending command and data to movable storage device |
US7864759B2 (en) * | 2002-12-09 | 2011-01-04 | Nagra France | Synchronization of secured audiovisual streams |
WO2004056114A1 (en) * | 2002-12-09 | 2004-07-01 | Medialive | Synchronisation of secure audiovisual streams |
FR2848372A1 (en) * | 2002-12-09 | 2004-06-11 | Medialive | Secure high quality TV screen picture transmission having digital stream read/generating position identifying server transmitting and server responding with complementary information following position |
WO2004057830A1 (en) * | 2002-12-20 | 2004-07-08 | Koninklijke Philips Electronics N.V. | Apparatus and method for processing streams |
EP1616401A4 (en) * | 2003-04-21 | 2012-01-04 | Rgb Networks Inc | Time-multiplexed multi-program encryption system |
EP1616401A2 (en) * | 2003-04-21 | 2006-01-18 | RGB Networks, Inc. | Time-multiplexed multi-program encryption system |
EP1503590A2 (en) | 2003-07-31 | 2005-02-02 | Sony United Kingdom Limited | Access control for digital video stream data |
GB2404467A (en) * | 2003-07-31 | 2005-02-02 | Sony Uk Ltd | Access control for digital content |
CN100358354C (en) * | 2003-07-31 | 2007-12-26 | 索尼英国有限公司 | Access control for digital video stream data |
JP2005124147A (en) * | 2003-07-31 | 2005-05-12 | Sony United Kingdom Ltd | Access control for digital video stream |
US7478238B2 (en) | 2003-07-31 | 2009-01-13 | Sony United Kingdom Limited | Access control for digital video stream data |
EP1503590A3 (en) * | 2003-07-31 | 2010-04-28 | Sony United Kingdom Limited | Access control for digital video stream data |
EP1684183A1 (en) * | 2003-11-13 | 2006-07-26 | Matsushita Electric Industrial Co., Ltd. | Content distribution system, content server, content receiving apparatus, content distribution method, program and recording medium |
EP1684183A4 (en) * | 2003-11-13 | 2010-08-25 | Panasonic Corp | Content distribution system, content server, content receiving apparatus, content distribution method, program and recording medium |
WO2006024233A1 (en) | 2004-09-01 | 2006-03-09 | Huawei Technologies Co., Ltd. | Method for protecting broadband video and audio broadcast content |
EP1802119A4 (en) * | 2004-09-01 | 2009-10-21 | Huawei Tech Co Ltd | Method for protecting broadband video and audio broadcast content |
EP1802119A1 (en) * | 2004-09-01 | 2007-06-27 | Huawei Technologies Co., Ltd. | Method for protecting broadband video and audio broadcast content |
US7996871B2 (en) | 2004-09-23 | 2011-08-09 | Thomson Licensing | Method and apparatus for using metadata for trick play mode |
WO2006034464A1 (en) * | 2004-09-23 | 2006-03-30 | Thomson Licensing | Inserting metadata for trick play in video transport stream |
WO2007002340A3 (en) * | 2005-06-23 | 2007-07-26 | Panasonic Avionics Corp | System and method for providing searchable data transport stream encryption |
WO2007002340A2 (en) | 2005-06-23 | 2007-01-04 | Panasonic Avionics Corporation | System and method for providing searchable data transport stream encryption |
US7991997B2 (en) | 2005-06-23 | 2011-08-02 | Panasonic Avionics Corporation | System and method for providing searchable data transport stream encryption |
JP2008547325A (en) * | 2005-06-23 | 2008-12-25 | パナソニック・アビオニクス・コーポレイション | System and method for providing searchable data transmission stream encryption |
US7646867B2 (en) * | 2005-09-09 | 2010-01-12 | Netapp, Inc. | System and/or method for encrypting data |
US7929698B2 (en) | 2007-06-15 | 2011-04-19 | Sony Corporation | Selective encryption to enable trick play with enhanced security |
CN101453653B (en) * | 2007-12-07 | 2011-01-05 | 中兴通讯股份有限公司 | Method for spreading digital audio and video parameter set |
WO2010065320A2 (en) | 2008-11-25 | 2010-06-10 | Cisco Technology, Inc. | Accelerating channel change time with external picture property markings |
CN102326403A (en) * | 2008-11-25 | 2012-01-18 | 思科技术公司 | Accelerating channel change time with external picture property markings |
WO2010065320A3 (en) * | 2008-11-25 | 2010-09-30 | Cisco Technology, Inc. | Accelerating channel change time with external picture property markings |
CN102326403B (en) * | 2008-11-25 | 2015-09-09 | 思科技术公司 | Utilize exterior artwork attribute flags to carry out accelerating channel and change the time |
WO2012027535A2 (en) * | 2010-08-25 | 2012-03-01 | General Instrument Corporation | Transport of partially encrypted media |
WO2012027535A3 (en) * | 2010-08-25 | 2012-04-19 | General Instrument Corporation | Transport of partially encrypted media |
US8630412B2 (en) | 2010-08-25 | 2014-01-14 | Motorola Mobility Llc | Transport of partially encrypted media |
US9078015B2 (en) | 2010-08-25 | 2015-07-07 | Cable Television Laboratories, Inc. | Transport of partially encrypted media |
EP3013059A4 (en) * | 2013-06-21 | 2017-03-22 | Sony Corporation | Transmission apparatus, transmission method, reproduction apparatus, reproduction method and reception apparatus |
US10104406B2 (en) | 2013-06-21 | 2018-10-16 | Saturn Licensing Llc | Transmission apparatus, transmission method, reproduction apparatus, reproduction method and reception apparatus |
Also Published As
Publication number | Publication date |
---|---|
CN1452840A (en) | 2003-10-29 |
CA2408232A1 (en) | 2002-02-21 |
KR20020091254A (en) | 2002-12-05 |
AU2000248144A1 (en) | 2002-02-25 |
CA2408232C (en) | 2008-01-15 |
EP1275250A1 (en) | 2003-01-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CA2408232C (en) | Method and apparatus for enabling random access to individual pictures in an encrypted video stream | |
US7203311B1 (en) | Super encrypted storage and retrieval of media programs in a hard-paired receiver and storage device | |
JP4782015B2 (en) | Batch-mode session-based encryption of video-on-demand content | |
EP1680919B1 (en) | Preparation of content for multiple conditional access methods in video on demand | |
US7804958B2 (en) | Super encrypted storage and retrieval of media programs with smartcard generated keys | |
JP4861258B2 (en) | Method and apparatus for encrypting media programs for later purchase and viewing | |
US7676039B2 (en) | Apparatus for controlling storage and playback of digital broadcasting contents | |
JP3853180B2 (en) | Video-on-demand pay-per-view service with unmodified conditional access functionality | |
JP4694499B2 (en) | Dynamic composition of pre-encrypted video-on-demand content | |
US7333610B2 (en) | System and method for pre-encryption of transmitted content | |
US8782438B2 (en) | Secure storage and replay of media programs using a hard-paired receiver and storage device | |
KR101085989B1 (en) | Composite session-based encryption of video on demand content | |
US20040049690A1 (en) | Selective encryption to enable trick play | |
WO2000003541A1 (en) | Data multiplexer, program distribution system, program transmission system, toll broadcast system, program transmission method, limited receiving system, and data receiver | |
JP2007510360A (en) | Hybrid storage of video on demand content | |
KR20000016059A (en) | An adaptive decoding system for processing encrypted and non-encrypted video data |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY CA CH CN CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): GH GM KE LS MW SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG |
|
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 2000930295 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1020027014574 Country of ref document: KR |
|
WWE | Wipo information: entry into national phase |
Ref document number: 008194920 Country of ref document: CN Ref document number: 2408232 Country of ref document: CA |
|
WWP | Wipo information: published in national office |
Ref document number: 1020027014574 Country of ref document: KR |
|
WWP | Wipo information: published in national office |
Ref document number: 2000930295 Country of ref document: EP |
|
NENP | Non-entry into the national phase |
Ref country code: JP |
|
WWW | Wipo information: withdrawn in national office |
Ref document number: 1020027014574 Country of ref document: KR |
|
WWW | Wipo information: withdrawn in national office |
Ref document number: 2000930295 Country of ref document: EP |