|
|
Invention relates to computer engineering. A decoding device for decoding encoded audio/video content, comprising a decoder and a security module, having an internal setting and realises the following operations: obtaining at least a first set of at least two control words; selecting one of at least said two control words based on at least a first part of the internal setting; transmitting the selected control word to the decoder, obtaining an additional set of at least two control words; additional selection of one of at least two control words of the additional set based on at least a second part of the internal setting; and transmitting the additional selected control word to the decoder; wherein decoder comprises at least a decoding module for decoding the encoded audio/video content, and means of realising at least a first cryptographic function (H), which convert the selected control word to a first final control word and converts the additionally selected control word to an additional final control word, the decoder also comprises means of decoding at least part of the encoded audio/video content using the final control word and at least the additional part of the encoded audio/video content using the additional final control word. |
|
Method of controlling decoders of at least one group of decoders having access to audiovisual data Invention relates to a broadcast encryption method. The technical result is achieved through a method of controlling decoders of at least one group of decoders, having access to audiovisual data, wherein the method comprises the following steps: at a step when the decoder should become a member of a group: obtaining and storing keys relating to a certain position in the group according to the broadcast encryption scheme; obtaining and storing current group access data containing at least the current group access key which is common for said group at the step of accessing the audiovisual data: using the current group access data for direct or indirect access to audiovisual data, at the step of updating the current group access key: transmitting a first group message containing at least the next group access data containing at least the next group access key encrypted such that only uncancelled decoders can gain access thereto, wherein said group message is further encrypted by the current group access key (CGK); updating the current group access key using the next group access key. |
|
Method and system for secure transmission of audiovisual content Invention relates to computer engineering. The invention can be implemented in a conditional access content broadcast system where it is desirable to identify and take measures against receiving equipment, applied when sharing control words. Owing to the requirement that receiving equipment used in the system transmits to a transmission station a conditional access content message at a precisely defined time, the invention provides a method through which a server identifies receiving equipment participating in the sharing of control words and prevents said receiver from further accessing said content. |
|
Security method, decoding method, data medium and terminal for security method Method of securing transmission of multimedia content or a control word between a security processor and a terminal comprises steps of pre-recording multiple secret codes C i − 1 into a terminal, each secret code C i − 1 enabling to decode the multimedia content or control word encoded by a corresponding session key SKi, obtained by encoding a SK_root key using a parameter Pi, wherein one of the parameters Pi is a parameter Pc; the terminal receives (122) the parameter Pc in a message, also containing multimedia content or a control word to be decoded by the security processor, and from the set of recorded secret codes, a secret code C c − 1 is selected (132) to be used as a function of the parameter Pc or another parameter contained in the same message. |
|
Invention relates to a device and method for secure transmission to various personal user devices of recorded copies of a multicast audiovisual program and legal use of the recoded audiovisual program being guaranteed by an innovative approach using data scrambling and marking techniques. The technical result is achieved by an apparatus and a method which includes the following steps: calculating a first mark as a function of a unique identifier of a receiving user device or an external secure device; calculating on said receiving user device a first marked audiovisual stream from said secure stream as a function of said first mark and the said complementary stream; transmitting said secure stream from said receiving device to a second device; calculating a second mark as a function of a unique identifier of a second device, an external secure device or a user using said second device; calculating on the said second user device a second marked audiovisual stream from said secure stream received from said receiving device as a function of the second mark. |
|
Rating message content for content management in wireless devices Invention relates to content management in wireless communication networks. The technical result is achieved due to that a content provider can determine content rating, and/or a core network and/or a mobile device can determine or infer content rating without an assigned rating from a content provider based in part on predetermined content rating criteria. A mobile device user can indicate rating settings of the desired content for the mobile device. A filter associated with the core network and/or mobile device can filter content based in part on the content rating and content rating settings of the mobile device to which the content is sent. Content that does not satisfy a content rating threshold can be filtered out and stored in a folder with protected content accessible via a security code or is discarded. |
|
Method of protecting security data transmitted by transmitter device to receiver device Invention relates to a method of protecting security data transmitted by a transmitter to a receiver, the method comprising periodic transmission to a receiver, alternately with said security data, of neutral data intended to prevent security data filtering. |
|
System for capture and selective playback of broadcast programmes Invention relates to television, particularly for capture and selective playback of broadcast programmes. An apparatus for storing broadcast programmes for future transmission to subscribers comprises means for receiving a broadcast channel data stream which comprises a plurality of sequential programmes and a data storage means, wherein video and audio data relating to each programme are extracted from a received broadcast channel data stream and stored on the data storage means at a known position, wherein service information relating to each programme is extracted from the data stream and stored at a known position on the data storage means with data identifying the position on the storage means at which the video and audio data for the programme are stored. |
|
Method of controlling access to set of channels for receiving or decoding device (versions) Invention relates to computer engineering. A method of controlling access to a set of channels using a receiver/decoder comprising a security module (SC), each channel being encrypted by a specific channel control word (CW1, CW2), each channel having a channel identifier and transmitting access control messages ECM containing at least the current channel control word and the channel access conditions. The method comprises the following steps: tuning to a first channel having a first channel identifier (ID1); transmitting the ID1 to the SC; receiving first access control messages ECM1 containing a first control word (CW1); transmitting the first access control messages ECM1 to the SC; decrypting the first access control messages ECM1 and verifying the channel access conditions; if the access conditions are met; transmitting the CW1 to the receiver/decoder; storing of the CW1 and the ID1 in the SC; tuning to a second channel having a second channel identifier ID2; transmitting the ID2 to the SC; calculating, by the SC, the second control word (CW2) by performing the following steps: calculating a root control word (RK) with an inverse cryptographic function F-1 using the CW1 and the ID1; calculating the CW2 with the cryptographic function F using the RK and the ID2; transmitting the CW2 to the receiver/decoder. |
|
Method of enforcing rules for accessing broadcast product realised by control centre Invention relates to broadcast encryption and specifically to a method of managing authorisation rules in a data broadcasting system. Disclosed is a method of enforcing rules for accessing a broadcast product, received by receivers, which is realised by a control centre. Access is provided by a product key and the management centre manages a set of Boolean positive and negative attributes at receivers, which comprises steps of: associating one positive Boolean attribute with a receiver entitled to the attribute and loading a state therein; associating one negative Boolean attribute with a receiver not entitled to the attribute and loading a state therein; defining a second broadcast encryption scheme for the negative Boolean attributes and associating with each negative Boolean attribute corresponding decryption key material; expressing access conditions for a product as a Boolean expression by combining one positive Boolean attribute and one negative Boolean attribute by Boolean conjunction or disjunction; generating a cryptogram for transmission to a receiver by encrypting the access key with the two combined broadcast encryption schemes according to said Boolean expression. |
|
Invention discloses systems and methods of generating multi-level filtering information, that are applicable to multiple messages. For a first filtering level, a set of filtering values is formed as a combination of all filtering values for filtering criteria which belong to a set of intersection of filtering criteria. On the receiver side, the overall transport entity first undergoes filtering based on second-level filtering information. First-level filtering information can be separated from the transport entity; if the transport entity is not discarded after first-level filtering, second-level filtering information, the obtaining of which requires processing the transport entity, is used to extract messages from a packet. |
|
Conventional access system for digital television and method for its use System includes identification unit, conventional frontend access system unit and receiving device, in which identification unit is bi-directionally connected to receiving device, identifies receiving device, generates unique ID of receiver and identification information, and records the corresponding information in data base; conventional frontend access unit is bi-directionally connected to this data base, reads the information about the receiver from data base for coding the control information about receiver identification, and transmits the information to receiving device in relevant addressing mode; conventional frontend access unit switches on the relevant generator of identification information; receiving device uses ID and identification information for provision of safe conventional access to scrambling programs. |
|
Programmable multimedia controller with programmable functions Disclosed is an integrated system which is based on a general purpose computer and is capable of interfacing with, controlling or managing a wide variety of audio, video, communication, data transmission or other devices. The system includes a programming environment for creating functions or user experiences that may incorporate features or functionalities of several devices that are conventionally used as separate, standalone devices. |
|
Method of multimedia data protection Method of data transmission to client computer executing client program includes following steps: a) data transmission to client program, b) transmission of program code containing algorithm from protection server to client program where algorithm result is function of client program status, c) executing the mentioned code by client program and returning result to protection server and facilities connected with protection server, and d) determination by protection server or facilities connected with protection server whether the obtained result indicates absence of client program modification. |
|
Device for processing data elements which can be reproduced to user Device (DVR) is processing data elements which can be reproduced for user. Example of such device is digital videorecorder. The device (DVR) contains network interface (NWIC, NWIM) which connects the device (DVR) to network which contains other devices. Content analysis initiator (ECF) in the device (DVR) detects that other device comprising part of network contains content analyser. Content analysis initiator (ECF) applies content analyser (AVCA) of other device to data element (AVF). |
|
Disclosed is a content download system comprises: a content supplying device, a content receiving device, a download apparatus designed to download encrypted content and playing control data necessary for playing said content from said content supplying device according to user operations; obtaining apparatus to confirm the existence of a license which includes a key for decrypting said encrypted content based on said playing control data when playing said downloaded content, and to obtain said license according to the confirmation result; and playing apparatus to play said encrypted content using said obtained license. Playing control metafile describes <content_title>, <drm_server_uri>, <license_id>, <license_type>, <license_description>, <user_confirmation>, <user_messsage>, and <price>. In the case when multiple licenses are set for a single content, the items <license_id> through <price> describe only the number of set licenses. |
|
Method of a conversion system operation to manage digital rights to grant a license to a client's device corresponding to coded content consists in the following. The first content of the first type of digital rights content and the first license corresponding to the first content are converted to manage digital rights in order to generate the second content of the second type of digital rights content and the second license corresponding to the second content. A license request is received, corresponding to the second content distributed by means of superdistribution to a third party. The second license corresponding to the second content distributed by means of superdistribution is requested from a server corresponding to the second management of digital rights. The second license corresponding to the second content distributed by means of superdistribution is received and sent to a third party. |
|
Invention proposes a method for processing a transport stream (TS) received as an input TS in a processing device (SDR), the transport stream comprising a plurality of elementary streams (ES), each ES being a set of TS packets having the same Packet IDentifier (PID), at least one of these ES being time-sliced so as to be sent in bursts, timing information indicating within a burst the time to the beginning of the next burst, applying a filtering operation to the input TS so as to filter out from the input TS part or all of one or more time- sliced ES; modifying the bursts scheduling of the input transport stream so as to generate a DVB-H compliant output TS from the filtered input TS. |
|
Controlled communication system First user can support one or more content "portals", which can be accessed by at least a subset of members of an online community. Access to content of any portal can be based on the level of confidentiality of the portal and the level of confidentiality, for example, access parametres provided to a person. The level of confidentiality and linking the content can be hierarchical and/or non-overlapping. That way, a user can transparently exchange data with several uses simultaneously independent of their context or level of confidentiality while preserving the confidentiality boundaries of each portal. |
|
Method and system for provision of conditional access to data in broadcast system of mhp or ocap Request of subscription is created from viewer, in order to realise access to additional paid content, parametre of viewer identification is formed in receiver in response to request of viewer subscription, parametre of viewer identification is saved in receiver, parametre of viewer identification is sent, as well as request of viewer subscription from receiver to broadcasting station along feedback channel, viewer access is authorised to additional paid content, parametre of viewer identification is sent, which has been received at the stage, from broadcast station in transport DVB-stream substantially to all receivers in broadcasting system, a transport DVB-stream is received in receiver, and requested additional paid content is unlocked from transmitted transport DVB-stream in receiver with use of transmitted parametre of user identification and stored parametre of viewer identification. |
|
Method and device to control access to coded data Method includes the following stages: receipt of the first control message (ECM1), containing at least one control word (CW) and time score (TS); receipt of the second control message (ECM2), following the first control message (ECM1), besides, the second control message contains at least one control word (CW) and time score (TS); detection of duration of time period, corresponding to difference between time scores (TS) of two serial messages ECM1, ECM2; increasing counter of errors (CE) in case specified duration of time period is less than previously set duration (CP); reducing counter of errors (CE) in case specified duration of time period equals or exceeds specified previously set duration; return of control word (CW) into module of processing (STB) as waiting time expires, which depends on value of counter of errors (CE). |
|
Method to control access to coded data Invention relates to method of control of access to data (CT) coded by means of control words (CW) received by protection module in control messages (ECM) and returned to module of coded data processing. Control messages (ECM) contain at least the first control word (CW1) and the second control word (CW2), at the same time each of specified control words provides access to coded data (CT) during the specified period of time called cryptoperiod (CP). Method includes the following actions: transfer of coded data into at least one module of processing; and transfer of control messages (ECM) into specified processing module, besides, control messages (ECM) contain at least two specified control words (CW1, CW2) and are sent to processing module after transfer of data coded by means of the first control word (CW1) and prior to transfer of data coded by means of the second control word (CW2), time shift between transfer into module of processing of data coded by means of the first control word (CW1) and transfer of control message (ECM), containing the first control word (CW1) and the second control word (CW2), makes more than 75% of cryptoperiod. |
|
Device (3400) for processing of coded data flow (3401), comprising a decoding module (3402) to generate decoded data flow (3403) from coded data flow (3401), detection module (3404) for detection of information on position of at least one intra-coded frame in coded data flow (3403) and substitution module (3405) for substitution on the basis of detected information on position of coded data flow (3401) parts with according parts of decoded data flow (3403). |
|
Invention discloses a method for scheduled switching of reception between multimedia programs. For continued decoding, the wireless communication device continues to receive, decode, decompress and (optionally) visually display the current program even after a new program has been selected until privileged information has been received, which is required for decoding the new program. After receiving privileged information, the wireless communication device decodes the new program, but continues to decompress the current program. |
|
Method of creating integrated news channel Metadata which classify new bulletins as a whole and their separate subject matter are formed; said metadata are sent to a user terminal. Received metadata are recorded into memory which may or may not be integrated into the user terminal. Recorded metadata are compared with previously recorded news bulletins and their subject matter; based on said comparison, recorded news bulletins are divided into video files of news items; obtained video files are recorded into memory. A database of news items is created with possibility of further browsing in an audio-visual information display device. In order to provide the proper accuracy of dividing recorded news bulletins into video files of news items, the timing device of the user terminal is periodically corrected using standard time signals. |
|
Device and method of subscribing for opening and closure of packets Invention relates to content distribution systems and specifically to a device and methods of subscribing for opening and closure of packets. The technical result is achieved due to that program package information containing attributes of the channel package for presenting multimedia information is provides. Further, the subscription characteristic which determines possibility of subscription for a package and presentation of the program package information on the device is determined. The device can compare the subscription characteristic with information on subscription relating to the device. Subscription is permitted and/or program package information is presented on the device based on predefined dependency between the subscription characteristic and subscription information of the device. |
|
Broadband access device and method for providing video service Invention relates to communication. Present invention provides a broadband access device and a method for providing a video service, where the broadband access device includes a video service component which transmits stored video service data through an access component of the broadband access device to a user terminal in accordance with a request from the user terminal. In accordance with embodiments of this invention, video service requirements to the frequency band of the access network and convergence network are reduced and bandwidth restrictions between a highway network and a convergence network are avoided. The mechanism of managing access network and convergence network resources is simplified and management of access network resources is also simplified. |
|
Invention relates to an information processing device, an information recording medium and a method of processing information. Several content administration modules, which correspond to a name, index and some other information, are installed by dividing into parts content stored on an information recording medium. Different module keys, which are encryption keys, are allocated for different content administration modules. At least content data arriving in real time, included in each content administration module, are encrypted using the module key, and the encrypted data are stored. When playing back content, modules are identified, and decryption for playing back is carried out using the module key which corresponds to each module. |
|
Checking method of certificate validity, which includes the key connected to network devices, involves the step of receiving the encoded content and validity index connected to that content in the network. Certificate validity is evaluated from the time index included in the certificate where the time index has the value corresponding to the certificate issuing date, and from validity index connected to the above encoded content. |
|
Method of authorisation duration management in security module Invention concerns security modules actuated at device receiving encoded digital data; claimed method is particularly intended for transfer of data on date and current time to security module, and for decoding authorisation management based on validity period for data received or stored by indicated device. Method of authorisation duration control in security module installed in device with internal clock, where the device received digital data flow encoded with reference words included in authorisation reference messages, involves the following stages: data from internal device clock, including information on current time, are receiver over security module; information on current time is stored in security module; authorisation reference message requiring decoding of at least on reference word is received over security module; information on previous time when previous authorisation reference message was processed is read; authorisation reference message is processed if time indicated in current time information is ahead of time indicated in previous time information. |
|
Method of verifying identity of subscriber terminal Present invention pertains to digital television (DTV), especially to the method of verifying identity of a subscriber terminal in a DTV network. The method of carrying out authentication procedure of at least one subscriber terminal comprises the following stages: reading out, using a set-top box (STB) at the subscriber terminal, the period of validity of the key and key information, stored in the subscriber identification module at the subscriber terminal when the set-top box is launched; initiation, using the STB, of sending a request for authentication to a central station, if the period of validity of the key has expired, and authentication by the central station, in accordance with the authentication request; determination by the central station of whether authentication has been successful, and if successful, sending a corresponding reply message, containing new key information, and a reply message on failure of authentication if otherwise; updating, through the STB, key information when a reply message on successful authentication has been received. |
|
Invention can be used in system of the forced performance of requirements which provides access possibility to the enciphered digital content on a computing mechanism only according to parametres the certain rights of the license got by the user of digital contents. The first confidential builder on the first computing mechanism carries out cryptographic, an estimate and the forced performance of requirements and forcedly contacts it, the first certificate of the user device corresponding to the first computing mechanism, forcedly contacts the user. Accordingly, the second confidential builder on the second computing mechanism carries out cryptographic processing, an estimate and the forced performance of requirements and forcedly contacts it, the second certificate of the user device corresponding to the second computing mechanism, also forcefully contacts the user. The first competent builder gains contents for reproduction on the first computing mechanism by means of the first certificate of the user device and the license, and the second confidential builder gains contents for reproduction on the second computing mechanism by means of the second certificate of the user device and the same license. |
|
Method of program traffic set decoding control, receiving system and portable protector Invention refers to method of control of decoding of program traffic set received by receiving system. Method of control of decoding of program traffic set received by receiving system implying that sequence of messages is received in conventional access subsystem (9, 10) comprising the specified receiving system, and each message is associated with one of coded program traffic set and represents information return enabling decoding of associated coded traffic by at least one decoding module (12) within receiving system. It is detected whether messages received within certain interval are associated with various coded program traffic set, and at least one of requests presented by messages received within certain interval is rejected, if number of various coded program traffics with which these messages are associated, exceeds preset value. |
|
Method of storage and protection of data generated by protection module Invention is related to the field of data transmission in the network of devices that are connected to broadcasting center and do not have constant feedback channel. Method of storage and transmission of information generated by the first protection module, which is connected to abonent device, at that the first protection module contains unique identifier and information that describes its functioning, includes the following stages: specified information contained in the first protection module and intended for transmission is determined; specified information is sent to abonent device; specified information is stored in abonent device; the first protection module is replaced with the second protection module; abonent device is connected to communication network; communication is initialised between the second protection module and control center; data unit is added into data units sent by the second protection module, at that addition is carried out with abonent device, and specified added unit of data contains unique identifier and specified information contained in the first protection module. |
|
Digital signatures for digital television applications Invention concerns additional or interactive television content security, particularly subscribing to additional or interactive TV content. Method of signing additional TV content application in the form of a file set with program code and associated objects involves the following stages: identification of at least the first part (2201-220M, 2201-220V) of files in at least one file cluster (2141-214N); cluster signature (2111, 211N) calculation for each cluster; creation of security data resource file (100), which includes signature location description (120, 120A). |
|
Decoder and subscription television data control system proposed contain at least two decoders, each of those is connected to at least one removable protective module. The protection is realised using identification data, contained in the decoder and protective module indicated. Besides, each of the decoders contains a descrambler and subscription television data processing deactivation units. Each decoder also contains a counter, which influences the deactivation units mentioned. Besides, at least one of the removable protective modules is assigned as primary and therefore contains decoder counter reinitialisation units. |
|
Conditional access data decryption system System contains an encrypted data broadcasting centre, at least one control centre, a terminal device, a decoder located between the encrypted data broadcasting centre and the terminal device, the decoder includes an encrypted data reception and decryption module and a data access authority control module; the data access authority control module contains a protection module. |
|
Method, system and device for distribution of audiovisual information and verification of viewing Method of distribution contains storage of multiple audiovisual information content in data base; creation of reproduction schedule for display unit; and representation of specified multiple audiovisual information content in accordance with specified reproduction schedule, at that display unit provides assembly of data set on environment, and alteration of specified schedule of reproduction is performed in response to specified set of data on environment. The method of representation consists of the following: representation of audiovisual information element in the first state; receipt of triggering event; and representation of audiovisual information element in the second state on the basis of specified event receipt. |
|
Advanced transfer of associate identifiers of content (crid) tv-anytime Method provides for multiplexing of picture and audio information components, associate identifier of content and semantic data package containing data of relation between picture information and associate content identifier. System for audio/picture information reception and system for audio/picture information transfer are identified. |
|
System for capture and selective reproduction of broadcasting programs Invention is related to systems for capture and selective reproduction of broadcasting programs. Creation of system and method that present a wide choice of archiving and viewing options to spectators, and which provide observance of rules and limitations that are imposed by providers of broadcasting content, which is achieved at the account of the fact that device of broadcasting programs storage for further transmission to subscribers, contains facility for acceptance of data stream of broadcasting channels, which contain multiple subsequent programs, and facility for data storage, moreover, video and audio data that are related to every program, are separated from accepted data stream on broadcasting channel and are stored in data storage facility in known position, at that official information that is related to every program, is separated from data stream and stored in known position in data storage facility with data, which identifies position in storage facility, in which video and audio data of program are stored. |
|
Method of interactive television transmission Invention is related to interactive television and, in particular, to recording content of interactive television. Method is suggested how to transmit interactive television, at that applications of interactive television are transmitted in modules of applied programs that are transmitted in broadcasting flow, besides, information, which is related to memorizing of mentioned modules, is transmitted in the form of signaling in broadcasting flow. Information of module identification is realized in Information table of applications (ITA) and/or in message of Loading information indicator (LII). This information is included in broadcasting flow, which belongs to categories that indicate whether applied programs modules are obligatory, optional for recording or their recording is prohibited. Alternative properties of module are selected from the following: Code module /Data module /both modules, and/or Fixed module /Changed module. Recording systems use this information to decide whether it is required to record these modules of applied programs or not, besides, module identification number is used to exclude repeated records, besides, modules of applied programs of one and the same category are preferably grouped together. |
|
In accordance to the invention, transport data stream is claimed for transmission through a communication channel, receipt and processing by receiver-decoder, which contains a table which contains header (400) and informational part, featuring the informational part of the table having descriptors (406), corresponding to first cycle (408) of descriptors, and variable length cycle (410) with data elements (412), each one of which includes a data element identifier and cycle (414) of descriptors, containing descriptors (416) which are unique for given data element (412), where informational part of the table includes second header (404) and second informational part, and aforementioned second header (404) includes at least one of the following: information which concerns compression of given table; information which concerns encryption of given table; information which concerns priority; information which concerns the format of syntactical analysis; a filter expansion field. |
|
Paid television system with advance payment System contains control center (2), which transmits a data stream through a broadcasting channel, encrypted by means of control words, which are included in composition of access control messages, and meant for receipt by at least one user device (1), connected to safety block (3), having unique address and containing credit, which is reduced with purchase of products or consumption of data stream, where safety block (3) is provided with means for reducing credit for value, dependent on product, or for value, dependent on duration of access to data stream, where aforementioned values and/or duration are determined in access control messages or in conditional access messages, and system contains means, made independent from user device (1), for transmitting identifier, representing a unique number, and price code which indicates size of credit subject to load, in control center (2), and control center (2) additionally contains devices for receipt and verification of price code and for transmission of an encrypted message through broadcasting channel, having a unique address, corresponding to identifier, and giving a command to the safety block (3) to load the credit in defined amount. |
|
Method for controlling access privileges for encrypted data stored in a digital recorder Method is claimed for storing an event, encrypted with usage of at least one control word (CW) in receiver/decoder (STB), connected to safety block (SC), where at least one control word and access privileges for aforementioned event are contained in access control messages (ECM-messages), method includes following operations: recording of encrypted event, and also of at least one ECM-message in storage block; transmission of at least one ECM-message into safety block (SC), verification of the fact that safety block (SC) contains access privileges for aforementioned event, generation of receipt (Q), which contains data related to management of event in reproduction mode, where receipt (Q) contains signature (SGN), generated on basis of the whole ECM-message or its part with usage of secret key (K) contained in safety block (SC) and specific for every safety block, where during later consumption of event the authenticity of the receipt (Q) is verified in prioritized manner compared to conventional access privileges, stored in safety block (SC), storage of aforementioned receipt (Q) in storage block. |
|
Device and method for processing texts in digital broadcasting receiver Digital broadcasting receiver features text extraction module, text processing module, module for storing extracted text information and module for keyword searching. User may efficiently receive precise and summed up information from digital video broadcasting, using capabilities of storage, transformation and searching for text information, and computer or different mobile terminals may use text content of broadcasting program. |
|
Method for protected storage of encrypted data on personal digital recorder Method for recording content, encrypted with control words (CW) in module of receiving device/decoder (STB), connected to protection module (SC), wherein aforementioned control words (CW) in the same manner as privileges, required for access to aforementioned content, are transferred by means of control messages (ECM, EMM), where aforementioned control messages are encrypted by means of system keys (TK, RK), and aforementioned system keys are used jointly by a set of modules of receiving devices/decoders (STB), includes following stages: encrypted content is saved together with control messages (ECM, EMM) in memory device; system keys (TK, RK) are encrypted locally by means of a predetermined local key (S1), located in protection module (SC); system keys (SK) are saved in memory device in encrypted form after their encryption with aforementioned local key (S1). |
|
Method for integrating reference identifiers of tv-anytime content In accordance to the invention, during creation a stream of sound/video information, multiplexing is used for video information component, sound information component, and at least one reference identifier of content, where reference identifier of content is connected to video information component and sound information component in MPEG transmission stream. Also, device is described for realization of aforementioned method for transmitting and receiving a stream of sound/video information, containing TV-Anytime CRID. |
|
Digital content distribution system Method is provided for generation of digital data with cryptographic protection, encoding content and composed into messages. Encoding of at least a part of the message is performed and encoded messages are provided in form of output signal in format, allowing the interface of server service to compose a message in form of at least one packet, including at least one header and useful load, where at least one header includes information, which allows the service interface in the client to assemble each message for decoding application using useful load of packets. Each message is divided onto the first and at least one additional section of the message. At least one of the message sections is encoded in such a way that it may be decoded independently from other message sections. Assembly of encrypted message is performed by addition of resynchronization marker, separating the message section from adjacent message section and including precise information about synchronization, at least for additional sections of the message. |
|
System and method for identification of web-camera System uses web-camera, client computer and server web-site. In web-camera, authentication password and video-communication application are stored. Server web-site has authentication module for identification of web-camera and a functional module. After the client computer installs video application, provided by web-camera, web-camera may connect to server web-site through client computer. Server web-site authenticates possible usage of web-camera by checking authentication password. After passage of authentication web-camera may receive services provided by functional module. |
|
Method for efficient recording of object carousels Data transmission system contains transmitter 10 and, at least, one receiver 14, configured for receiving signals, transmitted by transmitter. Data file objects and catalogue objects, creating the carousel, are transmitted with periodical repeating in predetermined groups of file and catalogue objects, made into appropriate modules in the transmitter, according to MPEG-2 DSM-CC protocols. Each module is transmitted as a whole, and receiver is composed in such a way, that it is possible to record received objects of file data and catalogue objects with predetermined variant of grouping on the level of elementary streams and the level of modules. |
Another patent 2052085.
© 2013-2014 Russian business network RussianPatents.com - Special Russian commercial information project for world wide. Foreign filing in English. |