会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明授权
    • Preventing pattern recognition in electronic code book encryption
    • 防止电子代码簿加密中的模式识别
    • US09531916B2
    • 2016-12-27
    • US13996890
    • 2011-12-30
    • Scott JanusJason MartinUday Savagaonkar
    • Scott JanusJason MartinUday Savagaonkar
    • H04N1/44H04L9/06G06F21/62
    • H04L9/0637G06F21/6209G06T1/20H04L2209/08H04N1/4486
    • In general, in one aspect, noise is injected into a bitmap associated with content to be presented on a display to create a noisy bitmap. The noisy bitmap is encrypted using electronic code book (ECB) encryption. The resulting ciphertext does not include recognizable patterns from the content as is typical with ECB encryption. The injection of noise may include modifying pixel values for at least a subset of pixels in the bitmap. The pixel values may be modified by using a counter, a known modification pattern, or a random number generator. The bitmap may be analyzed to determine how the bitmap can be modified to maximize the randomness of the bitmap while ensuring that the noisy bitmap is visually perceptually similar when presented. The noise may be injected into a block of pixels prior to the block being encrypted.
    • 通常,在一个方面,将噪声注入到与将要呈现在显示器上的内容相关联的位图中以产生噪声位图。 噪声位图使用电子代码簿(ECB)加密进行加密。 所得到的密文不包括来自内容的可识别模式,如ECB加密典型。 噪声的注入可以包括修改位图中的至少像素子集的像素值。 可以通过使用计数器,已知修改模式或随机数生成器来修改像素值。 可以分析位图以确定位图如何被修改以使位图的随机性最大化,同时确保在呈现时视觉上感觉上类似的噪声位图。 在块被加密之前,可以将噪声注入到像素块中。
    • 3. 发明授权
    • Real time composition of a composite window from content maintaining unique security domains
    • 从内容维护独特的安全域的实时组合窗口
    • US08994241B2
    • 2015-03-31
    • US13729652
    • 2012-12-28
    • Scott JanusDavid R Sokolowski
    • Scott JanusDavid R Sokolowski
    • H04N7/167H04L9/12H04L9/14
    • H04L9/12H04L9/14H04L2209/30H04L2209/60H04N7/167H04N21/4126H04N21/41407H04N21/42623H04N21/42653H04N21/44004H04N21/44012H04N21/4408
    • In general, in one aspect, a multi-content composition pipeline encrypts protected video streams that may be utilized as part of a composite window using different encryption keys so that each encrypted video stream has a unique security domain. The protected video streams may be received as encrypted and compressed video streams that are decrypted and decoded (decompressed) and then the decompressed video streams may be encrypted. The encryption keys used to encrypt the decompressed video stream may be related to the encryption keys used to decrypt the corresponding encrypted compressed video stream. The encrypted decompressed video streams are stored in memory until they are needed for generating the composite window at which point they are read from memory and decrypted. The composite window is generated from the decrypted uncompressed video streams and possibly other content in real time and thus is not stored in memory prior to transmission to a display.
    • 通常,在一个方面,多内容组合流水线加密受保护的视频流,其可以使用不同的加密密钥来使用作为组合窗口的一部分,使得每个加密的视频流具有唯一的安全域。 受保护的视频流可以作为经解密和解码(解压缩)的经加密和压缩的视频流来接收,然后解压缩的视频流可被加密。 用于加密解压缩视频流的加密密钥可以与用于解密对应的加密压缩视频流的加密密钥有关。 加密的解压缩视频流被存储在存储器中,直到它们被需要用于生成复合窗口,此时它们从存储器读取并被解密。 复合窗口从解密的未压缩视频流和可能的其他内容实时生成,因此在传输到显示器之前不存储在存储器中。
    • 8. 发明申请
    • SELECTIVE POST-PROCESSING OF DECODED VIDEO FRAMES BASED ON FOCUS POINT DETERMINATION
    • 基于焦点确定的解码视频框架的选择性后处理
    • US20140023351A1
    • 2014-01-23
    • US13554269
    • 2012-07-20
    • Nikos KaburlasosScott W. ChengScott JanusMichael A. Smith
    • Nikos KaburlasosScott W. ChengScott JanusMichael A. Smith
    • H04N5/93
    • H04N21/4223H04N21/4728
    • In general, in one aspect, a graphics driver receives information related to where eyes of a user watching a video are focused, determine if the user is focusing their attention on a particular location of the video, and generates post processing instructions for pixel macro blocks of decoded video frames. The instructions are based on whether it is determined that the user is focused. The graphics driver is further to determine a focus area associated with the particular location the user is focusing their attention on, determine a peripheral area around the focus area, generate a first set of post processing instructions for pixel macro blocks within the focus area, generate a second set of post processing instructions for pixel macro blocks within the peripheral area, and generate a third set of post processing instructions for pixel macro blocks not within either area.
    • 通常,在一方面,图形驱动程序接收与观看视频的用户的眼睛聚焦在何处的信息,确定用户是否将注意力集中在视频的特定位置,并且生成用于像素宏块的后处理指令 的解码视频帧。 这些说明是基于是否确定用户被关注。 图形驱动器进一步确定与用户将注意力集中在其上的特定位置相关联的焦点区域,确定聚焦区域周围的周边区域,为聚焦区域内的像素宏块生成第一组后处理指令,生成 用于在所述外围区域内的像素宏块的第二组后处理指令,并且生成用于不在任一区域内的像素宏块的第三组后处理指令。
    • 9. 发明申请
    • SECURE PROVISION OF A DIGITAL CONTENT PROTECTION SCHEME
    • 数字内容保护方案的安全提供
    • US20130145424A1
    • 2013-06-06
    • US13657954
    • 2012-10-23
    • CHANGLIANG WANGPERIYAKARUPPAN KUMARAN KALAIYAPPANXIAOYU RUANRADHAKRISHNAN VENKATARAMANSCOTT JANUSTZE SEN FUNG
    • CHANGLIANG WANGPERIYAKARUPPAN KUMARAN KALAIYAPPANXIAOYU RUANRADHAKRISHNAN VENKATARAMANSCOTT JANUSTZE SEN FUNG
    • G06F21/24
    • G06F21/10
    • Methods, apparatuses and storage medium associated with securely provisioning a digital content protection scheme are disclosed. In various embodiments, a method may include forming a trust relationship between a media application within an application execution environment of a device and a security controller of the device. The application execution environment may include an operating system, and the operating system may control resources within the application execution environment. Additionally, the security controller may be outside the application execution environment, enabling components of the security controller to be secured from components of the operating system. Further, the method may include the security controller in enabling a digital content protection scheme for the media application to provide digital content to a digital content protection enabled transmitter within the application execution environment for provision to a digital content protection enabled receiver. Other embodiments may be disclosed or claimed.
    • 公开了与安全地提供数字内容保护方案相关联的方法,设备和存储介质。 在各种实施例中,一种方法可以包括在设备的应用执行环境和设备的安全控制器之间形成信任关系。 应用执行环境可以包括操作系统,并且操作系统可以控制应用执行环境中的资源。 此外,安全控制器可能在应用执行环境之外,使得安全控制器的组件能够从操作系统的组件固定。 此外,该方法可以包括安全控制器,使得媒体应用的数字内容保护方案能够在应用执行环境中向支持数字内容保护的发射机提供数字内容,以提供给支持数字内容保护的接收机。 可以公开或要求保护其他实施例。