会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 6. 发明授权
    • Preventing pattern recognition in electronic code book encryption
    • 防止电子代码簿加密中的模式识别
    • US09531916B2
    • 2016-12-27
    • US13996890
    • 2011-12-30
    • Scott JanusJason MartinUday Savagaonkar
    • Scott JanusJason MartinUday Savagaonkar
    • H04N1/44H04L9/06G06F21/62
    • H04L9/0637G06F21/6209G06T1/20H04L2209/08H04N1/4486
    • In general, in one aspect, noise is injected into a bitmap associated with content to be presented on a display to create a noisy bitmap. The noisy bitmap is encrypted using electronic code book (ECB) encryption. The resulting ciphertext does not include recognizable patterns from the content as is typical with ECB encryption. The injection of noise may include modifying pixel values for at least a subset of pixels in the bitmap. The pixel values may be modified by using a counter, a known modification pattern, or a random number generator. The bitmap may be analyzed to determine how the bitmap can be modified to maximize the randomness of the bitmap while ensuring that the noisy bitmap is visually perceptually similar when presented. The noise may be injected into a block of pixels prior to the block being encrypted.
    • 通常,在一个方面,将噪声注入到与将要呈现在显示器上的内容相关联的位图中以产生噪声位图。 噪声位图使用电子代码簿(ECB)加密进行加密。 所得到的密文不包括来自内容的可识别模式,如ECB加密典型。 噪声的注入可以包括修改位图中的至少像素子集的像素值。 可以通过使用计数器,已知修改模式或随机数生成器来修改像素值。 可以分析位图以确定位图如何被修改以使位图的随机性最大化,同时确保在呈现时视觉上感觉上类似的噪声位图。 在块被加密之前,可以将噪声注入到像素块中。
    • 7. 发明授权
    • Real time composition of a composite window from content maintaining unique security domains
    • 从内容维护独特的安全域的实时组合窗口
    • US08994241B2
    • 2015-03-31
    • US13729652
    • 2012-12-28
    • Scott JanusDavid R Sokolowski
    • Scott JanusDavid R Sokolowski
    • H04N7/167H04L9/12H04L9/14
    • H04L9/12H04L9/14H04L2209/30H04L2209/60H04N7/167H04N21/4126H04N21/41407H04N21/42623H04N21/42653H04N21/44004H04N21/44012H04N21/4408
    • In general, in one aspect, a multi-content composition pipeline encrypts protected video streams that may be utilized as part of a composite window using different encryption keys so that each encrypted video stream has a unique security domain. The protected video streams may be received as encrypted and compressed video streams that are decrypted and decoded (decompressed) and then the decompressed video streams may be encrypted. The encryption keys used to encrypt the decompressed video stream may be related to the encryption keys used to decrypt the corresponding encrypted compressed video stream. The encrypted decompressed video streams are stored in memory until they are needed for generating the composite window at which point they are read from memory and decrypted. The composite window is generated from the decrypted uncompressed video streams and possibly other content in real time and thus is not stored in memory prior to transmission to a display.
    • 通常,在一个方面,多内容组合流水线加密受保护的视频流,其可以使用不同的加密密钥来使用作为组合窗口的一部分,使得每个加密的视频流具有唯一的安全域。 受保护的视频流可以作为经解密和解码(解压缩)的经加密和压缩的视频流来接收,然后解压缩的视频流可被加密。 用于加密解压缩视频流的加密密钥可以与用于解密对应的加密压缩视频流的加密密钥有关。 加密的解压缩视频流被存储在存储器中,直到它们被需要用于生成复合窗口,此时它们从存储器读取并被解密。 复合窗口从解密的未压缩视频流和可能的其他内容实时生成,因此在传输到显示器之前不存储在存储器中。