$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Selectively encrypting different portions of data sent over a network 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-009/00
출원번호 US-0467510 (2006-08-25)
등록번호 US-7376831 (2008-05-20)
발명자 / 주소
  • Kollmyer,Brad
  • Baker,Brian A.
  • Shapiro,Eric Bradley
  • Kollmyer,Aric
  • Rutman,Mike
  • MacLean,Charles Duncan
  • Robertson,Dan
  • Taylor,Neal
  • Hunsche,Dick
  • Walker,Amanda
출원인 / 주소
  • Widevine Technologies, Inc.
대리인 / 주소
    Darby & Darby P.C.
인용정보 피인용 횟수 : 59  인용 특허 : 106

초록

An apparatus, system, and method are directed towards parsing and selectively encrypting different portions of data in real-time, decrypting the encrypted data in real-time, and passing the data to a media player on a client computer or other network capable device. Data in a network packet may be p

대표청구항

What is claimed as new and desired to be proteceted by Letters Patent of the United States is: 1. An encryption bridge for selectively encrypting data to a client device, comprising: a network component that is configured to send and receive data over a network; and a processor that is operative to

이 특허에 인용된 특허 (106)

  1. Horstmann Cay, Advertising-subsidized and advertising-enabled software.
  2. Pinder Howard George (Atlanta GA) Palgon Michael Steven (Atlanta GA), Apparatus and method for cipher stealing when encrypting MPEG transport packets.
  3. Nachman Jacob B. (Ramat Modiim ILX) Tsuria Yossef (Jerusalem ILX), Apparatus and method for securing communication systems.
  4. Weidong Mao ; David Chen, Apparatus and method for web-casting over digital broadcast TV network.
  5. Barnes Vera L. (Wayne PA) Dodds ; Jr. Thomas J. (Drexel Hill PA) Gibson Harold F. (Downingtown PA) Campbell ; Jr. Carl M. (Newtown Square PA), Byte stream selective encryption/decryption device.
  6. Jackowski Steven J. ; Thomas Christopher N., Client-side application-classifier gathering network-traffic statistics and application and user names using extensible-service provider plugin for policy-based network control.
  7. Gopinath Bhaskarpillai (Watchung NJ) Kurshan David (Sea Bright NJ), Composition of systems of objects by interlocking coordination, projection, and distribution.
  8. Adams ; Jr. Richard L. (Fairfax VA) Hallenbeck Peter D. (Elfland NC), Computer network encryption/decryption device.
  9. Adams ; Jr. Richard L. (Fairfax VA) Hallenbeck Peter D. (Elfland NC), Computer network encryption/decryption device.
  10. Gledhill Jeff,GBX ; Anikhindi Santosh,GBX, Decoding carriers encoded using orthogonal frequency division multiplexing.
  11. Tycksen ; Jr. Frank A. ; Jennings Charles W., Digital Certificate.
  12. Zeng, Wenjun; Lei, Shaw-Min, Digital image scrambling for image coding systems.
  13. Sesma Jimmy L., Digital product execution control.
  14. Neville Eugene A. ; Sesma Jimmy L., Digital product execution control and security.
  15. Tsuria Yossef,ILX, Digital recording protection system.
  16. Fetkovich,John Edward; Lam,Wai Man; Wilhelm, Jr.,George William, Dynamic encryption and decryption of a stream of data.
  17. Howard G. Pinder ; Michael S. Palgon, Encryption devices for use in a conditional access system.
  18. Kudelski, Stefan; Schlup, Jean-Claude; Rosselet, Ernest, Error prevention in a recording and reproducing device with at least one rotating head.
  19. Demmers Petrus Adrianus Cornelis Maria,NLX, Filter device.
  20. Bednarek Robert A. ; Rubin Philip A., GPS TV set top box with regional restrictions.
  21. Rix, Simon Paul Ashley, Integrated circuit and smart card comprising such a circuit.
  22. Handelman Doron,ILX ; Colb Sanford T.,ILX, Integrated telephone and cable communication networks.
  23. Sered, Yishai; Dallard, Nigel Stephen, Key delivery in a secure broadcasting system.
  24. Li Weijun, Merging of separate executable computer programs to form a single executable computer program.
  25. Brunheroto, Jose R.; Laemen, Frans; Nogima, Julio; Schaffa, Frank A.; Anzick, William J., Method and apparatus for MPEG-2 program ID re-mapping for multiplexing several programs into a single transport stream.
  26. von Willich Manfred,ZAX ; Rix Simon Paul Ashley,ZAX, Method and apparatus for controlling the operation of a signal decoder in a broadcasting system.
  27. Wasilewski Anthony John ; Woodhead Douglas F. ; Logston Gary Lee, Method and apparatus for providing conditional access in connection-oriented, interactive networks with a multiplicity.
  28. LaRocca Tobie ; Johnson Michael D., Method and apparatus for providing subscription-on-demand services, dependent services and contingent services for an interactive information distribution system.
  29. Arn Robert M. (Toronto CAX) Csanky Peter H. (Toronto CAX) Waszek Glen F. (Toronto CAX), Method and apparatus for scrambling and unscrambling data streams using encryption and decryption.
  30. Davies Donald Watts,GBX, Method and apparatus for transmitting and receiving encrypted signals.
  31. Vegt Arjen Van Der,NLX, Method for automatically searching a frequency range for signal channels in a receiver for digitally modulated signals, and receiver for applying such a method.
  32. Slivka Benjamin W. ; Webber Jeffrey S., Method for identifying and obtaining computer software from a network computer.
  33. Slivka Benjamin W. ; Webber Jeffrey S., Method for identifying and obtaining computer software from a network computer using a tag.
  34. Ahmet Mursit Eskicioglu, Method for protecting the audio/visual data across the NRSS interface.
  35. Kudelski Andre (Crissier CHX), Method for scrambling and unscrambling a video signal.
  36. Graunke Gary L. ; Carbajal John ; Maliszewski Richard L. ; Rozas Carlos V., Method for securely distributing a conditional use private key to a trusted entity on a remote system.
  37. Cordier Christophe,FRX ; Fratti Marco,FRX, Method of controlling terminal transmission power in a CMDA type cellular network, and a base station and a base station controller implementing the method.
  38. Iwakawa Toru (Tokyo JPX), Method of creating a barrier to wood materials and wooden structures from attack by humidity, fungi and insects.
  39. Kudelski Andr (Crissier CHX) Laffely Laurent (Le Mont-sur-Lausanne CHX) Sasselli Marco (Chardonne CHX), Method of interactive communication between a subscriber and a decoder of a system of pay-television and decoder thereof.
  40. Moline William A. ; Putnam Frederick A., Methods and apparatus for encrypting and decrypting MIDI files.
  41. Handelman Doron (Givataim ILX), Methods and systems for non-program applications for subscriber television.
  42. Handelman Doron (Givataim ILX), Methods and systems for providing additional service applications in pay television.
  43. Wasilewski Anthony J. (Alpharetta GA), Methods for providing conditional access information to decoders in a packet-based multiplexed communications system.
  44. Ishibashi Yasuhiro,JPX, Motion picture data encrypting method and computer system and motion picture data encoding/decoding apparatus to which encrypting method is applied.
  45. Horstmann Cay S., Multi-tier electronic software distribution.
  46. Collberg, Christian Sven; Thomborson, Clark David; Low, Douglas Wai Kok, Obfuscation techniques for enhancing software security.
  47. Jeong, Soo Gil; Kim, See Hyun; Kim, Kyu Seok; Kim, Chang Kyu; Oh, Jin Hong, PID/section filter in digital television system.
  48. Uri Elzur IL, Parsing a packet header.
  49. Lampson Butler W. (Cambridge MA) Hawe William R. (Pepperell MA) Gupta Amar (Northboro MA) Spinney Barry A. (Wayland MA), Pipelined cryptography processor and method for its use in communication networks.
  50. Nardone Joseph M. ; Shippy Keith L. ; Aucsmith David W., Policy based selective encryption of compressed video data.
  51. Toshiyuki Kawagishi JP, Portable electronic device and loyalty point system.
  52. Kudelski Andre (Crissier CHX), Pre-payment television system using a memory card associated with a decoder.
  53. Brian Baker, Process and streaming server for encrypting a data stream.
  54. Horstmann Cay S., Relicensing of electronically purchased software.
  55. Markham Thomas R., Scalable key agile cryptography.
  56. Katta Noboru (Itami JPX) Murakami Hiroki (Osaka JPX) Ibaraki Susumu (Toyonaka JPX) Nakamura Seiji (Toyonaka JPX), Scrambled transmission system.
  57. Handelman Doron,ILX ; Kranc Moshe,ILX ; Fink David,ILX ; Zucker Arnold,ILX ; Smith Perry,ILX ; Bar-on Gerson,ILX, Secure access system utilizing an access card having more than one embedded integrated circuit and/or plurality of secu.
  58. Handelman Doron (Givataim ILX) Kranc Moshe (Jerusalem ILX) Fink David (Jerusalem ILX) Zucker Arnold (Ramat Modiim ILX) Smith Perry (Jerusalem ILX) Bar-On Gerson (Kohav Hashahar ILX), Secure access systems and methods utilizing two access cards.
  59. Handelman Doron,ILX ; Kranc Moshe,ILX ; Fink David,ILX ; Zucker Arnold,ILX ; Smith Perry,ILX ; Bar-On Gerson,ILX, Secure access systems utilizing more than one IC card.
  60. Kleinman, Amit; Kipnis, Shlomo, Secure communications system.
  61. Handelman Doron,ILX ; Kranc Moshe,ILX ; Fink David,ILX ; Zucker Arnold,ILX ; Smith Perry,ILX ; Bar-On Gerson,ILX, Secure document access system.
  62. Hallam Toby,GBX ; Siegel Philip I., Secure smart card and tool for removing same.
  63. Osmond Roger F., Secure transmission using an ordinarily insecure network communication protocol such as SNMP.
  64. Michael R. Colligan ; Yong Ho Son ; Christopher Goode, Selective and renewable encryption for secure distribution of video on-demand.
  65. Davis, Mark C.; Hind, John R.; Peters, Marcia L.; Topol, Brad B., Selective data encryption using style sheet processing.
  66. Anderson ; Jr. Bruce J. ; Lamont Nadine ; Drasner Sharyn L. ; Greenberg Arthur L., Set top terminal for an interactive information distribution system.
  67. Yossef Tsuria IL, Smart card chaining in pay television systems.
  68. Horstmann Cay S., Software program self-modification.
  69. Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure.
  70. David M. Van Wie ; Robert P. Weber, Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  71. Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  72. Van Wie, David M.; Weber, Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  73. Gray James P. ; Onvural Raif O. ; Peyravian Mohammad, Synchronization of encryption/decryption keys in a data communication network.
  74. Kuhn Gideon Jacobus,ZAX ; Davies Donald Watts,GB3 ; Rix Simon Paul Ashley,ZAX, System and apparatus for blockwise encryption/decryption of data.
  75. Fawcett Philip E. (Duvall WA) Blomfield-Brown Christopher (Seattle WA), System and method for providing automated customer support.
  76. Alexander Dorfman ; Jeffrey Wayne Pence, System and method for providing temporary remote access to a computer.
  77. Herz Frederick ; Ungar Lyle ; Zhang Jian ; Wachob David ; Salganicoff Marcos, System and method for scheduling broadcast of and access to video programs and other data using customer profiles.
  78. Pebley Kevin M. ; Carlton Todd D., System and method for transferring encrypted sections of documents across a computer network.
  79. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., System and methods for secure transaction management and electronic rights protection.
  80. Schneck Paul B. ; Abrams Marshall D., System for controlling access and distribution of digital property.
  81. Schneck Paul B. ; Abrams Marshall D., System for controlling access and distribution of digital property.
  82. Yossef Tsuria IL; Yishai Sered IL, System for preventing playback of unauthorized digital video recordings.
  83. Chaney John William, System for processing a video signal via series-connected high speed signal processing smart cards.
  84. Shear Victor H. ; Van Wie David M. ; Weber Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  85. Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  86. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  87. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  88. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  89. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  90. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  91. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  92. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  93. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  94. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  95. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for the secure transaction management and electronic rights protection.
  96. Shear Victor H. ; Sibert W. Olin ; Van Wie David M., Systems and methods using cryptography to protect secure computing environments.
  97. Shear Victor H. ; Sibert W. Olin ; Van Wie David M., Systems and methods using cryptography to protect secure computing environments.
  98. Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining using and manipulating rights management data structures.
  99. Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining, using and manipulating rights management data structures.
  100. Handelman, Doron, Television system communicating individually addressed information.
  101. Mori Toshiya,JPX ; Takao Naoya,JPX ; Shimoji Tatsuya,JPX ; Okamura Kazuo,JPX ; Hirai Junichi,JPX ; Oashi Masahiro,JPX ; Kakiuchi Takashi,JPX ; Kusumi Yuki,JPX ; Miyabe Yoshiyuki,JPX ; Minakata Ikuo,J, Terminal apparatus and method for achieving interactive operations by displaying a desired piece of image information at high speed using cache memories, out of a large amount of image information se.
  102. Tsuria Yossef,ILX ; Handelman Doron,ILX, Theft prevention system and method.
  103. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M. ; Weber Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  104. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support system, methods and techniques for secure electronic commerce transaction and rights management.
  105. Snook, Daniel, Video encoding-method.
  106. Frederiksen Jeffrey E. (603 W. Haven Dr. Arlington Heights IL 60005), Video transmission system.

이 특허를 인용한 특허 (59)

  1. Theobald, Dietmar, Annotation data filtering of computer files.
  2. Theobald, Dietmar, Annotation processing of computer files.
  3. Priyadarshi, Shaiwal; Soroushian, Kourosh; Osborne, Roland; Braness, Jason; Kelley, John, Application enhancement tracks.
  4. Bauer, William D.; White, Donovan Steve; Eder, David W., Cable television secure communication system for one way restricted.
  5. Grussling, Barry Jakob; Dearien, Jason A.; Bradetich, Ryan, Communication device with persistent configuration and verification.
  6. Berner, Marc Ryan; Smith, Rhett; Dearien, Jason A.; Powers, Josh; Boomer, Grant O., Configuration of a software defined network.
  7. Shivadas, Abhishek; Bramwell, Stephen R., Content streaming with client device trick play index.
  8. Chan, Francis Yee-Dug; Soroushian, Kourosh; Wood, Andrew Jeffrey, Elementary bitstream cryptographic material transport systems and methods.
  9. Chan, Francis Yee-Dug; Soroushian, Kourosh; Wood, Andrew Jeffrey, Elementary bitstream cryptographic material transport systems and methods.
  10. Chan, Francis Yee-Dug; Soroushian, Kourosh; Wood, Andrew Jeffrey, Elementary bitstream cryptographic material transport systems and methods.
  11. Johnson, Simon B.; Bolotin, Lev M., Encryption bridge system and method of operation thereof.
  12. Grab, Eric William; Russell, Chris; Chan, Francis Yee-Dug; Kiefer, Michael George, Federated digital rights management scheme including trusted systems.
  13. Grab, Eric William; Russell, Chris; Chan, Francis Yee-Dug; Kiefer, Michael George, Federated digital rights management scheme including trusted systems.
  14. Grab, Eric William; Russell, Chris; Chan, Francis Yee-Dug; Kiefer, Michael George, Federated digital rights management scheme including trusted systems.
  15. Bolotin, Lev M.; Johnson, Simon B., Memory lock system with manipulatable input device and method of operation thereof.
  16. Bolotin, Lev M.; Johnson, Simon B., Memory lock system with manipulatable input device and method of operation thereof.
  17. Bolotin, Lev M.; Johnson, Simon B., Memory lock system with manipulatable input device and method of operation thereof.
  18. Divakar, Pavan; Shantharaju, Rakshith; Hegde, Shashank; Rao, Bhavani Gopalakrishna; Kedlaya, Abhinandan; Gupta, Puneet, Method and system for encrypting multimedia streams.
  19. Maresh, Guy; Yu, Jeffrey N., Methods, systems, and devices for controlling a permission-based workflow process for transferring medical files.
  20. Maresh, Guy; Yu, Jeffrey N., Methods, systems, and devices for managing medical files.
  21. Maresh, Guy; Yu, Jeffrey N., Methods, systems, and devices for managing medical images and records.
  22. Yu, Jeffrey N., Methods, systems, and devices for managing medical images and records.
  23. Yu, Jeffrey N.; Branson, David, Methods, systems, and devices for managing medical images and records.
  24. Maresh, Guy; Yu, Jeffrey N., Methods, systems, and devices for managing transfer of medical files.
  25. Maresh, Guy; Yu, Jeffrey N., Methods, systems, and devices for modifying medical files.
  26. Maresh, Guy; Yu, Jeffrey N., Methods, systems, and devices for transferring medical files.
  27. Maresh, Guy; Yu, Jeffrey N., Methods, systems, and devices for transferring medical files from a source facility to a destination facility.
  28. Maresh, Guy; Yu, Jeffrey N., Methods, systems, and devices for verifying and approving government required release forms.
  29. Smith, Rhett; Berner, Marc Ryan; Dearien, Jason A.; Powers, Josh, Network reliability assessment.
  30. Shivadas, Abhishek; Bramwell, Stephen R., Network video streaming with trick play based on separate trick play files.
  31. Shivadas, Abhishek; Bramwell, Stephen R., Network video streaming with trick play based on separate trick play files.
  32. Kiefer, Michael George; Grab, Eric William; Braness, Jason, Playback devices and methods for playing back alternative streams of content protected using a common set of cryptographic keys.
  33. Oyman, Ozgur, Quality of experience reporting for combined unicast-multicast/broadcast streaming of media content.
  34. Smith, Rhett; Berner, Marc Ryan; Powers, Josh; Buehler, David M.; Dearien, Jason A., Routing of traffic in network through automatically generated and physically distinct communication paths.
  35. Yang, Xiaowen, Scramble methods and apparatus for packetized digital video signal in conditional access system.
  36. Dearien, Jason A.; Berner, Marc Ryan; Powers, Josh, Simulating, visualizing, and searching traffic in a software defined network.
  37. Kothari, Pravin; Dash, Debabrata, System and method to anonymize data transmitted to a destination computing device.
  38. Kothari, Pravin; Dash, Debabrata, System and method to anonymize data transmitted to a destination computing device.
  39. Kothari, Pravin; Dash, Debabrata, System and method to anonymize data transmitted to a destination computing device.
  40. Kothari, Pravin; Dash, Debabrata; Gorantla, Malakondayya, System and method to anonymize data transmitted to a destination computing device.
  41. Kothari, Pravin; Dash, Debabrata; Gorantla, Malakondayya, System and method to anonymize data transmitted to a destination computing device.
  42. Kothari, Pravin; Dash, Debabrata; Kaganovich, Yevgeniy; Liu, Jing, System and method to anonymize data transmitted to a destination computing device.
  43. Kothari, Pravin; Dash, Debabrata; Soubramanien, Viswa, System and method to anonymize data transmitted to a destination computing device.
  44. Kothari, Pravin; Gorantla, Malakondayya, System and method to anonymize data transmitted to a destination computing device.
  45. Tock, Theron; Kothari, Pravin, System and method to anonymize data transmitted to a destination computing device.
  46. Tock, Theron; Kothari, Pravin, System and method to anonymize data transmitted to a destination computing device.
  47. van der Schaar, Auke Sjoerd; Funnell, John, Systems and methods for encoding and playing back video at different frame rates using enhancement layers.
  48. Braness, Jason; van der Schaar, Auke Sjoerd; Soroushian, Kourosh, Systems and methods for encoding source media in matroska container files for adaptive bitrate streaming using hypertext transfer protocol.
  49. Braness, Jason; Soroushian, Kourosh; van der Schaar, Auke Sjoerd, Systems and methods for performing smooth visual search of media encoded for adaptive bitrate streaming via hypertext transfer protocol using trick play streams.
  50. Kiefer, Michael George; Grab, Eric William; Braness, Jason, Systems and methods for playing back alternative streams of protected content protected using common cryptographic information.
  51. Kiefer, Michael George; Grab, Eric William; Braness, Jason, Systems and methods for playing back alternative streams of protected content protected using common cryptographic information.
  52. Kiefer, Michael George; Grab, Eric William; Braness, Jason, Systems and methods for playing back alternative streams of protected content protected using common cryptographic information.
  53. Kiefer, Michael George; Grab, Eric William; Braness, Jason, Systems and methods for playing back alternative streams of protected content protected using common cryptographic information.
  54. Kiefer, Michael George; Grab, Eric William; Braness, Jason, Systems and methods for protecting alternative streams in adaptive bitrate streaming systems.
  55. Braness, Jason; Amidei, William David; Srinivasan, Mayur, Systems and methods for protecting elementary bitstreams incorporating independently encoded tiles.
  56. van der Schaar, Auke Sjoerd; Shivadas, Abhishek, Systems, methods, and media for controlling delivery of content.
  57. Braness, Jason A, Systems, methods, and media for streaming media content.
  58. Naletov, Ivan Vladimirovich; Zurpal, Sergey, Systems, methods, and media for transcoding video data.
  59. Naletov, Ivan Vladimirovich; Zurpal, Sergey, Systems, methods, and media for transcoding video data according to encoding parameters indicated by received metadata.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로