$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Method for reducing time to first frame/seek frame of protected digital content streams

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04N-021/2347
  • H04N-021/4405
출원번호 US-0538948 (2012-06-29)
등록번호 US-10212460 (2019-02-19)
발명자 / 주소
  • Dorwin, David Kimbal
  • Finnan, Hugh
출원인 / 주소
  • GOOGLE LLC
대리인 / 주소
    Brake Hughes Bellermann LLP
인용정보 피인용 횟수 : 0  인용 특허 : 110

초록

Embodiments are directed towards managing play of at least one stream of digital content to reduce a time to a first frame or seek frame within the content by playing unencrypted portions of the digital content received at a client device at least until key negotiations and decryption actions are co

대표청구항

1. A client device, comprising: a network interface to receive content over a network; andone or more processors that perform steps, comprising: receiving at least one stream of digital content including an encrypted portion and an unencrypted portion;playing the unencrypted portion of the at least

이 특허에 인용된 특허 (110)

  1. Ansell, Steven T.; Cherenson, Andrew R.; Rishniw, Leon; Cannon, Susan A.; Allard, Edward J.; Brownell, Jason S.; Stroud, Micah, Adaptable security mechanism for preventing unauthorized access of digital data.
  2. Horstmann Cay, Advertising-subsidized and advertising-enabled software.
  3. Pinder Howard George (Atlanta GA) Palgon Michael Steven (Atlanta GA), Apparatus and method for cipher stealing when encrypting MPEG transport packets.
  4. Nachman Jacob B. (Ramat Modiim ILX) Tsuria Yossef (Jerusalem ILX), Apparatus and method for securing communication systems.
  5. Weidong Mao ; David Chen, Apparatus and method for web-casting over digital broadcast TV network.
  6. Kollmyer,Brad; Baker,Brian; Shapiro,Eric; Kollmyer,Aric; Rutman,Mike; MacLean,Duncan; Robertson,Dan; Taylor,Neal; Hunsche,Dick; Walker,Amanda, Apparatus, system and method for selectively encrypting different portions of data sent over a network.
  7. Gopinath Bhaskarpillai (Watchung NJ) Kurshan David (Sea Bright NJ), Composition of systems of objects by interlocking coordination, projection, and distribution.
  8. Risan, Hank; Fitzgerald, Edward Vincent, Controlling interaction of deliverable electronic media.
  9. Koval Michael J. (Boca Raton FL) Lawton William W. (Boca Raton FL) Tyler John G. (Boynton Beach FL) Winters Scott L. (Plantation FL), Data stream protocol for multimedia data streaming data processing system.
  10. Gledhill Jeff,GBX ; Anikhindi Santosh,GBX, Decoding carriers encoded using orthogonal frequency division multiplexing.
  11. Tycksen ; Jr. Frank A. ; Jennings Charles W., Digital Certificate.
  12. Zeng, Wenjun; Lei, Shaw-Min, Digital image scrambling for image coding systems.
  13. Sesma Jimmy L., Digital product execution control.
  14. Neville Eugene A. ; Sesma Jimmy L., Digital product execution control and security.
  15. Tsuria Yossef,ILX, Digital recording protection system.
  16. Downs Edgar ; Gruse George Gregory ; Hurtado Marco M. ; Lehman Christopher T. ; Milsted Kenneth Louis ; Lotspiech Jeffrey B., Electronic content delivery system.
  17. Hasebe Takayuki (Kawasaki JPX) Akiyama Ryota (Kawasaki JPX) Yoshioka Makoto (Kawasaki JPX), Electronic data protection system.
  18. Kudelski, Stefan; Schlup, Jean-Claude; Rosselet, Ernest, Error prevention in a recording and reproducing device with at least one rotating head.
  19. Demmers Petrus Adrianus Cornelis Maria,NLX, Filter device.
  20. Bednarek Robert A. ; Rubin Philip A., GPS TV set top box with regional restrictions.
  21. Mohammed, Samiullah; Vaid, Aseem, Generating and interpreting secure and system dependent software license keys.
  22. Rix, Simon Paul Ashley, Integrated circuit and smart card comprising such a circuit.
  23. Handelman Doron,ILX ; Colb Sanford T.,ILX, Integrated telephone and cable communication networks.
  24. Sered, Yishai; Dallard, Nigel Stephen, Key delivery in a secure broadcasting system.
  25. Li Weijun, Merging of separate executable computer programs to form a single executable computer program.
  26. Thomas Paul Bruce, Metering device for storage, mixture and release of detergent with water.
  27. von Willich Manfred,ZAX ; Rix Simon Paul Ashley,ZAX, Method and apparatus for controlling the operation of a signal decoder in a broadcasting system.
  28. Lang Gerald S. (812 Downs Dr. Silver Spring MD 20904), Method and apparatus for protecting material on storage media and for transferring material on storage media to various.
  29. Wasilewski Anthony John ; Woodhead Douglas F. ; Logston Gary Lee, Method and apparatus for providing conditional access in connection-oriented, interactive networks with a multiplicity.
  30. LaRocca Tobie ; Johnson Michael D., Method and apparatus for providing subscription-on-demand services, dependent services and contingent services for an interactive information distribution system.
  31. Arn Robert M. (Toronto CAX) Csanky Peter H. (Toronto CAX) Waszek Glen F. (Toronto CAX), Method and apparatus for scrambling and unscrambling data streams using encryption and decryption.
  32. Davies Donald Watts,GBX, Method and apparatus for transmitting and receiving encrypted signals.
  33. Vegt Arjen Van Der,NLX, Method for automatically searching a frequency range for signal channels in a receiver for digitally modulated signals, and receiver for applying such a method.
  34. Bloom Jeffrey A. ; Cox Ingemar J. ; Miller Matthew L., Method for data preparation and watermark insertion.
  35. Slivka Benjamin W. ; Webber Jeffrey S., Method for identifying and obtaining computer software from a network computer.
  36. Slivka Benjamin W. ; Webber Jeffrey S., Method for identifying and obtaining computer software from a network computer using a tag.
  37. Ahmet Mursit Eskicioglu, Method for protecting the audio/visual data across the NRSS interface.
  38. Kudelski Andre (Crissier CHX), Method for scrambling and unscrambling a video signal.
  39. Graunke Gary L. ; Carbajal John ; Maliszewski Richard L. ; Rozas Carlos V., Method for securely distributing a conditional use private key to a trusted entity on a remote system.
  40. Kudelski Andr (Crissier CHX) Laffely Laurent (Le Mont-sur-Lausanne CHX) Sasselli Marco (Chardonne CHX), Method of interactive communication between a subscriber and a decoder of a system of pay-television and decoder thereof.
  41. Moline William A. ; Putnam Frederick A., Methods and apparatus for encrypting and decrypting MIDI files.
  42. Al-Salqan Yahya Y, Methods and apparatus for recovering keys.
  43. Handelman Doron (Givataim ILX), Methods and systems for non-program applications for subscriber television.
  44. Handelman Doron (Givataim ILX), Methods and systems for providing additional service applications in pay television.
  45. Horstmann Cay S., Multi-tier electronic software distribution.
  46. Collberg, Christian Sven; Thomborson, Clark David; Low, Douglas Wai Kok, Obfuscation techniques for enhancing software security.
  47. Jeong, Soo Gil; Kim, See Hyun; Kim, Kyu Seok; Kim, Chang Kyu; Oh, Jin Hong, PID/section filter in digital television system.
  48. Dinallo Chris A. (Boca Raton FL) Koval Michael J. (Boca Raton FL) Lawton William W. (Boca Raton FL) Paulat ; Jr. Martin J. (Delray Beach FL) Tyler John G. (Boynton Beach FL) Winters Scott L. (Plantat, Personal computer with generalized data streaming apparatus for multimedia devices.
  49. Toshiyuki Kawagishi JP, Portable electronic device and loyalty point system.
  50. Kudelski Andre (Crissier CHX), Pre-payment television system using a memory card associated with a decoder.
  51. Brian Baker, Process and streaming server for encrypting a data stream.
  52. Schultz, Roderick David; Uro, Till, Protecting video as it is decoded by a codec.
  53. Pantos, Roger; May, Jr., William; Biderman, David, Real-time or near real-time streaming.
  54. Horstmann Cay S., Relicensing of electronically purchased software.
  55. Katta Noboru (Itami JPX) Murakami Hiroki (Osaka JPX) Ibaraki Susumu (Toyonaka JPX) Nakamura Seiji (Toyonaka JPX), Scrambled transmission system.
  56. Handelman Doron,ILX ; Kranc Moshe,ILX ; Fink David,ILX ; Zucker Arnold,ILX ; Smith Perry,ILX ; Bar-on Gerson,ILX, Secure access system utilizing an access card having more than one embedded integrated circuit and/or plurality of secu.
  57. Handelman Doron (Givataim ILX) Kranc Moshe (Jerusalem ILX) Fink David (Jerusalem ILX) Zucker Arnold (Ramat Modiim ILX) Smith Perry (Jerusalem ILX) Bar-On Gerson (Kohav Hashahar ILX), Secure access systems and methods utilizing two access cards.
  58. Handelman Doron,ILX ; Kranc Moshe,ILX ; Fink David,ILX ; Zucker Arnold,ILX ; Smith Perry,ILX ; Bar-On Gerson,ILX, Secure access systems utilizing more than one IC card.
  59. Kleinman, Amit; Kipnis, Shlomo, Secure communications system.
  60. Zhao Jian ; Koch Eckhard,DEX ; Saito Makoto,JPX, Secure distribution of digital representations.
  61. Handelman Doron,ILX ; Kranc Moshe,ILX ; Fink David,ILX ; Zucker Arnold,ILX ; Smith Perry,ILX ; Bar-On Gerson,ILX, Secure document access system.
  62. Philip R. Wiser ; Andrew R. Cherenson ; Steven T. Ansell ; Susan A. Cannon, Secure online music distribution system.
  63. Hallam Toby,GBX ; Siegel Philip I., Secure smart card and tool for removing same.
  64. Golan Gilad,ILX, Security monitor.
  65. Michael R. Colligan ; Yong Ho Son ; Christopher Goode, Selective and renewable encryption for secure distribution of video on-demand.
  66. Anderson ; Jr. Bruce J. ; Lamont Nadine ; Drasner Sharyn L. ; Greenberg Arthur L., Set top terminal for an interactive information distribution system.
  67. Yossef Tsuria IL, Smart card chaining in pay television systems.
  68. Richard Bean ; Young Harvill, Software authorization system and method.
  69. Horstmann Cay S., Software program self-modification.
  70. Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure.
  71. David M. Van Wie ; Robert P. Weber, Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  72. Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  73. Van Wie, David M.; Weber, Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  74. Raz Uri ; Volk Yehuda,ILX ; Melamed Shmuel,ILX, Streaming modules.
  75. Gray James P. ; Onvural Raif O. ; Peyravian Mohammad, Synchronization of encryption/decryption keys in a data communication network.
  76. Kuhn Gideon Jacobus,ZAX ; Davies Donald Watts,GB3 ; Rix Simon Paul Ashley,ZAX, System and apparatus for blockwise encryption/decryption of data.
  77. Agarwal, Rahul; Ayars, Jeffrey M.; Hefta-Gaub, Bradley D.; Greenbaum, Gary S.; Lippman, Alan F.; Patel, Sujal M.; Stammen, Dale R.; Rosedale, Philip; Vergato, Bryan, System and method for providing random access to a multimedia object over a network.
  78. Herz Frederick ; Ungar Lyle ; Zhang Jian ; Wachob David ; Salganicoff Marcos, System and method for scheduling broadcast of and access to video programs and other data using customer profiles.
  79. Koved, Lawrence; Mourad, Magda M.; Munson, Jonathan P.; Pacifici, Giovanni; Pistoia, Marco; Youssef, Alaa S., System and method for supporting digital rights management in an enhanced Java™ 2 runtime environment.
  80. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., System and methods for secure transaction management and electronic rights protection.
  81. Schneck Paul B. ; Abrams Marshall D., System for controlling access and distribution of digital property.
  82. Schneck Paul B. ; Abrams Marshall D., System for controlling access and distribution of digital property.
  83. Yossef Tsuria IL; Yishai Sered IL, System for preventing playback of unauthorized digital video recordings.
  84. Chaney John William, System for processing a video signal via series-connected high speed signal processing smart cards.
  85. Morten, Glenn A., System, method, and apparatus for securely providing content viewable on a secure device.
  86. Morten,Glenn A., System, method, and apparatus for securely providing content viewable on a secure device.
  87. Morten,Glenn A., System, method, and apparatus for securely providing content viewable on a secure device.
  88. Shear Victor H. ; Van Wie David M. ; Weber Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  89. Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  90. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  91. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  92. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  93. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  94. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  95. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  96. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  97. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  98. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for the secure transaction management and electronic rights protection.
  99. Shear Victor H. ; Sibert W. Olin ; Van Wie David M., Systems and methods using cryptography to protect secure computing environments.
  100. Shear Victor H. ; Sibert W. Olin ; Van Wie David M., Systems and methods using cryptography to protect secure computing environments.
  101. Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining using and manipulating rights management data structures.
  102. Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining, using and manipulating rights management data structures.
  103. Handelman, Doron, Television system communicating individually addressed information.
  104. Mori Toshiya,JPX ; Takao Naoya,JPX ; Shimoji Tatsuya,JPX ; Okamura Kazuo,JPX ; Hirai Junichi,JPX ; Oashi Masahiro,JPX ; Kakiuchi Takashi,JPX ; Kusumi Yuki,JPX ; Miyabe Yoshiyuki,JPX ; Minakata Ikuo,J, Terminal apparatus and method for achieving interactive operations by displaying a desired piece of image information at high speed using cache memories, out of a large amount of image information se.
  105. Tsuria Yossef,ILX ; Handelman Doron,ILX, Theft prevention system and method.
  106. Rassool, Reza P.; Morten, Glenn A.; Baker, Brian A., Transitioning to secure IP communications for encoding, encapsulating, and encrypting data.
  107. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M. ; Weber Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  108. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support system, methods and techniques for secure electronic commerce transaction and rights management.
  109. Snook, Daniel, Video encoding-method.
  110. Frederiksen Jeffrey E. (603 W. Haven Dr. Arlington Heights IL 60005), Video transmission system.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트