Abstract:
System for transmitting one or more presentation data streams from a presentation workstation. In response to receiving an input to open a presentation application, operating parameters are obtained for a presentation to provide presentation operating parameters for the presentation. One or more selected presentation data streams are captured based on the obtained presentation operating parameters. Then, the one or more captured presentation data streams are transmitted based on the obtained presentation operating parameters directly from the presentation workstation to one or more viewing devices via a network without utilizing an intervening server.
Abstract:
PROBLEM TO BE SOLVED: To provide a system and a method for protecting a digital multimedia stream from unauthorized editing. SOLUTION: The system for reinforcing continuity of a data stream includes a server connected to a transmission link for supplying the data stream to at least one client by the transmission link. The data stream is segmented into plural units. The server includes a scrambler for ciphering at least one first unit, by using a ciphering key and an information concealing unit for deciding the ciphering key and embedding the ciphering key in at least one second unit for data stream, that the client requires information for concealing information, in order to cipher and decode the data stream.
Abstract:
A system for enforcing data stream continuity, in accordance with the present invention, includes a server coupled to a transmission link for providing a data stream to at least one client over the transmission link. The data stream is segmented into units. The server includes a scrambler for encrypting at least one first unit using an encryption key, and a steganographic unit for embedding the encryption key into at least one second unit for the data stream such that steganographic information is needed by the client to determine the encryption key and decipher the data stream.
Abstract:
In a convenient and efficient mechanism for proving that a particular piece of media has been received by a destination from a source, proof of reception involves three steps: 1) embedding at least one media identifier at the media source directly into a piece of media 2) at the destination, combining the at least one media identifier with a destination identifier to produce at least one combined identifier, and 3) transmitting the combined identifier to one or more collection points for processing. Due to the fact that the identifier is associated not with a channel or the source, but with the piece of media whose reception needs to be proven, the inventive mechanism produces little extraneous data, as compared to an active trace of user behaviour. The mechanism is fine grained and can be attached to one or all of the beginning, middle and end of the media transmission with as much detail as is required for observation of the viewer's behaviour (e.g. including monitoring a viewer's switching of channels during commercials). The mechanism supports tracking of a media segment from its source across multiple distributors, allowing multiple evaluations, for example, by source, by distributor, by media, etc. based on whoever has added to the media identifier. The combined identifier can also easily be associated with a time of reception. Broadly applicable to all kinds of media, the mechanism is extensible in conjunction with other technology to avoid tampering, and reveal proof of viewing.
Abstract:
In a convenient and efficient mechanism for proving that a particular piece of media has been received by a destination from a source, proof of reception involves three steps: 1) embedding at least one media identifier at the media source directly into a piece of media 2) at the destination, combining the at least one media identifier with a destination identifier to produce at least one combined identifier, and 3) transmitting the combined identifier to one or more collection points for processing. Due to the fact that the identifier is associated not with a channel or the source, but with the piece of media whose reception needs to be proven, the inventive mechanism produces little extraneous data, as compared to an active trace of user behaviour. The mechanism is fine grained and can be attached to one or all of the beginning, middle and end of the media transmission with as much detail as is required for observation of the viewer's behaviour (e.g. including monitoring a viewer's switching of channels during commercials). The mechanism supports tracking of a media segment from its source across multiple distributors, allowing multiple evaluations, for example, by source, by distributor, by media, etc. based on whoever has added to the media identifier. The combined identifier can also easily be associated with a time of reception. Broadly applicable to all kinds of media, the mechanism is extensible in conjunction with other technology to avoid tampering, and reveal proof of viewing.
Abstract:
A system for enforcing data stream continuity, in accordance with the present invention, includes a server coupled to a transmission link for providing a data stream to at least one client over the transmission link. The data stream is segmented into units. The server includes a scrambler for encrypting at least one first unit using an encryption key, and a steganographic unit for embedding the encryption key into at least one second unit for the data stream such that steganographic information is needed by the client to determine the encryption key and decipher the data stream.