CONTROLLING ACCESS TO DATA STREAMS
First Claim
Patent Images
1. A computer-implemented method comprising:
- encrypting a first portion of a description of a plurality of unencrypted data segments, the plurality of unencrypted data segments forming a program, wherein the first portion of the description comprises an order for the plurality of unencrypted data segments;
obfuscating segment names for the plurality of unencrypted data segments; and
storing in one or more computer-readable storage media the encrypted first portion of the description of the plurality of unencrypted data segments, the obfuscated segment names for the plurality of unencrypted data segments, a second portion of the description of the plurality of unencrypted data segments comprising a key used for encrypting the first portion of the description, and the plurality of unencrypted data segments.
2 Assignments
0 Petitions
Accused Products
Abstract
Access to one or more data streams can be controlled by encrypting a description of how segments of the data streams can be assembled, for example, to produce an audio or video program. Access to the one or more data streams can also be provided by obfuscating names of at least some of the segments in order to make it more difficult to determine the proper order for assembling the segments. In at least some embodiments, the data contained in at least some of the segments themselves is not encrypted.
55 Citations
20 Claims
-
1. A computer-implemented method comprising:
-
encrypting a first portion of a description of a plurality of unencrypted data segments, the plurality of unencrypted data segments forming a program, wherein the first portion of the description comprises an order for the plurality of unencrypted data segments; obfuscating segment names for the plurality of unencrypted data segments; and storing in one or more computer-readable storage media the encrypted first portion of the description of the plurality of unencrypted data segments, the obfuscated segment names for the plurality of unencrypted data segments, a second portion of the description of the plurality of unencrypted data segments comprising a key used for encrypting the first portion of the description, and the plurality of unencrypted data segments. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A computing device comprising:
-
a processor; and one or more computer-readable storage media containing instructions configured to cause the computing device to perform a method comprising; decrypting a description of a plurality of unencrypted data stream segments; based on the decrypted description of the plurality of unencrypted data stream segments, de-obfuscating filenames for one or more of the plurality of the unencrypted data stream segments; based on the de-obfuscated filenames, determining a presentation order for at least some of the plurality of unencrypted data stream segments; and storing the presentation order in one or more computer-readable storage media. - View Dependent Claims (14, 15, 16, 17)
-
-
18. One or more computer-readable storage media containing instructions configured to cause a computer to perform a method comprising:
-
obfuscating names of a plurality of data segments for a plurality of bitrate streams for transmitting a media program, wherein the data segments comprise unencrypted media program content; encrypting a description of one or more assembling orders of the plurality of data segments for one or more of the plurality of bitrate streams; and storing in one or more computer-readable storage media the encrypted description of the one or more assembling orders of the plurality of data segments, the encrypted names of the one or more of the plurality of data segments and the unencrypted media program content. - View Dependent Claims (19, 20)
-
Specification