Partial encryption and PID mapping
First Claim
Patent Images
1. A method of selecting data for multiple carriage partial encryption, comprising:
- examining unencrypted packets of data in a digital audio/video data stream to identify a packet type;
selecting packets of the identified packet type for multiple partial encryption, wherein the amount of data to be encrypted is sufficient to render a portion of an entire frame unviewable;
wherein the packet type comprises a number of packets (N) after a start of encryption event (M);
wherein the start of encryption event (M) repeats and the number of packets (N) are selected for encryption after each start of encryption event (M); and
sending the selected packets to an encryption device for encryption.
0 Assignments
0 Petitions
Accused Products
Abstract
A method of selecting data for multiple carriage partial encryption consistent with certain embodiments involves examining unencrypted packets of data in a digital audio/video data stream to identify a packet type; and selecting packets of the identified packet type for multiple partial encryption, wherein the amount of data to be encrypted is sufficient to render a portion of an entire frame unviewable. This abstract is not to be considered limiting, since other embodiments may deviate from the features described in this abstract.
182 Citations
17 Claims
-
1. A method of selecting data for multiple carriage partial encryption, comprising:
-
examining unencrypted packets of data in a digital audio/video data stream to identify a packet type; selecting packets of the identified packet type for multiple partial encryption, wherein the amount of data to be encrypted is sufficient to render a portion of an entire frame unviewable; wherein the packet type comprises a number of packets (N) after a start of encryption event (M); wherein the start of encryption event (M) repeats and the number of packets (N) are selected for encryption after each start of encryption event (M); and sending the selected packets to an encryption device for encryption. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
Specification