摘要:
A method for limiting user access to a captive domain or an open domain. The captive domain may include electronically accessible content that is selected/controlled by a service provider and the open domain may include electronically accessible content that is not completely selected/controlled by the service provider. The method may include configuring a modem or other user device in such a manner as to limit use access to the desired domain.
摘要:
A method of traffic regulation in a packet communication network involves a token bucket associated with a subscriber. Packets arriving at the regulator are handled in accordance with the token bucket configuration. The method further involves measuring a demand placed on the packet communication network by the subscriber. The token bucket configuration for the subscriber is dynamically adjusted based on the demand. Another method of traffic regulation handles packets that arrive at the regulator in accordance with first and second token bucket configurations. The first token bucket regulates packet rate while the second token bucket regulates data rate. Another method of traffic regulation involves handling packets in accordance with a token bucket configuration, where the amount of tokens to be removed is based on the amount of the flow and is further based on a classification of the flow. Packet-level devices for traffic regulation are also contemplated.
摘要:
A technique is provided for securely transferring programming content from a first device in a first layer, e.g., a trusted domain, to a second device in a second layer, e.g., outside the trusted domain. When a user requests that the first device transfer protected content to the second device, the first device needs to authenticate the second device. After the second device is authenticated, the first device may transfer to the second device the protected content, together with a rights file associated therewith. The rights file specifies the rights of the second device to use the protected content, according to its security level indicative of its security. These rights may concern, e.g., the number of times that the second device may subsequently transfer the protected content to other devices, the time period within which the second device may play the protected content, etc.; The higher the security level of the second device is, the more rights accorded thereto. Indeed, the second device may need to meet a minimum security level requirement in order for it to receive or keep the protected content.
摘要:
A system and method for controlling the transmission of signals within an interactive network which transmits audio/visual (A/V) information on at least one channel to a user and including a transmission source configured to transmit the A/V information on the at least one channel is provided. The system includes at least one set-top box and at least one random number generator. The set-top box is configured to record the A/V information on a channel at a predetermined recording time and to transmit a change channel request signal to the transmission source prior to the predetermined recording time to change the channel to record the A/V information at the predetermined recording time. The random number generator is configured to generate a time value such that the at least one set-top box transmits the change channel request signal to the transmission source at the time value prior to the predetermined recording time.
摘要:
A verbal request for an action to be performed in connection with a user's set-top box may be received by a Program Content Manager (PCM) from a voice-enabled input/output device such as a VoIP-enabled device or a mobile communication device. Alternatively, the user may request an action via email, text message, and the like. The PCM receiving the action request may execute, or schedule the request for later execution, depending on whether the request is for a real-time or future action. The user may also request to send an alert or a program recording request to others. Recipients may be able to request further alerts or confirm a program recording invitation if certain criteria are met.
摘要:
Method of limiting offending messages communicated over a network, such as but not limited to messages associated with Spam and DoS attacks. The message limiting optionally including limiting bandwidth or other communication capabilities associated with an entity communicating or facilitating communication of the messages.
摘要:
Method and system of providing a user interface. The method and system relating to the user of a media device to support displaying video and the user interface in a video rich fashion. The method and system may provide dynamic operations which provide increased functionality and interactivity, such as to provide a multi-functional user interface and navigation portal which provides aesthetically pleasing and functional mosaics of video, advertisements, textual and graphical displays, and other motion or non-motion based displays.