摘要:
Apparatus and methods for delivery of content in a packetized network. In one embodiment, content and/or services can be associated with an IP address. The IP address may be assigned to multiple server devices disposed at geographically diverse locations. Delivery caches may advertise, via a routing protocol, one or more addresses to clients of the network. Route selection may be configured based on one or more rules such as geographical proximity, available bandwidth, server availability, server load, delivery cost, client subscription level, licensing rules, and/or other metric. Delivery caches may be configured to control their availability and/or load through IP address withdrawals and announcements. When the “closest” delivery cache may become unavailable (e.g., it is not announcing the IP address for the content the client is trying to obtain, a route to the next “closest” available delivery cache may be utilized.
摘要:
A technique is provided for securely transferring programming content from a first device in a first layer, e.g., a trusted domain, to a second device in a second layer, e.g., outside the trusted domain. When a user requests that the first device transfer protected content to the second device, the first device needs to authenticate the second device. After the second device is authenticated, the first device may transfer to the second device the protected content, together with a rights file associated therewith. The rights file specifies the rights of the second device to use the protected content, according to its security level indicative of its security. These rights may concern, e.g., the number of times that the second device may subsequently transfer the protected content to other devices, the time period within which the second device may play the protected content, etc.; The higher the security level of the second device is, the more rights accorded thereto. Indeed, the second device may need to meet a minimum security level requirement in order for it to receive or keep the protected content.
摘要:
A method of operating a cable network having a plurality of legacy-capable CPE and a plurality of wideband CPE operatively coupled thereto, the method comprising: distributing at least one first program comprising a plurality of content elements, said act of distributing comprising sending said content elements over multiple carriers of said network; and providing program information data as part of said distributing such that said wideband CPE can receive and decode said at least one first program, said program information being structured so as to preclude said legacy-capable CPE from decoding said first program.
摘要:
Methods and apparatus for delivery of packetized content (e.g., video, audio, data, etc.) over a content delivery network. In one embodiment, the content is packetized using an Internet Protocol (IP), and delivered by a service provider over both managed and unmanaged networks to subscribers of the provider, so as to provide delivery at any time, at any location, and via any designated user device. The delivered content may originate from the service provider, third-party content sources (e.g., networks or studios), the subscriber(s) themselves, or other sources including the Internet. Use of a common control and service functions within the network afford the ability to integrate or blend services together, thereby affording the service provider and subscriber new service and economic opportunities. Content delivery sessions may also be migrated from one device to another. A network-based user interface infrastructure, and gateway-based client-side architecture, are also disclosed.
摘要:
A technique is provided for securely transferring programming content from a first device in a first layer, e.g., a trusted domain, to a second device in a second layer, e.g., outside the trusted domain. When a user requests that the first device transfer protected content to the second device, the first device needs to authenticate the second device. After the second device is authenticated, the first device may transfer to the second device the protected content, together with a rights file associated therewith. The rights file specifies the rights of the second device to use the protected content, according to its security level indicative of its security. These rights may concern, e.g., the number of times that the second device may subsequently transfer the protected content to other devices, the time period within which the second device may play the protected content, etc.; The higher the security level of the second device is, the more rights accorded thereto. Indeed, the second device may need to meet a minimum security level requirement in order for it to receive or keep the protected content.
摘要:
Methods and apparatus for centralized content, media and data delivery and access within a premises such as, e.g., a residence. In one embodiment, the apparatus comprises a remotely manageable premises device that acts as a centralized client networking platform, providing gateway services such as network management as well as traditional content and high-speed data delivery functions. The device also acts as the shared internet connection for all devices in the premises via a cable modem, sharing personal and DVR content such as video, music and photos (and any associated metadata) throughout the premises, and providing both a wired and wireless network in the home. Telephony services utilizing e.g., embedded multimedia terminal adapter (eMTA) and/or Wi-Fi architectures may also be provided via the device. The device can also provide a trusted domain for content or data, as well as allowing a subscriber total mobility in the home.
摘要:
A technique is provided for securely transferring programming content from a first device in a first layer, e.g., a trusted domain, to a second device in a second layer, e.g., outside the trusted domain. When a user requests that the first device transfer protected content to the second device, the first device needs to authenticate the second device. After the second device is authenticated, the first device may transfer to the second device the protected content, together with a rights file associated therewith. The rights file specifies the rights of the second device to use the protected content, according to its security level indicative of its security. These rights may concern, e.g., the number of times that the second device may subsequently transfer the protected content to other devices, the time period within which the second device may play the protected content, etc.; The higher the security level of the second device is, the more rights accorded thereto. Indeed, the second device may need to meet a minimum security level requirement in order for it to receive or keep the protected content.
摘要:
Methods and apparatus for extending the capabilities of a client device (e.g., consumer premises equipment in a cable network) using one or more on-demand applications. In one aspect, an improved media handling extension is provided within the device with which the various application(s) can interface to facilitate on-demand interaction between the CPE and the head end or other network entity. In one exemplary embodiment, the client device comprises a digital set-top box (DSTB) having Java-enabled middleware adapted to implement the OCAP/ACAP/MHP mandated Java Media Framework (JMF) APIs. A specially configured application is downloaded to the DSTB and run, the application configuring the paths within the device to provide, inter alia , media access to the on-demand application(s) according to one or more network specific protocols. Accordingly, the network MSO can also uniquely configure the CPE within its network for on-demand capability according to its own specific protocols from the head-end. Improved client device and head-end configurations, as well as methods of operating these systems, are also disclosed.
摘要:
A change management system to synchronize the configuration of network management applications. Traditional network management systems are maintained by handentering device lists into individual network management applications with no common-ties between the different applications. Whenever a network management application is changed or upgraded, it frequently becomes necessary to insure that the upgrade is populated throughout the network in order for devices to talk to one another in an error free way. The present invention is a system and method that automates the change management process in a real-time using a two-way communications model that permits a central database to affect changes on all or some network management applications/systems in the field, while also allowing those same field systems to affect the central database thereby reducing the time required for updating and monitoring a system when device changes take place.