摘要:
Embodiments related to the establishment of a relationship between wireless devices are disclosed. In one disclosed embodiment, a wireless device includes an image capture device, a wireless transmitter and receiver, a logic subsystem, and memory comprising instructions executable by the logic subsystem to capture a first image via the image capture device, identify authentication features of the first image, and receive authentication data from a remote media device via the wireless receiver that comprises authentication features of a second image. The instruction further cause the logic subsystem to compare the authentication features of the second image to the authentication features of the first image to establish a trusted relationship with the remote media device if the authentication features of the second image exhibit a pre-determined relationship to the authentication features of the first image.
摘要:
The claimed subject matter provides a system and/or a method that facilitates ensuring media integrity utilizing a root license and a leaf license. An interface component can receive at least one of media, content, data, or presentation with at least one element. A license component can associate a root license to the at least one of media, content, data, or presentation and a leaf license to at least one element, the leaf license is bound to the root license to ensure the at least one of media, content, data, or presentation and the at least one element include license protection.
摘要:
Automatically recovering from broken network connections in streaming media scenarios. Server software executing on the server communicates with client software executing on the client during the streaming media session. If the streaming media session is interrupted, the server software and the client software exchange messages to associate the client with a client state stored by the server and to re-synchronize playback of the content.
摘要:
A method of crossfading a plurality of audio files comprising opening a first process, opening a second process hosting an audio renderer in which a first audio file of the plurality of audio files is cross faded with a second audio file of the plurality of audio files.
摘要:
Systems and methods for midstream determination of varying available bandwidth for streaming content between two network entities are described. During content streaming, a client requests a server to surge the content transmission rate. One or more bandwidth measurements are taken during the surge to determine if the increased transmission rate can be adequately managed. If the increased transmission rate can be adequately managed, the client may request the server to transmit remaining content at a transmission rate that is not greater than the increased, or surged, transmission rate. In a multi-bitrate file scenario, the surge rate may be higher than the rate of the fastest useable stream. In such a case, the fastest useable stream is selected. If the increased transmission rate is not suitable for future transmission, then the rate may remain at the original transmission rate.
摘要:
Systems, methods, and data structures are described which allow or caching streaming media file in a manner that allows for storage and retrieval of portions of the streaming media file that are temporally non-contiguous and/or encoded at differing bit rates.
摘要:
A request is received to play compressed video data in a reverse direction. A process identifies a most recent key frame received and decodes the most recent key frame. The process then identifies delta frames received after the most recent key frame and decodes these identified delta frames. The decoded delta frames are then played in the reverse direction. Additionally, compressed audio data can be decoded and played in the reverse direction along with the video data.
摘要:
Techniques are disclosed herein for changing a user's avatar attributes based on information that is pertinent to the user and that comes from a variety of sources. The user's electronic device may contain a multitude of information about the user, their lifestyle, their current mood, etc. Embodiments provide an application programming interface (API) that allows various applications on the user's electronic device, or elsewhere, to communicate with an avatar platform such that avatar attributes may be changed based on information from a wide variety of applications.
摘要:
Techniques are disclosed herein for changing a user's avatar attributes based on information that is pertinent to the user and that comes from a variety of sources. The user's electronic device may contain a multitude of information about the user, their lifestyle, their current mood, etc. Embodiments provide an application programming interface (API) that allows various applications on the user's electronic device, or elsewhere, to communicate with an avatar platform such that avatar attributes may be changed based on information from a wide variety of applications.
摘要:
Technology for protecting a digital content including a first content protection system capable of decrypting the digital content, the digital content including an inclusion list; a linkable library providing access for an application to the functionality of the first content protection system, the application including a second content protection system; and a means for evaluating the second content protection system to determine if the second content protection system is on the inclusion list.