摘要:
Capturing metadata, including: a data capture device, wherein the data capture device captures notes made by a user and stores the notes as captured data; a data ingest computer, including a connection interface to connect to the data capture device and receive the captured data from the data capture device, and a data conversion component to convert the captured data to formatted data; and a data repository, connected to the data ingest computer, wherein the data repository is connected to a network. Keywords include smart pen and on set metadata acquisition.
摘要:
Content is distributed from a source to a sink only if the sink is within a predetermined geographic locality. In one embodiment, a signature request is sent to the sink. The sink obtains an actual signature compares it to the requested signature, and if the requested signature and the actual signature resemble each other sufficiently closely, then the content is sent to the sink The signature is compiled from parameters obtained from appropriate parameter detectors. The parameter detectors generate, detect and monitor various signals required for determining the locality of the sink.
摘要:
A system and method for virtual linking a wireless device to another device is disclosed herein. The system includes an access point and a controller configured to mediate transmissions between the wireless device and the another device. The system further includes a virtual device table and a permissions filter to ensure virtual linking between devices that have matching access right and requested services. The wireless device and the another device may have the same or dissimilar protocols.
摘要:
A plurality of reference nodes that are attached to the network are correlated with geographic location. Communication latency between the reference nodes are used to approximate the location of a target node once the communication latency from one of the reference nodes to the target node is determined.
摘要:
Disclosed embodiments include a method performed by a network access point, such as a short-range wireless communications switch or Bluetooth base station unit, to provide a neighbor list for neighboring short-range wireless communications switches or network access points in a communications network. The method includes, at the short-range wireless switch, sending at least one signal to neighboring wireless devices, wherein sending the signal is done without assistance of a mobile unit or a system controller for the communications network. The method further includes receiving a response signal from at least one neighboring short-range wireless switch, and identifying the one neighboring short-range wireless switch based on the received response signal. Additionally, the method includes providing a neighbor list that identifies the one neighboring short-range wireless switch. Numerous alternative embodiments are also described.
摘要:
Enhanced multimedia content on physical media interacts with the user through a media player and the Internet. Enhanced multimedia utilizes IDs for pieces of content on the media and a media key block. On the enhanced media is a file with a list of URLs. As the enhanced media plays a title requiring an external permission for decryption, the media player accesses the URL for that title and obtains the permission. The permission may be purchased or provided for free. Secure encryption and transmission of permission is accomplished by broadcast encryption using a media key block. Each media has a unique set of keys that allow the media player to process the media key block; however, each media follows a unique path through the media key block. All legitimate media players obtain the media key; circumvention devices cannot decipher the media key block.
摘要:
Content is distributed from a source to a sink only if the sink is within a predetermined geographic locality. In one embodiment, a signature request is sent to the sink. The sink obtains an actual signature compares it to the requested signature, and if the requested signature and the actual signature resemble each other sufficiently closely, then the content is sent to the sink The signature is compiled from parameters obtained from appropriate parameter detectors. The parameter detectors generate, detect and monitor various signals required for determining the locality of the sink.
摘要:
A plurality of reference nodes that are attached to the network are correlated with geographic location. Communication latency between the reference nodes are used to approximate the location of a target node once the communication latency from one of the reference nodes to the target node is determined.
摘要:
A system and method for virtual linking a wireless device to another device is disclosed herein. The system includes an access point and a controller configured to mediate transmissions between the wireless device and the another device. The system further includes a virtual device table and a permissions filter to ensure virtual linking between devices that have matching access right and requested services. The wireless device and the another device may have the same or dissimilar protocols.
摘要:
Enhanced multimedia content on physical media interacts with the user through a media player and the Internet. Enhanced multimedia utilizes IDs for pieces of content on the media and a media key block. On the enhanced media is a file with a list of URLs. As the enhanced media plays a title requiring an external permission for decryption, the media player accesses the URL for that title and obtains the permission. The permission may be purchased or provided for free. Secure encryption and transmission of permission is accomplished by broadcast encryption using a media key block. Each media has a unique set of keys that allow the media player to process the media key block; however, each media follows a unique path through the media key block. All legitimate media players obtain the media key; circumvention devices cannot decipher the media key block.