摘要:
Methods for managing the distribution of client bits to client computers are disclosed. The methods of the present invention are particularly suited for use in a network environment in which one or more clients are networked with at least one server via a communications network. The communications network can be a LAN, WAN, intranet, or the Internet. The client version of one or more selected applications software components (the “managed components”) is determined on the client computer. The client queries the server to determine the most current version of each of the managed components. If the client version is not the most current version, or if the client version is missing on the client computer, a determination is made whether to download the most current version onto the client. If the determination is made to install or upgrade one or more managed components, the most current version of each of the selected managed components is downloaded onto the client computer. The installation or upgrade package is authenticated as it is being downloaded by validating a signature that is appended to the package. After the installation or upgrade package has been authenticated and downloaded onto the client computer, the package is installed onto the client.
摘要:
Enhanced telephony computer user interfaces seamlessly integrate and leverage the features of personal computers and telephones. The manner in which media is presented at a computing system can also be modified automatically in response to detected telephone operations. These modifications can include pausing media in response to a detected telephone call and/or adjusting a volume of the media presentation. The media presentation/volume can also be resumed/restored upon detecting that the telephone call has terminated.
摘要:
A first device is used to initiate and direct a rights-management transaction, such as content licensing, acquisition, or activation, on behalf of a second device. The first device may, for example, be a desktop computer, laptop computer, or electronic kiosk at a bricks-and-mortar store. The second device may, for example, be a handheld computer that is cradled to establish communicative connectivity with the first device. A user interacts with the first device to initiate a transaction on behalf of the second device. The first device then obtains the information from the second device that is necessary to perform the transaction on behalf of the second device, communicates with a server, and provides the result of the server communication to the first device. Thus, the first device acts as a proxy for the second device.
摘要:
A key management interface that allows for different key protection schemes to be plugged into a digital rights management system is disclosed. The interface exposes the functionality of signing data, decrypting data encrypted using a public key, and re-encrypting data encrypted using the public key exported by the interface to a different authenticated principal (i.e., a different public key). Thus, a secure interface can be provided such that the data does not enter or leave the interface in the clear. Such an interface exports private key operations of signing and decryption, and provides security and authentication for the digital asset server in licensing and publishing. During publishing, a client can encrypt asset keys such that only a specified entity can decrypt it, using a plug-in, for example, that implements the aforementioned interface. During licensing, the license issuing entity can use the interface to decrypt keys for assets and to sign licenses and rights labels such that the asset is protected and consumable by a host digital rights management platform. The interface thus provides an abstraction for key operations.
摘要:
A secure first process uses a non-secure software object by hosting said non-secure software object in a separate second process, where the first process's address space is inaccessible to the second process. The first process communicates with the second process, preferably by means of a COM API that the second process exposes to the first process. The application that runs in the second process may expose APIs of the hosted non-secure object to the first process, and the first process may communicate with the non-secure object hosted in the second process through this API. In a preferred embodiment, the second process renders its output in a child window of the first process, so that the use of a second process to host non-secure software objects is transparent to a user of the first process.
摘要:
A method and system for generating and/or servicing requests for information requested across networks, such as the Internet, is disclosed. In some embodiments, supplemental request header information is included with HyperText Transfer Protocol (HTTP) requests for a web page. The supplemental request header information may identify one or more characteristics of an application for which the HTTP request was generated. In further embodiments, the Internet server servicing the HTTP request having such a supplemental request header may extract and use information from this header to select and/or modify the requested web page to best suit the requesting application's status and/or current characteristic.
摘要:
An enhanced computer telephony integration system that facilitates the interaction and integration of a private branch exchange (PBX) with a client computer on a computer network. An enhanced telephony (ET) server connects to the PBX and to all running instances of an ET client on a user's computers. The ET server acts as a proxy between the ET clients and the PBX. The ET clients register with the ET server for a certain telephone extension. The ET server then can forward telephone action requests (such as placing a telephone call) from the registered ET clients to the PBX servicing the telephone extension. Moreover, the ET server can relay telephone events (such as an incoming call) from the PBX to all registered clients. The ET server facilitates seamless integration of telephone and personal computer features to provide a rich user-controlled computer-telephone integration for a user.
摘要:
Methods and systems for rendering information pages are described. A page is divided into panes which are rendered by individual pane renderers. The pane renderers can be shared between pages, or even re-used across multiple applications. Rendering support components or objects are provided and can provide access to shared services or data (e.g. ads, user preferences, scripts, and styles) that might be required by multiple panes on a page. Page descriptions comprising pane renderers are created dynamically in a prescribed fashion by an application. A page renderer service in a platform then processes the page description and causes the appropriate RSOs to be called, initialized, and used by the pane renderers to render the page.
摘要:
A web page optimization engine for optimizing a web page is described. The web page optimization engine includes a keyword mapping engine configured to generate a keyword map including a listing of keywords, where each keyword is associated with one or more web pages. The web page optimization engine further includes a map reversal engine configured to generate a web page map including a listing of web page subject matters, where each web page subject matter is associated with one or more keywords based on the associations from the keyword map. The web page optimization engine yet further includes a web page generation engine configured to generate a web page for a web page subject matter in the web page map to include at least one of the one or more keywords for that web page subject matter.
摘要:
A key management interface that allows for different key protection schemes to be plugged into a digital rights management system is disclosed. The interface exposes the functionality of signing data, decrypting data encrypted using a public key, and re-encrypting data encrypted using the public key exported by the interface to a different authenticated principal (i.e., a different public key). Thus, a secure interface can be provided such that the data does not enter or leave the interface in the clear. Such an interface exports private key operations of signing and decryption, and provides security and authentication for the digital asset server in licensing and publishing. During publishing, a client can encrypt asset keys such that only a specified entity can decrypt it, using a plug-in, for example, that implements the aforementioned interface. During licensing, the license issuing entity can use the interface to decrypt keys for assets and to sign licenses and rights labels such that the asset is protected and consumable by a host digital rights management platform. The interface thus provides an abstraction for key operations.