摘要:
A classification method and system for possible content alteration of a media work may include criteria regarding content that is feasible for alteration. Such criteria may be maintained in records that are accessible to an interested party. Some embodiments may include a record of primary authorization rights applicable to a possible content alteration. A further embodiment feature may include a record of secondary authorization rights applicable to substitute altered content incorporated in a derivative version. Various exemplary identifier markup schemes indicative of a location or category of an alterable media content component may be implemented for audio, visual, and audio/video alterable content.
摘要:
A classification method and system for possible content alteration of a media work may include criteria regarding content that is feasible for alteration. Such criteria may be maintained in records that are accessible to an interested party. Some embodiments may include a record of primary authorization rights applicable to a possible content alteration. A further embodiment feature may include a record of secondary authorization rights applicable to substitute altered content incorporated in a derivative version. Various exemplary identifier markup schemes indicative of a location or category of an alterable media content component may be implemented for audio, visual, and audio/video alterable content.
摘要:
A classification method and system for possible content alteration of a media work may include criteria regarding content that is feasible for alteration. Such criteria may be maintained in records that are accessible to an interested party. Some embodiments may include a record of primary authorization rights applicable to a possible content alteration. A further embodiment feature may include a record of secondary authorization rights applicable to substitute altered content incorporated in a derivative version. Various exemplary techniques may be used to provide audio and/or visual substitution options in a derivative version of the media work in accordance with applicable alteration guidelines.
摘要:
Apparatus are provided that include a communication circuit, monitoring circuit, and an alert circuit and a method is provided that includes receiving at least a portion of a protected set of files including a tripwire file and at least one normal file, the at least one normal file including a number of attributes, and the tripwire file lacking an attribute of the at least one normal file; and detecting a sign of an activity related to the tripwire file of the protected set of files, wherein the protected set of files includes a protected database, the protected database including the at least one normal file and the tripwire file; and generating a signal indicating an unauthorized activity related to the protected set of files in response to the detected sign of an activity related to the tripwire file.
摘要:
Embodiments include an apparatus, device, system, computer-program product, and method. In an embodiment, a method is provided. The method includes receiving a request for a content of a computer-readable file. The method also includes searching the computer-readable file for the requested content, the computer-readable file including at least one representation of a hand-formed mark distributed to the computer-readable file in response to a machine-distinguishable tag associated with the hand-formed mark. The method further includes outputting the at least one representation of a hand-formed mark.
摘要:
Certain aspects relate to providing an at least one audio source to at least one user. Certain aspects relate to selectively modifying an at least one first sound source to be provided to the at least one user, wherein the at least one first sound source is combined with an at least one second sound source, and wherein the selectively modifying is performed relative to the at least one audio source based at least in part on at least some specific information of the at least one first sound source. Other aspects relate to selectively modifying the at least one first sound source to be provided to the at least one user relative to the at least one second sound source based at least in part on at least some specific information of the at least one first sound source.
摘要:
A computationally implemented method includes, but is not limited to: associating one or more fees with one or more communiqués that were transmitted by a particular end user and addressed to one or more secret entities; and providing one or more billing statements that indicate the one or more fees without at least directly identifying the one or more secret entities, the providing of the one or more billing statements being in accordance with one or more conditional directives of the particular end user to conditionally obfuscate the one or more secret entities with respect to the one or more billing statements. In addition to the foregoing, other method aspects are described in the claims, drawings, and text forming a part of the present disclosure.
摘要:
A computationally implemented method includes, but is not limited to: associating one or more fees with one or more communiqués affiliated with one or more secret entities and addressed to a particular end user; and providing one or more billing statements that indicate the one or more fees without at least directly identifying the one or more secret entities, the providing of the one or more billing statements being in accordance with one or more conditional directives of the particular end user to conditionally obfuscate the one or more secret entities with respect to the one or more billing statements. In addition to the foregoing, other method aspects are described in the claims, drawings, and text forming a part of the present disclosure.
摘要:
A computationally implemented method includes, but is not limited to: intercepting a communiqué that is determined to be affiliated with a source entity and that is addressed to an end user to prevent, at least temporarily, the communiqué from being received by a communication device associated with the end user; and releasing the communiqué to the communication device in response to at least detecting occurrence of one or more environmental aspects associated with the communication device, the releasing of the communiqué being in accordance with one or more conditional directives of the end user to conditionally obfuscate the communiqué determined to be affiliated with the source entity. In addition to the foregoing, other method aspects are described in the claims, drawings, and text forming a part of the present disclosure.
摘要:
A computationally implemented method includes, but is not limited to: intercepting communiqué aspect data that is directed to an end user entity and that indicates one or more aspects of a communiqué directed to the end user entity and that is affiliated with a particular source entity, the intercepting of the communiqué aspect data being in accordance with one or more conditional directives of the end user entity to conditionally obfuscate the communiqué affiliated with the source entity; and transmitting to the end user entity, in response to intercepting the communiqué aspect data and in lieu of transmitting direct indication of the communiqué to the end user entity, covert indicator data that upon reception by the end user entity covertly indicates the one or more aspects of the communiqué. In addition to the foregoing, other method aspects are described in the claims, drawings, and text forming a part of the present disclosure.