摘要:
Mechanisms for restricting playback functionality of a media device in response to detecting unauthorized content are provided, the mechanisms being configured to: determine whether a piece of media content on a media device is unauthorized content known to be obtained through an authorized channel; and in response to determining that the piece of media content is unauthorized content: cause the media device to present a warning to a user to remove the unauthorized content; and change a setting on the media device by sending instructions to a hardware processor of the media device so that decryption of an authenticity token is inhibited for all media content on the media device, wherein the media content on the media device includes a plurality of pieces of media content.
摘要:
Systems for coordinating the presentation of media with an event are provided, the systems comprising: at least one processor that: receives media characteristic data associated with an event and target media; identifies presentation media as being target media based on the media characteristic data; determines a timing of a presentation of the presentation media; and presents the presentation media with the event according to the timing. Similar methods, and computer readable media containing instructions that perform such methods, are also provided.
摘要:
Systems, methods, and media for providing secure content information are provided. In some embodiments, systems for providing secure content information are provided, the systems comprising: a processor that creates a payload, creates a validation value, securely stores the validation value in association with a content distribution, and stores the payload in association with the content distribution. In some embodiments, systems for providing secure content information are provided, the systems comprising: a processor that receives a payload associated with a content distribution, creates a first validation value for the payload, recovers a second validation value associated with the content distribution, compares the first validation value and the second validation value, and determines if the payload has been tampered with.
摘要:
A method and apparatus for controlling the operation of a video system such as a video game system through recognition of a visual pattern, or key. For example, the presence and identity of the key may enable and select certain features of the video system. The key may suitably consist of a locator mark and a selector mark, the presence of the locator mark identifying the presence of a key, and the selector mark identifying the particular key present. A key recognition system detects the presence of the locator mark and identifies the selector mark. The locator mark is preferably of a distinctive color, readily distinguishable from background objects. The selector mark may be chosen from a limited set of colors, and the color of the selector mark may then be identified to identify the key being used. In another aspect, the locator mark is located in a particular position within the selector mark and is then used by the key detector to scale a rectangle about the selector mark. The selector mark is reduced by processing within the key detector to a reduced invariant image characterization. This reduced invariant image characterization is then compared against image data characterizations stored in a dictionary to identify the particular selector mark, and thus particular key.
摘要:
A system for creating still image or video collections for guests of amusement parks and the like a) identifies individuals by a unique tag assigned to the individual, b) automatically records the images of the individuals while they are at various attractions, c) collects the images over a communications network, d) arranges the images in a collection, and e) presents a personal set of collected images to the guest. In one embodiment of the invention, cameras are located throughout an amusement park. Each guest is associated with a unique identifier. This identifier may be contained within a readable tag, e.g., a card, badge or pendant. Tag readers identify guest when they are at a particular location and provide identification and location information to a control system. A communications network is used to interconnect the cameras, tag readers, control system and image recording devices. The control system controls the recording and storage of the appropriate image(s) associated with that guest. In accordance with an aspect of the invention, the images of the guest may be associated with prerecorded images of the amusement park. Advantageously, a reporting system captures information on guest traffic patterns throughout their visit.
摘要:
A telephone message system overcomes the problems and limitations of presently available systems that seek to enhance inter-and intra-premises communications. The system comprises a controller unit with Caller ID capabilities and one or more adjunct units that are all bridged onto a single wire-pair at a user's residential location in a parallel electrical connection. For facilitating a message routing capability, a mailbox of groups of telephone numbers are associated with a particular party at the residence. These telephone numbers are preprogrammed into the controller unit so that upon receipt of an incoming call from one of these telephone numbers, identified through caller ID, the incoming call is associated with the particular called party and the controller unit routes the incoming call directly to the called party's mail box where the calling party is able to leave a message. A user may easily access received messages stored in his or her mailbox in the message system which may be configured as either open or restricted. If the message system is open, then a user may access not only messages in his or her mailbox but also access messages in any of other mailboxes also in the system. If the message system is restricted, however, then a user is allowed access only to messages in his or her mailbox.
摘要:
A cordless telephone provides for increased features available at a portable unit that have heretofore been available only at a base unit which combines a cordless telephone fixed station and telephone answering device. The cordless telephone includes a call screening feature which allows a user at the portable unit to monitor incoming messages received over telephone lines as they are being recorded at the telephone answering device without the user having to configure the portable unit in any way during actual receipt of the message. A built-in loudspeaker is incorporated into the portable unit so that the user may easily listen to the incoming messages. Once receipt of the incoming message is completed, amplifier circuitry driving the loudspeaker is turned off. The cordless telephone also includes a caller-ID feature which informs the user at the portable unit of the identity of a preidentified calling party before the call is answered. This operation is achieved by the user entering into a memory table in the telephone each one of a plurality of desired telephone numbers for subsequent access and comparison when a caller-ID number is received from a calling party. The user also associates with each telephone number a voice message which is subsequently generated in the loudspeaker in the portable unit in response to a favorable comparison between the caller-ID signal and the stored telephone number.