Abstract:
A Digital Rights Management (DRM) system provides a lightweight layering of encryption and decryption of keys that allows efficient use of different cryptographic techniques to effect the secure delivery of multimedia content. Asymmetric cryptography, where a public key is used to encrypt information that can only be decrypted by a matched private key, is used by the DRM system to deliver symmetric keys securely.
Abstract:
Methods and systems for determining a suitability for a mobile client to display information are disclosed. A particular exemplary method includes maintaining on the mobile client a list of first attributes relating to message cache misses of a cache memory located on the mobile client, receiving on the mobile client a set of target attributes associated with a target message, performing on the mobile client one or more matching operations between the first attributes and the target attributes to produce a matching result, and storing the target message in a cache in the mobile client dependant upon the matching result.
Abstract:
Methods and systems for blackout provisioning in a communication network. In an aspect, a method is provided for blackout provisioning in a distribution network. The method includes determining one or more affected regions, and generating a blackout key based an original key and the affected regions. The method also includes encrypting content with the blackout key to produce encrypted content, and transmitting the encrypted content and an encrypted version of the original key over the distribution network. An apparatus is provided for blackout provisioning that includes provisioning logic to determine one or more affected regions, a key generator to generate a blackout key based an original key and the affected regions, encryption logic to encrypt content with the blackout key to produce encrypted content, and a transmitter to transmit the encrypted content and an encrypted version of the original key over the distribution network.
Abstract:
Information transfer methods for exchange of information with a wireless access terminal (W-AT) includes receiving a first message from the W-AT, the first message including first information provided by the W-AT and an address of the W-AT capable of identifying the W-AT, converting the first message to an anonymized message by replacing the W-AT address with a transaction identifier (ID), transmitting the anonymized message to a remote server, receiving a first response from the remote server, the first response having response information and the anonymized address information, converting the first response to a second response by replacing the transaction ID with the W-AT address, and transmitting the second response to the W-AT.
Abstract:
A method for providing targeted content-messages on a wireless access terminal (W-AT) includes receiving metadata concerning a pool of content-messages from a remote apparatus, filtering the metadata based on a user profile on the W-AT to select at least one specific content-message, and receiving the at least one specific content-message from the pool of content-messages.
Abstract:
Various systems and methods for of generating a user profile for use in providing targeted-content-messages to a wireless access terminal (W-AT) are disclosed. For example, a user profile with at least one profile element may be provided to the W-AT, and a profile confidence level for the profile element may be also provided.
Abstract:
A targeted-content-message-related profile for use with wireless access terminals (W-ATs) may be generated by one or more usage-related rules on the W-AT itself. The usage generate rules may be used by the W-AT to generate a user profile, with the usage-related rule providing a dynamic property to the user profile. All or part of the user profile may then be used as a targeted-content-message-related profile for targeting content messages.
Abstract:
Methods and systems for determining a suitability for a mobile client to display information are disclosed. A particular exemplary method includes generating a first value for a first targeted content message based on at least a first weighted sum of first user profile attributes, a user profile attribute being a numeric quantity relating to at least one of a preference and a demographic of a user of the mobile client, comparing the first value with a stored list of second values related to respective stored messages in a cache memory of the mobile client to produce a comparison result; and updating the cache memory based on the comparison result by storing the first targeted content message in the cache memory if the comparison result indicates a higher desirability of the first targeted content message over at least one stored message.
Abstract:
A Digital Rights Management (DRM) system provides a lightweight layering of encryption and decryption of keys that allows efficient use of different cryptographic techniques to effect the secure delivery of multimedia content. Asymmetric cryptography, where a public key is used to encrypt information that can only be decrypted by a matched private key, is used by the DRM system to deliver symmetric keys securely.
Abstract:
Methods and systems for receiving targeted content messages on a wireless access terminal (W-AT) are disclosed. For example, a particular method may include selecting at least one reception time based on a user profile and a targeted content message delivery schedule, and receiving a targeted content message at the selected reception time.