摘要:
Generating a device certificate. A method of generating a device certificate comprising forming a template that will generate a device certificate upon the occurrence of a triggering event, filling in an authorization root certificate section of the template; filling in an authorization certificate section of the template, filling in a group certificate section of the template, and forming a device certificate section of the template.
摘要:
Described herein are one or more implementations for transforming (e.g., transcoding) DRM-protected digital media content while retaining associated DRM-information (e.g., a user license its related information).
摘要:
A system of controlling playback of digital media. A system of controlling playback of digital media comprising a CE device having a secure clock and a license having a specified grace period disposed upon the CE device in which a digital media file governed by the license may be played for the grace period upon failure of the secure clock.
摘要:
A method of generating a device certificate. A method of generating a device certificate comprising, constructing a device certificate challenge at a device, sending information to a device certificate individualization server in response to the device certificate challenge, validating the device certificate challenge by the device certificate individualization server, and validating the device certificate response by the device.
摘要:
A method, non-transitory computer readable medium and application management computing device includes receiving at an application management computing device a request from a client computing device which requires authentication. A determination is made by the application management computing device whether user network identification information currently is stored for the requesting client computing device. The stored user network identification information for the authentication is obtained by the application management computing device when the user network identification information is determined to be currently stored for the requesting client computing device. The authentication is completed by the application management computing device with the obtained user network identification information.
摘要:
A method for forming an array area with a surrounding periphery area, wherein a substrate is disposed under an etch layer, which is disposed under a patterned organic mask defining the array area and covers the entire periphery area is provided. The patterned organic mask is trimmed. An inorganic layer is deposited over the patterned organic mask where a thickness of the inorganic layer over the covered periphery area of the organic mask is greater than a thickness of the inorganic layer over the array area of the organic mask. The inorganic layer is etched back to expose the organic mask and form inorganic spacers in the array area, while leaving the organic mask in the periphery area unexposed. The organic mask exposed in the array area is stripped, while leaving the inorganic spacers in place and protecting the organic mask in the periphery area.
摘要:
Described are a system and method for clustering wireless devices in a wireless network. The system comprises a wireless access point and a plurality of wireless computing units grouped into a cluster as a function of a predetermined parameter. The cluster includes a cluster head unit and at least one cluster member unit. The at least one cluster member unit utilizes a first power level when wirelessly communicating with the cluster head unit, and the cluster head unit utilizes a second power level when communicating with the AP.
摘要:
Systems and methods consistent with the present invention enable routing table updates are performed by optimally utilizing the resources of a node without exceeding the resources of the node. Using feedback on the amount of resources available to the nodes, such as in terms of available memory, the node may make new connections before breaking old one where those updates will not exceed available resources. This is referred to as make-before-break. When not enough resources are available, the node will break old connections before making new ones. This is referred to as break-before-make. Unlike the strict make-before-break and break-before-make models, this “loose” make-before-break method considers the amount of available resources in view of the resources required to perform the routing table updates without a node failure. Routes may also be tagged to prioritize the addition of more important routes and the deletion of less significant routes. Methods and systems consistent with the present invention, therefore, provide a routing table update method with which routing table updates are achieved without crashing and at the same time minimizing black hole intervals.
摘要:
Scalable and modular WDM systems to provide a number of processing functions which include, among others, signal detection, signal monitoring, wavelength conversion, signal regeneration, and generation of new WDM channels. Such WDM systems include a platform with an optical switching network and module slots for engaging WDM modules of different processing functions. Both protocol transparent and opaque WDM modules may be included in such a WDM system to provide versatile applications.
摘要:
Magneto-optical storage media designed for optical storage systems such as disk drives with optical flying heads. Dielectric layers are designed and implemented to maximize optical coupling between the flying optical head and the media and to reduce variations of signals with flight height of the flying optical head.