摘要:
Enhanced multimedia content on physical media interacts with the user through a media player and the Internet. Enhanced multimedia utilizes IDs for pieces of content on the media and a media key block. On the enhanced media is a file with a list of URLs. As the enhanced media plays a title requiring an external permission for decryption, the media player accesses the URL for that title and obtains the permission. The permission may be purchased or provided for free. Secure encryption and transmission of permission is accomplished by broadcast encryption using a media key block. Each media has a unique set of keys that allow the media player to process the media key block; however, each media follows a unique path through the media key block. All legitimate media players obtain the media key; circumvention devices cannot decipher the media key block.
摘要:
Enhanced multimedia content on physical media interacts with the user through a media player and the Internet. Enhanced multimedia utilizes IDs for pieces of content on the media and a media key block. On the enhanced media is a file with a list of URLs. As the enhanced media plays a title requiring an external permission for decryption, the media player accesses the URL for that title and obtains the permission. The permission may be purchased or provided for free. Secure encryption and transmission of permission is accomplished by broadcast encryption using a media key block. Each media has a unique set of keys that allow the media player to process the media key block; however, each media follows a unique path through the media key block. All legitimate media players obtain the media key; circumvention devices cannot decipher the media key block.
摘要:
A method for processing an analog video signal that represents a work for which rights information is asserted. The signal includes a rights assertion mark (RAM) in the video portion of the signal within the visible picture such that capture of the picture will include the mark. The signal also includes copy control information (CCI) bits in the vertical blanking interval of the signal for representing copying and redistribution rules. If the RAM is present and the CCI bits are present, then the copying and redistribution rules represented by the CCI bits are applied. If the RAM is present but the CCI bits are not, then the most restrictive copying and redistribution rules that can be represented by the CCI bits are applied.
摘要:
A system and method for virtual linking a wireless device to another device is disclosed herein. The system includes an access point and a controller configured to mediate transmissions between the wireless device and the another device. The system further includes a virtual device table and a permissions filter to ensure virtual linking between devices that have matching access right and requested services. The wireless device and the another device may have the same or dissimilar protocols.
摘要:
VEIL modulation is a method of “subliminal” encoding of data in a video image that is similar to a watermark. The encoding consists of alternately proportionately raised and lowered luminance on selected horizontal scan lines. The encoding can be detected using a notch filter centered at half the line frequency. The encoding is lost, however, if the resolution of the video signal is changed downward. The invention preserves the encoding by coding alternate groups of lines, not alternate lines. This allows detection with a notch filter even after a reduction in resolution.
摘要:
A method for processing an analog video signal that represents a work for which rights information is asserted. The signal includes a rights assertion mark (RAM) in the video portion of the signal within the visible picture such that capture of the picture will include the mark. The signal also includes copy control information (CCI) bits in the vertical blanking interval of the signal for representing copying and redistribution rules. If the RAM is present and the CCI bits are present, then the copying and redistribution rules represented by the CCI bits are applied. If the RAM is present but the CCI bits are not, then the most restrictive copying and redistribution rules that can be represented by the CCI bits are applied.
摘要:
Disclosed embodiments include a method performed by a network access point, such as a short-range wireless communications switch or Bluetooth base station unit, to provide a neighbor list for neighboring short-range wireless communications switches or network access points in a communications network. The method includes, at the short-range wireless switch, sending at least one signal to neighboring wireless devices, wherein sending the signal is done without assistance of a mobile unit or a system controller for the communications network. The method further includes receiving a response signal from at least one neighboring short-range wireless switch, and identifying the one neighboring short-range wireless switch based on the received response signal. Additionally, the method includes providing a neighbor list that identifies the one neighboring short-range wireless switch. Numerous alternative embodiments are also described.
摘要:
Content is distributed from a source to a sink only if the sink is within a predetemined distance from a source. In one embodiment, a control signal is sent over a limited range channel to the sink and the content is then sent only if the control signal is received properly by the sink. In another embodiment, the content is encrypted and the encryption key is sent over the limited range channel. The content is also sent to the sink, but the sink cannot decode the content unless it has a proper copy of the decoding key. The control signal can be sent over a wireless channel, an IR channel, or an AC line. The content is sent over the Internet, either using a standard wired channel or over a wireless channel.
摘要:
In a network, a method is disclosed for wirelessly exchanging communications with at least one mobile unit. The network includes first and second base stations units coupled to the network, and may include a system controller. The method includes: receiving a communication signal from the second base station unit, wherein the first and second base station units are configured to employ a wireless communications protocol, and wherein the wireless communications protocol does not provide for handoff of communications links between base station units; at the first base station unit, determining if the second base station unit has been synchronized based on the communication signal; at the first base station unit, if the second base station unit is synchronized, then synchronizing an internal clock based on the synchronized second base station, wherein the synchronizing is performed without assistance from a system controller.
摘要:
An enhanced telephone system provides a communication channel between a telephone associated with a customer and a party using another telephone. The system includes a mediator server. The mediator server monitors conversations and when a predetermined event is detected, for example, when the customer terminates a conversation, a message is sent to the other telephone, and optionally, to the customer's telephone as well. The message includes an audio clip, and optionally other elements, such as graphics and alphanumeric characters.