摘要:
A Digital Rights Management (DRM) system provides a lightweight layering of encryption and decryption of keys that allows efficient use of different cryptographic techniques to effect the secure delivery of multimedia content. Asymmetric cryptography, where a public key is used to encrypt information that can only be decrypted by a matched private key, is used by the DRM system to deliver symmetric keys securely.
摘要:
Methods and systems for blackout provisioning in a communication network. In an aspect, a method is provided for blackout provisioning in a distribution network. The method includes determining one or more affected regions, and generating a blackout key based an original key and the affected regions. The method also includes encrypting content with the blackout key to produce encrypted content, and transmitting the encrypted content and an encrypted version of the original key over the distribution network. An apparatus is provided for blackout provisioning that includes provisioning logic to determine one or more affected regions, a key generator to generate a blackout key based an original key and the affected regions, encryption logic to encrypt content with the blackout key to produce encrypted content, and a transmitter to transmit the encrypted content and an encrypted version of the original key over the distribution network.
摘要:
A Digital Rights Management (DRM) system provides a lightweight layering of encryption and decryption of keys that allows efficient use of different cryptographic techniques to effect the secure delivery of multimedia content. Asymmetric cryptography, where a public key is used to encrypt information that can only be decrypted by a matched private key, is used by the DRM system to deliver symmetric keys securely.
摘要:
Systems and methodologies are described that facilitate digital rights management in a wireless communication environment. Generally, content (e.g., data files, video images, etc.) can be downloaded and maintained in its encrypted state to ensure protection of digital rights. Consequently, programming applications that utilize such content decrypt the content at the time of use (e.g., playback or access). A file interface can be provided that allows applications to access encrypted content utilizing a standardized file I/O interface. Decryption of content can be transparent to individual applications utilizing encrypted content. Therefore, modifications cryptographic algorithms or procedures and changes in key sizes need not affect the programming applications.
摘要:
A Digital Rights Management (DRM) system provides a lightweight layering of encryption and decryption of keys that allows efficient use of different cryptographic techniques to effect the secure delivery of multimedia content. Asymmetric cryptography, where a public key is used to encrypt information that can only be decrypted by a matched private key, is used by the DRM system to deliver symmetric keys securely.
摘要:
Methods and systems for providing user information from a wireless access terminal (W-AT) to a remote apparatus without revealing a primary identity of the user of the W-AT include generating an alternate user identifier for the W-AT, and providing the alternate user identifier and first information related to targeted-content-message information and/or user profile information to the remote apparatus.
摘要:
A method is disclosed for encrypting a multimedia file including parsing the multimedia file to identify a media data portion; encrypting the media data portion; and, combining the encrypted media data portion with a non-encrypted non-media data portion. A method is also disclosed for playing a multimedia file including parsing the multimedia file to identify an unencrypted metadata portion; using the unencrypted metadata portion to locate a position of interest in the media file, the position of interest having an associated encrypted media data portion; and, decrypting the associated encrypted media data portion. An apparatus for performing the methods is also disclosed herein.
摘要:
Methods and systems for determining a suitability for a mobile client to display information are disclosed. A particular exemplary method includes maintaining on the mobile client a list of first attributes relating to message cache misses of a cache memory located on the mobile client, receiving on the mobile client a set of target attributes associated with a target message, performing on the mobile client one or more matching operations between the first attributes and the target attributes to produce a matching result, and storing the target message in a cache in the mobile client dependant upon the matching result.
摘要:
Methods and systems for determining a suitability for a mobile client to display information are disclosed. For example, a method for determining a suitability for a mobile client to receive a targeted content message includes generating user profile data by the mobile client, receiving a set of target profile data associated with the targeted content message, the set of target profile data being descriptive of the targeted content message, comparing the user profile data with the target set of profile data to produce a set of confidence-level data, a target set of profile data describing the content of a respective targeted-content message, and storing the targeted content message in the mobile client based upon the set of confidence-level data.
摘要:
Methods and systems for receiving targeted content messages on a wireless access terminal (W-AT) are disclosed. For example, a particular method may include selecting at least one reception time based on a user profile and a targeted content message delivery schedule, and receiving a targeted content message at the selected reception time.