Abstract:
Methods and apparatus for use in presenting information from a plurality of security domains. A first request for first data from a first data source and a second request for second data from a second data source are transmitted by a computing device. The first data source is associated with a first security domain, and the second data source is associated with a second security domain. A bridge computing device forwards the first request and/or the second request based on determining that the requests are authorized. The first data and the second data may be received and combined by the computing device.
Abstract:
One or more embodiments of the invention provide a method, apparatus, system, and article of manufacture for monitoring components of a digital cinema system. A digital cinema system utilizes an exhibitor system (that has one or more components) to display media content. A configuration of the exhibitor system is stored in the exhibitor system. The integrity of the configuration is then determined by querying each of the components. Software agents on each of the components respond to the query. Based on the configuration and the responses received, the integrity of the exhibitor system is determined.
Abstract:
A method, apparatus, and article of manufacture provide the ability to securely distribute digital media content from a first entity to a second entity through an intermediate entity. A studio token, comprising information utilized to generate a first key, is generated and distributed to the first entity. A theater token, comprising information utilized to generate a second key, is also generated and then distributed to the second entity. A data file is accepted from the first entity. The data file comprises the media content encrypted according to the first key generated from the studio token, and an authorization header that provides information utilized to generate the second key. The data file is further encrypted according to a third key wherein such further encryption comprises adding a new header to the encrypted media content. The encrypted data file is then distributed to the second entity.
Abstract:
In accordance with one or more embodiments of the present disclosure, systems and methods described herein provide for transferring data over one or more networks. A storage area network is adapted to communicate with the one or more networks. A first component is adapted to route data to and from the storage area network. A second component is adapted to route data to and from the storage area network. A gateway component is adapted to control the routing of data between the first and second components and the storage area network. The storage area network is adapted to separate metadata from the data and store the metadata in a secure server positioned behind the gateway component.
Abstract:
In accordance with one or more embodiments of the present disclosure, systems and methods described herein provide for transferring data over one or more networks. A storage area network is adapted to communicate with the one or more networks. A first component is adapted to route data to and from the storage area network. A second component is adapted to route data to and from the storage area network. A gateway component is adapted to control the routing of data between the first and second components and the storage area network. The storage area network is adapted to separate metadata from the data and store the metadata in a secure server positioned behind the gateway component.
Abstract:
A visible first watermark and invisible second and third watermarks are embedded in digital media content, in order to protect the media content from piracy. The visible first watermark protects the media content during distribution and storage, while the invisible second and third watermarks are embedded in to identify an owner and displaying entity, respectively. The second and third watermark keys can be used to detect the associated watermarks for forensic purposes. The first, second and third watermark keys are symmetric keys. A distribution entity embeds the visible first watermark in the media content using the first watermark key and embeds an invisible second watermark in the media content using the second watermark key. The distribution entity transmits the media content with the embedded visible first watermark and invisible second watermark to a displaying entity, wherein the displaying entity removes the visible first watermark from the media content using the first watermark key and embeds the invisible third watermark in the media content using the third watermark key.
Abstract:
An interactive computer program for forecasting, prioritizing, planning and tracking paint, coating and lining maintenance work for the Facility assets of industrial and commercial complexes using an IBM compatible type computer. The assets include but are not limited to buildings, tanks, towers, structures, pools, docks and their sub components such as process piping, structure steel members, concrete floors, overhead cranes, blowers, pumps, motors, vehicle hoists, hardware, paneling, conduit, facades, exterior doors, interior doors, windows, and gutters that require painting over time. The novel invention uses a four step process. The first step is to break down the facility into asset groups, master components, and sub components. Second a condition survey of the master components and subcomponents is conducted followed by making work recommendations for each sub component. The third step is to develop coating system standards where coating systems, and cost data for the maintenance work is calculated. The fourth step covers work management which includes an assessment by sub component, recommendations are accepted and altered, costs are recalculated and various types of data operations are performed such as preparing management reports, historical data is reported and cost and schedule data is reported.
Abstract:
A captive screw for use in electronic assemblies includes a screw with a shaft having a pair of spaced grooves and a cover captivating the screw and for attaching the captive screw. A knob for rotating the screw can be moved along the shaft between an extended position and a lowered position corresponding to the grooves on the shaft, and releasably locked to the shaft in either position. A lock wafer is used to secure the knob to the shaft. A release button with a large head actuates the lock wafer.