摘要:
A control signal is provided to a video data acquisition system that generates video data. In response to receiving the control signal, the video data acquisition system modifies at least a portion of the video data to produce an output signal. Authenticity of the output signal from the video data acquisition system is verified by checking that the video data includes modifications according to the control signal. If the video data does not include such modifications, it is known that the video data acquisition system needs to be checked for tampering or system failures.
摘要:
A system transmits a plurality of media programs in a network. In one embodiment of the invention, a media program distribution system determines a first resource attribute of a first media program and a second resource attribute of a second media program. The distribution system compares the first resource attribute with the second resource attribute to determine a relative value. In turn, the media server assigns a first distribution resource to the first media program and a second distribution resource to the second media program in response to the relative value and applies one of a plurality of transmission modes to each media program in response to the resource attribute and distribution resource type. Examples of distribution resources include unicast, multicast and broadcast channels. Examples of transmission modes include various protocols such as error checking protocols and encoding mechanisms such as codecs.
摘要:
A system provides secure communications between a user operated device and a computerized device. The user operated device transfers an enable security message to the computerized device, and in response, the computerized device sends a first communications enablement message to the user operated device and displays a second communications enablement message on a display of the computerized device for viewing by a user operating the user operated device. The user operated device receives the first communications enablement message from the computerized device and receives the second communications enablement message from the user and establishes a secure communications session between the user operated device and the computerized device using the first communications enablement message and the second communications enablement message. The communications enablement messages can contain key material that enable encryption between the user operated device and the computerized device.
摘要:
The invention is directed to techniques for selecting a resource from several resources to process a request from a client. A client sends the request to a data communications device (e.g., network device or switch), which measures usage information from usage meters associated with each resource (e.g., server). The data communications device then makes a usage estimate for each server of the increase in usage required for that server to process the request from the client. Then the data communications device selects one of the servers depending on the usage estimates required to respond to the client's request. The data communications device can consider other factors such as the current level of usage, past usage, and the increased cost of responding to the request. In addition, the data communications device can consider the peak usage level of each resource already established in a current billing period.
摘要:
Mechanisms and techniques provide a data communications device for inserting an audio tag into a content page during a communications session between a first computerized device and a second computerized device. A data communications device receives a request for a content page from a first computerized device and transfers the request to a second computerized device. The data communications device receives the content page from the second computerized device in response to the request, inserts an audio tag within the content page, and adjusts a connection characteristic associated with the content page to maintain the communications session between the first computerized device and the second computerized device. The data communications device then transfers the content page having the inserted audio tag and modified connection characteristic to the first computerized device.
摘要:
A distributed network-attached storage network provides content distribution using conventional file transfer protocols such as NFS and CIFS. A filer proxy accepts a client request and translates the client request to a file transfer protocol accepted at the file system having the file requested in the client request. The filer proxy generates a file handle for the file containing redundant filer proxy information to be used for failover to a backup filer proxy in the event of a network error or failure of an original filer proxy. The file handle also contains information for network security purposes such as detection of forged file handles.
摘要:
A method manages network traffic using NAT in a data communications device having a NAT data structure (e.g., a NAT table). The method includes the step of creating, in the NAT data structure, a first entry to coordinate a first data flow from a server to a client (e.g., a video channel or an audio channel of an RTSP session), and concurrently creating a second entry to coordinate a second data flow from the client to the server (e.g., a video control channel or an audio control channel of the RTSP session). The method further includes the steps of conveying a data element (e.g., a UDP packet) of the first data flow from the server to the client based on the first entry, and conveying a data element of the second data flow from the client to the server based on the second entry.
摘要:
A data security device for providing a network transport connection via a transparent network proxy that employs different encryption security mediums along a communications session between two endpoints by emulating one of the endpoints at an intermediate node such that the communication session appears as an atomic, secure connection to the endpoints yet provides appropriate security over the end-to-end connection. A sender node sends a connection request to establish a secure communication session with an intended receiver node. A transparent proxy on an intermediate node receives the request and establishes the link employing an encryption mechanism. The transparent proxy establishes a second link with the intended receiver, and applies a second, less expensive encryption mechanism. The transparent proxy combines the two links to form the trusted, secure connection but incurring only the mitigated expense over the second link.
摘要:
The invention is directed to techniques for maintaining a map of node relationships for a network of nodes (e.g., network of computers). In one example, the map of node relationships represents relationships overlaying and typically different from the network of physical connections among the nodes. Each child node periodically checks in with its parent nodes, and the parent nodes can thus determine when a child node has terminated a relationship with the parent or created a new relationship with a new parent. Changes in relationships propagate upward through the network of nodes so that each node maintains a map of the relationships among the descendants of that node. A root node receives the propagated change relationship information and maintains a map of the entire network and valid pathways through the network. The root node can use the map when responding to a request from a client to receive services from a node in the network and redirects the client to attach to a node in the network that has a valid path to the root node. The root node can then broadcast data (e.g. a stream of video data) throughout the network, which is received by all the clients attached to nodes in the network.
摘要:
A computer-implemented method and system for DRM brokering and digital asset security transcoding comprising utilizing a broker for converting content from one format into one or more alternative DRM-protected formats for distribution to end-users. The broker operates an escrow system for securing and tracking the content and information about the content and encryption keys associated with a plurality of DRM content formats. The broker further provides a common inter-DRM log format for receiving usage transaction logs and payment logs associated with transcoding and distribution the content in one or more DRM-protected content formats.