Abstract:
A control signal is provided to a video data acquisition system that generates video data. In response to receiving the control signal, the video data acquisition system modifies at least a portion of the video data to produce an output signal. Authenticity of the output signal from the video data acquisition system is verified by checking that the video data includes modifications according to the control signal. If the video data does not include such modifications, it is known that the video data acquisition system needs to be checked for tampering or system failures.
Abstract:
A system transmits a plurality of media programs in a network. In one embodiment of the invention, a media program distribution system determines a first resource attribute of a first media program and a second resource attribute of a second media program. The distribution system compares the first resource attribute with the second resource attribute to determine a relative value. In turn, the media server assigns a first distribution resource to the first media program and a second distribution resource to the second media program in response to the relative value and applies one of a plurality of transmission modes to each media program in response to the resource attribute and distribution resource type. Examples of distribution resources include unicast, multicast and broadcast channels. Examples of transmission modes include various protocols such as error checking protocols and encoding mechanisms such as codecs.
Abstract:
Network devices include proxies and where multiple proxies are present on a network, they can probe to determine the existence of other proxies. Where more than two proxies are present and thus different proxy pairings are possible, the proxies are programmed to determine which proxies should form a proxy pair. Marked probe packets are used by proxies to discover each other and probing is done such a connection can be eventually formed even if some probe packets fail due to the marking. Asymmetric routing can be detected and proxies configured for connection forwarding as necessary.
Abstract:
A GUI and CDN server device provide user modifiable selections of preferences for delivery treatment, and map the user selections to technical operational parameters in the CDN servers for effecting the requested delivery treatment. Users typically find it beneficial to interact with a file (content) entity in terms of the user visible delivery treatment. The server device provides the ability to define the delivery treatment according to the manner in which the user finds most beneficial. However, the CDN operational parameters for effecting such delivery are not readily available or understood by a typical user. Using the GUI, the CDN server identifies a content entity, and receives at least one user selection variable indicative of delivery treatment of the identified content entity. A correlator maps the received user selections to operational parameters according a set of rules, and a delivery engine effects delivery of the content entity according to the mapped operational parameters to provide delivery results according to the preferred delivery treatment.
Abstract:
Presently disclosed are apparatus and methods for coordinating the delivery of messages and/or message notifications among multiple messaging media and message services so that the successful delivery of one copy of a message results in the deletion of other, redundant message copies still in transit to the recipient and the cancellation of any other message waiting notifications still pending. The system may be implemented with a network-connected device (such as but not limited to a server, switch, or router) containing or having connected to it a user interface, a coordination server, and a plurality of message services. Embodiments of the invention thus provide message delivery management that is more user-friendly, computationally- and resource-efficient and more adaptable to changing user preferences and user locations/addresses.
Abstract:
Transparent network devices intercept messages from non-transparent network devices that establish a connection. Transparent network devices modify these messages to establish an inner connection with each other. The transparent network devices mimic at least some of the outer connection messages to establish their inner connection. The mimicked messages and any optional reset messages are intercepted by the transparent network devices to prevent them from reaching the outer connections. Transparent network devices modify network traffic, using error detection data, fragmentation data, or timestamps, so that inner connection network traffic inadvertently received by outer connection devices is rejected or ignored by the outer connection network devices. Transparent network devices may use different sequence windows for inner and outer connection network traffic. To prevent overlapping sequence windows, transparent network devices monitor the locations of the inner and outer connection sequence windows and may rapidly advance the inner connection sequence window as needed.
Abstract:
A data processing device, such as a television set top box, receives user-selected content data from a remote source over a network in response to user initiated content selection information. The data processing device stores the user-selected content data (e.g., readable or playable content data such as movies, text, audio, etc.) in an appropriate storage location of the data processing device. The data processing device enables a user to access only a portion of the user-selected content data stored therein. If the user forgoes a right to selectively retrieve certain content data, the data processing device enables user access to other user-selected content data in the storage location. Thus, if a user experiences a “change in heart,” the user may forgo a right to play back certain content data for a right to selectively retrieve different portions of user-selected content data in the data processing device.
Abstract:
The invention is directed to techniques, in a first content distribution node, for maintaining a first catalog of a first content distribution node. The first content distribution node detects a modification condition associated with the first catalog of the first content distribution node. The modification condition identifies a potential requirement to modify the first catalog. In response to detecting the modification condition, the first content distribution node performs a version-based comparison technique on the first catalog. The version-based comparison technique compares at least one of gap version information and entry version information associated with the modification condition to gap version information and entry version information associated with the first catalog to identify a catalog change condition. If the catalog change condition indicates that a catalog modification is required for the first catalog, the first content distribution node modifies the first catalog in accordance with the catalog change condition.
Abstract:
A system of network proxies distributes data to multiple servers. Each network proxy is associated with a server. A network proxy intercepts a client request for data. If the network proxy determines that the request can be served using a copy of data stored on the local server, rather than the data stored on a remote server, it diverts the request to the local server. If the network proxy determines that the request cannot be served using a data from the local server, the network proxy diverts the request to a remote server storing the primary copy of the data. A server map specifies the locations of the primary copies of data. When a primary copy of data is updated on one of the servers, the associated network proxy propagates the updated data to the other servers. The servers can provide data from files, e-mail services, databases, or multimedia services.
Abstract:
Presently disclosed are methods and apparatus for analyzing packets and packet flows to detect covert communications channels (including reverse tunnels) in real time. These systems actively probe a suspicious connection in ways that are not possible in prior art log-based techniques and may initiate countermeasures against discovered covert channels. The present system may be implemented in a network device, such as an intrusion detection system, content engine, or other intermediary device employing a web cache. Embodiments automatically detect suspicious activity at particular source addresses by using relatively simple tests to detect suspect packets that should receive more extensive scrutiny. After more rigorous secondary testing (optionally including active probing techniques), suspect packets are either returned to the occasionally-checked state or flagged for further action, such as raising an alert or taking automatic countermeasures against the covert channel or its originators.