摘要:
The disclosure details the implementation of an apparatus, method, and system for an integrated data security layer (IDSL). In one aspect, the IDSL enables entities wishing to control users' data access, whether they are content owners, corporate system administrators, or concerned parents wishing to prevent ill-gotten data to work across their systems, to manage the access of content. The IDSL provides the ability to curb such unwanted access of data. The IDSL has the ability to obtain content information, policy rules regarding the content, and unique identifiers for the content from content providers and/or their proxies. Further, the IDSL has the ability to provide such information to IDSL clients. Such clients employ the obtained information to analyze and control access to the content. Additionally, the IDSL may act as a lookup facility to create, maintain, and update associations between a content information, policy rules, and unique identifiers of content, and any other associated information as detailed throughout. The IDSL coordinates with an IDSL database to identify interassociated items in the generation of entries regarding any related information.
摘要:
An initialization vector (IV) is employed to decrypt a block of a stream that has been encrypted with Cypher Block Chaining (CBC) encryption, without requiring decryption of previous blocks within the stream. For example, a listener who accesses a distribution point to retrieve encrypted content authenticates himself to an application server that regulates access to encrypted content on the distribution point, and responsively receives a key. The listener then requests access to a reference point within the encrypted content stream somewhere after its beginning (e.g., using preview clips). The distribution point relates the reference point to a corresponding block of the encrypted stream, and identifies an IV previously used for encryption of that block. The distribution point provides the associated encrypted block of content and the IV to the listener to enable mid-stream rendering of the encrypted content, without requiring the listener to decrypt previous blocks within the encrypted stream.
摘要:
An initialization vector (IV) is employed to decrypt a block of a stream that has been encrypted with Cypher Block Chaining (CBC) encryption, without requiring decryption of previous blocks within the stream. For example, a listener who accesses a distribution point to retrieve encrypted content authenticates himself to an application server that regulates access to encrypted content on the distribution point, and responsively receives a key. The listener then requests access to a reference point within the encrypted content stream somewhere after its beginning (e.g., using preview clips). The distribution point relates the reference point to a corresponding block of the encrypted stream, and identifies an IV previously used for encryption of that block. The distribution point provides the associated encrypted block of content and the IV to the listener to enable mid-stream rendering of the encrypted content, without requiring the listener to decrypt previous blocks within the encrypted stream.
摘要:
A multi-layer electrode (246) and method of fabrication thereof in which a conductive region (244) is separated from a barrier layer (222) by a first conductive liner (240) and a second conductive liner (242). First conductive layer (240) comprises Pt, and second conductive liner (242) comprises a thin layer of conductive oxide. The multi-layer electrode (246) prevents oxygen diffusion through the top conductive region (244) and reduces material variation during electrode patterning.
摘要:
An expandable mobile computer system is described. The mobile computer system includes a peripheral expansion interface that allows a large number of different sized expansion peripherals to be created and used with the mobile computer system. A pair of rails forms a first opening of the peripheral expansion interface wherein an expansion peripheral device may be inserted. Large expansion peripherals may extend in a first dimension out of that first opening. The rails also form a second opening along a second dimension orthogonal to the first dimension. Large expansion peripherals may also extend outward from the peripheral expansion interface in the second dimension.
摘要:
An initialization vector (IV) is employed to decrypt a block of a stream that has been encrypted with Cypher Block Chaining (CBC) encryption, without requiring decryption of previous blocks within the stream. For example, a listener who accesses a distribution point to retrieve encrypted content authenticates himself to an application server that regulates access to encrypted content on the distribution point, and responsively receives a key. The listener then requests access to a reference point within the encrypted content stream somewhere after its beginning (e.g., using preview clips). The distribution point relates the reference point to a corresponding block of the encrypted stream, and identifies an IV previously used for encryption of that block. The distribution point provides the associated encrypted block of content and the IV to the listener to enable mid-stream rendering of the encrypted content, without requiring the listener to decrypt previous blocks within the encrypted stream.
摘要:
An initialization vector (IV) is employed to decrypt a block of a stream that has been encrypted with Cypher Block Chaining (CBC) encryption, without requiring decryption of previous blocks within the stream. For example, a listener who accesses a distribution point to retrieve encrypted content authenticates himself to an application server that regulates access to encrypted content on the distribution point, and responsively receives a key. The listener then requests access to a reference point within the encrypted content stream somewhere after its beginning (e.g., using preview clips). The distribution point relates the reference point to a corresponding block of the encrypted stream, and identifies an IV previously used for encryption of that block. The distribution point provides the associated encrypted block of content and the IV to the listener to enable mid-stream rendering of the encrypted content, without requiring the listener to decrypt previous blocks within the encrypted stream.
摘要:
A method of forming deep isolation trenches in the fabrication of ICs is disclosed. The substrate is prepared with deep isolation trenches. The isolation trenches are partially filled with a first dielectric material. An etch mask layer is deposited on the substrate and used to remove excess first dielectric material on the surface of the substrate. The isolation trenches are then completely filled with a second dielectric material. Excess second dielectric material is then removed from the surface of the substrate.
摘要:
A multi-layer electrode (246) and method of fabrication thereof in which a conductive region (244) is separated from a barrier layer (222) by a first conductive liner (240) and a second conductive liner (242). First conductive layer (240) comprises Pt, and second conductive liner (242) comprises a thin layer of conductive oxide. The multi-layer electrode (246) prevents oxygen diffusion through the top conductive region (244) and reduces material variation during electrode patterning.
摘要:
A headset has one or two earpieces, an adjustable microphone boom, and a means for securing the headset to the user. The earpiece includes a speaker element for generating sound and a sound funneling device for funneling sound from the speaker element to an ear canal of the user. The sound funneling device rests within a concha and at the entrance of the ear canal for funneling sound and for stabilizing the earpiece against an ear of the user. In the preferred embodiment, the sound funneling device includes a first end which is open-ended and facing the speaker element, and a second end which includes one or more apertures and rests at the entrance of the ear canal. The first end has a circumference which is larger than a circumference of the second end which focuses the sound from the speaker element to the ear canal. A speaker cushion is configured to fit around the speaker element and the sound funneling device and preferably provides a means for coupling the speaker element to the sound funneling device. The speaker cushion is compressible to facilitate positioning the second end of the sound funneling device against the concha of the user's ear. A small speaker is mounted inside the speaker element. The headset is preferably secured to the user by a headband. The earpiece is coupled to the headband by a ball and socket joint integrally formed as part of the earpiece. The ball and socket design enables the earpiece to be easily maneuvered against the ear.