Abstract:
Systems and methods for handling and outputting broadcast content and secondary content based on metadata embedded in the broadcast content are provided. Embodiments may include receiving broadcast content, wherein the received broadcast content includes metadata embedded into the broadcast content. Embodiments may also include decoding the broadcast content to extract the metadata from the broadcast content and outputting the broadcast content in collaboration with the extracted metadata.
Abstract:
A method is provided for protecting a host device from untrusted applications. Upon detecting an initial installation and/or execution of an application, the application is executed within a first virtual machine having a first level of monitoring and/or operating constraints. The application may be executed alone in the first virtual machine. Operation of the application may be monitored to ascertain the level of trust for the application. Upon ascertaining a change in a level of trust in the application, the application may be migrated to execute within a second virtual machine having a second level of monitoring and/or operating constraints, wherein the second level of monitoring and/or operating constraints has different operating restrictions than the first level of monitoring and/or operating constraints.
Abstract:
Implementations relate to systems and methods for aggregating and presenting data related to geographic locations. Geotag data related to geographic locations and associated features or attributes can be collected to build a regional profile characterizing a set of locations within the region. Geotag data related to the constituent locations, such as user ratings or popularity ranks for restaurants, shops, parks, or other features, sites, or attractions, can be combined to generate a profile of characteristics of locations in the region. The platform can generate recommendations of locations to transmit to the user of a mobile device, based for instance on the location of the device in the region as reported by GPS or other location service and the regional profile. Geotag data can include audio data analyzed using region-specific terms, and user recommendations can be presented via dynamic menus based on regional profiles, user preferences or other criteria.
Abstract:
Methods, and computing devices implementing the methods, that enable client computing devises to work in conjunction with a server device to identify and temporarily defend against non-benign applications (e.g., malware, etc.) and other threats before a more permanent solution or defense (e.g., a patch or software upgrade) becomes available and installed on the client computing device. The server device may be configured to receive reports from the client computing devices, receive threat feeds from a third-party server (e.g., threat intelligence servers, etc.), and use information included in the received threat feed and information included in the received reports to analyze, in the server computing device, a software application that is operating on a client device in multiple passes. The server may generate one or more threat scores and send the one or more threat scores to the client computing device for use in devising a customized security response.
Abstract:
Systems and methods adapted for providing heterogeneous media services in communication systems, such as using transport layer security deferral and/or medium redirect, are disclosed. In operation according to embodiments, heterogeneous media services may be facilitated by obtaining, by a hybrid broadcast receiver of a receiver device, a computer parsable object comprising information regarding content segment availability and access, wherein the hybrid broadcast receiver is adapted to obtain content via both broadcast and broadband connections for a streaming client of the receiver device. The hybrid broadcast receiver of embodiments may further operate to evaluate the computer parsable object for one or more content segment entries indicating transport layer security is to be invoked with respect to a connection used for obtaining one or more content segments and to overwrite the one or more content segment entries preventing the transport layer security from being invoked by the streaming client.
Abstract:
Systems, methods, and devices of various embodiments enable a distributed broadcast receiver implementation. In various embodiments, a gateway may redistribute broadcast content to one or more personal devices over a local network. In some embodiments, system time information may be obtained by the personal devices and a local replica of system time information may be maintained within a light server executing within the personal device and functioning as a local synch server. In some embodiments, system time information may be obtained by the gateway and a local replica of system time information may be maintained within a light server executing within the gateway and functioning as a local synch server.
Abstract:
Systems and methods are described, which prompt a UE that is receiving at least a physical layer signal from a broadcasting station to look for a new emergency alert. In embodiments, the UE renders content from the broadcasting station based on information received in transmitted physical layer frames. Included within a physical layer frame are bits, such as, ea_wake_up_bits. If the state change of the ea_wake_up_bits indicates that a new emergency message, referencing a new emergency alert, is being transmitted within the physical layer frame, the LTE locates the new emergency message within the physical layer frame and acts on the emergency message if it is applicable to the station to which the UE is tuned. If the emergency message is applicable, the UE acts on the emergency message by using information in the emergency message to locate and render the emergency alert. The emergency message may point to an EAS present on a linear TV service.
Abstract:
A method for securely connecting to a remote server that provides improved Internet security. In the method, a client receives a request to connect to a remote server associated with a domain name. The client, when resolving the domain name, determines whether the remote server supports at least one predetermined IP layer security protocol. The client performs a key exchange protocol with the remote server to generate at least one shared secret in response to determining that the remote server supports the at least one predetermined IP layer security protocol. The client connects to the remote server using the at least one shared secret in the IP layer security protocol.
Abstract:
An example method of facilitating communication between a mobile device positioned within an internal network and a target peer includes intercepting, at a proxy executing on a mobile device, a communication to initiate a real-time communication connection with a target peer. The mobile device is coupled to a cellular network, and the internal network is separated from one or more external networks by network address translation (NAT). The example method also includes determining whether the target peer is reachable via the cellular network. The example method further includes when it is determined that the target peer is reachable via the cellular network, sending over the cellular network to the target peer a request to communicate in a first protocol.
Abstract:
A method for securely connecting to a remote server that provides improved Internet security. In the method, a client receives a request to connect to a remote server associated with a domain name. The client, when resolving the domain name, determines whether the remote server supports at least one predetermined IP layer security protocol. The client performs a key exchange protocol with the remote server to generate at least one shared secret in response to determining that the remote server supports the at least one predetermined IP layer security protocol. The client connects to the remote server using the at least one shared secret in the IP layer security protocol.