Abstract:
Disclosed is an electronic device that selects a password and encrypts it utilizing a public key of a public/private encryption key pair. The electronic device then provides the encrypted password to a client device when an access request is received from the client device. The client device proceeds to obtain an unencrypted version of the password by submitting the encrypted password to a private key server (which utilizes the private key of the public/private encryption key pair to decrypt the password) and receiving the decrypted password in return. The client device then returns the password to the electronic device which, upon receiving the decrypted password, allows access from the client device. The device generates the password once during operation or each time an access request is received.
Abstract:
A method for controlling access to deprecated methods of an implementation is provided. The method includes receiving a request to access a method that has been marked as deprecated and building a call stack for the request. Also included is inspecting the call stack to determine if the request is from an application outside of the implementation. The method further includes acting on the request in accordance with a control policy defined by a pluggable policy.
Abstract:
A method and apparatus implementing a separate child context for each applet (or similar element) of a browser. A described embodiment of the present invention provides one or more child contexts that correspond to elements in the HTML for a web page displayed by a browser. For example, each applet executed by the browser has a corresponding and separate child context that points to an associated portion of a browser memory. The browser also has a parent context, which each child context points to. When a graphic is displayed via a widget, the widget draws the graphic (such as a panel or a non-pressed button) in the child context of the applet and sets a “damage” flag in the child context. When the browser performs its main browser loop, it checks the status of the damaged flag for each element (including each applet). If the browser finds a damage flag that is set, this means that something was written into the portion of the browser memory corresponding to the child context and that the parent buffer needs updating. In this case, the browser “pulls” the information from the portion of browser memory corresponding to the child context into the parent buffer, which is then used to update the display screen.
Abstract:
A computer-implemented system and method for pool-based identity generation and use for service access is disclosed. The method in an example embodiment includes seeding an identity generator with a private key; retrieving independently verifiable data corresponding to a service consumer; using the independently verifiable data to create signed assertions corresponding to the service consumer; generating a non-portable identity document associated with the service consumer, the identity document including the signed assertions; signing the identity document with the private key; and conveying the signed identity document to the service consumer via a secure link.
Abstract:
Systems and methods securely provide media content from a media server to a media client via a network. The media content is segmented to create multiple media segments that are each identified in a playlist, and at least one of the media segments is encrypted using a cryptographic key. The cryptographic key is also identified in the playlist, and the playlist is provided from the media server to the media client via the network. The various media segments and cryptographic keys may then be requested from and provided by the media server using hypertext transport protocol (HTTP) or similar constructs to allow the media client to receive and decrypt the various segments of the media content.
Abstract:
In general, a method and apparatus for decoding an encoded digital image is disclosed. An image decoder receives an encoded digital image and determines if the image can be directly decoded and displayed on a display monitor. By directly decoding the encoded digital image, the image decoder eliminates unnecessary intermediate decoding processes.
Abstract:
Systems and methods securely provide media content from a media server to a media client via a network. The media content is segmented to create multiple media segments that are each identified in a playlist, and at least one of the media segments is encrypted using a cryptographic key. The cryptographic key is also identified in the playlist, and the playlist is provided from the media server to the media client via the network. The various media segments and cryptographic keys may then be requested from and provided by the media server using hypertext transport protocol (HTTP) or similar constructs to allow the media client to receive and decrypt the various segments of the media content.
Abstract:
A method and apparatus that allows the user to escape from unwanted Java modal dialog boxes displayed by an applet, even though the Java modal dialog box does not contain a user interface designed to cancel or remove the dialog box from the display. The described embodiment allows the user to use so-called “escape” keys to indicate that the Java modal dialog box should be removed and/or closed. In general, these escape keys have other purposes in addition to removing the Java modal dialog box. A first escape key is a “back” key. Although the back key is typically used within a web browser to return to a previously viewed web page, in dialog box mode, the effect of the back key is to remove the dialog box from the display (under certain circumstances, as discussed below). A second escape key in the described embodiment is the “goto” key. The present invention detects a goto key press before the key press is sent to the Java modal dialog box, and replaces the page containing the errant applet with a new page.
Abstract:
A system and method for receiving and rendering Unicode text in multiple languages on a set top box is disclosed. The system includes a set top box which receives an application program from a broadcast station. The set top box executes the application program. The application program includes Unicode character encoding text for display on a television coupled to the set top box. An operating environment running on the set top box includes a Unicode encoding engine which the application program invokes to display Unicode text. The encoding engine determines the language of characters in the text and invokes a rendering engine corresponding to the language of each character, thus enabling characters from different languages to be mixed in the same text string. The rendering engine has specific knowledge of the language, such as rendering direction and context. One or more glyph sets may be plugged in to the set top box to support different languages and fonts according the locale in which the set top box will be used. The rendering engine renders the characters using the glyphs in the glyph sets. Furthermore, glyphs not present in the set top box may be downloaded to the set top box along with the application program and rendered by a rendering engine. A set top box and method for efficiently storing and quickly retrieving the large number of Japanese Unicode characters using a hash table and hashing method in the set top box is also disclosed.
Abstract:
A computer-implemented system and method for pool-based identity generation and use for service access is disclosed. The method in an example embodiment includes seeding an identity generator with a private key; retrieving independently verifiable data corresponding to a service consumer; using the independently verifiable data to create signed assertions corresponding to the service consumer; generating a non-portable identity document associated with the service consumer, the identity document including the signed assertions; signing the identity document with the private key; and conveying the signed identity document to the service consumer via a secure link.