摘要:
A method and business model are provided for augmenting programming content at a remote location, such as a hotel, with the programming content ordinarily provided under subscription to a home location, such as a user's home. A user agreement is formed between a user and a home service provider, delineating the content provided by the home service provider to the home location. A service provider agreement is formed between the home service provider and a remote service provider, delineating content to be broadcast from the home location to the remote location. Local content is selectively augmented by the home content and displayed on a viewing device at the remote location. The user may remotely access settings and functions of a home set top box while at the remote location.
摘要:
The present invention provides a means for managing title keys by establishing logical partitions of title keys encrypted with the same binding information. The invention supports delayed and background processing of title keys when binding information changes. This invention supports proper accounting for devices required to recover rebinding processing when devices fail or go offline unexpectedly during processing. The invention uses binding context which represents a set of data that can be used to determine if the binding information used to encrypt a set of title keys is outdated and allow for rebinding to the current cluster binding information level.
摘要:
Provisioning bandwidth for a digital media stream, the digital media stream characterized by a bandwidth, including receiving, by a media server from a media display device, information describing a user's anticipated viewing requirements; selecting, by the media server in dependence upon the information describing the user's anticipated viewing requirements, a first channel and at least one second channel; and before receiving, by the media server from the media display device, a user selection of either channel: adapting a first portion of the bandwidth for transmission of the content of a first channel and a second, smaller portion of the bandwidth for transmission of the content of the second channel; and transmitting, multiplexed together in the digital media stream, the content of the first channel and the content of the second channel, the content of the second channel transmitted with a lower quality than the content of the first channel.
摘要:
Systems and methods for delivering Web content are provided. The systems and methods include a mechanism for providing interest data that may be applied to filter Web content at the provider side. A hierarchical data set of user-identified interests in received from the user's Web client. The hierarchical data set is parsed, and responsive thereto, one or more keyword attribute values are extracted from the hierarchical data set. The extracted keyword values are applied to filter content for delivery to a requesting Web client.
摘要:
Provided are techniques for providing a home or business security system that relies upon data encryption for both communication and the storage of content. The disclosed technology incorporates all the devices necessary for a comprehensive security system, including, but not limited to, controllers, monitors, alarms and communication media. The system may include an unlimited number of devices and, further, individual devices may be added and removed as needed. Users may define and change the boundaries of a security system or, in other words, decide what devices to include or not include in such a system. A defined boundary does not need to be confined to a single location. In one embodiment, the claimed subject matter incorporates xCP based broadcast encryption technology.
摘要:
Provided is a method for rendering media content wherein a request to render a first media content stored in a first partition is received, wherein the first partition stores the first and a second media content; the media content is correlated to a first management key block (MKB), binding ID (IDb) and authorization table (AT); the first MKB, IDb and AT are compared to a current MKB, IDb and AT; and if any of the first MKB, IDb or AT do not correspond to the current MKB, IDb or AT, respectively, generating a second partition by rebinding the first media content with respect to the current MKB, IDb and AT to generate a title key; and associating the first media content, the current MKB, IDb, AT and title key with the second partition, wherein the second media content remains associated with the first MKB, IDb, AT and partition.
摘要:
Provided is a method for providing a home or business security system that relies upon data encryption for both communication and the storage of content. The disclosed technology incorporates all the devices necessary for a comprehensive security system, including, but not limited to, controllers, monitors, alarms and communication media. The system may include an unlimited number of devices and, further, individual devices may be added and removed as needed. Users may define and change the boundaries of a security system or, in other words, decide what devices to include or not include in such a system. A defined boundary does not need to be confined to a single location. In one embodiment, the claimed subject matter incorporates xCP based broadcast encryption technology.
摘要:
Provided is a method for the distribution and control of digital content such that Quality of Experience (QoE) is maintained. Content is protected from when the content is encrypted to when it is used. To ensure the QoE of particular content, a content owner embeds a list of required or preferred components that must be employed to render the content. The content owner's list of required or preferred components specifies specific components “trusted” to correctly process the content. The specified chain of preferred components is compared to possible devices in the system that processes the content. If there are multiple acceptable devices for a specific link, a preference system is employed to determine the device that executed the particular part of the chain. The preference system is based upon a number of factors, such as, but not limited to, performance characteristics, user preferences, expected stability, power requirements and system preferences.
摘要:
Provided are techniques for the distribution and control of digital content such that Quality of Experience (QoE) is maintained. Content is protected from when the content is encrypted to when it is used. To ensure the QoE of particular content, a content owner embeds a list of required or preferred components that must be employed to render the content. The content owner's list of required or preferred components specifies specific components “trusted” to correctly process the content. The specified chain of preferred components is compared to possible devices in the system that processes the content. If there are multiple acceptable devices for a specific link, a preference system is employed to determine the device that executed the particular part of the chain. The preference system is based upon a number of factors, such as, but not limited to, performance characteristics, user preferences, expected stability, power requirements and system preferences.
摘要:
Provided is techniques for the distribution and control of digital content such that Quality of Experience (QoE) is maintained. Content is protected from when the content is encrypted to when it is used. To ensure the QoE of particular content, a content owner embeds a list of required or preferred components that must be employed to render the content. The content owner's list of required or preferred components specifies specific components “trusted” to correctly process the content. The specified chain of preferred components is compared to possible devices in the system that processes the content. If there are multiple acceptable devices for a specific link, a preference system is employed to determine the device that executed the particular part of the chain. The preference system is based upon a number of factors, such as, but not limited to, performance characteristics, user preferences, expected stability, power requirements and system preferences.