摘要:
According to one embodiment of the present invention, a method for protecting content in a broadcast-encryption-based system, where the devices in the system receive a recording key table. Each device generates a set of recording keys from the recording key table using a media key variant calculated from the broadcast encryption system's media key block. The digital content is encrypted in a title key picked by the recorder. The selected title key is also encrypted in each one of the recorder's generated recording keys. To play back the content, a player uses one of its generated recording keys to decrypt the title key and the decrypt the content. The recording key table is designed so that any two devices are guaranteed to have at least one key in common during normal operation, although during a forensic situation, this rule can be abandoned.
摘要:
Embodiments of the invention relate to obtaining forensic information for an anonymous attack of digital content without variations in a broadcast encryption system. In one embodiment a media device, being configured to record digital content on recordable media, receives digital content, a unified media key block, and a recording key table. The device calculates a set of recording keys from the recording key table using a media key variant from the unified media key block. The device then generates a title key and encrypts by the digital content in the generated title key. The device then encrypts the generated title key in each one of the calculated recording keys, adds a header including the encrypted titles keys to the encrypted digital content, and stores the encrypted digital content with the header on recordable media.
摘要:
A method of enabling a proxy to participate in a secure communication between a client and a set of servers. The method begins by establishing a first secure session between the client and the proxy. Upon verifying the first secure session, the method continues by establishing a second secure session between the client and the proxy. In the second secure session, the client requests the proxy to act as a conduit to a first server. Thereafter, the client and the first server negotiate a first session master secret. Using the first secure session, this first session master secret is then provided by the client to the proxy to enable the proxy to participate in secure communications between the client and the first server. After receiving the first session master secret, the proxy generates cryptographic information that enables it to provide a given service (e.g., transcoding) on the client's behalf and without the first server's knowledge or participation. If data from a second server is required during the processing of a given client request to the first server, the proxy issues a request to the client to tunnel back through the proxy to the second server using the same protocol.
摘要:
Systems and methods for delivering Web content are provided. The systems and methods include a mechanism for providing interest data that may be applied to filter Web content at the provider side. A hierarchical data set of user-identified interests in received from the user's Web client. The hierarchical data set is parsed, and responsive thereto, one or more keyword attribute values are extracted from the hierarchical data set. The extracted keyword values are applied to filter content for delivery to a requesting Web client.
摘要:
A method for transcoding an input stream to a desired output format using a transcoder framework. In response to a given transcoder of the framework recognizing an external reference that it cannot transcode, the method calls a subseries of specialized transcoders to transcode the external reference. After the subseries of specialized transcoders generates a transcoded external reference, that reference is returned back to the given transcoder, where it is incorporated into the transcoder's output. Transcoder sub-chains are used in this manner as modular, building blocks in the transcoder framework.
摘要:
Systems and methods for delivering Web content are provided. The systems and methods include a mechanism for providing interest data that may be applied to filter Web content at the provider side. A hierarchical data set of user-identified interests in received from the user's Web client. The hierarchical data set is parsed, and responsive thereto, one or more keyword attribute values are extracted from the hierarchical data set. The extracted keyword values are applied to filter content for delivery to a requesting Web client.
摘要:
A keyboard integrated with a computer with a mechanism for determining a pressure sensitivity needed to register a desired keystroke is disclosed. A keystroke is registered for a given key if a force on the given key exceeds the determined pressure sensitivity. A user configuration profile can be utilized to specify a needed pressure sensitivity. Pressure sensitivity can also be determined dynamically. A threshold amount of pressure needed to register a keystroke can be compared to a measured amount of pressure applied during the keystroke and if the measured pressure meets the threshold pressure, the keystroke is registered. A control module, which can include an alphanumeric scale, can be utilized to set a threshold amount of pressure needed to register a keystroke. Some embodiments can also include a threshold amount of pressure set for each individual key.
摘要:
A set of program elements (e.g., transcoders) are grouped together as an administrative unit. Instead of caching the individual outputs of each program element, preferably only the aggregate output of the set of program elements, taken as a whole, is cached. The inventive technique enables the effective re-use of intermediate content. In an illustrative client-server based implementation involving a transcoding service located at a server, the cached information may be shared across multiple server instances to obviate redundant processing. With the present invention, a caching mechanism in a complex software system may be extended in a user-configurable manner by setting up optimal intermediate caching points that are defined by groups of programs used in long computations.
摘要:
A set of replacement system window controls is provided that are instantiated as the result of the receipt of create control messages into the system message queue, instead of the built-in system window controls. The replacement window controls result in replacement control instances being created with modified properties based on user preferences. The replacement system window control instances may also include an overlay function. In response to a set focus message, a replacement control instance may create an overlay control that is displayed over the replacement control. The overlay control itself can have modified properties and may be enlarged or relocated. When the overlay control receives a release focus message, the overlay control passes its state back to the replacement control and is destroyed.
摘要:
Systems and methods for delivering Web content are provided. The systems and methods include a mechanism for providing interest data that may be applied to filter Web content at the provider side. A hierarchical data set of user-identified interests in received from the user's Web client. The hierarchical data set is parsed, and responsive thereto, one or more keyword attribute values are extracted from the hierarchical data set. The extracted keyword values are applied to filter content for delivery to a requesting Web client.