摘要:
A multiple party system for distributing content. In one embodiment, four parties are involved in the system: a consumer, a service provider, an authenticator, and a content provider. The distribution of content from the content provider to the consumer is carried out using a predefined protocol, mutating IDs, watermarks, and licenses. The authenticator controls the distribution of mutating IDs, verifies the identity of one or more participating parties, and provides tracking information for mapping service providers and consumers to particular, possibly watermarked, content items.
摘要:
A method of watermarking using mutating identifiers includes generating a plurality of watermarked versions of a content item, obtaining a plurality of keys for the plurality of watermarked versions of a content item, assigning each one of the plurality of obtained keys to a single one of the plurality of watermarked versions of a content item, and associating a unique license with each one of the plurality of watermarked versions.
摘要:
A point-of-sale (POS) terminal for use in performing a transaction between a first entity and a second entity at a POS, the POS terminal associated with the second entity. The POS terminal stores a second mutating identified, receives encrypted transaction information from an account information carrier device over a communication link, sending the encrypted first and second transaction information to an authenticator, and receiving the second mutating identifier from the authenticator and a processor configured to encrypt transaction information with the second mutating identifier to create second encrypted transaction information.
摘要:
Methods and system for managing manipulation of digital content stored in a content server. One method includes receiving a first mutating identifier at a content manipulation device. The first mutating identifier includes a first secret key. The method also includes generating a content request for digital content stored in the content server at the content manipulation device, the content request encrypted with the first secret key and including an identifier of the digital content; transmitting the content request to an authenticator over at least one communication link; transmitting access rights from the authenticator to the content manipulation device over at least one communication link; transmitting the digital content from the content server to the content manipulation device; manipulating the digital content at the content manipulation device based on the access rights; and marking the first mutating identifier as used at the authenticator.
摘要:
A method for transferring state information between a client device and a server, the client device being configured to select content, and the server having a memory module and being configured to store referenced content and to transmit referenced content to at least one client device. The method includes receiving a request on the server from the client device, wherein the request includes the state information from the client device; detecting whether the state information has previously been received by the server; updating the state information; and transmitting a response including the updated state information to the client device.
摘要:
A graphical user interface for setting parameters related to ad delivery, including a first window for logging into a web interface; a second window for setting at least one of a basic or advanced configuration policies; a third window for displaying at least one of a case study, a budget report, a traffic report, a data mining report, and an ad denial report.
摘要:
A multiple party system for distributing content. In one embodiment, four parties are involved in the system: a consumer, a service provider, an authenticator, and a content provider. The distribution of content from the content provider to the consumer is carried out using a predefined protocol, mutating IDs, and licenses. The authenticator controls the distribution of mutating IDs and verifies the identity of one or more participating parties.
摘要:
Techniques for virtual archiving are disclosed. In one particular exemplary embodiment, the techniques may be realized as a method for performing virtual archiving comprising applying archiving rules to a backup catalog, generating a virtual archive catalog based at least in part on a result of applying archiving rules to the backup catalog, determining a backup image associated with the virtual archive catalog becoming expired and converting the backup image into an archive image.
摘要:
One preferred embodiment of the present invention includes a cutting system with an hydraulically powered cutting member such as a cutting wheel or blade. The cutting member is arrangeable in a first configuration for substantially vertical cutting, and the cutting member is arrangeable in a second configuration for substantially horizontal cutting. One option includes a rotating joint allowing the cutting member to be arranged between the first configuration and the second configuration. In certain preferred embodiments, the cutting system is on a frame mountable in combination with a support vehicle, such as a skid steer loader.
摘要:
Redundant capacity in a memory system is utilized to facilitate active monitoring of solid state memory devices in the memory system. All or part of the data stored in an active solid state memory device, and used in an active data processing system, may be copied to at least one redundant memory device, e.g., by transitioning a memory address range that was allocated to the active memory device to the redundant memory device. By doing so, memory access requests for the memory address range, which would normally be directed to the active memory device, may instead be directed to the redundant memory device, thus enabling the active memory device to be tested (e.g., via writing and reading test data patterns to the active memory device) without interrupting system access to that memory address range.