摘要:
A system, method and computer readable medium for providing secure IP-based streaming in a format independent manner is disclosed. The method on a content mastering system begins with an encoded media file consisting of content data and associated metadata. First, the metadata is read from the encoded media file. Next, the encoded media file including the content data and the associated metadata is encrypted. Then, in a streaming server system, the encoded/encrypted media file is divided into more than one data packet, streamed in accordance with one or more parameters in the metadata. Each data packet includes a portion of the encoded/encrypted media file and an offset value corresponding to a location within the encoded/encrypted media file. The data packets are then streamed to a client information processing system (i.e., the client) over a network.
摘要:
A system for providing persistent access control of protected content is disclosed. The method on a client system includes sending a first request for authentication of the client to a server system. Subsequently, the client is authenticated by the server. Next, a user on the client attempts to access a file comprising a trailer and content encrypted with an encrypting key. Then, a second request for access to the content is sent to the server by the client, wherein an identifier from the trailer is included in the second request. The identifier identifies the content or an access control policy of the content. The server determines that the second request is in accordance with an access control policy associated with the content, and grants access to the content. Lastly, the client accesses the content in accordance with the access control policy.
摘要:
A system and method for loading a segmented program into a memory for a multitasking data processing system utilizing paged virtual storage for processes is disclosed. A virtual address space having a plurality of pages for the segmented program is established. Segments of the segmented program suitable for packing end to end across page boundaries are identified. A virtual storage object over a contiguous portion of the virtual address space is defined and the segments identified for packing into the virtual storage object are mapped into the contiguous portion. Any segments not suitable for packing across page boundaries start on page boundaries in the virtual address space. Then segments corresponding to selected pages of the virtual address space are demand loaded into frames of the memory in the same manner in which they are addressed into the virtual address space.
摘要:
A method and computer program product to procure digital rights management (DRM) event data comprises collecting a first set of event data in one or more standardized event data formats, and communicating the first set of event data to an event data collection server for storage. A second set of event data may also be collected in one or more standardized event data formats, which is also communicated to the event data collection server for storage. The method and computer program product may also include storing the first set, and optional second set, of event data in a centralized repository, authorizing access to the event data, and responding to at least one query from an authorized audit computer to provide event data associated with at least one of the first set of event data and the second set of event data retrieved from the centralized repository.
摘要:
A method to procure and audit digital rights management (DRM) event data by collecting a first set of event data in a first event data format, converting the first set of event data to one or more standardized event data formats, and communicating the first set of event data to an event data collection server for storage. The method may also include collecting a second set of event data in a second event data format, converting the second set of event data to one or more standardized event data formats, and communicating the second set of event data to the event data collection server for storage. The method may also include storing the first and second sets of event data in a centralized repository, authorizing access to the event data, and performing an event data audit corresponding to the event data.
摘要:
A method and computer program product to procure digital rights management (DRM) event data comprises collecting a first set of event data in one or more standardized event data formats, and communicating the first set of event data to an event data collection server for storage. A second set of event data may also be collected in one or more standardized event data formats, which is also communicated to the event data collection server for storage. The method and computer program product may also include storing the first set, and optional second set, of event data in a centralized repository, authorizing access to the event data, and responding to at least one query from an authorized audit computer to provide event data associated with at least one of the first set of event data and the second set of event data retrieved from the centralized repository.
摘要:
A method to procure and audit digital rights management (DRM) event data by collecting a first set of event data in a first event data format, converting the first set of event data to one or more standardized event data formats, and communicating the first set of event data to an event data collection server for storage. The method may also include collecting a second set of event data in a second event data format, converting the second set of event data to one or more standardized event data formats, and communicating the second set of event data to the event data collection server for storage. The method may also include storing the first and second sets of event data in a centralized repository, authorizing access to the event data, and performing an event data audit corresponding to the event data.
摘要:
A data processing system has a virtual memory manager for swapping information between primary memory (such as RAM) and secondary memory (such as a fixed disk). The virtual memory manager employs an ager to determine which information in RAM is eligible for swapping out to the fixed disk. The ager links eligible information to an idle list. The idle list has minimum and maximum sizes. The ager has execution priorities that depend on the minimum and maximum sizes of the idle list. When the idle list is at the minimum size, the ager runs at a higher priority in order to identify information that can be swapped out. When the idle list is at or near the maximum size, the ager runs at a lower priority. The size of the idle list is dynamically adjusted to account for any information that is reclaimed from the idle list and also to account for any changes in the amount of swappable information (which is in non-resident primary memory). The priorities of the ager are adjusted according to the changes in the idle list sizes.