Abstract:
In embodiments of the present invention improved capabilities are described for rendering a document from a server-based computing device to a client computing device when the client computing device is online, and upon request to access the document offline, the server-based computing device sends the client computing device an encrypted version of the document with limit-use encryption keys, where the encrypted document is stored in a virtual container on the client computer device where commands for coping, saving, and printing are restricted.
Abstract:
A system, a method, and a computer program for determining multiple copyright infringement events, identifying a stopped reporting repeat infringer, identifying a started reporting repeat infringer, and determining if the stopped reporting repeat infringer and the started reporting repeat infringer are using the same computer.
Abstract:
A system, a method and a computer program for determining multiple copyright infringement events, identifying a particular I P address - port number combination associated with the multiple infringement events, and notifying an ISP and/or a customer regarding the multiple copyright infringement events.
Abstract:
Methods, devices, and computer program products facilitate the application of content usage rules based on watermarks that are embedded in a content. The required content screening operations, including watermark extraction and the application of content usage enforcement actions, are organized as separate tasks. These tasks can be conducted at different times by different devices. The watermark extraction results are stored in a secure location and can be accessed by other devices at different times. These operations can be conducted by one or more trusted devices that reside in a home network. The trustworthiness of the devices can be ascertained during a device authentication process. Further, certain device capabilities can be ascertained either as part of the device authentication process, or through additional communications between the devices.
Abstract:
Disclosed is a method for digital watermark use by a mobile station. In the method, a mobile station receives a plurality of digital watermarks. The mobile station detects at least two digital watermarks in the received plurality of watermarks. Based on the at least two detected digital watermarks, a user-specific rule is applied to select a predefined action. The mobile station performs the selected predefined action.
Abstract:
Digital rights management and audience measurement systems and methods are disclosed. An example method includes receiving a request to upload media content to a content distributor, attempting to obtain a code associated with the media content, querying a program information database for program information associated with the media content using the code, and applying a business rule to the media content based on the program information.
Abstract:
Digital rights management and audience measurement systems and methods are disclosed. An example method includes receiving a request to upload media content to a content distributor, attempting to obtain a code associated with the media content, querying a program information database for program information associated with the media content using the code, and applying a business rule to the media content based on the program information.
Abstract:
Methods and systems for remote data collection and distribution include components and operations for receiving, at a server, data transmitted by a first client device via a communication network. The method may also include selecting, by one or more client devices associated with the communication network, a second device to receive the data. The method may further include establishing a connection between the server and the selected second device via the communication network. The method may also include automatically transmitting the received data to the second device using the connection via the communication network. The method may further include causing, by the one or more client devices, the second device to execute a predefined operation.
Abstract:
At least one user data stream is layer 2/3 processed [Fig.3. ref. 24], physical layer processed [Fig. 3, ref. 26] and radio frequency processed [Fig. 3, ref. 28]. A watermark/signature is embedded [Fig. 3, ref. 30] at least one of layer 2/3, [Fig. 3, ref. 24] physical layer [Fig. 3, ref. 24] or radio frequency [Fig. 3, ref.28], producing an embedded wireless communication. The embedded wireless communication is wirelessly transferred [Fig. 3, ref. 36]. The embedded wireless communication is received [Fig. 3, ref. 34] and the watermark/signature is extracted [Fig. 3, ref. 34] from the embedded wireless communication.