Abstract:
Systems and methods for prioritizing adaptive bit rate distribution of content are provided. In some aspects, a method includes identifying a plurality of content streams. Each of the plurality of content streams is associated with a variant feature of content to be delivered to the client device. Each variant feature of the content comprises at least one of a bit rate and a non-bit rate feature. The method also includes determining a priority of each of the plurality of content streams relative to one another based at least on the non-bit rate feature associated with each of the plurality of content streams. The method also includes providing an indication of the priority of each of the plurality of content streams to the client device.
Abstract:
A broadband gateway may manage confidential data associated with users in a home network managed and/or serviced by the broadband gateway. The broadband gateway may store the user confidential data broadband gateway in a distributed manner, wherein the confidential data may be divided into a plurality of portions and stored separately in multiple storage locations or devices. When users authorize the transfer of the confidential data, all portions may be communicated to enable aggregating them such that the confidential data may be obtained. The user confidential data may be encrypted. The broadband gateway may securely communicate and/or share the user confidential user data. This may be achieved by tracking communication of the user confidential data, by using tags incorporated into the data. The broadband gateway may also ensure that communicated confidential data is rendered unusable under certain conditions, based on use for various timing tags for example.
Abstract:
An image triggered pairing system may include at least one processor circuit. The at least one processor circuit may be configured to identify a pairable device within an area. The at least one processor circuit may be further configured to determine a pairing status of the pairable device. The at least one processor circuit may be further configured to provide, for display, a graphical representation of the area and the pairable device that indicates the pairing status of the pairable device.
Abstract:
A device for providing downlink channel access for non-operator devices includes at least one processor circuit. The at least one processor circuit is configured to establish a local connection with an operator device that is serviced by a network operator. The at least one processor circuit is configured to provide, to the operator device over the local connection, a request to establish a connection to a network, the request comprising a destination address. The at least one processor circuit is configured to receive, from the operator device over the local connection, control information for reception of a downlink channel provisioned by the network operator for the operator device. The at least one processor circuit is configured to receive downlink data associated with the destination address on the downlink channel and provide, to the operator device, uplink data associated with the destination address for transmission to the network.
Abstract:
An adaptive biometric authentication system may include a user identity reference module that is configured to maintain user identification items stored in a secure memory. The system may include a passive data aggregator that is configured to receive and aggregate data items that are passively collected by a device that is in proximity to a user. The system may include a user identity confidence level generator that is configured to generate a user identity confidence level that indicates a confidence that the user in proximity to the device is the reference user based at least in part on a comparison between the passively collected data items and the user identification items, and to update the user identity confidence level as additional passively collected data items are received. The system may include an authentication module that facilitates user authentication based at least in part on the user identity confidence level.
Abstract:
A portable authorization device may include memory and at least one circuit. The memory may be configured to store an identifier and keys corresponding to services associated with the identifier. The at least one circuit may be configured to receive, from a service accessor device, a request to access one of the services. The at least one circuit may be configured to authenticate with the service using at least the identifier and the key for the service. After authenticating with the service, the at least one circuit may be configured to sign and/or encrypt the request based at least on the key for the service, and provide the signed and/or encrypted request to the service. In one or more implementations, the at least one circuit may be configured to facilitate with providing the service to the service accessor device when the service accessor device is granted access to the service.
Abstract:
Provided are systems and methods for providing enhanced motion detection. One system providing enhanced motion detection includes a smart display, an interface subsystem including a human interface device (HID), and a console having a processor configured to form communication links with the smart display and the interface subsystem and to provide motion detection feedback, using the smart display, to a user of the HID, where the HID is configured to sense motion of the HID and utilize a predictive model to characterize the motion of the HID. One interface subsystem includes a camera to sense motion of a user of the HID. One processor is configured to negotiate a reduced response latency with the smart display.
Abstract:
Secure functions may be accessed via an authentication process utilizing a password that may be generated within a chip integrated on a device. The password may be unique per chip location, per challenge and/or per chip. The location of the chip may be determined based on GPS information and securely stored and securely communicated to an external entity. Two or more of the chip location, a generated random number sample and a key from a table of keys may be passed to a hash function that may generate a password. An external entity attempting access may be challenged to respond with a password that matches the password generated by the hash function. The response may be compared with the password generated by the hash function and access to one or more secure functions may be granted based on the comparison.
Abstract:
A system and method that enables secure system boot up with a restricted central processing unit (CPU). The system includes a memory, a segmenting device, and a security sub-system. The memory is a NAND flash memory with a block structure that comprises a guaranteed block and non-guaranteed blocks. The guaranteed block is guaranteed to be useable. A boot code is segmented into boot code segments and the boot code segments are stored separately in the guaranteed and non-guaranteed blocks. The security sub-system is configured to locate the boot code segments stored in the non-guaranteed blocks and validate them independently based on data in the guaranteed block. The security sub-system is further configured to assemble the boot code segments into the boot code and execute the boot code.