摘要:
Provisioning bandwidth for a digital media stream, the digital media stream characterized by a bandwidth, including receiving, by a media server from a media display device, information describing a user's anticipated viewing requirements; selecting, by the media server in dependence upon the information describing the user's anticipated viewing requirements, a first channel and at least one second channel; and before receiving, by the media server from the media display device, a user selection of either channel: adapting a first portion of the bandwidth for transmission of the content of a first channel and a second, smaller portion of the bandwidth for transmission of the content of the second channel; and transmitting, multiplexed together in the digital media stream, the content of the first channel and the content of the second channel, the content of the second channel transmitted with a lower quality than the content of the first channel.
摘要:
Provided are techniques for providing a home or business security system that relies upon data encryption for both communication and the storage of content. The disclosed technology incorporates all the devices necessary for a comprehensive security system, including, but not limited to, controllers, monitors, alarms and communication media. The system may include an unlimited number of devices and, further, individual devices may be added and removed as needed. Users may define and change the boundaries of a security system or, in other words, decide what devices to include or not include in such a system. A defined boundary does not need to be confined to a single location. In one embodiment, the claimed subject matter incorporates xCP based broadcast encryption technology.
摘要:
Provided is a method for rendering media content wherein a request to render a first media content stored in a first partition is received, wherein the first partition stores the first and a second media content; the media content is correlated to a first management key block (MKB), binding ID (IDb) and authorization table (AT); the first MKB, IDb and AT are compared to a current MKB, IDb and AT; and if any of the first MKB, IDb or AT do not correspond to the current MKB, IDb or AT, respectively, generating a second partition by rebinding the first media content with respect to the current MKB, IDb and AT to generate a title key; and associating the first media content, the current MKB, IDb, AT and title key with the second partition, wherein the second media content remains associated with the first MKB, IDb, AT and partition.
摘要:
Provided is a method for providing a home or business security system that relies upon data encryption for both communication and the storage of content. The disclosed technology incorporates all the devices necessary for a comprehensive security system, including, but not limited to, controllers, monitors, alarms and communication media. The system may include an unlimited number of devices and, further, individual devices may be added and removed as needed. Users may define and change the boundaries of a security system or, in other words, decide what devices to include or not include in such a system. A defined boundary does not need to be confined to a single location. In one embodiment, the claimed subject matter incorporates xCP based broadcast encryption technology.
摘要:
Provided is a method for the distribution and control of digital content such that Quality of Experience (QoE) is maintained. Content is protected from when the content is encrypted to when it is used. To ensure the QoE of particular content, a content owner embeds a list of required or preferred components that must be employed to render the content. The content owner's list of required or preferred components specifies specific components “trusted” to correctly process the content. The specified chain of preferred components is compared to possible devices in the system that processes the content. If there are multiple acceptable devices for a specific link, a preference system is employed to determine the device that executed the particular part of the chain. The preference system is based upon a number of factors, such as, but not limited to, performance characteristics, user preferences, expected stability, power requirements and system preferences.
摘要:
An indication initiated by a user within a first local user application that specifies user-selected data sharable by the first local user application is received at an operating system of a first computing device used by the user. A determination is made as to whether any other user applications share data compatibility with at least one portion of the specified user-selected data. In response to determining that at least one other user application shares the data compatibility with the at least one portion of the specified user-selected data, a data share indication to the at least one other user application is configured.
摘要:
Systems and methods for delivering Web content are provided. The systems and methods include a mechanism for providing interest data that may be applied to filter Web content at the provider side. A hierarchical data set of user-identified interests in received from the user's Web client. The hierarchical data set is parsed, and responsive thereto, one or more keyword attribute values are extracted from the hierarchical data set. The extracted keyword values are applied to filter content for delivery to a requesting Web client.
摘要:
Systems, methods, and articles of manufacture for facilitating workflow control for a document. In one embodiment, a portion of computer program source code is associated with a workflow. The computer program is monitored for reference to or by the portion of the computer program source code. In response to a reference to or by the computer program source code, the workflow is fired off.
摘要:
Provided are techniques for the distribution and control of digital content such that Quality of Experience (QoE) is maintained. Content is protected from when the content is encrypted to when it is used. To ensure the QoE of particular content, a content owner embeds a list of required or preferred components that must be employed to render the content. The content owner's list of required or preferred components specifies specific components “trusted” to correctly process the content. The specified chain of preferred components is compared to possible devices in the system that processes the content. If there are multiple acceptable devices for a specific link, a preference system is employed to determine the device that executed the particular part of the chain. The preference system is based upon a number of factors, such as, but not limited to, performance characteristics, user preferences, expected stability, power requirements and system preferences.
摘要:
Provided is techniques for the distribution and control of digital content such that Quality of Experience (QoE) is maintained. Content is protected from when the content is encrypted to when it is used. To ensure the QoE of particular content, a content owner embeds a list of required or preferred components that must be employed to render the content. The content owner's list of required or preferred components specifies specific components “trusted” to correctly process the content. The specified chain of preferred components is compared to possible devices in the system that processes the content. If there are multiple acceptable devices for a specific link, a preference system is employed to determine the device that executed the particular part of the chain. The preference system is based upon a number of factors, such as, but not limited to, performance characteristics, user preferences, expected stability, power requirements and system preferences.