Patent classifications
H04L2463/101
CRYPTOGRAPHICALLY PROVABLE ZERO-KNOWLEDGE CONTENT DISTRIBUTION NETWORK
A system, a computer readable storage medium, and methods for delivering content from a zero-knowledge edge server node in a content delivery network to an end user device, ensuring content control by a content provider (i.e. reduce piracy) while ensuring privacy of an end user device. One method includes publicizing that a particular content is available for download from the server node; initiating with the server node a communication session using a zero-knowledge protocol between the end user device and the server node operating in zero knowledge; downloading, while in the communication session, the particular content from the server node to the end user device; and receiving a response message from the end user device, including an indication of a content media player application, using the particular content, successfully executed at the end user device. The indication can be accompanied by a cryptographically verifiable proof of integrity.
Digital Rights Management Leveraging Motion or Environmental Traits
Digital rights management techniques are used to control access to items of content based on motion or environmental traits. Data is collected that describes motion or environmental traits associated with a request to access content, the request received from a user. A determination is made from the data using a digital rights management module embedded as part of the content as to whether the motion or environmental traits meet specified traits of a motion or environmental behavior of a digital rights management policy enforced by the digital rights management module for at least one item of the content. Responsive to a determination that the specified traits are met, access to the at least one item of the content is permitted by the embedded digital rights management module.
Secure time functionality for a wireless device
The present invention is related to a wireless transmit/receive unit (WTRU) for providing advanced security functions. The WTRU includes trusted platform module (TPM) for performing trusted computing operations; and a secure time component (STC) for providing a secure measurement of a current time. The STC and the TPM are integrated to provide accurate trusted time information to internal and external to the WTRU. The STC may be located on an expanded a subscriber identity module (SIM), on the WTRU platform, or two STCs may be used, one in each location. Similarly, the TPM may be located on an expanded SIM, on the WTRU platform, or two TPMs may be used, one in each location. Preferably, the STC will include a real time clock (RTC); a tamper detection and power failure unit; and a time report and sync controller.
Method and device for playing contents
The present invention provides a method for playing contents, which are stored in a storage device connected via at least one interface, the method comprising: detecting a connection of the storage device; transmitting transaction information stored in the detected storage device to a license server, wherein the transaction information includes transaction identification information which identifies a corresponding transaction and a user; receiving, from the license server, license information allowing to play the contents; and playing the contents on the basis of the license information, wherein the license information includes a license file and a license key.
Distributing digital-works and usage-rights via limited authorization to user-devices
Method for automatically distributing, as needed, a user's digital-works and usage-rights to one or more user-devices. A definition of the usage-rights for a digital-work may be stored at one or more locations on a network. A version of said digital-work suitable for a user-device may be provided by one or more locations on said network. When a user who is authorized to utilize said digital-work is active at a user-device, a version of said digital-work and authorization to utilize is automatically transferred when needed to a user-device. The digital-work and authorization may be automatically transferred as needed to any user-device where an authorized user is active. The usage-rights may only be valid for one or more specific users. The usage authorization at each user-device may be less than defined in the full usage-rights maintained on the network. Authorization to utilize said digital-work at a user-device may be extended from time to time by exchanging user-device status across the network. Digital-works are automatically provided as needed to any user-device that an authorized user is using.
Media network environment
A network media environment includes a first hub network and a second hub network. The first hub network encompasses a first local environment based on a first server which is coupled to a first client. The second hub network encompasses a second local environment based on a second server which is also coupled to the first client. The first local environment and the second local environment overlap. The second local environment is movable with a movement of the second server.
Methods and apparatus to monitor streaming media content
Methods, apparatus, systems and articles of manufacture are disclosed to monitor streaming media content. An example apparatus to monitor streaming media content includes a flag detector to determine if a streaming media flag is asserted in a content of a watermark associated with a media exposure event, the media exposure event included in panel data from a panel meter, the panel meter to monitor a media presentation device via an audio output channel of the media presentation device. A data selector to, when the streaming media flag is asserted: discard the media exposure event associated with the streaming media flag from the panel data and select the media exposure event from network traffic reports to credit media presented by the media presentation device, the network traffic reports obtained from a meter that monitors network traffic to and from the media presentation device.
Low latency active noise cancellation system with client intercommunication
A system and method for providing load balanced secure media content and data delivery (10) in a distributed computing environment is disclosed. Media content is segmented and encrypted into a set of individual encrypted segments on a centralized control center (15). Each individual encrypted segment has the same fixed size. The complete set of individual encrypted segments is staged to a plurality of intermediate control nodes (17, 19). Individual encrypted segments are mirrored from the staged complete set to a plurality of intermediate servers (21a-b, 23a-b). Requests are received from clients (11) for the media content at the centralized control center. Each individual encrypted segment in the set is received from one of an intermediate control node and an intermediate server optimally sited from the requesting client. The individual encrypted segments are reassembled into the media content for media playback.
Method and apparatus for a content protecting and packaging system for protecting a content package
An apparatus for providing an improved content protecting and packaging system for protecting content may include an extractor for extracting a content package into a plurality of content segments including a first portion and a second portion. An enveloper may envelop each of the content segments in the first portion separately to thereby create one or more protected content segments. Further, a packager may package the protected content segments with the second portion of the content segments into a protected content package, which may then be uploaded to a distributor for distribution to user terminals. A corresponding method and computer program product are also provided.
METHOD AND SYSTEM FOR AUTOMATED PROTECTION AGAINST VULNERABILITY AND NOTIFICATION TO SERVICE PROVIDER
A method and system are disclosed for automated utilization of vulnerability databases for consumer electronic (CE) devices. The method includes deploying one or more customer-premise equipment or customer-provided equipment (CPE) broadband devices, each of the one or more broadband devices having one or more software components; loading a database of software component on each of the one or more broadband devices, the database of software components having a functional use case associated with each software component; periodically performing an automated reading of one or more published vulnerability databases; and comparing a list of vulnerabilities from the one or more published vulnerability databases against the database of software components for each of the one or more broadband devices.