H04L2463/103

Network management for content broadcast

Providing integrated LTE-B network and service management is disclosed. Changes to an LTE or LTE-B network can be propagated in real-time, or near-real-time, to a mapping profile representative of the LTE or LTE-B network. This mapping profile can be employed in updating the LTE or LTE-B network. Further, the mapping profile can be employed in establishing a new LTE-B session, adapting an existing LTE-B session, maintaining an existing LTE-B session, etc. Access to a reporting rule can enable the LTE or LTE-B network to proactively report changes to the LTE or LTE-B network. Integrated LTE-B network and service management can be integrated and/or centralized, such as, at a carrier-network, core-component. Moreover, integrated LTE-B network and service management can be virtualized.

THIRD-PARTY AUTHORIZATION SUPPORT FOR INTERACTIVE COMPUTING ENVIRONMENT FUNCTIONS
20200205002 · 2020-06-25 ·

In some aspects, a computing system can obtain, from a host server, a data network identifier that identifies a mobile device involved in an online transaction within an interactive computing environment provided by the host server. The computing system can also obtain, from a telecommunication provider server, a credential corresponding to the data network identifier. The computing system can match the credential to a set of authorization elements. Each authorization element can allow the mobile device to access a function for advancing the online transaction within the interactive computing environment. The computing system can generate a dynamic authorization data structure that includes the authorization elements. The computing system can cause the host server to advance, responsive to receiving a selection from the mobile device identifying one of the authorization elements, the online transaction within the interactive computing environment.

BLOCKCHAIN-BASED COPYRIGHT DISTRIBUTION
20200193064 · 2020-06-18 · ·

This disclosure relates to blockchain-based copyright distribution. In one aspect, a method includes receiving, by a node device of a blockchain network, a target transaction including design data of a target work and an identity of a target copyright user corresponding to the target work. Design similarity comparison logic and copyright distribution logic are executed. The design data of the target work is compared with the design data of the existing work stored in the first smart contract to obtain a target similarity between the target work and the existing work. A copyright for the target work is distributed between the target copyright user and a copyright user corresponding to the existing work based on the target similarity. Copyright distribution data that specifies distribution of the copyright between the target copyright user and the copyright user corresponding to the existing work is stored in the first smart contract.

Controlled environment secure media streaming system
10673856 · 2020-06-02 · ·

A Controlled Environment Secure Media Streaming System manages the delivery of content to Secured Devices. Cloud Services provide content to Integration Hub. The Integration Hub interfaces with various cloud services providers and prepares content for consumption by a resident of a secured facility. Integration Hub utilizes Content Filter to inspect content received from cloud service providers for suitability for use in a secured environment. Once content is retrieved, filtered, formatted, and packaged by Integration Hub, the content is stored in Data Warehouse. Secured Devices request content from the Distribution Hub, the Distribution Hub retrieves the content from the Data Warehouse, and then Distribution Hub manages the transfer of content to the Secured Devices. In some embodiments, Distribution Hub utilizes Content Filter to determine whether or not a particular Secured Device can access particular content.

Methods of restricted virtual asset rendering in a multi-user system
10672193 · 2020-06-02 · ·

Embodiments relate to receiving an indication of a desired item by a user in a multi-use virtual world. The indication requests a rendering of a restricted virtual object in a space of the user. A server can determine and retrieve a partially rendered model of the restricted virtual object, determine a rendering location based on position data, and link the partially rendered model to the user and to the rendering location. The partially rendered model and the rendering location can be sent to user devices for rendering the partially rendered model at the rendering location. A partially rendered appearance of the restricted virtual object indicates to a second user the desired item by a first user. A fully rendered model may contain restricted content data, whereas a partially rendered model may not contain restricted content data. The restricted content data may include a restricted digital media file.

Systems And Methods To Secure Publicly-Hosted Cloud Applications To Run Only Within The Context Of A Trusted Client Application
20200169560 · 2020-05-28 ·

Systems and methods are provided that may be implemented to secure a publicly-hosted web application so that it will render only within the determined context of a trusted client application. Such an authentication decision may be made, for example, using front-end web application code that is rendered in a client web view together with client application code to authenticate the client application context in which the web page is rendered. In this way, the web application may validate that it is being rendered in the context of a trusted and/or well-known client application rendering engine/environment.

Reducing time to first encrypted frame in a content stream
10645430 · 2020-05-05 · ·

Techniques are described for reducing time to decrypt a next encrypted frame in a content stream by optimizing a license/key acquisition process. When requesting content, a key identifier and/or license identifier may be included within a webpage using a link, script, or similar access point. When a client device sends a request for content, the loading of the webpage within the client device includes the embedded key identifier. Access to the key/license identifier at the client device then may initiate a key/license acquisition process by the client device. The key/license may be obtained from a key management device in parallel with, or prior to, downloading of at least a portion of the content stream.

Search engine for authenticated network resources
10645067 · 2020-05-05 · ·

A method and corresponding computer system for authenticating a network resource are disclosed. The method comprises receiving an input at a computer system over a network, the input comprising a network resource identifier and information indicative of an authentication entity associated with the network resource; automatically identifying stored data using the information indicative of the authentication entity, the stored data comprising contact information associated with the authentication entity; automatically transmitting an electronic message to the authentication entity using the identified contact information, the electronic message providing the authentication entity with the network resource identifier and means for authenticating the network resource; and automatically storing the network resource identifier. A search engine for authenticated network resources and a method and corresponding computer system for authenticating an entity are also disclosed.

AIRCRAFT MODIFICATION USER INTERFACE MARKETPLACE
20200134686 · 2020-04-30 ·

Methods and systems for managing modifications to aircraft using a graphical user interface. A navigation section is displayed in the graphical user interface and includes at least one of a models menu control or a scenarios menu control. The models menu control is selectable to present model options to a user, the model options being customized based on at least one of identification information associated or customer information. The scenarios menu control is selectable to present scenario options to a user, the scenario options being tailored for the customer based on the at least one of identification information associated with the user or customer information retrieved for the customer. An effectivity selector allows the user to select a set of aircraft for modification. Based on the set of aircraft selected, features displayed in the graphical user interface based on an option from the model or scenario options are customized automatically.

AIRCRAFT MODIFICATION MARKETPLACE
20200134704 · 2020-04-30 ·

Methods and systems for managing aircraft modifications. A link to a customer information database is established in response to receiving a launch input for a modification marketplace entered by a user via a graphical user interface. The customer information database includes identification information and customer information associated with the user. A determination is made as to whether the user is authorized to access the modification marketplace using the identification information. A link to an engineering database containing aircraft product information is established in response to a determination that the user is authorized to access the modification marketplace. A selected level of access to the aircraft product information in the engineering database is provided, via the graphical user interface, based on the customer information associated with the user.