Patent classifications
H04L2463/103
Method for reducing time to first frame/seek frame of protected digital content streams
Embodiments are directed towards managing play of at least one stream of digital content to reduce a time to a first frame or seek frame within the content by playing unencrypted portions of the digital content received at a client device at least until key negotiations and decryption actions are completed for corresponding encrypted digital content, at which point play is switched to the decrypted content in a seamless manner. In one embodiment, the unencrypted content is at a lower quality, resolution, or bit rate than the encrypted content. In one embodiment, the at least one stream is a stream of content that includes at least a first portion that is unencrypted, and a second portion that is encrypted. In another embodiment, the at least one stream includes a first stream that is unencrypted and played until a second, encrypted, stream is readied for play.
USING HASH SIGNATURES OF DOM OBJECTS TO IDENTIFY WEBSITE SIMILARITY
Embodiments are directed to using a hash signature of a rendered DOM object of a website to find similar content and behavior on other websites. Embodiments break a DOM into a large number of data portions (i.e., shingles), apply a hashing algorithm to the shingles, select a predetermined number of hashes from the hashed shingles according to a selection criteria to create a hash signature, and compare the hash signature to that of a reference page to determine similarity of website DOM object content. Embodiments can be used to identify phishing websites, defaced websites, spam websites, significant changes in the content of a webpage, copyright infringement, and any other suitable purposes related to the similarity between website DOM object content.
Software-Enabled Remote Licensing and Provisioning
Described herein are systems and methods for providing software provisioning of functionality in a wireless communications device. Software-enabling functionality may include systems for granting a license to intellectual property or other pre-embedded functionality within a device. Communications to and from the device may be used to send or receive activation messages and/or licensing messages. Network capabilities may be provisioned using activation messages sent over the network. Activation messages may be sent in-band or out-of-band, for a device connected to the Internet and/or a mobile operator core network. Licenses may be required for any functions or intellectual property present on a given device. Activation may enable logical modules of a system-on-chip (SOC), functions of a software-defined radio (SDR), baseband, or DSP core. The disclosed systems and methods could thereby provide a new, flexible paradigm, namely, Silicon as a Service (SaaS).
Referral identity system and method of operation thereof
Approaches, techniques, and mechanisms are disclosed for providing referral identity systems and services. The referral identity system can provide a hardware based system for identifying users and the devices they are using and recognizing referrals from one device to another and/or from one user to another. Each of the users can be uniquely identified using a device identifier associated with a device that the user is using. The authentication and identity services can be used to license software and/or devices coupled with such software dynamically using integrated hardware, software, and firmware, and provide a validated identification difficult to spoof.
Configuration for multi-factor event authorization
An authorization device receives a message from a content server through a network based upon a first factor of authorization being completed by a playback device requesting playback of content associated with a user account. The authorization device may be a mobile device that is associated with the user. The authorization device may receive a user input indicating an approval of the requested playback. The authorization device may send a playback authorization message through the network to the content server. The content server may use at least a first factor of authorization such a login credential from a smart playback device or a registration credential from another type of playback device in addition to a second factor of authorization such as the playback authorization message to generate a user authentication that is provided to allow the playback device to playback the content.
Technologies for secure server access using a trusted license agent
Technologies for secure server access include a client computing device that loads a license agent into a secure enclave established by a processor of the client computing device. The license agent receives a request from an application to access a remote server device. The license agent opens a secure connection with the server device and performs remote attestation of the secure enclave. The license agent authenticates the user and transmits a machine identifier and a user identifier to the server device. The machine identifier may be based on an enclave sealing key of the client computing device. The server device verifies that the machine identifier and the user identifier are bound to a valid application license. If the machine identifier and the user identifier are successfully verified, the application communicates with the server device using the secure connection. Other embodiments are described and claimed.
Method and system for the delivery and storage of high definition audio-visual content
A system for permitting temporary access for delivery of owned Content to a location selected by a Subscriber is provided. The system includes a central facility that stores a list of all Content owned by the Subscriber, and a plurality of local networks connected to the central facility. A protocol enables the Subscriber to use an application to access the Content they own on a local network, even if that local network is not the one linked to their provided (e.g., a cable company) account. The protocol receives the request from the Subscriber to view the Content at a selected location on a local network, determines whether the Subscriber is authorized to view that Content, and if so, transmits the Content to the local network at the selected location.
SELECTIVE DISABLING OF COMMUNICATION SERVICES PROVIDED BY A WIRELESS NETWORK
A network manager of a wireless mesh network is configured to selectively enable or disable communication services provided between devices over the network. The selective enabling or disabling of services may be based on the monitoring and enforcement of license terms set according to license information embedded within the wireless network node(s) or access point(s) of the network. In operation, the network manager retrieves the license information from the node(s) and/or access point(s) of the network, and establishes license terms based on the retrieved license information. In turn, the network manager selectively enables or disables network services, such as by throttling communications relayed between the user application and the nodes, or between nodes, if the license terms are not respected.
PREVENTION OF SOFTWARE PIRACY EXPLOITING END USERS
Methods and systems for preventing piracy. One method includes providing software having an intended end user, where the software is configured to be activated by the intended end user. The method includes providing a database of allowed keys and storing a unique key associated with the intended end user within the database of allowed keys. The method includes requesting a key to be entered by a user to activate the software, matching the key entered by the user to the unique key, matching the unique key to the intended end user associated with the unique key, and presenting to the user the intended end user associated with the unique key. The method includes activating the software only when the key entered matches the unique key and the user matches the intended end user associated with the unique key.
PREVENTION OF SOFTWARE PRIVACY BY END USERS
Methods and systems for preventing piracy. One method includes providing software having an intended end user and configuring the software is to be installed and activated by the intended end user. The method includes dividing the software into a restricted feature and an unrestricted features. The method includes providing an activation file that indicates whether the software is activated and accessing the activation file and confirming that the software is activated when the software receives a request to perform the restricted feature. The method includes performing the restricted feature only when the software is confirmed to be activated and performing the unrestricted feature irrespective of whether the software is confirmed to be activated.