H04L2463/103

Browser/web apps access to secure surface
10102648 · 2018-10-16 · ·

Embodiments are directed towards generating an image from a plurality of content layers. The content layers may include secure content that overlaps at least one other content layer. When the image is generated, the secure content may be rendered as a layer below the plurality of content layers. Additionally, each area of content layers that is overlapped by an area of the secure content may be modified to be transparent, where the area of the secure content is visible in the image through each transparently modified area. In some embodiments, an alpha channel value of each pixel in each area of content layers that is overlapped by the secure content may be modified. Secure content and unsecure content at a same layer may be split into different layers, where the unsecure content layer may be rendered at a theoretical secure content layer.

Multi-mode power management circuit
10103926 · 2018-10-16 · ·

A multi-mode power management circuit is provided. The multi-mode power management circuit includes an unlicensed band amplifier circuit configured to amplify a radio frequency (RF) signal for transmission in an unlicensed RF band(s). In examples described herein, the unlicensed RF band(s) resides in the 5 GHz RF spectrum and is shared between long-term evolution (LTE) enhanced licensed assisted access (eLAA) and Wi-Fi connectivity. In addition, the multi-mode power management circuit can also support LTE communication in a licensed RF band(s). The multi-mode power management circuit can be dynamically and flexibly configured to support a variety of eLAA, Wi-Fi, and LTE communication scenarios (e.g., uplink carrier aggregation) in licensed and/or unlicensed RF band(s) based on such power management schemes as envelope tracking (ET). In this regard, the multi-mode power management circuit can support eLAA, Wi-Fi, and LTE convergence in a mobile device without compromising power management efficiency and/or increasing footprint.

SYSTEM, METHOD AND APPARATUS FOR GENERATING DEVICE IDENTIFIER
20180295133 · 2018-10-11 ·

A method for generating device identifiers, including: receiving an identifier assignment request; in response to the received identifier assignment request, assigning a device identifier to a device, the device identifier being a unique identifier, wherein the device is to be assigned with the device identifier; and transmitting the device identifier to an identifier recording apparatus, wherein the identifier recording apparatus records the device identifier into the device.

DYNAMICALLY CHANGING STREAM QUALITY WHEN USER IS UNLIKELY TO NOTICE TO CONSERVE RESOURCES
20180288120 · 2018-10-04 ·

A computing device may be configured to automatically change at least a quality, display, video, and/or audio features for a content stream when a user is unlikely to notice such changes. When the user requests play of a stream of content, a determination may be made regarding a level of presence of the user and a configuration of the computing device. A level of quality is selected based on the determined level of presence/device configuration. At least one content stream is prepared and played using the selected level of quality. When a change in the level of presence of the user/or device configuration is detected, the at least one content stream can selectively be changed automatically.

METHOD AND SYSTEM FOR THE DELIVERY AND STORAGE OF HIGH DEFINITION AUDIO-VISUAL CONTENT
20180288457 · 2018-10-04 ·

A system for permitting temporary access for delivery of owned Content to a location selected by a Subscriber is provided. An enhanced progressive download system for High Definition audio-visual Content is also provided.

CLAIMING DELAYED LIVE REFERENCE STREAMS
20240314382 · 2024-09-19 ·

A system and method for identifying unauthorized uploaded content that has been uploaded before a validated live reference stream has been ingested is disclosed herein. The live reference stream is compared against the indexed uploaded content repeatedly as the live reference stream is received. The matching process is done once per a time period until a match meeting a minimum match duration threshold is identified. The match is then determined to be unauthorized, and a claim is issued against the unauthorized uploaded content. The time period can be based on a utility based analysis that factors the computational costs of repeated matching versus the diminishing value of the live reference stream as time progresses.

Using hash signatures of DOM objects to identify website similarity

Embodiments are directed to using a hash signature of a rendered DOM object of a website to find similar content and behavior on other websites. Embodiments break a DOM into a large number of data portions (i.e., shingles), apply a hashing algorithm to the shingles, select a predetermined number of hashes from the hashed shingles according to a selection criteria to create a hash signature, and compare the hash signature to that of a reference page to determine similarity of website DOM object content. Embodiments can be used to identify phishing websites, defaced websites, spam websites, significant changes in the content of a webpage, copyright infringement, and any other suitable purposes related to the similarity between website DOM object content.

SOCIALLY RESPONSIBLE CONTENT ACCESS
20180270239 · 2018-09-20 ·

Socially responsible content access may include receiving, by a server device from a customer device, message data including a request to access content associated with customer account data indicating a customer account. In response to receiving the request to access content, socially responsible content access may include identifying, by the server device, socially responsible content access creator information, wherein the socially responsible content access creator information includes an indication of a content creator associated with the content, accounting, by the server device, for socially responsible content access, and sending, by the server device to the customer device, a response to the request to access content.

DEVICE SPECIFIC IDENTITY LINKED TO USER ACCOUNT

Methods and devices for activating an operating system license on a computer device may include accessing a service associated with a user account for digital entitlement management, wherein the user account is associated with a device identification of the computer device. The methods and devices may include receiving a list of devices associated with the user account with available digital entitlements to be reactivated on the computer device or transferred to the computer device. The methods and devices may include receiving a selection of a device from the list of devices and sending an operating system license request to transfer the digital entitlement associated with the selected device from the selected device to the computer device. The methods and devices may include receiving an operating system license for the digital entitlement when the transfer of the digital entitlement is valid and activating the operating system on the computer device.

NETWORK MANAGEMENT FOR CONTENT BROADCAST
20180248764 · 2018-08-30 ·

Providing integrated LTE-B network and service management is disclosed. Changes to an LTE or LTE-B network can be propagated in real-time, or near-real-time, to a mapping profile representative of the LTE or LTE-B network. This mapping profile can be employed in updating the LTE or LTE-B network. Further, the mapping profile can be employed in establishing a new LTE-B session, adapting an existing LTE-B session, maintaining an existing LTE-B session, etc. Access to a reporting rule can enable the LTE or LTE-B network to proactively report changes to the LTE or LTE-B network. Integrated LTE-B network and service management can be integrated and/or centralized, such as, at a carrier-network, core-component. Moreover, integrated LTE-B network and service management can be virtualized.