H04L29/06

SYSTEM AND METHOD FOR ROUTING MEDIA
20180014045 · 2018-01-11 ·

In one aspect, a method for managing streaming of video content to a client device includes providing the video content to a content distribution network for storage in a plurality of geographically separated resources of the content distribution network and receiving, from the client device via a packet-based telecommunication network, signaling to have the stored video content streamed to the client device. In response to the received signaling, one or more files are transmitted to the client device via the packet-based telecommunication network, each of the one or more files being in a format compatible with a media player on the client device, the one or more files comprising (i) an identification of one or more of the resources of the content distribution network available to facilitate streaming of one or more segments of the stored video content to the client device, the identification being dependent at least in part on a relationship between a geographic location of the client device and geographic locations of the resources of the content distribution network, and (ii) an identification of an advertising server, the identification of the advertising server being dependent at least in part on a relationship between the geographic location of the client device and a geographic location of the advertising server, wherein the one or more files, when processed by the client device, cause the client device to communicate with the identified one or more resources of the content distribution network and the advertising server to cause the one or more segments of the stored video to be streamed to the client device by the identified one or more resources of the content distribution network and cause one or more advertisements to be streamed from the advertising server to the client device.

CROSS PLATFORM SOCIAL NETWORKING AUTHENTICATION SYSTEM
20180013765 · 2018-01-11 ·

Disclosed in one example is a method of authenticating with multiple social network services. The method may include storing first authentication information associated with a user for a first social networking service using at least one computer processor, receiving second authentication information associated with the user for a second social networking service from a social networking application, and sending to the social networking application the first authentication information. The first authentication information may enable the social networking application to utilize a protected application programming interface call for the first social networking service and the second authentication information may enable the social networking application to utilize a protected application programming interface call for the second social networking service.

SYSTEM AND METHOD FOR PROCESSING USER RIGHTS
20180013740 · 2018-01-11 ·

A system and method for processing entitlement rights are disclosed. The method, in one aspect, provides for storing content at a first time, receiving a request for playback of the content at a second time, and processing a user right associated with the content to authenticate the user right in response to the request for playback, wherein the user right is authenticated based upon a state of the user right at the first time.

SECURITY SYSTEM AND METHOD FOR PROTECTING A VEHICLE ELECTRONIC SYSTEM
20180012030 · 2018-01-11 ·

Security system for protecting a vehicle electronic system by selectively intervening in the communications path in order to prevent the arrival of malicious messages at ECUs, in particular at the safety critical ECUs. The security system includes a filter which prevents illegal messages sent by any system or device communicating over a vehicle communications bus from reaching their destination. The filter may, at its discretion according to preconfigured rules, send messages as is, block messages, change the content of the messages, request authentication or limit the rate such messages can be delivered, by buffering the messages and sending them only in preconfigured intervals.

VIRTUALIZATION IN ADAPTIVE STREAM CREATION AND DELIVERY

An adaptive streaming server, a method, and a system are described herein that create a content stream to be delivered to one or more clients by segmenting the content into data structures which are stored in random access memory (volatile storage) rather than segmenting the content into segment files which are stored on a disk or database (non-volatile storage).

Controlling Access to Resources on a Network
20180013747 · 2018-01-11 ·

Disclosed are various embodiments for controlling access to data on a network. Upon receiving a request comprising a device identifier and at least one user credential to access a remote resource, the request may be authenticated according to at least one compliance policy. If the request is authenticated, a resource credential associated with the remote resource may be provided.

COORDINATING VIDEO DELIVERY WITH RADIO FREQUENCY CONDITIONS

System and methods for modifying streaming data based on radio frequency information is provided. As radio transceivers transition move to a shared resource or cloud model and the existing radio transceivers are split into a baseband unit and a remote radio head, radio frequency (RF) information including power levels, encoding, data rates, and bandwidth can be provided to video optimization server. The RF information can be provided more frequently to allow real-time modifications to streaming video data. Existing protocols are reactionary in nature and perceive changing channel conditions indirectly. By providing RF information from the baseband unit on a low latency channel, modifications to the video stream can be made before an impact would be noticed at the protocol level. Also, policy information can be used to influence the changes made to streaming data in addition to the RF information.

AUTHENTICATION SYSTEM

A system for creating a combined electronic identification that obtains user information (202) about a user of a hardware device (100), authenticates the user from the user information (202), obtains a hardware profile (208) of the device (100), the hardware profile 208 comprising user generated data stored on the device (100) and links the user information (202) and the hardware profile (208) as a combined electronic identification. The hardware device (100) can be comprised of a main processor, memory, a touchscreen interface, and a wireless communication module, such as a mobile phone, computer, or tablet computer.

SYSTEMS AND METHODS FOR ENCRYPTED COMMUNICATION IN A SECURE NETWORK
20180013734 · 2018-01-11 ·

A method for users of devices including mobile phones and computers to engage in encrypted communications with other devices using asymmetrical key exchange technology, involving the user of a device first creating a password and then at a later time re-entering that password on the device, with the result that when the password is re-entered the device is able to decrypt a set of software components that are required for a fresh session of encrypted communications.

Cell Timing in a Wireless Device and Base Station
20180014263 · 2018-01-11 ·

Methods and apparatuses are described for wireless communications. Cells may be grouped into a plurality of cell groups. A time adjustment may be determined and applied to uplink transmission timing of a cell group. A transmission timing difference between a first cell group and a second cell group may be determined. If the transmission timing difference exceeding a threshold, one or more devices may stop transmitting uplink signals via one or more secondary cells and/or may stop applying the timing adjustment for a cell group.