H04N21/4367

TECHNIQUES FOR DYNAMIC ROUTING
20230046698 · 2023-02-16 ·

Disclosed herein are computing devices, including playback devices, that are configured to communicate data, such as audio data, to any number of target devices by dynamically taking into account the relevant context relating to the data to be communicated, the capabilities of the target devices, the states of communication links, and other contextual information.

Set-top box with enhanced controls
11582524 · 2023-02-14 · ·

A set-top box with enhanced content and system and method for use of the same are disclosed. In one embodiment, a wireless transceiver is located within a housing, which also interconnectively includes a television input, television output, a processor, and memory. The set-top box may establish a pairing with a proximate wireless-enabled interactive programmable device having a display. Content, such music, for example, may be imported from the proximate wireless-enabled interactive programmable device and provided to the television. While the music is playing, the set-top box may generate and provide to the television a control signal that includes instructions to adjust the brightness of the television by dimming the television.

Set-top box with enhanced controls
11582524 · 2023-02-14 · ·

A set-top box with enhanced content and system and method for use of the same are disclosed. In one embodiment, a wireless transceiver is located within a housing, which also interconnectively includes a television input, television output, a processor, and memory. The set-top box may establish a pairing with a proximate wireless-enabled interactive programmable device having a display. Content, such music, for example, may be imported from the proximate wireless-enabled interactive programmable device and provided to the television. While the music is playing, the set-top box may generate and provide to the television a control signal that includes instructions to adjust the brightness of the television by dimming the television.

System and method for prioritizing and filtering CEC commands
11595719 · 2023-02-28 · ·

A first appliance receives from a second controllable appliance a command for causing the first controllable appliance to be placed into a state and, in response, determines a trust level of the second controllable appliance. When it is determined that the second controllable appliance is trustworthy, the first controllable appliance executes the command. When it is determined that the second controllable appliance is untrustworthy, the first controllable appliance ignores the command. Otherwise, the first controllable appliance enters into a state in which the first controllable appliance waits for at least a predetermined period of time for a user to confirm whether or not the first controllable appliance should be caused to execute the command.

System and method for prioritizing and filtering CEC commands
11595719 · 2023-02-28 · ·

A first appliance receives from a second controllable appliance a command for causing the first controllable appliance to be placed into a state and, in response, determines a trust level of the second controllable appliance. When it is determined that the second controllable appliance is trustworthy, the first controllable appliance executes the command. When it is determined that the second controllable appliance is untrustworthy, the first controllable appliance ignores the command. Otherwise, the first controllable appliance enters into a state in which the first controllable appliance waits for at least a predetermined period of time for a user to confirm whether or not the first controllable appliance should be caused to execute the command.

Merging Permissions and Content Access

Aspects of the disclosure relate to determining that a wireless device associated with one user account is proximate to a computing device associated with another user account. In response to determining the proximity of the two devices, one or more of the devices may receive merged access to permissions and/or content associated with the two user accounts. In response to determining that the wireless device is not proximate to the computing device, the devices may no longer receive merged access to permissions and/or content associated with the two user accounts.

Merging Permissions and Content Access

Aspects of the disclosure relate to determining that a wireless device associated with one user account is proximate to a computing device associated with another user account. In response to determining the proximity of the two devices, one or more of the devices may receive merged access to permissions and/or content associated with the two user accounts. In response to determining that the wireless device is not proximate to the computing device, the devices may no longer receive merged access to permissions and/or content associated with the two user accounts.

Cross-Device Content Projection Method and Electronic Device
20230021994 · 2023-01-26 ·

A content projection method and device related to the field of screen projection technologies are provided. The method includes: The third electronic device plays second content; an NFC chip of the third electronic device touches or approaches an NFC chip of the first electronic device; the third electronic device receives connection status information sent by the first electronic device; and the third electronic device projects the second content to the second electronic device based on the connection status information.

METHOD FOR ACQUIRING ACCESS RIGHTS TO CONDITIONAL ACCESS CONTENT

A method of acquiring access rights to conditional access content. The method comprises receiving an access right on a first terminal through a first communication channel; storing said access right in said first terminal; sending a request for said conditional access content to a content provider, said request containing at least an identifier of an account to which said first terminal is associated, an identifier of the requested content and a piece of information concerning said access right; verifying, by said content provider, the authenticity of said access right using said piece of information concerning the access right; and when there has been a successful verification, marking said access right as used, and sending said conditional access content to at least one terminal linked to said account. The first terminal using near field communication technology (NFC) during at least one transfer of said access rights.

METHOD FOR ACQUIRING ACCESS RIGHTS TO CONDITIONAL ACCESS CONTENT

A method of acquiring access rights to conditional access content. The method comprises receiving an access right on a first terminal through a first communication channel; storing said access right in said first terminal; sending a request for said conditional access content to a content provider, said request containing at least an identifier of an account to which said first terminal is associated, an identifier of the requested content and a piece of information concerning said access right; verifying, by said content provider, the authenticity of said access right using said piece of information concerning the access right; and when there has been a successful verification, marking said access right as used, and sending said conditional access content to at least one terminal linked to said account. The first terminal using near field communication technology (NFC) during at least one transfer of said access rights.