H04N7/16

Correspondence of external operations to containers and mutation events

A method is provided for determining command-to-process correspondence. The method includes identifying, by the hardware processor, initial processes resulting from executions of container immutability change events for each of multiple containers in a cluster, based on an execution time, a process identifier and a process group identifier for each of the container immutability change events. The method further includes checking, by the hardware processor, if an initial process from among the identified initial processes matches an entry in a database that stores external container commands and at least one respective process resulting from executing each of the external container commands. The method also includes designating, by the hardware processor, a particular external command, from among the external container commands stored in the database, as having a correspondence to the initial process, responsive to the initial process matching the at least one respective process resulting from executing the particular external command.

Code identification

Systems and method for watermarking portions of code for the purposes of identification are described. A computer-implemented method of watermarking a portion of code with identification data includes: determining, by a computing device, a number of existing whitespace characters in the portion of code; encoding, by the computing device, the identification data using a set of reference whitespace characters; and embedding, by the computing device, the encoded identification data into the portion of code, wherein the embedding the encoded identification data includes, based on the determined number of existing whitespace characters, either replacing existing whitespace characters in the portion of code with the encoded identification data or inserting the encoded identification data characters into the portion of code.

Secure communications between virtual computing instances
11556662 · 2023-01-17 · ·

Method and apparatus for virtualized environment where virtual computing instances interface a service platform operated on a physical computing apparatus are disclosed. A new virtual computing instance interfacing the service platform can be created, the created new virtual computing instance belonging to a class of virtual computing instances. At least one security credential is obtained from a storage of security credentials associated with the class of the new virtual computing instance. Data communicated with at least one further computing instance is secured based on the obtained at least one security credential.

USER LOCATION AUTHENTICATION USING PLACE SIGNATURE

A computer-implemented method includes: (i) receiving location information that represents a physical location of a user; (ii) receiving first sensor data that has been generated by a sensor on a client device of the user; (iii) in response to receiving the first sensor data, obtaining second sensor data that has been generated by a sensor on a sensor device and that represents an environmental condition of an area around the physical location; (iv) determining whether the first sensor data matches the second sensor data; and (v) in response to determining that the first sensor data matches the second sensor data, determining that the user is authentic.

SYSTEMS AND METHODS FOR PROVIDING BLACKOUT SUPPORT IN VIDEO MOSAIC ENVIRONMENTS
20180007410 · 2018-01-04 ·

Systems and methods for providing blackout support in video mosaic environments are disclosed. In response to receiving a request for a video mosaic page, screen data, which may include blackout information, is received. The screen data identifies the video assets in the video mosaic page. A determination is made, based at least in part on the screen data, whether any video assets in the video mosaic page should be blacked out. Blacked out assets may be masked and their associated audio blocked. In addition, an overlay of options associated with the blacked out asset may be presented. The overlay may include options to substitute the blacked out asset with replacement content, search for similar content, or retrieve more information about the blackout.

SOFTWARE APPLICATIONS AND INFORMATION APPARATUS FOR PRINTING OVER AIR OR FOR PRINTING OVER A NETWORK

Information apparatus and application software supporting printing over air or network are herein disclosed and enabled. The information apparatus may include one or more software components that include (1) a discovery component to discover a supported printer in a local area network (LAN) and to receive device information related to the printer (e.g., capability, language or format supported, identification) from the printer, and (2) a printing component to generate or obtain print data based on the device information received and to transmit the print data to the discovered printer. After establishing the connection to the LAN, application software (e.g., Internet browser, email, photos, documents) in the information apparatus may print digital content by using the discovery component to discover the printer in the LAN, and may use the printing component to obtain and transmit print data in a form that is acceptable to the printer for printing the digital content.

SOFTWARE APPLICATIONS AND INFORMATION APPARATUS FOR PRINTING OVER AIR OR FOR PRINTING OVER A NETWORK

Information apparatus and application software supporting printing over air or network are herein disclosed and enabled. The information apparatus may include one or more software components that include (1) a discovery component to discover a supported printer in a local area network (LAN) and to receive device information related to the printer (e.g., capability, language or format supported, identification) from the printer, and (2) a printing component to generate or obtain print data based on the device information received and to transmit the print data to the discovered printer. After establishing the connection to the LAN, application software (e.g., Internet browser, email, photos, documents) in the information apparatus may print digital content by using the discovery component to discover the printer in the LAN, and may use the printing component to obtain and transmit print data in a form that is acceptable to the printer for printing the digital content.

System and Method for Managing and/or Rendering Internet Multimedia Content in a Network

A system and a method render internet multimedia content in a network using an application to render the internet multimedia content and/or locally stored multimedia content on one or more rendering devices in the network. The application may provide web browser functions, such as, for example, receiving, processing, decoding and/or rendering the internet multimedia content. The application may have an enhanced user interface which may enable a user to select the internet multimedia content and a rendering device in the network, send the internet multimedia content to the rendering device and/or control rendering of the internet multimedia content on the rendering device.

STREAMING PIRACY DETECTION METHOD AND SYSTEM
20180014089 · 2018-01-11 ·

In one embodiment, a command is received from a video provider at a media rendering device, the command being a command to embed a subscriber ID in at least one video frame in a video stream. A random key, k is also received from the video provider at the media rendering device. An injective transformation is invoked for k and the subscriber ID, the injective transformation generating a sequence of pairs of: near-transparent patterns and corresponding time periods. Logical blocks of the at least one video frame in the video stream are overlaid with one of the near-transparent patterns for its one of the corresponding time periods. Related apparatus, systems, and methods are also described.

Methods and apparatus to correct misattributions of media impressions

Methods, apparatus, and articles of manufacture to correct misattributions of media impressions are disclosed. An example method includes obtaining first demographic-based impressions via a beacon transmitted in response to access to content by a first set of panelists, obtaining, from a database proprietor, second demographic-based impressions of the content on a second set of persons, forming a pseudo-inverse matrix determined based in part on the first impressions, and having a truncated value and a damped value to form third demographic-based impressions of the content on the second set of persons based on the second impressions, and computing at least partially corrected demographic-based impressions values by multiplying a vector of database proprietor impression data by the pseudo-inverse matrix.