Patent application number | Description | Published |
20080225000 | Cancellation of Environmental Motion In Handheld Devices - A method, system and computer program product for compensating the environmental motion in handheld devices. A sensor unit is affixed to an object in the environment to detect and measure environmental motion. Upon measuring any detected environmental motion, the sensor unit transmits a value corresponding to the measured environmental motion to one or more handheld devices. Alternatively, the sensor unit may transmit the value corresponding to the measured environmental motion to a unit configured to retransmit the value to one or more handheld devices. Upon receiving the value corresponding to the measured environmental motion, the handheld device cancels this environmental motion from the motion it measured thereby taking into consideration only the motion inputted by the user of the handheld device. | 09-18-2008 |
20080235197 | Systems and methods for user-constructed hierarchical interest profiles and information retrieval using same - Systems and methods for delivering Web content are provided. The systems and methods include a mechanism for providing interest data that may be applied to filter Web content at the provider side. A hierarchical data set of user-identified interests in received from the user's Web client. The hierarchical data set is parsed, and responsive thereto, one or more keyword attribute values are extracted from the hierarchical data set. The extracted keyword values are applied to filter content for delivery to a requesting Web client. | 09-25-2008 |
20090307216 | Systems and Methods for User-Constructed Hierarchical Interest Profiles and Information Retrieval Using Same - Systems and methods for delivering Web content are provided. The systems and methods include a mechanism for providing interest data that may be applied to filter Web content at the provider side. A hierarchical data set of user-identified interests in received from the user's Web client. The hierarchical data set is parsed, and responsive thereto, one or more keyword attribute values are extracted from the hierarchical data set. The extracted keyword values are applied to filter content for delivery to a requesting Web client. | 12-10-2009 |
20100183148 | RECORDING KEYS IN A BROADCAST-ENCRYPTION-BASED SYSTEM - According to one embodiment of the present invention, a method for protecting content in a broadcast-encryption-based system, where the devices in the system receive a recording key table. Each device generates a set of recording keys from the recording key table using a media key variant calculated from the broadcast encryption system's media key block. The digital content is encrypted in a title key picked by the recorder. The selected title key is also encrypted in each one of the recorder's generated recording keys. To play back the content, a player uses one of its generated recording keys to decrypt the title key and the decrypt the content. The recording key table is designed so that any two devices are guaranteed to have at least one key in common during normal operation, although during a forensic situation, this rule can be abandoned. | 07-22-2010 |
20140283010 | Virtual key management and isolation of data deployments in multi-tenant environments - Tenants in a multi-tenant shared deployment are provided their own distinct key spaces over which they control a key management system. In this manner, virtual key management domains are created on a per-tenant (per-customer) basis so that, whenever a particular customer's data is co-tenanted, stored, transmitted or virtualized in the IT infrastructure of the provider's datacenter(s), it is secured using key management materials specific to that customer. This assures that the entirety of a tenant's data remains secure by cryptographically isolating it from other tenants' applications. The virtual key management domains are established using a broadcast encryption (BE) protocol and, in particular, a multiple management key variant scheme of that protocol. The broadcast encryption-based virtual key management system (VKMS) and protocol achieves per-tenant (as well as per-application) secured isolation of data and can be used across any combination of resources in or across all levels of a co-tenanted IT infrastructure. | 09-18-2014 |