Patent application number | Description | Published |
20140012966 | Distributed Virtual Switch Configuration and State Management - Techniques are disclosed for pushing configuration changes of a distributed virtual switch from a management server to a plurality of host servers underlying the distributed virtual switch. The approach includes sending, in parallel, by the management server, a message to each of the plurality of host servers. The message specifies a final configuration state for one or more virtual ports emulated via virtualization layers of the host servers. The approach further includes determining, by each of the plurality of host servers, port state configuration changes to make to the virtual ports to achieve the final configuration state, and reconfiguring, by each of the plurality of host servers, their respective virtual ports, to match the final configuration state. | 01-09-2014 |
20160105381 | DISTRIBUTED VIRTUAL SWITCH CONFIGURATION AND STATE MANAGEMENT - Techniques are disclosed for pushing configuration changes of a distributed virtual switch from a management server to a plurality of host servers underlying the distributed virtual switch. The approach includes sending, in parallel, by the management server, a message to each of the plurality of host servers. The message specifies a final configuration state for one or more virtual ports emulated via virtualization layers of the host servers. The approach further includes determining, by each of the plurality of host servers, port state configuration changes to make to the virtual ports to achieve the final configuration state, and reconfiguring, by each of the plurality of host servers, their respective virtual ports, to match the final configuration state. | 04-14-2016 |
Patent application number | Description | Published |
20080286387 | Standardized method for recovering enriched Indian date extract (IDE), properties of IDE and applications thereof - Disclosed are (i) a standardized method for the recovery of the polyphenolic contents from the seed coats of | 11-20-2008 |
20100075360 | UV BASED CELL VIABILITY AS AN INDICATOR OF SUN PROTECTION FACTOR AND METHODS OF MEASUREMENT THEREOF - Disclosed is a simple method of determining SPF based on the staining pattern of viable cells like mouse fibroblasts and human keratinocytes after exposure to ultraviolet radiations. The method provides results comparable to the standard methods of SPF measurement using human subjects. | 03-25-2010 |
20100240767 | Melanogenesis inhibitiuon by 3,5-dimethoxy-4'-hydroxystilbenes and cosmeceutical compositions thereof - Disclosed is the cosmeceutical potential of 3,5-dimethoxy-4′-hydroxystilbene in terms of its melanogenesis inhibitory and photo protective activities. Also disclosed does a topical melanogenesis inhibitory composition comprising 0.01 to 50% by weight of 3,5-dimethoxy-4′-hydroxystilbene. | 09-23-2010 |
20110033565 | Protective Compositions for Dermal Papilla Cells - Disclosed are novel protective compositions for dermal papilla cells. In an embodiment the protective compositions of the present invention comprise 0.25% w/w or above of compositions comprising at least 10% w/w and above of 1-O-galloyl-β-D-glucose (β-glucogallin). In an embodiment, the said protective composition additionally comprises 50% to greater than 50% gallates including mucic acid 1,4-lactone 5-O-gallate, mucic acid 2-O-gallate, mucic acid 6-Methyl ester 2-O-gallate, mucic acid 1-Methyl ester 2-O-gallate and ellagic acid. In another embodiment the invention also encompasses synergistic protective compositions comprising the said protective compositions and 0.5% concentrate of liquid endosperm of | 02-10-2011 |
Patent application number | Description | Published |
20110119743 | COMMUNICATION OF CONTENT TO EVENT ATTENDEES - A method is provided for enrolling and authenticating an attendee of an event or activity so that content can be delivered to a mobile device associated with the attendee. The method includes receiving an identifier of a mobile communication device associated with an authorized attendee while the attendee and the mobile communication device are in a venue at which the event or activity takes place. The mobile communication device is registered by storing the identifier in a database of authorized attendees who have entered the venue. Entitlement credentials are communicated to the mobile device that are to be further communicated from the mobile device to a content server when requesting event or activity related content therefrom. | 05-19-2011 |
20110129087 | System and Method for Encrypting and Decrypting Data - A method is provided for creating an encrypted data file from a data file having a sample entry box and a media data box. The sample entry box has description information therein. The media data box includes media data therein. The method includes: receiving the data file; encrypting the media data within the media data box with an encryption key; replacing the sample entry box with an encoded box; creating a sinf box within the encoded box; creating a form a box within the sinf box; and creating an schm box within the sinf box. The schm box indicates the type of formatting of the encrypted media data. The encoded box does not include an initial counter that may be used to decrypt the encrypted media data. | 06-02-2011 |
20110145562 | SYSTEM AND METHOD FOR SECURELY TRANSFERING CONTENT FROM SET-TOP BOX TO PERSONAL MEDIA PLAYER - A media player is provided for receiving session data from a security socket layer. The session data includes encrypted content data, a content key and digital rights data, wherein the content key and the digital rights data have been encrypted with a SSL session key. The said media player includes a first processor portion and a second processor portion. The first processor portion is arranged to receive the session data, has a second key. The first processor portion and can generate the SSL session key and can decrypt the session data with the SSL session key. The first processor portion can further re-encrypt the decrypted content key with the second key and can output the re-encrypted content key and digital rights data. The second processor portion is arranged to receive the re-encrypted content key and digital rights data. The first processor portion can further decrypt the content, and is externally inaccessible. | 06-16-2011 |
20110235801 | SECURE TRANSCODING OF CONTENT - A source device determines content rights for encrypted content in the first encoding standard using a first rights data file. The source device creates a second rights data file for transcoded content in the second encoding standard. The source device performs a key management operation including communicating a decryption key for the encrypted content in the first encoding standard to a transcoder. The source device transfers the encrypted content in the first encoding standard to the transcoder. The transcoder decrypts the encrypted content, transcodes the content from the first encoding standard to the content in the second encoding standard, and re-encrypts the content in the second encoding standard using a second encryption key. The transcoder then transfers the encrypted content in the second encoding standard to an indicated device. | 09-29-2011 |
20110289592 | DIGITAL RIGHTS MANAGEMENT WITH IRREGULAR NETWORK ACCESS - There is a performing of digital rights management (DRM), operable in an offline mode with respect to a communications network. The performing includes identifying a stored rights object associated with a stored asset. The stored rights object includes reporting duration information associated with the stored asset. The performing also includes determining, utilizing a processor, whether a transmission of an early status message is a successful communication based on an early status message determination. If a failure in communicating the early status message is determined, utilizing the stored asset. The performing may also include transmitting an early status message and/or later status message after identifying the stored rights object. There is also a performing of digital rights management (DRM) associated with a DRM system and operable in an offline mode with respect to a communications network. There are also client devices, communicating systems, computer readable mediums and protocols. | 11-24-2011 |
20120131339 | SYSTEM AND METHOD FOR SECURE BI-DIRECTIONAL COMMUNICATION - An aspect of the present invention provides a method of communicating within a system having a first device, a second device, a key distribution device and an interactive service portal device. The method includes: storing a tag within the interactive service portal device; associating the tag with the first device; registering the first device with the key distribution device; associating, by way of the key distribution device, an encryption key with the first device; accessing, by way of the second device, the tag; providing information to the second device; and establishing secure bi-directional interactive communication, corresponding to the tag, between the first device and the second device based on a relationship between the information and the encryption key. | 05-24-2012 |
20140095890 | SYSTEMS AND METHODS FOR MANIPULATING SENSITIVE INFORMATION IN A SECURE MOBILE ENVIRONMENT - Methods and devices for protecting and manipulating sensitive information in a secure mobile environment are disclosed. Methods and devices for processing secure transactions and secure media processing up to rendering in human readable form using abstract partitioning between non-secure and secure environments are disclosed. | 04-03-2014 |
20140270161 | METHOD AND APPARATUS FOR SECURE STORAGE AND RETRIEVAL OF LIVE OFF DISK MEDIA PROGRAMS - A method and system are provided for securely storing and retrieving live off-disk media programs. Events delineate media segments, each of which are encrypted with a different key so as to be streamable to a remote device via digital living network alliance (DLNA) or HTTP live streaming protocols. Media segments and identifiers for managing the storage and retrieval of such media segments are compatible with live streaming data structures, obviating the need to re-encrypt data streams. | 09-18-2014 |
20140376719 | DTCP Converter for HLS - A method for DTCP to HLS conversion is provided that starts with a standard DTCP Protected Content Packet (PCP) structure. The PCP payload data is chunked at defined chunk boundaries. Each chunk is then appended with a pad to be compatible with HLS. An HLS playlist is then provided using the PCP header with identification of the chunks and a keytag. The chunk is encrypted with a DTCP key calculated by the DTCP standard using: (a) copy control bits; (b) a nonce, and (c) an exchange key ID. Relevant PCP header fields are provided in the keytag for the HLS playlist, including the value of the copy control bits, the nonce and the exchange key ID, supporting the transaction that enables calculation of the DTCP content key to enable later decryption of the chunks. | 12-25-2014 |
20140380352 | Trick Play Seek Operation for HLS Converted from DTCP - A process to enable trick play operations is provided for HLS streaming video that has been converted by a system from DTCP. The system server provides a modified SEEK operation when an HLS GET message is received from an HLS client player. For the process, a DLNA header is provided from the HLS client player by including it in the HLS GET message. The HLS client also provides a DLNA RANGE REQUEST that requests a range of chunks making up a video desired and a seek point from where a seek operation is needed. The HLS server recognizes the DLNA header of the HLS GET message and DLNA RANGE REQUEST and obtains a range of chunks making up an extent of the recorded video using metadata fields. The server then generates a new HLS playlist with identification of the chunks and keytag corresponding to the seek operation. The server will provide chunks from the seek point and a rolling playlist to identify chunks and keytag from the seek point. | 12-25-2014 |
20150244973 | COPY COUNT FOR DTCP WITH AN ABBREVIATION HASH USED FOR CHECK IN COPY - A Digital Rights Management (DRM) system is provided that reduces time for a move transaction using DTCP-IP when a copy is moved back or checked back in to an originating Personal Video Recorder (PVR). During a DTCP MOVE transaction, instead of transferring the full asset in a check back in operation to the PVR, a unique and abbreviated representation of the original copy of the asset would be made for the transfer. This abbreviated representation takes the form of a hash constructed from a hashing function which uses characteristics of the asset as inputs. This hash will have to be a unique and near guaranteed indicator of the original content, to a high probability, so that the copy control system could live up to the spirit of the DTCP spec and the DLNA interoperability guidelines. | 08-27-2015 |
20160078198 | DIGITAL RIGHTS MANAGEMENT WITH IRREGULAR NETWORK ACCESS - There is a performing of digital rights management (DRM), operable in an offline mode with respect to a communications network. The performing includes identifying a stored rights object associated with a stored asset. The stored rights object includes reporting duration information associated with the stored asset. The performing also includes determining, utilizing a processor, whether a transmission of an early status message is a successful communication based on an early status message determination. If a failure in communicating the early status message is determined, utilizing the stored asset. The performing may also include transmitting an early status message and/or later status message after identifying the stored rights object. There is also a performing of digital rights management (DRM) associated with a DRM system and operable in an offline mode with respect to a communications network. There are also client devices, communicating systems, computer readable mediums and protocols. | 03-17-2016 |
20160092663 | DIGITAL RIGHTS MANAGEMENT WITH IRREGULAR NETWORK ACCESS - There is a performing of digital rights management (DRM), operable in an offline mode with respect to a communications network. The performing includes identifying a stored rights object associated with a stored asset. The stored rights object includes reporting duration information associated with the stored asset. The performing also includes determining, utilizing a processor, whether a transmission of an early status message is a successful communication based on an early status message determination. If a failure in communicating the early status message is determined, utilizing the stored asset. The performing may also include transmitting an early status message and/or later status message after identifying the stored rights object. There is also a performing of digital rights management (DRM) associated with a DRM system and operable in an offline mode with respect to a communications network. There are also client devices, communicating systems, computer readable mediums and protocols. | 03-31-2016 |