Patent application number | Description | Published |
20080310445 | Provisioning Bandwidth For A Digital Media Stream - Provisioning bandwidth for a digital media stream, the digital media stream characterized by a bandwidth, including adapting by a media server a first portion of the bandwidth for transmission of the content of a first channel and at least one second, smaller portion of the bandwidth for transmission of the content of at least one second channel; and transmitting, multiplexed together in the digital media stream, by the media server to a media display device, the content of the first channel and the content of the second channel, the content of the second channel transmitted with a lower quality than the content of the first channel. | 12-18-2008 |
20080310446 | Provisioning Bandwidth For A Digital Media Stream - Provisioning bandwidth for a digital media stream, the digital media stream characterized by a bandwidth, including monitoring, by a media display device, a user's viewing behavior to create a user profile; transmitting, to a media server, the user profile; and responsive to receiving, by the media server, a user selection of a first channel: selecting, for transmission to the media display device, in dependence upon the user profile, at least one second channel; adapting a first portion of the bandwidth for transmission of the content of the first channel and a second, smaller portion of the bandwidth for transmission of the content of the second channel; and transmitting, multiplexed together in the digital media stream, the content of the first channel and the content of the second channel, the content of the second channel transmitted with a lower quality than the content of the first channel. | 12-18-2008 |
20080310454 | Provisioning Bandwidth For A Digital Media Stream - Provisioning bandwidth for a digital media stream, the digital media stream characterized by a bandwidth, including receiving, by a media server from a media display device, information describing a user's anticipated viewing requirements; selecting, by the media server in dependence upon the information describing the user's anticipated viewing requirements, a first channel and at least one second channel; and before receiving, by the media server from the media display device, a user selection of either channel: adapting a first portion of the bandwidth for transmission of the content of a first channel and a second, smaller portion of the bandwidth for transmission of the content of the second channel; and transmitting, multiplexed together in the digital media stream, the content of the first channel and the content of the second channel, the content of the second channel transmitted with a lower quality than the content of the first channel. | 12-18-2008 |
20100318677 | CONTENT PROTECTION CONTINUITY THROUGH AUTHORIZED CHAINS OF COMPONENTS - Provided is a method for the distribution and control of digital content such that Quality of Experience (QoE) is maintained. Content is protected from when the content is encrypted to when it is used. To ensure the QoE of particular content, a content owner embeds a list of required or preferred components that must be employed to render the content. The content owner's list of required or preferred components specifies specific components “trusted” to correctly process the content. The specified chain of preferred components is compared to possible devices in the system that processes the content. If there are multiple acceptable devices for a specific link, a preference system is employed to determine the device that executed the particular part of the chain. The preference system is based upon a number of factors, such as, but not limited to, performance characteristics, user preferences, expected stability, power requirements and system preferences. | 12-16-2010 |
20110023007 | Associating Workflows With Code Sections In A Document Control System - Systems, methods, and articles of manufacture for facilitating workflow control for a document. In one embodiment, a portion of computer program source code is associated with a workflow. The computer program is monitored for reference to or by the portion of the computer program source code. In response to a reference to or by the computer program source code, the workflow is fired off. | 01-27-2011 |
20110026713 | Efficient Rebinding of Partitioned Content Encrypted Using Broadcast Encryption - Provided is a method for rendering media content wherein a request to render a first media content stored in a first partition is received, wherein the first partition stores the first and a second media content; the media content is correlated to a first management key block (MKB), binding ID (IDb) and authorization table (AT); the first MKB, IDb and AT are compared to a current MKB, IDb and AT; and if any of the first MKB, IDb or AT do not correspond to the current MKB, IDb or AT, respectively, generating a second partition by rebinding the first media content with respect to the current MKB, IDb and AT to generate a title key; and associating the first media content, the current MKB, IDb, AT and title key with the second partition, wherein the second media content remains associated with the first MKB, IDb, AT and partition. | 02-03-2011 |
20110161795 | INTER-APPLICATION DOCUMENT ACCESS - An operating system can be extended to allow open documents to be automatically transferred from one application to another without saving the open documents. When a request is received to use an open document from a first application in a second application, an open document unit can determine if the open document has not been saved. The open document unit can create a temporary file based on the open document. The open document unit can open the temporary file in the second application. In addition, the open document unit can convert the temporary file into a format compatible with the second application if the temporary file's format is not compatible with the second application. | 06-30-2011 |
20130007214 | Content Protection Continuity Through Authorized Chains of Components - Provided is techniques for the distribution and control of digital content such that Quality of Experience (QoE) is maintained. Content is protected from when the content is encrypted to when it is used. To ensure the QoE of particular content, a content owner embeds a list of required or preferred components that must be employed to render the content. The content owner's list of required or preferred components specifies specific components “trusted” to correctly process the content. The specified chain of preferred components is compared to possible devices in the system that processes the content. If there are multiple acceptable devices for a specific link, a preference system is employed to determine the device that executed the particular part of the chain. The preference system is based upon a number of factors, such as, but not limited to, performance characteristics, user preferences, expected stability, power requirements and system preferences. | 01-03-2013 |
20130022200 | Broadcast Encryption Based Security System - Provided are techniques for providing a home or business security system that relies upon data encryption for both communication and the storage of content. The disclosed technology incorporates all the devices necessary for a comprehensive security system, including, but not limited to, controllers, monitors, alarms and communication media. The system may include an unlimited number of devices and, further, individual devices may be added and removed as needed. Users may define and change the boundaries of a security system or, in other words, decide what devices to include or not include in such a system. A defined boundary does not need to be confined to a single location. In one embodiment, the claimed subject matter incorporates xCP based broadcast encryption technology. | 01-24-2013 |
20140059129 | USER-SPECIFIED USER APPLICATION DATA SHARING - An indication initiated by a user within a first local user application that specifies user-selected data sharable by the first local user application is received at an operating system of a first computing device used by the user. A determination is made as to whether any other user applications share data compatibility with at least one portion of the specified user-selected data. In response to determining that at least one other user application shares the data compatibility with the at least one portion of the specified user-selected data, a data share indication to the at least one other user application is configured. | 02-27-2014 |
20150058435 | Fast Mobile Web Applications Using Cloud Caching - Methods and systems may provide for identifying a web application having a primary resource that references a secondary resource, wherein the primary resource contains a version identifier of the primary resource and a version identifier of the secondary resource. Additionally, a cached version of the primary resource and a cached version of the secondary resource may be created on a mobile device, and the version identifier of the primary resource may be used to determine whether the secondary resource is stale. In one example, it may be determined that staleness checking has been disabled in the secondary resource. Moreover, if the primary resource does not contain the version identifiers, cloud caching may be used. | 02-26-2015 |