会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 5. 发明申请
    • Midstream Determination of Varying Bandwidth Availability
    • 中期确定不同带宽可用性
    • US20060168295A1
    • 2006-07-27
    • US11277056
    • 2006-03-21
    • Troy BatterberryAlexandre GrigorovitchAnders KlemetsJames StewartYejin Choi
    • Troy BatterberryAlexandre GrigorovitchAnders KlemetsJames StewartYejin Choi
    • G06F15/16
    • H04L65/4084H04L29/06027H04L65/80
    • Systems and methods for midstream determination of varying available bandwidth for streaming content between two network entities are described. During content streaming, a client requests a server to surge the content transmission rate. One or more bandwidth measurements are taken during the surge to determine if the increased transmission rate can be adequately managed. If the increased transmission rate can be adequately managed, the client may request the server to transmit remaining content at a transmission rate that is not greater than the increased, or surged, transmission rate. In a multi-bitrate file scenario, the surge rate may be higher than the rate of the fastest useable stream. In such a case, the fastest useable stream is selected. If the increased transmission rate is not suitable for future transmission, then the rate may remain at the original transmission rate.
    • 描述了用于中间流确定两个网络实体之间的流内容的可变带宽的系统和方法。 在内容流传输期间,客户端请求服务器浪费内容传输速率。 在浪涌期间进行一个或多个带宽测量,以确定是否可以充分地管理增加的传输速率。 如果可以适当地管理增加的传输速率,则客户端可以请求服务器以不大于增加或激增的传输速率的传输速率发送剩余内容。 在多比特率文件场景中,浪涌速率可能高于最快可用流的速率。 在这种情况下,选择最快的可用流。 如果增加的传输速率不适合将来传输,则速率可能保持在原始传输速率。
    • 6. 发明申请
    • Systems and methods for disabling software components to protect digital media
    • 禁止软件组件保护数字媒体的系统和方法
    • US20050257251A1
    • 2005-11-17
    • US10835951
    • 2004-04-30
    • Jeffrey McKuneChengyun ChuJames AlkoveSumedh BardeAlexandre Grigorovitch
    • Jeffrey McKuneChengyun ChuJames AlkoveSumedh BardeAlexandre Grigorovitch
    • G06F21/00H04L9/00H04L9/32
    • G06F21/10
    • A list of computing components to be disabled can be distributed through a computer readable medium to computing devices. A process on these computing devices can read the list and disable listed components. The components can be permanently disabled, or disabled for a limited purpose. A list or list update may be provided with a digital media object that specifies a more or less stringent revocation policy for that object. A media object may also specify a maximum age for the list. This allows owners of digital media to control the stringency of media protection for their property. The process that accesses the list may prompt updates to the list, informing users of component disabling, and prompt replacement of disabled components. Finally, the invention provides techniques for securely transmitting and storing the list to protect it from alteration by unauthorized entities.
    • 要禁用的计算组件的列表可以通过计算机可读介质分发到计算设备。 这些计算设备上的进程可以读取列表并禁用列出的组件。 组件可以永久禁用或禁用,用于有限的目的。 可以向数字媒体对象提供列表或列表更新,该数字媒体对象为该对象指定或多或少严格的撤销策略。 媒体对象也可以指定列表的最大年龄。 这样就可以让数字媒体的所有者控制媒体对其财产的保护。 访问列表的进程可能会提示更新列表,通知用户组件禁用,并提示替换已禁用的组件。 最后,本发明提供了用于安全地发送和存储列表以保护其免受未授权实体的改变的技术。
    • 9. 发明申请
    • ESTABLISHMENT OF A RELATIONSHIP BETWEEN WIRELESS DEVICES
    • 建立无线设备之间的关系
    • US20100082990A1
    • 2010-04-01
    • US12240752
    • 2008-09-29
    • Alexandre Grigorovitch
    • Alexandre Grigorovitch
    • H04L9/00
    • H04W12/06
    • Embodiments related to the establishment of a relationship between wireless devices are disclosed. In one disclosed embodiment, a wireless device includes an image capture device, a wireless transmitter and receiver, a logic subsystem, and memory comprising instructions executable by the logic subsystem to capture a first image via the image capture device, identify authentication features of the first image, and receive authentication data from a remote media device via the wireless receiver that comprises authentication features of a second image. The instruction further cause the logic subsystem to compare the authentication features of the second image to the authentication features of the first image to establish a trusted relationship with the remote media device if the authentication features of the second image exhibit a pre-determined relationship to the authentication features of the first image.
    • 公开了与建立无线设备之间的关系的实施例。 在一个所公开的实施例中,无线设备包括图像捕获设备,无线发射器和接收器,逻辑子系统和存储器,其包括可由逻辑子系统执行以通过图像捕获设备捕获第一图像的指令,识别第一 图像,以及经由包括第二图像的认证特征的无线接收器从远程媒体设备接收认证数据。 该指令还使得逻辑子系统将第二图像的认证特征与第一图像的认证特征进行比较,以便如果第二图像的认证特征与第二图像的认证特征呈现预定关系,则与远程媒体设备建立可信关系 第一张图片的验证功能。