TRANSFERRING PLAYBACK QUEUES BETWEEN DEVICES

    公开(公告)号:WO2018213005A1

    公开(公告)日:2018-11-22

    申请号:PCT/US2018/030788

    申请日:2018-05-03

    Applicant: APPLE INC.

    Abstract: In some implementations, a computing device can transfer a playback queue between the computing device and a playback device. For example, the computing device can detect when the computing device is within a threshold distance of a playback device. The computing device can establish a connection to the playback device and receive state information describing the media playback state of the playback device. The computing device can determine the media playback state of the computing device. The computing device can present graphical user interfaces for initiating a transfer of a playback queue between the computing device and the playback device based on the playback state of the devices. The computing device can initiate a transfer of the playback queue in response to user input to one of the graphical user interfaces or automatically based on the context of the computing device.

    PROTECTION OF AUDIO OR VIDEO DATA IN A PLAYBACK DEVICE
    3.
    发明申请
    PROTECTION OF AUDIO OR VIDEO DATA IN A PLAYBACK DEVICE 审中-公开
    在播放设备中保护音频或视频数据

    公开(公告)号:WO2008085845A2

    公开(公告)日:2008-07-17

    申请号:PCT/US2008/000057

    申请日:2008-01-02

    Abstract: Method and apparatus to prevent hacking of encrypted audio or video content during playback. Hackers, using a debugging attachment or other tools, can illicitly access encrypted data in memory in a playback device when the data is decrypted during playback and momentarily stored in digital form. This hacking is defeated here by methodically "poisoning" the encrypted data so that it is no longer playable by a standard decoder. The poisoning involves deliberate alteration of certain bit values. On playback, the player invokes a special secure routine that provides correction of the poisoned bit values, for successful playback.

    Abstract translation: 播放期间防止加密音频或视频内容黑客入侵的方法和装置。 使用调试附件或其他工具的黑客可以在播放过程中解密数据并立即以数字形式存储时非法访问播放设备中的加密数据。 这个黑客在这里通过有条不紊地“中毒”加密的数据,使其不能被标准解码器播放,从而被击败。 中毒涉及故意改变某些位值。 在播放时,播放器调用特殊的安全程序,提供中毒位值的校正,以便成功播放。

    DATA PROTECTION FOR OPAQUE DATA STRUCTURES
    6.
    发明申请
    DATA PROTECTION FOR OPAQUE DATA STRUCTURES 审中-公开
    数据保护用于OPAQUE数据结构

    公开(公告)号:WO2013130609A1

    公开(公告)日:2013-09-06

    申请号:PCT/US2013/028023

    申请日:2013-02-27

    Applicant: APPLE INC.

    CPC classification number: G06F9/4423 G06F9/4482 G06F21/14 G06F21/52

    Abstract: Methods, media and systems that use an encoded opaque pointer in an API between a client process and a library process. An encoded opaque pointer, in one embodiment, can be received by the library process from the client process, and the library process can decode the opaque pointer to obtain an address in memory containing a data structure pointed to by the opaque pointer. The library process can operate on the data structure to create a revised or processed data structure, stored in the same or different address in heap memory or stack memory, and the library process can encode and return a new opaque pointer, for the processed data structure, to the client process.

    Abstract translation: 在客户端进程和库进程之间的API中使用编码的不透明指针的方法,介质和系统。 在一个实施例中,编码的不透明指针可以由库进程从客户端进程接收,并且库进程可以对不透明指针进行解码以获得包含由不透明指针指向的数据结构的存储器中的地址。 库过程可以对数据结构进行操作以创建存储在堆存储器或堆栈存储器中的相同或不同地址中的修改或处理的数据结构,并且库过程可以编码并返回新的不透明指针,用于处理的数据结构 ,到客户端进程。

    SYSTEM AND METHOD FOR BLURRING INSTRUCTIONS AND DATA VIA RELOCATION
    7.
    发明申请
    SYSTEM AND METHOD FOR BLURRING INSTRUCTIONS AND DATA VIA RELOCATION 审中-公开
    用于通过转移处理指令和数据的系统和方法

    公开(公告)号:WO2012151075A1

    公开(公告)日:2012-11-08

    申请号:PCT/US2012/034716

    申请日:2012-04-23

    CPC classification number: G06F21/14 G06F21/125

    Abstract: Disclosed herein are systems, methods, and non-transitory computer-readable storage media for obfuscating a computer program. A system configured to practice the method identifies a set of executable instructions at a first location in an instruction section of the computer program and identifies a second location in a data section of the computer program. Then the system moves the set of executable instructions to the second location and patches references in the computer program to the set of executable instructions to point to the second location. The instruction section of the computer program can be labeled as_TEXT,_ text and the data section of the computer program is labeled as_DATA,_ data. The set of executable instructions can include one or more non-branching instructions optionally followed by a branching instruction. The placement of the first and second locations can be based on features of a target computing architecture, such as cache size.

    Abstract translation: 本文公开了用于模糊计算机程序的系统,方法和非暂时的计算机可读存储介质。 被配置为练习该方法的系统在计算机程序的指令部分中的第一位置识别一组可执行指令,并且识别计算机程序的数据部分中的第二位置。 然后系统将可执行指令集移动到第二位置,并将计算机程序中的引用修补到指向第二位置的可执行指令集。 计算机程序的指令部分可以标记为_TEXT,_文本,计算机程序的数据部分标记为__DATA,_ data。 该可执行指令集可以包括一个或多个非分支指令,可选地跟随分支指令。 第一和第二位置的放置可以基于诸如高速缓存大小的目标计算架构的特征。

    METHOD AND APPARATUS FOR VIDEO FRAME MARKING
    8.
    发明申请
    METHOD AND APPARATUS FOR VIDEO FRAME MARKING 审中-公开
    视频框架标记的方法和装置

    公开(公告)号:WO2008143718A1

    公开(公告)日:2008-11-27

    申请号:PCT/US2008/000653

    申请日:2008-01-17

    Abstract: Method and apparatus for marking individual video frames of an H.264/ AVC standard compliant or equivalent digital video stream. Each video frame in a H.264/AVC video stream is conventionally divided into NAL units. There are typically a number of NAL units for each video frame. There is specified in the H.264/AVC standard the SEI (Supplemental Enhancement Information) type. This type includes the user data unregistered type, which can contain arbitrary data. In the present method and apparatus, an NAL unit of this type is provided at the beginning of each video frame, preceding the other NAL units associated with that video frame. The data contained in that special SEI unit is typically control information for downstream control of use of the video content. Examples of the type of control information are stream positioning data such as a video frame number; stream bit rate, such as normal, fast forward; decryption data, such as a decryption key or key derivation seed; and validation elements, such as a checksum or hash function value or signature.

    Abstract translation: 用于标记H.264 / AVC标准兼容或等效数字视频流的各个视频帧的方法和装置。 H.264 / AVC视频流中的每个视频帧通常被划分成NAL个单元。 每个视频帧通常有多个NAL单元。 在H.264 / AVC标准中规定了SEI(补充增强信息)类型。 这种类型包括可以包含任意数据的用户数据未注册类型。 在本方法和装置中,这种类型的NAL单元在与该视频帧相关联的其他NAL单元之前的每个视频帧的开始处被提供。 包含在该特殊SEI单元中的数据通常是下游控制视频内容的使用的控制信息。 控制信息类型的示例是诸如视频帧号的流定位数据; 流比特率,如正常,快进; 解密数据,如解密密钥或密钥导出种子; 和验证元素,例如校验和或散列函数值或签名。

    SOFTWARE OR OTHER INFORMATION INTEGRITY VERIFICATION USING VARIABLE BLOCK LENGTH AND SELECTION
    9.
    发明申请
    SOFTWARE OR OTHER INFORMATION INTEGRITY VERIFICATION USING VARIABLE BLOCK LENGTH AND SELECTION 审中-公开
    使用可变块长度和选择的软件或其他信息完整性验证

    公开(公告)号:WO2008085922A2

    公开(公告)日:2008-07-17

    申请号:PCT/US2008/000169

    申请日:2008-01-03

    CPC classification number: G06F21/64

    Abstract: An integrity verification process and associated apparatus to detect tampering or other alterations to computer code (software) or other computer files, and especially useful to detect tampering with code by hackers who might try to plant their own malicious code in the software. To make the verification process more robust versus hackers, each e.g., object code file to be protected is first selected using some sort of rule, then partitioned into variable length blocks or portions, the lengths varying in an unpredictable manner. Each portion has its checksum or hash value computed. An accompanying verification file is created which includes a vector for each portion including the portion's start address in memory, length, and the computed checksum or hash value. When the code is later to be run (executed) the verification file is conventionally read and each portion is verified by computing its checksum or hash value using the same algorithm as before, and comparing that to the value in the associated verification file vector. Lack of a match in the two values indicates tampering, so execution of the code can be halted.

    Abstract translation: 完整性验证过程和相关联的设备,用于检测对计算机代码(软件)或其他计算机文件的篡改或其他更改,并且特别有用于检测骇客可能尝试在软件中种植自己的恶意代码的篡改代码。 为了使验证过程比黑客更健壮,每个例如待保护的目标代码文件首先使用某种规则来选择,然后被分割成可变长度的块或部分,长度以不可预测的方式变化。 每个部分都有其计算的校验和或散列值。 创建伴随的验证文件,其中包括每个部分的向量,包括部分在内存中的起始地址,长度以及计算的校验和或哈希值。 当代码稍后运行(执行)时,常规地读取验证文件,并且通过使用与之前相同的算法计算其校验和或散列值来验证每个部分,并将其与相关联的验证文件向量中的值进行比较。 两个值中缺少匹配表示篡改,因此可以停止执行代码。

    CREDENTIAL DELEGATION
    10.
    发明公开

    公开(公告)号:EP3975576A1

    公开(公告)日:2022-03-30

    申请号:EP21207862.0

    申请日:2018-05-03

    Applicant: Apple Inc.

    Abstract: In some implementations, a computing system can be configured so that a first user device can delegate a first user's media account credentials to second user device corresponding to a second user. For example, a playback device may be configured with a the second user's media account credentials for accessing media items through a network media service. A first user may wish to play media items associated with the first user's media account credentials on the playback device. To do so, the first user device can request a device identifier for the playback device, request and obtain a delegate token for the device identifier from the media service, and provide the delegate token along with media item information to the playback device. The playback device can then use the delegate token to request the media item associated with the first user's media access account.

Patent Agency Ranking