Zum Hauptinhalt springen

Method of securing a changing scene, corresponding device, signal and computer program, method of updating a changing scene, corresponding device and computer program

Le Coq, Elouan ; Masson, Laurent ; et al.
2013
Online Patent

Titel:
Method of securing a changing scene, corresponding device, signal and computer program, method of updating a changing scene, corresponding device and computer program
Autor/in / Beteiligte Person: Le Coq, Elouan ; Masson, Laurent ; Gouesbet, Pierre ; Dufourd, Jean-Claude
Link:
Veröffentlichung: 2013
Medientyp: Patent
Sonstiges:
  • Nachgewiesen in: USPTO Patent Grants
  • Sprachen: English
  • Patent Number: 8,533,816
  • Publication Date: September 10, 2013
  • Appl. No: 12/989650
  • Application Filed: April 17, 2009
  • Assignees: Streamezzo (Paris, FR)
  • Claim: 1. A method comprising: a processor creating at least one securement rule defining at least one authorization for modifying a user interface element of a scene; the processor defining in a file a security policy that includes the created at least one securement rule in the security policy; and the processor assigning the security policy including the at least one securement rule to the user interface element of the scene, wherein the security policy comprises a list of pairs including each of the at least one securement rule paired with different portions of identification information, the identification information defining a plurality of sources capable of updating the scene during a rendering of the scene; wherein the security policy is operable for use in determining whether to allow or prohibit an update of the user interface element requested by a source by determining whether the source is included in the security policy, such that: when it is determined that the source of the update request is not included in any of the different portions of the identification information in the security policy then the update is prohibited, such that the update is prohibited based only on the determination that the source of the update request is not included in any of the different portions of the identification information in the security policy, and when it is determined that the source of the update request is included in at least one of the different portions of the identification information in the security policy, then the update is allowed when: it is verified that one of the portions of the identification information in which the source of the update request is included is paired with a securement rule which authorizes a modification action to be used for implementing the update.
  • Claim: 2. The method of claim 1 , wherein the security policy is defined in a file or flow separate from a description file or flow of the scene.
  • Claim: 3. The method of claim 1 , wherein the security policy is defined in a description file or flow of the scene.
  • Claim: 4. The method of claim 1 , wherein the user interface element is organized in a tree structure associating parent element with at least one child element, and another security policy assigned to the parent element likewise applies by default to the at least one child element.
  • Claim: 5. The method of claim 4 , further comprising defining at least one group consisting of user interface elements of the scene sharing a single security policy.
  • Claim: 6. The method of claim 5 , wherein the modification action includes at least one of: modification of the user interface element in the scene; deletion of the user interface element from the scene; modification of the security policy in the scene.
  • Claim: 7. The method of claim 6 , wherein the at least one securement rule includes at least one item of information including at least one of: a restriction of applying the modification action to the user interface element of the scene; a restriction of applying a modification to a group of user interface elements of the scene; a restriction of applying a modification to all user interface elements of the scene of a predefined type; a restriction of applying a modification based on at least one predetermined criterion; a restriction of executing a command in a given context of the scene.
  • Claim: 8. The method of claim 7 , wherein the different portions of identification information each include at least one of: an identifier; an IP address; and a certificate used to sign content transmitted by the source.
  • Claim: 9. The method of claim 1 , wherein the identification information is provided by a means of access to the update.
  • Claim: 10. The method of claim 1 , wherein the identification information is at least one of present in the update request, and transmitted with the update request.
  • Claim: 11. The method of claim 1 , wherein the at least one securement rule defines the at least one authorization for modifying the user interface element of the scene, and a location of the scene where the modification is authorized.
  • Current U.S. Class: 726/19
  • Patent References Cited: 6911982 June 2005 Signes ; 6963972 November 2005 Chang et al. ; 7746882 June 2010 Vedantham et al. ; 2004/0202382 October 2004 Pilu ; 2005/0086354 April 2005 Orchard ; 2007/0180496 August 2007 Fransdonk ; 2008/0049789 February 2008 Vedantham et al. ; 2008/0134167 June 2008 Chae et al. ; 2011/0055384 March 2011 Audinet et al. ; WO 9939272 August 1999 ; 0169350 September 2001 ; WO 0169350 September 2001
  • Other References: International Search Report from International Application No. PCT/EP2009/054629 dated Aug. 13, 2009. cited by applicant ; Dufourd, J C. et al., An MPEG Standard for Rich Media Services, IEEE, Oct.-Dec. 2005, pp. 60-68 (9 pages). cited by applicant ; Iannella, R., Rights Languages for IPMP using ODRL, International Organisation for Standardisation, IPR Systems Pty. Ltd., Oct. 13, 2000, pp. 1-28. cited by applicant ; Office Action from Chinese Patent Application No. 200980114102.3, dated Nov. 29, 2012. cited by applicant ; Written Opinion from International Application No. PCT/EP2009/054629, dated Aug. 13, 2009. cited by applicant
  • Assistant Examiner: Elahi, Shan
  • Primary Examiner: Rao, Andy
  • Attorney, Agent or Firm: Zilka-Kotab, PC

Klicken Sie ein Format an und speichern Sie dann die Daten oder geben Sie eine Empfänger-Adresse ein und lassen Sie sich per Email zusenden.

oder
oder

Wählen Sie das für Sie passende Zitationsformat und kopieren Sie es dann in die Zwischenablage, lassen es sich per Mail zusenden oder speichern es als PDF-Datei.

oder
oder

Bitte prüfen Sie, ob die Zitation formal korrekt ist, bevor Sie sie in einer Arbeit verwenden. Benutzen Sie gegebenenfalls den "Exportieren"-Dialog, wenn Sie ein Literaturverwaltungsprogramm verwenden und die Zitat-Angaben selbst formatieren wollen.

xs 0 - 576
sm 576 - 768
md 768 - 992
lg 992 - 1200
xl 1200 - 1366
xxl 1366 -