Patent application number | Description | Published |
20080212504 | Dynamic stack-based networks for resource constrained devices - A wireless sensor network provides a communication link between a plurality of nodes. Communication among the plurality of nodes is based one or more protocol components that are associated with a selected quality of service (QoS). A preamble byte can have bit values assigned based on application preferences, and the preamble byte used to select one or more protocol components from a component library. The preamble byte is combined with a data payload and transmitted to additional nodes based on the selected QoS. | 09-04-2008 |
20090019283 | System and method for a secure multi-level network access mechanism using virtual service set identifier broadcast - A method, system, and computer program product for network management, including masking a true service set identifier (SSID) in beacon frame; and broadcasting the beacon frame with the masked true SSID, whereby an authorized device retrieve the true SSID from the broadcast beacon frame. | 01-15-2009 |
20090245527 | LINEAR FULL DUPLEX SYSTEM AND METHOD FOR ACOUSTIC ECHO CANCELLATION - A linear full duplex system and method for acoustic echo cancellation is disclosed. In one embodiment, a method includes calculating a residual echo after subtraction of an echo estimate from a near end signal associated with a communication, refining a far end and a residual signal associated with the communication, updating, based on the far end signal, the echo estimate of an echo associated with the communication, subtracting the echo from the near end signal based on the echo estimate to cancel the echo associated with the communication, updating, based on the refined far end and refined residual signal, the adaptive filter module used for echo estimation, and detecting a steady state and, during the steady state, dynamically detecting internal substates and switching between the internal substates and detecting and managing double talk associated with the communication. | 10-01-2009 |
20090248529 | SYSTEM AND METHOD FOR PROVIDING VALUE ADDED SERVICES VIA WIRELESS ACCESS POINTS - A method for providing value added services to a user terminal by an access point in a wireless network is provided. The method comprises intercepting a request initiated by a user terminal for accessing information. The method further comprises determining if the request is a local search request. If the request is a local search request, then location information is appended to the request. Location specific search results are rendered on the user terminal. | 10-01-2009 |
20090257376 | INTELLIGENT ACCESS POINT FOR DELIVERING LOCATION BASED INFORMATION - A method for delivering location based information in wireless zone is disclosed. All the location based information is stored in the access point itself thus eliminating the need for backend server. Access point has the intelligence to deliver information in customized to each requesting device's display capability. To provide seamless access to local information the user will get a default web page once the device connects to access point and tries to access internet. This web page will act as a gateway to all the location based information available in the access point. Along with location based information advertisements can also be delivered to the end user in a very cost effective and targeted manner. | 10-15-2009 |
20090307531 | SYSTEM AND METHOD FOR TESTING AN APPLICATION INSTALLED ON A WIRELESS COMMUNICATION DEVICE - The invention describes a test bed, a method and a computer program product for testing an application installed on a wireless communication device. The wireless communication device communicates with a server over a network through the test bed. Further, the test bed is connected to the server and receives various testing parameters from a user. Furthermore, the test bed establishes a wireless connection between the test bed and the wireless communication device. Thereafter, the test bed emulates various network conditions, based on the testing parameters, and subsequently communicates the emulated network conditions to the wireless communication device. The application installed on the wireless communication device experiences the emulated network conditions. The user then tests the application in the emulated network conditions. | 12-10-2009 |
20100085922 | System and method for improving bandwidth of wireless local area network - A system and method for improving bandwidth of a local area network is provided. The method includes splitting user data into multiple data fragments. The method further includes creating multiple beacon frames by placing each data fragment in a unique beacon frame. Further, the method includes broadcasting the beacon frames through a wireless medium by an access point of the network. Thereafter, the beacon frames are received by a wireless client and data fragments are extracted from each beacon frame. Finally, the user data is reconstructed from the extracted data fragments by reassembling the data fragments. | 04-08-2010 |
20100111054 | System and method for robust data loss recovery in a wireless local area network - A system and method for robust data loss recovery in a wireless local area network is provided. The method includes splitting user data into multiple data fragments. The method further includes creating multiple beacon frames by placing each data fragment in a unique beacon frame and broadcasting the beacon frames through a wireless medium by an access point of the network. Prior to transmission, the method includes arranging the frames into a plurality of groups and creating a parity frame for each group, to be transmitted along with the beacon frame. After transmission, the beacon frames are received by a wireless client and data fragments are extracted from each beacon frame. At the receiving end, the wireless client checks whether all the transmitted beacon frames have been received. Finally, the user data is reconstructed from the extracted data fragments by reassembling the data fragments. | 05-06-2010 |
20100148966 | SYSTEM AND METHOD FOR REAL TIME THEFT DETECTION - A method for tracking one or more portable devices in real time to detect theft of the one or more portable devices is provided. The method enables, firstly, interrogating a Radio Frequency Identification (RFID) tag via a RFID reader during successive sweep intervals. The sweep interval represents active state of the RFID reader. Secondly, the method enables receiving one or more pairing information from the RFID tag. Further, the method enables comparing the one or more pairing information with corresponding one or more pairing information stored in the RFID reader. Finally, the method enables generating an alert signal via the wearable-band or the one or more portable devices when the one or more pairing information does not match with the corresponding one or more pairing information stored in the RFID reader. | 06-17-2010 |
20100198950 | Method to deliver services over existing wireless lan infrastructure - A method to bypass the existing pay and use model to deliver services over existing wireless LAN infrastructure between mobile terminal and server is disclosed. Many of the existing WLAN infrastructures require users to subscribe to service provider to access their network. The inventive method uses internet protocol (IP) packet for delivering services/data between server and mobile terminal. Internet protocol (IP) layer processes the IP packets received from a mobile terminal and uses protocol subfield in the IP header of the received IP packet in identifying the services/data at the server end. The server sends the IP packet containing requested services/data to the mobile terminal. Since all the communication takes place at IP layer (not TCP or UDP) it doesn't require user id and password to go through. | 08-05-2010 |
20110160882 | SYSTEM AND METHOD FOR PROVIDING IMMERSIVE SURROUND ENVIRONMENT FOR ENHANCED CONTENT EXPERIENCE - A method and system for providing an immersive surround environment for enhanced content experience is provided. The method includes receiving an encoded media stream and processing the stream to obtain decoded media data. The received media stream can also be captured real-time media. The method further includes extracting one or more environmental parameters from the stream. The environmental parameters are then embedded or encoded. Thereafter, the method includes providing the one or more environmental parameters to one or more devices that control environmental conditions to produce environmental effects. | 06-30-2011 |
20110182232 | SYSTEM AND METHOD FOR FORMING APPLICATION DEPENDENT DYNAMIC DATA PACKET IN WIRELESS SENSOR NETWORKS - A system and method for forming application dependent dynamic data packet format in a wireless sensor network is provided. The system comprises one or more sensor nodes, wherein each sensor node comprises one or more sensors for sensing physical events. Each sensor is defined as an active or an inactive sensor based upon the application requirement. The system also comprises one or more processing units for converting the physical events sensed by the active sensors to corresponding sensed data in digital format and forming dynamic length data packets comprising the sensed data and a sensor identifier field for conveying the identities of the active sensors. | 07-28-2011 |
20120176938 | METHOD AND SYSTEM FOR CREATING A VIRTUAL WIRELESS SENSOR NETWORK - A method for creating a virtual Wireless Sensor Network (WSN) is disclosed. The method includes extracting one or more niceties of a physical WSN and embedding at least one of the extracted niceties in a soft object to represent one or more sensor nodes of the physical WSN. The method includes, sending equivalent command to the one or more sensor nodes of the physical WSN, when one or more changes are performed on corresponding niceties of the soft object. Further, the method adding or deleting one or more niceties corresponding to the one or more sensor nodes from the soft object upon ingress or egress of the one or more sensor nodes in the physical WSN. The method also includes steps of building application using the soft object of the virtual WSN. | 07-12-2012 |
20120250615 | SYSTEM AND METHOD FOR SHARING DATA OVER WIRELESS ADHOC NETWORK - The method for sharing data over wireless adhoc network using mobile devices comprises a step of determining a user required data on a handheld device. The method further comprises broadcasting the user required data within the wireless adhoc network. Further, the method includes detecting a plurality of devices comprising the user required data. The method also comprises establishing a communication channel, in a proximity environment between the plurality of devices and the handheld device. The method further comprises sharing of the user required data automatically between the plurality of devices and the handheld device. | 10-04-2012 |
20120253745 | SYSTEM AND METHOD FOR TESTING PERFORMANCE OF MOBILE APPLICATION SERVER - A system and method for testing performance of a mobile application server is provided. The methodology of the invention describes steps to initiate one or more instances of a mobile application using one or more test cases. The one or more instances of the mobile application are initiated in a plurality of emulations of an operating environment. The methodology further describes steps to buffer plurality of requests generated by the one or more instances of the mobile application. The methodology furthermore describes steps to invoke the plurality of buffered requests synchronously to a server based on a predefined policy. The methodology in addition describes step to measure response time taken by the server to process each of the invoked plurality of requests. | 10-04-2012 |
20120257876 | METHOD AND SYSTEM FOR GENERATING AT LEAST ONE OF: COMIC STRIPS AND STORYBOARDS FROM VIDEOS - A method, a system, and a computer program product code for generating a series of still images from an input video file are provided. The series of still images may include, but are not limited to, a comic strip and a storyboard. The method includes extracting audio and visual frames from the video file. Thereafter, basic units of the video file are identified. The basic units are exposition (beginning), conflict (middle), and resolution (end). Thereafter, key frames are extracted from the basic units based on at least one of audio frames, visual frames, and a combination of the visual frames and the audio frames. Then, the extracted key frames are manipulated to output a series of still images. Subsequently, narration in the form of audio or text is attached to the still images to generate at least one of comic strips and storyboards. | 10-11-2012 |
20120258736 | METHOD, SYSTEM, AND COMPUTER-READABLE MEDIUM FOR PROVIDING LOCATION-BASED LISTING SERVICES - The present invention relates to a computer-implemented method, system and computer readable medium for providing context-based listing services. The method comprises registering at least one first service provider with an second service provider wherein registering comprises that the first service provider provides the information via a communication network to the second service provider and it validates the information. Validating comprises identify the location of the first service provider and/or request to at least one predefined user located nearby the location of the first service provider. At least one user requests the second service provider for the information via the communication network. At least one user retrieves the information and provides ranking to category of services so as to update the information in the second service provider. | 10-11-2012 |
20120259945 | SYSTEM AND METHOD FOR DYNAMICALLY MODIFYING CONTENT BASED ON USER EXPECTATIONS - Systems and methods for dynamically rendering content based on user expectations and user tolerance levels are disclosed. Content is delivered to a user in a way that maximizes user experience and minimizes frustration while accessing web content. Because every user's expectations and tolerance levels are different, embodiments of the invention exploit these two parameters to deliver optimized web content to users within an acceptable time frame, thus ensuring a better browsing experience. In one embodiment of the invention, the method includes intercepting at a computing device a request for content from a server, determining a quality of service value based on user expectations and a user tolerance level from the content and a user profile, and delivering a modified version of the content to the user based on the quality of service value. The system is a computing device programmed with instructions to accomplish these functional steps. | 10-11-2012 |
20120259974 | SYSTEM AND METHOD FOR DYNAMIC MODIFICATION OF WEB PAGE CONTENT TO ENSURE CONSISTENT RESPONSE TIME - Dynamic modification of web page content is necessary especially when the delivery time has to be consistent. The present disclosure describes dynamic modification of web page content. The method for dynamic modification of web page comprises computing a required time by a middleware by considering a plurality of system constraints. Further, an available time is computed by the middleware for a data response by using one or both of the plurality of the system constraints and a target time. Determining an amount of the data response to be provided to a client based on the available time and converting the data response based on the amount of data response to be provided to the client. | 10-11-2012 |
20120260089 | SYSTEM AND METHOD FOR SECURING DATA TRANSACTION - A secure messaging channel is necessary especially when the message involves confidential transactions, for example a bank transaction which involves funds transfer and other additional information. The present disclosure describes securing message. The method of securing a message comprises providing a personal identification number by the user, wherein the personal identification number is associated to a unique number of a user. The unique number can be a mobile number. The correct personal identification number invokes the one-time password generator. The one time password generator accesses a metadata which comprises a value stored. The value stored in the metadata is retrieved to generate a dynamic key. The dynamic key is converted to a symmetric encryption key to encrypt the data. The dynamic key can also be converted to a symmetric decryption key to decrypt the data. | 10-11-2012 |
20130007198 | METHODS FOR RECOMMENDING PERSONALIZED CONTENT BASED ON PROFILE AND CONTEXT INFORMATION AND DEVICES THEREOF - A method, non-transitory computer readable medium, and apparatus that identifies profile information for a received request associated with an end user at a requesting computing device and context information associated with the requesting computing device. Customized content responsive to the received request is obtained from a content provider device based on the identified profile information and the identified context information. The obtained customized content is providing to the requesting computing device. | 01-03-2013 |
20130024766 | SYSTEM AND METHOD OF CONTEXT AWARE ADAPTION OF CONTENT FOR A MOBILE DEVICE - The invention relates to a system and method of context aware adaption of content for a mobile device. This involves identifying context parameters and associated values, selection of content layout based on context parameters. Content layout is selected from pre-configured content layouts based on context parameters. The content is retrieved from a content store. Content style is selected from pre-configured content styles based on context parameters. Rendering content on the device display based on the selected content layout, content style and at least one context parameter. | 01-24-2013 |
20130024773 | SYSTEM AND METHOD FOR SUMMARIZING INTERACTIONS - The disclosed embodiment relates to methods for presenting information to a user in a concise manner. The method preferably comprises receiving information specifying at least one data characteristic and at least one presentation characteristic, wherein the at least one data characteristic relates to information desired by a user regarding data and the at least one presentation characteristic relates to the manner in which information is presented to the user, receiving a collection of data, identifying relevant data from the collection of data based on at least one of the data characteristics, condensing the relevant data into presentation data based on at least one of the presentation characteristics, and presenting the presentation data. The disclosed embodiment also relates to a system and computer-readable code that can be used to implement the exemplary methods. | 01-24-2013 |
20130036194 | METHODS FOR OPTIMIZING HOW CONTENT IS PROVIDED AND DEVICES THEREOF - A method, non-transitory computer readable medium, and apparatus that obtains with a content management computing device application configuration information about an executing application on an end user computing device that provides content to a primary end user. Sensor data is obtained with the content management computing device from one or more sensor devices. A type of device for the end user computing device executing the application is identified. One or more personalized values are determined with the content management computing device based on the obtained sensor data, the identified type of device, and the obtained application configuration information. The determined one or more personalized values are provided by the content management computing device to the end user computing device to optimize the content provided to the primary end user by the executing application. | 02-07-2013 |
20130039409 | SYSTEM AND METHOD FOR VIRTUALIZATION OF AMBIENT ENVIRONMENTS IN LIVE VIDEO STREAMING - A system and method for virtualization of ambient environments in live video streaming are disclosed. In one embodiment, motion detection is performed to obtain motion information in a current frame in a live video stream. Further, a background model is computed using the motion information. Furthermore, background subtraction is performed using the background model to obtain foreground and background pixels for the current frame in the live video stream. In addition, the obtained foreground and background pixels are refined. Based on the obtained refined foreground and background pixels, a virtualized environment is generated for the current frame by substituting the background pixels. Moreover, the steps of pre-processing, performing, computing, refining, generating and encoding are repeated for a next frame in the live video stream. | 02-14-2013 |
20130061330 | METHOD AND SYSTEM FOR CONFIGURING CONSTRAINTS FOR A RESOURCE IN AN ELECTRONIC DEVICE - The present invention provides a method and system for configuring constraints for a resource in an electronic device. The method includes identifying context of use/access of a resource and implementing permissions/constraints as per the identified context. The method includes identifying an existing work environment of a resource by capturing information through an application program interface (API), identifying constraints for the resource with respect to the identified work environment from a constraint specification file for the resource which contains constraint details for all work environments, and either configuring the identified constraints for the resource, or modifying the identified work environment for the resource and configuring corresponding constraints for the resource. | 03-07-2013 |
20130067239 | FRAMEWORK AND METHOD FOR SECURE DATA MANAGEMENT IN A DIVERSIFIED PLATFORM - The disclosure provides a method and a framework for secure data management, in which the method comprises: enabling, by an enterprise server, a user to download an enterprise application from the enterprise server using a computing device. User authentication credentials are provided by the enterprise server to a user when the user registers with the enterprise server. A unique client ID is assigned for the enterprise application downloaded by the computing device by the enterprise server. Keys for data encryption or decryption are generated by the enterprise server, for different services provided by the enterprise server based on a combination of the unique client ID, a user ID and/or a computing device ID. | 03-14-2013 |
20130103790 | SYSTEM AND METHOD FOR PROVIDING ONE OR MORE UPDATED FILES FOR A GENERATED USER PERSONALIZED SOFTWARE APPLICATION - In an aspect, a system, non-transitory machine readable medium and method for updating at least a portion of a previously transmitted personalized software application is disclosed. A request is received from a user's client device to obtain one or more updated files associated with a previously transmitted personalized software application which includes a customized executable file having core library file(s) and configuration file(s). The user and client device profile information is retrieved from a user database to identify the core library and the one or more configuration files that were included in the previously transmitted executable file. A file database is accessed and at least one updated file is selected corresponding to a previous version file included in the previously transmitted executable file. The updated file(s) is sent to the client device which is then implemented by the client device to operate the updated version of the software application. | 04-25-2013 |
20130104113 | SYSTEM AND METHOD FOR DYNAMICALLY GENERATING A USER PERSONALIZED DOWNLOADABLE EXECUTABLE FILE - In an aspect, a system, non-transitory machine readable medium and method for providing a personalized executable file to a client device is disclosed. A request sent from a client device to obtain a software application is received. The request is processed to identify the client device and a user associated with the client device. The client device profile information associated with the identified client device as well as user profile information associated with the identified user is determined. One or more configuration/core library files are selected from a file database based on the user profile information and the client device profile information. A personalized executable file is generated for the requested software application, wherein the personalized executable file comprises selected core library files and the selected configuration files. The personalized executable file of the requested software application is then sent to the client device. | 04-25-2013 |
20130117423 | METHODS FOR MANAGING DATA SYNCHRONIZATION AND DEVICES THEREOF - A method, non-transitory computer readable medium, and apparatus that manage data synchronization include obtaining one or more configuration rules and at least one value for one or more configuration parameters. One or more synchronization rules are generated based on the obtained one or more configuration rules and the one or more configuration parameters. Each of the one or more generated synchronization rules are compared to a corresponding synchronization rule in an existing configuration profile. The existing configuration profile is updated based on the results of the comparison. The updated configuration profile is communicated to a client computing device. | 05-09-2013 |
20130117438 | METHODS FOR ADAPTING APPLICATION SERVICES BASED ON CURRENT SERVER USAGE AND DEVICES THEREOF - A method, non-transitory computer readable medium, and apparatus that monitor one or more capacity related factors of one or more servers providing one or more services to one or more client computing devices to obtain one or more values. An adaption factor for at least one of the one or more client computing devices is determined based on the one or more obtained values for the one or more monitored capacity related factors and one or more adaption rules. The adaption factor may further be determined based on obtained user profile information. The determined adaption factor to adapt operation of the one or more provided services at the at least one of the one or more client computing devices is provided. | 05-09-2013 |
20130198468 | REDUCING POWER CONSUMPTION IN STORAGE SYSTEMS USING DYNAMIC STORAGE POWER MANAGEMENT - In a shared storage system for supporting virtual machines, virtual machine images are opportunistically migrated between logical storage units to free up physical storage units and achieve better storage hardware resource utilization and reduced power consumption by powering down freed-up physical storage units. The destination for the opportunistic migration of a virtual machine is selected based on the extent to which the physical storage units are shared between the logical storage unit in which the virtual image is currently stored and the destination. In situations where the demand for storage hardware resources increases, the powered-down physical storage units may be opportunistically powered up to meet the increased demand. | 08-01-2013 |
20130227661 | SYSTEMS AND METHODS FOR GENERATING AND AUTHENTICATING ONE TIME DYNAMIC PASSWORD BASED ON CONTEXT INFORMATION - The invention relates to a system and method for generating and authenticating one time dynamic password based on the context information related to a user. It involves retrieving user context information and generating a dynamic value based on that. The first one time dynamic password is generated at the user device using the first dynamic value and the user PIN. The first dynamic value along with the user identifier is sent to the authentication server. The authentication server sends the user identifier to the context management server. The context management server has access the context information used to generate the first dynamic value and based on that they generate a second dynamic value. The authentication server receives this value and generates the second one time dynamic password and if it matches with the first one time dynamic password then the authentication server authenticates the first one time dynamic password. | 08-29-2013 |
20130318432 | METHOD AND SYSTEM TO DYNAMICALLY RENDER SERVICES FOR MULTIPLE CHANNELS - The present invention discloses a method to dynamically render a service for multiple channels based on predefined user specification. The method comprises registering user specification such as choice of the one or more services, format of each service, preferred channel of each service, content of each service, and level of security for each service selected by the user at a centralized portal. The method further comprises identifying, for every subsequent user login, user details comprising type of the user device, channel accessed by the user device, time of access, and bandwidth available for the channel. Additionally, the method comprises fetching the user specifications for each service to be rendered based on the identified user details and dynamically rendering the one or more services on a user device with the user specifications. | 11-28-2013 |
20130346960 | METHOD AND SYSTEM FOR UPDATING AN APPLICATION - A method and system for updating an application residing on a computing apparatus is disclosed. The method involves comparing a version of the application residing on the computing apparatus with an updatable version of the application to determine whether an update is available for the application. The version of the application comprises one or more pages. Further, a page of the one or more pages is associated with a version number. The method also involves determining one or more pages corresponding to the version of the application for which an updatable version of the one or more pages is available. Further, version number of the updatable version of the one or more pages is communicated to the computing apparatus. Thereafter, the one or more pages is updated with the updatable version of the one or more pages, thereby updating the application residing on the computing apparatus without re-installing the application. | 12-26-2013 |
20140109111 | METHOD AND ARCHITECTURE FOR EXCEPTION AND EVENT MANAGEMENT IN AN EMBEDDED SOFTWARE SYSTEM - A method for providing a dedicated software framework for exception and event management in an embedded software system is disclosed. In one embodiment, each of exceptions/events originated from users are uniquely identified and severity of the exceptions/events is categorized. The users are software subsystems, software layers and software modules in the embedded software system. Further, information regarding the exceptions/events is reported through various layers, subsystems and modules for use by an application. Furthermore, information associated with one or more of the reported exceptions/events is logged using a logging framework. In addition, the exceptions/events are handled to keep applications running without causing an unexpected behavior in the embedded software system. | 04-17-2014 |
20140126626 | METHOD FOR MEDIA RATE CONTROL IN A VIDEO ENCODING SYSTEM - A method for media rate control in a video encoding system disclosed. In one embodiment, an optical remaining one of the three parameter sets (Sk) is computed based on the provided user configuration inputs of two parameters sets (Si, Sj), wherein the user configuration inputs comprise two parameter sets (Si and Sj) out of three parameter sets (Si, Sj, and Sk), wherein the three parameter sets are latency parameter set, channel bandwidth parameter set, and video quality parameter set. The video encoding system is then configured based on the provided two parameter sets (Si, Sj) and the computed parameter set (Sk) to obtain a desired media rate control having optimal performance. | 05-08-2014 |
20140282351 | FLEXIBLE AND SCALABLE SOFTWARE SYSTEM ARCHITECTURE FOR IMPLEMENTING MULTIMEDIA APPLICATIONS - A flexible and scalable software system architecture for implementing multimedia applications is disclosed. In one embodiment, the flexible and scalable software system architecture includes a platform abstraction layer (PAL), a device policy manager (DPM), a media engine, a library of commons (LoC) module, system management toolsets (SMT), one or more application services, an application control unit (ACU) and a user interface transaction layer (UITL). Further, the media engine is communicatively coupled between the PAL and the ACU, the LoC module is communicatively coupled to the ACU, the DPM, the media engine, the SMT, the PAL and the UITL, the DPM is communicatively coupled to the PAL, the ACU and the media engine, the ACU is coupled between media engine and the UITL, and the SMT is communicatively coupled to the ACU, the DPM, the media engine, the LoC module, the PAL and the UITL. | 09-18-2014 |
20140375425 | METHODS FOR DYNAMICALLY SENDING ALERTS TO USERS AND DEVICES THEREOF - A method, non-transitory computer readable medium and device for sending an alert to at least one customer through a communication network. This technique involves uploading the alert content in different formats into an operator's system to send the same to customers. Then, the spare capacity of delivery channels is identified which are available to send the alert to the customer. Thereafter, the at least one delivery channel among the all identified channels and best suitable alert format for that delivery channel is selected based on the spare capacity of the channel and predefined profile of the customer. Finally, the alert is sent to the customer in the selected format through the selected delivery channel. | 12-25-2014 |
20150026459 | METHOD AND SYSTEM FOR ENCRYPTING MULTIMEDIA STREAMS - A method and system for encrypting data packets in a multimedia stream are disclosed. Each data packet includes a header portion and a payload portion. In one embodiment, one or more data packets are selected from an incoming multimedia stream. Further, one or more of a header portion and a payload portion are selected within the one or more data packets. Furthermore, one or more regions in the selected one or more of the header portion and the payload portion are encrypted using an encryption algorithm. | 01-22-2015 |