New patents are issued by the USPTO on Tuesdays. This week's Spotlight Patents concern aspects of digital rights management. Assigned to NYU, the first patent addresses techniques for streamloading content, such as video content for example, by both downloading enhancement layers of the content and streaming a base layer of the content. Assigned to Ericsson, the second patent addresses techniques for the lawful interception of unauthorized subscribers and equipments.
9,172,737, "Streamloading content, such as video content for example, by both downloading enhancement layers of the content and streaming a base layer of the content," assigned to New York University
Video streaming applications are a major contributor to the recent dramatic rise of data traffic in cellular networks. Mobile users in a cellular network often experience fluctuating data rates, which might affect the quality of video they view in a streaming service. Although replacing such video streaming services with video downloading/renting services could potentially allow such mobile users to enjoy consistently higher quality videos, such services typically cost a lot more than video streaming services because of legal copyright pricing and management issues. By downloading enhancement layers but streaming base layers of the content, mobile users can enjoy download-quality videos with a service (legally) classified as a streaming service.
9,173,091, "Lawful interception of unauthorized subscribers and equipments," assigned to Ericsson (SE).
The present invention relates to methods and arrangements in a telecommunication system to override current access rights. The telecommunication system comprises an Access Point IAP; MSC, SGSN associated with a Configuration Unit ICU. The method comprises receiving to the Access Point IAP; MSC, SGSN from the Configuration Unit ICU, a request to monitor a system member MS, SIM. The method further comprises receiving to the Access Point from the Configuration Unit, a request to override deprived access rights for the system member MS, SIM. The method further comprises overriding in the Access Point IAP; MSC, SGSN, the deprived access rights for the member.