Patent application number | Description | Published |
20080301315 | Transmitting Digital Media Streams to Devices - Methods, systems, and apparatus, including medium-encoded computer program products for transmitting digital media streams. In one aspect, a computer-implemented method includes identifying and transmitting a sequence of frames in a digital video transmission, the sequence of frames comprising an initial frame and subsequent frames corresponding to the initial frame, the subsequent frames comprising data that incrementally updates the initial frame, and initiating a new transmission of the sequence of frames to a new device after sending one of the subsequent frames in the digital media transmission, the initiating comprising generating information to cause the new device to inhibit presenting the new transmission until after frames between and including the initial frame and the one of the subsequent frames have been received by the new device, and transmitting, to the new device, the information and the frames between and including the initial frame and the one of the subsequent frames. | 12-04-2008 |
20090097651 | IMPARTING CRYPTOGRAPHIC INFORMATION IN NETWORK COMMUNICATIONS - This specification describes technologies relating to imparting cryptographic information in network communications. In general, aspects of the subject matter described in this specification can be embodied in methods that include identifying a location in a pre-defined portion of a network communication to be sent in a client-server environment, wherein the pre-defined portion is reserved for random data, inserting cryptographic information into the pre-defined portion of the network communication at the location, and sending the network communication in the client-server environment to facilitate modifying interactions in the client-server environment based at least in part on a result of processing of the cryptographic information; and on a receiving side, receiving cryptographic information inserted into the pre-defined portion of the network communication in the client-server environment, identifying the location, processing the cryptographic information, and modifying interactions in the client-server environment based at least in part on a result of the processing. | 04-16-2009 |
20090187662 | Load balancing of server clusters - A load balancing scheme is described for a server cluster. An application identifier is received by the cluster from a client desiring to connect to the application. Each one of the servers in the cluster independently hashes the application identifier into a unique number. This unique number is used to determine a preferred one of the servers for the connection. The servers then each calculate a priority code using the unique number, a load level for each server, and/or a node identifier assigned to the servers in the cluster. If the preferred cluster server is available, it transmits its priority code to the client before the other servers transmit their priority codes. Otherwise, each of the available cluster servers transmits their priority codes to the client. The client selects the cluster server with the most favorable priority for making the connection. | 07-23-2009 |
20100095121 | IMPARTING REAL-TIME PRIORITY-BASED NETWORK COMMUNICATIONS IN AN ENCRYPTED COMMUNICATION SESSION - This specification describes technologies relating to imparting real-time priority-based network communications in an encrypted session. In general, aspects of the subject matter described can be embodied in methods that include establishing, based on cryptographic information in a reserved, random-data portion of a handshake communication, a session, receiving parameter values relating to a sub media stream, included in a header of a network communication, storing the parameter values, obtaining state information and a data payload included in a second network communication, identifying, from the state information, a purpose of the second network communication, and whether a header of the second network communication includes one or more new values corresponding to one or more of the parameters, updating one or more of the stored values based on the one or more new values, and processing the data payload based on the identified purpose and the stored parameter values. | 04-15-2010 |
20100198977 | Automatic live stream trees - A video streaming network is described for streaming video to a client application. The client application broadcasts a request for an available edge server that is capable of facilitating the streaming video from the origin server. A user enters a resource locator into an interface of the client application for identifying the location of the streaming video on the origin server. This resource locator is transferred from the client application to the available edge server. Using the resource locator, the available edge server initiates a connection to the origin server and requests the origin server to transmit it a copy of the streaming video. The available edge server will then copy and transmit its copy of the streaming video to any client application that it is connected to and that has requested the streaming video. | 08-05-2010 |
20110289225 | Load Balancing of Server Clusters - A load balancing scheme is described for a server cluster. An application identifier is received by the cluster from a client desiring to connect to the application. Each one of the servers in the cluster independently hashes the application identifier into a unique number. This unique number is used to determine a preferred one of the servers for the connection. The servers then each calculate a priority code using the unique number, a load level for each server, and/or a node identifier assigned to the servers in the cluster. If the preferred cluster server is available, it transmits its priority code to the client before the other servers transmit their priority codes. Otherwise, each of the available cluster servers transmits their priority codes to the client. The client selects the cluster server with the most favorable priority for making the connection. | 11-24-2011 |
20110302417 | IMPARTING CRYPTOGRAPHIC INFORMATION IN NETWORK COMMUNICATIONS - This specification describes technologies relating to imparting cryptographic information in network communications. In general, aspects of the subject matter described in this specification can be embodied in methods that include identifying a location in a pre-defined portion of a network communication to be sent in a client-server environment, wherein the pre-defined portion is reserved for random data, inserting cryptographic information into the pre-defined portion of the network communication at the location, and sending the network communication in the client-server environment to facilitate modifying interactions in the client-server environment based at least in part on a result of processing of the cryptographic information; and on a receiving side, receiving cryptographic information inserted into the pre-defined portion of the network communication in the client-server environment, identifying the location, processing the cryptographic information, and modifying interactions in the client-server environment based at least in part on a result of the processing. | 12-08-2011 |
20120233467 | IMPARTING CRYPTOGRAPHIC INFORMATION IN NETWORK COMMUNICATIONS - This specification describes technologies relating to imparting cryptographic information in network communications, in general, aspects of the subject matter described in this specification can be embodied in methods that include identifying a location in a pre-defined portion of a network communication to be sent in a client-server environment, wherein the pre-defined portion is reserved for random data, inserting cryptographic information into the pre-defined portion of the network communication at the location, and sending the network communication in the client-server environment to facilitate modifying interactions in the client-server environment based at least in part on a result of processing of the cryptographic information; and on a receiving side, receiving cryptographic information inserted into the pre-defined portion of the network communication in the client-server environment, identifying the location, processing the cryptographic information, and modifying interactions in the client-server environment based at least in part on a result of the processing. | 09-13-2012 |
20120317416 | Imparting Real-Time Priority-Based Network Communications In An Encrypted Communication Session - This specification describes technologies relating to imparting real-time priority-based network communications in an encrypted session. In general, aspects of the subject matter described can be embodied in methods that include establishing, based on cryptographic information in a reserved, random-data portion of a handshake communication, a session, receiving parameter values relating to a sub media stream, included in a header of a network communication, storing the parameter values, obtaining state information and a data payload included in a second network communication, identifying, from the state information, a purpose of the second network communication, and whether a header of the second network communication includes one or more new values corresponding to one or more of the parameters, updating one or more of the stored values based on the one or more new values, and processing the data payload based on the identified purpose and the stored parameter values. | 12-13-2012 |
20130110981 | Peer-To-Peer Assist for Live Media Streaming | 05-02-2013 |
20130166625 | Optimizing Caches For Media Streaming - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, are described for establishing a grouping rule and a mapping protocol at a cache server system for caching fragments of a media stream that includes a timed-sequence of video frames. The fragments can be generated and identified at media source systems in accordance with a fragmenting format and an indexing protocol, respectively, which are common across the media source systems. Further, the established mapping protocol can be different from the indexing protocol. The methods include retrieving at least a portion of the fragments of the media stream by the cache server system from the media source systems. The methods also include allocating the retrieved fragments to local fragment groups at the cache server system based on the established grouping rule. The methods further include mapping the allocated fragments to the local fragment groups based on the established mapping protocol. | 06-27-2013 |
20140006364 | MEDIA STREAM INDEX MERGING | 01-02-2014 |
20140006478 | MEDIA STREAM FRAGMENT REQUEST | 01-02-2014 |
20140169536 | Integration of telephone audio into electronic meeting archives - A system and method for integrating telephone audio into an electronic meeting archive is described. A plurality of telephony signaling messages are received and converted into an electronic meeting application format. The meeting or conferencing system generates metadata from any one or more of the telephony signaling messages, electronic information presented during an electronic meeting, or the like, where the metadata is associated with a particular meeting event time. The metadata, stored in a meeting metadata file, is synchronized with the telephone audio and the electronic information that was stored in the electronic meeting archive using a meeting start time and the meeting event times. The telephone audio may then be replayed responsive to and synchronized with the information obtained from the metadata. | 06-19-2014 |
20140173278 | IMPARTING CRYPTOGRAPHIC INFORMATION IN NETWORK COMMUNICATIONS - This specification describes technologies relating to imparting cryptographic information in network communications. In general, aspects of the subject matter described in this specification can be embodied in methods that include identifying a location in a pre-defined portion of a network communication to be sent in a client-server environment, wherein the pre-defined portion is reserved for random data, inserting cryptographic information into the pre-defined portion of the network communication at the location, and sending the network communication in the client-server environment to facilitate modifying interactions in the client-server environment based at least in part on a result of processing of the cryptographic information; and on a receiving side, receiving cryptographic information inserted into the pre-defined portion of the network communication in the client-server environment, identifying the location, processing the cryptographic information, and modifying interactions in the client-server environment based at least in part on a result of the processing. | 06-19-2014 |
20150142927 | IMPARTING REAL-TIME PRIORITY-BASED NETWORK COMMUNICATIONS IN AN ENCRYPTED COMMUNICATION SESSION - This specification describes technologies relating to imparting real-time priority-based network communications in an encrypted session. In general aspects of the subject matter described can be embodied in methods that include establishing, based on cryptographic information in a reserved, random-data portion of a handshake communication, a session, receiving parameter values relating to a sub media stream, included in a header of a network communication, storing the parameter values, obtaining state information and a data payload included in a second network communication, identifying, from the state information, a purpose of the second network communication, and whether a header of the second network communication includes one or more new values corresponding to one or more of the parameters, updating one or more of the stored values based on the one or more new values, and processing the data payload based on the identified purpose and the stored parameter values. | 05-21-2015 |