Patent application number | Description | Published |
20100251278 | MEASUREMENT AND REPORTING OF SET TOP BOX INSERTED AD IMPRESSIONS - Methods are disclosed for measuring ad impressions and receiving feedback on local ad assets inserted into a video transport stream at the set top box level. Each set top box stores the number of times an ad asset is inserted into an ad avail, along with a variety of other information relating to the playback of the ad asset. This measurement data is aggregated and sent to the ad decision service. In order to balance bandwidth usage, each set top box may report its measurement data to the ad decision service at a different time interval that is randomly selected. As it is desirable to receive the data in a timely manner, the random intervals may be confined so that all measurement data is reported within a predefined time period, such as for example over a twelve hour period. | 09-30-2010 |
20100251289 | ADVERTISEMENT INSERTION DECISIONS FOR SET TOP BOX MANAGEMENT OF ADVERTISEMENTS - Methods are disclosed for inserting local ad assets into a video transport stream at the set top box level. The media advertising platform of the present system works in conjunction with existing platforms, such as an advertising decision service and a media platform. The present system further includes a client resident on end user set top boxes. In general, the present system operates by pre-caching advertisements to a set top box or boxes within a household or elsewhere. Each set top box is also assigned to particular groups, based on characteristics of the user of that set top box. Group membership information is also sent to the set top box and stored. The present system sends the set top box a decision matrix based on group memberships to allow the set top box to select and insert an ad asset targeted to the specific set top box. | 09-30-2010 |
20140161196 | SECURE TRANSCODING OF VIDEO DATA - A secure transcoder assembly features a secure data path where the related crypting and coding functions are secured in the secure data path. More specifically, during transcoding the ingress (received) encrypted video data is decrypted and copied from application memory (that is accessible to the application processor) to secure memory (that is inaccessible to the application processor) by security processor(s). Once in the secured memory, this video data is transcoded. The video data, now in its transcoded form, is re-encrypted by the security processor(s) during the transfer back to application memory for egress (continued transmission). The mode for the re-encrypting may be managed by the application processor via a crypto API, and the application processor may further feature an opaque handle on the data when it is passed to the secure region. | 06-12-2014 |
Patent application number | Description | Published |
20090172457 | Monitoring Presentation Timestamps - Techniques to monitor presentation timestamps for content are described, which may be used to render content at a client. In an implementation, content is received having timestamps that define expected timing for output of the content at a client. The timestamps may then be monitored and compared to a client clock to determine if the content rendered matches the content expected to be rendered. When a discrepancy is detected, one or more corrective actions may be undertaken to restore output of the content to the timing defined by the timestamps. | 07-02-2009 |
20100172625 | Client-side Ad Insertion During Trick Mode Playback - A device plays back programming content in a trick mode while an advertising segment record is monitored. When an advertising segment beginning identified by the advertising segment record is encountered, playback of the programming content temporarily ceases. One or more advertisements are played back during the advertising segment, and then playback of the programming content in the trick mode resumes after an ending of the advertising segment is encountered. | 07-08-2010 |
20100172626 | Trick Mode Based Advertisement Portion Selection - Programming content is played back in a trick mode. One or more portions of an advertisement to be played back are identified based at least in part on the trick mode. These one or more portions are less than the entire advertisement, and are played back during an advertising segment. Playback of the programming content in the trick mode resumes after the advertising segment ends. A table or other record associated with the advertisement can be stored to maintain identifications of the one or more portions for each of multiple trick modes. | 07-08-2010 |
20110307900 | CHANGING STREAMING MEDIA QUALITY LEVEL BASED ON CURRENT DEVICE RESOURCE USAGE - Streaming media is received from a source system. A current overall resource usage of a resource of the device (such as a CPU or memory of the device) is obtained. A check is made as to whether the current overall resource usage exceeds a resource threshold value. If the current overall resource usage exceeds the resource threshold value, then an indication is provided to the source system to reduce a quality level of the streaming media. The streaming media is received from the source system at the reduced quality level until there is sufficient resource capacity at the device to increase the quality level. | 12-15-2011 |
20120158988 | Media Requests to Counter Latency and Minimize Network Bursts - A client media application sends a first request for a first chunk of a particular media stream. In response to the request, the client media application begins receiving data packets associated with the requested first chunk of the particular media stream. The data packets are received through a socket having a buffer. Rather than waiting until all of the data packets associated with the first chunk of the particular media stream have been read from the buffer by the client media application before sending a request for a second chunk of the particular media stream, the client media application monitors the amount of data that has been received compared to an expected amount of data, and sends the second request when it determines that the amount of data remaining to be received is less than the size of the buffer. | 06-21-2012 |
20120180099 | Monitoring Presentation Timestamps - Techniques to monitor presentation timestamps for content are described, which may be used to render content at a client. In an implementation, content is received having timestamps that define expected timing for output of the content at a client. The timestamps may then be monitored and compared to a client clock to determine if the content rendered matches the content expected to be rendered. When a discrepancy is detected, one or more corrective actions may be undertaken to restore output of the content to the timing defined by the timestamps. | 07-12-2012 |