Patent application number | Description | Published |
20120162536 | REMOTE CONTROL DEVICE AND METHOD FOR CONTROLLING OPERATION OF A MEDIA DISPLAY SYSTEM - A remote control device for a separate electronic device to be controlled has a secondary display screen, at least one user-input mechanism, and at least one microprocessor running a user interface application for use in providing control over operation of the electronic device to be controlled. The user interface application causes a user interface to be displayed on the display screen of the remote control device, and the user interface displayed on the display screen graphically mirrors a corresponding user interface independently run by the electronic device to be controlled. The remote control device also has a transmitter and receiver mounted within the body enabling a two-way wireless communication link to be established with the electronic device to be controlled. Apparatus and a method for controlling operation of a media display system are also described. | 06-28-2012 |
20120304234 | METHOD AND APPARATUS FOR TRANSFERRING CONTENT - A method and apparatus for downloading content within a video-on-demand system is provided herein. During operation a Video Home Office (VHO) will cache a subset of the Video Service Office (VSO) content. When a user requests content that is not stored on the VHO, the VHO will request that content from another VHO or the VSO. In order to reduce the additional network load imposed during item forwarding while attempting to balance the total load on all the links interconnecting the VSO and VHOs, recorded traffic history metrics are used to predict their future or current traffic. A VHO or VSO is chosen for fetching the content that will result in the lowest predicted traffic on the interconnecting links. | 11-29-2012 |
20130346414 | Correlation Engine and Method for Granular Meta-Content Having Arbitrary Non-Uniform Granularity - One disclosed method includes receiving correlation instructions related to a plurality of meta-content elements that are associated with a primary content. The primary content may be multimedia content such as, but not limited to, an audiovisual content. The method includes performing a correlation in response to receiving the instructions. The correlation is between the meta-content elements, where the meta-content elements each have an arbitrary granularity defining meta-content segments. The method returns a result based on the correlation. Another disclosed method include receiving a request having correlation instructions related to a plurality of meta-content elements, where the meta-content elements are associated with a primary content. Again, each meta-content element has an arbitrary granularity defining meta-content segments. The method includes determining, in response to receiving the request, a composite of meta-content segments of the plurality of meta-content elements, based on the correlation instructions. | 12-26-2013 |
20130347056 | Content Rights Protection with Arbitrary Correlation of Second Content - A disclosed content rights management system defines a content usage policy via a conditional rule set contained in metadata. The conditional rule set is correlated to at least one second content. An access control manager determines, dynamically, access rights conferrable to a user device or a server, based on the content usage policy and user history parameters. The embodiments may confer limited access rights for a first activity by a user device, or by a server, with respect to the protected content and the second content, and block a second activity with respect to the protected content and the second content, in response to determining that the request for the second content, in conjunction with the user history parameters, does not comply with the conditional rule set for the second activity. | 12-26-2013 |
20130347057 | Privacy Manager for Restricting Correlation of Meta-Content Having Protected Information Based on Privacy Rules - A method intercepts correlation instructions related to a plurality of meta-content elements associated with a primary content. The primary content or the meta-content elements may have associated privacy rules. At least one meta-content element of the group is selected as having privacy protected information specified in the privacy rules. A set of meta-content items, of meta-content element, are determined that are subject to a correlation restriction based on evaluation of the privacy rules with respect to each meta-content item contained in the meta-content element, and the privacy rules for the set of meta-content items are enforced. The privacy rule enforcement may involve preventing execution of the correlation instructions, excluding the selected at least one meta-content element from a correlation based on the correlation instructions, excluding the set of meta-content items from a correlation based on the correlation instructions, or restricting access to a correlation result based on the correlation instructions. | 12-26-2013 |
20140089967 | PROVIDING SECONDARY CONTENT TO ACCOMPANY A PRIMARY CONTENT ITEM - While a user views a primary content item (for example, a movie on a television screen), secondary content items are selected and presented to the user, either on the same screen or on a screen of the user's companion device. To choose selections that are relevant to the user's current interests, the selection process considers information beyond the realm of primary and secondary content. Over time, the selection process learns to make more relevant selections by monitoring selection choices made by other systems. | 03-27-2014 |
20140101110 | HIGH AVAILABILITY EVENT LOG COLLECTION IN A NETWORKED SYSTEM - A method includes storing data received at a first server to a first file and storing data received at a second server to a second file, where the data in the two files are substantially similar. The two files are distinct, independent files. The first server provides a copy of the first file to the second server to store. The first server then stores additional data to the first file, while the second server maintains the copy of the first file unchanged. The second server may also provide a copy of the second file to the first server to store and continues to store additional data to the second file, while maintaining the copy of the second file on the first server unchanged. Event reports may then be generated using the various files, which provide high availability due to the above method and corresponding system arrangement. | 04-10-2014 |
20140215601 | AUTHENTICATION USING A SUBSET OF A USER-KNOWN CODE SEQUENCE - Authentication in a system includes presenting information to a user containing a partial sequence of a passcode along with distractors. The user is challenged to identify the partial sequence from among the information in order to gain access to the system. | 07-31-2014 |
20140245452 | RESPONDING TO A POSSIBLE PRIVACY LEAK - When a user is about to perform a “communicative act” (e.g., to send an e-mail or to post to a social-networking site), the proposed communicative act is reviewed to see if it may lead to a privacy leak. If, upon review, it is determined that performing the proposed communicative act could lead to a privacy leak, then an appropriate response is taken, such as preventing the proposed act from being performed or suggesting a modification to the proposed act that would lessen the likelihood of a privacy leak. A privacy server creates a privacy profile for a user based on information about the user's personae and how those personae are used. Using that profile, the privacy server can judge whether a proposed communicative act would support an unwanted inference. | 08-28-2014 |