Patent application number | Description | Published |
20120079381 | MEDIA EDITING APPLICATION FOR AUDITIONING DIFFERENT TYPES OF MEDIA CLIPS - Some embodiments provide a program that creates a composite media presentation from several media clips. The program creates an audition set for a particular location in a composite display area for placing media clips to specify a description of the composite media presentation. The program adds to the audition set several different types of media clips that are candidates for placement in the composite display area at the particular location. The program iteratively selects a different media clip in the audition set as the only committed media clip in the audition set to include in the composite media presentation. | 03-29-2012 |
20120079382 | AUDITIONING TOOLS FOR A MEDIA EDITING APPLICATION - Some embodiments provide a media editing application. The application places several committed media clips in a composite display area to specify a description of a composite presentation. In response to receiving a request to create a new version for a first media clip placed at a particular location in the composite display area, the application creates an audition set at the particular location in the composite display area. The application creates a second media clip from the first media clip. The application adds the first and second media clips to the audition set. At least one of the first and second media clips is a candidate media clip that is insertable at the location in the composite display area but is not a media clip that has been committed for inclusion in the description of the composite presentation. | 03-29-2012 |
20120210231 | Media-Editing Application with Media Clips Grouping Capabilities - A media-editing application of some embodiments allows a user of the application to group media clips displayed in the timeline into a single clip representation. A composite display area of the media-editing application often displays numerous clips at various instances in time and at various levels in the compositing hierarchy. To reduce the number of media clips in the timeline, the media-editing application of some embodiments allows the user to select several media clips and combine them into a one media clip representation. In this manner, the media-editing application reduces the congestion in the timeline. These single clip representations are referred to as “compound clips.” Compound clips can be viewed as containers that can include several media clips of the same type in some embodiments, or that can include several media clips of several different types in other embodiments. | 08-16-2012 |
20140059436 | Auditioning Tools for a Media Editing Application - Some embodiments provide a media editing application. The application places several committed media clips in a composite display area to specify a description of a composite presentation. In response to receiving a request to create a new version for a first media clip placed at a particular location in the composite display area, the application creates an audition set at the particular location in the composite display area. The application creates a second media clip from the first media clip. The application adds the first and second media clips to the audition set. At least one of the first and second media clips is a candidate media clip that is insertable at the location in the composite display area but is not a media clip that has been committed for inclusion in the description of the composite presentation. | 02-27-2014 |
Patent application number | Description | Published |
20080276102 | Data Protection Systems and Methods - Systems and methods are provided for protecting electronic content from the time it is packaged through the time it is experienced by an end user. Protection against content misuse is accomplished using a combination of encryption, watermark screening, detection of invalid content processing software and hardware, and/or detection of invalid content flows. Encryption protects the secrecy of content while it is being transferred or stored. Watermark screening protects against the unauthorized use of content. Watermark screening is provided by invoking a filter module to examine content for the presence of a watermark before the content is delivered to output hardware or software. The filter module is operable to prevent delivery of the content to the output hardware or software if it detects a predefined protection mark. Invalid content processing software is detected by a monitoring mechanism that validates the software involved in processing protected electronic content. Invalid content flows can be detected by scanning the information passed across system interfaces for the attempted transfer of bit patterns that were released from an application and/or a piece of content management software. | 11-06-2008 |
20100223672 | Systems and Methods for Managing and Protecting Electronic Content and Applications - Systems and methods are disclosed for managing and protecting electronic content and applications. Applications, content, and/or users can be given credentials by one or more credentialing authorities upon satisfaction of a set of requirements. Rights management software/hardware is used to attach and detect these credentials, and to enforce rules that indicate how content and applications may be used if certain credentials are present or absent. In one embodiment an application may condition access to a piece of electronic content upon the content's possession of a credential from a first entity, while the content may condition access upon the application's possession of a credential from a second entity and/or the user's possession of a credential from a third entity. Use of credentials in this manner enables a wide variety of relatively complex and flexible control arrangements to be put in place and enforced with relatively simple rights management technology. | 09-02-2010 |
20110246782 | Data Protection Systems and Methods - Systems and methods are provided for protecting electronic content from the time it is packaged through the time it is experienced by an end user. Protection against content misuse is accomplished using a combination of encryption, watermark screening, detection of invalid content processing software and hardware, and/or detection of invalid content flows. Encryption protects the secrecy of content while it is being transferred or stored. Watermark screening protects against the unauthorized use of content. Watermark screening is provided by invoking a filter module to examine content for the presence of a watermark before the content is delivered to output hardware or software. The filter module is operable to prevent delivery of the content to the output hardware or software if it detects a predefined protection mark. Invalid content processing software is detected by a monitoring mechanism that validates the software involved in processing protected electronic content. Invalid content flows can be detected by scanning the information passed across system interfaces for the attempted transfer of bit patterns that were released from an application and/or a piece of content management software. | 10-06-2011 |
20140082741 | DATA PROTECTION SYSTEMS AND METHODS - Systems and methods are provided for protecting electronic content from the time it is packaged through the time it is experienced by an end user. Protection against content misuse is accomplished using a combination of encryption, watermark screening, detection of invalid content processing software and hardware, and/or detection of invalid content flows. Encryption protects the secrecy of content while it is being transferred or stored. Watermark screening protects against the unauthorized use of content. Watermark screening is provided by invoking a filter module to examine content for the presence of a watermark before the content is delivered to output hardware or software. The filter module is operable to prevent delivery of the content to the output hardware or software if it detects a predefined protection mark. Invalid content processing software is detected by a monitoring mechanism that validates the software involved in processing protected electronic content. Invalid content flows can be detected by scanning the information passed across system interfaces for the attempted transfer of bit patterns that were released from an application and/or a piece of content management software. | 03-20-2014 |
20150269359 | SYSTEMS AND METHODS FOR MANAGING AND PROTECTING ELECTRONIC CONTENT AND APPLICATIONS - Systems and methods are disclosed for managing and protecting electronic content and applications. Applications, content, and/or users can be given credentials by one or more credentialing authorities upon satisfaction of a set of requirements. Rights management software/hardware is used to attach and detect these credentials, and to enforce rules that indicate how content and applications may be used if certain credentials are present or absent. In one embodiment an application may condition access to a piece of electronic content upon the content's possession of a credential from a first entity, while the content may condition access upon the application's possession of a credential from a second entity and/or the user's possession of a credential from a third entity. Use of credentials in this manner enables a wide variety of relatively complex and flexible control arrangements to be put in place and enforced with relatively simple rights management technology. | 09-24-2015 |
20150379298 | DATA PROTECTION SYSTEMS AND METHODS - Systems and methods are provided for protecting electronic content from the time it is packaged through the time it is experienced by an end user. Protection against content misuse is accomplished using a combination of encryption, watermark screening, detection of invalid content processing software and hardware, and/or detection of invalid content flows. Encryption protects the secrecy of content while it is being transferred or stored. Watermark screening protects against the unauthorized use of content. | 12-31-2015 |
Patent application number | Description | Published |
20110289108 | Assisted Hybrid Mobile Browser - A system and a method are disclosed for identifying video files on a webpage and streaming video files to a client device. A server receives browsing data including uniform resource locator for a webpage and identifies missing videos on the webpage. The server identifies a source file for the missing videos including identifying a location for each missing video. The server retrieves a thumbnail for each missing video and provides it to a client device. Additionally, the server transcodes the video file responsive to a user input provided by a user. The transcoded video is streamed to the client device. | 11-24-2011 |
20120131138 | Client-Selected Network Services - A system and a method are disclosed for authenticating a user request to determine whether to optimize content requested by the user based on a user profile, a network provider profile, network conditions and the user's service level with an application requesting the content. A user profile provides, for example a data rate plan subscribed to by the user, the user's device type, etc. Network provider profile provides whether the network provider has subscribed to optimization services. Similarly, user's service level provides whether the application is subscribed to receive optimized data. If the user, the network and the application provide for optimization or if the network is congested or busy, the user is provided with a destination address wherein the user may retrieve optimized content. | 05-24-2012 |
20120195317 | PACKET DATA MODIFICATION PROCESSOR - A programmable processor configured to perform one or more packet modifications through execution of one or more commands. A pipelined processor core comprises a first stage configured to selectively shift and mask data in each of a plurality of categories in response to one or more decoded commands, and combine the selectively shifted and masked data in each of the categories. The pipelined processor core further comprises a second stage configured to selectively perform one or more operations on the combined data from the first stage and other data responsive to the one or more decoded commands. In one implementation, the processor is implemented as an application specific integrated circuit (ASIC). | 08-02-2012 |
20120263241 | Real-Time Audio or Video Transcoding - A system and a method are disclosed for transcoding video files on a server such that they can be streamed to a client device in substantially real-time. The server receives a video file a uses a prediction algorithm to predict each video frame's size based on encoding and streaming parameters associated with the input file and an output stream and transcoding each video frame. If a transcoded frame is too large, it is compressed further, if it is too small, the video file is padded. As such, each video frame transcoded or padded until the encoded frame is the same size as a predicted size. The transcoded frames are streamed to a client device to enable the client to device to playback the video after requesting it from the server. | 10-18-2012 |
20120265847 | Real-Time Video Detector - A request to retrieve data from a client device is intercepted by a video detector. The video detector determines if the request is for retrieving a video file. If the request is for a video file, and the video file is deemed to be transcoded to be displayed on the client device, the video detector forwards the request to a video optimizer along with encoding parameters. Encoding parameters are selected by the video detector based on properties of the client device, networks accessible by the client device, conditions of those networks, properties of the requested video and the type of video requested. The encoding parameters also include a file format type to which the requested video is to be transcoded. | 10-18-2012 |
20120265901 | Real-Time Video Optimizer - A video optimizer receives a request to optimize a video, wherein the request includes optimization parameters and a uniform resource locator (URL) of the video. The video optimizer retrieves the video from an origin server and transcodes the video based on optimization parameters. The video optimizer load balances several transcoding sessions over one or more servers and tracks each session based on session identifications (IDs). Additionally, the video optimizer tracks each session to determine when a server is at or near capacity to prevent an overflow situation. The video optimizer is also enabled to stitch together two or more transcoding sessions in the event of a seek operation by a user during video playback. The video optimizer streams the video to the client device, enabling the client device to stream videos in substantially real-time after requesting the video. | 10-18-2012 |
20130262481 | ASSISTED HYBRID MOBILE BROWSER - A system and a method are disclosed for identifying video files on a webpage and streaming video files to a client device. A server receives browsing data including uniform resource locator for a webpage and identifies missing videos on the webpage. The server identifies a source file for the missing videos including identifying a location for each missing video. The server retrieves a thumbnail for each missing video and provides it to a client device. Additionally, the server transcodes the video file responsive to a user input provided by a user. The transcoded video is streamed to the client device. | 10-03-2013 |
20130282874 | REAL-TIME VIDEO DETECTOR - A request to retrieve data from a client device is intercepted by a video detector. The video detector determines if the request is for retrieving a video file. If the request is for a video file, and the video file is deemed to be transcoded to be displayed on the client device, the video detector forwards the request to a video optimizer along with encoding parameters. Encoding parameters are selected by the video detector based on properties of the client device, networks accessible by the client device, conditions of those networks, properties of the requested video and the type of video requested. The encoding parameters also include a file format type to which the requested video is to be transcoded. | 10-24-2013 |
20130322242 | Real-Time Network Monitoring and Subscriber Identification with an On-Demand Appliance - A system and a method are disclosed for selectively monitoring traffic in a service provider network. The system receives a notice for a beginning of a network data flow, which responds to a request from a user device for content at an origin server. The system then determines whether to monitor the data flow from the origin server to the user device. If so determined, the system collects statistic information of the data flow and stores the statistic information to a flow record in a database. The system also maps the flow record to a subscriber of the service provider network by analyzing the statistic information of the data flow and estimates bandwidth provided to the data flow by the service provider's network based on the analysis of the statistic information of the data flow. | 12-05-2013 |
20140012963 | Linked List Scripting Engine - A system and a method are creating a linked list scripts for a networking device. The system receives a set of nodes defining script functionality and generates a script by coupling the nodes in a nodal structure based on desired order of execution, wherein a leaf node is an standalone node with no child node, and wherein a nugget node includes one or more child nodes, each child node being a nugget or leaf node. The system then determines an execution path through a subset of nodes in the nodal tree structure based on one or more input values. The system also compiles the subset of nodes into a linked list of operations, which follows the execution path, and executes the path of operations within the compiled linked list of operations. | 01-09-2014 |
20140025837 | Just-In-Time Distributed Video Cache - A video optimizer receives a request to optimize a source file and stream the optimized file. The request may be accompanied by a key uniquely identifying the original source file to be optimized and an optimized version of the source file to stream to the client. The key uniquely identifies the source video file as it exists on an origin server to prevent transmission of modified source video and the optimized version of the source file by optimization parameters to ensure compatibility with the user device. The video optimizer queries a cache database in response to the received request, which contains references keys and locations of optimized source files among local caches in a cluster of video optimizers. The cache database responds indicates whether a matching optimized version of the source file exists in a local cache of a given video optimizer in the cluster. | 01-23-2014 |
20140254380 | Real-Time Network Monitoring and Subscriber Identification with an On-Demand Appliance - A system and a method are disclosed for selectively monitoring traffic in a service provider network. The system receives a notice for a beginning of a network data flow, which responds to a request from a user device for content at an origin server. The system then determines whether to monitor the data flow from the origin server to the user device. If so determined, the system collects statistic information of the data flow and stores the statistic information to a flow record in a database. The system also maps the flow record to a subscriber of the service provider network by analyzing the statistic information of the data flow and estimates bandwidth provided to the data flow by the service provider's network based on the analysis of the statistic information of the data flow. | 09-11-2014 |
20150381677 | Just-in-Time Distributed Video Cache - A video optimizer receives a request to optimize a source file and stream the optimized file. The request may be accompanied by a key uniquely identifying the original source file to be optimized and an optimized version of the source file to stream to the client. The key uniquely identifies the source video file as it exists on an origin server to prevent transmission of modified source video and the optimized version of the source file by optimization parameters to ensure compatibility with the user device. The video optimizer queries a cache database in response to the received request, which contains references keys and locations of optimized source files among local caches in a cluster of video optimizers. The cache database responds indicates whether a matching optimized version of the source file exists in a local cache of a given video optimizer in the cluster. | 12-31-2015 |
20160043898 | LINKED LIST SCRIPTING ENGINE - A system and a method are creating a linked list scripts for a networking device. The system receives a set of nodes defining script functionality and generates a script by coupling the nodes in a nodal structure based on desired order of execution, wherein a leaf node is an standalone node with no child node, and wherein a nugget node includes one or more child nodes, each child node being a nugget or leaf node. The system then determines an execution path through a subset of nodes in the nodal tree structure based on one or more input values. The system also compiles the subset of nodes into a linked list of operations, which follows the execution path, and executes the path of operations within the compiled linked list of operations. | 02-11-2016 |
Patent application number | Description | Published |
20130067916 | OPTIMIZED TURBOCHARGER BEARING SYSTEM - A turbocharger system, in certain embodiments, includes a compressor, a turbine, a shaft of common diameter coupling the compressor to the turbine, and a first fluid film bearing disposed about the shaft at a compressor end portion of the shaft. The system also includes a second fluid film fixed pad bearing disposed about the shaft at a turbine end portion of the shaft, wherein the first and second fluid film fixed pad bearings have different clearance ratios, effective lengths, or both, relative to one another. The system, in some embodiments, includes a compressor fluid film fixed pad bearing and a turbine fluid film fixed pad bearing, wherein the compressor and turbine fluid film fixed pad bearings have different clearance ratios and effective lengths, relative to one another. | 03-21-2013 |
20140017099 | TURBOCHARGER SYSTEM WITH REDUCED THRUST LOAD - An exemplary compressor is provided. The compressor includes a plurality of blades, a hub defining a front surface and a back surface, and a first flow restriction structure provided at the back surface of the hub. The plurality of blades are arranged in a predefined manner on the front surface for receiving input air flow at a first pressure and compressing the input air flow to provide an output air flow at a second pressure higher than the first pressure. The first flow restriction member is configured for preventing at least a portion of the output air flow at the second pressure from entering into the back surface of the hub to reduce an air pressure at the back surface of the hub. | 01-16-2014 |
Patent application number | Description | Published |
20100103839 | Testing of Transmitters for Communication Links by Software Simulation of Reference Channel and/or Reference Receiver - A transmitter for a communications link is tested by using a (software) simulation of a reference channel and/or a reference receiver to test the transmitter. In one embodiment for optical fiber communications links, a data test pattern is applied to the transmitter under test and the resulting optical output is captured, for example by a sampling oscilloscope. The captured waveform is subsequently processed by the software simulation, in order to simulate propagation of the optical signal through the reference channel and/or reference receiver. A performance metric for the transmitter is calculated based on the processed waveform. | 04-29-2010 |
20100142603 | Testing of Elements Used in Communication Links - A receiver for a communications link includes a receiver module and a host receiver. These two components can be tested independently. In one embodiment, the receiver module is characterized with respect to noise and distortion. The noise performance can be determined by comparing input and output signals of the receiver module, to determine the relative noise of the receiver module. The distortion performance can be determined by comparing the distortion of input and output signals of the receiver module, using a reference host receiver that includes an equalizer. The host receiver can be tested by using a reference receiver module. | 06-10-2010 |
20110211846 | Transmitter Frequency Peaking for Optical Fiber Channels - Frequency peaking is used in the transmitter to improve link performance. In one example, frequency peaking improves the PIE | 09-01-2011 |
20120189300 | TESTING OF RECEIVERS WITH SEPARATE LINEAR O/E MODULE AND HOST USED IN COMMUNICATION LINKS - A receiver for a communications link includes a receiver module and a host receiver. These two components can be tested independently. In one embodiment, the receiver module is characterized with respect to noise and distortion. The noise performance can be determined by comparing input and output signals of the receiver module, to determine the relative noise of the receiver module. The distortion performance can be determined by comparing the distortion of input and output signals of the receiver module, using a reference host receiver that includes an equalizer. The host receiver can be tested by using a reference receiver module. | 07-26-2012 |
20140161440 | Testing of Elements Used In Communication Links - A receiver for a communications link includes a receiver module and a host receiver. These two components can be tested independently. In one embodiment, the receiver module is characterized with respect to noise and distortion. The noise performance can be determined by comparing input and output signals of the receiver module, to determine the relative noise of the receiver module. The distortion performance can be determined by comparing the distortion of input and output signals of the receiver module, using a reference host receiver that includes an equalizer. The host receiver can be tested by using a reference receiver module. | 06-12-2014 |