Patent application number | Description | Published |
20120324504 | SYSTEMS AND METHODS FOR PROVIDING PARENTAL CONTROLS IN A CLOUD-BASED MEDIA GUIDANCE APPLICATION - Systems and methods for providing parental controls in a cloud-based media guidance application may provide users with compiled listings of the user's content and parental controls for accessing that and other content based on the user equipment devices from which the content access request is received. A user may identify remote storage providers at which user content is stored, and may provide criteria for limiting or preauthorizing access to selected content by one or more user equipment devices. In response to receiving a user request, a listing of content stored with the remote storage providers may be compiled and presented in a media guidance application. A selection of any one of the user's content, as well as a selection of any other content listed in the media guidance application, may be subject to access control criteria applicable to the user equipment device from which the selection was received. | 12-20-2012 |
20130058480 | SYSTEMS AND METHODS FOR SAVING ENCODED MEDIA STREAMED USING ADAPTIVE BITRATE STREAMING - Systems and methods for saving encoded media streamed using adaptive bitrate streaming in accordance with embodiments of the invention are disclosed. In one embodiment of the invention, a playback device configured to perform adaptive bitrate streaming of media includes a video decoder application and a processor, where the video decoder application configures the processor to select a download stream from a set of alternative streams of video data, measure streaming conditions and request a stream of video data from the alternative streams of video data, receive portions of video data from the requested stream of video data, decode the received video data, save the received video data to memory, when the received video data is from the download stream and separately download and save the corresponding portion of video data from the download stream to memory, when the received video data is not from the download stream. | 03-07-2013 |
20130179199 | SYSTEMS AND METHODS FOR GRANTING ACCESS TO DIGITAL CONTENT USING ELECTRONIC TICKETS AND TICKET TOKENS - Systems and methods for granting access to digital content using electronic tickets and ticket tokens in accordance with embodiments of the invention are disclosed. One embodiment includes a processor, and memory configured to store an electronic ticket, and a ticket token. In addition, the processor is configured to authenticate a merchant server, receive a request for a ticket token for a specific piece of content from the merchant server, generate a ticket token that expires after a predetermined time period, associate the ticket token with an electronic ticket, send the ticket token to the merchant server for delivery to a user device, receive a request to access the identified piece of digital content from the user device, where the request includes the ticket token, send the electronic ticket and access information to the user device, and expire the ticket token. | 07-11-2013 |
20130179992 | SYSTEMS AND METHODS FOR ACCESSING DIGITAL CONTENT USING ELECTRONIC TICKETS AND TICKET TOKENS - Systems and methods for accessing digital content using electronic tickets and ticket tokens in accordance with embodiments of the invention are disclosed. In one embodiment, a user device includes a processor, a network interface, and memory configured to store an electronic ticket, and a ticket token, and the processor is configured by an application to send a request for digital content, receive a ticket token from a merchant server, wherein the ticket token is generated by a DRM server and associated with an electronic ticket that enables playback of the requested digital content, send the ticket token to a DRM server, receive an electronic ticket that enables playback of requested digital content, request the digital content associated with the electronic ticket, and play back the requested digital content using the electronic ticket. | 07-11-2013 |
20150096060 | Systems and Methods for Accessing Digital Content Using Electronic Tickets and Ticket Tokens - Systems and methods for accessing digital content using electronic tickets and ticket tokens in accordance with embodiments of the invention are disclosed. In one embodiment, a user device includes a processor, a network interface, and memory configured to store an electronic ticket, and a ticket token, and the processor is configured by an application to send a request for digital content, receive a ticket token from a merchant server, wherein the ticket token is generated by a DRM server and associated with an electronic ticket that enables playback of the requested digital content, send the ticket token to a DRM server, receive an electronic ticket that enables playback of requested digital content, request the digital content associated with the electronic ticket, and play back the requested digital content using the electronic ticket. | 04-02-2015 |
Patent application number | Description | Published |
20150241238 | LIVE BRANDED DYNAMIC MAPPING - A live dynamic map that provides for increased convenience for a user at a venue is disclosed. The live dynamic map may be branded for a venue, shows points of interest and paths between locations, includes a messaging capability, and allows users to be social with one another as well as venue management. Live branded mapping may allow for similar engagement on a region-by-region, neighborhood-by-neighborhood, or even brand-by-brand basis. By engaging on a hyper-local level, the present mapping platform can better target user and payload delivering and improve upon business to consumer brand engagement. | 08-27-2015 |
20150242890 | INCREASING CUSTOMER MONETIZATION - A system to improve end-user monetization in a captive audience environment is disclosed. Mobile and wearable users may be engaged by way of contextual and perishable messaging. Such messaging is dynamically updated and maintained to provide a unique messaging experience which increases monetization opportunities, which may utilize location based technologies. | 08-27-2015 |
20150244725 | PARENTAL CONTROLS - A web service platform to improve end-user engagement in a captive audience environment. Mobile and web-based clients allow application users to authorize and approve usage of entitlements of other users, including their children, based upon preconfigured rules and the proximity between the user requesting and the user approving authorization to use the entitlement. | 08-27-2015 |
Patent application number | Description | Published |
20120278801 | MAINTAINING HIGH AVAILABILITY OF A GROUP OF VIRTUAL MACHINES USING HEARTBEAT MESSAGES - Embodiments maintain high availability of software application instances in a fault domain. Subordinate hosts are monitored by a master host. The subordinate hosts publish heartbeats via a network and datastores. Based at least in part on the published heartbeats, the master host determines the status of each subordinate host, distinguishing between subordinate hosts that are entirely inoperative and subordinate hosts that are operative but partitioned (e.g., unreachable via the network). The master host may restart software application instances, such as virtual machines, that are executed by inoperative subordinate hosts or that cease executing on partitioned subordinate hosts. | 11-01-2012 |
20120297236 | HIGH AVAILABILITY SYSTEM ALLOWING CONDITIONALLY RESERVED COMPUTING RESOURCE USE AND RECLAMATION UPON A FAILOVER - In one embodiment, a method attempts, by a computing device, to determine a placement of a set of virtual machines on available hosts upon failure of a host. The placement considers the set of virtual machines as being not powered on any of the available hosts. The method further determines, by the computing device, a placed list of virtual machines in the set of virtual machines as a recommendation to power on to the available hosts. The determination of the placed list of virtual machines is used to determine a power off list of virtual machines in the set of virtual machines to power off, wherein virtual machines in the power off list of virtual machines are currently powered on available hosts but were considered to be powered off to determine the placement. | 11-22-2012 |
20120311576 | SYSTEM AND METHOD FOR RESTARTING A WORKLOAD BASED ON GLOBAL LOAD BALANCING - A method for restarting a virtual machine in a virtual computing system having a plurality of hosts and a resource scheduler for the plurality of hosts includes writing a placement request for the virtual machine to a shared channel that is accessible by the resource scheduler. The method further includes reading a placement result from the shared channel, wherein the placement result is generated by the resource scheduler responsive to the placement request; and restarting the virtual machine in accordance with the placement result. | 12-06-2012 |
20130311824 | METHOD AND SYSTEM FOR CLUSTER RESOURCE MANAGEMENT IN A VIRTUALIZED COMPUTING ENVIRONMENT - Methods and systems for cluster resource management in virtualized computing environments are described. VM spares are used to reserve (or help discover or otherwise obtain) a set of computing resources for a VM. While VM spares may be used for a variety of scenarios, particular uses of VM spares include using spares to ensure resource availability for requests to power on VMs as well as for discovering, obtaining, and defragmenting the resources and VMs on a cluster, e.g., in response to requests to reserve resources for a VM or to respond to a notification of a failure for a given VM. | 11-21-2013 |
20140059379 | PROACTIVE RESOURCE RESERVATION FOR PROTECTING VIRTUAL MACHINES - A system for proactive resource reservation for protecting virtual machines. The system includes a cluster of hosts, wherein the cluster of hosts includes a master host, a first slave host, and one or more other slave hosts, and wherein the first slave host executes one or more virtual machines thereon. The first slave host is configured to identify a failure that impacts an ability of the one or more virtual machines to provide service, and calculate a list of impacted virtual machines. The master host is configured to receive a request to reserve resources on another host in the cluster of hosts to enable the impacted one or more virtual machines to failover, calculate a resource capacity among the cluster of hosts, determine whether the calculated resource capacity is sufficient to reserve the resources, and send an indication as to whether the resources are reserved. | 02-27-2014 |
20140059380 | PROTECTING PAIRED VIRTUAL MACHINES - A system for monitoring virtual machines includes a master host and a slave host. The slave host includes a primary virtual machine and a secondary virtual machine. The slave host is configured to identify a failure that impacts an ability of at least one of the primary virtual machine and the secondary virtual machine to provide service. If the failure is a Permanent Device Loss failure, the slave host is configured to terminate each impacted virtual machine. If the failure is an All Paths Down failure, the master host is configured to apply one of the following: a first remedy if the primary virtual machine is impacted and the secondary virtual machine is not impacted; a second remedy if the secondary virtual machine is impacted and the primary virtual machine is not impacted; or a third remedy if both the primary virtual machine and the secondary virtual machine are impacted. | 02-27-2014 |
20140059392 | PROTECTING VIRTUAL MACHINES AGAINST STORAGE CONNECTIVITY FAILURES - A system for monitoring a virtual machine executed on a host. The system includes a processor that receives an indication that a failure caused a storage device to be inaccessible to the virtual machine, the inaccessible storage device impacting an ability of the virtual machine to provide service, and applies a remedy to restore access to the storage device based on a type of the failure. | 02-27-2014 |
20140122920 | HIGH AVAILABILITY SYSTEM ALLOWING CONDITIONALLY RESERVED COMPUTING RESOURCE USE AND RECLAMATION UPON A FAILOVER - In one embodiment, a method determines a first set of virtual machines and a second set of virtual machines. The first set of virtual machines is associated with a first priority level and the second set of virtual machines is associated with a second priority level. A first set of computing resources and a second set of computing resources are associated with hosts. Upon determining a failure of a host, the method performs: generating a power off request for one or more of the second set of virtual machines powered on the second set of computing resources and generating a power on request for one or more virtual machines from the first set of virtual machines that were powered on the failed host, the power on request powering on the one or more virtual machines from the first set of virtual machines on the second set of computing resources. | 05-01-2014 |
20140344805 | Managing Availability of Virtual Machines in Cloud Computing Services - Recovery of virtual machines when one or more hosts fail includes identifying virtual machines running on the remaining functioning hosts. Some of the identified powered on virtual machines are suspended in favor of restarting some of the failed virtual machines from the failed host(s). A subsequent round of identifying virtual machines for suspension and virtual machines for restarting is performed. Virtual machines for suspension and restarting may be identified based on their associated “recovery time objective” (RTO) values or their “maximum number of RTO violations” value. | 11-20-2014 |
20150089272 | MAINTAINING HIGH AVAILABILITY OF A GROUP OF VIRTUAL MACHINES USING HEARTBEAT MESSAGES - Embodiments maintain high availability of software application instances in a fault domain. Subordinate hosts are monitored by a master host. The subordinate hosts publish heartbeats via a network and datastores. Based at least in part on the published heartbeats, the master host determines the status of each subordinate host, distinguishing between subordinate hosts that are entirely inoperative and subordinate hosts that are operative but partitioned (e.g., unreachable via the network). The master host may restart software application instances, such as virtual machines, that are executed by inoperative subordinate hosts or that cease executing on partitioned subordinate hosts. | 03-26-2015 |
20150154046 | INTERDEPENDENT VIRTUAL MACHINE MANAGEMENT - Exemplary methods, apparatuses, and systems determine a list of virtual machines to be subject to a corrective action. When one or more of the listed virtual machines have dependencies upon other virtual machines, network connections, or storage devices, the determination of the list includes determining that the dependencies of the one or more virtual machines have been met. An attempt to restart or take another corrective action for the first virtual machine within the list is made. A second virtual machine that is currently deployed and running or powered off or paused in response to the corrective action for the first virtual machine is determined to be dependent upon the first virtual machine. In response to the second virtual machine's dependencies having been met by the attempt to restart or take corrective action for the first virtual machine, the second virtual machine is added to the list of virtual machines. | 06-04-2015 |
Patent application number | Description | Published |
20090093238 | Methods for Processing and Distributing Location-Based Data - A location-based messaging system and its methods of operation are disclosed, including methods for processing and distributing location-based data. Methods for sending geographic location information for a target address from a computing device to a receiving device that will enable the receiving device to display a map and/or directions from a geographic location of the receiving device to the geographic location of the target address, methods for receiving and responding to location-based data, and methods for virally distributing location-based applications are also disclosed. | 04-09-2009 |
20090093260 | Methods for Receiving and Responding to Location-Based Data - A location-based messaging system and its methods of operation are disclosed, including methods for receiving and responding to location-based data. Methods for sending geographic location information for a target address from a computing device to a receiving device that will enable the receiving device to display a map and/or directions from a geographic location of the receiving device to the geographic location of the target address, methods for processing and distributing location-based data, and methods for virally distributing location-based applications are also disclosed. | 04-09-2009 |
20090093261 | Methods for Sending Location-Based Data - A location-based messaging system and its methods of operation disclosed, including methods for sending geographic location information for a target address from a computing device to a receiving device that will enable the receiving device to display a map and/or directions from a geographic location of the receiving device to the geographic location of the target address. Methods for processing and distributing location-based data, methods for receiving and responding to location-based data, and methods for virally distributing location-based applications are also disclosed. | 04-09-2009 |
20090094602 | Methods for Virally Distributing Location-Based Applications - A location-based messaging system and its methods of operation are disclosed, including methods for virally distributing location-based applications are also disclosed. Methods for sending geographic location information for a target address from a computing device to a receiving device that will enable the receiving device to display a map and/or directions from a geographic location of the receiving device to the geographic location of the target address, methods for processing and distributing location-based data, and methods for receiving and responding to location-based data. | 04-09-2009 |
Patent application number | Description | Published |
20130115972 | Method for Managing a Geo-Targeted Campaign - An embodiment is directed to a method for managing a geo-targeted campaign. A user defines a campaign by specifying devices eligible to receive the material associated with the campaign, landmarks defining points of interest and areas associated with the campaign, and triggers that enable the material to be delivered to devices based on a set of conditions. In an embodiment, a console provides controls for defining devices, landmarks, and events. The console includes a wizard for creating events and a visualization layer that allows a user to visualize devices and landmarks on a map. | 05-09-2013 |
20130165143 | TRAINING PATTERN RECOGNITION SYSTEMS FOR DETERMINING USER DEVICE LOCATIONS - A query device scans radio frequencies for visible transmitting devices. The querying device receives at least a signal strength and identifier information associated with each of the transmitting devices. The list of visible devices is used to query a database containing location information for a plurality of visible devices. The list may be sent to a locationing system that may perform a location analysis on the resulting data to return a location to the query device. The weighted average of the locations returned in the database query may be computed to determine the location of the querying device, with the weight for each of the locations being the current signal strength detected by the querying device. Neural network analysis may also be used to determine the location of the querying device. Learning and seeding operations many also be used to populate the database with location information for transmitting devices. | 06-27-2013 |
20130165144 | DATABASE SEEDING WITH LOCATION INFORMATION FOR WIRELESS ACCESS POINTS - A query device scans radio frequencies for visible transmitting devices. The querying device receives at least a signal strength and identifier information associated with each of the transmitting devices. The list of visible devices is used to query a database containing location information for a plurality of visible devices. The list may be sent to a locationing system that may perform a location analysis on the resulting data to return a location to the query device. The weighted average of the locations returned in the database query may be computed to determine the location of the querying device, with the weight for each of the locations being the current signal strength detected by the querying device. Neural network analysis may also be used to determine the location of the querying device. Learning and seeding operations many also be used to populate the database with location information for transmitting devices. | 06-27-2013 |
20130172006 | HYBRID LOCATION USING A WEIGHTED AVERAGE OF LOCATION READINGS AND SIGNAL STRENGTHS OF WIRELESS ACCESS POINTS - A query device scans radio frequencies for visible transmitting devices. The querying device receives at least a signal strength and identifier information associated with each of the transmitting devices. The list of visible devices is used to query a database containing location information for a plurality of visible devices. The list may be sent to a locationing system that may perform a location analysis on the resulting data to return a location to the query device. The weighted average of the locations returned in the database query may be computed to determine the location of the querying device, with the weight for each of the locations being the current signal strength detected by the querying device. Neural network analysis may also be used to determine the location of the querying device. Learning and seeding operations many also be used to populate the database with location information for transmitting devices. | 07-04-2013 |
20130173506 | HYBRID LOCATION USING PATTERN RECOGNITION OF LOCATION READINGS AND SIGNAL STRENGTHS OF WIRELESS ACCESS POINTS - A query device scans radio frequencies for visible transmitting devices. The querying device receives at least a signal strength and identifier information associated with each of the transmitting devices. The list of visible devices is used to query a database containing location information for a plurality of visible devices. The list may be sent to a locationing system that may perform a location analysis on the resulting data to return a location to the query device. The weighted average of the locations returned in the database query may be computed to determine the location of the querying device, with the weight for each of the locations being the current signal strength detected by the querying device. Neural network analysis may also be used to determine the location of the querying device. Learning and seeding operations many also be used to populate the database with location information for transmitting devices. | 07-04-2013 |
Patent application number | Description | Published |
20090093238 | Methods for Processing and Distributing Location-Based Data - A location-based messaging system and its methods of operation are disclosed, including methods for processing and distributing location-based data. Methods for sending geographic location information for a target address from a computing device to a receiving device that will enable the receiving device to display a map and/or directions from a geographic location of the receiving device to the geographic location of the target address, methods for receiving and responding to location-based data, and methods for virally distributing location-based applications are also disclosed. | 04-09-2009 |
20090093260 | Methods for Receiving and Responding to Location-Based Data - A location-based messaging system and its methods of operation are disclosed, including methods for receiving and responding to location-based data. Methods for sending geographic location information for a target address from a computing device to a receiving device that will enable the receiving device to display a map and/or directions from a geographic location of the receiving device to the geographic location of the target address, methods for processing and distributing location-based data, and methods for virally distributing location-based applications are also disclosed. | 04-09-2009 |
20090093261 | Methods for Sending Location-Based Data - A location-based messaging system and its methods of operation disclosed, including methods for sending geographic location information for a target address from a computing device to a receiving device that will enable the receiving device to display a map and/or directions from a geographic location of the receiving device to the geographic location of the target address. Methods for processing and distributing location-based data, methods for receiving and responding to location-based data, and methods for virally distributing location-based applications are also disclosed. | 04-09-2009 |
20090094602 | Methods for Virally Distributing Location-Based Applications - A location-based messaging system and its methods of operation are disclosed, including methods for virally distributing location-based applications are also disclosed. Methods for sending geographic location information for a target address from a computing device to a receiving device that will enable the receiving device to display a map and/or directions from a geographic location of the receiving device to the geographic location of the target address, methods for processing and distributing location-based data, and methods for receiving and responding to location-based data. | 04-09-2009 |