US20160112448A1 - System for tracking media content transactions - Google Patents
System for tracking media content transactions Download PDFInfo
- Publication number
- US20160112448A1 US20160112448A1 US14/974,986 US201514974986A US2016112448A1 US 20160112448 A1 US20160112448 A1 US 20160112448A1 US 201514974986 A US201514974986 A US 201514974986A US 2016112448 A1 US2016112448 A1 US 2016112448A1
- Authority
- US
- United States
- Prior art keywords
- subscriber
- communication device
- transaction
- anomalous transaction
- media content
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/95—Retrieval from the web
- G06F16/954—Navigation, e.g. using categorised browsing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H04L67/18—
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/52—Network services specially adapted for the location of the user terminal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/02—Services making use of location information
- H04W4/021—Services related to particular areas, e.g. point of interest [POI] services, venue services or geofences
Abstract
Description
- This application is a continuation of U.S. patent application Ser. No. 13/868,212, filed on Apr. 23, 2013, which is a continuation of U.S. patent application Ser. No. 13/228,529, filed on Sep. 9, 2011 which issued as U.S. Pat. No. 8,447,777 on May 21, 2013, which is a continuation of U.S. patent application Ser. No. 11/848,071, filed on Aug. 30, 2007 which issued as U.S. Pat. No. 8,037,037 on Oct. 11, 2011, the contents of which are hereby incorporated by reference as if fully set forth.
- The present disclosure relates generally to media content management and more specifically to a system for tracking media content transactions.
- Online storage solutions for managing digital media content such as personal videos, pictures, podcasts, etc. provide users nearly no discernible trace of a trail the media has followed in getting to and leaving the storage site. Typically when uploading media files to a storage site, the user is apprised that the upload operation is complete with no other notification generally provided. There is also minimal oversight with other transactional activities such as deletions, modifications, or additions of media content managed by the storage site. Consequently, when someone enters a subscriber's media storage account without authorization and misappropriates content or maliciously destroys files, the subscriber is often unaware.
-
FIG. 1 depicts an exemplary embodiment of a communication system; -
FIG. 2 depicts an exemplary embodiment of a portal of the communication system; -
FIG. 3 depicts an exemplary method operating in portions of the communication system; and -
FIG. 4 is a diagrammatic representation of a machine in the form of a computer system within which a set of instructions, when executed, may cause the machine to perform any one or more of the methodologies discussed herein. - In one embodiment of the present disclosure, a computer-readable storage medium can have computer instructions for creating an archive of one or more media content files, receiving a request to carry out a transaction associated with the archive, generating a tracking number for the transaction, carrying out the transaction, generating a description of the transaction, recording the description with the tracking number, and transmitting a notice to a communication device of a subscriber of the archive comprising a portion of the description and associated tracking number.
- In one embodiment of the present disclosure, a web server can have a controller adapted to manage an archive of media content for a subscriber, and record a transaction description and a corresponding tracking identifier for a transaction that manipulates the archive.
- In one embodiment of the present disclosure, a media content processor can have a controller adapted to manage a plurality of transactions applied to an archive of media content by recording a transaction description and a corresponding identifier for each of the plurality of transactions.
-
FIG. 1 depicts an exemplary embodiment of acommunication system 100. Thecommunication system 100 can represent an IPTV broadcast media system. In a typical IPTV infrastructure, there is at least one super head office server (SHS) which receives national media programs from satellite and/or media servers from service providers of multimedia broadcast channels. In the present context, media programs can represent audio only content, video only content, and combinations thereof. The SHS server forwards IP packets associated with the media content to video head servers (VHS) via a network of video head offices (VHO) according to a common multicast communication method. - The VHS then distributes multimedia broadcast programs to commercial and/or
residential buildings 102 housing a gateway 104 (e.g., a residential gateway or RG).Thegateway 104 distributes broadcast signals tomedia content processors 106 such as Set-Top Boxes (STBs) which in turn present broadcast selections tomedia devices 108 such as computers or television units managed in some instances by a media controller 107 (e.g., an infrared or RF remote control). Unicast traffic can also be exchanged between themedia content processors 106 and subsystems of the IPTV media system for services such as video-on-demand (VoD). - The IPTV media system can be coupled to one or
more computing devices 130 coupled to an Internet Service Provider (ISP)network 132 serving a number of functions. In one embodiment for instance, thecomputing devices 130 operate as a web orInternet server 132 for providing portal services over theISP network 132 to fixedmedia devices 108 orportable communication devices 116 by way of awireless base station 117 such as in a cellular communication network operating with common protocols (GSM, CDMA, etc.). In another embodiment, thecomputing devices 130 can operate as an on-line storage system 134 for managing media content of a plurality of subscribers of thecommunication system 100. - In yet another embodiment, the
computing devices 130 can operate as a presence system 136 for monitoring activities and whereabouts of subscribers of thecommunication system 100. The presence system 136 can for example detect that the subscriber is in transit with aportable communication device 116 by detecting a handover transition betweenbase stations 117 and/or by receiving location coordinates from the portable communication device using a Global Positioning System (GPS) receiver incorporated therein. The presence system can also detect that the subscriber is utilizing acommunication device 108 inbuilding 102 based on network activity emanating from said communication device or consumed thereby. - A satellite broadcast system can be used in place of the IPTV media system. In this embodiment, signals transmitted by a
satellite 115 can be intercepted by asatellite dish receiver 131 coupled to building 102 which conveys satellite media signals to themedia content processors 106 by way ofgateway 104. Alternatively, the satellite signals can be received and processed by themedia content processor 106 over a satellite port of the media content processor coupled to thesatellite dish receiver 131. Themedia content processors 106 can also be equipped with a broadband port that couples to theISP network 132 for general broadband access. - Although not shown, the
communication system 100 can also be combined or replaced with analog or digital broadcast distributions systems such as cable TV systems. It would be apparent therefore to one of ordinary skill in the art that the present disclosure can be applied to any media content system. -
FIG. 2 depicts an exemplary embodiment of aportal 230 of thecommunication system 100. InFIG. 2 , theportal 230 can be accessed by a URL with a common browser such as Microsoft's Internet Explorer using an Internet-capable fixed orportable communication device portal 230 can be configured to access amedia content processor 106 such as the STB ofFIG. 1 and services managed thereby such as a Digital Video Recorder (DVR), an Electronic Programming Guide (EPG), Video on Demand (VoD) catalog, a personal catalog stored in the STB (e.g., personal videos, pictures, audio recordings, etc.), and so on by way of thegateway 104. -
FIG. 3 depicts an exemplary method 300 operating in portions of thecommunication system 100. Method 300 begins withstep 302 in which a storage system 134 (referred to herein as SS 132) creates an archive of media content files for a subscriber. The media content can represent audio content (e.g., personal recording, podcasts, MP3 content downloaded from iTunes™, ringtones for cell phones, etc.), video content (e.g., downloaded from a VoD catalog, family album video recordings, etc.), and/or still images (e.g., wall paper, personal picture album, etc.). - In
step 304 the SS 132 can monitor media content transactions carried out by the subscriber. A transaction can represent for example any activity which the subscriber can undertake while accessing the archive. Such activities can include without limitation modifying a structure of the archive (e.g., changing directory or folder structure), reviewing or reading at least one media file in the archive (e.g., visual and/or audible presentation of a file), retrieving or removing at least one media file from the archive (e.g., removing a file from the archive), editing at least one media file in the archive (e.g., changing file name, cropping a picture, deleting portions of the content, etc.), deleting at least one media file in the archive, or recording an additional media file in the archive. Other transactions that can have an affect on the archive and its content are contemplated by the present disclosure. -
Step 304 can be used by the SS 132 to detect usage patterns and thereby generate in step 306 a behavior profile of the subscriber. Common pattern detection and predictive techniques (e.g., linear regression) can be used instep 306 to predict the behavior of the subscriber. Instep 308, theSS 132 can receive a request to carry out a transaction associated with the archive from any source that identifies itself as the subscriber. The request can include common validation information such as a login and password which enables access to the archived media content. The source from which the request was received can be a fixed orportable communication device ISP network 132 and thereby the SS 132. Responsive to the request, the SS 132 carries out one or more transactions applied to the archive as directed by the requesting party instep 310. - For each transaction the
SS 132 carries out, it generates in step 312 a transaction description and a corresponding tracking number which is recorded in the archive of the subscriber instep 314. The transaction description can describe the time when the transaction was requested and/or carried out, the type of transaction (e.g., editing, deletion, retrieval, etc.), which media content files were affected, the IP address of the computer making the request, and so on. Accordingly, theSS 132 can be programmed to be as probative as necessary to collect as much transaction data as may be useful to the subscriber. The tracking number can be a string of characters, numbers or combinations thereof Each tracking number is unique, so that the subscriber can single out each transaction recorded by theSS 132. - In situations where the subscriber's identity has been misappropriated, it is not always possible to know that the subscriber is not the individual making the request in
step 308. To mitigate circumstances such as this, theSS 132 can be programmed instep 316 to look for anomalous behavior with the transaction. The anomalous behavior can be detected from a deviation between the transaction and the behavior profile of the subscriber. For example, theSS 132 could detect an excessive number of deletions, modifications, or an excessive duration of browsing through media files that have not been viewed by the subscriber quite some time. As noted earlier, statistical and/or predictive techniques can be used to detect such deviations. - If no anomalous behavior is detected, method 300 ceases and is repeated for subsequent transactions. If an anomalous behavior is detected, the
SS 132 can proceed to step 318 where it requests from the presence system 136 presence information of the subscriber. The presence information can be used by theSS 132 to select in step 320 acommunication device step 322 and alert the subscriber promptly. The notice can include a portion of the description generated instep 312 and its corresponding tracking number. The notice can be transmitted at a time during which the archive is being acted on instep 310 or after the transaction(s) requested in steps 308-310 are completed. - The partial description can include highlights of the transaction (e.g., time it took place, type of activity—deletion, modification, removal, etc., and affected files). The compact information can be used to reduce latency in transmission and to avoid overwhelming the subscriber with details. The notice can be transmitted by any wired or wireless common means of communication. For example, the notice can be transmitted as an email, a Rich Site Summary (RSS) message feed, a Short Message Service (SMS) message, a Multimedia Message Service (MMS) message, or a phone call conveying a synthesized speech message that describes the notice—among other possible methods.
- Upon the
communication device communication device step 324 accompanied with the tracking number to assist the SS in located the transaction details. Such a request can be generated by for example the subscriber replying to the email notice, or by responding to audio options presented by an interactive voice response system managed by theSS 132. - The
SS 132 can present instep 326 the transaction details at thecommunication device 108, 118 along with optional countermeasures to address the effects of said transaction. Countermeasures can include for example a process for undoing at least a portion of the effects of the transaction. If for example theSS 132 performs daily or weekly incremental storage backups of its archives, then the SS can offer the subscriber a means to recover files that were deleted or modified. In addition to providing a restoration means, theSS 132 can provide the subscriber a means to increase security. For example, theSS 132 can provide a countermeasure to add or change an authorization process to access the archive (e.g., change an existing login and password or create a new one). TheSS 132 can also provide the subscriber a means to discontinue access for all users if the subscriber determines the threat is significant. If theSS 132 detects that the subscriber has selected a countermeasure instep 328, the SS proceeds to step 330 where it applies it to the affected archive; otherwise, method 300 ends and is repeated for subsequent transactions. - Upon reviewing the aforementioned embodiments, it would be evident to an artisan with ordinary skill in the art that said embodiments can be modified, reduced, or enhanced without departing from the scope and spirit of the claims described below. For example, method 300 can be adapted so that notices are transmitted to a subscriber for all transactions without monitoring the usage patterns of the subscriber to detect anomalous transactions. Additionally, method 300 can be adapted so that notices are always transmitted to the same communication device without a reliance on presence information for the subscriber.
- Method 300 can also be adapted in
step 324 to establish communications between a service agent and the subscriber by way of thecommunication device communication system 100 to assist the subscriber in tracing and assessing suspect transactions with one or more tracking numbers supplied by the subscriber in notices received thereby. Alternatively, the service agent can represent an interactive voice response system managed by theSS 132 that interacts with the subscriber using synthesized speech, and recognizes subscriber responses in the form of voice and/or dial-tone keypad entries. - In yet another embodiment, method 300 can be adapted so that it operates in the media content processor (MCP) 106 rather than a centralized system such as the
SS 132. In this embodiment, theMCP 106 creates archives of media content for a select subscriber. In a multi-user setting, theMCP 106 can create archived accounts. In either case, theMCP 106 can perform in whole or in part the functions of theSS 132 as described above to provide the subscriber traceability of the transactions applied to media content archived by the MCP. - These are but a few examples of modifications that can be applied to the present disclosure without departing from the scope of the claims. Accordingly, the reader is directed to the claims section for a fuller understanding of the breadth and scope of the present disclosure.
-
FIG. 4 depicts an exemplary diagrammatic representation of a machine in the form of a computer system 400 within which a set of instructions, when executed, may cause the machine to perform any one or more of the methodologies discussed above. In some embodiments, the machine operates as a standalone device. In some embodiments, the machine may be connected (e.g., using a network) to other machines. In a networked deployment, the machine may operate in the capacity of a server or a client user machine in server-client user network environment, or as a peer machine in a peer-to-peer (or distributed) network environment. - The machine may comprise a server computer, a client user computer, a personal computer (PC), a tablet PC, a laptop computer, a desktop computer, a control system, a network router, switch or bridge, or any machine capable of executing a set of instructions (sequential or otherwise) that specify actions to be taken by that machine. It will be understood that a device of the present disclosure includes broadly any electronic device that provides voice, video or data communication. Further, while a single machine is illustrated, the term “machine” shall also be taken to include any collection of machines that individually or jointly execute a set (or multiple sets) of instructions to perform any one or more of the methodologies discussed herein.
- The computer system 400 may include a processor 402 (e.g., a central processing unit (CPU), a graphics processing unit (GPU, or both), a
main memory 404 and astatic memory 406, which communicate with each other via abus 408. The computer system 400 may further include a video display unit 410 (e.g., a liquid crystal display (LCD), a flat panel, a solid state display, or a cathode ray tube (CRT)). The computer system 400 may include an input device 412 (e.g., a keyboard), a cursor control device 414 (e.g., a mouse), adisk drive unit 416, a signal generation device 418 (e.g., a speaker or remote control) and anetwork interface device 420. - The
disk drive unit 416 may include a machine-readable medium 422 on which is stored one or more sets of instructions (e.g., software 424) embodying any one or more of the methodologies or functions described herein, including those methods illustrated above. Theinstructions 424 may also reside, completely or at least partially, within themain memory 404, thestatic memory 406, and/or within theprocessor 402 during execution thereof by the computer system 400. Themain memory 404 and theprocessor 402 also may constitute machine-readable media. - Dedicated hardware implementations including, but not limited to, application specific integrated circuits, programmable logic arrays and other hardware devices can likewise be constructed to implement the methods described herein. Applications that may include the apparatus and systems of various embodiments broadly include a variety of electronic and computer systems. Some embodiments implement functions in two or more specific interconnected hardware modules or devices with related control and data signals communicated between and through the modules, or as portions of an application-specific integrated circuit. Thus, the example system is applicable to software, firmware, and hardware implementations.
- In accordance with various embodiments of the present disclosure, the methods described herein are intended for operation as software programs running on a computer processor. Furthermore, software implementations can include, but not limited to, distributed processing or component/object distributed processing, parallel processing, or virtual machine processing can also be constructed to implement the methods described herein.
- The present disclosure contemplates a machine readable
medium containing instructions 424, or that which receives and executesinstructions 424 from a propagated signal so that a device connected to anetwork environment 426 can send or receive voice, video or data, and to communicate over thenetwork 426 using theinstructions 424. Theinstructions 424 may further be transmitted or received over anetwork 426 via thenetwork interface device 420. - While the machine-
readable medium 422 is shown in an example embodiment to be a single medium, the term “machine-readable medium” should be taken to include a single medium or multiple media (e.g., a centralized or distributed database, and/or associated caches and servers) that store the one or more sets of instructions. The term “machine-readable medium” shall also be taken to include any medium that is capable of storing, encoding or carrying a set of instructions for execution by the machine and that cause the machine to perform any one or more of the methodologies of the present disclosure. - The term “machine-readable medium” shall accordingly be taken to include, but not be limited to: solid-state memories such as a memory card or other package that houses one or more read-only (non-volatile) memories, random access memories, or other re-writable (volatile) memories; magneto-optical or optical medium such as a disk or tape; and carrier wave signals such as a signal embodying computer instructions in a transmission medium; and/or a digital file attachment to e-mail or other self-contained information archive or set of archives is considered a distribution medium equivalent to a tangible storage medium. Accordingly, the disclosure is considered to include any one or more of a machine-readable medium or a distribution medium, as listed herein and including art-recognized equivalents and successor media, in which the software implementations herein are stored.
- Although the present specification describes components and functions implemented in the embodiments with reference to particular standards and protocols, the disclosure is not limited to such standards and protocols. Each of the standards for Internet and other packet switched network transmission (e.g., TCP/IP, UDP/IP, HTML, HTTP) represent examples of the state of the art. Such standards are periodically superseded by faster or more efficient equivalents having essentially the same functions. Accordingly, replacement standards and protocols having the same functions are considered equivalents.
- The illustrations of embodiments described herein are intended to provide a general understanding of the structure of various embodiments, and they are not intended to serve as a complete description of all the elements and features of apparatus and systems that might make use of the structures described herein. Many other embodiments will be apparent to those of skill in the art upon reviewing the above description. Other embodiments may be utilized and derived therefrom, such that structural and logical substitutions and changes may be made without departing from the scope of this disclosure. Figures are also merely representational and may not be drawn to scale. Certain proportions thereof may be exaggerated, while others may be minimized. Accordingly, the specification and drawings are to be regarded in an illustrative rather than a restrictive sense.
- Such embodiments of the inventive subject matter may be referred to herein, individually and/or collectively, by the term “invention” merely for convenience and without intending to voluntarily limit the scope of this application to any single invention or inventive concept if more than one is in fact disclosed. Thus, although specific embodiments have been illustrated and described herein, it should be appreciated that any arrangement calculated to achieve the same purpose may be substituted for the specific embodiments shown. This disclosure is intended to cover any and all adaptations or variations of various embodiments. Combinations of the above embodiments, and other embodiments not specifically described herein, will be apparent to those of skill in the art upon reviewing the above description.
- The Abstract of the Disclosure is provided to comply with 37 C.F.R. .sctn.1.72(b), requiring an abstract that will allow the reader to quickly ascertain the nature of the technical disclosure. It is submitted with the understanding that it will not be used to interpret or limit the scope or meaning of the claims In addition, in the foregoing Detailed Description, it can be seen that various features are grouped together in a single embodiment for the purpose of streamlining the disclosure. This method of disclosure is not to be interpreted as reflecting an intention that the claimed embodiments require more features than are expressly recited in each claim. Rather, as the following claims reflect, inventive subject matter lies in less than all features of a single disclosed embodiment. Thus the following claims are hereby incorporated into the Detailed Description, with each claim standing on its own as a separately claimed subject matter.
Claims (20)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/974,986 US20160112448A1 (en) | 2007-08-30 | 2015-12-18 | System for tracking media content transactions |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/848,071 US8037037B2 (en) | 2007-08-30 | 2007-08-30 | System for tracking media content transactions |
US13/228,529 US8447777B2 (en) | 2007-08-30 | 2011-09-09 | System for tracking media content transactions |
US13/868,212 US9219743B2 (en) | 2007-08-30 | 2013-04-23 | System for tracking media content transactions |
US14/974,986 US20160112448A1 (en) | 2007-08-30 | 2015-12-18 | System for tracking media content transactions |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/868,212 Continuation US9219743B2 (en) | 2007-08-30 | 2013-04-23 | System for tracking media content transactions |
Publications (1)
Publication Number | Publication Date |
---|---|
US20160112448A1 true US20160112448A1 (en) | 2016-04-21 |
Family
ID=40409162
Family Applications (4)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/848,071 Expired - Fee Related US8037037B2 (en) | 2007-08-30 | 2007-08-30 | System for tracking media content transactions |
US13/228,529 Active US8447777B2 (en) | 2007-08-30 | 2011-09-09 | System for tracking media content transactions |
US13/868,212 Active 2028-03-21 US9219743B2 (en) | 2007-08-30 | 2013-04-23 | System for tracking media content transactions |
US14/974,986 Abandoned US20160112448A1 (en) | 2007-08-30 | 2015-12-18 | System for tracking media content transactions |
Family Applications Before (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/848,071 Expired - Fee Related US8037037B2 (en) | 2007-08-30 | 2007-08-30 | System for tracking media content transactions |
US13/228,529 Active US8447777B2 (en) | 2007-08-30 | 2011-09-09 | System for tracking media content transactions |
US13/868,212 Active 2028-03-21 US9219743B2 (en) | 2007-08-30 | 2013-04-23 | System for tracking media content transactions |
Country Status (1)
Country | Link |
---|---|
US (4) | US8037037B2 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10462167B2 (en) * | 2017-01-03 | 2019-10-29 | Synamedia Limited | Using data science to aid in detection of unauthorized distribution |
CN111031370A (en) * | 2019-12-12 | 2020-04-17 | 四川天邑康和通信股份有限公司 | Method for mutual communication of convergence gateway part and set-top box part |
Families Citing this family (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8037037B2 (en) * | 2007-08-30 | 2011-10-11 | At&T Intellectual Property I, Lp | System for tracking media content transactions |
US8495699B2 (en) * | 2008-12-23 | 2013-07-23 | At&T Intellectual Property I, L.P. | Distributed content analysis network |
US20100223673A1 (en) * | 2009-02-27 | 2010-09-02 | At&T Intellectual Property I, L.P. | Providing multimedia content with access restrictions |
US20100223660A1 (en) * | 2009-02-27 | 2010-09-02 | At&T Intellectual Property I, L.P. | Providing multimedia content with time limit restrictions |
US8904421B2 (en) * | 2009-06-30 | 2014-12-02 | At&T Intellectual Property I, L.P. | Shared multimedia experience including user input |
GB2485139A (en) * | 2010-10-22 | 2012-05-09 | Vodafone Ip Licensing Ltd | Analysing and securing mobile based transactions |
US9083687B2 (en) | 2011-09-24 | 2015-07-14 | Elwha Llc | Multi-device behavioral fingerprinting |
US9729549B2 (en) | 2011-09-24 | 2017-08-08 | Elwha Llc | Behavioral fingerprinting with adaptive development |
US9825967B2 (en) | 2011-09-24 | 2017-11-21 | Elwha Llc | Behavioral fingerprinting via social networking interaction |
US9298900B2 (en) | 2011-09-24 | 2016-03-29 | Elwha Llc | Behavioral fingerprinting via inferred personal relation |
US9015860B2 (en) | 2011-09-24 | 2015-04-21 | Elwha Llc | Behavioral fingerprinting via derived personal relation |
US9621404B2 (en) | 2011-09-24 | 2017-04-11 | Elwha Llc | Behavioral fingerprinting with social networking |
US9348985B2 (en) * | 2011-11-23 | 2016-05-24 | Elwha Llc | Behavioral fingerprint controlled automatic task determination |
US20130291099A1 (en) * | 2012-04-25 | 2013-10-31 | Verizon Patent And Licensing, Inc. | Notification services with anomaly detection |
US11241835B2 (en) * | 2013-09-27 | 2022-02-08 | The Western Union Company | System and method for remote production of financial instruments |
Citations (31)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6070244A (en) * | 1997-11-10 | 2000-05-30 | The Chase Manhattan Bank | Computer network security management system |
US6195541B1 (en) * | 1998-07-31 | 2001-02-27 | Avaya Technology Corp. | Interaction of a wireless telephone with a transaction unit |
US20020010715A1 (en) * | 2001-07-26 | 2002-01-24 | Garry Chinn | System and method for browsing using a limited display device |
US6405318B1 (en) * | 1999-03-12 | 2002-06-11 | Psionic Software, Inc. | Intrusion detection system |
US20020169747A1 (en) * | 2001-05-10 | 2002-11-14 | Chapman Thomas F. | Systems and methods for notifying a consumer of changes made to a credit report |
US20020198991A1 (en) * | 2001-06-21 | 2002-12-26 | International Business Machines Corporation | Intelligent caching and network management based on location and resource anticipation |
US20030046441A1 (en) * | 2001-07-05 | 2003-03-06 | Rau Sadhana S. | Teamware repository of teamware workspaces |
US20030159070A1 (en) * | 2001-05-28 | 2003-08-21 | Yaron Mayer | System and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damages |
US20030172368A1 (en) * | 2001-12-26 | 2003-09-11 | Elizabeth Alumbaugh | System and method for autonomously generating heterogeneous data source interoperability bridges based on semantic modeling derived from self adapting ontology |
US6668284B1 (en) * | 1998-11-04 | 2003-12-23 | Beckman Coulter, Inc. | Software messaging system |
US20040009778A1 (en) * | 2002-07-15 | 2004-01-15 | Hitachi, Ltd. | Control method for information network system, information network system and mobile communication terminal |
US20040054776A1 (en) * | 2002-09-16 | 2004-03-18 | Finisar Corporation | Network expert analysis process |
US20040128186A1 (en) * | 2002-09-17 | 2004-07-01 | Jodi Breslin | System and method for managing risks associated with outside service providers |
US20040162893A1 (en) * | 2000-09-29 | 2004-08-19 | Andrew Brown | Computer card for storing bootable images and providing remote management functions |
US20040236688A1 (en) * | 2000-10-30 | 2004-11-25 | Bozeman William O. | Universal positive pay database method, system, and computer useable medium |
US20050114711A1 (en) * | 1999-12-02 | 2005-05-26 | Lambertus Hesselink | Managed peer-to-peer applications, systems and methods for distributed data access and storage |
US20050154665A1 (en) * | 2002-11-22 | 2005-07-14 | Florida Bankers Association, Inc. | Fraud prevention system |
US20050278296A1 (en) * | 2004-06-08 | 2005-12-15 | Peter Bostwick | Method and system for creating, sustaining and using a transactional bill of materials (T-BOM ™) |
US20050276092A1 (en) * | 2004-06-14 | 2005-12-15 | Hansen Peter A | Virtual mass storage device for server management information |
US20060106717A1 (en) * | 2000-05-25 | 2006-05-18 | Randle William M | End to end check processing from capture to settlement with security and quality assurance |
US20060123010A1 (en) * | 2004-09-15 | 2006-06-08 | John Landry | System and method for managing data in a distributed computer system |
US20070106606A1 (en) * | 2005-10-24 | 2007-05-10 | The Boeing Company | Near Real Time Payment Card Processing with On-Line Authorization on a Vehicle |
US20070199047A1 (en) * | 2006-02-23 | 2007-08-23 | Rockwell Automation Technologies, Inc. | Audit trail in a programmable safety instrumented system via biometric signature(s) |
US20070261112A1 (en) * | 2006-05-08 | 2007-11-08 | Electro Guard Corp. | Network Security Device |
US20080021709A1 (en) * | 2006-07-24 | 2008-01-24 | Siemens Medical Solutions Usa, Inc. | Application to Worker Communication Interface |
US7389913B2 (en) * | 2006-04-28 | 2008-06-24 | Ed Starrs | Method and apparatus for online check processing |
US20080163307A1 (en) * | 2006-12-29 | 2008-07-03 | Coburn Matthew J | Digital content access |
US7426750B2 (en) * | 2000-02-18 | 2008-09-16 | Verimatrix, Inc. | Network-based content distribution system |
US7512964B2 (en) * | 2001-06-29 | 2009-03-31 | Cisco Technology | System and method for archiving multiple downloaded recordable media content |
US7831959B1 (en) * | 2005-03-24 | 2010-11-09 | Netapp, Inc. | Method and apparatus to manage configuration for multiple file server appliances |
US20130239211A1 (en) * | 2007-08-30 | 2013-09-12 | At&T Intellectual Property I, Lp | System for tracking media content transactions |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6526389B1 (en) * | 1999-04-20 | 2003-02-25 | Amdocs Software Systems Limited | Telecommunications system for generating a three-level customer behavior profile and for detecting deviation from the profile to identify fraud |
-
2007
- 2007-08-30 US US11/848,071 patent/US8037037B2/en not_active Expired - Fee Related
-
2011
- 2011-09-09 US US13/228,529 patent/US8447777B2/en active Active
-
2013
- 2013-04-23 US US13/868,212 patent/US9219743B2/en active Active
-
2015
- 2015-12-18 US US14/974,986 patent/US20160112448A1/en not_active Abandoned
Patent Citations (31)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6070244A (en) * | 1997-11-10 | 2000-05-30 | The Chase Manhattan Bank | Computer network security management system |
US6195541B1 (en) * | 1998-07-31 | 2001-02-27 | Avaya Technology Corp. | Interaction of a wireless telephone with a transaction unit |
US6668284B1 (en) * | 1998-11-04 | 2003-12-23 | Beckman Coulter, Inc. | Software messaging system |
US6405318B1 (en) * | 1999-03-12 | 2002-06-11 | Psionic Software, Inc. | Intrusion detection system |
US20050114711A1 (en) * | 1999-12-02 | 2005-05-26 | Lambertus Hesselink | Managed peer-to-peer applications, systems and methods for distributed data access and storage |
US7426750B2 (en) * | 2000-02-18 | 2008-09-16 | Verimatrix, Inc. | Network-based content distribution system |
US20060106717A1 (en) * | 2000-05-25 | 2006-05-18 | Randle William M | End to end check processing from capture to settlement with security and quality assurance |
US20040162893A1 (en) * | 2000-09-29 | 2004-08-19 | Andrew Brown | Computer card for storing bootable images and providing remote management functions |
US20040236688A1 (en) * | 2000-10-30 | 2004-11-25 | Bozeman William O. | Universal positive pay database method, system, and computer useable medium |
US20020169747A1 (en) * | 2001-05-10 | 2002-11-14 | Chapman Thomas F. | Systems and methods for notifying a consumer of changes made to a credit report |
US20030159070A1 (en) * | 2001-05-28 | 2003-08-21 | Yaron Mayer | System and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damages |
US20020198991A1 (en) * | 2001-06-21 | 2002-12-26 | International Business Machines Corporation | Intelligent caching and network management based on location and resource anticipation |
US7512964B2 (en) * | 2001-06-29 | 2009-03-31 | Cisco Technology | System and method for archiving multiple downloaded recordable media content |
US20030046441A1 (en) * | 2001-07-05 | 2003-03-06 | Rau Sadhana S. | Teamware repository of teamware workspaces |
US20020010715A1 (en) * | 2001-07-26 | 2002-01-24 | Garry Chinn | System and method for browsing using a limited display device |
US20030172368A1 (en) * | 2001-12-26 | 2003-09-11 | Elizabeth Alumbaugh | System and method for autonomously generating heterogeneous data source interoperability bridges based on semantic modeling derived from self adapting ontology |
US20040009778A1 (en) * | 2002-07-15 | 2004-01-15 | Hitachi, Ltd. | Control method for information network system, information network system and mobile communication terminal |
US20040054776A1 (en) * | 2002-09-16 | 2004-03-18 | Finisar Corporation | Network expert analysis process |
US20040128186A1 (en) * | 2002-09-17 | 2004-07-01 | Jodi Breslin | System and method for managing risks associated with outside service providers |
US20050154665A1 (en) * | 2002-11-22 | 2005-07-14 | Florida Bankers Association, Inc. | Fraud prevention system |
US20050278296A1 (en) * | 2004-06-08 | 2005-12-15 | Peter Bostwick | Method and system for creating, sustaining and using a transactional bill of materials (T-BOM ™) |
US20050276092A1 (en) * | 2004-06-14 | 2005-12-15 | Hansen Peter A | Virtual mass storage device for server management information |
US20060123010A1 (en) * | 2004-09-15 | 2006-06-08 | John Landry | System and method for managing data in a distributed computer system |
US7831959B1 (en) * | 2005-03-24 | 2010-11-09 | Netapp, Inc. | Method and apparatus to manage configuration for multiple file server appliances |
US20070106606A1 (en) * | 2005-10-24 | 2007-05-10 | The Boeing Company | Near Real Time Payment Card Processing with On-Line Authorization on a Vehicle |
US20070199047A1 (en) * | 2006-02-23 | 2007-08-23 | Rockwell Automation Technologies, Inc. | Audit trail in a programmable safety instrumented system via biometric signature(s) |
US7389913B2 (en) * | 2006-04-28 | 2008-06-24 | Ed Starrs | Method and apparatus for online check processing |
US20070261112A1 (en) * | 2006-05-08 | 2007-11-08 | Electro Guard Corp. | Network Security Device |
US20080021709A1 (en) * | 2006-07-24 | 2008-01-24 | Siemens Medical Solutions Usa, Inc. | Application to Worker Communication Interface |
US20080163307A1 (en) * | 2006-12-29 | 2008-07-03 | Coburn Matthew J | Digital content access |
US20130239211A1 (en) * | 2007-08-30 | 2013-09-12 | At&T Intellectual Property I, Lp | System for tracking media content transactions |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10462167B2 (en) * | 2017-01-03 | 2019-10-29 | Synamedia Limited | Using data science to aid in detection of unauthorized distribution |
US11171979B2 (en) | 2017-01-03 | 2021-11-09 | Synamedia Limited | Using data science to aid in detection of unauthorized distribution |
CN111031370A (en) * | 2019-12-12 | 2020-04-17 | 四川天邑康和通信股份有限公司 | Method for mutual communication of convergence gateway part and set-top box part |
Also Published As
Publication number | Publication date |
---|---|
US8037037B2 (en) | 2011-10-11 |
US20090063581A1 (en) | 2009-03-05 |
US8447777B2 (en) | 2013-05-21 |
US20130239211A1 (en) | 2013-09-12 |
US20120030764A1 (en) | 2012-02-02 |
US9219743B2 (en) | 2015-12-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9219743B2 (en) | System for tracking media content transactions | |
US10939177B2 (en) | System for presenting media content | |
US10326715B2 (en) | System and method for updating information in an instant messaging application | |
US9276941B2 (en) | Method and apparatus for accessing media | |
US8042054B2 (en) | System for managing media content | |
US10368118B2 (en) | System and apparatus for managing video content recordings | |
US20120311624A1 (en) | Generating, editing, and sharing movie quotes | |
US20130091558A1 (en) | Method and system for sharing multimedia contents between devices in cloud network | |
US9986304B2 (en) | System for managing a configuration of a media content processor | |
US9021542B2 (en) | Apparatus and method for providing media content | |
US8209719B2 (en) | System for presenting status information associated with a media content processor | |
US8537992B2 (en) | System and method for recording communication activities | |
US11564016B2 (en) | Internet enabled video media content stream | |
WO2014176896A1 (en) | System and method for updating information in an instant messaging application | |
CN106547769A (en) | A kind of DOI display packings and device | |
US20100180308A1 (en) | Method and apparatus for consuming content | |
US20090019480A1 (en) | System for remote access of media services | |
WO2019108538A1 (en) | Addressable image object | |
KR101445260B1 (en) | Device, server and method for providing contents seamlessly | |
US20180310067A1 (en) | Systems and Methods for Integrating a Set-Top Box with Internet Content | |
Jiang et al. | Multi-factor Trust Degree Evaluation Model for Web Service |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: ASHBOURNE TECHNOLOGIES, LLC, DELAWARE Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:AT&T INTELLECTUAL PROPERTY 1, L.P.;REEL/FRAME:045396/0247 Effective date: 20140610 |
|
AS | Assignment |
Owner name: OCEANICITY TECHNOLOGIES LLC, DELAWARE Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:ASHBOURNE TECHNOLOGIES, LLC;REEL/FRAME:046274/0551 Effective date: 20180613 Owner name: III HOLDINGS 2, LLC, DELAWARE Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:OCEANICITY TECHNOLOGIES LLC;REEL/FRAME:046274/0554 Effective date: 20180613 Owner name: III HOLDINGS 3, LLC, DELAWARE Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:III HOLDINGS 2, LLC;REEL/FRAME:046274/0603 Effective date: 20180614 |
|
AS | Assignment |
Owner name: SEAGATE TECHNOLOGY LLC, CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:III HOLDINGS 3, LLC;REEL/FRAME:048167/0679 Effective date: 20180619 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |