Patent application number | Description | Published |
20100211439 | Method and System for Predicting Audience Viewing Behavior - The present invention is directed to a method and system for predicting the behavior of an audience based on the biologically based responses of the audience to a presentation that provides a sensory stimulating experience and determining a measure of the level and pattern of engagement of that audience to the presentation. In particular, the invention is directed to a method and system for predicting whether an audience is likely to view a presentation in its entirety. In addition, the present invention may be used to determine the point at which an audience is likely to change their attention to an alternative sensory stimulating experience including fast forwarding through recorded content, changing the channel or leaving the room when viewing live content, or otherwise redirecting their engagement from the sensory stimulating experience. | 08-19-2010 |
20130046577 | Method and System for Determining Audience Response to a Sensory Stimulus - The present invention is directed to a method and system for measuring the biologically based responses of an audience to a presentation that provides sensory stimulating experience and determining a measure of the level and pattern of engagement of that audience to the presentation. In particular, the invention is directed to a method and system for measuring one or more biologically based responses of one or more persons being exposed to the presentation in order to determine the moment-to-moment pattern and overall level of engagement. Further, the invention can be used to determine whether the presentation or the content in the presentation is more effective in a population relative to other presentations (or content) and other populations and to help identify elements of the presentation that contribute to the high level of engagement and the effectiveness and success of the presentation for that population. | 02-21-2013 |
20130226464 | DATA COLLECTION SYSTEM FOR AGGREGATING BIOLOGICALLY BASED MEASURES IN ASYNCHRONOUS GEOGRAPHICALLY DISTRIBUTED PUBLIC ENVIRONMENTS - The present invention relates to biologically and behaviorally based systems and methods for measuring audience response to a target stimulus. The systems and methods are deployable in multiple locations and may display stimuli based on location, target demographics, and combinations thereof. | 08-29-2013 |
20130280682 | System and Method For Gathering And Analyzing Biometric User Feedback For Use In Social Media And Advertising Applications - A system and method for measuring biologically and behaviorally based responses to social media, locations, or experiences and providing instant and continuous feedback in response thereto. The system and method of the invention is capable of monitoring stress levels and well-being and may be implemented using a cloud-based infrastructure for remote monitoring. | 10-24-2013 |
20130318546 | Method and System for Gathering and Computing an Audience's Neurologically-Based Reactions in a Distributed Framework Involving Remote Storage and Computing - Systems and methods for measuring biologically and behaviorally based responses to content in targeted demographics and locations by way of remote monitoring. Stimuli may be based on location, target demographics, and combinations thereof. | 11-28-2013 |
Patent application number | Description | Published |
20090248874 | METHOD AND APPARATUS FOR DISTRIBUTING REQUESTS AMONG A PLURALITY OF RESOURCES - The invention relates to a method and apparatus for distributing a request to one of a plurality of resources. A request is mapped to a location in mathematical mapping space. Each of the plurality of resources is mapped to a respective location or locations in the mathematical mapping space. The request is allocated to one of the resources based on a mathematical relationship between the request location and the resource location in the mathematical mapping space. An apparatus for distributing a request to one of a plurality of resources includes the plurality of resources and an input receiving a resource request. A mapper in communication with the input maps the request to a request location in a mathematical mapping space and maps each of the plurality of resources to at least one resource locations in the mathematical mapping space. A distributor distributes the request to one of the plurality of resources in response to a mathematical relationship between the locations of the request and resources in the mathematical mapping space. The invention also relates to a method and apparatus for requesting data from one of a plurality of servers. An virtual network of nodes is generated in response to a data request. A first node on the virtual network of nodes is chosen randomly, and a path generated from the first node to the root on the virtual network. At least one node on the path is mapped to a respective one of the plurality of servers and data is requested from a server. The node may be mapped to the server using the method and apparatus for distributing a request to one of a plurality of resources of the present invention. | 10-01-2009 |
20100217801 | Network performance monitoring in a content delivery system - A method for Internet content delivery in a content delivery network established at network locations, the content delivery network comprising a plurality of content servers for serving content resources. The plurality of content servers includes a plurality of subsets of content servers, each subject being located at one of a plurality of Internet data centers. For each Internet Protocol (IP) address block from which requests for content resources are expected to be received, the method generates a candidate list of Internet data centers to be used to service the requests for content resources. For the IP address block, the method selects at least one of the Internet data centers from the candidate list to be used to service the requests for content resources. The selected Internet data center for the IP address block is written into a network map. The selecting step is carried out concurrently for each IP address block from which requests for content resources are expected to be received such that the network map comprises the selected Internet data center for each IP address block. The network map is then provided to a domain name service (DNS) associated with the content delivery network. In response to a DNS query received at the domain name service associated with the content delivery network, the network map is used to identify one of the Internet data centers from the candidate list to be used to service a request for a content resource. | 08-26-2010 |
20100250742 | Global load balancing across mirrored data centers - An intelligent traffic redirection system that performs global load balancing can be used in any situation where an end-user requires access to a replicated resource. The method directs end-users to the appropriate replica so that the route to the replica is good from a network standpoint and the replica is not overloaded. The technique preferably uses a Domain Name Service (DNS) to provide IP addresses for the appropriate replica. The most common use is to direct traffic to a mirrored web site. | 09-30-2010 |
20120124214 | Method and Apparatus for Distributing Requests Among a Plurality of Resources - The invention relates to an apparatus for responding to data requests made by a client. The apparatus includes an input receiving a first data request that includes a sequence of nodes corresponding to a sequence of servers. The apparatus also includes decision logic determining whether the data specified in the data request is available on a selected server, and if the data is not available determining a next node from the sequence of nodes. The apparatus also includes a mapper mapping a server to the next node, and an output requesting the data by transmitting a second data request to the server mapped to the next node. | 05-17-2012 |
20130179567 | Network performance monitoring in a content delivery system - A method for Internet delivery in a delivery network established at network locations, the delivery network comprising a plurality of content servers for serving resources. The servers include a plurality of subsets, each subset being located at one of a plurality of Internet data centers. For each Internet Protocol (IP) address block from which requests for content resources are expected to be received, the method generates a candidate list of data centers to be used to service the requests. For the IP address block, the method selects at least one of the data centers from the candidate list. The selected Internet data center for the IP address block is written into a network map. In response to a DNS query, the map is used to identify one of the Internet data centers from the candidate list to be used to service a request for a content resource. | 07-11-2013 |
Patent application number | Description | Published |
20080212450 | OPTICAL STORAGE MEDIUM HAVING DISTORTION REGIONS, AND A METHOD OF MODIFYING AN OPTICAL STORAGE MEDIUM TO INCLUDE DISTORTION REGIONS - Theft, distribution, and piracy of digital content on optical media (software, video, audio, e-books, any content of any kind that is digitally stored and distributed) is often accomplished by copying it directly to another disc using commonly available copy tools and recordable optical media, or the copying of media to another mass manufactured disc. Methods which cause—the copy process to become lengthy and inconvenient, or which produce copies that are significantly measurably different from the original and therefore be recognizable as copies, deter or prevent an unauthorized individual from making copies. This is accomplished by modifying the optical path of an optical medium to include regions of selective distortion. This, in turn, modifies the read operation of the data in the regions, which can be used to identify and authenticate the medium. | 09-04-2008 |
20080243696 | Non-repudiation for digital content delivery - Systems and methods for managing digital rights are provided. Remote authentication of a user's identity and the user's right to receive digital content may be performed in an incontrovertible manner such that the user may not repudiate the transaction. User authentication may be performed in a manner that safeguards the user's privacy and may be distributed across multiple communication channels or systems to provide additional assurance that remote users are in fact who they claim to be. | 10-02-2008 |
20100122349 | Systems and methods for preventing unauthorized use of digital content - Theft, distribution, and piracy of digital content (software, video, audio, e-books, any content of any kind that is digitally stored and distributed) is generally accomplished by copying it, if possible, or, if it is protected from being copied in any fashion, such piracy is based upon a number of reverse engineering techniques. Aside from the straightforward copying of unprotected content, all of these other methods require first an understanding of the protective mechanism(s) guarding the content, and finally an unauthorized modification of that protection in order to disable or subvert it. Methods which prevent a skilled individual from using reverse engineering tools and techniques to attain that level of understanding and/or prevent anyone from performing such modifications can offer significant advantages to content creators who wish to protect their products. | 05-13-2010 |
20100125910 | Systems and methods for media authentication - A method and system for authenticating a digital optical medium, such as a CD-ROM, determine whether the medium is an unauthorized copy, or the original. The original media is created, or altered, so as to contain anomalous locations from which the transfer of data is accomplished at different rates than a standard digital copy would exhibit. One implementation of the process involves timing analysis of the differences in data transfer rates, and does not necessarily require the retrying of data reads, nor does the process require the media to exhibit fatal errors, as in conventional approaches. The process can be employed in systems that control access to unauthorized copies, or may be used for other informative purposes. Theft, distribution, and piracy of digital content on optical media, such as computer software (also games, video, audio, e-book content), is often accomplished by copying it directly to another disc using commonly available copy tools and recordable optical media, or the replication of media to another mass manufactured disc. The present invention, which helps to irrefutably identify a unit of optical media as the original, and can correspondingly identify any copy made by any currently available means as such a copy, may prevent an unauthorized individual from making use of any unauthorized copies. This offers significant advantages to content creators who wish to protect their products. | 05-20-2010 |
20100165812 | SYSTEMS AND METHODS FOR MEDIA AUTHENTICATION - A method and system for authenticating a digital optical medium, such as a CD-ROM, determine whether the medium is an unauthorized copy, or the original. The original media is created, or altered, so as to contain anomalous locations from which the transfer of data is accomplished at different rates than a standard digital copy would exhibit. One implementation of the process involves timing analysis of the differences in data transfer rates. Another implementation involves the determination of digital signatures during multiple read operations performed on a data segment. The process can be employed in systems that control access to unauthorized copies, or may be used for other informative purposes. Theft, distribution, and piracy of digital content on optical media, such as computer software (also games, video, audio, e-book content), is often accomplished by copying it directly to another disc using commonly available copy tools and recordable optical media, or the replication of media to another mass manufactured disc. The present invention, which helps to irrefutably identify a unit of optical media as the original, and can correspondingly identify any copy made by any currently available means as such a copy, may prevent an unauthorized individual from making use of any unauthorized copies. This offers significant advantages to content creators who wish to protect their products. | 07-01-2010 |
20100306552 | SYSTEMS AND METHODS FOR PREVENTING UNAUTHORIZED USE OF DIGITAL CONTENT - Theft, distribution, and piracy of digital content (software, video, audio, e-books, any content of any kind that is digitally stored and distributed) is generally accomplished by copying it, if possible, or, if it is protected from being copied in any fashion, such piracy is based upon a number of reverse engineering techniques. Aside from the straightforward copying of unprotected content, all of these other methods require first an understanding of the protective mechanism(s) guarding the content, and finally an unauthorized modification of that protection in order to disable or subvert it. Methods that prevent a skilled individual from using reverse engineering tools and techniques to attain that level of understanding and/or prevent anyone from performing such modifications can offer significant advantages to content creators who wish to protect their products. | 12-02-2010 |
20120185948 | SYSTEMS AND METHODS FOR THE PREVENTION OF UNAUTHORIZED USE AND MANIPULATION OF DIGITAL CONTENT - A number of systems and methods, alone, or in combination, achieve various levels of protection against unauthorized modification and distribution of digital content. This encompasses at least unauthorized study, modification, monitoring, reconstruction, and any other means for subversion from the originally intended purpose and license model of the digital content. The invention combines a number of techniques that in whole, or in part, serve to protect such content from unauthorized modification, reconstructive engineering, or monitoring by third parties. This is accomplished by means of methods which protect against subversion by specific tools operating on specific platforms as well as general tools operating on general platforms. Specific time domain attacks are identified, code modification can be identified and reversed, and virtual and emulated systems are identified. In addition, identification of in-circuit emulator tools (both software and hardware), debuggers, and security threats to running programs can be achieved. | 07-19-2012 |