Patent application number | Description | Published |
20080212949 | Advanced television system - A digital television recording method comprising: broadcasting a television program associated with a broadcaster set of parameters enabling access to a first set of predetermined portions of the program; operating an agent for determining whether to record the program and for associating with the program, upon recording of the program, an agent set of parameters enabling access to a second set of predetermined portions of the program; storing the program together with the broadcaster set of parameters and the agent set of parameters to generate an addressable program; retrieving at least a portion of the addressable program; displaying the at least a portion of the addressable program to a user; receiving from the user a user set of parameters enabling access to a third set of predetermined portions of the addressable program; editing the addressable program to include the user set of parameters enabling access to the third set of predetermined portions of the addressable program thereby generating an edited addressable program; and storing the edited addressable program. | 09-04-2008 |
20090199231 | Time shifted interactive television - Methods and apparatus for managing, implementing and using interactive applications and content that are digitally recorded and viewed in real-time and/or a time-shifted moded are provided. The interactive applications may be associated with television programs or may be unrelated thereto, and may be transmitted together with television programs or separately therefrom. Interactive applications that are employed in a time-shifted mode can be matched to current conditions and interactive content may be updated to include current data. Users may view and manipulate highlights of television programs and receive alerts of occurrence of real-time events during viewing of recorded material. Additional manipulations of interactive applications and content are also enabled. Related apparatus and methods are also described. | 08-06-2009 |
20090234743 | SYSTEM FOR MULTIMEDIA VIEWING BASED ON ENTITLEMENTS - An advertising control method is described. The method includes receiving an advertisement identification message (AIM) ( | 09-17-2009 |
20120254954 | SYSTEM FOR MULTIMEDIA VIEWING BASED ON ENTITLEMENTS - An advertising control method is described. The method includes receiving an advertisement identification message (AIM) ( | 10-04-2012 |
20130247109 | Advanced Television System - A digital television recording method comprising: broadcasting a television program associated with a broadcaster set of parameters enabling access to a first set of predetermined portions of the program; operating an agent for determining whether to record the program and for associating with the program, upon recording of the program, an agent set of parameters enabling access to a second set of predetermined portions of the program; storing the program together with the broadcaster set of parameters and the agent set of parameters to generate an addressable program; retrieving at least a portion of the addressable program; displaying the at least a portion of the addressable program to a user; receiving from the user a user set of parameters enabling access to a third set of predetermined portions of the addressable program; editing the addressable program to include the user set of parameters enabling access to the third set of predetermined portions of the addressable program thereby generating an edited addressable program; and storing the edited addressable program. | 09-19-2013 |
Patent application number | Description | Published |
20120196571 | SYSTEM AND METHOD FOR REMOTELY-INITIATED AUDIO COMMUNICATION - Mobile devices typically have some form of audio capabilities designed to be operated by the device's user, for example to place phone calls; however, if a device is misplaced or stolen, the user may wish to operate those audio capabilities remotely. Techniques are provided for determining when an audio transmission should be established between a device and one or more clients, and sending a command to initiate the audio transmission. The determination may be based on receiving a request from a client, detecting at a server that the device is lost or stolen, or detecting at the device that the device is missing. The audio transmission may be established without user intervention at the device or in response to user action at the portable electronic device. Device settings such as audio settings at the device may be overridden in connection with the audio transmission. | 08-02-2012 |
20120214451 | Remote Application Installation and Control for a Mobile Device - In many cases, it is desirable to remotely install a software application on a mobile device that performs a function without requiring user intervention on the device, such as in the case where a device is lost or stolen. In one embodiment, a method implemented on the mobile device after installation of the software includes: determining an identifier for a computing device associated with the user; performing a function of the mobile device to obtain information regarding the mobile device; and sending the information for delivery to the computing device using the identifier. In one embodiment, software can be remotely installed on a device that, when installed, locates the device and transmits the location to an email address associated with the device so that a user can recover the device if it is lost or stolen. | 08-23-2012 |
20120216292 | User Account Creation Involving a Mobile Device - Mobile devices may often communicate with network (“cloud”) services that require an account. Because it may be undesirable to require user interaction when creating an account, it may be desirable to create an account associating a mobile device to a network service without requiring a user to explicitly enter authentication information, such as a username and password. In an embodiment, data corresponding to a mobile device is obtained to generate authentication information which is then sent to messaging address of a user. In another embodiment, in response to an event, a mobile device obtains an identifier for a user, sends the identifier to a server, where the server transmits one set of authentication information to a messaging address associated with the user and another set of authentication information to the device. | 08-23-2012 |
20130326477 | EXPRESSING INTENT TO CONTROL BEHAVIOR OF APPLICATION COMPONENTS - Detection, identification, and control of application behavior dealing with malware, security risks, data privacy, or resource usage can be difficult in an era of complex, composite software applications composed of multiple components. Software applications are analyzed to determine their components and to identify the behaviors associated with each of the components. Components can also be analyzed with respect to similarity of previously known components. Behaviors can include use of personal identifying information or device information, or any actions that can be taken by applications on the device, including user interface displays, notifications, network communications, and file reading or writing actions. Policies to control or restrict the behavior of applications and their components may be defined and applied. In one embodiment this can include the identification of advertising networks and defining policies to permit various opt-out actions for these advertising networks. | 12-05-2013 |
20140338006 | METHOD FOR DETECTING A SECURITY EVENT ON A PORTABLE ELECTRONIC DEVICE AND ESTABLISHING AUDIO TRANSMISSION WITH A CLIENT COMPUTER - Mobile devices typically have some form of audio capabilities designed to be operated by the device's user, for example to place phone calls; however, if a device is misplaced or stolen, the user may wish to operate those audio capabilities remotely. Methods are provided for detecting that a security event has occurred on a portable electronic device and then establishing an audio transmission between the device and one or more clients, and in some embodiments, sending a command to initiate the audio transmission. The detection of a security event may be based on, for example, detecting that the device has been turned on, detecting movement of the device, detecting that an incorrect password has been entered, the device camera has been used, contacts have been added or deleted, the SIM card as been removed or replaced, application programs have been installed or uninstalled from the device, or uncharacteristic behavior has been detected. | 11-13-2014 |
20150087270 | PROVIDING WEB SERVICE FOR NEW USER ACCOUNT AFTER INSTALLATION OF APPLICATION ON MOBILE DEVICE - Mobile devices often communicate with network services that require an account. Because it may be undesirable to require user interaction when creating an account, it may be desirable to automatically create an account associating a mobile device to a network service after a new application is installed on the mobile device. In an embodiment, a new application is remotely installed on a mobile device. After the installation, the device monitors itself for an occurrence of an event. In response to detecting the occurrence, the device launches the new application. After the launch, the new application automatically obtains data from the mobile device, and then sends the data to a server that automatically creates an account for the user. The server also provides a service associated with the account. | 03-26-2015 |