Patent application number | Description | Published |
20100150322 | Voice-to-Text Translation for Visual Voicemail - A system may include servers. The servers may include memories including a first database to store voicemail message information associated with a voicemail mailbox and a user device, and a second database to associate a plurality of user devices with a voice-to-text transcription service; and a receiver to receive a new voicemail message associated with the voicemail mailbox. The servers may also include a processor to query to the second database to determine whether to request a voice-to-text transcription of an audio file associated with the new voicemail message and to determine whether to notify the user device of the new voicemail message before or after receiving the voice-to-text transcription of the audio file. The servers may also include a transmitter to send a notification of the new voicemail message to the user device according to the determination of whether to notify the user device of the new voicemail message before or after receiving the voice-to-text transcription of the audio file. | 06-17-2010 |
20100158476 | Methods, Systems and Computer Program Products for Local DVR Scheduling Conflict Management - This disclosure details the implementation of methods, systems and computer program products for local DVR scheduling conflict management (hereinafter, “SCM”). SCM systems allow for automatic organization, prioritization, and conflict resolution for multiple scheduled recording specifications. Conflicting scheduled recordings may be re-organized based on single-stage and/or multi-stage conflict resolution procedures. Embodiments of SCM systems may also implement weighted conflict resolution, wherein user preferences and/or prioritizations may be assigned to scheduled recordings and considered in the re-organization of conflicting recordings. In one embodiment, a method is disclosed, comprising: receiving a new scheduled recording instruction comprising at least a new program identifier and a new time; comparing the new scheduled recording instruction to an existing recording schedule to determine if a recording conflict exists; performing a conflict resolution for an existing conflict to yield a new recording schedule; and storing the new recording schedule in a scheduling database. | 06-24-2010 |
20100162294 | Methods, Systems and Computer Program Products for Remote DVR Interface Provisioning - This disclosure details the implementation of methods, systems and computer program products for remote digital video recorder (DVR) interface provisioning (hereinafter, “DIP”). DIP systems allow for authentication, validation, and registration of users and/or user devices as well as management of identifiers associated with those users and devices. Through interaction with DIP systems, users may associate different devices with each other and/or with one or more underlying service systems and/or accounts to allow integrated use of multiple devices in association with those services. In one implementation, DIP systems may be employed to register one or more mobile and/or remote devices (e.g., mobile phones) with DVR systems to allow for remote manipulation of video recording schedules, content management, parental control management, and/or the like DVR features. In one embodiment, a method is disclosed, comprising: providing a provisioning interface for display to a user, the provisioning interface including an interface element configured to receive a mobile device identifier; receiving a mobile device identifier input to the provisioning interface; receiving a local media receiver device identifier; querying a service account based on the local media receiver device identifier; retrieving a service account activation code based on the query; and storing the mobile device identifier in association with the activation code in a database. | 06-24-2010 |
20120047539 | AUTOMATIC MOBILE IMAGE DIARY BACKUP AND DISPLAY - A method performed by a user device connected to a content server, via a public network, that includes sending, to a digital video recorder (DVR) server and via the public network, a request to display images on a display device associated with a local server; receiving, from the DVR server and via the public network, a notification to upload the images, the notification including an address for the content server; selecting a group of images stored on the user device; sending, to the content server and based on the address, the group of images; and sending, to the local server and via a local network, a notification to retrieve the group of images from the content server for display on the display device. | 02-23-2012 |
20120096121 | HOME NETWORK VIDEO PEER-TO-PEER FOR MOBILE DEVICES - A device receives, from a user device, a request for content from a home network, and sends a notification of the request for content to a home network device. The device receives, from the home network device, a selection list of particular content, provides, to the user device, the selection list, and receives, from the user device, a content selection from the selection list. The device sends, to the home network device, the content selection, and receives, from the home network device, an indication that content corresponding to the content selection has been uploaded to a content delivery network. The device sends, to the user device, instructions to retrieve the content from the content delivery network. | 04-19-2012 |
20120215437 | METHOD, SYSTEM, AND COMPUTER PROGRAM PRODUCT FOR PROVIDING LOCATION BASED SERVICES - Methods, systems, and computer program products for providing location based services are provided. Embodiments may include storing locations for a plurality of users of a telecommunication environment and contact lists of associated users for the plurality of users. Embodiments may also include providing the locations of the associated users for a first user based on a request from the first user. The request may further include providing locations for associated users who are located within an area of interest. The area of interest may be defined by a particular distance from the first user or by a point of interest of the first user. The locations of the users may be determined based on the locations of communication devices of the users including an identified receiving communication device for each user. | 08-23-2012 |
20130074168 | STREAMING VIDEO AUTHENTICATION - One or more devices transmit, to a user device, an application for secure mobile streaming, and receive, from the user device, a registration request for the application. The registration request includes a user ID and a unique device identifier (UDID) for the user device. The one or more devices initiate a validation procedure for the user ID or UDID. When the user ID or UDID is validated, the one or more devices generate a device-token for the user device. The device-token includes a hash value based on information in the registration request and an expiration date for the device-token. The one or more devices send the device-token to the user device via a private network. The device-token is required to permit the user device to receive a secure content stream via a public network. | 03-21-2013 |
20130104202 | SYSTEMS AND METHODS FOR AUTHORIZING THIRD-PARTY AUTHENTICATION TO A SERVICE - Systems and method for authorizing third-party authentication to a service are disclosed herein. As exemplary method includes an online service provider subsystem, which is configured to provide a service, 1) receiving a request from a user to use a third-party authentication service to authenticate the user to the service, 2) directing, in response to the request, the user to authenticate to the third-party authentication service, 3) receiving, from a third-party subsystem that provides the third-party authentication service, a third-party user identifier for the user, 4) requiring the user to verify an identity of the user, and 5) authorizing, based on the verified identity of the user, use of the third-party user identifier to authenticate the user to the service. Corresponding methods and systems are also disclosed. | 04-25-2013 |
20130108042 | MANAGING MEDIA CONTENT DECRYPTION KEYS IN ENCRYPTED MEDIA CONTENT DISTRIBUTION SYSTEMS AND METHODS | 05-02-2013 |
20130108245 | MEDIA CONTENT RECORDING, MANAGEMENT, AND DISTRIBUTION SYSTEMS AND METHODS | 05-02-2013 |
20130152221 | LIMITING CONCURRENT VIEWING SESSIONS ON MULTIPLE USER DEVICES - System devices include network interfaces to communicate with user devices associated with a user, memories for storing instructions to be executed by processors, and the processors. The processors are configured to execute the instructions to receive, from a first user device, among the user devices, a request for content; initiate an upload of the requested content to the first user device in response to the request; receive a request for a license key from the first user device in response to the initiation of the upload; determine whether a number of concurrent sessions with the user devices exceeds a maximum number; and send the license key to the first user device when the processors determine that the number of concurrent sessions does not exceed the maximum number. | 06-13-2013 |
20130191928 | ENFORCING CONTENT BLACKOUT - A system includes a network interface, a memory, and a processor. The network interface is configured to communicate, over a network, with a user device associated with a user. The memory is configured to store instructions to be executed by the processor. The processor is configured to execute the instructions to: receive, from the user device via the one or more network interfaces, a request for content; initiate an upload of the requested content to the user device in response to the request; receive a request for a license key from the user device in response to the initiation of the upload; determine whether the user device is outside a blackout region associated with the content; generate a license key when the one or more processors determine that the user device is outside the blackout region; and send the license key to the user device. | 07-25-2013 |
20130191929 | FEDERATED AUTHENTICATION - A system may receive, at a site, a first message for authentication from a browser hosted on a user device; send, from the site, a redirect universal resource locator of a partner system to the browser; receive a response from the partner system via the browser, the response including a second message indicating whether an authentication of a user of a first device, at the partner system, was successful; determine whether the authentication has been successful based on the second message; and register the first device when it is determined that the authentication has been successful based on the second message. | 07-25-2013 |
20130318191 | TIME-BASED DATA CACHING - A system is configured to receive, by a first server, a request, from a user device, for a first record stored by a cache associated with the first server, determine, a first timestamp associated with the first record, determine that the first record is invalid based on the first timestamp, and determine, based on determining that the first record is invalid, whether the first record is out of date with respect to a corresponding second record stored by a second server by comparing a second timestamp of the first record with a timestamp of the second record. The system is further configured to update the first record with information from the second record to form an updated first record when the first record is out of date, and to send the updated first record to the user device associated with the request. | 11-28-2013 |
20140013109 | SECURE DELIVERY OF TRUST CREDENTIALS - A system is configured to receive, by one or more servers, a request for a certificate from a user device. The request may include a first parameter , a second parameter , and a third parameter. The system is further configured to identify a key based on the first parameter, generate a fourth parameter based on the key and the third parameter, authenticate the user device based on the fourth parameter and the second parameter, generate the certificate based on authenticating the user device, store information associated with the certificate, and send the certificate to the user device. The user device may use the certificate to establish a session to interact with an application server. | 01-09-2014 |
20140019752 | ENCRYPTION-BASED SESSION ESTABLISHMENT - A first server is configured to receive a first token from a user device, determine whether the first token is valid, request the user device to provide a set of credentials to a second server, based on determining that the first token is invalid, and receive a first response from the user device. The first response may include information identifying whether the user device is authenticated to communicate with the first server. The first server is further configured to send the first response to a third server. The third server may generate a second response to indicate authentication of the user device to communicate with the first server. The first server is further configured to receive the second response from the third server, generate a second token, based on receiving the second response, and send the second token to the user device. | 01-16-2014 |
20140075188 | TRUSTED THIRD PARTY CLIENT AUTHENTICATION - A method includes receiving, at a video service provider system, a request for an online video session from a third party device with a security markup assertion language (SAML) token as an input, decrypting a SAML assertion in the SAML token with a private key associated with the video service provider system, validating the SAML assertion based on a third party public key associated with the third party STS, and retrieving a third party account user identifier and a device type. The method also includes identifying a link time based on the third party account user identifier, identifying a password change time (PCT) stamp associated with the service provider user account, and providing the online video session to the third party device in response to determining that the PCT stamp is not later than the link time. | 03-13-2014 |
20140101679 | SECURE TRANSFER OF CREDIT CARD INFORMATION - A method includes receiving, at a video service provider system, a security markup assertion language (SAML) token encrypted for a partner federated security token service (FSTS) device from a client device. The method includes submitting the SAML token to the partner FSTS device in exchange for a partner SAML token. The partner SAML token is encrypted for a partner account device. The method also includes receiving the partner SAML token, and sending the partner SAML token to the client device. The client device is configured to request an access token from the partner account device based on the partner SAML token and to submit an encrypted message including credit card information to the partner account device based on the access token. | 04-10-2014 |
20140165209 | DIGITAL CONTENT DELIVERY PLATFORM FOR MULTIPLE RETAILERS - A digital content distribution platform includes a content distribution device configured to store digital assets and associated metadata, encode and encrypt each of the digital assets, and publish the metadata associated with the assets to one or more catalog servers associated with multiple digital content retailers. The digital content distribution platform further includes a portal server configured to permit registration by the multiple digital content retailers to enable access to the stored digital assets by clients associated with the multiple digital content retailers. The digital content distribution platform also includes one or more license servers configured to engage in digital rights management (DRM) with multiple DRM servers associated with the multiple digital content retailers. | 06-12-2014 |
20140359648 | HISTORY RECORD AND PROXY RATING FOR MEDIA RECOMMENDATIONS - A view history of a user viewing a program is generated. The view history record is used to generate a proxy rating of the program when the user does not assign a rating to the program. The proxy rating is used by a recommendation engine to generate recommendations. | 12-04-2014 |
20150067072 | MAINTAINING AND UPDATING NOTIFICATION REGISTRATION INFORMATION - A first server may receive, from a user device, a first instruction including a token and a request to register the user device to receive a message associated with a particular application; update registration information to indicate that the user device is to receive the message based on receiving the first instruction; and provide a second instruction to a second server to cause the second server to provide the message to the user device on behalf of the first server. The second instruction may include information regarding the message, the token, and an instruction to provide the message to the user device associated with the token. The first server may receive, from the second server, a report indicating that the message was not delivered to the user device; and update the registration information to indicate that the user device is no longer to receive the message based on receiving the report. | 03-05-2015 |
20150067328 | AUTHENTICATING A USER DEVICE TO ACCESS SERVICES BASED ON A DEVICE ID - A first device may receive a first session token from a second device; determine that the first session token is expired or invalid; provide a security input to the second device to cause the second device to generate a first hash value of the security input using a key corresponding to a key identifier (ID); receive the key ID and the first hash value from the second device; generate a second hash value using the key corresponding to the key ID; determine that the first hash value matches the second hash value; and establish a session with the second device based on determining that the first hash value matches the second hash value. | 03-05-2015 |