Patent application number | Description | Published |
20090327894 | Systems and methods for remote control of interactive video - The present invention describes a system and method for controlling interactive video, including a remote control device allowing the user to interact with the video. The method allows bringing the “lean-forward” hypervideo experience to a “lay-back” environment such as the TV screen. The method also allows for the creation of a single system that combines both the social aspects of the “lay-back” and the “lean-forward experience” into a new type of rich media viewing experience. | 12-31-2009 |
20100005488 | Contextual Advertising - A contextual advertising system and method receives video data and multiple advertisements associated with the video data. The system and method identify object content in the received video data and generates a video signal representing the video data. The video signal is communicated to a display device which displays a video image. User interaction with the displayed video image is monitored by the system and method. An advertisement is selected from the multiple received advertisements for display to the user. The advertisement is selected based on the user interaction with the displayed video image and the identified object content in the video data. | 01-07-2010 |
20100008643 | Methods and Systems for Interacting with Viewers of Video Content - A viewer interaction system and method receives video data from a video source and identifies object content in the received video data. A video signal is generated that represents the video data. That video signal is communicated to a display device which displays a video image representative of the video signal. The system and method monitor user interaction with the displayed video image and selects an interactive activity based on the user's interaction with the displayed video image and the identified object content in the received video data. | 01-14-2010 |
20100172402 | Content Distribution Systems and Methods - A content distribution system and method receives content from a content source and decodes the received content. The system and method identifies at least one undesired virtual channel associated with the received content and removes content associated with the undesired virtual channel. The remaining content is then consolidated into a consolidated frequency range, encoded, and distributed within a distribution environment. | 07-08-2010 |
20100172634 | Content Distribution Systems and Methods - A content distribution system and method receives content from a content source and encodes the received content to generate encoded content. The encoded content is modulated to generate modulated content. A frequency is selected for distributing the modulated content. A determination is made regarding whether the selected frequency is available for distributing the modulated content. If the selected frequency is not available, alternate frequencies are selected until an available frequency is identified. If the selected frequency is available, the modulated content is then distributed using the selected frequency. Existing display devices equipped with appropriate tuners do not need any additional hardware or software to receive such content. | 07-08-2010 |
20100175101 | Content Distribution Systems and Methods - A content distribution system and method receives data from a data source and identifies at least one unused channel in the received data. The unused channel is filtered and identified as an available content transmission channel. Content is then received from a content source and encoded to generate encoded content. The encoded content is modulated to generate modulated content, which is distributed within a distribution environment using the available content transmission channel. | 07-08-2010 |
20110093958 | Secure Data Storage Apparatus and Method - More and more personal or confidential information is stored in storage devices such as but not limited to, laptops, cell phones or USB keys, which are mobile per essence. Due to their mobility, such devices tend to be left unattended or even be lost, compromising the security of the data. This invention is a method to prevent access to the data on a mobile storage device when the intended recipient or user is not in closed range. The invention relies on the use of wireless communication protocol such as but not limited to RF, Bluetooth or Wi-fi to pair a security device with the storage device to enable its functionality. When the security device is not in communication range of the storage device, the data is made inaccessible. A data storage device may include a wireless communication interface used to secure the data, wherein the data storage is partitioned, with each partition having a different security profile. | 04-21-2011 |