Patent application number | Description | Published |
20100169475 | SYSTEM AND METHOD FOR MANAGING A BROADBAND NETWORK - A process for managing usage on a broadband network, said process comprising: (a) monitoring a subscriber's broadband usage; (b) determining if said usage rises to a level indicative of an event; (c) determining if said event is consistent with heavy usage or with a security incident; (d) if said event is consistent with heavy usage, offering said subscriber at least one of a plan for an upgraded subscription, or an incentive to concentrate usage in nonpeak time; and (e) if said event is consistent with a security incident, exercising security measures to minimize unintended usage. | 07-01-2010 |
20120321278 | NETWORK RECORDER BUFFER - A network digital video recording (nDVR) system may take into account the capabilities of a requesting user's local DVR when managing network recordings. The user's local DVR may include a temporary buffer that is normally used to record what the DVR is tuned to, and may be used for local trickplay functionality such as pausing live television. The nDVR features described herein may track the usage of the user's temporary DVR buffer, and use that in determining what to stream in response to a user's playback request. The nDVR system can also determine if the user's local DVR has an unused tuner at a time of a program recording, and can instruct the user's local DVR to also tune to the program. | 12-20-2012 |
20130018632 | Monitoring and Using Telemetry DataAANM Field; BrianAACI EvergreenAAST COAACO USAAGP Field; Brian Evergreen CO USAANM Van Doorn; JanAACI Castle RockAAST COAACO USAAGP Van Doorn; Jan Castle Rock CO USAANM Kiok; JosephAACI West ChesterAAST PAAACO USAAGP Kiok; Joseph West Chester PA USAANM Groustra; DanielAACI LittletonAAST COAACO USAAGP Groustra; Daniel Littleton CO USAANM Torluemke; MarkAACI CentennialAAST COAACO USAAGP Torluemke; Mark Centennial CO USAANM Hall; JimAACI CentennialAAST COAACO USAAGP Hall; Jim Centennial CO USAANM Leddy; JohnAACI Bryn MawrAAST PAAACO USAAGP Leddy; John Bryn Mawr PA US - Aspects of the disclosure relate to monitoring and using telemetry information in various ways. For example, a system that monitors telemetry information may include a user that gathers telemetry information of a device and transmits the information to a monitored room. A manager may join a monitored room and monitor the monitored room for particular types of telemetry information. In one example, a manager may determine whether a downstream device is experiencing a network problem, such as a low bitrate. A manager may also transmit commands to the player via the monitored room, which causes the downstream device to operate in accordance with the transmitted command. In one example, a manager may transmit a command that causes a player to decode a particular service. | 01-17-2013 |
20130046848 | Multicasting Content - Aspects of the disclosure relate to multicasting content throughout a distribution network. For example, a content server may generate content fragment packets and attribute packets, and transmit the content fragment packets and attribute packets via a multicast transmission to deliver content to one or more user devices. The multicast transmission may conform to a particular protocol suitable for multicasting content fragments. | 02-21-2013 |
20130173817 | Transmission of Content Fragments - Some aspects of the disclosure relate to transmitting content over a network. For example, a device may determine that it is missing a content fragment from its cache, and may send a request for the content fragment. A network device may be configured to respond to such requests by transmitting the content fragment. In some instances, this may allow receiving devices to acquire the missing content fragment without the need to transmit a request for content. | 07-04-2013 |
20130227293 | Method For Watermarking Content - The disclosure relates to processing content with watermarks to generate watermarked versions. In some aspects, each version may be different. Groups of fragments may be combined to generate a unique stream by pulling fragments from two or more of the groups of fragments. Further, fragmenting may be performed before watermarking, and fragments may be pulled and watermarked upon request. | 08-29-2013 |
20130239145 | FRAGMENTED CONTENT - An apparatus, method, system and computer-readable medium are provided for generating one or more segments associated with content. The segments may include fragments that may correspond to portions of the content. The segments and/or the fragments may be included in a playlist, and may be based at least in part on a user selection. | 09-12-2013 |
20140281533 | Systems And Methods For Providing Secure Services - Systems and methods for providing one or more secure services are disclosed. One method can comprise authenticating and/or authorizing a user device to receive a security token. A request for information can be processed using the security token to facilitate the secure provision of services to the user device. | 09-18-2014 |
20140330943 | Logical Address Configuration And Management - Methods and systems for configuring a network are disclosed. An example method can comprise receiving a request from a first device to connect to a first network. An example method can also comprise determining a first logical address. The first logical address can comprise one or more bits configured to identify the first device on the first network and specify configuration information for the first device. An example method can further comprise providing the first logical address to the first device. | 11-06-2014 |
20150026769 | System And Method For Managing A Broadband Network - A process for managing usage on a broadband network, said process comprising: (a) monitoring a subscriber's broadband usage; (b) determining if said usage rises to a level indicative of an event; (c) determining if said event is consistent with heavy usage or with a security incident; (d) if said event is consistent with heavy usage, offering said subscriber at least one of a plan for an upgraded subscription, or an incentive to concentrate usage in nonpeak time; and (e) if said event is consistent with a security incident, exercising security measures to minimize unintended usage. | 01-22-2015 |