H04N7/16

DATA PROCESSING FOR INTERNET OF THINGS (IOT) DEVICES BASED ON RECORDED USER BEHAVIOR
20220394033 · 2022-12-08 ·

A user device is configured to receive a request to connect an Internet of Things (IoT) device to the user device. In response, the user device connects to the IoT device. The user device detects that the user device performed a first transaction related to the IoT device and records the first data transaction as a behavior. Based on the recorded behavior, the user device determines a second data transaction that can be performed relating to the IoT device and a schedule to perform the second data transaction. The user device performs the second data transaction according to the schedule after obtaining approval.

IDENTIFICATION OF INVALID ADVERTISING TRAFFIC
20220385692 · 2022-12-01 ·

Systems and techniques for detecting advertising fraudulent traffic, or invalid traffic, by correlating advertising traffic with cyber network defense events are described. For example, described techniques include querying cyber network traffic events, querying the metadata returned by the tag script placed in the displayed advertisement, and correlating times, internet protocol (IP) addresses, publisher domains, and referrer domains with domains and IP addresses flagged by network cyber security events.

Electronic apparatus and control method thereof

An electronic apparatus includes a communication interface, and a processor configured to encrypt data in each of a plurality of sections of voice data, the voice data corresponding to a first user voice signal, and control the communication interface to transmit the encrypted data to a server. The processor is further configured to obtain an authentication key based on data in a first section of the plurality of sections, encrypted data in the first section having been transmitted to the server, and encrypt data in a second section to be transmitted by using the authentication key.

Method and system for providing non-real-time content distribution services

A system and method of operating an over-the-air broadcast television system having spectrum capacity that has a first portion for linear broadcasting content in real time and a second portion corresponding to a dormant capacity. A content distribution network system receives digital content from a content storage system. A dormant capacity estimator estimates dormant capacity of the spectrum capacity. An intermediate storage device communicates a registration request signal to the content distribution network system using a reverse link. The content distribution network system communicates a registration acknowledgement signal to the intermediate storage device. The content distribution network system communicates the digital content to the intermediate storage device through the over-the-air broadcast television network system. The intermediate storage device stories the digital content therein. The content distribution network system communicates the digital content to a user device through a local link after storing the digital content.

Methods and systems configured to manage video transcoder latencies
11509946 · 2022-11-22 · ·

Systems and methods configured to detect and manage video transcoder latencies are described. A manifest is received and is used to request video segments included in a manifest playlist. A transcoder having an input and output is used to transcode video segments. A delta time for a first SCTE-35 marker between the transcoder input and the transcoder output is determined, where the delta time corresponds to a transcoder latency. A determination is made as to whether a corrective action needs to be taken with respect to the latency, and such corrective action is taken as needed. The corrective action may include a transcoder reset. The manifest may be a text file and may be in the form of an HLS or DASH manifest. Additionally, streaming latencies may be reduced by switching content distribution systems, increasing the number of edge systems distributing content to clients, and/or by increasing video cache memory.

SYSTEMS AND METHODS FOR PROVIDING SECURITY AND TAMPER DETECTION IN I/O SYSTEMS
20230057860 · 2023-02-23 ·

A network adapter within an industrial input/output (I/O) system includes one or more processers. The one or more processors are configured to: receive a first combination; determine whether the first combination matches a predefined lock combination; upon determining that the first combination matches the predefined lock combination, start a lock process; receive a second combination; determine whether the second combination matches a predefined lock key; and upon determining that the second combination matches the predefined lock key, lock the adapter.

Movie advertising playback systems and methods

An ad in a movie can be a static ad having a position in the movie that cannot be moved, or a dynamic ad having a position in the movie that can be changed. When a viewer wishes to skip a portion of the movie containing the ad, the playback system determines whether the ad is static or dynamic. If the ad is static, only the portion of the movie preceding the static ad can be skipped; the ad is unskippable. This technique is referred to as “bounceback” since the end of the skip bounces back to the start of the static ad. If the ad is dynamic, it is moved to after the end of the skip. This technique is referred to as “slip-ad” since the ad slips to later in the movie. When a movie has multiple ads, some can be static and some can be dynamic.

Event-based content distribution
11503355 · 2022-11-15 · ·

Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for distributing content are disclosed. In one aspect, a method includes storing, in a data structure, data specifying a future live event. An opportunity to provide the specified content to a user at a user device is identified. It is determined that (i) a time of the opportunity is between a start time and an end time for the live event, (ii) that a user device is located in a same geographic region as the live event based on geographical data provided by the user device, and (iii) the user is interested in the live event based on attributes of the user matching attributes of other users that were identified as interested in the live event (e.g., based on evaluation of online search data). The content is provided for display at the user device.

METHODS AND APPARATUS FOR MONITORING THE INSERTION OF LOCAL MEDIA INTO A PROGRAM STREAM
20230037853 · 2023-02-09 ·

Methods and apparatus for monitoring locally inserted media are disclosed. A disclosed apparatus includes instructions to detect, at a media device at an end user location, a frequency of a watermark that was spliced into a primary media stream received at the media device after the primary media stream was received at the end user location, associate identifying tags with segments of the primary media stream that were spliced, in response to the detection of the watermark, determine an advertisement associated with the segments of the primary media based on the identifying tags, present the primary media at a first time and the advertisement at second times, record a log including first identifying information including an identity of the content of the primary media and second identifying information including a change in the frequency of the watermark corresponding to the advertisement; and transmit the log to a data collection facility.

Method and apparatus for distributed emulation of behavior of a malicious domain
11496513 · 2022-11-08 · ·

A method and apparatus that provide a malicious domain emulator in a distributed cloud computing network are described. A malicious node emulator is executed as a third-party code in a compute server of the cloud computing platform to enable emulation of behavior of a malicious node. The malicious node emulator receives requests from one or multiple network devices addressed to the malicious domain and automatically emulates the behavior of the malicious domain to respond to these requests. The malicious node emulator logs information related to the requests and the network devices transmitting the requests.