Patent classifications
H04N21/4532
Systems and methods for sorting favorite content sources
Systems and methods for sorting favorite content sources are provided. A list of favorite content sources arranged in a first order is stored. The favorite content sources in the list are accessed according to the order of the favorite content sources in the list. At a given time, a user request to change a currently accessed content source to one of the favorite content sources in the list is received. In response to receiving the user request, an attribute of content presented on the currently accessed content source at the given time is identified. The favorite content sources in the list are rearranged into a second order based on the identified attribute. The favorite content sources in the list arc accessed according to the second order in response to receiving the user request.
Methods and systems for providing relevant season series recording functionality
Systems and methods are provided herein for scheduling a season recording. A series is provided to a user device, the series having a plurality of sequential seasons, and each season having a plurality of episodes. A request for recording the series is received from the user. In response, a last episode of the series watched by the user is identified. A relevant season of the plurality of seasons is then determined, such that the relevant season precedes another season of the plurality of seasons and includes the last episode watched by the user. Then, episodes of the relevant season that follow the last episode watched by the user are scheduled for recording, such that episodes of a season that precedes the relevant season are not scheduled for recording.
Light weight transport stream streaming protocol for live transcoding system
A robust, computationally-efficient and secure system is described for streaming content from a server to a client device via the Internet or another digital network. Various aspects relate to automated processes, systems and devices for securing a media stream with efficient yet effective digital cryptography. In particular, content may be transmitted in transport stream (TS) format in which all packets are encrypted (e.g., using a cipher block chain), in which control packets are exempted from encryption (e.g., using an electronic codebook), or in any other manner.
Systems, Devices, and Methods for Delivering Targeted Content to One-Way Set-Top-Box
Techniques for delivering targeted content to a client device (e.g., a set-top-box (STB)) with a tuner, one or more controllers, and a non-transitory memory are described. In accordance with various embodiments, the client device obtains streaming media content in a stream and detects a plurality of transport packets under a packet identifier (PID) in the stream, where the plurality of transport packets is associated with a targeted content delivery service. The client device further identifies metadata corresponding to targeted content of the targeted content delivery service in the plurality transport packets under the PID. The client device then selects a list of targeted content identifiers for the client device based on the metadata and a profile of the client device and downloads the targeted content according to the list of targeted content identifiers.
Systems and methods to implement preferred subtitle constructs
Systems and methods are provided for applying attributes to subtitles. One example method includes accessing a subtitle file, wherein the subtitle file comprises one or more subtitles, and identifying an attribute to apply to at least a subset of the subtitles. The subtitle file is amended indicate an attribute to apply to at least a subset of the subtitles to create an amended subtitle file. At a computing device, the subtitles of the amended subtitle file are generated for display, wherein the attribute is applied to the subset of the subtitles.
Systems and methods for locking remote control
A system for locking a remote-control device blocks a remote-control device from sending signals related to user input until a code to unlock the remote-control device is received. The system for locking a remote-control device receives an indication that the remote-control device should be locked and locks the remote-control device. The system for locking a remote-control device receives user input and determines whether the user input included a predetermined code. Based on a determination that the user input included the predetermined code, the system for locking a remote-control device unlocks the remote-control device.
Personal media content insertion
The disclosed technology is directed towards inserting user-personalized or other user-related supplementary media content into primary media content being presented to the user. The personalized media content can be inserted into available insertion slots associated with the primary media content. The inserted content is based on the context of the primary media, e.g., a location or theme of a movie scene. For example, upon obtaining primary media content that is video, supplementary media content related to a group of frames of the primary media content can be determined. Supplementary media content is combined with the primary media content at a presentation position associated with the group of frames to output modified media content. For a video, for example, the supplementary content can be inserted between scenes, overlaid onto a scene, or presented proximate a scene.
Media manipulation using cognitive state metric analysis
Data on a user interacting with a media presentation is collected at a client device. The data includes facial image data of the user. The facial image data is analyzed to extract cognitive state content of the user. One or more emotional intensity metrics are generated. The metrics are based on the cognitive state content. The media presentation is manipulated, based on the emotional intensity metrics and the cognitive state content. An engagement score for the media presentation is provided. The engagement score is based on the emotional intensity metric. A facial expression metric and a cognitive state metric are generated for the user. The manipulating includes optimization of the previously viewed media presentation. The optimization changes various aspects of the media presentation, including the length of different portions of the media presentation, the overall length of the media presentation, character selection, music selection, advertisement placement, and brand reveal time.
SYNCHRONIZING FILTER METADATA WITH A MULTIMEDIA PRESENTATION
A method, system and apparatus for applying and synchronizing filter information with a multimedia presentation, such as a movie provided in a video-on-demand context, to suppress objectionable content. In one example, filter information, which includes an indicia of a portion of the multimedia presentation including objectionable content and a type of suppression action, is provided on either a set-top-box or a video-on-demand server. A user selects a particular video-on-demand presentation, and the selection is transmitted to the set-top-box. Additionally, whether in a video-on-demand, DVD, or other environment it may be necessary to synchronize filter with the multimedia content so that the proper objectionable content is suppressed.
SYSTEMS AND METHODS FOR CONTROLLING ACCESS TO MEDIA ASSETS USING TWO-FACTOR AUTHENTICATION
Systems and methods for authorizing operations associated with blocked media assets using two-factor authentication. In some aspects, a media guidance application (e.g., executed by a set-top box or other user equipment used to store and display media assets) prompts a user for a password (e.g., a personal information number) in order to unlock the content for viewing. In response to receiving a second request from the user to perform an operation related to the media asset (e.g., delete), the media guidance application prompts the user for an additional factor confirming his or her identity, consistent with two-factor authentication protocol. If the user's identity is authenticated as a user that has authority to perform the operation related to the media asset (e.g., delete the stored media asset), the media guidance application performs the operation related to the media asset (e.g., deletes the media asset).