Patent classifications
H04L65/1066
Interfaces for data monitoring and event response
A computing device is coupled to a display device, and includes a data monitoring software application program executing on a processor within a data monitoring system. Via the data monitoring software application program, various techniques are performed for generating user interfaces for data monitoring and event response. In a first technique, the data monitoring software application program displays a user interface that includes a first region including a data visualization and a second region including one or more images of a video stream. In a second technique, the data monitoring software application program generates a user interface associated with an event, receive an input corresponding to interaction with a user interface element in the user interface, and initiates an event channel associated with the event in response to the input.
Interfaces for data monitoring and event response
A computing device is coupled to a display device, and includes a data monitoring software application program executing on a processor within a data monitoring system. Via the data monitoring software application program, various techniques are performed for generating user interfaces for data monitoring and event response. In a first technique, the data monitoring software application program displays a user interface that includes a first region including a data visualization and a second region including one or more images of a video stream. In a second technique, the data monitoring software application program generates a user interface associated with an event, receive an input corresponding to interaction with a user interface element in the user interface, and initiates an event channel associated with the event in response to the input.
Method and system for protecting privacy of users in session recordings
A computer system is provided. The computer system includes a memory and a processor. The processor is configured to scan user interface (UI) data representative of a plurality of UI controls; detect a portion of the UI data associated with private information, the portion corresponding to a UI control of the plurality of UI controls; record first session data comprising an obfuscated version of the UI control and unobfuscated versions of other UI controls of the plurality of UI controls; record second session data comprising an unobfuscated version of the UI control; encrypt the second session data to generate encrypted session data; and store the encrypted session data in association with the first session data.
Method and system for protecting privacy of users in session recordings
A computer system is provided. The computer system includes a memory and a processor. The processor is configured to scan user interface (UI) data representative of a plurality of UI controls; detect a portion of the UI data associated with private information, the portion corresponding to a UI control of the plurality of UI controls; record first session data comprising an obfuscated version of the UI control and unobfuscated versions of other UI controls of the plurality of UI controls; record second session data comprising an unobfuscated version of the UI control; encrypt the second session data to generate encrypted session data; and store the encrypted session data in association with the first session data.
Virtual communications assessment system in a multimedia environment
A system for data recording across a network includes a session border controller connecting incoming data from the network to an endpoint recorder. A load balancer is connected to the network between the session border controller and the endpoint and receives the incoming data from the session border controller, wherein the load balancer comprises computer memory and a processor configured to parse the incoming data into video data and audio data according to identification protocols accessible by the processor from the computer memory. A recording apparatus includes recording memory that receives the incoming data from the load balancer, stores a duplicate version of the incoming data in the recording memory, and connects the incoming data to the endpoint.
BROADCAST NOTIFICATIONS USING SOCIAL NETWORKING SYSTEMS
A method and notification system for notifying broadcast streams to multiple users. A notifier receives, from a broadcaster, a request to notify a broadcast stream to the multiple users. The notifier receives preferences from a subset of users of two or more social networking systems. The preferences identify: (i) some but not all social networking systems of the two or more social networking systems which should send notifications about the broadcast stream to the subset of users; and (ii) times during which the notifications about the broadcast stream should be sent to the subset of users. The notifier instructs an agent representing a broadcaster in each social networking system of only the some social networking systems to send notifications about the broadcast stream to the subset of users at the times identified in the preferences.
DISTRIBUTED MEDIA CLASSIFICATION ALGORITHM IN A SERVICE CONTROLLER PLATFORM FOR ENHANCED SCALABILITY
A network system and the method is described that splits media identification logic and media classification and/or general data session processing/management logic into separate controllers (e.g., between the local controllers and a service controller). By separating media identification logic and media classification logic (or general media processing/management logic), the system and method allows for greater flexibility and scalability in a network system employing a service controller. In particular, by allowing the local controllers to perform media identification and to construct a single packet that characterizes/describes a media session, the system avoids the need to transmit multiple data packets of a media session to the service controller for classification of the session. Accordingly, the system includes the flexibility a service controller provides while allowing for greater scalability by separating media identification logic and media classification respectively between a local controller and the service controller.
SYSTEMS AND METHODS FOR CONNECTING PRIVATE DEVICES TO PUBLIC DEVICES ACCORDING TO CONNECTION PARAMETERS
Systems and methods for connecting a private device to a public device based on various connection parameters. For example, a media guidance application may receive a communication requesting to use the public device from a private device that is implementing a private interface application (e.g., Netflix™ a streaming media application). In response, the media guidance application may generate an authorization key that is unique to the private device and comprises connection parameters. The media guidance application may transmit the authorization key to the private interface application to initiate a session between the public device and the private device. Whenever a command is received from the private device, the media guidance application may verify the authorization key and determine whether the connection parameters are satisfied. In response to verifying the authorization key and the connection parameters, the public device may execute the received command.
SYSTEMS AND METHODS FOR CONNECTING PRIVATE DEVICES TO PUBLIC DEVICES ACCORDING TO CONNECTION PARAMETERS
Systems and methods for connecting a private device to a public device based on various connection parameters. For example, a media guidance application may receive a communication requesting to use the public device from a private device that is implementing a private interface application (e.g., Netflix™ a streaming media application). In response, the media guidance application may generate an authorization key that is unique to the private device and comprises connection parameters. The media guidance application may transmit the authorization key to the private interface application to initiate a session between the public device and the private device. Whenever a command is received from the private device, the media guidance application may verify the authorization key and determine whether the connection parameters are satisfied. In response to verifying the authorization key and the connection parameters, the public device may execute the received command.
Detecting under-utilized features and providing training, instruction, or technical support in an observation platform
A first communication, received from a first communication device operated by a first user, is parsed according to a policy to determine associated metadata comprising a first set of attributes. The policy dictates rules for use of the metadata. The first set of attributes is compared to attributes of a plurality of communication devices. Based on the comparing, at least one recipient communication device for the first communication is identified from the plurality of communication devices, wherein at least one of the first set of attributes matches at least one of the attributes of the plurality of communication devices. Based on the policy and the metadata, at least one of a feature available to the at least one identified recipient communication device and behavior of the at least one identified recipient communication device as perceived by a particular user associated with the at least one recipient communication device is determined.