US20130227283A1 - Apparatus and methods for providing content to an ip-enabled device in a content distribution network - Google Patents
Apparatus and methods for providing content to an ip-enabled device in a content distribution network Download PDFInfo
- Publication number
- US20130227283A1 US20130227283A1 US13/403,802 US201213403802A US2013227283A1 US 20130227283 A1 US20130227283 A1 US 20130227283A1 US 201213403802 A US201213403802 A US 201213403802A US 2013227283 A1 US2013227283 A1 US 2013227283A1
- Authority
- US
- United States
- Prior art keywords
- content
- network
- segments
- access
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 238000000034 method Methods 0.000 title claims abstract description 110
- 238000012384 transportation and delivery Methods 0.000 claims abstract description 44
- 238000004891 communication Methods 0.000 claims description 29
- 230000008569 process Effects 0.000 claims description 17
- 238000013459 approach Methods 0.000 claims description 11
- 239000000835 fiber Substances 0.000 claims description 9
- 238000007726 management method Methods 0.000 claims description 8
- 230000004044 response Effects 0.000 claims description 6
- 229910052802 copper Inorganic materials 0.000 claims description 5
- 239000010949 copper Substances 0.000 claims description 5
- RYGMFSIKBFXOCR-UHFFFAOYSA-N Copper Chemical compound [Cu] RYGMFSIKBFXOCR-UHFFFAOYSA-N 0.000 claims description 4
- 238000012545 processing Methods 0.000 claims description 4
- 230000006978 adaptation Effects 0.000 claims description 2
- 238000009877 rendering Methods 0.000 abstract description 6
- 235000014510 cooky Nutrition 0.000 description 15
- 238000010586 diagram Methods 0.000 description 11
- 238000005516 engineering process Methods 0.000 description 7
- 230000007246 mechanism Effects 0.000 description 7
- 238000013475 authorization Methods 0.000 description 6
- 230000005540 biological transmission Effects 0.000 description 6
- 230000006870 function Effects 0.000 description 6
- 238000012544 monitoring process Methods 0.000 description 6
- 229940028444 muse Drugs 0.000 description 5
- 230000003044 adaptive effect Effects 0.000 description 4
- 230000008901 benefit Effects 0.000 description 4
- 238000003780 insertion Methods 0.000 description 4
- 230000037431 insertion Effects 0.000 description 4
- 230000006855 networking Effects 0.000 description 4
- GMVPRGQOIOIIMI-DWKJAMRDSA-N prostaglandin E1 Chemical compound CCCCC[C@H](O)\C=C\[C@H]1[C@H](O)CC(=O)[C@@H]1CCCCCCC(O)=O GMVPRGQOIOIIMI-DWKJAMRDSA-N 0.000 description 4
- 206010065042 Immune reconstitution inflammatory syndrome Diseases 0.000 description 3
- 208000008498 Infantile Refsum disease Diseases 0.000 description 3
- 230000001413 cellular effect Effects 0.000 description 3
- 230000002708 enhancing effect Effects 0.000 description 3
- 230000003993 interaction Effects 0.000 description 3
- 238000011144 upstream manufacturing Methods 0.000 description 3
- 238000004590 computer program Methods 0.000 description 2
- 239000012634 fragment Substances 0.000 description 2
- 238000012546 transfer Methods 0.000 description 2
- 238000013519 translation Methods 0.000 description 2
- 241001455214 Acinonyx jubatus Species 0.000 description 1
- 235000006719 Cassia obtusifolia Nutrition 0.000 description 1
- 235000014552 Cassia tora Nutrition 0.000 description 1
- 244000201986 Cassia tora Species 0.000 description 1
- 208000015976 Corneal dystrophy-perceptive deafness syndrome Diseases 0.000 description 1
- 241001112258 Moca Species 0.000 description 1
- 238000004458 analytical method Methods 0.000 description 1
- 238000004873 anchoring Methods 0.000 description 1
- 238000003491 array Methods 0.000 description 1
- 238000004422 calculation algorithm Methods 0.000 description 1
- 230000015556 catabolic process Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000012508 change request Methods 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 239000004020 conductor Substances 0.000 description 1
- 238000012790 confirmation Methods 0.000 description 1
- 230000002596 correlated effect Effects 0.000 description 1
- 230000006735 deficit Effects 0.000 description 1
- 238000006731 degradation reaction Methods 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 239000004744 fabric Substances 0.000 description 1
- 238000010348 incorporation Methods 0.000 description 1
- 230000010365 information processing Effects 0.000 description 1
- 230000002452 interceptive effect Effects 0.000 description 1
- 239000000463 material Substances 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 239000013307 optical fiber Substances 0.000 description 1
- 229920001690 polydopamine Polymers 0.000 description 1
- 238000004549 pulsed laser deposition Methods 0.000 description 1
- GUGNSJAORJLKGP-UHFFFAOYSA-K sodium 8-methoxypyrene-1,3,6-trisulfonate Chemical compound [Na+].[Na+].[Na+].C1=C2C(OC)=CC(S([O-])(=O)=O)=C(C=C3)C2=C2C3=C(S([O-])(=O)=O)C=C(S([O-])(=O)=O)C2=C1 GUGNSJAORJLKGP-UHFFFAOYSA-K 0.000 description 1
- 238000012358 sourcing Methods 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/23—Processing of content or additional data; Elementary server operations; Server middleware
- H04N21/235—Processing of additional data, e.g. scrambling of additional data or processing content descriptors
- H04N21/2351—Processing of additional data, e.g. scrambling of additional data or processing content descriptors involving encryption of additional data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0825—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/101—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by binding digital rights to specific entities
- G06F21/1012—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by binding digital rights to specific entities to domains
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/108—Transfer of content, software, digital rights or licenses
- G06F21/1083—Partial license transfers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/23—Processing of content or additional data; Elementary server operations; Server middleware
- H04N21/236—Assembling of a multiplex stream, e.g. transport stream, by combining a video stream with other content or additional data, e.g. inserting a URL [Uniform Resource Locator] into a video stream, multiplexing software data into a video stream; Remultiplexing of multiplex streams; Insertion of stuffing bits into the multiplex stream, e.g. to obtain a constant bit-rate; Assembling of a packetised elementary stream
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/25—Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
- H04N21/258—Client or end-user data management, e.g. managing client capabilities, user preferences or demographics, processing of multiple end-users preferences to derive collaborative data
- H04N21/25808—Management of client data
- H04N21/25816—Management of client data involving client authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/25—Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
- H04N21/262—Content or additional data distribution scheduling, e.g. sending additional data at off-peak times, updating software modules, calculating the carousel transmission frequency, delaying a video stream transmission, generating play-lists
- H04N21/26258—Content or additional data distribution scheduling, e.g. sending additional data at off-peak times, updating software modules, calculating the carousel transmission frequency, delaying a video stream transmission, generating play-lists for generating a list of items to be played back in a given order, e.g. playlist, or scheduling item distribution according to such list
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/25—Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
- H04N21/266—Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system, merging a VOD unicast channel into a multicast channel
- H04N21/26613—Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system, merging a VOD unicast channel into a multicast channel for generating or managing keys in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/43—Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
- H04N21/44—Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs
- H04N21/4405—Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs involving video stream decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/60—Network structure or processes for video distribution between server and client or between remote clients; Control signalling between clients, server and network components; Transmission of management data between server and client, e.g. sending from server to client commands for recording incoming content stream; Communication details between server and client
- H04N21/63—Control signaling related to video distribution between client, server and network components; Network processes for video distribution between server and clients or between remote clients, e.g. transmitting basic layer and enhancement layers over different transmission paths, setting up a peer-to-peer communication via Internet between remote STB's; Communication protocols; Addressing
- H04N21/643—Communication protocols
- H04N21/64322—IP
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/80—Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
- H04N21/83—Generation or processing of protective or descriptive data associated with content; Content structuring
- H04N21/845—Structuring of content, e.g. decomposing content into time segments
- H04N21/8456—Structuring of content, e.g. decomposing content into time segments by decomposing the content in the time domain, e.g. in time segments
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
- H04L2209/603—Digital right managament [DRM]
Definitions
- the invention relates generally to the field of data and content distribution and delivery.
- the invention relates to the delivery of content to an IP-enabled device via a content distribution network.
- Content distribution networks (such as e.g., Cable Television (CATV), satellite, or hybrid fiber/copper (HFCu) systems) provide content from various content sources at a network headend to a plurality of subscriber devices.
- CATV Cable Television
- HFCu hybrid fiber/copper
- a network operator e.g., multiple systems operator or MSO
- MSO multiple systems operator
- the MSO provides audio/video content to subscribers via the network headend.
- Recent advances in digital information processing and technology have made a whole range of services and functions available for delivery to consumers at various types of devices for very reasonable prices or subscription fees. These services and functions include delivery of digital content or programming (movies, etc.), digital video-on-demand (VOD) services, personal video recorder (PVR) and networked PVR (nPVR) services, Internet Protocol television (IPTV), digital media playback and recording, as well high speed Internet access (including so-called “Internet TV”, where television programming is delivered over the Internet) and IP-based telephony (e.g., VoIP).
- Other services available to network users include without limitation access to, and recording of digital music (e.g., MP3 files), and submission of “organic” media (e.g., home-grown Youtube videos, etc.).
- HFCu Hybrid Fiber-copper distribution via indigenous POST/PSTN and/or coaxial wiring in a premises
- optical fiber such as FTTC, FTTH, etc.
- Wi-FiTM hubs Ethernet hubs
- gateways switches, and routers
- user equipment types e.g., set-top boxes, personal (desktop) computers, laptop computers, other mini-computers such as so-called “netbooks” and mini-notebook computers, and/or other devices.
- PMDs portable media devices
- PMDs portable digital music devices
- Apple iPadTM and iPadTM and other so-called “MP3 players”
- MP3 players cellular telephones/smartphones
- handheld computers tablets
- tablets such as the KindleTM and NookTM and iPadTM
- PDA personal digital assistants
- IP content delivery networks i.e., a high speed data connection, such as a cable modem termination system or CMTS.
- CMTS cable modem termination system
- network operators may be capable of providing audio/video data over their own managed. IP content delivery networks; however, such mechanisms are only accessible to subscribers of the network via a high-speed data connection. For example, “basic cable” CATV subscribers (which often form the backbone of revenue streams for a managed network operator), do not under existing technology have access to MSO-provided content via an IP-enabled device such as a PC, smartphone, or tablet computer.
- methods and apparatus are needed which enable flexible delivery of content to IP-enabled devices without the use of a high-speed data connection; i.e., via another distribution platform (such as for example a traditional CATV or other distribution network).
- the methods and apparatus would be able to allow the network operator to provide audio/video content services to an IP-enabled device associated with a non-data subscriber of the operator's network.
- an MSO would be able to make content delivery services available to a subscriber's tablet computer (e.g., iPad) when the owner thereof does not subscribe to the MSO's high-speed data network or services, and instead only subscribes to the MSO's video services.
- Such methods and apparatus would advantageously enable a user to receive content on IP-enabled devices, which are generally more mobile than non-IP devices, thereby enhancing the user experience by no longer anchoring the user to a fixed location.
- the present invention provides, inter alia, apparatus and methods for packet (e.g., IP) content distribution to packet-enabled devices.
- packet e.g., IP
- a method for providing content to an IP-enabled consumer device includes: receiving a request for a content element; processing the content element into a plurality of segments; cryptographically protecting at least a portion of the plurality of segments; generating a playlist for playback of the plurality of segments; and providing the playlist and the plurality of protected segments to the consumer device via a content distribution network.
- the content distribution network includes a managed network having a plurality of subscribers, and the consumer device includes a device associated with at least one of the subscribers.
- the managed network includes for example: (i) a cable television network; (ii) a satellite network; or (iii) a hybrid fiber copper (HFCu) network.
- the request is received directly or indirectly from the consumer device, and the method further includes authenticating the consumer device, and optionally evaluating an entitlement for a user associated with the user device to access the requested content (and/or an entitlement for the user device to access the requested content).
- the method further includes: generating a cryptographic element in response to the received request; and transmitting at least a portion of the cryptographic element to the consumer device, the transmitted at least portion enabling the consumer device to the plurality of protected segments.
- the cryptographic protection includes in one implementation the encryption of the plurality of segments utilizing a symmetric encryption key approach.
- the plurality of segments includes a plurality of MPEG transport stream (.ts) files.
- the plurality of protected segments and the playlist are provided as part of a common data structure to the consumer device.
- the common data structure further includes in some cases a cryptographic key enabling the consumer device to access the plurality of protected segments, or the key may be provided separate from the common structure; e.g., via a URL provided to the consumer device, the cryptographic key enabling access to the plurality of protected content elements.
- the method further comprise providing the consumer device access to a cryptographic element enabling access to the plurality of protected content elements, the cryptographic element having a predetermined use period after which the cryptographic element is no longer valid.
- a first key is to encrypt the segments during a first period
- a second key is to encrypt the segments during a second, subsequent period.
- a method for ensuring the protection of content provided to one or more IP-enabled user devices includes: receiving a request for a content element from a first user device; authenticating the first user device to access the content element; obtaining the content element as a plurality of segments; generating a first cryptographic element to protect at least some of the plurality of segments; protecting the at least some of the plurality of segments using the first cryptographic element; providing the protected at least some segments to the first user device; providing access to a second cryptographic element to the first user device; after a period of time, generating a third cryptographic element; encrypting the at least some segments using the third element; and providing access to the third cryptographic element to a second user device requesting the content element.
- protection using a symmetric encryption process is employed, and the first and second cryptographic elements comprise the same symmetric encryption/decryption key.
- an asymmetric encryption process is used, and the first and second cryptographic elements comprise different encryption/decryption keys.
- the first and second user devices comprise the same device.
- apparatus for the delivery of content to a plurality of users of a distribution network.
- the apparatus includes: first apparatus configured to receive and decode encoded data from at least one content source; second apparatus in communication with the first apparatus and configured to selectively enable at least one of re-encoding and rate adaptation of the decoded data; third apparatus in communication with the second apparatus and configured to monitor the decoded data; and server apparatus configured to serve the re-encoded and/or rate adapted content to the plurality of users.
- the first apparatus includes a plurality of integrated receiver and decoder apparatus
- the second apparatus includes: a switch apparatus; and a plurality of transcoder apparatus in communication with the switch apparatus.
- the transcoder apparatus comprise linear transcoder apparatus each configured to trancode the decoded content into a format different than the others.
- a first portion of the plurality of transcoder apparatus includes rate-adaptive transcoder apparatus, and a second portion of the plurality of transcoder apparatus includes non-rate-adaptive transcoder apparatus.
- the apparatus further includes an acquisition server in communication with at least one of the transcoder apparatus, the acquisition server configured to multicast at least a portion of the decoded content according to a digital rights management (DRM) paradigm.
- DRM digital rights management
- a method of operating a client device in order to obtain content includes: placing the client device in direct or indirect communication with an access network, the access network capable of authenticating the client device in order to determine its entitlement to receive the content; placing the client device in direct or indirect communication with a content cache, the content cache being configured to provide content to the client device upon authentication by the access network; generating a request for the content, the request transmitted to the access network; and in response to the request, receiving the content from the content cache.
- the receiving the content includes: receiving a plurality of encrypted content segments; and receiving a playlist providing at least information on the playback of the plurality of encrypted content segments.
- the method further includes obtaining from the access network a decryption key capable of decrypting the plurality of encrypted content segments.
- the access network includes a managed network with a plurality of subscribers, the client device being associated with a subscriber of the managed network.
- Authenticating the client device in order to determine its entitlement to receive the content includes checking the subscription level of the subscriber, and/or verifying at least one of a MAC address and/or IP address.
- communication between the client device and access network is conducted at least in part according to a secure HTTP protocol
- communication between the client device and the content cache is conducted at least in part according to an HTTP protocol.
- computer readable apparatus includes a storage medium capable of storing at least one computer program thereon.
- the at least one program comprises an application for use on a client device (e.g., mobile IP-enabled content rendering device) which, when executed, invokes authentication of the client device and/or user in order to allow the client device to receive and render content.
- the at least one program comprises middleware disposed on a cable modem or gateway apparatus within a subscriber premises, the middleware enabling communication of content requests from an associated IP-enabled user device, forwarding of information (e.g., cookies) from the IP-enabled device to a host network to enable authentication and/or verification of entitlement to access the requested content, and forwarding of received content segments, decryption keys, and playlist data to the IP-enabled device in order to facilitate playback of the content.
- information e.g., cookies
- an IP-enabled client device comprises a mobile wireless content rendering device that communicates with an access point of a network, the access point being in communication with a content distribution network.
- the mobile device is configured to receive guide data from the distribution network, request content therefrom via the access point, and receive content which can then be rendered on the mobile device.
- the mobile device receives a plurality of encrypted MPEG transport stream (.ts) files and a playlist for the files, and is directed to obtain a decryption key from a URL upon proper authentication.
- a managed network architecture In a seventh aspect of the invention, a managed network architecture is disclosed.
- the managed network architecture enables delivery of packetized (e.g., IP) content to user devices without use of high-speed data service infrastructure.
- packetized e.g., IP
- a method of doing business comprises providing a separate service class (e.g., mobile IP data) for network users/subscribers that is decoupled from high-speed data service provided by the same network; i.e., IP delivery without the need for high-speed data service.
- a separate service class e.g., mobile IP data
- FIG. 1 is a functional block diagram illustrating an exemplary HFC cable network configuration useful with the present invention.
- FIG. 1 a is a functional block diagram illustrating one exemplary HFC cable network headend configuration useful with the present invention.
- FIG. 1 b is a functional block diagram illustrating one exemplary local service node configuration useful with the present invention.
- FIG. 1 c is a functional block diagram illustrating one exemplary packetized content delivery network architecture useful with the present invention.
- FIG. 2 is a functional block diagram illustrating one exemplary embodiment of a content distribution network architecture for providing content to an IP-enabled device according to the present invention.
- FIG. 2 a is a functional block diagram illustrating an alternate embodiment of a content distribution network.
- FIG. 3 is a logical block diagram illustrating an exemplary embodiment of a network architecture for encrypting content for delivery to an IP-enabled device via a content distribution network, such as the exemplary network of FIG. 2 .
- FIGS. 4 a - 4 b are logical flow diagrams illustrating exemplary methods for providing content to an IP-enabled device via a content distribution network according to the present invention.
- FIG. 5 is a logical flow diagram illustrating an exemplary method for authenticating and/or authorizing a particular IP-enabled client device to receive content in a content distribution network.
- FIG. 5 a is a functional block diagram illustrating an exemplary workflow for ensuring entitlements criteria are met by an IP-enabled device receiving content via a content distribution network.
- FIG. 6 is a functional block diagram illustrating exemplary calls for ensuring entitlements criteria are met by an IP-enabled device receiving content via a content distribution network.
- the term “application” refers generally and without limitation to a unit of executable software that implements a certain functionality or theme.
- the themes of applications vary broadly across any number of disciplines and functions (such as on-demand content management, e-commerce transactions, brokerage transactions, home entertainment, calculator etc.), and one application may have more than one theme.
- the unit of executable software generally runs in a predetermined environment; for example, the unit could comprise a downloadable Java XletTM that runs within the JavaTVTM environment.
- client device and “end user device” include, but are not limited to, set-top boxes (e.g., DSTBs), gateways, modems, personal computers (PCs), and minicomputers, whether desktop, laptop, or otherwise, and mobile devices such as handheld computers, PDAs, personal media devices (PMDs), tablets, and smartphones.
- set-top boxes e.g., DSTBs
- gateways e.g., modems
- PCs personal computers
- minicomputers whether desktop, laptop, or otherwise
- mobile devices such as handheld computers, PDAs, personal media devices (PMDs), tablets, and smartphones.
- PMDs personal media devices
- codec refers to a video, audio, or other data coding and/or decoding algorithm, process or apparatus including, without limitation, those of the MPEG (e.g., MPEG-1, MPEG-2, MPEG-4/H.264, etc.), Real (RealVideo, etc.), AC-3 (audio), DiVX, XViD/ViDX, Windows Media Video (e.g., WMV 7, 8, 9, 10, or 11), ATI Video codec, or VC-1 (SMPTE standard 421M) families.
- MPEG e.g., MPEG-1, MPEG-2, MPEG-4/H.264, etc.
- Real Real
- AC-3 audio
- DiVX XViD/ViDX
- Windows Media Video e.g., WMV 7, 8, 9, 10, or 11
- ATI Video codec e.g., WMV 7, 8, 9, 10, or 11
- VC-1 SMPTE standard 421M
- ⁇ As used herein, the term “computer program” or “software” is meant to include any sequence or human or machine cognizable steps which perform a function.
- Such program may be rendered in virtually any programming language or environment including, for example, C/C++, Fortran, COBOL, PASCAL, assembly language, markup languages (e.g., HTML, SGML, XML, VoXML), and the like, as well as object-oriented environments such as the Common Object Request Broker Architecture (CORBA), JavaTM (including J2ME, Java Beans, etc.), Binary Runtime Environment (e.g., BREW), and the like.
- CORBA Common Object Request Broker Architecture
- JavaTM including J2ME, Java Beans, etc.
- BREW Binary Runtime Environment
- CPE Consumer Premises Equipment
- host device refers without limitation to any type of electronic equipment located within a consumer's or user's premises and connected to a network.
- host device includes terminal devices that have access to digital television content via a satellite, cable, or terrestrial network. The host device functionality may be integrated into a digital television (DTV) set.
- consumer premises equipment includes such electronic equipment such as set-top boxes, televisions, Digital Video Recorders (DVR), gateway storage devices (Furnace), and ITV Personal Computers.
- DOCSIS refers to any of the existing or planned variants of the Data Over Cable Services Interface Specification, including for example DOCSIS versions 1.0, 1.1, 2.0 and 3.0.
- gateway includes, without limitation, devices configured to interface with a network, and pass signals to or exchange signals with, another device in communication therewith.
- Various exemplary gateways are described in, inter alia, co-owned and co-pending U.S. patent application Ser. No. 11/818,236 filed on Jun. 13, 2007 entitled “PREMISES GATEWAY APPARATUS AND METHODS FOR USE IN A CONTENT-BASED NETWORK”, U.S. patent application Ser. No. 12/582,619 filed on Oct. 20, 2009 and entitled “GATEWAY APPARATUS AND METHODS FOR DIGITAL CONTENT DELIVERY IN A NETWORK”, and U.S. patent application Ser. No. 12/480,597 filed on Jun. 8, 2009 and entitled “MEDIA BRIDGE APPARATUS AND METHODS”, each of the foregoing being incorporated herein by reference in its entirety.
- headend refers generally to a networked system controlled by an operator (e.g., an MSO or multiple systems operator) that distributes programming to MSO clientele using client devices.
- Such programming may include literally any information source/receiver including, inter alia, free-to-air TV channels, pay TV channels, interactive TV, and the Internet.
- Internet and “internet” are used interchangeably to refer to inter-networks including, without limitation, the Internet.
- microprocessor and “digital processor” are meant generally to include all types of digital processing devices including, without limitation, digital signal processors (DSPs), reduced instruction set computers (RISC), general-purpose (CISC) processors, microprocessors, gate arrays (e.g., FPGAs), PLDs, reconfigurable computer fabrics (RCFs), array processors, secure microprocessors, and application-specific integrated circuits (ASICs).
- DSPs digital signal processors
- RISC reduced instruction set computers
- CISC general-purpose processors
- microprocessors e.g., FPGAs), PLDs, reconfigurable computer fabrics (RCFs), array processors, secure microprocessors, and application-specific integrated circuits (ASICs).
- DSPs digital signal processors
- RISC reduced instruction set computers
- CISC general-purpose processors
- microprocessors gate arrays (e.g., FPGAs), PLDs, reconfigurable computer fabrics (RCFs), array processors, secure microprocess
- MSO multiple systems operator
- FTTH fiber to the home
- FTTC fiber to the curb
- HFCu Hybrid Fiber Copper
- network and “bearer network” refer generally to any type of telecommunications or data network including, without limitation, hybrid fiber coax (HFC) networks, HFCu networks, satellite networks, telco networks, and data networks (including MANs, WANs, LANs, WLANs, internets, and intranets).
- HFC hybrid fiber coax
- HFCu HFCu
- satellite networks telco networks
- data networks including MANs, WANs, LANs, WLANs, internets, and intranets.
- Such networks or portions thereof may utilize any one or more different topologies (e.g., ring, bus, star, loop, etc.), transmission media (e.g., wired/RF cable, RF wireless, millimeter wave, optical, etc.) and/or communications or networking protocols.
- the term “network interface” refers to any signal, data, or software interface with a component, network or process including, without limitation, those of the FireWire (e.g., FW400, FW800, etc.), USB (e.g., USB2), Ethernet (e.g., 10/100, 10/100/1000 (Gigabit Ethernet), 10-Gig-E, etc.), MoCA, Coaxsys (e.g., TVnetTM), radio frequency tuner (e.g., in-band or OOB, cable modem, etc.), Wi-Fi (802.11), WiMAX (802.16), PAN (e.g., 802.15), cellular (e.g., 3G, LTE/LTE-A/TD-LTE, GSM, etc.) or IrDA
- FireWire e.g., FW400, FW800, etc.
- USB e.g., USB2
- Ethernet e.g., 10/100, 10/100/1000 (Gigabit Ethernet), 10-
- node refers to any functional entity associated with a network, such as for example an OLT or ONU, whether physically discrete or distributed across multiple locations.
- the term “QAM” refers to modulation schemes used for sending signals over cable networks. Such modulation scheme might use any constellation level (e.g. QPSK, 16-QAM, 64-QAM, 256-QAM, etc.) depending on details of a cable network.
- a QAM may also refer to a physical channel modulated according to the schemes.
- server refers to any computerized component, system or entity regardless of faun which is adapted to provide data, files, applications, content, or other services to one or more other devices or entities on a computer system or network.
- service As used herein, the term “service”, “content”, “program” and “stream” are sometimes used synonymously to refer to a sequence of packetized data that is provided in what a subscriber may perceive as a service.
- a “service” (or “content”, or “stream”) in the former, specialized sense may correspond to different types of services in the latter, non-technical sense.
- a “service” in the specialized sense may correspond to, among others, video broadcast, audio-only broadcast, pay-per-view, or video-on-demand.
- the perceivable content provided on such a “service” may be live, pre-recorded, delimited in time, undelimited in time, or of other descriptions.
- a “service” in the specialized sense may correspond to what a subscriber would perceive as a “channel” in traditional broadcast television.
- service group refers without limitation to either a group of service users (e.g. subscribers), or the resources shared by them in the form of for example entire cable RF signal, only the RF channels used to receive the service or otherwise treated as a single logical unit by the network for resource assignment.
- Wi-Fi refers to, without limitation, any of the variants of IEEE-Std. 802.11 or related standards including 802.11 a/b/g/n/s/v.
- wireless means any wireless signal, data, communication, or other interface including without limitation Wi-Fi, Bluetooth, 3G (3GPP/3GPP2), HSDPA/HSUPA, TDMA, CDMA (e.g., IS-95A, WCDMA, etc.), FHSS, DSSS, GSM, PAN/802.15, WiMAX (802.16), 802.20, narrowband/FDMA, OFDM, PCS/DCS, LTE/LTE-A/TD-LTE, analog cellular, CDPD, satellite systems, millimeter wave or microwave systems, acoustic, and infrared (i.e., IrDA).
- the present invention discloses methods and apparatus for providing content to a plurality of IP-enabled devices serviced by a content distribution network.
- a network architecture is disclosed which enables delivery of content to such IP-enabled devices without the use of a high-speed data service; i.e., via another distribution platform (such as for example a traditional CATV or other managed distribution network DOCSIS or in-band QAMs).
- This capability allow the managed network operator to provide audio/video content services to an IP-enabled device (e.g., mobile wireless content rendering device such as a smartphone or tablet computer) associated with a non-data subscriber of the operator's network.
- an MSO is, utilizing the exemplary apparatus and methods described herein, able to make content delivery services available to a subscriber's tablet computer (e.g., iPad) when the owner thereof does not subscribe to the MSO's high-speed data network or services, and instead only subscribes to the MSO's video services.
- This approach advantageously enables a user to receive content on IP-enabled devices, which are generally more mobile than non-IP devices, thereby enhancing the user experience by allowing the user to received the content at various locations (as well as that specified in the subscription agreement; e.g., at the subscriber's premises). It also provides the basis for alternate business models for the network operator; i.e., since provision of IP-based content is no longer tied to high-speed data services, a larger customer base can be reached, and with greater flexibility and available options/combinations and locations.
- extant network structure and function e.g., DOCSIS or in-band QAMs of an HFC network
- extant network structure and function are utilized to the maximum extent in order to minimize MSO investment in providing such services, thereby also enhancing rapid incorporation of the technology and provision of services to the users/subscribers.
- requests for content from user IP-enabled devices are received, authenticated, and the content processed into a series of encrypted segments (e.g., in MP4 format or the like).
- the segments are provided with a playlist instructing the IP-enabled rendering device how to play them back (once decrypted).
- the rendering device is also provided access to a decryption key (e.g., via a URL to a managed key server) enabling decryption of the segments. Keys are dynamically managed in one variant in order to keep them “fresh” and mitigate chances for surreptitious use.
- Variants providing (i) user access to the MSO distribution network via an indigenous modem or gateway disposed at a user's premises; and (ii) user access to the MSO core via a gateway and a third party unmanaged network (such as the Internet), are described.
- HFC hybrid fiber/coax
- MSO multiple systems operator
- IP delivery capability IP delivery capability
- CPE multiple systems operator
- the general principles and advantages of the invention may be extended to other types of networks and architectures, whether broadband, narrowband, wired or wireless, or otherwise, the following therefore being merely exemplary in nature.
- the invention may be practiced over a fiber-to-the-home (FTTH) or fiber-to-the-curb (FTTC) system, HFCu networks, or over satellite or millimeter wave-based networks.
- FTTH fiber-to-the-home
- FTTC fiber-to-the-curb
- exemplary embodiments are described primarily in the context of a hybrid fiber/conductor (e.g., cable) system with legacy 6 MHz RF channels, the present invention is applicable to literally any network topology or paradigm, and any frequency/bandwidth.
- the invention is in no way limited to traditional cable system frequencies (i.e., below 1 GHz), and in fact may be used with systems that operate above 1 GHz band in center frequency or bandwidth, to include without limitation so-called ultra-wideband systems.
- FIG. 1 illustrates a typical content distribution network configuration with which the apparatus and methods of the present invention may be used.
- the various components of the network 100 include (i) one or more data and application origination points 102 ; (ii) one or more content sources 103 , (iii) one or more application distribution servers 104 ; (iv) one or more VOD servers 105 , and (v) customer premises equipment (CPE) 106 .
- the distribution server(s) 104 , VOD servers 105 and CPE(s) 106 are connected via a bearer (e.g., HFC) network 101 .
- a simple architecture comprising one of each of the aforementioned components 102 , 104 , 105 , 106 is shown in FIG.
- FIG. 1 for simplicity, although it will be recognized that comparable architectures with multiple origination points, distribution servers, VOD servers, and/or CPE devices (as well as different network topologies) may be utilized consistent with the invention.
- the headend architecture of FIG. 1 a (described in greater detail below) may be used.
- the data/application origination point 102 comprises any medium that allows data and/or applications (such as a VOD-based or “Watch TV” application) to be transferred to a distribution server 104 .
- This can include for example a third party data source, application vendor website, CD-ROM, external network interface, mass storage device (e.g., RAID system), etc.
- Such transference may be automatic, initiated upon the occurrence of one or more specified events (such as the receipt of a request packet or ACK), performed manually, or accomplished in any number of other modes readily recognized by those of ordinary skill.
- the application distribution server 104 comprises a computer system where such applications can enter the network system. Distribution servers are well known in the networking arts, and accordingly not described further herein.
- the VOD server 105 comprises a computer system where on-demand content can be received from one or more of the aforementioned data sources 102 and enter the network system. These servers may generate the content locally, or alternatively act as a gateway or intermediary from a distant source.
- the CPE 106 includes any equipment in the “customers' premises” (or other locations, whether local or remote to the distribution server 104 ) that can be accessed by a distribution server 104 or other network component.
- the headend architecture 150 comprises typical headend components and services including billing module 152 , subscriber management system (SMS) and CPE configuration management module 154 , cable-modem termination system (CMTS) and 00 B system 156 , as well as LAN(s) 158 , 160 placing the various components in data communication with one another.
- SMS subscriber management system
- CPE CPE configuration management module
- CMTS cable-modem termination system
- 00 B system 156 a bar or bus LAN topology
- any number of other arrangements e.g., ring, star, etc.
- the headend configuration depicted in FIG. 1 a is high-level, conceptual architecture, and that each MSO may have multiple headends deployed using custom architectures, which may or may not be heterogeneous in layout, design, and/or functionality.
- the exemplary architecture 150 of FIG. 1 a further includes a multiplexer-encrypter-modulator (MEM) 162 coupled to the HFC network 101 adapted to process or condition content for transmission over the network.
- the distribution servers 164 are coupled to the LAN 160 , which provides access to the MEM 162 and network 101 via one or more file servers 170 .
- the VoD servers 105 are coupled to the LAN 160 as well, although other architectures may be employed (such as for example where the VoD servers are associated with a core switching device such as an 802.3z Gigabit Ethernet device).
- information is carried across multiple channels.
- the headend must be adapted to acquire the information for the carried channels from various sources.
- the channels being delivered from the headend 150 to the CPE 106 (“downstream”) are multiplexed together in the headend as previously described, and sent to neighborhood hubs ( FIG. 1 b ) via a variety of interposed network components.
- the multiplexing operation(s) need not necessarily occur at the headend 150 (e.g., in the aforementioned MEM 162 ).
- the multiplexing is conducted at a BSA switching node or hub (see discussion of FIG. 1 c provided subsequently herein).
- a multi-location or multi-stage approach can be used, such as that described in U.S. Pat. No.
- OOB out-of-band
- DOCSIS DOCSIS channels and associated protocols.
- OCAP 1.0, 2.0, 3.0 (and subsequent) specification provides for exemplary networking protocols both downstream and upstream, although the invention is in no way limited to these approaches.
- the multiple servers can be used, and disposed at two or more different locations if desired, such as being part of different server “farms”. These multiple servers can be used to feed one service group, or alternatively different service groups. In a simple architecture, a single server is used to feed one or more service groups. In another variant, multiple servers located at the same location are used to feed one or more service groups. In yet another variant, multiple servers disposed at different location are used to feed one or more service groups.
- FIG. 1 c illustrates one exemplary implementation of such a network, in the context of a 3GPP IMS (IP Multimedia Subsystem) network with common control plane and service delivery platform (SDP), as described in U.S. patent application Ser. No.
- 3GPP IMS IP Multimedia Subsystem
- SDP service delivery platform
- FIG. 2 an exemplary embodiment of a network architecture 200 for providing content to an IP-enabled client device 207 in a content distribution network according to the present invention is illustrated.
- the architecture 200 of FIG. 2 can be used in conjunction with any of the foregoing network content distribution architectures (i.e., those of FIGS. 1-1 c discussed supra), or can form the basis of its own distribution and delivery architecture.
- content is provided from a national headend content source 203 to a series of integrated receiver/decoders (IRD) 212 of the content distribution network.
- the content comprises for example, live streaming content, although other types of content or data may be readily distributed.
- the IRDs 212 receive and decode the content.
- a digital content manager (DCM) 214 manages transmission of the decoded content from at least some of the IRDs 212 to a network switch 205 .
- one or more IRDs 212 utilize an asynchronous serial interface (ASI) for transmission of content and other data to the DCM 214 .
- the DCM 214 monitors the encoded video to ensure that it was sucessfully encoded from the IRD. As discussed previously, video is transcoded from a mezzanine quality down to e.g., MPEG-4. The DCM 214 monitors the decoding of the high quality satelite feed prior to transcoding. Additionally, content is multicast from the IRD 212 and/or a mezzanine feed 217 directly to the network switch 205 .
- ASI asynchronous serial interface
- the network switch 205 provides the received and decoded content to a plurality of linear transcoders 210 via e.g., a Gigabit Ethernet (GBE) or 10 Gigabit (10 G) connection.
- the network switch 205 provides data to a source monitoring entity 204 , which in one embodiment monitors the capacity of the switch.
- the linear transcoders 210 receive the content from the network switch 205 , and perform the necessary adaptive and/or non-adaptive rate steps to transcode and/or transrate content to any number of different desired formats such as e.g., Microsoft® Smooth StreamTM (MP4), Apple® Live StreamingTM (MP4), and Adobe Streaming®, for distribution of this content as a linear broadcast (multicast).
- MP4 Microsoft® Smooth StreamTM
- MP4 Apple® Live StreamingTM
- Adobe Streaming® for distribution of this content as a linear broadcast (multicast).
- MP4 format is a container format which allows, inter alia, combination of different multimedia streams (e.g., audio and video) into a single file.
- MP4 is a file extension for the container format defined in the Systems Part of the MPEG-4 standard (ISO 14496-1), incorporated herein by reference in its entirety.
- MP4 supports different kinds of multimedia content (multiple audio streams, video streams, subtitle streams, pictures, etc.) and advanced content (also referred to as “Rich Media” or “BIFS”) such as 2D and 3D graphics, user interactivity, and DVD-like menus.
- MP4 is a (linear) streamable format.
- linear transcoders 210 may perform the necessary rate steps to transcode/transrate the received content into any number of transport streams or streaming protocol, the foregoing being merely illustrative of the general concepts and of the common protocol used by typical IP-enabled client devices 207 .
- the transcoded and/or transrated content is provided to a content distribution network (CDN) origin server 202 using e.g., Hypertext Transport Protocol (HTTP) POST request methods, Real-Time Messaging Protocol (RTMP), or any other appropriate protocol.
- CDN origin server 202 stores the content to service requests from the IP-enabled devices 207 .
- One or more transcoders 210 may also be used to transcode the content to MP4 in MPEG-2 transport stream (TS) format in a non-rate adaptive manner.
- the non-rate adaptive format may be used in this case because the stream has a constant bit rate (CBR) at this stage.
- CBR constant bit rate
- Utilization of the MPEG-2 TS container enables the MP4 content to be multicast to a plurality of devices on the network.
- the MPEG-2 TS content may be delivered with advertisement or other “secondary” content inserted therein via one or more intermediary advertisement insertion mechanisms (not shown). Exemplary apparatus and methods for selection of secondary content to be inserted (e.g., via a “targeted” approach) are described in co-owned and co-pending U.S.
- one or more transcoders 201 may also be used to deliver (via e.g., multicast) one or more channels carrying advertising or other secondary content directly to one or more downstream nodes (e.g., switches 219 ) for subsequent insertion at a downstream location; i.e., at the switch 219 or further downstream).
- downstream nodes e.g., switches 219
- Content and data are additionally provided from the MPEG-2 TS linear transcoders 210 to an acquisition server (A-server) 206 . Then, via the A-server 206 , the content is multicast to a plurality of other devices including those having IPTV server platform with digital rights management (e.g., the Microsoft MediaRoom® platform or MR DRM) options available. The content is provided from the A-server 206 to the switch for eventual delivery to consumers.
- A-server acquisition server
- Another monitoring entity 208 is also provided as part of the exemplary architecture 200 .
- this entity 208 comprises a Cheetah Technologies® Stream ProberTM monitoring entity, although it will be recognized that other solutions or technologies may be employed with equal success.
- the monitoring entity in the exemplary embodiment provides analysis of IP and MPEG video coding layer attributes, in order to ensure network transmission trends and events are reported. In this manner, the network 200 can detect impairments and degradations in real-time.
- the monitoring entity 208 uses information fed back from the switch(es) 219 . The monitoring entity 208 uses this information to monitor transcoded MPEG-4 content after it has been transcoded or down-sampled.
- the illustrated network architecture 200 of FIG. 2 depicts content delivery to an exemplary IP-enabled client device 207 .
- the device 207 is configured to receive content via a WLAN (e.g., Wi-Fi) or other interface to WLAN-enabled DOCSIS cable modem or gateway 224 using an HTTP GET command.
- a substantially ubiquitous protocol/request mechanism such as the aforementioned HTTP GET command advantageously allows a variety of different user device types to interface with the modem/gateway 224 .
- the modem/gateway 224 can, in the illustrated embodiment, merely pass the user device-originated GET command upstream to the origin server 202 without any conversion or translation of the command. It will be appreciated by those of ordinary skill that such translation can be utilized if desired, such as where the indigenous protocol of the requesting user device 207 does not support the same request/delivery protocol as the origin server 202 .
- the cable modem 224 in turn requests the content (using an HTTP GET command) from a CDN edge cache 220 which is disposed at or near the edge of the network.
- the modem 224 is placed at the switch 219 , or elsewhere in the network based on operational considerations.
- the cable modem or gateway 224 utilized herein may be of the type discussed in previously referenced co-owned, co-pending U.S. patent application Ser. No. 13/______ entitled “APPARATUS AND METHODS FOR CONTENT DISTRIBUTION TO PACKET-ENABLED DEVICES VIA A NETWORK BRIDGE” filed Feb. 23, 2012.
- the cable modem 224 only points at the root server 202 or other servers in the content distribution network. That is, the cable modem/gateway 224 may be limited to only retrieve content for delivery to the IP-enabled devices.
- the cable modem/gateway 224 is able to act as a client of an access point distributed and managed by another content distribution network (i.e., a content distribution network other than that hosting or sourcing the requested content).
- another content distribution network i.e., a content distribution network other than that hosting or sourcing the requested content.
- the access point merely views the cable modem 224 as a device associated to the third party access point and which is able to receive content therefrom.
- the cablem modem in a manner similar to that disussed above, is identified by the content distribution network, and therefore able to receive requested content from the distribution network.
- the cable modem acts as an intermediary between a client device 207 and the content delivery network by registering as a client of a thrid party access point.
- the edge cache 220 rests at the edge of the network, and is accessible via a bearer network (e.g., HFC network) access network interface 222 .
- the HFC access network interface 222 in one exemplary embodiment comprises a web services interface managed by the content distribution network 200 .
- the edge cache 220 requests content (using e.g., an HTTP GET command) from the origin server 202 further upstream in the network.
- the edge cache 220 may store popular content for provision to the cable modem/gateway 224 and requesting device 207 more efficiently.
- the methods and apparatus discussed in co-owned, co-pending U.S. patent application Ser. No. 11/726,095 filed on Mar. 20, 2007 and entitled “METHOD AND APPARATUS FOR CONTENT DELIVERY AND REPLACEMENT IN A NETWORK”, which is incorporated herein by reference in its entirety, may be utilized for identifying and storing content at the network edge (such as at the edge cache 220 ).
- a peer-to-peer architecture is utilized to provide acquisition, delivery, and reconstitution of content present within the network.
- approach described therein has many potential benefits including, for example, the ability to push at least some network bandwidth consumption out to the edge of the network (e.g., hubs or other distribution nodes), thereby conserving bandwidth at the core of the network, the latter which can often be the most critical or bandwidth constrained portion of the system.
- requests outside the MSO network are in some cases obviated, thereby conserving resources in this regard.
- Latency can also be reduced in some cases (e.g., where the network is over-subscribed), since the requested content is acquired and distributed locally versus having to come from the core (or a third-party content source routed through the core or other network infrastructure).
- the apparatus and methods of co-owned, co-pending U.S. patent application Ser. No. 11/904,375 filed on Sep. 26, 2007 and entitled “METHODS AND APPARATUS FOR CONTENT CACHING IN A VIDEO NETWORK”, which is incorporated herein in its entirety, may be utilized consistent with the present invention to provide “intelligent” caching and de-caching of content within the network using on-demand or other user-specified delivery mode.
- the “intelligent” caching addresses issues relating to the trade-off between content storage space and transcoding/transrating/transcrypting efficiencies within the system that occur as a result of trying to support a broad range of end-user device profiles and capabilities.
- a caching controller By evaluating the demand for certain content elements and/or encoding formats and rates within the network, and identifying “duplications” of requests (or alternatively, the “proximity” of one request to another in content/encoding/bitrate/encryption space), a caching controller is able to dynamically balance caching of multiple versions of a content element (e.g., movie) and the need for “on the fly” transcoding/trasrating/transcryption and associated assets. In this fashion, greater efficiencies and economies of scale in operating the network can be realized while simultaneously supporting a wide range of devices. Thus, content which is requested more often can be “intelligently” stored at a content cache at the network edge, such as e.g., the edge cache 220 of FIG. 2 herein.
- FIG. 2 contemplates the communication of content request (e.g., via HTTP GET commands) from, and the provision of content to, the IP-enabled user device via a managed network (e.g., MSO-operated CATV, satellite, or HFCu network), the invention may also be implemented such that the user/subscriber is not limited to utilizing access points which are serviced by such networks.
- the transcoded/transrated and segmented content and playlist are delivered to the IP-enabled device over a non-managed network or third party network 260 such as the Internet.
- the aformentioned .ts segmenting protocol is utilized.
- a network gateway 262 is utilized to interface the non-managed network 260 to the managed network 264 (e.g., CATV network), such that the non-managed network 260 acts as the distribution network or “edge” of the (core) managed network 264 for purposes of distributing the content.
- the content/playlist is in this embodiment literally run over the top of the non-managed network, such as via an IP-based transport (as opposed to the MPEG transport stream of the prior embodiment).
- the embodiment of FIG. 2 a advantageously provides MSO-network users or subscribers the ability to access IP content via any number of non-managed network access points (e.g., WLAN APs operated by third parties with connection to the Internet via e.g., an ISP).
- non-managed network access points e.g., WLAN APs operated by third parties with connection to the Internet via e.g., an ISP.
- the foregoing approach utilizes the methods and apparatus discussed in co-owned, co-pending U.S. patent application Ser. No. 12/834,801 filed on Jul. 12, 2010 and entitled “APPARATUS AND METHODS FOR CONTENT DELIVERY AND MESSAGE EXCHANGE ACROSS MULTIPLE CONTENT DELIVERY NETWORKS”, which is incorporated herein by reference in its entirety.
- protected content is provided to subscribers of a managed (e.g., MSO) network via a content source accessible to the subscriber via the Internet or another external network (such as the non-MSO managed network 260 of FIG. 2 a ).
- a user accesses a third party service provider (content source) website, and requests delivery of content (e.g., via on-demand type streaming, broadcast, high speed file download, etc.). If the particular content requested is protected content or content which is only accessible to certain types of subscribers, the service provider and/or MSO determines whether the requesting user is permitted to access the content.
- the process by which it is determined whether a user may access content includes (i) authenticating the user as a subscriber to the MSO, and (ii) determining whether the subscriber's service/subscription level permits viewing of the requested content (and optionally one or more use restrictions). The process is advantageously agnostic to the underlying networks involved in both the request and content delivery processes.
- the user is authenticated by requiring him/her to establish a login identity and password, and/or assigning the user a GUID.
- the user's MAC address or IP address may also be used in this process.
- This unique information is stored at an MSO entity, and when the user requests content, the user must log into the MSO; the relevant information is retrieved and compared to information that the user has provided in their login. If valid login information is entered (i.e., the information provided matches the stored information for that user GUID), then a session is created between the MSO and user. Additionally, the authentication checks discussed in FIGS. 5-5 a below may be utilized.
- the service provider and MSO accounts for a particular user may be linked or federated.
- a trust relationship is established between the service provider and MSO, which is used to verify subscriber information.
- a given user will have MSO-specific information regarding its identity (such as login information for the MSO, GUID, etc.), and/or information regarding its subscription level and other service details stored at the service provider site.
- Messages received from the MSO representing permission for the user to access content may also be stored at the service provider site.
- the service provider may later reference this information when subsequent requests for content are made by the user for content, thereby providing faster and more efficient service.
- FIG. 3 illustrates an exemplary embodiment of a network apparatus utilized for providing encryption/decryption of the content provided to the IP-enabled devices 207 .
- Content is provided to the devices in encrypted format for, inter alia, protection thereof during transmission.
- content is encrypted using Advanced Encryption Standard (AES) encryption mechanisms of the type well known in the cryptography arts. Accordingly, a single key is used for both encryption and decryption (symmetric-key encryption), although it will be appreciated that non-symmetric or asymmetric encryption techniques may be sued as well.
- AES Advanced Encryption Standard
- the encoder 210 generates the content encryption/decryption key, which is published to the access network.
- the access network in this case may be the access network 222 (e.g., HFC managed network) previously described herein with respect to FIG. 2 , or yet another topology/architecture.
- the encoder 210 segments and encodes the content, which is then transmitted (published) to the origin or root server 202 ( FIG. 2 ) for storage thereat.
- the segmented content is stored at the origin server 202 as a plurality of MPEG transport stream files (i.e., .ts files) as specified in MPEG-2 Part 1, Systems (formally known as ISO/IEC standard 13818- 1 or ITU-T Rec. H.222.0), which is incorporated herein by reference in its entirety. Other formats may be used as well.
- a playlist of all of the segments (or .ts files) which comprise a given content element is also generated by the encoder 210 during the segmenting process.
- the playlist (also commonly referred to as a manifest or index) is likewise provided or published to the origin server 202 .
- the playlist may comprise an M3U file (such as e.g., a UTF-8 unicode file (i.e., an .m3u8 file)).
- an M3U file is a plain text file that specifies the locations of one or more media files, such as the .ts files, comprising a given content element (e.g., movie or video clip).
- Each line of the M3U file carries a URL associated to the various .ts files making up the playlist.
- the playlist may, in one variant, also contain an M3U file containing a URL to the content decryption key.
- the URL to the content decryption key for a given content element may be listed in the M3U file which also lists the URLs for the individual content segments.
- FIG. 3 further illustrates interaction of the IP-enabled client device 207 with the edge cache 220 and access network 222 of FIG. 2 . It is via the illustrated interactions that the device 207 is able to obtain the encryption/decryption key, obtain the content, and decrypt and access the content.
- FIG. 3 illustrates communications between the access network 222 and the user device 207 via the HTTP protocol, and communication between the user device 207 and the content cache 220 via the HTTPS protocol
- HTTPS Hypertext Transfer Protocol Secure
- HTTPS is a commonly used protocol, effectively a combination of the Hypertext Transfer Protocol (HTTP) with SSL/TLS protocol) which provides for encrypted communication and secure identification of a network web server.
- a three-tier or check approach is utilized. Specifically, a first authentication check determines whether the user is a registered user/subscriber of the MSO-provided services. In one embodiment, this includes requiring the user of the IP-enabled device 207 to log-in to the services via the access network 222 . A second authentication check determines whether the requesting device is within a home network or other premises serviced by the MSO.
- this second authentication check includes determining whether the IP address of the cable modem/gateway 224 associated with the requesting device 207 is among the cable modems or gateways registered to the MSO (whether leased or other). Yet a third authentication check determines whether the user himself is authorized or entitled to view the content; i.e., irrespective of the other checks. In one embodiment, this third check may include determining a subscription level of the user (or whether a user has provided consideration to the MSO for gaining access to the content, such as on a pay-per basis), and applying an appropriate filter to the content which can be requested thereby.
- the exemplary network of FIG. 3 utilizes symmetric-key encryption to encrypt content.
- the device 207 in order to decrypt received content, the device 207 must be given the encryption/decryption key.
- the encryption/decryption key is generated by the transcoder 210 and distributed to the origin server 202 , edge cache 220 , or the access network 222 .
- the playlist which is also stored at the origin server 202 as noted above, contains a reference to the URL of the key.
- a cookie also known as an HTTP or HTTPS cookie, web cookie, or browser cookie
- state information i.e., information relating to previous events, akin to a memory
- the state information can be used for any number of purposes including without limitation authentication, identification of a user/user session, user preferences, etc.
- Cookies may also be set via other means, such as e.g., via a script in a language (e.g., JavaScript).
- the subscriber uses the received guide to select a content element (e.g., program) for viewing.
- the program selection is transmitted as a request to the CDN edge cache 220 .
- the playlist for the selected content element is provided to the device 207 .
- the playlist includes a URL to the content encryption/decryption key. Hence, when the client device 207 receives the playlist, it is pointed to the URL to obtain the key.
- the client device 207 uses the URL as part of a request for the key from the key server, the latter which may include any one of e.g., the root server 202 , the edge cache 220 , the access network 222 , or other entity in communication with the access network 222 (not shown).
- the key server may comprise a protected key storage on the CDN.
- the keys are generated at e.g., the encoders 210 , however it is appreicated that any of the hereindescribed entites may be utilized for such purposes.
- the device 207 presents the server entity with the previously received cookie (after it is decrypted).
- the key server can then determine whether the cookie presented is appropriate for the requesting device, such as by cross-checking the cookie-device pair against stored information. This may include generating information linking an IP address, MAC address, or other identifying information of the device or location thereof to the particular cookie at the time the cookie was distributed thereto, then referencing this information when the key is requested.
- the encryption/decryption key is provided thereto.
- the key may be presented in encrypted or decrypted form; for instance, in one variant, the AES key itself is encrypted using a public-private key pair for which the requesting device is given (or already possesses) the key, so as to permit access to the AES key.
- Other cryptographic techniques may also be used to ensure the integrity of the key and/or limit chances of its being maliciously used or modified, such as e.g., a cryptographic residue or one-way hash for integrity protection.
- the client device 207 may then use the key to decrypt and play the content fragments (e.g., .ts files received from the edge cache 220 ) which correspond to those listed in the playlist.
- the content fragments e.g., .ts files received from the edge cache 220
- the encoder periodically or anecdotally rotates the content encryption/decryption key (pointing to the URL of the new key).
- the content fragments are re-encrypted with the new key.
- the device 207 may in one embodiment identify that a new key is available when it is discovered that its key is out of date (i.e., no longer to decrypt received content). Alternatively, the device 207 may know or be signaled to request a new key. In one variant, when a new key is available, the device 207 must request a new playlist, which will contain a reference to the URL of the new key. The device 207 , in turn, requests that the new key from the key server. The device 207 continues to be authenticated to the server by presentation of the cookie thereto.
- new key fetches as discussed herein occur quickly enough to occur before new playlist data and/or content decryption is required for the playback of content at the device 207 . That is to say, the determination of a need for a new key, and retrieval thereof, if occurring during the playback of content will occur quickly enough so as to not interfere with the playback of the content; netwok or server processing latency presents no significant delay, thereby not affecting user experience.
- the key rotation may occur on a per-program basis. That is, a new key may be generated for each new program or content element. In this manner, there will be no need for a key exchange during playback of a particular content element. At the request for or onset of playback of each new program, a new key will be provided, thereby assuring keys stay “fresh”.
- a “use it or lose it” type model is implemented, wherein the generation of the key starts a timer such that if the requesting user device 207 does not request or access the key (e.g., via a provided URL) within a prescribed period (e.g., 5 seconds), the key is not provided to that user except under a new request/key generation procedure. In this fashion, the opportunity for surreptitious access to the key (and hence the protected content elements) is further minimized.
- IDMS integrated database management system
- SOA service-oriented architecture
- MAC2IP MAC-to- 1 P
- one exemplary authorization check involves ensuring that the requesting device 207 is “behind” a registered cable modem or gateway 224 .
- the requesting client device 207 in one variant provides to the network a MAC address of the cable modem/gateway 224 with which it is associated.
- the MAC addresses of all authorized cable modems are known to the access network 222 by, e.g., maintaining a list thereof at the IDMS 214 .
- the MAC address is cross-referenced in the MAC2IP database to determine whether it corresponds to an IP address assigned by the MSO network.
- the MAC2IP database contains a listing of information regarding all of the cable modems 224 registered to receive content via the MSO-operated content distribution network. The list is consulted when a request for content is received, and if it can be determined that the requesting device 207 is associated to an authorized cable modem/gateway, the content is provided thereto.
- FIG. 4 a an exemplary embodiment of a method 400 for encrypting content and preparing it for delivery to a plurality of IP-enabled client devices 207 is illustrated.
- the content encryption/decryption key is generated.
- the same key is used for encrypting and decrypting the content (symmetric-key encryption).
- Key generation according to the present invention occurs substantially at the one or more encoder entities 210 , although other entities may perform this operation if desired.
- the content is segmented into a plurality of content segments.
- the content segments may comprise for example .ts files (as noted above).
- the segmented content is then encrypted using the encryption/decryption key, and provided to a storage entity (such as e.g., the root server 202 ) for storage per step 406 .
- a playlist is generated identifying the individual segments which comprise a particular content element (step 408 ), and a URL needed to access each is also identified.
- the content encryption/decryption key, the playlist, and the individual content segments are published to the root server 202 . These items may be part of a unitary “package”, or published/provided as separate components via separate channels/mechanisms.
- FIG. 4 b illustrates an exemplary method 420 for requesting and decrypting content received from the content distribution network at an IP-enabled client device 207 .
- the requesting device 207 is first authenticated and its entitlement to receive content are checked. This occurs in one implementation according to the methods discussed below with respect to FIGS. 5 , 5 a , and 6 , although other approaches may be used as well.
- the authenticated/entitled client device 207 accesses the access network 222 (such as via entry of a web address) and is able to request and receive guide data therefrom (step 424 ).
- the user uses the guide data to select particular content for viewing, and hence the request causes generation of a playlist from the CDN edge cache 220 for viewing (step 426 ).
- the client 207 requests the content encryption/decryption key from the key server (origin server) 202 .
- the requests discussed herein as originating at the client device 207 may be served directly to the entity from which the content, key, playlist, etc. is requested, or alternatively may be routed through the cable modem/gateway 224 .
- the requests may be packaged or bundled as previously noted (i.e., comprise one unified request), or be separate requests.
- the-device 207 can request the individual segments of the particular content requested, per step 430 . Then, per step 432 , the device is able to use the obtained decryption key to decrypt the content segments as they are identified in the playlist in order to form a complete playout of the requested content.
- FIG. 5 an exemplary embodiment of a method 500 for authenticating and/or authorizing a particular IP-enabled client device 207 to receive content in a content distribution network is illustrated. Via this method, it can be ensured that entitlements criteria specified by the MSO (and/or content source) are met by the requesting IP-enabled device 207 .
- one or more of the authorization/entitlements checks may be omitted, performed in parallel, and/or the order of performance permuted. This includes for instance selectively applying various of the checks/steps based on one or more criteria, such as e.g., the “newness” of the content requested (for example, older content may be deemed to be less valuable, and hence fewer checks or safeguards are applied), the service level of the requesting user/device 207 , the type or location of the device (e.g., mobile wireless devices not at the user's prescribed or registered subscription address may be deemed more or less risky, and hence require more or fewer checks, respectively), and so forth.
- the “newness” of the content requested for example, older content may be deemed to be less valuable, and hence fewer checks or safeguards are applied
- the service level of the requesting user/device 207 the type or location of the device (e.g., mobile wireless devices not at the user's prescribed or registered subscription address may be deemed more or less risky, and hence
- step 502 it is determined whether the requesting device 207 is associated to a cable modem or gateway device having a recognized IP address. The determination of step 502 is based in the exemplary implementation on the MAC address provided to the access network 222 from the requesting IP-enabled device 207 being correlated to a known IP address at the MAC2IP database 214 (discussed above).
- the system is only able to recognize IP addresses assigned to cable modems or gateways of individual subscribers (e.g., cable modems disposed at a registered user premises). In another embodiment, the system is able to recognize requests associated to cable modems or interface devices located outside of a particular individual subscriber's premises (i.e., public Wi-Fi hot spot modems or APs).
- the aforementioned entitlements check (i.e., ensuring that the requesting device is behind a recognized cable modem or WiFi hotspot) is performed according to the methods and apparatus discussed in co-owned, co-pending U.S. patent application Ser. No. 12/536,724 filed on Aug. 6, 2009 and entitled “SYSTEM AND METHOD FOR MANAGING ENTITLEMENTS TO DATA OVER A NETWORK”, which is incorporated herein by reference in its entirety.
- entitlement to content residing on a server is determined by e.g., the computing device operated by a subscriber generating a request for access to a requested content residing on a content access provider server.
- the subscriber has an account with a multi-channel video program distributor (MVPD), and the account comprises subscription information indicative of the services provided by the MVPD to the subscriber.
- the content request is received by the content access provider and forwarded to an entitlements server.
- the entitlements server determines whether the subscriber is entitled to receive the requested content based on the subscription information, and sends an access granted message to the content access provider server when the subscriber is entitled to receive the requested content.
- entitlements are determined via a geographic location of an
- the previously discussed MAC2IP database is utilized to determine the MAC address of the hotspot given its IP address.
- authentication of the user or subscriber may be performed to ensure services are provided appropriately (such as according to a geographic location to which the subscriber is associated).
- step 504 If the MAC or IP address is not recognized by the content distribution network, then per step 504 , an error message is provided to the requesting device. Alternatively, if the address is identified, the method 500 proceeds to a second authentication check (step 506 ).
- step 506 it is determined whether the requesting device and/or user is registered to the content distirbution network.
- the registration process occurs at the first instance a subscriber attempts to access cotent via the hereindescribed system.
- the subscriber may utilize a separate channel for registration, such as e.g., a website, call-in, etc.
- a registration process is entered.
- Registration in this embodiment requires creation of a login identity (such as a username) and password combination. Additionally, the login identity and password are linked to an existing subscriber account. It is appreciated, however, that other registration processes may be employed, the foregoing being merely illustrative of the overall concept of linking the particular subscriber account to the user/device requesting access.
- the user may login to the content distribution network services.
- step 512 the particular subscriber's authoiriztion to receive requested content is evaluated. If the subscriber selects content which he is not authorized to receive, an error message will display (step 514 ). Alternatiely, if the selected content is within the subscriber's level or tier, the content is provided (step 516 ).
- the system may use information gained at the subscriber's login to filter the guide data presented to the subscriber. In this manner, only content which the subscriber is authorized to view will be listed in the guide and therefore be available for user selection. This embodiment reduces the number of authorization checks the system will be required to perform as it will be known that if the subscriber was able to select a particular content element from the guide, than he/she is authorized to receive that content.
- FIG. 5 a illustrates one exemplary implementation of the method of previously discussed FIG. 5 .
- the requesting device is behind a premises (e.g., in-home) cable modem registered to and recognized by the MSO network. If the requesting device is not within range of the home cable modem Wi-Fi, an error message describing the geolocation restrictions of the system is presented to the user. In other words, it is explained that the network cannot provide content to the device when it is not within the home network.
- a premises e.g., in-home
- a login screen is presented.
- the login screen prompts the user for his digital identity (username and password) and may also include a registration link.
- the registration link may be used in the instance the subscriber has not previously registered for the requested service. Using the link, the subscriber registers his account, and is returned to the login screen.
- the subscriber identity is pulled from the successful authentication response, and is used to query the subscriber's video subscription tier.
- a user In order for a user to be allowed to access the IP content delivery application, he/she must at least be subscribed to a ditigal content access subscriber tier.
- subscribers to an analog-only service are not permitted access to the IP content delivery discussed herein and are instead presented with an error message and an opportunity to change their level of service (a so-called “upsell”),
- the subscriber's particular video tier is used to determine a channel lineup for display of the available live streaming channels.
- individual channel change requests are verified at the time of the request, thereby producing a one-time use, time-restricted URL that will only work for the requesting device.
- the application communicates to the MAC2IP database via a software application (such as e.g., MUSE/Delphi software owned by the Assginee hereof) in order to perform the IP address confirmation step discussed previously.
- a software application such as e.g., MUSE/Delphi software owned by the Assginee hereof
- MUSE/Delphi software owned by the Assginee hereof
- the system may utilize any number of other software and configurations for providing communication between these entities, the MUSE/Delphi software being merely illustrative.
- the MUSE/Delphi software is specifically configured to ensure that customer service data (including GUID) is not exposed, such as by using an encrypted cookie decryptable only by the MUSE software.
- the application provides an IP address which is checked by the database to ensure that the request is coming from an authorized cable modem or Wi-Fi hotspot.
- the exemplary MUSE/Delphi software is used to pull information regarding a subscriber's account and identification from an enterprise information store (which contains customer and account information) such as e.g., the DSB EIS and/or other operator network entity (including e.g., the technology service group (TSG)) having a service-orientated architecture (SOA).
- enterprise information store which contains customer and account information
- the DSB EIS and/or other operator network entity including e.g., the technology service group (TSG) having a service-orientated architecture (SOA).
- TSG technology service group
- SOA service-orientated architecture
- FIG. 6 While illustrated in FIG. 6 as each occuring, it is appreciated that one or more authentication/authorization steps may be omitted or replaced.
- the service calls of FIG. 6 are merely exemplary of communication between the system entities.
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Multimedia (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Databases & Information Systems (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Technology Law (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Graphics (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
Abstract
Description
- The present invention is related to co-owned, co-pending U.S. patent application Ser. No. 13/______ filed concurrently herewith on Feb. 23, 2012 and entitled “APPARATUS AND METHODS FOR CONTENT DISTRIBUTION TO PACKET-ENABLED DEVICES VIA A NETWORK BRIDGE”, which is incorporated herein by reference in its entirety.
- A portion of the disclosure of this patent document contains material that is subject to copyright protection. The copyright owner has no objection to the facsimile reproduction by anyone of the patent document or the patent disclosure, as it appears in the Patent and Trademark Office patent files or records, but otherwise reserves all copyright rights whatsoever.
- 1. Field of Invention
- The invention relates generally to the field of data and content distribution and delivery. In one exemplary aspect, the invention relates to the delivery of content to an IP-enabled device via a content distribution network.
- 2. Description of Related Technology
- Content distribution networks (such as e.g., Cable Television (CATV), satellite, or hybrid fiber/copper (HFCu) systems) provide content from various content sources at a network headend to a plurality of subscriber devices. In a typical “managed” network, a network operator (e.g., multiple systems operator or MSO) provides access to content via the network. Generally, the MSO provides audio/video content to subscribers via the network headend.
- Recent advances in digital information processing and technology have made a whole range of services and functions available for delivery to consumers at various types of devices for very reasonable prices or subscription fees. These services and functions include delivery of digital content or programming (movies, etc.), digital video-on-demand (VOD) services, personal video recorder (PVR) and networked PVR (nPVR) services, Internet Protocol television (IPTV), digital media playback and recording, as well high speed Internet access (including so-called “Internet TV”, where television programming is delivered over the Internet) and IP-based telephony (e.g., VoIP). Other services available to network users include without limitation access to, and recording of digital music (e.g., MP3 files), and submission of “organic” media (e.g., home-grown Youtube videos, etc.).
- Currently, many of these services are provided to users via a wide variety of different equipment environments and delivery paradigms including, inter alia, cable or satellite modems or QAMs, HFCu (i.e., Hybrid Fiber-copper distribution via indigenous POST/PSTN and/or coaxial wiring in a premises), optical fiber such as FTTC, FTTH, etc., Wi-Fi™ hubs, Ethernet hubs, gateways, switches, and routers, and to a plurality of user equipment types (e.g., set-top boxes, personal (desktop) computers, laptop computers, other mini-computers such as so-called “netbooks” and mini-notebook computers, and/or other devices). Recent advances in consumer electronics have also led to the widespread introduction of a variety of portable media devices (PMDs) such as, inter alia, portable digital music devices such as the well known Apple iPad™ and iPad™, and other so-called “MP3 players”, cellular telephones/smartphones, handheld computers, tablets such as the Kindle™ and Nook™ and iPad™, and personal digital assistants (PDA), which allow users to store and playback audio and video files.
- Although a myriad of services, equipment, data formats and providers are available, current systems offer no suitable mechanism for efficiently providing content to IP-enabled devices via a managed network without utilizing a traditional IP content delivery system (i.e., a high speed data connection, such as a cable modem termination system or CMTS). As noted previously, network operators may be capable of providing audio/video data over their own managed. IP content delivery networks; however, such mechanisms are only accessible to subscribers of the network via a high-speed data connection. For example, “basic cable” CATV subscribers (which often form the backbone of revenue streams for a managed network operator), do not under existing technology have access to MSO-provided content via an IP-enabled device such as a PC, smartphone, or tablet computer.
- Hence, methods and apparatus are needed which enable flexible delivery of content to IP-enabled devices without the use of a high-speed data connection; i.e., via another distribution platform (such as for example a traditional CATV or other distribution network). Ideally, the methods and apparatus would be able to allow the network operator to provide audio/video content services to an IP-enabled device associated with a non-data subscriber of the operator's network. For example, an MSO would be able to make content delivery services available to a subscriber's tablet computer (e.g., iPad) when the owner thereof does not subscribe to the MSO's high-speed data network or services, and instead only subscribes to the MSO's video services. Such methods and apparatus would advantageously enable a user to receive content on IP-enabled devices, which are generally more mobile than non-IP devices, thereby enhancing the user experience by no longer anchoring the user to a fixed location.
- Furthermore, the ideal solution would take advantage of extant network structure and function to the maximum extent practicable in order to minimize MSO investment/latency in providing such services.
- The present invention provides, inter alia, apparatus and methods for packet (e.g., IP) content distribution to packet-enabled devices.
- In a first aspect of the invention, a method for providing content to an IP-enabled consumer device is disclosed. In one embodiment, the method includes: receiving a request for a content element; processing the content element into a plurality of segments; cryptographically protecting at least a portion of the plurality of segments; generating a playlist for playback of the plurality of segments; and providing the playlist and the plurality of protected segments to the consumer device via a content distribution network.
- In one variant, the content distribution network includes a managed network having a plurality of subscribers, and the consumer device includes a device associated with at least one of the subscribers. The managed network includes for example: (i) a cable television network; (ii) a satellite network; or (iii) a hybrid fiber copper (HFCu) network.
- In another variant, the request is received directly or indirectly from the consumer device, and the method further includes authenticating the consumer device, and optionally evaluating an entitlement for a user associated with the user device to access the requested content (and/or an entitlement for the user device to access the requested content).
- In a further variant, the method further includes: generating a cryptographic element in response to the received request; and transmitting at least a portion of the cryptographic element to the consumer device, the transmitted at least portion enabling the consumer device to the plurality of protected segments.
- The cryptographic protection includes in one implementation the encryption of the plurality of segments utilizing a symmetric encryption key approach.
- In another variant, the plurality of segments includes a plurality of MPEG transport stream (.ts) files.
- In a further variant, at least the plurality of protected segments and the playlist are provided as part of a common data structure to the consumer device. The common data structure further includes in some cases a cryptographic key enabling the consumer device to access the plurality of protected segments, or the key may be provided separate from the common structure; e.g., via a URL provided to the consumer device, the cryptographic key enabling access to the plurality of protected content elements.
- In another variant, the method further comprise providing the consumer device access to a cryptographic element enabling access to the plurality of protected content elements, the cryptographic element having a predetermined use period after which the cryptographic element is no longer valid. In one implementation, a first key is to encrypt the segments during a first period, and a second key is to encrypt the segments during a second, subsequent period.
- In a second aspect of the invention, a method for ensuring the protection of content provided to one or more IP-enabled user devices is disclosed. In one embodiment, the method includes: receiving a request for a content element from a first user device; authenticating the first user device to access the content element; obtaining the content element as a plurality of segments; generating a first cryptographic element to protect at least some of the plurality of segments; protecting the at least some of the plurality of segments using the first cryptographic element; providing the protected at least some segments to the first user device; providing access to a second cryptographic element to the first user device; after a period of time, generating a third cryptographic element; encrypting the at least some segments using the third element; and providing access to the third cryptographic element to a second user device requesting the content element.
- In one variant, protection using a symmetric encryption process is employed, and the first and second cryptographic elements comprise the same symmetric encryption/decryption key. Alternatively, an asymmetric encryption process is used, and the first and second cryptographic elements comprise different encryption/decryption keys.
- In another variant, the first and second user devices comprise the same device.
- In a third aspect of the invention, apparatus for the delivery of content to a plurality of users of a distribution network is disclosed. In one embodiment, the apparatus includes: first apparatus configured to receive and decode encoded data from at least one content source; second apparatus in communication with the first apparatus and configured to selectively enable at least one of re-encoding and rate adaptation of the decoded data; third apparatus in communication with the second apparatus and configured to monitor the decoded data; and server apparatus configured to serve the re-encoded and/or rate adapted content to the plurality of users.
- In one variant, the first apparatus includes a plurality of integrated receiver and decoder apparatus, and the second apparatus includes: a switch apparatus; and a plurality of transcoder apparatus in communication with the switch apparatus.
- In another variant, the transcoder apparatus comprise linear transcoder apparatus each configured to trancode the decoded content into a format different than the others.
- In yet another variant, a first portion of the plurality of transcoder apparatus includes rate-adaptive transcoder apparatus, and a second portion of the plurality of transcoder apparatus includes non-rate-adaptive transcoder apparatus.
- In a further variant, the apparatus further includes an acquisition server in communication with at least one of the transcoder apparatus, the acquisition server configured to multicast at least a portion of the decoded content according to a digital rights management (DRM) paradigm.
- In a fourth aspect of the invention, a method of operating a client device in order to obtain content is disclosed. In one embodiment, the method includes: placing the client device in direct or indirect communication with an access network, the access network capable of authenticating the client device in order to determine its entitlement to receive the content; placing the client device in direct or indirect communication with a content cache, the content cache being configured to provide content to the client device upon authentication by the access network; generating a request for the content, the request transmitted to the access network; and in response to the request, receiving the content from the content cache.
- In one variant, the receiving the content includes: receiving a plurality of encrypted content segments; and receiving a playlist providing at least information on the playback of the plurality of encrypted content segments.
- In another variant, the method further includes obtaining from the access network a decryption key capable of decrypting the plurality of encrypted content segments.
- In a further variant, the access network includes a managed network with a plurality of subscribers, the client device being associated with a subscriber of the managed network.
- Authenticating the client device in order to determine its entitlement to receive the content includes checking the subscription level of the subscriber, and/or verifying at least one of a MAC address and/or IP address.
- In another variant, communication between the client device and access network is conducted at least in part according to a secure HTTP protocol, and communication between the client device and the content cache is conducted at least in part according to an HTTP protocol. In a fifth aspect of the invention, computer readable apparatus is disclosed. In one embodiment, the apparatus includes a storage medium capable of storing at least one computer program thereon. In one embodiment, the at least one program comprises an application for use on a client device (e.g., mobile IP-enabled content rendering device) which, when executed, invokes authentication of the client device and/or user in order to allow the client device to receive and render content.
- In another embodiment, the at least one program comprises middleware disposed on a cable modem or gateway apparatus within a subscriber premises, the middleware enabling communication of content requests from an associated IP-enabled user device, forwarding of information (e.g., cookies) from the IP-enabled device to a host network to enable authentication and/or verification of entitlement to access the requested content, and forwarding of received content segments, decryption keys, and playlist data to the IP-enabled device in order to facilitate playback of the content.
- In a sixth aspect of the invention, an IP-enabled client device is disclosed. In one embodiment, the device comprises a mobile wireless content rendering device that communicates with an access point of a network, the access point being in communication with a content distribution network. The mobile device is configured to receive guide data from the distribution network, request content therefrom via the access point, and receive content which can then be rendered on the mobile device. In one variant, the mobile device receives a plurality of encrypted MPEG transport stream (.ts) files and a playlist for the files, and is directed to obtain a decryption key from a URL upon proper authentication.
- In a seventh aspect of the invention, a managed network architecture is disclosed. In one embodiment, the managed network architecture enables delivery of packetized (e.g., IP) content to user devices without use of high-speed data service infrastructure.
- In an eighth aspect of the invention, a method of doing business is disclosed. In one embodiment, the method comprises providing a separate service class (e.g., mobile IP data) for network users/subscribers that is decoupled from high-speed data service provided by the same network; i.e., IP delivery without the need for high-speed data service.
- These and other aspects of the invention shall become apparent when considered in light of the disclosure provided herein.
-
FIG. 1 is a functional block diagram illustrating an exemplary HFC cable network configuration useful with the present invention. -
FIG. 1 a is a functional block diagram illustrating one exemplary HFC cable network headend configuration useful with the present invention. -
FIG. 1 b is a functional block diagram illustrating one exemplary local service node configuration useful with the present invention. -
FIG. 1 c is a functional block diagram illustrating one exemplary packetized content delivery network architecture useful with the present invention. -
FIG. 2 is a functional block diagram illustrating one exemplary embodiment of a content distribution network architecture for providing content to an IP-enabled device according to the present invention. -
FIG. 2 a is a functional block diagram illustrating an alternate embodiment of a content distribution network. -
FIG. 3 is a logical block diagram illustrating an exemplary embodiment of a network architecture for encrypting content for delivery to an IP-enabled device via a content distribution network, such as the exemplary network ofFIG. 2 . -
FIGS. 4 a-4 b are logical flow diagrams illustrating exemplary methods for providing content to an IP-enabled device via a content distribution network according to the present invention. -
FIG. 5 is a logical flow diagram illustrating an exemplary method for authenticating and/or authorizing a particular IP-enabled client device to receive content in a content distribution network. -
FIG. 5 a is a functional block diagram illustrating an exemplary workflow for ensuring entitlements criteria are met by an IP-enabled device receiving content via a content distribution network. -
FIG. 6 is a functional block diagram illustrating exemplary calls for ensuring entitlements criteria are met by an IP-enabled device receiving content via a content distribution network. - All Figures © Copyright 2011 Time Warner Cable, Inc. All rights reserved.
- Reference is now made to the drawings wherein like numerals refer to like parts throughout.
- As used herein, the term “application” refers generally and without limitation to a unit of executable software that implements a certain functionality or theme. The themes of applications vary broadly across any number of disciplines and functions (such as on-demand content management, e-commerce transactions, brokerage transactions, home entertainment, calculator etc.), and one application may have more than one theme. The unit of executable software generally runs in a predetermined environment; for example, the unit could comprise a downloadable Java Xlet™ that runs within the JavaTV™ environment.
- As used herein, the terms “client device” and “end user device” include, but are not limited to, set-top boxes (e.g., DSTBs), gateways, modems, personal computers (PCs), and minicomputers, whether desktop, laptop, or otherwise, and mobile devices such as handheld computers, PDAs, personal media devices (PMDs), tablets, and smartphones.
- As used herein, the term “codec” refers to a video, audio, or other data coding and/or decoding algorithm, process or apparatus including, without limitation, those of the MPEG (e.g., MPEG-1, MPEG-2, MPEG-4/H.264, etc.), Real (RealVideo, etc.), AC-3 (audio), DiVX, XViD/ViDX, Windows Media Video (e.g.,
WMV 7, 8, 9, 10, or 11), ATI Video codec, or VC-1 (SMPTE standard 421M) families. - As used herein, the term “computer program” or “software” is meant to include any sequence or human or machine cognizable steps which perform a function. Such program may be rendered in virtually any programming language or environment including, for example, C/C++, Fortran, COBOL, PASCAL, assembly language, markup languages (e.g., HTML, SGML, XML, VoXML), and the like, as well as object-oriented environments such as the Common Object Request Broker Architecture (CORBA), Java™ (including J2ME, Java Beans, etc.), Binary Runtime Environment (e.g., BREW), and the like.
- The terms “Consumer Premises Equipment (CPE)” and “host device” refer without limitation to any type of electronic equipment located within a consumer's or user's premises and connected to a network. The term “host device” includes terminal devices that have access to digital television content via a satellite, cable, or terrestrial network. The host device functionality may be integrated into a digital television (DTV) set. The term “consumer premises equipment” (CPE) includes such electronic equipment such as set-top boxes, televisions, Digital Video Recorders (DVR), gateway storage devices (Furnace), and ITV Personal Computers.
- As used herein, the term “DOCSIS” refers to any of the existing or planned variants of the Data Over Cable Services Interface Specification, including for example DOCSIS versions 1.0, 1.1, 2.0 and 3.0.
- As used herein, the term gateway includes, without limitation, devices configured to interface with a network, and pass signals to or exchange signals with, another device in communication therewith. Various exemplary gateways are described in, inter alia, co-owned and co-pending U.S. patent application Ser. No. 11/818,236 filed on Jun. 13, 2007 entitled “PREMISES GATEWAY APPARATUS AND METHODS FOR USE IN A CONTENT-BASED NETWORK”, U.S. patent application Ser. No. 12/582,619 filed on Oct. 20, 2009 and entitled “GATEWAY APPARATUS AND METHODS FOR DIGITAL CONTENT DELIVERY IN A NETWORK”, and U.S. patent application Ser. No. 12/480,597 filed on Jun. 8, 2009 and entitled “MEDIA BRIDGE APPARATUS AND METHODS”, each of the foregoing being incorporated herein by reference in its entirety.
- As used herein, the term “headend” refers generally to a networked system controlled by an operator (e.g., an MSO or multiple systems operator) that distributes programming to MSO clientele using client devices. Such programming may include literally any information source/receiver including, inter alia, free-to-air TV channels, pay TV channels, interactive TV, and the Internet.
- As used herein, the terms “Internet” and “internet” are used interchangeably to refer to inter-networks including, without limitation, the Internet.
- As used herein, the terms “microprocessor” and “digital processor” are meant generally to include all types of digital processing devices including, without limitation, digital signal processors (DSPs), reduced instruction set computers (RISC), general-purpose (CISC) processors, microprocessors, gate arrays (e.g., FPGAs), PLDs, reconfigurable computer fabrics (RCFs), array processors, secure microprocessors, and application-specific integrated circuits (ASICs). Such digital processors may be contained on a single unitary IC die, or distributed across multiple components.
- As used herein, the terms “MSO” or “multiple systems operator” refer without limitation to a cable, fiber to the home (FTTH), fiber to the curb (FTTC), satellite, Hybrid Fiber Copper (HFCu), or terrestrial network provider having infrastructure required to deliver services including programming and data over those mediums.
- As used herein, the terms “network” and “bearer network” refer generally to any type of telecommunications or data network including, without limitation, hybrid fiber coax (HFC) networks, HFCu networks, satellite networks, telco networks, and data networks (including MANs, WANs, LANs, WLANs, internets, and intranets). Such networks or portions thereof may utilize any one or more different topologies (e.g., ring, bus, star, loop, etc.), transmission media (e.g., wired/RF cable, RF wireless, millimeter wave, optical, etc.) and/or communications or networking protocols.
- As used herein, the term “network interface” refers to any signal, data, or software interface with a component, network or process including, without limitation, those of the FireWire (e.g., FW400, FW800, etc.), USB (e.g., USB2), Ethernet (e.g., 10/100, 10/100/1000 (Gigabit Ethernet), 10-Gig-E, etc.), MoCA, Coaxsys (e.g., TVnet™), radio frequency tuner (e.g., in-band or OOB, cable modem, etc.), Wi-Fi (802.11), WiMAX (802.16), PAN (e.g., 802.15), cellular (e.g., 3G, LTE/LTE-A/TD-LTE, GSM, etc.) or IrDA
- As used herein, the term “node” refers to any functional entity associated with a network, such as for example an OLT or ONU, whether physically discrete or distributed across multiple locations.
- As used herein, the term “QAM” refers to modulation schemes used for sending signals over cable networks. Such modulation scheme might use any constellation level (e.g. QPSK, 16-QAM, 64-QAM, 256-QAM, etc.) depending on details of a cable network. A QAM may also refer to a physical channel modulated according to the schemes.
- As used herein, the term “server” refers to any computerized component, system or entity regardless of faun which is adapted to provide data, files, applications, content, or other services to one or more other devices or entities on a computer system or network.
- As used herein, the term “service”, “content”, “program” and “stream” are sometimes used synonymously to refer to a sequence of packetized data that is provided in what a subscriber may perceive as a service. A “service” (or “content”, or “stream”) in the former, specialized sense may correspond to different types of services in the latter, non-technical sense. For example, a “service” in the specialized sense may correspond to, among others, video broadcast, audio-only broadcast, pay-per-view, or video-on-demand. The perceivable content provided on such a “service” may be live, pre-recorded, delimited in time, undelimited in time, or of other descriptions. In some cases, a “service” in the specialized sense may correspond to what a subscriber would perceive as a “channel” in traditional broadcast television.
- As used herein, the term “service group” refers without limitation to either a group of service users (e.g. subscribers), or the resources shared by them in the form of for example entire cable RF signal, only the RF channels used to receive the service or otherwise treated as a single logical unit by the network for resource assignment.
- As used herein, the term “Wi-Fi” refers to, without limitation, any of the variants of IEEE-Std. 802.11 or related standards including 802.11 a/b/g/n/s/v.
- As used herein, the term “wireless” means any wireless signal, data, communication, or other interface including without limitation Wi-Fi, Bluetooth, 3G (3GPP/3GPP2), HSDPA/HSUPA, TDMA, CDMA (e.g., IS-95A, WCDMA, etc.), FHSS, DSSS, GSM, PAN/802.15, WiMAX (802.16), 802.20, narrowband/FDMA, OFDM, PCS/DCS, LTE/LTE-A/TD-LTE, analog cellular, CDPD, satellite systems, millimeter wave or microwave systems, acoustic, and infrared (i.e., IrDA).
- In one salient aspect, the present invention discloses methods and apparatus for providing content to a plurality of IP-enabled devices serviced by a content distribution network. In one exemplary embodiment, a network architecture is disclosed which enables delivery of content to such IP-enabled devices without the use of a high-speed data service; i.e., via another distribution platform (such as for example a traditional CATV or other managed distribution network DOCSIS or in-band QAMs). This capability allow the managed network operator to provide audio/video content services to an IP-enabled device (e.g., mobile wireless content rendering device such as a smartphone or tablet computer) associated with a non-data subscriber of the operator's network. For example, an MSO is, utilizing the exemplary apparatus and methods described herein, able to make content delivery services available to a subscriber's tablet computer (e.g., iPad) when the owner thereof does not subscribe to the MSO's high-speed data network or services, and instead only subscribes to the MSO's video services. This approach advantageously enables a user to receive content on IP-enabled devices, which are generally more mobile than non-IP devices, thereby enhancing the user experience by allowing the user to received the content at various locations (as well as that specified in the subscription agreement; e.g., at the subscriber's premises). It also provides the basis for alternate business models for the network operator; i.e., since provision of IP-based content is no longer tied to high-speed data services, a larger customer base can be reached, and with greater flexibility and available options/combinations and locations.
- In the exemplary implementation, extant network structure and function (e.g., DOCSIS or in-band QAMs of an HFC network) are utilized to the maximum extent in order to minimize MSO investment in providing such services, thereby also enhancing rapid incorporation of the technology and provision of services to the users/subscribers.
- In one embodiment, requests for content from user IP-enabled devices are received, authenticated, and the content processed into a series of encrypted segments (e.g., in MP4 format or the like). Once the requesting user/device is authenticated, the segments are provided with a playlist instructing the IP-enabled rendering device how to play them back (once decrypted). The rendering device is also provided access to a decryption key (e.g., via a URL to a managed key server) enabling decryption of the segments. Keys are dynamically managed in one variant in order to keep them “fresh” and mitigate chances for surreptitious use.
- Variants providing (i) user access to the MSO distribution network via an indigenous modem or gateway disposed at a user's premises; and (ii) user access to the MSO core via a gateway and a third party unmanaged network (such as the Internet), are described.
- Exemplary embodiments of the apparatus and methods of the present invention are now described in detail. While these exemplary embodiments are described in the context of the aforementioned hybrid fiber/coax (HFC) cable system architecture having an multiple systems operator (MSO), digital networking capability, IP delivery capability, and plurality of client devices/CPE, the general principles and advantages of the invention may be extended to other types of networks and architectures, whether broadband, narrowband, wired or wireless, or otherwise, the following therefore being merely exemplary in nature. For example, the invention may be practiced over a fiber-to-the-home (FTTH) or fiber-to-the-curb (FTTC) system, HFCu networks, or over satellite or millimeter wave-based networks.
- It will also be appreciated that while described generally in the context of a consumer (i.e., residential) end user domain, the present invention may be readily adapted to other types of environments (e.g., commercial/enterprise, government/military, etc.) as well. Myriad other applications are possible.
- It is further noted that while exemplary embodiments are described primarily in the context of a hybrid fiber/conductor (e.g., cable) system with
legacy 6 MHz RF channels, the present invention is applicable to literally any network topology or paradigm, and any frequency/bandwidth. Furthermore, as referenced above, the invention is in no way limited to traditional cable system frequencies (i.e., below 1 GHz), and in fact may be used with systems that operate above 1 GHz band in center frequency or bandwidth, to include without limitation so-called ultra-wideband systems. - Other features and advantages of the present invention will immediately be recognized by persons of ordinary skill in the art with reference to the attached drawings and detailed description of exemplary embodiments as given below.
-
FIG. 1 illustrates a typical content distribution network configuration with which the apparatus and methods of the present invention may be used. The various components of thenetwork 100 include (i) one or more data and application origination points 102; (ii) one ormore content sources 103, (iii) one or moreapplication distribution servers 104; (iv) one ormore VOD servers 105, and (v) customer premises equipment (CPE) 106. The distribution server(s) 104,VOD servers 105 and CPE(s) 106 are connected via a bearer (e.g., HFC)network 101. A simple architecture comprising one of each of theaforementioned components FIG. 1 for simplicity, although it will be recognized that comparable architectures with multiple origination points, distribution servers, VOD servers, and/or CPE devices (as well as different network topologies) may be utilized consistent with the invention. For example, the headend architecture ofFIG. 1 a (described in greater detail below) may be used. - The data/
application origination point 102 comprises any medium that allows data and/or applications (such as a VOD-based or “Watch TV” application) to be transferred to adistribution server 104. This can include for example a third party data source, application vendor website, CD-ROM, external network interface, mass storage device (e.g., RAID system), etc. Such transference may be automatic, initiated upon the occurrence of one or more specified events (such as the receipt of a request packet or ACK), performed manually, or accomplished in any number of other modes readily recognized by those of ordinary skill. - The
application distribution server 104 comprises a computer system where such applications can enter the network system. Distribution servers are well known in the networking arts, and accordingly not described further herein. - The
VOD server 105 comprises a computer system where on-demand content can be received from one or more of theaforementioned data sources 102 and enter the network system. These servers may generate the content locally, or alternatively act as a gateway or intermediary from a distant source. - The
CPE 106 includes any equipment in the “customers' premises” (or other locations, whether local or remote to the distribution server 104) that can be accessed by adistribution server 104 or other network component. - Referring now to
FIG. 1 a, one exemplary embodiment of a headend architecture useful with the present invention is described. As shown inFIG. 1 a, theheadend architecture 150 comprises typical headend components and services includingbilling module 152, subscriber management system (SMS) and CPEconfiguration management module 154, cable-modem termination system (CMTS) and00 B system 156, as well as LAN(s) 158, 160 placing the various components in data communication with one another. It will be appreciated that while a bar or bus LAN topology is illustrated, any number of other arrangements (e.g., ring, star, etc.) may be used consistent with the invention. It will also be appreciated that the headend configuration depicted inFIG. 1 a is high-level, conceptual architecture, and that each MSO may have multiple headends deployed using custom architectures, which may or may not be heterogeneous in layout, design, and/or functionality. - The
exemplary architecture 150 ofFIG. 1 a further includes a multiplexer-encrypter-modulator (MEM) 162 coupled to theHFC network 101 adapted to process or condition content for transmission over the network. Thedistribution servers 164 are coupled to theLAN 160, which provides access to theMEM 162 andnetwork 101 via one ormore file servers 170. TheVoD servers 105 are coupled to theLAN 160 as well, although other architectures may be employed (such as for example where the VoD servers are associated with a core switching device such as an 802.3z Gigabit Ethernet device). As previously described, information is carried across multiple channels. Thus, the headend must be adapted to acquire the information for the carried channels from various sources. Typically, the channels being delivered from theheadend 150 to the CPE 106 (“downstream”) are multiplexed together in the headend as previously described, and sent to neighborhood hubs (FIG. 1 b) via a variety of interposed network components. - It will also be recognized, however, that the multiplexing operation(s) need not necessarily occur at the headend 150 (e.g., in the aforementioned MEM 162). For example, in one variant, at least a portion of the multiplexing is conducted at a BSA switching node or hub (see discussion of
FIG. 1 c provided subsequently herein). As yet another alternative, a multi-location or multi-stage approach can be used, such as that described in U.S. Pat. No. 7,602,820, entitled “APPARATUS AND METHODS FOR MULTI-STAGE MULTIPLEXING IN A NETWORK” incorporated herein by reference in its entirety, which discloses inter alia improved multiplexing apparatus and methods that allow such systems to dynamically compensate for content (e.g., advertisements, promotions, or other programs) that is inserted at a downstream network node such as a local hub, as well as “feed back” and “feed forward” mechanisms for transferring information between multiplexing stages. - Content (e.g., audio, video, data, files, software images, etc.) is provided in each downstream (in-band) channel associated with the relevant service group. To communicate with the headend or intermediary node (e.g., hub server), the
CPE 106 may use the out-of-band (OOB) or DOCSIS channels and associated protocols. The OCAP 1.0, 2.0, 3.0 (and subsequent) specification provides for exemplary networking protocols both downstream and upstream, although the invention is in no way limited to these approaches. - It will also be recognized that the multiple servers (broadcast, VoD, or otherwise) can be used, and disposed at two or more different locations if desired, such as being part of different server “farms”. These multiple servers can be used to feed one service group, or alternatively different service groups. In a simple architecture, a single server is used to feed one or more service groups. In another variant, multiple servers located at the same location are used to feed one or more service groups. In yet another variant, multiple servers disposed at different location are used to feed one or more service groups.
- While the foregoing network architectures described herein can (and in fact do) carry packetized content (e.g., IP over MPEG for high-speed data or Internet TV, MPEG2 packet content over QAM for MPTS, etc.), they are often not optimized for such delivery. Hence, in accordance with another embodiment of the present invention, a “packet optimized” distribution network is used for carriage of the packet content (e.g., IPTV content).
FIG. 1 c illustrates one exemplary implementation of such a network, in the context of a 3GPP IMS (IP Multimedia Subsystem) network with common control plane and service delivery platform (SDP), as described in U.S. patent application Ser. No. 12/783,388 filed on May 19, 2010 and entitled “METHODS AND APPARATUS FOR PACKETIZED CONTENT DELIVERY OVER A CONTENT DELIVERY NETWORK”, which incorporated herein by reference in its entirety. Such a network provides significant enhancements in terms of, inter alia, common control of different services, implementation and management of content delivery sessions according to unicast or multicast models, etc.; however, it is appreciated that the various features of the present invention are in no way limited to any of the foregoing architectures. - Referring now to
FIG. 2 , an exemplary embodiment of anetwork architecture 200 for providing content to an IP-enabledclient device 207 in a content distribution network according to the present invention is illustrated. It will be appreciated that thearchitecture 200 ofFIG. 2 can be used in conjunction with any of the foregoing network content distribution architectures (i.e., those ofFIGS. 1-1 c discussed supra), or can form the basis of its own distribution and delivery architecture. - As illustrated, content is provided from a national
headend content source 203 to a series of integrated receiver/decoders (IRD) 212 of the content distribution network. The content comprises for example, live streaming content, although other types of content or data may be readily distributed. TheIRDs 212 receive and decode the content. A digital content manager (DCM) 214 manages transmission of the decoded content from at least some of theIRDs 212 to anetwork switch 205. - In one embodiment, one or
more IRDs 212 utilize an asynchronous serial interface (ASI) for transmission of content and other data to the DCM 214. The DCM 214 monitors the encoded video to ensure that it was sucessfully encoded from the IRD. As discussed previously, video is transcoded from a mezzanine quality down to e.g., MPEG-4. The DCM 214 monitors the decoding of the high quality satelite feed prior to transcoding. Additionally, content is multicast from theIRD 212 and/or amezzanine feed 217 directly to thenetwork switch 205. This occurs for example, in the instance that the output from an IRD is already encoded properly; i.e., it will not need to be processed, converted and/or monitored by the DCM 214. Alternatively, this may enable advertisement insertion or multi-room (or so-called “media-room”) functionality. - The
network switch 205 provides the received and decoded content to a plurality oflinear transcoders 210 via e.g., a Gigabit Ethernet (GBE) or 10 Gigabit (10 G) connection. Thenetwork switch 205 provides data to asource monitoring entity 204, which in one embodiment monitors the capacity of the switch. - The
linear transcoders 210 receive the content from thenetwork switch 205, and perform the necessary adaptive and/or non-adaptive rate steps to transcode and/or transrate content to any number of different desired formats such as e.g., Microsoft® Smooth Stream™ (MP4), Apple® Live Streaming™ (MP4), and Adobe Streaming®, for distribution of this content as a linear broadcast (multicast). As is well known, the exemplary MP4 format is a container format which allows, inter alia, combination of different multimedia streams (e.g., audio and video) into a single file. MP4 is a file extension for the container format defined in the Systems Part of the MPEG-4 standard (ISO 14496-1), incorporated herein by reference in its entirety. MP4 supports different kinds of multimedia content (multiple audio streams, video streams, subtitle streams, pictures, etc.) and advanced content (also referred to as “Rich Media” or “BIFS”) such as 2D and 3D graphics, user interactivity, and DVD-like menus. MP4 is a (linear) streamable format. - Although not illustrated, the
linear transcoders 210 may perform the necessary rate steps to transcode/transrate the received content into any number of transport streams or streaming protocol, the foregoing being merely illustrative of the general concepts and of the common protocol used by typical IP-enabledclient devices 207. - The transcoded and/or transrated content is provided to a content distribution network (CDN)
origin server 202 using e.g., Hypertext Transport Protocol (HTTP) POST request methods, Real-Time Messaging Protocol (RTMP), or any other appropriate protocol. As will be discussed in greater detail below, theCDN origin server 202 stores the content to service requests from the IP-enableddevices 207. - One or
more transcoders 210 may also be used to transcode the content to MP4 in MPEG-2 transport stream (TS) format in a non-rate adaptive manner. The non-rate adaptive format may be used in this case because the stream has a constant bit rate (CBR) at this stage. Utilization of the MPEG-2 TS container enables the MP4 content to be multicast to a plurality of devices on the network. Additionally, the MPEG-2 TS content may be delivered with advertisement or other “secondary” content inserted therein via one or more intermediary advertisement insertion mechanisms (not shown). Exemplary apparatus and methods for selection of secondary content to be inserted (e.g., via a “targeted” approach) are described in co-owned and co-pending U.S. patent application Ser. No. 11/186,452 filed on Jul. 20, 2005 and entitled “METHOD AND APPARATUS FOR BOUNDARY-BASED NETWORK OPERATION”, U.S. patent application Ser. No. 12/284,757 filed on Sep. 24, 2008 and entitled “METHODS AND APPARATUS FOR USER-BASED TARGETED CONTENT DELIVERY”, and U.S. patent application Ser. No. 12/766,433 filed on Apr. 23, 2010 and entitled “APPARATUS AND METHODS FOR DYNAMIC SECONDARY CONTENT AND DATA INSERTION AND DELIVERY”, each of which is incorporated herein by reference in its entirety, although other approaches may be used with equal success. - As shown in
FIG. 2 , one or more transcoders 201 may also be used to deliver (via e.g., multicast) one or more channels carrying advertising or other secondary content directly to one or more downstream nodes (e.g., switches 219) for subsequent insertion at a downstream location; i.e., at the switch 219 or further downstream). - Content and data are additionally provided from the MPEG-2 TS
linear transcoders 210 to an acquisition server (A-server) 206. Then, via the A-server 206, the content is multicast to a plurality of other devices including those having IPTV server platform with digital rights management (e.g., the Microsoft MediaRoom® platform or MR DRM) options available. The content is provided from the A-server 206 to the switch for eventual delivery to consumers. - Another
monitoring entity 208 is also provided as part of theexemplary architecture 200. In one embodiment, thisentity 208 comprises a Cheetah Technologies® Stream Prober™ monitoring entity, although it will be recognized that other solutions or technologies may be employed with equal success. The monitoring entity in the exemplary embodiment provides analysis of IP and MPEG video coding layer attributes, in order to ensure network transmission trends and events are reported. In this manner, thenetwork 200 can detect impairments and degradations in real-time. Generally, themonitoring entity 208 uses information fed back from the switch(es) 219. Themonitoring entity 208 uses this information to monitor transcoded MPEG-4 content after it has been transcoded or down-sampled. - The illustrated
network architecture 200 ofFIG. 2 depicts content delivery to an exemplary IP-enabledclient device 207. As shown, thedevice 207 is configured to receive content via a WLAN (e.g., Wi-Fi) or other interface to WLAN-enabled DOCSIS cable modem orgateway 224 using an HTTP GET command. The use of a substantially ubiquitous protocol/request mechanism such as the aforementioned HTTP GET command advantageously allows a variety of different user device types to interface with the modem/gateway 224. Specifically, the modem/gateway 224 can, in the illustrated embodiment, merely pass the user device-originated GET command upstream to theorigin server 202 without any conversion or translation of the command. It will be appreciated by those of ordinary skill that such translation can be utilized if desired, such as where the indigenous protocol of the requestinguser device 207 does not support the same request/delivery protocol as theorigin server 202. - The
cable modem 224 in turn requests the content (using an HTTP GET command) from aCDN edge cache 220 which is disposed at or near the edge of the network. In one variant, themodem 224 is placed at the switch 219, or elsewhere in the network based on operational considerations. - The cable modem or
gateway 224 utilized herein may be of the type discussed in previously referenced co-owned, co-pending U.S. patent application Ser. No. 13/______ entitled “APPARATUS AND METHODS FOR CONTENT DISTRIBUTION TO PACKET-ENABLED DEVICES VIA A NETWORK BRIDGE” filed Feb. 23, 2012. As discussed therein, in one embodiment, thecable modem 224 only points at theroot server 202 or other servers in the content distribution network. That is, the cable modem/gateway 224 may be limited to only retrieve content for delivery to the IP-enabled devices. - In another embodiment, the cable modem/
gateway 224 is able to act as a client of an access point distributed and managed by another content distribution network (i.e., a content distribution network other than that hosting or sourcing the requested content). In this manner, the access point merely views thecable modem 224 as a device associated to the third party access point and which is able to receive content therefrom. The cablem modem, in a manner similar to that disussed above, is identified by the content distribution network, and therefore able to receive requested content from the distribution network. In other words, rather than using the wireless access of the cable modem associated with the content distribution network, the cable modem acts as an intermediary between aclient device 207 and the content delivery network by registering as a client of a thrid party access point. - The
edge cache 220 rests at the edge of the network, and is accessible via a bearer network (e.g., HFC network)access network interface 222. The HFCaccess network interface 222 in one exemplary embodiment comprises a web services interface managed by thecontent distribution network 200. Theedge cache 220 requests content (using e.g., an HTTP GET command) from theorigin server 202 further upstream in the network. - Alternatively or in addition, the
edge cache 220 may store popular content for provision to the cable modem/gateway 224 and requestingdevice 207 more efficiently. In one variant, the methods and apparatus discussed in co-owned, co-pending U.S. patent application Ser. No. 11/726,095 filed on Mar. 20, 2007 and entitled “METHOD AND APPARATUS FOR CONTENT DELIVERY AND REPLACEMENT IN A NETWORK”, which is incorporated herein by reference in its entirety, may be utilized for identifying and storing content at the network edge (such as at the edge cache 220). As discussed therein, a peer-to-peer architecture is utilized to provide acquisition, delivery, and reconstitution of content present within the network. In one embodiment, approach described therein has many potential benefits including, for example, the ability to push at least some network bandwidth consumption out to the edge of the network (e.g., hubs or other distribution nodes), thereby conserving bandwidth at the core of the network, the latter which can often be the most critical or bandwidth constrained portion of the system. Moreover, requests outside the MSO network are in some cases obviated, thereby conserving resources in this regard. Latency can also be reduced in some cases (e.g., where the network is over-subscribed), since the requested content is acquired and distributed locally versus having to come from the core (or a third-party content source routed through the core or other network infrastructure). - In another variant, the apparatus and methods of co-owned, co-pending U.S. patent application Ser. No. 11/904,375 filed on Sep. 26, 2007 and entitled “METHODS AND APPARATUS FOR CONTENT CACHING IN A VIDEO NETWORK”, which is incorporated herein in its entirety, may be utilized consistent with the present invention to provide “intelligent” caching and de-caching of content within the network using on-demand or other user-specified delivery mode. As discussed therein, the “intelligent” caching addresses issues relating to the trade-off between content storage space and transcoding/transrating/transcrypting efficiencies within the system that occur as a result of trying to support a broad range of end-user device profiles and capabilities. By evaluating the demand for certain content elements and/or encoding formats and rates within the network, and identifying “duplications” of requests (or alternatively, the “proximity” of one request to another in content/encoding/bitrate/encryption space), a caching controller is able to dynamically balance caching of multiple versions of a content element (e.g., movie) and the need for “on the fly” transcoding/trasrating/transcryption and associated assets. In this fashion, greater efficiencies and economies of scale in operating the network can be realized while simultaneously supporting a wide range of devices. Thus, content which is requested more often can be “intelligently” stored at a content cache at the network edge, such as e.g., the
edge cache 220 ofFIG. 2 herein. - It will further be appreciated that while the exemplary architecture of
FIG. 2 contemplates the communication of content request (e.g., via HTTP GET commands) from, and the provision of content to, the IP-enabled user device via a managed network (e.g., MSO-operated CATV, satellite, or HFCu network), the invention may also be implemented such that the user/subscriber is not limited to utilizing access points which are serviced by such networks. For instance, in an alternate embodiment (FIG. 2 a), the transcoded/transrated and segmented content and playlist are delivered to the IP-enabled device over a non-managed network orthird party network 260 such as the Internet. In one embodiment the aformentioned .ts segmenting protocol is utilized. Anetwork gateway 262 is utilized to interface thenon-managed network 260 to the managed network 264 (e.g., CATV network), such that thenon-managed network 260 acts as the distribution network or “edge” of the (core) managed network 264 for purposes of distributing the content. The content/playlist is in this embodiment literally run over the top of the non-managed network, such as via an IP-based transport (as opposed to the MPEG transport stream of the prior embodiment). The embodiment ofFIG. 2 a advantageously provides MSO-network users or subscribers the ability to access IP content via any number of non-managed network access points (e.g., WLAN APs operated by third parties with connection to the Internet via e.g., an ISP). - In one variant, the foregoing approach utilizes the methods and apparatus discussed in co-owned, co-pending U.S. patent application Ser. No. 12/834,801 filed on Jul. 12, 2010 and entitled “APPARATUS AND METHODS FOR CONTENT DELIVERY AND MESSAGE EXCHANGE ACROSS MULTIPLE CONTENT DELIVERY NETWORKS”, which is incorporated herein by reference in its entirety. As discussed therein, protected content is provided to subscribers of a managed (e.g., MSO) network via a content source accessible to the subscriber via the Internet or another external network (such as the non-MSO managed
network 260 ofFIG. 2 a). In one embodiment, a user accesses a third party service provider (content source) website, and requests delivery of content (e.g., via on-demand type streaming, broadcast, high speed file download, etc.). If the particular content requested is protected content or content which is only accessible to certain types of subscribers, the service provider and/or MSO determines whether the requesting user is permitted to access the content. The process by which it is determined whether a user may access content includes (i) authenticating the user as a subscriber to the MSO, and (ii) determining whether the subscriber's service/subscription level permits viewing of the requested content (and optionally one or more use restrictions). The process is advantageously agnostic to the underlying networks involved in both the request and content delivery processes. - In one variant, the user is authenticated by requiring him/her to establish a login identity and password, and/or assigning the user a GUID. The user's MAC address or IP address may also be used in this process. This unique information is stored at an MSO entity, and when the user requests content, the user must log into the MSO; the relevant information is retrieved and compared to information that the user has provided in their login. If valid login information is entered (i.e., the information provided matches the stored information for that user GUID), then a session is created between the MSO and user. Additionally, the authentication checks discussed in
FIGS. 5-5 a below may be utilized. - In another variant, the service provider and MSO accounts for a particular user may be linked or federated. In other words, a trust relationship is established between the service provider and MSO, which is used to verify subscriber information. According to this embodiment, a given user will have MSO-specific information regarding its identity (such as login information for the MSO, GUID, etc.), and/or information regarding its subscription level and other service details stored at the service provider site. Messages received from the MSO representing permission for the user to access content may also be stored at the service provider site. The service provider may later reference this information when subsequent requests for content are made by the user for content, thereby providing faster and more efficient service.
-
FIG. 3 illustrates an exemplary embodiment of a network apparatus utilized for providing encryption/decryption of the content provided to the IP-enableddevices 207. Content is provided to the devices in encrypted format for, inter alia, protection thereof during transmission. In one exemplary embodiment, content is encrypted using Advanced Encryption Standard (AES) encryption mechanisms of the type well known in the cryptography arts. Accordingly, a single key is used for both encryption and decryption (symmetric-key encryption), although it will be appreciated that non-symmetric or asymmetric encryption techniques may be sued as well. - In the illustrated embodiment, the
encoder 210 generates the content encryption/decryption key, which is published to the access network. The access network in this case may be the access network 222 (e.g., HFC managed network) previously described herein with respect toFIG. 2 , or yet another topology/architecture. Additionally, theencoder 210 segments and encodes the content, which is then transmitted (published) to the origin or root server 202 (FIG. 2 ) for storage thereat. In one embodiment, the segmented content is stored at theorigin server 202 as a plurality of MPEG transport stream files (i.e., .ts files) as specified in MPEG-2Part 1, Systems (formally known as ISO/IEC standard 13818-1 or ITU-T Rec. H.222.0), which is incorporated herein by reference in its entirety. Other formats may be used as well. - A playlist of all of the segments (or .ts files) which comprise a given content element is also generated by the
encoder 210 during the segmenting process. The playlist (also commonly referred to as a manifest or index) is likewise provided or published to theorigin server 202. In one embodiment, the playlist may comprise an M3U file (such as e.g., a UTF-8 unicode file (i.e., an .m3u8 file)). Generally, an M3U file is a plain text file that specifies the locations of one or more media files, such as the .ts files, comprising a given content element (e.g., movie or video clip). Each line of the M3U file carries a URL associated to the various .ts files making up the playlist. The playlist may, in one variant, also contain an M3U file containing a URL to the content decryption key. Alternatively, the URL to the content decryption key for a given content element may be listed in the M3U file which also lists the URLs for the individual content segments. -
FIG. 3 further illustrates interaction of the IP-enabledclient device 207 with theedge cache 220 andaccess network 222 ofFIG. 2 . It is via the illustrated interactions that thedevice 207 is able to obtain the encryption/decryption key, obtain the content, and decrypt and access the content. - It will be appreciated that while the embodiment of
FIG. 3 illustrates communications between theaccess network 222 and theuser device 207 via the HTTP protocol, and communication between theuser device 207 and thecontent cache 220 via the HTTPS protocol, other protocols may readily be used consistent with the invention, As is well known, the Hypertext Transfer Protocol Secure (HTTPS) is a commonly used protocol, effectively a combination of the Hypertext Transfer Protocol (HTTP) with SSL/TLS protocol) which provides for encrypted communication and secure identification of a network web server. - As will be discussed in greater detail below, in order for the managed or host network to ensure that the device is authorized to receive content, one or more authentication checks must be performed prior to delivery of the content and the content key thereto. In one implementation of the invention, a three-tier or check approach is utilized. Specifically, a first authentication check determines whether the user is a registered user/subscriber of the MSO-provided services. In one embodiment, this includes requiring the user of the IP-enabled
device 207 to log-in to the services via theaccess network 222. A second authentication check determines whether the requesting device is within a home network or other premises serviced by the MSO. In one embodiment, this second authentication check includes determining whether the IP address of the cable modem/gateway 224 associated with the requestingdevice 207 is among the cable modems or gateways registered to the MSO (whether leased or other). Yet a third authentication check determines whether the user himself is authorized or entitled to view the content; i.e., irrespective of the other checks. In one embodiment, this third check may include determining a subscription level of the user (or whether a user has provided consideration to the MSO for gaining access to the content, such as on a pay-per basis), and applying an appropriate filter to the content which can be requested thereby. Each of the foregoing authentication/entitlements checks are discussed in greater detail subsequently herein. - As noted above, the exemplary network of
FIG. 3 utilizes symmetric-key encryption to encrypt content. Hence, in order to decrypt received content, thedevice 207 must be given the encryption/decryption key. As discussed above, the encryption/decryption key is generated by thetranscoder 210 and distributed to theorigin server 202,edge cache 220, or theaccess network 222. The playlist, which is also stored at theorigin server 202 as noted above, contains a reference to the URL of the key. - When the
client device 207 logs in and is authenticated (see login as discussed below with respect to authentication/entitlements) to theaccess network 222, it receives program guide data and an encrypted cookie. As a brief aside, a cookie (also known as an HTTP or HTTPS cookie, web cookie, or browser cookie) is an arbitrary piece of textual data used for an origin website or server to send state information (i.e., information relating to previous events, akin to a memory) to a user's browser, and/or for that browser to return state information to the origin site/server. The state information can be used for any number of purposes including without limitation authentication, identification of a user/user session, user preferences, etc. Without cookies, each retrieval of a Web page or component of a Web page is an isolated event effectively unrelated to all other interactions with the pages of the same site. Cookies may also be set via other means, such as e.g., via a script in a language (e.g., JavaScript). - The subscriber uses the received guide to select a content element (e.g., program) for viewing. The program selection is transmitted as a request to the
CDN edge cache 220. In response to the request, the playlist for the selected content element is provided to thedevice 207. The playlist, as noted above, includes a URL to the content encryption/decryption key. Hence, when theclient device 207 receives the playlist, it is pointed to the URL to obtain the key. - The
client device 207 uses the URL as part of a request for the key from the key server, the latter which may include any one of e.g., theroot server 202, theedge cache 220, theaccess network 222, or other entity in communication with the access network 222 (not shown). Alternatively, the key server may comprise a protected key storage on the CDN. In one embodiment, the keys are generated at e.g., theencoders 210, however it is appreicated that any of the hereindescribed entites may be utilized for such purposes. In order to request the key, thedevice 207 presents the server entity with the previously received cookie (after it is decrypted). The key server can then determine whether the cookie presented is appropriate for the requesting device, such as by cross-checking the cookie-device pair against stored information. This may include generating information linking an IP address, MAC address, or other identifying information of the device or location thereof to the particular cookie at the time the cookie was distributed thereto, then referencing this information when the key is requested. - If the requesting
device 207 has presented an appropriate cookie (i.e., the device is authenticated), the encryption/decryption key is provided thereto. The key may be presented in encrypted or decrypted form; for instance, in one variant, the AES key itself is encrypted using a public-private key pair for which the requesting device is given (or already possesses) the key, so as to permit access to the AES key. Other cryptographic techniques may also be used to ensure the integrity of the key and/or limit chances of its being maliciously used or modified, such as e.g., a cryptographic residue or one-way hash for integrity protection. - Once the AES key is obtained in the clear, the
client device 207 may then use the key to decrypt and play the content fragments (e.g., .ts files received from the edge cache 220) which correspond to those listed in the playlist. - In one implementation of the invention, the encoder periodically or anecdotally rotates the content encryption/decryption key (pointing to the URL of the new key). In addition, the content fragments are re-encrypted with the new key. The
device 207 may in one embodiment identify that a new key is available when it is discovered that its key is out of date (i.e., no longer to decrypt received content). Alternatively, thedevice 207 may know or be signaled to request a new key. In one variant, when a new key is available, thedevice 207 must request a new playlist, which will contain a reference to the URL of the new key. Thedevice 207, in turn, requests that the new key from the key server. Thedevice 207 continues to be authenticated to the server by presentation of the cookie thereto. - Generally, new key fetches as discussed herein occur quickly enough to occur before new playlist data and/or content decryption is required for the playback of content at the
device 207. That is to say, the determination of a need for a new key, and retrieval thereof, if occurring during the playback of content will occur quickly enough so as to not interfere with the playback of the content; netwok or server processing latency presents no significant delay, thereby not affecting user experience. - In an alternative embodiment, the key rotation may occur on a per-program basis. That is, a new key may be generated for each new program or content element. In this manner, there will be no need for a key exchange during playback of a particular content element. At the request for or onset of playback of each new program, a new key will be provided, thereby assuring keys stay “fresh”.
- In yet another variant, a “use it or lose it” type model is implemented, wherein the generation of the key starts a timer such that if the requesting
user device 207 does not request or access the key (e.g., via a provided URL) within a prescribed period (e.g., 5 seconds), the key is not provided to that user except under a new request/key generation procedure. In this fashion, the opportunity for surreptitious access to the key (and hence the protected content elements) is further minimized. - An integrated database management system (IDMS) having a service-oriented architecture (SOA) and a MAC-to-1P (MAC2IP) address database 214 is also utilized in the exemplary authorization process. For example, as will be discussed below, one exemplary authorization check involves ensuring that the requesting
device 207 is “behind” a registered cable modem orgateway 224. Accordingly, the requestingclient device 207 in one variant provides to the network a MAC address of the cable modem/gateway 224 with which it is associated. For instance, the MAC addresses of all authorized cable modems are known to theaccess network 222 by, e.g., maintaining a list thereof at the IDMS 214. The MAC address is cross-referenced in the MAC2IP database to determine whether it corresponds to an IP address assigned by the MSO network. In other words, the MAC2IP database contains a listing of information regarding all of thecable modems 224 registered to receive content via the MSO-operated content distribution network. The list is consulted when a request for content is received, and if it can be determined that the requestingdevice 207 is associated to an authorized cable modem/gateway, the content is provided thereto. - Referring now to
FIG. 4 a, an exemplary embodiment of amethod 400 for encrypting content and preparing it for delivery to a plurality of IP-enabledclient devices 207 is illustrated. - Per
step 402, the content encryption/decryption key is generated. As noted above, in an exemplary embodiment of the present invention, the same key is used for encrypting and decrypting the content (symmetric-key encryption). Key generation according to the present invention occurs substantially at the one or moreencoder entities 210, although other entities may perform this operation if desired. - Next, at
step 404, the content is segmented into a plurality of content segments. The content segments may comprise for example .ts files (as noted above). The segmented content is then encrypted using the encryption/decryption key, and provided to a storage entity (such as e.g., the root server 202) for storage perstep 406. - A playlist is generated identifying the individual segments which comprise a particular content element (step 408), and a URL needed to access each is also identified. At
step 410, the content encryption/decryption key, the playlist, and the individual content segments are published to theroot server 202. These items may be part of a unitary “package”, or published/provided as separate components via separate channels/mechanisms. -
FIG. 4 b illustrates anexemplary method 420 for requesting and decrypting content received from the content distribution network at an IP-enabledclient device 207. Perstep 422, the requestingdevice 207 is first authenticated and its entitlement to receive content are checked. This occurs in one implementation according to the methods discussed below with respect toFIGS. 5 , 5 a, and 6, although other approaches may be used as well. - The authenticated/entitled
client device 207 accesses the access network 222 (such as via entry of a web address) and is able to request and receive guide data therefrom (step 424). The user uses the guide data to select particular content for viewing, and hence the request causes generation of a playlist from theCDN edge cache 220 for viewing (step 426). - Per
step 428, theclient 207 requests the content encryption/decryption key from the key server (origin server) 202. As noted previously, the requests discussed herein as originating at theclient device 207 may be served directly to the entity from which the content, key, playlist, etc. is requested, or alternatively may be routed through the cable modem/gateway 224. The requests may be packaged or bundled as previously noted (i.e., comprise one unified request), or be separate requests. - Using the obtained playlist URLs, the-
device 207 can request the individual segments of the particular content requested, perstep 430. Then, perstep 432, the device is able to use the obtained decryption key to decrypt the content segments as they are identified in the playlist in order to form a complete playout of the requested content. - Referring now to
FIG. 5 , an exemplary embodiment of amethod 500 for authenticating and/or authorizing a particular IP-enabledclient device 207 to receive content in a content distribution network is illustrated. Via this method, it can be ensured that entitlements criteria specified by the MSO (and/or content source) are met by the requesting IP-enableddevice 207. - Although illustrated in
FIG. 5 as a series or sequence of checks, it is appreciated by those of ordinary skill that one or more of the authorization/entitlements checks may be omitted, performed in parallel, and/or the order of performance permuted. This includes for instance selectively applying various of the checks/steps based on one or more criteria, such as e.g., the “newness” of the content requested (for example, older content may be deemed to be less valuable, and hence fewer checks or safeguards are applied), the service level of the requesting user/device 207, the type or location of the device (e.g., mobile wireless devices not at the user's prescribed or registered subscription address may be deemed more or less risky, and hence require more or fewer checks, respectively), and so forth. - Per
step 502, it is determined whether the requestingdevice 207 is associated to a cable modem or gateway device having a recognized IP address. The determination ofstep 502 is based in the exemplary implementation on the MAC address provided to theaccess network 222 from the requesting IP-enableddevice 207 being correlated to a known IP address at the MAC2IP database 214 (discussed above). - In one embodiment, the system is only able to recognize IP addresses assigned to cable modems or gateways of individual subscribers (e.g., cable modems disposed at a registered user premises). In another embodiment, the system is able to recognize requests associated to cable modems or interface devices located outside of a particular individual subscriber's premises (i.e., public Wi-Fi hot spot modems or APs).
- In one variant, the aforementioned entitlements check (i.e., ensuring that the requesting device is behind a recognized cable modem or WiFi hotspot) is performed according to the methods and apparatus discussed in co-owned, co-pending U.S. patent application Ser. No. 12/536,724 filed on Aug. 6, 2009 and entitled “SYSTEM AND METHOD FOR MANAGING ENTITLEMENTS TO DATA OVER A NETWORK”, which is incorporated herein by reference in its entirety. As discussed therein, entitlement to content residing on a server is determined by e.g., the computing device operated by a subscriber generating a request for access to a requested content residing on a content access provider server. The subscriber has an account with a multi-channel video program distributor (MVPD), and the account comprises subscription information indicative of the services provided by the MVPD to the subscriber. The content request is received by the content access provider and forwarded to an entitlements server. The entitlements server determines whether the subscriber is entitled to receive the requested content based on the subscription information, and sends an access granted message to the content access provider server when the subscriber is entitled to receive the requested content.
- In another embodiment, entitlements are determined via a geographic location of an
- MSO-managed public hotspot. According to this embodiment, the previously discussed MAC2IP database is utilized to determine the MAC address of the hotspot given its IP address. Alternatively, or in addition, authentication of the user or subscriber may be performed to ensure services are provided appropriately (such as according to a geographic location to which the subscriber is associated).
- If the MAC or IP address is not recognized by the content distribution network, then per
step 504, an error message is provided to the requesting device. Alternatively, if the address is identified, themethod 500 proceeds to a second authentication check (step 506). - At
step 506, it is determined whether the requesting device and/or user is registered to the content distirbution network. In one vaiant, the registration process occurs at the first instance a subscriber attempts to access cotent via the hereindescribed system. Alternatively, the subscriber may utilize a separate channel for registration, such as e.g., a website, call-in, etc. - In the instance the requesting subscriber is not yet registered, per step 508 a registration process is entered. Registration in this embodiment requires creation of a login identity (such as a username) and password combination. Additionally, the login identity and password are linked to an existing subscriber account. It is appreciated, however, that other registration processes may be employed, the foregoing being merely illustrative of the overall concept of linking the particular subscriber account to the user/device requesting access.
- If the subscriber has previously registered, per
step 510, the user may login to the content distribution network services. - Next, per
step 512, the particular subscriber's authoiriztion to receive requested content is evaluated. If the subscriber selects content which he is not authorized to receive, an error message will display (step 514). Alternatiely, if the selected content is within the subscriber's level or tier, the content is provided (step 516). - In an alternative embodiment, rather than providing an ability of the subscriber to select any content (including content which the subscriber does not have authorization to access), the system may use information gained at the subscriber's login to filter the guide data presented to the subscriber. In this manner, only content which the subscriber is authorized to view will be listed in the guide and therefore be available for user selection. This embodiment reduces the number of authorization checks the system will be required to perform as it will be known that if the subscriber was able to select a particular content element from the guide, than he/she is authorized to receive that content.
-
FIG. 5 a illustrates one exemplary implementation of the method of previously discussedFIG. 5 . As shown, according to this method ofFIG. 5 a, it is first determined whether the requesting device is behind a premises (e.g., in-home) cable modem registered to and recognized by the MSO network. If the requesting device is not within range of the home cable modem Wi-Fi, an error message describing the geolocation restrictions of the system is presented to the user. In other words, it is explained that the network cannot provide content to the device when it is not within the home network. - If the requesting device is within the premises (and therefore behind a recognized cable modern), a login screen is presented. The login screen prompts the user for his digital identity (username and password) and may also include a registration link. The registration link may be used in the instance the subscriber has not previously registered for the requested service. Using the link, the subscriber registers his account, and is returned to the login screen.
- Once the subscriber successfully logs in, the subscriber identity is pulled from the successful authentication response, and is used to query the subscriber's video subscription tier. In order for a user to be allowed to access the IP content delivery application, he/she must at least be subscribed to a ditigal content access subscriber tier. In the illustrated example, subscribers to an analog-only service are not permitted access to the IP content delivery discussed herein and are instead presented with an error message and an opportunity to change their level of service (a so-called “upsell”),
- According to the method of
FIG. 5 a, once the subscriber is determined to be authorized to receive service, the subscriber's particular video tier is used to determine a channel lineup for display of the available live streaming channels. In the illustrated embodiment, individual channel change requests are verified at the time of the request, thereby producing a one-time use, time-restricted URL that will only work for the requesting device. - Referring now to
FIG. 6 , exemplary calls needed to perform the authentication/entitlement checks ofFIGS. 5 and 5 a are illustrated. Generally speaking, the application communicates to the MAC2IP database via a software application (such as e.g., MUSE/Delphi software owned by the Assginee hereof) in order to perform the IP address confirmation step discussed previously. However, it is appreciated that the system may utilize any number of other software and configurations for providing communication between these entities, the MUSE/Delphi software being merely illustrative. The MUSE/Delphi software is specifically configured to ensure that customer service data (including GUID) is not exposed, such as by using an encrypted cookie decryptable only by the MUSE software. The application provides an IP address which is checked by the database to ensure that the request is coming from an authorized cable modem or Wi-Fi hotspot. Additionally, the exemplary MUSE/Delphi software is used to pull information regarding a subscriber's account and identification from an enterprise information store (which contains customer and account information) such as e.g., the DSB EIS and/or other operator network entity (including e.g., the technology service group (TSG)) having a service-orientated architecture (SOA). - While illustrated in
FIG. 6 as each occuring, it is appreciated that one or more authentication/authorization steps may be omitted or replaced. The service calls ofFIG. 6 are merely exemplary of communication between the system entities. - It will be recognized that while certain aspects of the invention are described in terms of a specific sequence of steps of a method, these descriptions are only illustrative of the broader methods of the invention, and may be modified as required by the particular application. Certain steps may be rendered unnecessary or optional under certain circumstances. Additionally, certain steps or functionality may be added to the disclosed embodiments, or the order of performance of two or more steps permuted. All such variations are considered to be encompassed within the invention disclosed and claimed herein.
- While the above detailed description has shown, described, and pointed out novel features of the invention as applied to various embodiments, it will be understood that various omissions, substitutions, and changes in the form and details of the device or process illustrated may be made by those skilled in the art without departing from the invention. The foregoing description is of the best mode presently contemplated of carrying out the invention. This description is in no way meant to be limiting, but rather should be taken as illustrative of the general principles of the invention. The scope of the invention should be determined with reference to the claims.
Claims (32)
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/403,802 US20130227283A1 (en) | 2012-02-23 | 2012-02-23 | Apparatus and methods for providing content to an ip-enabled device in a content distribution network |
CA2769893A CA2769893C (en) | 2012-02-23 | 2012-02-29 | Apparatus and methods for providing content to an ip-enabled device in a content distribution network |
US14/954,754 US9992520B2 (en) | 2012-02-23 | 2015-11-30 | Apparatus and methods for providing content to an IP-enabled device in a content distribution network |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/403,802 US20130227283A1 (en) | 2012-02-23 | 2012-02-23 | Apparatus and methods for providing content to an ip-enabled device in a content distribution network |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/954,754 Continuation US9992520B2 (en) | 2012-02-23 | 2015-11-30 | Apparatus and methods for providing content to an IP-enabled device in a content distribution network |
Publications (1)
Publication Number | Publication Date |
---|---|
US20130227283A1 true US20130227283A1 (en) | 2013-08-29 |
Family
ID=49000706
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/403,802 Abandoned US20130227283A1 (en) | 2012-02-23 | 2012-02-23 | Apparatus and methods for providing content to an ip-enabled device in a content distribution network |
US14/954,754 Active US9992520B2 (en) | 2012-02-23 | 2015-11-30 | Apparatus and methods for providing content to an IP-enabled device in a content distribution network |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/954,754 Active US9992520B2 (en) | 2012-02-23 | 2015-11-30 | Apparatus and methods for providing content to an IP-enabled device in a content distribution network |
Country Status (2)
Country | Link |
---|---|
US (2) | US20130227283A1 (en) |
CA (1) | CA2769893C (en) |
Cited By (49)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130227284A1 (en) * | 2012-02-23 | 2013-08-29 | Howard Pfeffer | Apparatus and methods for content distribution to packet-enabled devices via a network bridge |
US20140033081A1 (en) * | 2012-07-27 | 2014-01-30 | Cbs Interactive Inc. | Content personalization system |
US20140164616A1 (en) * | 2012-12-11 | 2014-06-12 | Kajeet, Inc. | Selective access control to mobile ip network |
US20140237505A1 (en) * | 2013-02-15 | 2014-08-21 | Cox Communications, Inc. | Network-based digital video recorder playback adapter |
US20140236739A1 (en) * | 2001-05-11 | 2014-08-21 | Clear Channel Management Services, Inc. | Media delivery to limited capability platforms |
US8838149B2 (en) | 2012-04-02 | 2014-09-16 | Time Warner Cable Enterprises Llc | Apparatus and methods for ensuring delivery of geographically relevant content |
US20150089035A1 (en) * | 2013-09-24 | 2015-03-26 | Verizon Patent And Licensing Inc. | Method and apparatus for integrating various network elements and providing media processing serivices |
WO2015042611A1 (en) * | 2013-09-23 | 2015-03-26 | Visible World, Inc. | Systems and methods for cache-based content delivery |
WO2015048853A1 (en) * | 2013-10-02 | 2015-04-09 | National Ict Australia Limited | Selecting advertisements |
US20150242597A1 (en) * | 2014-02-24 | 2015-08-27 | Google Inc. | Transferring authorization from an authenticated device to an unauthenticated device |
US9369288B1 (en) * | 2013-03-15 | 2016-06-14 | Startal, Inc. | Video data delivery protection |
US9380329B2 (en) | 2009-03-30 | 2016-06-28 | Time Warner Cable Enterprises Llc | Personal media channel apparatus and methods |
US9407968B2 (en) * | 2014-12-22 | 2016-08-02 | Verizon Patent And Licensing Inc. | Multicast and unicast adaptive bitrate services |
EP3070629A1 (en) * | 2015-03-20 | 2016-09-21 | Nagravision S.A. | Method and device to protect a decrypted media content before transmission to a consumption device |
US9467723B2 (en) | 2012-04-04 | 2016-10-11 | Time Warner Cable Enterprises Llc | Apparatus and methods for automated highlight reel creation in a content delivery network |
US20170005992A1 (en) * | 2015-03-09 | 2017-01-05 | Vadium Technology Corporation | Secure message transmission using dynamic segmentation and encryption |
US20170099136A1 (en) * | 2015-10-01 | 2017-04-06 | Time Warner Cable Enterprises Llc | Encryption management, content recording management, and playback management in a network environment |
EP3229162A1 (en) * | 2016-04-05 | 2017-10-11 | Telia Company AB | Access management for digital content |
US9992520B2 (en) | 2012-02-23 | 2018-06-05 | Time Warner Cable Enterprises Llc | Apparatus and methods for providing content to an IP-enabled device in a content distribution network |
US10028025B2 (en) | 2014-09-29 | 2018-07-17 | Time Warner Cable Enterprises Llc | Apparatus and methods for enabling presence-based and use-based services |
US10116676B2 (en) | 2015-02-13 | 2018-10-30 | Time Warner Cable Enterprises Llc | Apparatus and methods for data collection, analysis and service modification based on online activity |
US10278008B2 (en) | 2012-08-30 | 2019-04-30 | Time Warner Cable Enterprises Llc | Apparatus and methods for enabling location-based services within a premises |
US10313755B2 (en) | 2009-03-30 | 2019-06-04 | Time Warner Cable Enterprises Llc | Recommendation engine apparatus and methods |
US10586023B2 (en) | 2016-04-21 | 2020-03-10 | Time Warner Cable Enterprises Llc | Methods and apparatus for secondary content management and fraud prevention |
US20200204861A1 (en) * | 2018-12-21 | 2020-06-25 | Turner Broadcasting Systems, Inc. | Disparate live media output stream playout and broadcast distribution |
US20200204834A1 (en) | 2018-12-22 | 2020-06-25 | Turner Broadcasting Systems, Inc. | Publishing a Disparate Live Media Output Stream Manifest That Includes One or More Media Segments Corresponding to Key Events |
US10750224B2 (en) | 2016-12-31 | 2020-08-18 | Turner Broadcasting System, Inc. | Dynamic scheduling and channel creation based on user selection |
US10827220B2 (en) | 2017-05-25 | 2020-11-03 | Turner Broadcasting System, Inc. | Client-side playback of personalized media content generated dynamically for event opportunities in programming media content |
US10826950B2 (en) | 2012-12-11 | 2020-11-03 | Kajeet, Inc. | Selective service control to mobile IP network |
US10856016B2 (en) | 2016-12-31 | 2020-12-01 | Turner Broadcasting System, Inc. | Publishing disparate live media output streams in mixed mode based on user selection |
US10863238B2 (en) | 2010-04-23 | 2020-12-08 | Time Warner Cable Enterprise LLC | Zone control methods and apparatus |
US10965967B2 (en) | 2016-12-31 | 2021-03-30 | Turner Broadcasting System, Inc. | Publishing a disparate per-client live media output stream based on dynamic insertion of targeted non-programming content and customized programming content |
US10992973B2 (en) | 2016-12-31 | 2021-04-27 | Turner Broadcasting System, Inc. | Publishing a plurality of disparate live media output stream manifests using live input streams and pre-encoded media assets |
US10997320B1 (en) * | 2018-01-31 | 2021-05-04 | EMC IP Holding Company LLC | Segment-based personalized cache architecture |
US11038932B2 (en) | 2016-12-31 | 2021-06-15 | Turner Broadcasting System, Inc. | System for establishing a shared media session for one or more client devices |
US11051061B2 (en) | 2016-12-31 | 2021-06-29 | Turner Broadcasting System, Inc. | Publishing a disparate live media output stream using pre-encoded media assets |
US11051074B2 (en) | 2016-12-31 | 2021-06-29 | Turner Broadcasting System, Inc. | Publishing disparate live media output streams using live input streams |
US11082734B2 (en) | 2018-12-21 | 2021-08-03 | Turner Broadcasting System, Inc. | Publishing a disparate live media output stream that complies with distribution format regulations |
US11109086B2 (en) | 2016-12-31 | 2021-08-31 | Turner Broadcasting System, Inc. | Publishing disparate live media output streams in mixed mode |
US11122316B2 (en) | 2009-07-15 | 2021-09-14 | Time Warner Cable Enterprises Llc | Methods and apparatus for targeted secondary content insertion |
US11134309B2 (en) | 2016-12-31 | 2021-09-28 | Turner Broadcasting System, Inc. | Creation of channels using pre-encoded media assets |
US11212593B2 (en) | 2016-09-27 | 2021-12-28 | Time Warner Cable Enterprises Llc | Apparatus and methods for automated secondary content management in a digital network |
CN115314735A (en) * | 2021-05-08 | 2022-11-08 | 苏州国双软件有限公司 | Method, system and equipment for monitoring playing process |
US11503352B2 (en) | 2016-12-31 | 2022-11-15 | Turner Broadcasting System, Inc. | Dynamic scheduling and channel creation based on external data |
US11568016B2 (en) | 2012-04-17 | 2023-01-31 | Comcast Cable Communications, Llc | Self-validating data object locator for a media asset |
US11962821B2 (en) | 2016-12-31 | 2024-04-16 | Turner Broadcasting System, Inc. | Publishing a disparate live media output stream using pre-encoded media assets |
US12022142B2 (en) | 2016-12-31 | 2024-06-25 | Turner Broadcasting System, Inc. | Publishing a plurality of disparate live media output stream manifests using live input streams and pre-encoded media assets |
US12040890B2 (en) | 2016-12-31 | 2024-07-16 | Turner Broadcasting System, Inc. | Generating a live media segment asset |
US12099997B1 (en) | 2020-01-31 | 2024-09-24 | Steven Mark Hoffberg | Tokenized fungible liabilities |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10425242B2 (en) * | 2016-10-14 | 2019-09-24 | Microsoft Technology Licensing, Llc | IoT provisioning service |
US10798216B2 (en) | 2016-10-15 | 2020-10-06 | Microsoft Technology Licensing, Llc | Automatic provisioning of IoT devices |
CN110545448B (en) * | 2018-05-29 | 2021-12-14 | 北京字节跳动网络技术有限公司 | Media playing method and device based on data encryption and storage medium |
CN110381119B (en) * | 2019-06-20 | 2022-05-17 | 视联动力信息技术股份有限公司 | Method, system and device for acquiring log information and storage medium |
Citations (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040083177A1 (en) * | 2002-10-29 | 2004-04-29 | General Instrument Corporation | Method and apparatus for pre-encrypting VOD material with a changing cryptographic key |
US20080215755A1 (en) * | 1998-02-10 | 2008-09-04 | Level 3 Communications, Llc | Delivering resources to clients in a distributed computing environment with rendezvous based on load balancing and network conditions |
US20090006211A1 (en) * | 2007-07-01 | 2009-01-01 | Decisionmark Corp. | Network Content And Advertisement Distribution System and Method |
US20110231660A1 (en) * | 2010-03-22 | 2011-09-22 | Echostar Technologies Llc | Systems and methods for securely streaming media content |
US20110246616A1 (en) * | 2010-04-02 | 2011-10-06 | Ronca David R | Dynamic Virtual Chunking of Streaming Media Content |
US20110302624A1 (en) * | 2010-06-04 | 2011-12-08 | Xuemin Chen | Method and system for secure content distribution by a broadband gateway |
US8090104B2 (en) * | 2006-01-03 | 2012-01-03 | Irdeto Access B.V. | Method of descrambling a scrambled content data object |
US20120079523A1 (en) * | 2010-09-29 | 2012-03-29 | Verizon Patent And Licensing, Inc. | Unified video provisioning within a heterogeneous network environment |
US20120151077A1 (en) * | 2010-12-08 | 2012-06-14 | Paul Finster | Systems And Methods For Distributed Authentication Of Video Services |
US20120170741A1 (en) * | 2011-01-05 | 2012-07-05 | General Instrument Corporation | Secure live television streaming |
US20120173746A1 (en) * | 2010-12-29 | 2012-07-05 | Comcast Cable Communications, LLC. | Quality of Service for Distribution of Content to Network Devices |
US20120246462A1 (en) * | 2011-03-23 | 2012-09-27 | General Instrument Corporation | System and methods for providing live streaming content using digital rights management-based key management |
US20120284804A1 (en) * | 2011-05-02 | 2012-11-08 | Authentec, Inc. | System and method for protecting digital contents with digital rights management (drm) |
US20120324552A1 (en) * | 2011-06-15 | 2012-12-20 | Cbs Interactive, Inc. | System and Method for Securing Embedded Media |
US20130031578A1 (en) * | 2011-07-27 | 2013-01-31 | Telefonaktiebolaget L M Ericsson (Publ) | System and method for control of iptv multimedia content distribution |
US20130046849A1 (en) * | 2011-08-19 | 2013-02-21 | Ethan Wolf | Apparatus and methods for reduced switching delays in a content distribution network |
US20130132986A1 (en) * | 2011-11-17 | 2013-05-23 | General Instrument Corporation | Method and apparatus for network based adaptive streaming |
US20130174271A1 (en) * | 2010-05-04 | 2013-07-04 | Verimatrix, Inc. | Device authentication for secure key retrieval for streaming media players |
US20130219178A1 (en) * | 2012-02-17 | 2013-08-22 | Christopher Peter Xiques | Media Player Security for Full Length Episodes |
Family Cites Families (114)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5586121A (en) | 1995-04-21 | 1996-12-17 | Hybrid Networks, Inc. | Asymmetric hybrid access system and method |
AR020608A1 (en) | 1998-07-17 | 2002-05-22 | United Video Properties Inc | A METHOD AND A PROVISION TO SUPPLY A USER REMOTE ACCESS TO AN INTERACTIVE PROGRAMMING GUIDE BY A REMOTE ACCESS LINK |
US6917614B1 (en) | 1999-09-17 | 2005-07-12 | Arris International, Inc. | Multi-channel support for virtual private networks in a packet to ATM cell cable system |
US6769127B1 (en) | 2000-06-16 | 2004-07-27 | Minerva Networks, Inc. | Method and system for delivering media services and application over networks |
US8713623B2 (en) | 2001-09-20 | 2014-04-29 | Time Warner Cable Enterprises, LLC | Technique for effectively providing program material in a cable television system |
US7133365B2 (en) | 2001-11-02 | 2006-11-07 | Internap Network Services Corporation | System and method to provide routing control of information over networks |
US7149219B2 (en) | 2001-12-28 | 2006-12-12 | The Directtv Group, Inc. | System and method for content filtering using static source routes |
US20050034171A1 (en) | 2002-05-03 | 2005-02-10 | Robert Benya | Technique for delivering programming content based on a modified network personal video recorder service |
US7174126B2 (en) | 2002-05-03 | 2007-02-06 | Time Warner Interactive Video Group Inc. | Technique for effectively accessing programming listing information in an entertainment delivery system |
US9172915B2 (en) | 2004-08-04 | 2015-10-27 | Dizpersion Corporation | Method of operating a channel recommendation system |
US6917641B2 (en) | 2002-07-23 | 2005-07-12 | Motorola, Inc. | Method and apparatus for detecting software tampering in a subscriber device |
US7716700B2 (en) | 2002-11-25 | 2010-05-11 | Time Warner Interactive Video Group Inc. | Technique for delivering entertainment programming content including commercial content therein over a communications network |
US7454120B2 (en) | 2003-07-02 | 2008-11-18 | Macrovision Corporation | Methods and apparatus for client aggregation of television programming in a networked personal video recording system |
JP2005049834A (en) | 2003-07-11 | 2005-02-24 | Matsushita Electric Ind Co Ltd | Media data display device, media data display method, and media data display program |
US7457520B2 (en) | 2003-07-24 | 2008-11-25 | Time Warner Cable, Inc. | Technique for providing a virtual digital video recorder service through a communications network |
US9088819B2 (en) | 2003-09-11 | 2015-07-21 | Echostar Technologies L.L.C. | Method and apparatus for recording a video program for user instruction |
US8214256B2 (en) | 2003-09-15 | 2012-07-03 | Time Warner Cable Inc. | System and method for advertisement delivery within a video time shifting architecture |
US7380123B1 (en) | 2003-10-02 | 2008-05-27 | Symantec Corporation | Remote activation of covert service channels |
US7763360B2 (en) | 2004-10-29 | 2010-07-27 | E.I. Du Pont De Nemours And Company | Thermoplastic resin compositions suitable for use in transparent laminates |
US7486943B2 (en) | 2004-12-15 | 2009-02-03 | Mlb Advanced Media, L.P. | System and method for verifying access based on a determined geographic location of a subscriber of a service provided via a computer network |
US7539193B2 (en) | 2005-01-27 | 2009-05-26 | Time Warner Cable, Inc. | System and method for facilitating communication between a CMTS and an application server in a cable network |
US7602820B2 (en) | 2005-02-01 | 2009-10-13 | Time Warner Cable Inc. | Apparatus and methods for multi-stage multiplexing in a network |
US7639688B2 (en) | 2005-07-18 | 2009-12-29 | Cisco Technology, Inc. | Automatic protection of an SP infrastructure against exterior traffic |
US20070022459A1 (en) | 2005-07-20 | 2007-01-25 | Gaebel Thomas M Jr | Method and apparatus for boundary-based network operation |
US9286388B2 (en) | 2005-08-04 | 2016-03-15 | Time Warner Cable Enterprises Llc | Method and apparatus for context-specific content delivery |
US20070094691A1 (en) | 2005-10-24 | 2007-04-26 | Gazdzinski Robert F | Method and apparatus for on-demand content transmission and control over networks |
US8181209B2 (en) | 2005-11-21 | 2012-05-15 | Time Warner Cable Inc. | Methods and apparatus for providing video on demand and network PVR functions using IP streaming |
US8566887B2 (en) | 2005-12-09 | 2013-10-22 | Time Warner Cable Enterprises Llc | Caption data delivery apparatus and methods |
US7592912B2 (en) | 2005-12-09 | 2009-09-22 | Time Warner Cable Inc. | Emergency alert data delivery apparatus and methods |
US20070157228A1 (en) | 2005-12-30 | 2007-07-05 | Jason Bayer | Advertising with video ad creatives |
US20090248794A1 (en) | 2008-03-26 | 2009-10-01 | Time Warner Cable Inc | System and method for content sharing |
US8347341B2 (en) | 2006-03-16 | 2013-01-01 | Time Warner Cable Inc. | Methods and apparatus for centralized content and data delivery |
US8280982B2 (en) | 2006-05-24 | 2012-10-02 | Time Warner Cable Inc. | Personal content server apparatus and methods |
US8024762B2 (en) | 2006-06-13 | 2011-09-20 | Time Warner Cable Inc. | Methods and apparatus for providing virtual content over a network |
US20080027801A1 (en) | 2006-07-31 | 2008-01-31 | Sbc Knowledge Ventures L.P. | Method and system for advertisement insertion within an internet protocol television (IPTV) system |
US8255489B2 (en) | 2006-08-18 | 2012-08-28 | Akamai Technologies, Inc. | Method of data collection among participating content providers in a distributed network |
US20080066095A1 (en) | 2006-08-28 | 2008-03-13 | Ses Americom, Inc. | IPTV blackout management |
US8046479B2 (en) | 2006-11-07 | 2011-10-25 | Telefonaktiebolaget Lm Ericsson (Publ) | Media channel management |
CA2672735A1 (en) | 2006-12-13 | 2008-06-19 | Quickplay Media Inc. | Mobile media platform |
US20080168487A1 (en) | 2007-01-08 | 2008-07-10 | At&T Knowledge Ventures, L.P. | Software-based conditional access to IPTV content |
US20080201736A1 (en) | 2007-01-12 | 2008-08-21 | Ictv, Inc. | Using Triggers with Video for Interactive Content Identification |
US9262545B2 (en) | 2007-01-22 | 2016-02-16 | Syracuse University | Distributed video content management and sharing system |
DE102007005636B4 (en) | 2007-02-05 | 2008-11-13 | Infineon Technologies Ag | A method for generating a traffic encryption key, method for transmitting data, means for generating a traffic encryption key, data transmission arrangement |
US8472371B1 (en) | 2007-02-21 | 2013-06-25 | At&T Mobility Ii Llc | Roaming support for wireless access subscriber over fixed IP access networks |
US8073460B1 (en) | 2007-03-08 | 2011-12-06 | Amazon Technologies, Inc. | System and method for providing advertisement based on mobile device travel patterns |
US20080235746A1 (en) | 2007-03-20 | 2008-09-25 | Michael James Peters | Methods and apparatus for content delivery and replacement in a network |
US7895341B2 (en) | 2007-04-11 | 2011-02-22 | The Directv Group, Inc. | Method and apparatus for file sharing between a group of user devices with separately sent crucial portions and non-crucial portions |
US7954131B2 (en) | 2007-06-13 | 2011-05-31 | Time Warner Cable Inc. | Premises gateway apparatus and methods for use in a content-based network |
US20090076898A1 (en) | 2007-09-14 | 2009-03-19 | Yiqing Wang | System And Method For Delivering Offline Advertisement Supported Digital Content |
US20090077583A1 (en) | 2007-09-17 | 2009-03-19 | Sony Corporation | System, Apparatus, and Method for a Remote Commander for Internet Protocol Television |
US9071859B2 (en) | 2007-09-26 | 2015-06-30 | Time Warner Cable Enterprises Llc | Methods and apparatus for user-based targeted content delivery |
US8561116B2 (en) | 2007-09-26 | 2013-10-15 | Charles A. Hasek | Methods and apparatus for content caching in a video network |
US8392604B2 (en) | 2007-10-09 | 2013-03-05 | Yahoo! Inc. | Peer to peer browser content caching |
US8099757B2 (en) | 2007-10-15 | 2012-01-17 | Time Warner Cable Inc. | Methods and apparatus for revenue-optimized delivery of content in a network |
US20090119703A1 (en) | 2007-11-02 | 2009-05-07 | At&T Knowledge Ventures, L.P. | Mosaic of Alternate Programming During a Blackout |
US9503691B2 (en) | 2008-02-19 | 2016-11-22 | Time Warner Cable Enterprises Llc | Methods and apparatus for enhanced advertising and promotional delivery in a network |
US20090228941A1 (en) | 2008-03-05 | 2009-09-10 | At&T Intellectual Property, Lp | Video System and a Method of Using the Video System |
US8095610B2 (en) | 2008-03-28 | 2012-01-10 | Time Warner Cable Inc. | Methods and apparatus for centralized and decentralized emergency alert messaging |
US20100036720A1 (en) | 2008-04-11 | 2010-02-11 | Microsoft Corporation | Ubiquitous intent-based customer incentive scheme |
US8719572B2 (en) | 2008-07-16 | 2014-05-06 | Disney Enterprises, Inc. | System and method for managing authentication cookie encryption keys |
US9286045B2 (en) | 2008-08-18 | 2016-03-15 | Infosys Limited | Method and system for providing applications to various devices |
US8090014B2 (en) | 2008-10-06 | 2012-01-03 | Hewlett-Packard Development Company, L.P. | Managing multiview streaming video data composed of frames |
US8321904B2 (en) | 2008-11-05 | 2012-11-27 | At&T Intellectual Property I, L.P. | System and method to enable access to broadband services |
US9049477B2 (en) * | 2008-11-13 | 2015-06-02 | At&T Intellectual Property I, Lp | Apparatus and method for managing media content |
US8341242B2 (en) | 2008-11-24 | 2012-12-25 | Time Warner Cable, Inc. | System and method for managing entitlements to data over a network |
US20100132003A1 (en) | 2008-11-25 | 2010-05-27 | Bennett James D | Providing Wireless Pathway Adapter Support Via Set-Top Boxes |
US8010691B2 (en) | 2008-12-29 | 2011-08-30 | Cisco Technology, Inc. | Content tagging of media streams |
US8572645B2 (en) | 2009-01-18 | 2013-10-29 | Lg Electronics Inc. | IPTV and method for controlling emergency alert system widget in IPTV |
US11076189B2 (en) | 2009-03-30 | 2021-07-27 | Time Warner Cable Enterprises Llc | Personal media channel apparatus and methods |
US8458751B2 (en) | 2009-04-14 | 2013-06-04 | Echostar Technologies L.L.C. | Systems and methods for accessing selected packetized programming streams |
US20100262461A1 (en) | 2009-04-14 | 2010-10-14 | Mypoints.Com Inc. | System and Method for Web-Based Consumer-to-Business Referral |
EP2438742B1 (en) * | 2009-06-03 | 2013-12-18 | Telefonaktiebolaget LM Ericsson (publ) | Method and node for distributing electronic content in a content distribution network |
US9602864B2 (en) | 2009-06-08 | 2017-03-21 | Time Warner Cable Enterprises Llc | Media bridge apparatus and methods |
US9445036B2 (en) | 2009-06-30 | 2016-09-13 | Rovi Guides, Inc. | Methods and systems for content scheduling across multiple devices |
US8935721B2 (en) | 2009-07-15 | 2015-01-13 | Time Warner Cable Enterprises Llc | Methods and apparatus for classifying an audience in a content distribution network |
US8813124B2 (en) | 2009-07-15 | 2014-08-19 | Time Warner Cable Enterprises Llc | Methods and apparatus for targeted secondary content insertion |
CA2822185C (en) * | 2009-08-14 | 2014-04-22 | Azuki Systems, Inc. | Method and system for unified mobile content protection |
US20110055866A1 (en) | 2009-08-31 | 2011-03-03 | At&T Intellectual Property I, Lp. | Updating electronic programming guides with blackout data |
US9203816B2 (en) * | 2009-09-04 | 2015-12-01 | Echostar Technologies L.L.C. | Controlling access to copies of media content by a client device |
CA2824754A1 (en) | 2009-09-26 | 2011-03-31 | Disternet Technology Inc. | System and method for micro-cloud computing |
US9438861B2 (en) | 2009-10-06 | 2016-09-06 | Microsoft Technology Licensing, Llc | Integrating continuous and sparse streaming data |
US8396055B2 (en) | 2009-10-20 | 2013-03-12 | Time Warner Cable Inc. | Methods and apparatus for enabling media functionality in a content-based network |
US9027062B2 (en) | 2009-10-20 | 2015-05-05 | Time Warner Cable Enterprises Llc | Gateway apparatus and methods for digital content delivery in a network |
US10264029B2 (en) | 2009-10-30 | 2019-04-16 | Time Warner Cable Enterprises Llc | Methods and apparatus for packetized content delivery over a content delivery network |
US9519728B2 (en) | 2009-12-04 | 2016-12-13 | Time Warner Cable Enterprises Llc | Apparatus and methods for monitoring and optimizing delivery of content in a network |
US8789077B2 (en) | 2009-12-23 | 2014-07-22 | Verizon Patent And Licensing Inc. | Method and system for facilitating network connectivity and consumption of broadband services |
CN102123476B (en) | 2010-01-08 | 2015-04-01 | 中兴通讯股份有限公司 | Method and system for transmitting multi-carrier uplink data on network side |
JP2013519162A (en) | 2010-02-01 | 2013-05-23 | ジャンプタップ,インコーポレイテッド | Integrated advertising system |
US8290542B2 (en) | 2010-03-12 | 2012-10-16 | Cequint, Inc. | Systems and methods for improved content delivery to mobile communication devices |
US8701138B2 (en) | 2010-04-23 | 2014-04-15 | Time Warner Cable Enterprises Llc | Zone control methods and apparatus |
US20110264530A1 (en) | 2010-04-23 | 2011-10-27 | Bryan Santangelo | Apparatus and methods for dynamic secondary content and data insertion and delivery |
AU2011268104B2 (en) * | 2010-06-18 | 2016-12-15 | Akamai Technologies, Inc. | Extending a content delivery network (CDN) into a mobile or wireline network |
US9906838B2 (en) | 2010-07-12 | 2018-02-27 | Time Warner Cable Enterprises Llc | Apparatus and methods for content delivery and message exchange across multiple content delivery networks |
US9425977B2 (en) | 2010-09-27 | 2016-08-23 | Time Warner Cable Enterprises Llc | Dynamic changing tier service on test device |
US9015270B2 (en) | 2010-10-08 | 2015-04-21 | Time Warner Cable Enterprises Llc | Apparatus and methods for enforcing content protection rules during data transfer between devices |
US8832726B2 (en) * | 2010-11-17 | 2014-09-09 | Verizon Patent And Licensing Inc. | Video streaming entitlement determined based on the location of the viewer |
US20120137332A1 (en) | 2010-11-26 | 2012-05-31 | Pranay Kumar | Mobile tv delivery system |
US9264750B2 (en) | 2010-12-23 | 2016-02-16 | Verizon Patent And Licensing Inc. | Advertising insertion for playback of video streams on user devices |
WO2012094487A2 (en) | 2011-01-05 | 2012-07-12 | General Instrument Corporation | Secure progressive download for media content playback |
GB2483125B (en) * | 2011-02-25 | 2012-09-26 | British Sky Broadcasting Ltd | Media system |
US8813116B2 (en) * | 2011-04-27 | 2014-08-19 | Morega Systems Inc. | Adaptive video server with virtual file system and methods for use therewith |
US8848969B2 (en) * | 2011-06-06 | 2014-09-30 | Time Warner Cable Enterprises Llc | Methods and apparatus for watermarking and distributing watermarked content |
US20130133010A1 (en) | 2011-06-13 | 2013-05-23 | General Instrument Corporation | Object model delivering live tv programming streams to different client device |
WO2013043918A1 (en) | 2011-09-21 | 2013-03-28 | General Instrument Corporation | Adaptive streaming to multicast and constrained-fidelity constant bit rate encoding |
US8806193B2 (en) | 2011-12-22 | 2014-08-12 | Adobe Systems Incorporated | Methods and apparatus for integrating digital rights management (DRM) systems with native HTTP live streaming |
US20130227283A1 (en) | 2012-02-23 | 2013-08-29 | Louis Williamson | Apparatus and methods for providing content to an ip-enabled device in a content distribution network |
US9426123B2 (en) | 2012-02-23 | 2016-08-23 | Time Warner Cable Enterprises Llc | Apparatus and methods for content distribution to packet-enabled devices via a network bridge |
US8838149B2 (en) | 2012-04-02 | 2014-09-16 | Time Warner Cable Enterprises Llc | Apparatus and methods for ensuring delivery of geographically relevant content |
US9021566B1 (en) | 2012-05-31 | 2015-04-28 | Starnet Communications Corporation | Apparatus and method to securely connect to and manage X11 applications on a remote system through an HTTP client |
CN110491449B (en) | 2012-07-06 | 2023-08-08 | 河谷控股Ip有限责任公司 | Management of healthcare analytic flows |
US9161095B2 (en) | 2013-02-22 | 2015-10-13 | Arris Technology, Inc. | Extending blackout control |
US20140259182A1 (en) | 2013-03-06 | 2014-09-11 | Sony Dadc Us Inc. | System and method for managing media content |
US9472091B2 (en) | 2013-10-21 | 2016-10-18 | Time Warner Cable Enterprises Llc | Systems and methods for providing emergency alerts |
US20150163540A1 (en) | 2013-12-06 | 2015-06-11 | Zenverge, Inc. | Bandwidth Reclamation Using IP Infrastructure For Video Content Delivery |
-
2012
- 2012-02-23 US US13/403,802 patent/US20130227283A1/en not_active Abandoned
- 2012-02-29 CA CA2769893A patent/CA2769893C/en active Active
-
2015
- 2015-11-30 US US14/954,754 patent/US9992520B2/en active Active
Patent Citations (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080215755A1 (en) * | 1998-02-10 | 2008-09-04 | Level 3 Communications, Llc | Delivering resources to clients in a distributed computing environment with rendezvous based on load balancing and network conditions |
US20040083177A1 (en) * | 2002-10-29 | 2004-04-29 | General Instrument Corporation | Method and apparatus for pre-encrypting VOD material with a changing cryptographic key |
US8090104B2 (en) * | 2006-01-03 | 2012-01-03 | Irdeto Access B.V. | Method of descrambling a scrambled content data object |
US20090006211A1 (en) * | 2007-07-01 | 2009-01-01 | Decisionmark Corp. | Network Content And Advertisement Distribution System and Method |
US20110231660A1 (en) * | 2010-03-22 | 2011-09-22 | Echostar Technologies Llc | Systems and methods for securely streaming media content |
US20110246616A1 (en) * | 2010-04-02 | 2011-10-06 | Ronca David R | Dynamic Virtual Chunking of Streaming Media Content |
US20130174271A1 (en) * | 2010-05-04 | 2013-07-04 | Verimatrix, Inc. | Device authentication for secure key retrieval for streaming media players |
US20110302624A1 (en) * | 2010-06-04 | 2011-12-08 | Xuemin Chen | Method and system for secure content distribution by a broadband gateway |
US20120079523A1 (en) * | 2010-09-29 | 2012-03-29 | Verizon Patent And Licensing, Inc. | Unified video provisioning within a heterogeneous network environment |
US20120151077A1 (en) * | 2010-12-08 | 2012-06-14 | Paul Finster | Systems And Methods For Distributed Authentication Of Video Services |
US20120173746A1 (en) * | 2010-12-29 | 2012-07-05 | Comcast Cable Communications, LLC. | Quality of Service for Distribution of Content to Network Devices |
US20120170741A1 (en) * | 2011-01-05 | 2012-07-05 | General Instrument Corporation | Secure live television streaming |
US20120246462A1 (en) * | 2011-03-23 | 2012-09-27 | General Instrument Corporation | System and methods for providing live streaming content using digital rights management-based key management |
US20120284804A1 (en) * | 2011-05-02 | 2012-11-08 | Authentec, Inc. | System and method for protecting digital contents with digital rights management (drm) |
US20120324552A1 (en) * | 2011-06-15 | 2012-12-20 | Cbs Interactive, Inc. | System and Method for Securing Embedded Media |
US20130031578A1 (en) * | 2011-07-27 | 2013-01-31 | Telefonaktiebolaget L M Ericsson (Publ) | System and method for control of iptv multimedia content distribution |
US20130046849A1 (en) * | 2011-08-19 | 2013-02-21 | Ethan Wolf | Apparatus and methods for reduced switching delays in a content distribution network |
US20130132986A1 (en) * | 2011-11-17 | 2013-05-23 | General Instrument Corporation | Method and apparatus for network based adaptive streaming |
US20130219178A1 (en) * | 2012-02-17 | 2013-08-22 | Christopher Peter Xiques | Media Player Security for Full Length Episodes |
Cited By (94)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11132720B2 (en) * | 2001-05-11 | 2021-09-28 | Iheartmedia Management Services, Inc. | Media delivery to limited capability platforms |
US20140236739A1 (en) * | 2001-05-11 | 2014-08-21 | Clear Channel Management Services, Inc. | Media delivery to limited capability platforms |
US10313755B2 (en) | 2009-03-30 | 2019-06-04 | Time Warner Cable Enterprises Llc | Recommendation engine apparatus and methods |
US11012749B2 (en) | 2009-03-30 | 2021-05-18 | Time Warner Cable Enterprises Llc | Recommendation engine apparatus and methods |
US11659224B2 (en) | 2009-03-30 | 2023-05-23 | Time Warner Cable Enterprises Llc | Personal media channel apparatus and methods |
US11076189B2 (en) | 2009-03-30 | 2021-07-27 | Time Warner Cable Enterprises Llc | Personal media channel apparatus and methods |
US9380329B2 (en) | 2009-03-30 | 2016-06-28 | Time Warner Cable Enterprises Llc | Personal media channel apparatus and methods |
US11122316B2 (en) | 2009-07-15 | 2021-09-14 | Time Warner Cable Enterprises Llc | Methods and apparatus for targeted secondary content insertion |
US10863238B2 (en) | 2010-04-23 | 2020-12-08 | Time Warner Cable Enterprise LLC | Zone control methods and apparatus |
US9992520B2 (en) | 2012-02-23 | 2018-06-05 | Time Warner Cable Enterprises Llc | Apparatus and methods for providing content to an IP-enabled device in a content distribution network |
US20130227284A1 (en) * | 2012-02-23 | 2013-08-29 | Howard Pfeffer | Apparatus and methods for content distribution to packet-enabled devices via a network bridge |
US11455376B2 (en) * | 2012-02-23 | 2022-09-27 | Time Warner Cable Enterprises Llc | Apparatus and methods for content distribution to packet-enabled devices via a network bridge |
US10389853B2 (en) | 2012-02-23 | 2019-08-20 | Time Warner Cable Enterprises Llc | Apparatus and methods for content distribution to packet-enabled devices via a network bridge |
US9426123B2 (en) * | 2012-02-23 | 2016-08-23 | Time Warner Cable Enterprises Llc | Apparatus and methods for content distribution to packet-enabled devices via a network bridge |
US10516755B2 (en) | 2012-04-02 | 2019-12-24 | Time Warner Cable Enterprises Llc | Apparatus and methods for ensuring delivery of geographically relevant content |
US8838149B2 (en) | 2012-04-02 | 2014-09-16 | Time Warner Cable Enterprises Llc | Apparatus and methods for ensuring delivery of geographically relevant content |
US9900401B2 (en) | 2012-04-02 | 2018-02-20 | Time Warner Cable Enterprises Llc | Apparatus and methods for ensuring delivery of geographically relevant content |
US11323539B2 (en) | 2012-04-02 | 2022-05-03 | Time Warner Cable Enterprises Llc | Apparatus and methods for ensuring delivery of geographically relevant content |
US9467723B2 (en) | 2012-04-04 | 2016-10-11 | Time Warner Cable Enterprises Llc | Apparatus and methods for automated highlight reel creation in a content delivery network |
US10250932B2 (en) | 2012-04-04 | 2019-04-02 | Time Warner Cable Enterprises Llc | Apparatus and methods for automated highlight reel creation in a content delivery network |
US11109090B2 (en) | 2012-04-04 | 2021-08-31 | Time Warner Cable Enterprises Llc | Apparatus and methods for automated highlight reel creation in a content delivery network |
US11886528B2 (en) | 2012-04-17 | 2024-01-30 | Comcast Cable Communications, Llc | Self-validating data object locator for a media asset |
US11568016B2 (en) | 2012-04-17 | 2023-01-31 | Comcast Cable Communications, Llc | Self-validating data object locator for a media asset |
US20140033081A1 (en) * | 2012-07-27 | 2014-01-30 | Cbs Interactive Inc. | Content personalization system |
US10715961B2 (en) | 2012-08-30 | 2020-07-14 | Time Warner Cable Enterprises Llc | Apparatus and methods for enabling location-based services within a premises |
US10278008B2 (en) | 2012-08-30 | 2019-04-30 | Time Warner Cable Enterprises Llc | Apparatus and methods for enabling location-based services within a premises |
US11368502B2 (en) * | 2012-12-11 | 2022-06-21 | Kajeet, Inc. | Selective service control to mobile IP network |
US10826950B2 (en) | 2012-12-11 | 2020-11-03 | Kajeet, Inc. | Selective service control to mobile IP network |
US20140164616A1 (en) * | 2012-12-11 | 2014-06-12 | Kajeet, Inc. | Selective access control to mobile ip network |
US10057300B2 (en) * | 2012-12-11 | 2018-08-21 | Kajeet, Inc. | Selective access control to mobile IP network |
US20140237505A1 (en) * | 2013-02-15 | 2014-08-21 | Cox Communications, Inc. | Network-based digital video recorder playback adapter |
US9369288B1 (en) * | 2013-03-15 | 2016-06-14 | Startal, Inc. | Video data delivery protection |
WO2015042611A1 (en) * | 2013-09-23 | 2015-03-26 | Visible World, Inc. | Systems and methods for cache-based content delivery |
US11870839B2 (en) | 2013-09-23 | 2024-01-09 | Freewheel Media, Inc. | Systems and methods for cache-based content delivery |
US9888050B2 (en) * | 2013-09-24 | 2018-02-06 | Verizon Patent And Licensing Inc. | Method and apparatus for integrating various network elements and providing media processing services |
US20150089035A1 (en) * | 2013-09-24 | 2015-03-26 | Verizon Patent And Licensing Inc. | Method and apparatus for integrating various network elements and providing media processing serivices |
WO2015048853A1 (en) * | 2013-10-02 | 2015-04-09 | National Ict Australia Limited | Selecting advertisements |
US20150242597A1 (en) * | 2014-02-24 | 2015-08-27 | Google Inc. | Transferring authorization from an authenticated device to an unauthenticated device |
US10028025B2 (en) | 2014-09-29 | 2018-07-17 | Time Warner Cable Enterprises Llc | Apparatus and methods for enabling presence-based and use-based services |
US11082743B2 (en) | 2014-09-29 | 2021-08-03 | Time Warner Cable Enterprises Llc | Apparatus and methods for enabling presence-based and use-based services |
US9407968B2 (en) * | 2014-12-22 | 2016-08-02 | Verizon Patent And Licensing Inc. | Multicast and unicast adaptive bitrate services |
US11057408B2 (en) | 2015-02-13 | 2021-07-06 | Time Warner Cable Enterprises Llc | Apparatus and methods for data collection, analysis and service modification based on online activity |
US11606380B2 (en) | 2015-02-13 | 2023-03-14 | Time Warner Cable Enterprises Llc | Apparatus and methods for data collection, analysis and service modification based on online activity |
US10116676B2 (en) | 2015-02-13 | 2018-10-30 | Time Warner Cable Enterprises Llc | Apparatus and methods for data collection, analysis and service modification based on online activity |
US20170005992A1 (en) * | 2015-03-09 | 2017-01-05 | Vadium Technology Corporation | Secure message transmission using dynamic segmentation and encryption |
US10075419B2 (en) | 2015-03-20 | 2018-09-11 | Nagravision S.A. | Method and device to protect a decrypted media content before transmission to a consumption device |
EP3070629A1 (en) * | 2015-03-20 | 2016-09-21 | Nagravision S.A. | Method and device to protect a decrypted media content before transmission to a consumption device |
US11528128B2 (en) * | 2015-10-01 | 2022-12-13 | Time Warner Cable Enterprises Llc | Encryption management, content recording management, and playback management in a network environment |
US20170099136A1 (en) * | 2015-10-01 | 2017-04-06 | Time Warner Cable Enterprises Llc | Encryption management, content recording management, and playback management in a network environment |
US9917690B2 (en) * | 2015-10-01 | 2018-03-13 | Time Warner Cable Enterprises Llc | Encryption management, content recording management, and playback management in a network environment |
EP3229162A1 (en) * | 2016-04-05 | 2017-10-11 | Telia Company AB | Access management for digital content |
US10789336B2 (en) | 2016-04-05 | 2020-09-29 | Telia Company Ab | Access management for digital content |
US11669595B2 (en) | 2016-04-21 | 2023-06-06 | Time Warner Cable Enterprises Llc | Methods and apparatus for secondary content management and fraud prevention |
US10586023B2 (en) | 2016-04-21 | 2020-03-10 | Time Warner Cable Enterprises Llc | Methods and apparatus for secondary content management and fraud prevention |
US11212593B2 (en) | 2016-09-27 | 2021-12-28 | Time Warner Cable Enterprises Llc | Apparatus and methods for automated secondary content management in a digital network |
US12040890B2 (en) | 2016-12-31 | 2024-07-16 | Turner Broadcasting System, Inc. | Generating a live media segment asset |
US11051074B2 (en) | 2016-12-31 | 2021-06-29 | Turner Broadcasting System, Inc. | Publishing disparate live media output streams using live input streams |
US11051061B2 (en) | 2016-12-31 | 2021-06-29 | Turner Broadcasting System, Inc. | Publishing a disparate live media output stream using pre-encoded media assets |
US11038932B2 (en) | 2016-12-31 | 2021-06-15 | Turner Broadcasting System, Inc. | System for establishing a shared media session for one or more client devices |
US10992973B2 (en) | 2016-12-31 | 2021-04-27 | Turner Broadcasting System, Inc. | Publishing a plurality of disparate live media output stream manifests using live input streams and pre-encoded media assets |
US11665398B2 (en) | 2016-12-31 | 2023-05-30 | Turner Broadcasting System, Inc. | Creation of channels using pre-encoded media assets |
US11109086B2 (en) | 2016-12-31 | 2021-08-31 | Turner Broadcasting System, Inc. | Publishing disparate live media output streams in mixed mode |
US10965967B2 (en) | 2016-12-31 | 2021-03-30 | Turner Broadcasting System, Inc. | Publishing a disparate per-client live media output stream based on dynamic insertion of targeted non-programming content and customized programming content |
US11134309B2 (en) | 2016-12-31 | 2021-09-28 | Turner Broadcasting System, Inc. | Creation of channels using pre-encoded media assets |
US11917217B2 (en) | 2016-12-31 | 2024-02-27 | Turner Broadcasting System, Inc. | Publishing disparate live media output streams in mixed mode based on user selection publishing disparate live media output streams in mixed mode based on user selection |
US11962821B2 (en) | 2016-12-31 | 2024-04-16 | Turner Broadcasting System, Inc. | Publishing a disparate live media output stream using pre-encoded media assets |
US11974017B2 (en) | 2016-12-31 | 2024-04-30 | Turner Broadcasting System, Inc. | Publishing disparate live media output streams using live input streams |
US12022142B2 (en) | 2016-12-31 | 2024-06-25 | Turner Broadcasting System, Inc. | Publishing a plurality of disparate live media output stream manifests using live input streams and pre-encoded media assets |
US10856016B2 (en) | 2016-12-31 | 2020-12-01 | Turner Broadcasting System, Inc. | Publishing disparate live media output streams in mixed mode based on user selection |
US11503352B2 (en) | 2016-12-31 | 2022-11-15 | Turner Broadcasting System, Inc. | Dynamic scheduling and channel creation based on external data |
US10750224B2 (en) | 2016-12-31 | 2020-08-18 | Turner Broadcasting System, Inc. | Dynamic scheduling and channel creation based on user selection |
US12058396B2 (en) | 2016-12-31 | 2024-08-06 | Turner Broadcasting System, Inc. | Publishing disparate live media output streams in mixed mode |
US12069339B2 (en) | 2016-12-31 | 2024-08-20 | Turner Broadcasting System, Inc. | Creation of channels using pre-encoded media assets |
US11095942B2 (en) | 2017-05-25 | 2021-08-17 | Turner Broadcasting System, Inc. | Rules-based delivery and presentation of non-programming media items at client device |
US11051073B2 (en) | 2017-05-25 | 2021-06-29 | Turner Broadcasting System, Inc. | Client-side overlay of graphic items on media content |
US11297386B2 (en) | 2017-05-25 | 2022-04-05 | Turner Broadcasting System, Inc. | Delivery of different services through different client devices |
US11245964B2 (en) | 2017-05-25 | 2022-02-08 | Turner Broadcasting System, Inc. | Management and delivery of over-the-top services over different content-streaming systems |
US11228809B2 (en) | 2017-05-25 | 2022-01-18 | Turner Broadcasting System, Inc. | Delivery of different services through different client devices |
US11109102B2 (en) | 2017-05-25 | 2021-08-31 | Turner Broadcasting System, Inc. | Dynamic verification of playback of media assets at client device |
US12108113B2 (en) | 2017-05-25 | 2024-10-01 | Turner Broadcasting System, Inc. | Delivery of different services through different client devices |
US10827220B2 (en) | 2017-05-25 | 2020-11-03 | Turner Broadcasting System, Inc. | Client-side playback of personalized media content generated dynamically for event opportunities in programming media content |
US12028575B2 (en) | 2017-05-25 | 2024-07-02 | Turner Broadcasting System, Inc. | Rules-based delivery and presentation of non-programming media items at client device |
US10939169B2 (en) | 2017-05-25 | 2021-03-02 | Turner Broadcasting System, Inc. | Concurrent presentation of non-programming media assets with programming media content at client device |
US10924804B2 (en) | 2017-05-25 | 2021-02-16 | Turner Broadcasting System, Inc. | Dynamic verification of playback of media assets at client device |
US12075123B2 (en) | 2017-05-25 | 2024-08-27 | Turner Broadcasting System, Inc. | Concurrent presentation of non-programming media assets with programming media content at client device |
US10997320B1 (en) * | 2018-01-31 | 2021-05-04 | EMC IP Holding Company LLC | Segment-based personalized cache architecture |
US12081597B2 (en) | 2018-07-17 | 2024-09-03 | Turner Broadcasting System, Inc. | System for establishing a shared media session for one or more client devices |
US10880606B2 (en) * | 2018-12-21 | 2020-12-29 | Turner Broadcasting System, Inc. | Disparate live media output stream playout and broadcast distribution |
US20200204861A1 (en) * | 2018-12-21 | 2020-06-25 | Turner Broadcasting Systems, Inc. | Disparate live media output stream playout and broadcast distribution |
US11082734B2 (en) | 2018-12-21 | 2021-08-03 | Turner Broadcasting System, Inc. | Publishing a disparate live media output stream that complies with distribution format regulations |
US20200204834A1 (en) | 2018-12-22 | 2020-06-25 | Turner Broadcasting Systems, Inc. | Publishing a Disparate Live Media Output Stream Manifest That Includes One or More Media Segments Corresponding to Key Events |
US10873774B2 (en) | 2018-12-22 | 2020-12-22 | Turner Broadcasting System, Inc. | Publishing a disparate live media output stream manifest that includes one or more media segments corresponding to key events |
US12099997B1 (en) | 2020-01-31 | 2024-09-24 | Steven Mark Hoffberg | Tokenized fungible liabilities |
CN115314735A (en) * | 2021-05-08 | 2022-11-08 | 苏州国双软件有限公司 | Method, system and equipment for monitoring playing process |
Also Published As
Publication number | Publication date |
---|---|
US9992520B2 (en) | 2018-06-05 |
CA2769893C (en) | 2019-05-07 |
CA2769893A1 (en) | 2013-08-23 |
US20160165268A1 (en) | 2016-06-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9992520B2 (en) | Apparatus and methods for providing content to an IP-enabled device in a content distribution network | |
US11455376B2 (en) | Apparatus and methods for content distribution to packet-enabled devices via a network bridge | |
US10958629B2 (en) | Apparatus and methods for content transfer protection | |
US11831955B2 (en) | Apparatus and methods for content management and account linking across multiple content delivery networks | |
US10219017B2 (en) | Apparatus and methods for multicast delivery of content in a content delivery network | |
US20180316979A1 (en) | Apparatus and methods for packetized content delivery over a bandwidth-efficient network | |
US9374619B2 (en) | System and method for enabling pairing of a companion device with a mate device for performing a companion device | |
US8280982B2 (en) | Personal content server apparatus and methods | |
US9232268B2 (en) | Unified video delivery system for supporting IP video streaming service | |
US20140282777A1 (en) | Apparatus and methods for delivery of multicast and unicast content in a content delivery network | |
US9398338B2 (en) | Utilization of remote control to display media | |
WO2011053858A1 (en) | Methods and apparatus for packetized content delivery over a content delivery network |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: TIME WARNER CABLE INC., NEW YORK Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:WILLIAMSON, LOUIS;HELMS, WILLIAM L.;PFEFFER, HOWARD;AND OTHERS;SIGNING DATES FROM 20120430 TO 20120625;REEL/FRAME:029457/0004 |
|
AS | Assignment |
Owner name: TIME WARNER CABLE ENTERPRISES LLC, NEW YORK Free format text: CONTRIBUTION AGREEMENT;ASSIGNOR:TIME WARNER CABLE INC.;REEL/FRAME:030281/0473 Effective date: 20121231 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |
|
AS | Assignment |
Owner name: TIME WARNER CABLE ENTERPRISES LLC, NEW YORK Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE CONTRIBUTION AGREEMENT EXECUTED 12-31-2012 - AGREEMENT SHOULD NOT BE RECORDED AGAINST APPLICATION NUMBER 12131649. PREVIOUSLY RECORDED AT REEL: 030281 FRAME: 0473. ASSIGNOR(S) HEREBY CONFIRMS THE;ASSIGNOR:TIME WARNER CABLE INC.;REEL/FRAME:039903/0204 Effective date: 20121231 |
|
AS | Assignment |
Owner name: TIME WARNER CABLE ENTERPRISES LLC, MISSOURI Free format text: CHANGE OF ADDRESS;ASSIGNOR:TIME WARNER CABLE ENTERPRISES LLC;REEL/FRAME:044456/0167 Effective date: 20160601 |