WO2003071737A1 - Authentification de trafic de programmation de medias verifies realisee sur reseau informatique - Google Patents

Authentification de trafic de programmation de medias verifies realisee sur reseau informatique Download PDF

Info

Publication number
WO2003071737A1
WO2003071737A1 PCT/US2001/050035 US0150035W WO03071737A1 WO 2003071737 A1 WO2003071737 A1 WO 2003071737A1 US 0150035 W US0150035 W US 0150035W WO 03071737 A1 WO03071737 A1 WO 03071737A1
Authority
WO
WIPO (PCT)
Prior art keywords
media
traffic
server
secure
medium
Prior art date
Application number
PCT/US2001/050035
Other languages
English (en)
Inventor
Clarke Randolph Hill
Aaron D. Starr
Original Assignee
Measurecast.Com, Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Measurecast.Com, Inc. filed Critical Measurecast.Com, Inc.
Priority to PCT/US2001/050035 priority Critical patent/WO2003071737A1/fr
Priority to AU2002239686A priority patent/AU2002239686A1/en
Publication of WO2003071737A1 publication Critical patent/WO2003071737A1/fr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/60Network streaming of media packets
    • H04L65/61Network streaming of media packets for supporting one-way streaming services, e.g. Internet radio
    • H04L65/611Network streaming of media packets for supporting one-way streaming services, e.g. Internet radio for multicast or broadcast
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/24Monitoring of processes or resources, e.g. monitoring of server load, available bandwidth, upstream requests
    • H04N21/2407Monitoring of transmitted content, e.g. distribution time, number of downloads
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/254Management at additional data server, e.g. shopping server, rights management server
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/258Client or end-user data management, e.g. managing client capabilities, user preferences or demographics, processing of multiple end-users preferences to derive collaborative data
    • H04N21/25808Management of client data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/258Client or end-user data management, e.g. managing client capabilities, user preferences or demographics, processing of multiple end-users preferences to derive collaborative data
    • H04N21/25866Management of end-user data
    • H04N21/25883Management of end-user data being end-user demographical data, e.g. age, family status or address
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/41Structure of client; Structure of client peripherals
    • H04N21/426Internal components of the client ; Characteristics thereof
    • H04N21/42684Client identification by a unique number or address, e.g. serial number, MAC address, socket ID
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/47End-user applications
    • H04N21/475End-user interface for inputting end-user data, e.g. personal identification number [PIN], preference data
    • H04N21/4753End-user interface for inputting end-user data, e.g. personal identification number [PIN], preference data for user identification, e.g. by entering a PIN or password
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/60Network structure or processes for video distribution between server and client or between remote clients; Control signalling between clients, server and network components; Transmission of management data between server and client, e.g. sending from server to client commands for recording incoming content stream; Communication details between server and client 
    • H04N21/61Network physical structure; Signal processing
    • H04N21/6106Network physical structure; Signal processing specially adapted to the downstream path of the transmission network
    • H04N21/6125Network physical structure; Signal processing specially adapted to the downstream path of the transmission network involving transmission via Internet
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/80Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
    • H04N21/81Monomedia components thereof
    • H04N21/812Monomedia components thereof involving advertisement data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/80Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
    • H04N21/83Generation or processing of protective or descriptive data associated with content; Content structuring
    • H04N21/835Generation of protective data, e.g. certificates
    • H04N21/8358Generation of protective data, e.g. certificates involving watermark
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/16Analogue secrecy systems; Analogue subscription systems
    • H04N7/173Analogue secrecy systems; Analogue subscription systems with two-way working, e.g. subscriber sending a programme selection signal
    • H04N7/17309Transmission or handling of upstream communications
    • H04N7/17318Direct or substantially direct transmission and handling of requests

Definitions

  • the present invention relates to measuring media traffic of audio or video programming delivered over a computer network and, in particular, to providing secure measurement of such media traffic.
  • Background and Summary of the Invention In many countries, conventional broadcast radio and television programming are supported by advertising in the form of commercials that are interspersed throughout the programming. The costs for advertising during different radio and television shows depend upon sampled measurements of the numbers of people who listen to or watch those shows. (For purposes of simplicity, listeners and viewers are both referred to as viewers herein.) The most famous sampled measurements for programming are the Nielson ratings provided by Nielsen Media Research, Inc. and the Arbitron ratings provided by the Arbitron Company.
  • Such sampled measurement of the viewers of online programming suffers from the disadvantage that many online broadcast programming sites might have insufficient traffic to be accurately measured by such sampling. Moreover, such sampling fails to utilize computer network transmission information that is commonly available in the form of network server log files.
  • a conventional log file typically includes a simple text listing of each file (e.g., media stream) that is transmitted by a media server to a client computer.
  • a conventional log file typically will include information such as which media stream was transmitted (or requested), a network address (e.g., TCP/IP) identification of the client computer that requested (or to which was transmitted) the media stream, and the network browsing software and operating system of the client computer.
  • a conventional server log file is readily available to the operator of a server computer so that access to and usage of the server can be monitored. Numerous software utilities are available to provide summaries of usage information included in conventional server log files. Such usage information can be used by the operator of a server computer to discern usage patterns and correlate them with various business or marketing factors.
  • a media traffic authentication method provides authenticated server-side information about transmission of selected programming (e.g., advertisements) over a computer network from a media server. This method overcomes the limitations of conventional receiver-side monitoring of selected programming utilized for conventional or universal broadcasting.
  • the method includes obtaining at the media server a secure verification signature from a media stream (e.g., an advertisement or portion of it) that is transmitted over a computer network from the media server.
  • the secure verification signature may include a digital watermark that is imperceptibly embedded in the media stream or a checksum value that is calculated from the media stream, or a portion of it.
  • a media traffic log is generated at the media server and includes information from the secure verification signature.
  • the media traffic log is secure (e.g., encrypted or digitally signed) with regard to the operator of the media server.
  • the media traffic log is transmitted to a media traffic authentication server that is operated by a party other than the operator of the media server.
  • a report is then generated from the secure media traffic log received at the media traffic authentication server summarizing media traffic at the media server.
  • This provides objective server-side affirmation of the transmission of individualized programming (e.g., advertisements) over a computer network, together with the capability of measuring or identifying the audience to which the programming is broadcasted.
  • the audience measurement and identification capabilities allow the objective affirmation of programming transmission to be applied to programming (e.g., advertisements) that is targeted to particular viewers or classes of viewers.
  • FIG. 1 is a block diagram illustrating a computer network architecture as an operating environment for the present invention.
  • Fig. 2 is a flow diagram of a secure media traffic authentication method of the present invention.
  • Fig. 3 is a flow diagram of a viewer correlating method that may optionally be incorporated into the secure media traffic authentication method of Fig. 2.
  • Fig. 1 is a block diagram illustrating a computer network architecture as an operating environment for the present invention.
  • Multiple client computers or clients 10 are in communication with a server computer or server 12 via a network 16, such as a LAN, WAN, an intranet, or the Internet.
  • Clients 10 and server 12 have, for example, conventional computer configurations that may include a high speed processing unit (CPU) in conjunction with a memory system (with volatile and/or non- volatile memory), an input device, and an output device, as is known in the art.
  • Server 12 may be implemented as one or more server computers, which in the latter case may communicate with each other over one or more local or remote networks.
  • Each of clients 10 is a computer, such as a personal computer or computing device (e.g., handheld or embedded, such as network enabled stereo, television, car radio, etc.), running media player software 18 capable of playing or rendering graphic, audio or video files or portions of them (referred to as media segments 20).
  • media player software 18 may be Real PlayerTM from RealNetworks, Inc. of Seattle, Washington or Windows Media PlayerTM from Microsoft Corporation of Redmond, Washington. It will be appreciated that media player software 18 may be integral with or a plug-in added to commercially available network browser software, such as Netscape Navigator from Netscape Corporation or Internet Explorer from Microsoft Corporation, or may be an entirely separate application.
  • Server 12 is a computer with media broadcast server software
  • serialized media such as audio, video, or other media segments
  • the serialized media may be in a streaming file format or in a serialized meta-file format in which an audio or video presentation may include multiple media segments.
  • streaming file formats include RealMedia file formats promulgated by RealNetworks, Inc.
  • An example of a serialized meta-file format is the SMIL (Synchronized Multimedia Integration Language) file format, which is sometimes referred to as a multimedia layout and integration language.
  • Server 12 is illustrated as being an originating server from which serialized media are transmitted. It will be appreciated, however, that server 12 could alternatively operate as a caching server or router that transmits serialized media received from another originating server. Accordingly, the present invention may be applied interchangeably or cumulatively to originating and caching servers.
  • a conventional log file 24 is generated by media broadcast server software 22 as it transmits media segments 20 to clients 10.
  • Conventional log file 24 typically includes a simple text listing or record of each media segment 20 that is transmitted by broadcast server software
  • log file 24 will have a format such as:
  • conventional server log file 24 is readily available to the operator of server 12 so that access to and usage of server 12 can be monitored. Numerous software utilities are available to provide summaries of usage information included in conventional server logs 24. Such usage information can be used by the operator of a server computer to discern usage patterns and correlate them with various system diagnostics or business or marketing factors, as is known in the art.
  • server 12 operating broadcast server software 22
  • the broadcasting of media segments 20 is supported by advertisers who pay the media broadcaster to transmit information such as advertisements with other media segments 20 that are directed to viewers.
  • the broadcaster may be the operator of server 12 or may be a provider or owner of media segments 20 that is distinct from the operator of server 12, in which case the operator of server 12 may be a service provider for the broadcaster.
  • persons who listen to audio media or who view video media are referred to herein collectively and interchangeably as viewers.
  • Advertiser payments to the broadcaster commonly relate to the numbers of viewers to whom media segments 20 are broadcast from server 12.
  • media server 12 includes server-side media traffic authentication software 30 that operates in conjunction with media broadcast server software 22.
  • Media traffic authentication software 30 generates a secure media traffic log 32 that is distinct from conventional log 24 and is transmitted over network 16 to a viewer traffic authentication server 34, which typically would be operated by a party other than the operator of server 12.
  • Viewer traffic authentication server 34 obtains viewer traffic information from secure viewer traffic logs 32 without risk of improper manipulation by the operator of server 12. The viewer traffic information from secure viewer traffic logs 32 may then be made available to advertisers and the operator of server 12 in a secure, impartial manner. Typically, traffic authentication server 34 would receive secure viewer traffic logs 32 from multiple broadcast servers 12 (only one shown).
  • media traffic authentication software 30 logs transmission of media segments 20 that have associated with them secure verification signatures. This allows media stream transmission verification that securely verifies transmission of media segments 20 that match or correspond to a predefined (e.g., registered) media segment master. The media segments 20 could correspond to particular content for which transmission is being paid, such as advertising content, or could correspond to other content.
  • the media stream transmission verification provided by media traffic authentication software 30 generally includes identifying or finding a media segment 20 01 50035
  • identification of a media segment 20 and verification of a match between it and the pre-defined media segment master may be determined by a secure verification signature, such as a digital watermark, that is incorporated into the media stream 20.
  • digital watermarking which is sometimes referred to as data embedding, is the process of imperceptibly embedding auxiliary data (e.g., text or a numeric ID) into a host audio, image, or video signal.
  • the encoded signal generated by the data embedding process appears or sounds identical to the host signal.
  • Products for providing digital watermarking are available from a number of companies, including Verance Corporation of San Diego, California, Cognicity, Inc. of Minneapolis, Minnesota, ALPHA-TEC LTD. of Greece, Digimarc Corporation of Tualatin, Oregon, etc.
  • media segment 20 may be identified upon detection of the digital watermark by the appropriate conventional digital watermark detection tool, whether hardware or software.
  • media segment 20 may be identified by a meta-tag that is incorporated into media segment 20 to trigger reading of the digital watermark by the appropriate digital watermark detection tool.
  • the digital watermark may include a secure identifier that correlates media segment 20 with its pre-defined media segment master.
  • Another implementation may employ hardware or software digital signal processing to calculate a fingerprint for a transmitted media segment 20, and then compare the digital signal processing fingerprint to one stored in a database for a pre-defined media segment master.
  • Such digital signal process fingerprinting is described by, for example, Adlink Information Network, Inc. of Pasig City, Phillipines, www.adlink.com.ph, with reference to detecting conventional terrestrial broadcasting of advertisements.
  • the database of digital signal processing fingerprints may be local to server 12. In another implementation, the database of digital signal processing fingerprints may be maintained remotely from server 12, such as at the network site of a media transmission authentication service provider. In this implementation, the beginning and end of audio segments 20 could be identified by metadata included in the audio segments 20. The digital signal processing fingerprints for audio segments 20 could be stored in secure media traffic log 32 for later transmission to the network site of a media transmission authentication service provider for comparison with the stored digital signal processing fingerprints stored for the pre-defined media segment masters.
  • Adlink Information Network, Inc. provides merely confirmation of advertisement transmission, as received at a remote receiving station.
  • the detection of conventional terrestrial broadcasting of advertisements described by Adlink Information Network, Inc. provides, therefore, no measure or identification of the actual recipients of the transmissions, as provided by the present invention.
  • the secure verification signature for a media segment 20 may be a checksum value that is associated with the media segment 20 according to a cyclic redundancy code (CRC), for example.
  • CRC cyclic redundancy code
  • a checksum value for a selected computer file e.g., a media segment 20
  • a predetermined algorithm e.g., a predetermined algorithm
  • later transmission of the selected media segment 20 can be verified by computing a checksum value for the file that is transmitted and comparing that checksum value with the reference checksum value.
  • transmission of the selected computer file will result in a checksum value that matches the reference checksum value, and a different checksum value will result from transmission of a modification of the selected computer file or a file other than the selected computer file.
  • checksum values are directed to error detection applications and will provide different checksum values for any differences between original and subsequent computer files.
  • checksum values are preferably determined by a cyclic redundancy code algorithm in which minor differences between files will result in matching checksum values, thereby accommodating data resolution differences in some streaming media applications.
  • Fig. 2 is a flow diagram of a secure media traffic authentication method 50 for media segments 20 having associated secure verification signatures.
  • traffic authentication method 50 is described as being performed by media traffic authentication software 30 and traffic authentication server 34.
  • Traffic authentication method 50 represents one implementation of the operation of media traffic authentication software 30 and traffic authentication server 34 and the operation of them in other implementations may differ from traffic authentication method 50.
  • Process block 52 indicates that a media segment 20 is transmitted from a server computer, such as server 12.
  • Inquiry block 54 represents an inquiry as to whether the media segment 20 is identified as having associated with it a secure verification signature.
  • each media segment 20 having an associated secure verification signature may also include one or more identifying meta-tags.
  • the identifying meta-tags may identify the media segment 20, or a portion of it, with which the secure verification signature is associated.
  • the one or more meta-tags may include a START meta-tag indicating the beginning of media segment 20, or portion of it, and an END meta-tag indicating the end of media segment 20, or portion of it.
  • the one or more meta-tags may also include a FILE ID meta-tag that uniquely identifies the media segment 20 by, for example, a universally or globally unique identifier (GUID) or an identifying string such as "broadcaster.com/ads/foo.ad.”
  • GUID globally unique identifier
  • inquiry block 54 proceeds to process block 56. If the media segment 20 is not identified as having associated with it a secure verification signature, inquiry block 54 returns to process block 52. Process block 56 indicates that a secure verification signature is obtained from the media segment 20.
  • media traffic authentication software 30 may include a digital watermark reader software component that reads and decodes the digital watermark in the media segment 20.
  • media traffic authentication software 30 includes a checksum value calculator software component that computes a checksum value for the media segment 20.
  • Process block 60 indicates that secure media traffic log 32 is formed on broadcast server 12 to include information corresponding to secure verification signatures obtained from media segments 20.
  • Secure media traffic log 32 is secure in that it is encrypted (e.g., public-private key encryption) or otherwise secured (e.g., digitally signed) to prevent log 32 from being modified or viewed by the operator of server 12, or to indicate if log 32 was modified by the operator of server 12.
  • Secure media traffic log 32 may include information relating to secure verification signatures obtained from one or more media segment s 20.
  • secure verification signature implemented as a digital watermark
  • secure media traffic log 32 may include for each broadcasted media segment 20 a media segment identifier that is obtained from the decode watermark and may include a globally unique identifier or another file identification indication.
  • secure media traffic log 32 may include for each broadcasted media segment 20 a checksum value that is calculated by the calculator software component for the media segment 20.
  • Process block 62 indicates that secure media traffic log 32 is transmitted over network 16 to media traffic authentication server 34.
  • Secure media traffic log 32 may be transmitted to media traffic authentication server 34 separately for each information entry (i.e., for each media segment 20), or may be transmitted to media traffic authentication server 34 periodically, such as daily or more frequently (e.g., hourly), for batches of multiple information entries.
  • Process block 64 indicates that media segments 20 listed in secure media traffic log 32 are compared against a registered or master media segment database 66 that is stored on or in association with media traffic authentication server 34, thereby to authenticate the media streams 20 that are transmitted from server 12.
  • the secure verification signature implemented as a digital watermark
  • the media segment identifier incorporated into the digital watermark is stored in registered or master media segment database 66 in association with other information about the media segment, such as its sponsor, creator, date of creation, etc.
  • the secure verification signature implemented as a checksum value for example, the checksum value determined from the original media segment is stored in registered media file database 66 in association with other information about the media segment, such as its sponsor, creator, date of creation, etc.
  • Process block 68 indicates that a report 70 is generated summarizing the media traffic information, and any associated demographic information, relating to operation of a media server 12.
  • Process block 72 indicates that report 70 is provided or made available to subscribers to the media traffic authentication service, including the operator of server 12 and advertisers, or their representatives.
  • Fig. 3 is a flow diagram of a viewer correlating method 80 that may optionally be incorporated into secure media traffic authentication method 50 to identify viewers receiving media segments 20 having associated secure verification signatures.
  • Process block 82 indicates that a client user registers as a registered user, which may include providing personal information, including demographic information, and being assigned a unique registered viewer identifier (e.g., a globally unique identifier, or GUID) that is automatically associated with media player software 18 on a client 10 operated by the user.
  • the personal information are stored in a registered viewer database 84, which is shown in dashed lines, that is stored on or in association with media traffic authentication server 34.
  • the operator of a media traffic authentication service could obtain demographic information from users who elect to provide such information, in association with media content network sites that are served by the media traffic authentication service, or otherwise.
  • Process block 86 indicates that client identifying information is obtained identifying a client to which media segment 20 is transmitted. The operation of process block 86 may be performed in conjunction with the operation of process block 52, for example.
  • media player software 18 on client 10 provides to server 12 the registered viewer identifier, either alone or in addition to conventional network address (e.g., TCP/IP) information. Some implementations of media player software 18 are capable of providing to server 12 the GUIDs of clients 10 from which media segments 20 are requested.
  • Process block 88 indicates that the registered viewer identifier is stored in secure media traffic log 32 with the media segmentinformation corresponding to the secure verification signature obtained from media segments 20. The operation of process block 86 may be performed in conjunction with the operation of process block 60, for example. In one implementation, the clients 10 listed in secure media traffic log 32 would typically include registered viewers and unregistered viewers.
  • Process block 90 indicates that the secure media traffic log 32, with registered viewer identifier and associated media file information, is transmitted over network 16 to media traffic authentication server 34.
  • Process block 92 indicates that media segments 20 listed in secure media traffic log 32 are compared against a registered media file database 66 that is stored on or in association with media traffic authentication server 34, thereby to authenticate the media segments 20 that are transmitted from server 12.
  • Process block 94 indicates that the registered viewer identifier or identifiers listed in secure media traffic log 32 are compared against a registered viewer database 84, thereby to identify at least demographics of viewers to whom the media segments 20 are transmitted from server 12.
  • report 70 generated in accordance with process block 68 may include demographic information about viewers to whom the authenticated media segments 20 are transmitted.

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Databases & Information Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Graphics (AREA)
  • Business, Economics & Management (AREA)
  • General Engineering & Computer Science (AREA)
  • Marketing (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • Human Computer Interaction (AREA)
  • Power Engineering (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

La présente invention concerne un procédé d'authentification de trafic fournissant une information authentifiée (30) concernant le trafic de programmes audio ou vidéo (20) sur un réseau informatique (16) à partir d'un serveur de médias (12). Le procédé comporte l'obtention au niveau du serveur de médias (12) une signature de vérification sécurisée à partir d'un segment de média (20) qui est transmise sur le réseau informatique (16) depuis le serveur de médias (12). La signature de vérification sécurisée peut comprendre un filigrane numérique qui est incorporé de manière imperceptible dans le segment de média (20) ou une valeur de total de contrôle qui est calculée à partir du segment de média (20), ou d'une portion de celui-ci. Un journal de trafic de médias (32) est généré au niveau du serveur de médias (12) et comporte une information à partir de la signature de vérification sécurisée. Dans un mode de réalisation, le journal de trafic de médias (32) est sécurisé (par exemple, chiffré ou à signature numérique) par rapport à l'opérateur de serveur de médias (12). Le journal de trafic de médias (32) est transmis vers un serveur d'authentification de trafic (34) qui est opéré par un tiers autre que l'opérateur de serveur de médias (12). Un rapport (70) est alors généré à partir du journal de trafic sécurisé (32) reçu au niveau du serveur d'authentification de trafic de médias résumant le trafic de médias au niveau du serveur de médias (12).
PCT/US2001/050035 2001-12-31 2001-12-31 Authentification de trafic de programmation de medias verifies realisee sur reseau informatique WO2003071737A1 (fr)

Priority Applications (2)

Application Number Priority Date Filing Date Title
PCT/US2001/050035 WO2003071737A1 (fr) 2001-12-31 2001-12-31 Authentification de trafic de programmation de medias verifies realisee sur reseau informatique
AU2002239686A AU2002239686A1 (en) 2001-12-31 2001-12-31 Traffic authentication of verified media programming provided over a computer network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/US2001/050035 WO2003071737A1 (fr) 2001-12-31 2001-12-31 Authentification de trafic de programmation de medias verifies realisee sur reseau informatique

Publications (1)

Publication Number Publication Date
WO2003071737A1 true WO2003071737A1 (fr) 2003-08-28

Family

ID=27752543

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2001/050035 WO2003071737A1 (fr) 2001-12-31 2001-12-31 Authentification de trafic de programmation de medias verifies realisee sur reseau informatique

Country Status (2)

Country Link
AU (1) AU2002239686A1 (fr)
WO (1) WO2003071737A1 (fr)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8307006B2 (en) 2010-06-30 2012-11-06 The Nielsen Company (Us), Llc Methods and apparatus to obtain anonymous audience measurement data from network server data for particular demographic and usage profiles
ES2393014A1 (es) * 2010-09-23 2012-12-17 Universidad De Alcalá Equipo de autenticación de fecha y hora para video escenas.
US8381241B2 (en) 2004-04-23 2013-02-19 The Nielsen Company (Us), Llc Methods and apparatus to maintain audience privacy while determining viewing of video-on-demand programs
US9015740B2 (en) 2005-12-12 2015-04-21 The Nielsen Company (Us), Llc Systems and methods to wirelessly meter audio/visual devices
US9124769B2 (en) 2008-10-31 2015-09-01 The Nielsen Company (Us), Llc Methods and apparatus to verify presentation of media content

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5450122A (en) * 1991-11-22 1995-09-12 A.C. Nielsen Company In-station television program encoding and monitoring system and method
EP0817486A2 (fr) * 1996-06-27 1998-01-07 AT&T Corp. Méthode de changement d'une transmission par radiodiffusion en fonction de son destinataire à travers un réseau de télécommunication
US5956716A (en) * 1995-06-07 1999-09-21 Intervu, Inc. System and method for delivery of video data over a computer network
US6226618B1 (en) * 1998-08-13 2001-05-01 International Business Machines Corporation Electronic content delivery system
US20010051996A1 (en) * 2000-02-18 2001-12-13 Cooper Robin Ross Network-based content distribution system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5450122A (en) * 1991-11-22 1995-09-12 A.C. Nielsen Company In-station television program encoding and monitoring system and method
US5956716A (en) * 1995-06-07 1999-09-21 Intervu, Inc. System and method for delivery of video data over a computer network
EP0817486A2 (fr) * 1996-06-27 1998-01-07 AT&T Corp. Méthode de changement d'une transmission par radiodiffusion en fonction de son destinataire à travers un réseau de télécommunication
US6226618B1 (en) * 1998-08-13 2001-05-01 International Business Machines Corporation Electronic content delivery system
US20010051996A1 (en) * 2000-02-18 2001-12-13 Cooper Robin Ross Network-based content distribution system

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8381241B2 (en) 2004-04-23 2013-02-19 The Nielsen Company (Us), Llc Methods and apparatus to maintain audience privacy while determining viewing of video-on-demand programs
US9565473B2 (en) 2004-04-23 2017-02-07 The Nielsen Company (Us), Llc Methods and apparatus to maintain audience privacy while determining viewing of video-on-demand programs
US9015740B2 (en) 2005-12-12 2015-04-21 The Nielsen Company (Us), Llc Systems and methods to wirelessly meter audio/visual devices
US9124769B2 (en) 2008-10-31 2015-09-01 The Nielsen Company (Us), Llc Methods and apparatus to verify presentation of media content
US10469901B2 (en) 2008-10-31 2019-11-05 The Nielsen Company (Us), Llc Methods and apparatus to verify presentation of media content
US11070874B2 (en) 2008-10-31 2021-07-20 The Nielsen Company (Us), Llc Methods and apparatus to verify presentation of media content
US11778268B2 (en) 2008-10-31 2023-10-03 The Nielsen Company (Us), Llc Methods and apparatus to verify presentation of media content
US8307006B2 (en) 2010-06-30 2012-11-06 The Nielsen Company (Us), Llc Methods and apparatus to obtain anonymous audience measurement data from network server data for particular demographic and usage profiles
US8903864B2 (en) 2010-06-30 2014-12-02 The Nielsen Company (Us), Llc Methods and apparatus to obtain anonymous audience measurement data from network server data for particular demographic and usage profiles
US9355138B2 (en) 2010-06-30 2016-05-31 The Nielsen Company (Us), Llc Methods and apparatus to obtain anonymous audience measurement data from network server data for particular demographic and usage profiles
ES2393014A1 (es) * 2010-09-23 2012-12-17 Universidad De Alcalá Equipo de autenticación de fecha y hora para video escenas.

Also Published As

Publication number Publication date
AU2002239686A1 (en) 2003-09-09

Similar Documents

Publication Publication Date Title
US7669056B2 (en) Method and apparatus for measuring presentation data exposure
US6829368B2 (en) Establishing and interacting with on-line media collections using identifiers in media signals
US7383229B2 (en) Access control and metering system for streaming media
US9843846B2 (en) Watermark and fingerprint systems for media
US7587601B2 (en) Digital watermarking methods and apparatus for use with audio and video content
US8566893B2 (en) Systems and methods for providing a token registry and encoder
US6353929B1 (en) Cooperative system for measuring electronic media
US7124442B2 (en) System and method for insertion and retrieval of microthreads in transmitted data
US20090083541A1 (en) Method and apparatus for distributing digital content
EP2779662A1 (fr) Systèmes et procédés permettant d'utiliser des identificateurs segmentés dérivés de signaux afin de gérer la contention de ressources et l'accès de contrôle à des fonctions et des données
US20100322035A1 (en) Audio-Based, Location-Related Methods
US20050058319A1 (en) Portable devices and methods employing digital watermarking
KR20020041328A (ko) 음악 또는 다른 미디어에서 디지털 워터마킹을 이용하는방법들 및 시스템
EP2659448A1 (fr) Techniques de mise en correspondance pour la surveillance et les informations inter-plateformes
WO2008060032A1 (fr) Système et procédé permettant d'analyser l'utilisation d'un contenu dans lequel sont intégrées en filigrane des informations d'empreinte digitale
US20020124077A1 (en) Advertising and audience authentication with server-side measurement and client-side verification
WO2003071737A1 (fr) Authentification de trafic de programmation de medias verifies realisee sur reseau informatique
WO2001033752A1 (fr) Suivi direct des spectateurs d'un contenu selectionne d'une programmation audio et video fournie par un reseau informatique
WO2002010948A1 (fr) Authentification du trafic de programmation audio et video distribuee par un reseau informatique
KR100695574B1 (ko) 인터넷 기반의 광고방송 시스템 및 광고방송 방법

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AL AM AT AU AZ BA BB BG BR BY CA CH CN CU CZ DE DK EE ES FI GB GE GH GM HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT UA UG UZ VN YU ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: JP

WWW Wipo information: withdrawn in national office

Country of ref document: JP