WO2003071737A1 - Authentification de trafic de programmation de medias verifies realisee sur reseau informatique - Google Patents
Authentification de trafic de programmation de medias verifies realisee sur reseau informatique Download PDFInfo
- Publication number
- WO2003071737A1 WO2003071737A1 PCT/US2001/050035 US0150035W WO03071737A1 WO 2003071737 A1 WO2003071737 A1 WO 2003071737A1 US 0150035 W US0150035 W US 0150035W WO 03071737 A1 WO03071737 A1 WO 03071737A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- media
- traffic
- server
- secure
- medium
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements, protocols or services for supporting real-time applications in data packet communication
- H04L65/60—Network streaming of media packets
- H04L65/61—Network streaming of media packets for supporting one-way streaming services, e.g. Internet radio
- H04L65/611—Network streaming of media packets for supporting one-way streaming services, e.g. Internet radio for multicast or broadcast
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/23—Processing of content or additional data; Elementary server operations; Server middleware
- H04N21/24—Monitoring of processes or resources, e.g. monitoring of server load, available bandwidth, upstream requests
- H04N21/2407—Monitoring of transmitted content, e.g. distribution time, number of downloads
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/25—Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
- H04N21/254—Management at additional data server, e.g. shopping server, rights management server
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/25—Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
- H04N21/258—Client or end-user data management, e.g. managing client capabilities, user preferences or demographics, processing of multiple end-users preferences to derive collaborative data
- H04N21/25808—Management of client data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/25—Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
- H04N21/258—Client or end-user data management, e.g. managing client capabilities, user preferences or demographics, processing of multiple end-users preferences to derive collaborative data
- H04N21/25866—Management of end-user data
- H04N21/25883—Management of end-user data being end-user demographical data, e.g. age, family status or address
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/41—Structure of client; Structure of client peripherals
- H04N21/426—Internal components of the client ; Characteristics thereof
- H04N21/42684—Client identification by a unique number or address, e.g. serial number, MAC address, socket ID
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/47—End-user applications
- H04N21/475—End-user interface for inputting end-user data, e.g. personal identification number [PIN], preference data
- H04N21/4753—End-user interface for inputting end-user data, e.g. personal identification number [PIN], preference data for user identification, e.g. by entering a PIN or password
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/60—Network structure or processes for video distribution between server and client or between remote clients; Control signalling between clients, server and network components; Transmission of management data between server and client, e.g. sending from server to client commands for recording incoming content stream; Communication details between server and client
- H04N21/61—Network physical structure; Signal processing
- H04N21/6106—Network physical structure; Signal processing specially adapted to the downstream path of the transmission network
- H04N21/6125—Network physical structure; Signal processing specially adapted to the downstream path of the transmission network involving transmission via Internet
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/80—Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
- H04N21/81—Monomedia components thereof
- H04N21/812—Monomedia components thereof involving advertisement data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/80—Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
- H04N21/83—Generation or processing of protective or descriptive data associated with content; Content structuring
- H04N21/835—Generation of protective data, e.g. certificates
- H04N21/8358—Generation of protective data, e.g. certificates involving watermark
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/16—Analogue secrecy systems; Analogue subscription systems
- H04N7/173—Analogue secrecy systems; Analogue subscription systems with two-way working, e.g. subscriber sending a programme selection signal
- H04N7/17309—Transmission or handling of upstream communications
- H04N7/17318—Direct or substantially direct transmission and handling of requests
Definitions
- the present invention relates to measuring media traffic of audio or video programming delivered over a computer network and, in particular, to providing secure measurement of such media traffic.
- Background and Summary of the Invention In many countries, conventional broadcast radio and television programming are supported by advertising in the form of commercials that are interspersed throughout the programming. The costs for advertising during different radio and television shows depend upon sampled measurements of the numbers of people who listen to or watch those shows. (For purposes of simplicity, listeners and viewers are both referred to as viewers herein.) The most famous sampled measurements for programming are the Nielson ratings provided by Nielsen Media Research, Inc. and the Arbitron ratings provided by the Arbitron Company.
- Such sampled measurement of the viewers of online programming suffers from the disadvantage that many online broadcast programming sites might have insufficient traffic to be accurately measured by such sampling. Moreover, such sampling fails to utilize computer network transmission information that is commonly available in the form of network server log files.
- a conventional log file typically includes a simple text listing of each file (e.g., media stream) that is transmitted by a media server to a client computer.
- a conventional log file typically will include information such as which media stream was transmitted (or requested), a network address (e.g., TCP/IP) identification of the client computer that requested (or to which was transmitted) the media stream, and the network browsing software and operating system of the client computer.
- a conventional server log file is readily available to the operator of a server computer so that access to and usage of the server can be monitored. Numerous software utilities are available to provide summaries of usage information included in conventional server log files. Such usage information can be used by the operator of a server computer to discern usage patterns and correlate them with various business or marketing factors.
- a media traffic authentication method provides authenticated server-side information about transmission of selected programming (e.g., advertisements) over a computer network from a media server. This method overcomes the limitations of conventional receiver-side monitoring of selected programming utilized for conventional or universal broadcasting.
- the method includes obtaining at the media server a secure verification signature from a media stream (e.g., an advertisement or portion of it) that is transmitted over a computer network from the media server.
- the secure verification signature may include a digital watermark that is imperceptibly embedded in the media stream or a checksum value that is calculated from the media stream, or a portion of it.
- a media traffic log is generated at the media server and includes information from the secure verification signature.
- the media traffic log is secure (e.g., encrypted or digitally signed) with regard to the operator of the media server.
- the media traffic log is transmitted to a media traffic authentication server that is operated by a party other than the operator of the media server.
- a report is then generated from the secure media traffic log received at the media traffic authentication server summarizing media traffic at the media server.
- This provides objective server-side affirmation of the transmission of individualized programming (e.g., advertisements) over a computer network, together with the capability of measuring or identifying the audience to which the programming is broadcasted.
- the audience measurement and identification capabilities allow the objective affirmation of programming transmission to be applied to programming (e.g., advertisements) that is targeted to particular viewers or classes of viewers.
- FIG. 1 is a block diagram illustrating a computer network architecture as an operating environment for the present invention.
- Fig. 2 is a flow diagram of a secure media traffic authentication method of the present invention.
- Fig. 3 is a flow diagram of a viewer correlating method that may optionally be incorporated into the secure media traffic authentication method of Fig. 2.
- Fig. 1 is a block diagram illustrating a computer network architecture as an operating environment for the present invention.
- Multiple client computers or clients 10 are in communication with a server computer or server 12 via a network 16, such as a LAN, WAN, an intranet, or the Internet.
- Clients 10 and server 12 have, for example, conventional computer configurations that may include a high speed processing unit (CPU) in conjunction with a memory system (with volatile and/or non- volatile memory), an input device, and an output device, as is known in the art.
- Server 12 may be implemented as one or more server computers, which in the latter case may communicate with each other over one or more local or remote networks.
- Each of clients 10 is a computer, such as a personal computer or computing device (e.g., handheld or embedded, such as network enabled stereo, television, car radio, etc.), running media player software 18 capable of playing or rendering graphic, audio or video files or portions of them (referred to as media segments 20).
- media player software 18 may be Real PlayerTM from RealNetworks, Inc. of Seattle, Washington or Windows Media PlayerTM from Microsoft Corporation of Redmond, Washington. It will be appreciated that media player software 18 may be integral with or a plug-in added to commercially available network browser software, such as Netscape Navigator from Netscape Corporation or Internet Explorer from Microsoft Corporation, or may be an entirely separate application.
- Server 12 is a computer with media broadcast server software
- serialized media such as audio, video, or other media segments
- the serialized media may be in a streaming file format or in a serialized meta-file format in which an audio or video presentation may include multiple media segments.
- streaming file formats include RealMedia file formats promulgated by RealNetworks, Inc.
- An example of a serialized meta-file format is the SMIL (Synchronized Multimedia Integration Language) file format, which is sometimes referred to as a multimedia layout and integration language.
- Server 12 is illustrated as being an originating server from which serialized media are transmitted. It will be appreciated, however, that server 12 could alternatively operate as a caching server or router that transmits serialized media received from another originating server. Accordingly, the present invention may be applied interchangeably or cumulatively to originating and caching servers.
- a conventional log file 24 is generated by media broadcast server software 22 as it transmits media segments 20 to clients 10.
- Conventional log file 24 typically includes a simple text listing or record of each media segment 20 that is transmitted by broadcast server software
- log file 24 will have a format such as:
- conventional server log file 24 is readily available to the operator of server 12 so that access to and usage of server 12 can be monitored. Numerous software utilities are available to provide summaries of usage information included in conventional server logs 24. Such usage information can be used by the operator of a server computer to discern usage patterns and correlate them with various system diagnostics or business or marketing factors, as is known in the art.
- server 12 operating broadcast server software 22
- the broadcasting of media segments 20 is supported by advertisers who pay the media broadcaster to transmit information such as advertisements with other media segments 20 that are directed to viewers.
- the broadcaster may be the operator of server 12 or may be a provider or owner of media segments 20 that is distinct from the operator of server 12, in which case the operator of server 12 may be a service provider for the broadcaster.
- persons who listen to audio media or who view video media are referred to herein collectively and interchangeably as viewers.
- Advertiser payments to the broadcaster commonly relate to the numbers of viewers to whom media segments 20 are broadcast from server 12.
- media server 12 includes server-side media traffic authentication software 30 that operates in conjunction with media broadcast server software 22.
- Media traffic authentication software 30 generates a secure media traffic log 32 that is distinct from conventional log 24 and is transmitted over network 16 to a viewer traffic authentication server 34, which typically would be operated by a party other than the operator of server 12.
- Viewer traffic authentication server 34 obtains viewer traffic information from secure viewer traffic logs 32 without risk of improper manipulation by the operator of server 12. The viewer traffic information from secure viewer traffic logs 32 may then be made available to advertisers and the operator of server 12 in a secure, impartial manner. Typically, traffic authentication server 34 would receive secure viewer traffic logs 32 from multiple broadcast servers 12 (only one shown).
- media traffic authentication software 30 logs transmission of media segments 20 that have associated with them secure verification signatures. This allows media stream transmission verification that securely verifies transmission of media segments 20 that match or correspond to a predefined (e.g., registered) media segment master. The media segments 20 could correspond to particular content for which transmission is being paid, such as advertising content, or could correspond to other content.
- the media stream transmission verification provided by media traffic authentication software 30 generally includes identifying or finding a media segment 20 01 50035
- identification of a media segment 20 and verification of a match between it and the pre-defined media segment master may be determined by a secure verification signature, such as a digital watermark, that is incorporated into the media stream 20.
- digital watermarking which is sometimes referred to as data embedding, is the process of imperceptibly embedding auxiliary data (e.g., text or a numeric ID) into a host audio, image, or video signal.
- the encoded signal generated by the data embedding process appears or sounds identical to the host signal.
- Products for providing digital watermarking are available from a number of companies, including Verance Corporation of San Diego, California, Cognicity, Inc. of Minneapolis, Minnesota, ALPHA-TEC LTD. of Greece, Digimarc Corporation of Tualatin, Oregon, etc.
- media segment 20 may be identified upon detection of the digital watermark by the appropriate conventional digital watermark detection tool, whether hardware or software.
- media segment 20 may be identified by a meta-tag that is incorporated into media segment 20 to trigger reading of the digital watermark by the appropriate digital watermark detection tool.
- the digital watermark may include a secure identifier that correlates media segment 20 with its pre-defined media segment master.
- Another implementation may employ hardware or software digital signal processing to calculate a fingerprint for a transmitted media segment 20, and then compare the digital signal processing fingerprint to one stored in a database for a pre-defined media segment master.
- Such digital signal process fingerprinting is described by, for example, Adlink Information Network, Inc. of Pasig City, Phillipines, www.adlink.com.ph, with reference to detecting conventional terrestrial broadcasting of advertisements.
- the database of digital signal processing fingerprints may be local to server 12. In another implementation, the database of digital signal processing fingerprints may be maintained remotely from server 12, such as at the network site of a media transmission authentication service provider. In this implementation, the beginning and end of audio segments 20 could be identified by metadata included in the audio segments 20. The digital signal processing fingerprints for audio segments 20 could be stored in secure media traffic log 32 for later transmission to the network site of a media transmission authentication service provider for comparison with the stored digital signal processing fingerprints stored for the pre-defined media segment masters.
- Adlink Information Network, Inc. provides merely confirmation of advertisement transmission, as received at a remote receiving station.
- the detection of conventional terrestrial broadcasting of advertisements described by Adlink Information Network, Inc. provides, therefore, no measure or identification of the actual recipients of the transmissions, as provided by the present invention.
- the secure verification signature for a media segment 20 may be a checksum value that is associated with the media segment 20 according to a cyclic redundancy code (CRC), for example.
- CRC cyclic redundancy code
- a checksum value for a selected computer file e.g., a media segment 20
- a predetermined algorithm e.g., a predetermined algorithm
- later transmission of the selected media segment 20 can be verified by computing a checksum value for the file that is transmitted and comparing that checksum value with the reference checksum value.
- transmission of the selected computer file will result in a checksum value that matches the reference checksum value, and a different checksum value will result from transmission of a modification of the selected computer file or a file other than the selected computer file.
- checksum values are directed to error detection applications and will provide different checksum values for any differences between original and subsequent computer files.
- checksum values are preferably determined by a cyclic redundancy code algorithm in which minor differences between files will result in matching checksum values, thereby accommodating data resolution differences in some streaming media applications.
- Fig. 2 is a flow diagram of a secure media traffic authentication method 50 for media segments 20 having associated secure verification signatures.
- traffic authentication method 50 is described as being performed by media traffic authentication software 30 and traffic authentication server 34.
- Traffic authentication method 50 represents one implementation of the operation of media traffic authentication software 30 and traffic authentication server 34 and the operation of them in other implementations may differ from traffic authentication method 50.
- Process block 52 indicates that a media segment 20 is transmitted from a server computer, such as server 12.
- Inquiry block 54 represents an inquiry as to whether the media segment 20 is identified as having associated with it a secure verification signature.
- each media segment 20 having an associated secure verification signature may also include one or more identifying meta-tags.
- the identifying meta-tags may identify the media segment 20, or a portion of it, with which the secure verification signature is associated.
- the one or more meta-tags may include a START meta-tag indicating the beginning of media segment 20, or portion of it, and an END meta-tag indicating the end of media segment 20, or portion of it.
- the one or more meta-tags may also include a FILE ID meta-tag that uniquely identifies the media segment 20 by, for example, a universally or globally unique identifier (GUID) or an identifying string such as "broadcaster.com/ads/foo.ad.”
- GUID globally unique identifier
- inquiry block 54 proceeds to process block 56. If the media segment 20 is not identified as having associated with it a secure verification signature, inquiry block 54 returns to process block 52. Process block 56 indicates that a secure verification signature is obtained from the media segment 20.
- media traffic authentication software 30 may include a digital watermark reader software component that reads and decodes the digital watermark in the media segment 20.
- media traffic authentication software 30 includes a checksum value calculator software component that computes a checksum value for the media segment 20.
- Process block 60 indicates that secure media traffic log 32 is formed on broadcast server 12 to include information corresponding to secure verification signatures obtained from media segments 20.
- Secure media traffic log 32 is secure in that it is encrypted (e.g., public-private key encryption) or otherwise secured (e.g., digitally signed) to prevent log 32 from being modified or viewed by the operator of server 12, or to indicate if log 32 was modified by the operator of server 12.
- Secure media traffic log 32 may include information relating to secure verification signatures obtained from one or more media segment s 20.
- secure verification signature implemented as a digital watermark
- secure media traffic log 32 may include for each broadcasted media segment 20 a media segment identifier that is obtained from the decode watermark and may include a globally unique identifier or another file identification indication.
- secure media traffic log 32 may include for each broadcasted media segment 20 a checksum value that is calculated by the calculator software component for the media segment 20.
- Process block 62 indicates that secure media traffic log 32 is transmitted over network 16 to media traffic authentication server 34.
- Secure media traffic log 32 may be transmitted to media traffic authentication server 34 separately for each information entry (i.e., for each media segment 20), or may be transmitted to media traffic authentication server 34 periodically, such as daily or more frequently (e.g., hourly), for batches of multiple information entries.
- Process block 64 indicates that media segments 20 listed in secure media traffic log 32 are compared against a registered or master media segment database 66 that is stored on or in association with media traffic authentication server 34, thereby to authenticate the media streams 20 that are transmitted from server 12.
- the secure verification signature implemented as a digital watermark
- the media segment identifier incorporated into the digital watermark is stored in registered or master media segment database 66 in association with other information about the media segment, such as its sponsor, creator, date of creation, etc.
- the secure verification signature implemented as a checksum value for example, the checksum value determined from the original media segment is stored in registered media file database 66 in association with other information about the media segment, such as its sponsor, creator, date of creation, etc.
- Process block 68 indicates that a report 70 is generated summarizing the media traffic information, and any associated demographic information, relating to operation of a media server 12.
- Process block 72 indicates that report 70 is provided or made available to subscribers to the media traffic authentication service, including the operator of server 12 and advertisers, or their representatives.
- Fig. 3 is a flow diagram of a viewer correlating method 80 that may optionally be incorporated into secure media traffic authentication method 50 to identify viewers receiving media segments 20 having associated secure verification signatures.
- Process block 82 indicates that a client user registers as a registered user, which may include providing personal information, including demographic information, and being assigned a unique registered viewer identifier (e.g., a globally unique identifier, or GUID) that is automatically associated with media player software 18 on a client 10 operated by the user.
- the personal information are stored in a registered viewer database 84, which is shown in dashed lines, that is stored on or in association with media traffic authentication server 34.
- the operator of a media traffic authentication service could obtain demographic information from users who elect to provide such information, in association with media content network sites that are served by the media traffic authentication service, or otherwise.
- Process block 86 indicates that client identifying information is obtained identifying a client to which media segment 20 is transmitted. The operation of process block 86 may be performed in conjunction with the operation of process block 52, for example.
- media player software 18 on client 10 provides to server 12 the registered viewer identifier, either alone or in addition to conventional network address (e.g., TCP/IP) information. Some implementations of media player software 18 are capable of providing to server 12 the GUIDs of clients 10 from which media segments 20 are requested.
- Process block 88 indicates that the registered viewer identifier is stored in secure media traffic log 32 with the media segmentinformation corresponding to the secure verification signature obtained from media segments 20. The operation of process block 86 may be performed in conjunction with the operation of process block 60, for example. In one implementation, the clients 10 listed in secure media traffic log 32 would typically include registered viewers and unregistered viewers.
- Process block 90 indicates that the secure media traffic log 32, with registered viewer identifier and associated media file information, is transmitted over network 16 to media traffic authentication server 34.
- Process block 92 indicates that media segments 20 listed in secure media traffic log 32 are compared against a registered media file database 66 that is stored on or in association with media traffic authentication server 34, thereby to authenticate the media segments 20 that are transmitted from server 12.
- Process block 94 indicates that the registered viewer identifier or identifiers listed in secure media traffic log 32 are compared against a registered viewer database 84, thereby to identify at least demographics of viewers to whom the media segments 20 are transmitted from server 12.
- report 70 generated in accordance with process block 68 may include demographic information about viewers to whom the authenticated media segments 20 are transmitted.
Landscapes
- Engineering & Computer Science (AREA)
- Multimedia (AREA)
- Signal Processing (AREA)
- Databases & Information Systems (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Graphics (AREA)
- Business, Economics & Management (AREA)
- General Engineering & Computer Science (AREA)
- Marketing (AREA)
- Computing Systems (AREA)
- Computer Hardware Design (AREA)
- Human Computer Interaction (AREA)
- Power Engineering (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
- Information Transfer Between Computers (AREA)
Abstract
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/US2001/050035 WO2003071737A1 (fr) | 2001-12-31 | 2001-12-31 | Authentification de trafic de programmation de medias verifies realisee sur reseau informatique |
AU2002239686A AU2002239686A1 (en) | 2001-12-31 | 2001-12-31 | Traffic authentication of verified media programming provided over a computer network |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/US2001/050035 WO2003071737A1 (fr) | 2001-12-31 | 2001-12-31 | Authentification de trafic de programmation de medias verifies realisee sur reseau informatique |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2003071737A1 true WO2003071737A1 (fr) | 2003-08-28 |
Family
ID=27752543
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2001/050035 WO2003071737A1 (fr) | 2001-12-31 | 2001-12-31 | Authentification de trafic de programmation de medias verifies realisee sur reseau informatique |
Country Status (2)
Country | Link |
---|---|
AU (1) | AU2002239686A1 (fr) |
WO (1) | WO2003071737A1 (fr) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8307006B2 (en) | 2010-06-30 | 2012-11-06 | The Nielsen Company (Us), Llc | Methods and apparatus to obtain anonymous audience measurement data from network server data for particular demographic and usage profiles |
ES2393014A1 (es) * | 2010-09-23 | 2012-12-17 | Universidad De Alcalá | Equipo de autenticación de fecha y hora para video escenas. |
US8381241B2 (en) | 2004-04-23 | 2013-02-19 | The Nielsen Company (Us), Llc | Methods and apparatus to maintain audience privacy while determining viewing of video-on-demand programs |
US9015740B2 (en) | 2005-12-12 | 2015-04-21 | The Nielsen Company (Us), Llc | Systems and methods to wirelessly meter audio/visual devices |
US9124769B2 (en) | 2008-10-31 | 2015-09-01 | The Nielsen Company (Us), Llc | Methods and apparatus to verify presentation of media content |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5450122A (en) * | 1991-11-22 | 1995-09-12 | A.C. Nielsen Company | In-station television program encoding and monitoring system and method |
EP0817486A2 (fr) * | 1996-06-27 | 1998-01-07 | AT&T Corp. | Méthode de changement d'une transmission par radiodiffusion en fonction de son destinataire à travers un réseau de télécommunication |
US5956716A (en) * | 1995-06-07 | 1999-09-21 | Intervu, Inc. | System and method for delivery of video data over a computer network |
US6226618B1 (en) * | 1998-08-13 | 2001-05-01 | International Business Machines Corporation | Electronic content delivery system |
US20010051996A1 (en) * | 2000-02-18 | 2001-12-13 | Cooper Robin Ross | Network-based content distribution system |
-
2001
- 2001-12-31 WO PCT/US2001/050035 patent/WO2003071737A1/fr not_active Application Discontinuation
- 2001-12-31 AU AU2002239686A patent/AU2002239686A1/en not_active Abandoned
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5450122A (en) * | 1991-11-22 | 1995-09-12 | A.C. Nielsen Company | In-station television program encoding and monitoring system and method |
US5956716A (en) * | 1995-06-07 | 1999-09-21 | Intervu, Inc. | System and method for delivery of video data over a computer network |
EP0817486A2 (fr) * | 1996-06-27 | 1998-01-07 | AT&T Corp. | Méthode de changement d'une transmission par radiodiffusion en fonction de son destinataire à travers un réseau de télécommunication |
US6226618B1 (en) * | 1998-08-13 | 2001-05-01 | International Business Machines Corporation | Electronic content delivery system |
US20010051996A1 (en) * | 2000-02-18 | 2001-12-13 | Cooper Robin Ross | Network-based content distribution system |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8381241B2 (en) | 2004-04-23 | 2013-02-19 | The Nielsen Company (Us), Llc | Methods and apparatus to maintain audience privacy while determining viewing of video-on-demand programs |
US9565473B2 (en) | 2004-04-23 | 2017-02-07 | The Nielsen Company (Us), Llc | Methods and apparatus to maintain audience privacy while determining viewing of video-on-demand programs |
US9015740B2 (en) | 2005-12-12 | 2015-04-21 | The Nielsen Company (Us), Llc | Systems and methods to wirelessly meter audio/visual devices |
US9124769B2 (en) | 2008-10-31 | 2015-09-01 | The Nielsen Company (Us), Llc | Methods and apparatus to verify presentation of media content |
US10469901B2 (en) | 2008-10-31 | 2019-11-05 | The Nielsen Company (Us), Llc | Methods and apparatus to verify presentation of media content |
US11070874B2 (en) | 2008-10-31 | 2021-07-20 | The Nielsen Company (Us), Llc | Methods and apparatus to verify presentation of media content |
US11778268B2 (en) | 2008-10-31 | 2023-10-03 | The Nielsen Company (Us), Llc | Methods and apparatus to verify presentation of media content |
US8307006B2 (en) | 2010-06-30 | 2012-11-06 | The Nielsen Company (Us), Llc | Methods and apparatus to obtain anonymous audience measurement data from network server data for particular demographic and usage profiles |
US8903864B2 (en) | 2010-06-30 | 2014-12-02 | The Nielsen Company (Us), Llc | Methods and apparatus to obtain anonymous audience measurement data from network server data for particular demographic and usage profiles |
US9355138B2 (en) | 2010-06-30 | 2016-05-31 | The Nielsen Company (Us), Llc | Methods and apparatus to obtain anonymous audience measurement data from network server data for particular demographic and usage profiles |
ES2393014A1 (es) * | 2010-09-23 | 2012-12-17 | Universidad De Alcalá | Equipo de autenticación de fecha y hora para video escenas. |
Also Published As
Publication number | Publication date |
---|---|
AU2002239686A1 (en) | 2003-09-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7669056B2 (en) | Method and apparatus for measuring presentation data exposure | |
US6829368B2 (en) | Establishing and interacting with on-line media collections using identifiers in media signals | |
US7383229B2 (en) | Access control and metering system for streaming media | |
US9843846B2 (en) | Watermark and fingerprint systems for media | |
US7587601B2 (en) | Digital watermarking methods and apparatus for use with audio and video content | |
US8566893B2 (en) | Systems and methods for providing a token registry and encoder | |
US6353929B1 (en) | Cooperative system for measuring electronic media | |
US7124442B2 (en) | System and method for insertion and retrieval of microthreads in transmitted data | |
US20090083541A1 (en) | Method and apparatus for distributing digital content | |
EP2779662A1 (fr) | Systèmes et procédés permettant d'utiliser des identificateurs segmentés dérivés de signaux afin de gérer la contention de ressources et l'accès de contrôle à des fonctions et des données | |
US20100322035A1 (en) | Audio-Based, Location-Related Methods | |
US20050058319A1 (en) | Portable devices and methods employing digital watermarking | |
KR20020041328A (ko) | 음악 또는 다른 미디어에서 디지털 워터마킹을 이용하는방법들 및 시스템 | |
EP2659448A1 (fr) | Techniques de mise en correspondance pour la surveillance et les informations inter-plateformes | |
WO2008060032A1 (fr) | Système et procédé permettant d'analyser l'utilisation d'un contenu dans lequel sont intégrées en filigrane des informations d'empreinte digitale | |
US20020124077A1 (en) | Advertising and audience authentication with server-side measurement and client-side verification | |
WO2003071737A1 (fr) | Authentification de trafic de programmation de medias verifies realisee sur reseau informatique | |
WO2001033752A1 (fr) | Suivi direct des spectateurs d'un contenu selectionne d'une programmation audio et video fournie par un reseau informatique | |
WO2002010948A1 (fr) | Authentification du trafic de programmation audio et video distribuee par un reseau informatique | |
KR100695574B1 (ko) | 인터넷 기반의 광고방송 시스템 및 광고방송 방법 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AL AM AT AU AZ BA BB BG BR BY CA CH CN CU CZ DE DK EE ES FI GB GE GH GM HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT UA UG UZ VN YU ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
122 | Ep: pct application non-entry in european phase | ||
NENP | Non-entry into the national phase |
Ref country code: JP |
|
WWW | Wipo information: withdrawn in national office |
Country of ref document: JP |