Platform-agnostic media framework

ABSTRACT

An embodiment includes software that causes a third node to perform operations comprising: in response to receiving a first identifier for a first node that includes at least one processor, authenticate a first user of the first node via a first authentication service; in response to receiving a second identifier for a second node that includes at least one processor, authenticate a second user of the second node via a second authentication service that is unequal to the first authentication service; in response to authenticating the first user of the first node, communicate a first list of media assets to the first computing node; in response to authenticating the second user of the second node, communicate a second list of media assets to the second computing node. Other embodiments are described herein.

CROSS-REFERENCE TO RELATED APPLICATION

This application claims priority to U.S. Provisional Patent ApplicationNo. 62/599,096 filed on Dec. 15, 2017 and entitled “Platform-AgnosticMedia Framework”, the content of which is hereby incorporated byreference.

TECHNICAL FIELD

Embodiments concern efficiency improvements to data processing and, moreparticularly, efficiency improvements to systems used to provideinformation through a network. Embodiments address, for example,improvements over web syndication such as Really Simple Syndication(RSS).

BACKGROUND

The advent of Web Syndication has created a powerful bond betweencontent providers and content consumers. The current technology known asReal Simple Syndication (RSS) greatly simplifies this relationship andallows for a scalable application. The content providers organizepublished content into logical channels. All information regarding thischannel such as content assets, publication dates, URL information,etc., is maintained by the content provider in a simple ExtensibleMarkup Language (XML) document. When new content is published, thisdocument is simply extended to include the new information and saved.The content consumers are aware of the presence of the document andinstruct a user agent software to monitor the document for change. Upondetection of any change to the document, which indicates either amodification of existing content or the publication of new content, theuser agent resolves these changes against the consumption history of theuser. The agent then notifies the user of this update and the user maychoose to consume the content at any time in the future. Web syndicationallows for full decoupling of the publication vs. consumption activitiesand allows for the scale of one-to-many publisher to consumerrelationships.

BRIEF DESCRIPTION OF THE DRAWINGS

Features and advantages of embodiments of the present invention willbecome apparent from the appended claims, the following detaileddescription of one or more example embodiments, and the correspondingfigures. Where considered appropriate, reference labels have beenrepeated among the figures to indicate corresponding or analogouselements.

FIG. 1 concerns a network architecture in an embodiment.

FIG. 2 concerns an architecture for enabling full automation at themedia asset level.

FIG. 3 addresses a process for utilizing the architecture of FIG. 2.

FIG. 4 concerns an application program interface (API) and use thereofin an embodiment.

FIGS. 5A and 5B shows an example of a consumption context unit in anembodiment.

FIGS. 6A and 6B show a process from a client perspective in anembodiment.

FIG. 7 shows an authentication method in an embodiment.

FIG. 8 shows a content provision method in an embodiment.

FIGS. 9, 10, 11 include systems for enabling embodiments.

DETAILED DESCRIPTION

Reference will now be made to the drawings wherein like structures maybe provided with like suffix reference designations. In order to showthe structures of various embodiments more clearly, the drawingsincluded herein are diagrammatic representations of structures. Thus,the actual appearance of the structures, for example in a photo, mayappear different while still incorporating the claimed structures of theillustrated embodiments. Moreover, the drawings may only show thestructures useful to understand the illustrated embodiments. Additionalstructures known in the art may not have been included to maintain theclarity of the drawings. “An embodiment”, “various embodiments” and thelike indicate embodiment(s) so described may include particularfeatures, structures, or characteristics, but not every embodimentnecessarily includes the particular features, structures, orcharacteristics. Some embodiments may have some, all, or none of thefeatures described for other embodiments. “First”, “second”, “third” andthe like describe a common object and indicate different instances oflike objects are being referred to. Such adjectives do not imply objectsso described must be in a given sequence, either temporally, spatially,in ranking, or in any other manner. “Connected” may indicate elementsare in direct physical or electrical contact with each other and“coupled” may indicate elements co-operate or interact with each other,but they may or may not be in direct physical or electrical contact.Phrases such as “comprising at least one of A and B” include situationswith A, B, or A and B.

The “Background” section above addresses RSS. Applicant determined,however, RSS has several shortcomings and lacks several features andabilities that could enhance not only the publication and consumptionprocesses but also provide significant additional commercial value tothe a web syndication system. An embodiment described herein provides aframework for these extensions. Such an embodiment provides for aplatform for aggregation, personalization, authentication, accesscontrol, accounting, and more, all of which are missing from the currentweb syndication art.

Applicant further noted current enterprise-oriented media consumptionapplications for mobile environments are designed to work with aspecific service, tightly coupled with a restricted authenticationworkflow and authorization rules. Even those that claim to supportSingle Sign-On (SSO) still restrict the data model, authorization rules,access control, statistics and reporting, notification, playbackoptions, and security features to specific platform requirements.

To address the above shortcomings, an embodiment consists of anapplication that resides between the content publishers and the contentconsumers. This middle-application is coupled to an extended featureuser agent application to be used by the content consumer. The middleapplication works in concert and in direct communication with each useragent. This distribution of control logic allows for automation to beinjected into the Web Syndication system. This automation extends theabilities of the content publishers and greatly enhances the userexperience of the content consumers. This system conceptually replacesand greatly extends what is possible with the simple RSS XML document bycreating and publishing services that may be utilized to abstract andvirtualize all aspects of web syndication.

To further address the above shortcomings, an embodiment includes aplatform-agnostic media application framework that allows playback ofany media type (audio, video, live, VR, etc.) via an HTML5-poweredplayer framework, inside any authentication system (whether it is SAML,OAuth, OpenlD, or even custom/unique services), interfacing with anynetwork backend (REST, RSS, RPC, etc. with any resource structure andaccess control rules), reporting to any analytics infrastructure(including media playback statistics, user tracking, and customanalytics tied to user roles and behavior), as well as supportingconfigurable push notifications, social functions like commenting andsharing, encrypted local resources, and other secure restrictivepolicies to ensure only authorized users are able to access content atany given moment.

Also, since the application can be configured from a remote service, thelook-and-feel (branding, logos, colors, media player functionality,etc.) can be tailored to an individual organization's requirementsdynamically without deploying new application builds.

FIG. 1 shows a detailed network diagram of an embodiment. Displayedwithin this drawing is a network of elements that may be connected viaLAN or WAN interconnect such that an interactive communication systemexists. Item 101 represents the web syndication automation layerresiding within a web accessible server. In direct communication with101 are three exemplary items (one of which is labeled 102) whichrepresent mobile and/or WAN connected PC devices (e.g., phone, tablet,PC). The items, such as item 102, are the media consumption endpointswhich are assumed to be under the control of human media consumers. Eachitem such as item 102 may be assumed to contain a local storage function(however only item 102 shows storage 103) which may be used by the useragent (agent 108 is shown with the tablet but other instances of theagent exists for the phone and the PC) for retention of applicableinformation such as authentication credentials, off-line copy of media,off line analytics collection, etc.) Directly attached to logic 101 is alocally stored library of media that may be consumed by device 102.These media assets (e.g., videos, audio files, etc.) are directlymanaged by the administrator(s) of logic 101. Also attached to logic 101and directly administered are the contents of the operational database105. Within 105 are all or most details needed for management of theuser base (e.g., a group of sales personnel) and remote clientenvironment (102, 103, 108) as well as all information needed for theproper authentication, delivery, and accounting for media that ispublished within the network (104, 106). All downloadable asset materialrequired by 102 such as media player executables, branding, “look andfeel” of the user experience, notifications, etc., is described asmeta-data contained within 105.

Item(s) 106 represent media and authentication services that are remoteto 101. 106 allows for remote and/or proprietary media to be seamlesslyincluded into 101 as if it were locally stored in 104. An example of 106would be an enterprise which wishes to publish private and/orproprietary media to a controlled user base along with more generallyavailable media. The Authentication, Authorization, Accounting (AAA)services within 106 allow for the definition of consumer groups suchthat the enterprise could create department level media libraries forinternal consumption as well as public, customer-facing libraries withinthe same system (101, 102).

In an embodiment, the AAA services of 106 may serve as the primaryAuthentication services for the entire 101 system. In this case, theusers will experience a Single Sign On (SSO) experience where it appearsthey are signing into an enterprise application. It is also assumed inthis case that the AAA services of 106 may be able to define user groupsand classes of service that are then used to drive the construction ofSC 408 and CCU 302 entities at any level of granularity.

Item(s) 107 represent the ability to describe remote analytics systemswithin 101 that are the receiver of statistics and events with eachuser's consumption context. 101 and 105 allow for an arbitrary set ofanalytics engines to be defined to be used in a configurable andflexible manner. An example of this would be to specify a differentanalytics engine for content within 106 as would be specified forcontent within 104.

FIG. 2 represents a model for enabling full automation at the mediaasset level upon consumption. FIG. 2 shows a logical model for thecollection of services within a specific service domain. 201 is arepresentation for one of these service domains. It is anticipated thatthe set of possible service domains is extensible in response totechnology and commercial needs. As an example, 201 represents the DataAnalytics service domain. Within 201 are individual service modules thatprovide proprietary and/or specific service within that domain. (e.g.,Google Analytics as a target for 107.) The services (203, 204, etc.)described within may be individually selected to form an individualcontext for media consumption by asset. In other words, the system ofFIG. 2 represents a menu where individual services are selected, asrequired, on an asset by asset basis. FIG. 3 describes this selection.

As shown in FIG. 3, the media asset 303 is determined to require thefollowing individual services for consumption: Google Analytics (301),an HTML5 Video player (305), asset delivery via a Web-based RESTinterface (306), the REST interface is authenticated by theSalesForce.com SSO interface/credentials (307). Each of the individualservice selections combine to form a logical unit named a ConsumptionContext Unit (CCU) 302. 302 defines all variable and configurableaspects for service delivery encompassing the full consumption livecycle of media asset 304.

The details and associations for the construction of 302 are containedwithin 105 and may be considered to be a dynamic collection, able to bedefined at initial media publication but altered at any time thereafter.

FIGS. 5A and 5B show an example configuration of the CCU as a JSONrepresentation and an example RSS file that could be retrieved as partof the process. The initial JSON file may be stored with the applicationor retrieved from a network service dynamically based on devicesettings, user input, or other contextual information. 501 details theJSON configuration. 502 details an example authentication configurationfor a SAML endpoint. 503 details an example data configuration,providing access rules that inform the client how to retrieve and parsethe resulting RSS metadata for shows, media assets, etc. 504 displays anexample HTML5 player configuration, including listing the supportedmedia types to request from the data layer. 505 displays an exampleanalytics configuration using an HTTP service URL. 506 demonstratesvarious example theming controls including color values, imagereferences, and file locations in order to retrieve and store brandingassets in local storage. Other service configurations may be providedfor social interactions or other purposes. These configurations maydynamically change based on responses from the authentication layer, thedata layer, etc. 507 demonstrates an example RSS document that could beretrieved for a single show. 508 shows that a data layer may referencethe CCU identifier indexing the union of configurations that were usedto access the content.

FIG. 4 displays an embodiment as it applies to a client-facingApplication Program Interface (API). The definition of this API providesa level of abstraction for the client application (108) such thatvariable implementations may be implemented via a unified datainterface, such that any authentication backend, content storageservice, analytics collector, etc., may be used while providing the sameclient experience.

For example, the client as installed provides a minimal UI such that theinitial user flow is as simple as initiating the login process 407. TheUI elements translate into 108 making a service call to the top-levellogin( ) method 401. This 401 action would call into the specific modulethat is configured for the application either as contained in 105 and/or106 or and is configured locally in 108. Once identified, the API callresolves to the specific service executable that is required. For anexample SAML implementation 402, a web interface would be launchedinside the client application 108, and the resulting callback wouldreturn a SessionContext (SC) record 408 which would later be provided toretrieveSession( ), logout( ), retrieveShows( ) etc., calls as needed.

The retrieveShows( ) 403 method, which when provided a valid 408 record,would retrieve a supported list of media content for which the currentuser is authorized to view. Each of these content instances would beaccompanied by its specific CCU 302 record as constructed using the SC408 as an index.

For instance, based upon the SC 408 associated to an individual user, auser group may be created and enforced. Upon the 401 call, if the SAMLendpoint 402 reported that the user was a member of the Marketingorganization, the list of shows 303 and CCUs 409 would be different fromthat of a user in the Sales organization.

Subsequently, a REST implementation 404 would need to convert theSessionContext 408 into the appropriate HTTP requests and standardizethe response into a List<Show> response object, as well as an updatedSessionContext 408 as necessary. This is repeated for any otherimplementations (for instance, if the RSS implementation 410 werespecified in the CCU 409, 410 would fetch the RSS document and convertthe response XML into a similar List<Show> object), and the pattern isfollowed for analytics (405, 406), social actions 608, etc.

FIGS. 6A and 6B display an exemplary view of the user experience whencombined with the system of logical automation described above. Image601 shows the initial state of the client 108 at the initial userinitiation state 407. Steps 401, 402, 408, 403, 404 show an example flowwithin this embodiment that results in a list of consumable assets inthe form of a set of CCU records 409. 108 then parses and displays 409in a user readable list of series 602, 603, and episodes within theseries 604, 605, 606. The final use of the CCU 302 is shown in image 607where the user is presented with the Play button to initiate thetransfer of the asset 303 from either local storage or remote access tobe rendered for display. Aspects of this workflow are defined by the CCUsystem of FIG. 3 and automated through the workflow system of FIG. 4.

A more detailed flow of embodiments concerning the above steps are shownin FIGS. 7 and 8.

In FIG. 7, the user experience begins with step 701 where the clientapplication 108 is requested to be installed upon the user mobile ordesktop device. This initial installation may also include a set ofconfigurations that is delivered along with the application itself. Thismetadata could be used to set certain configuration parameters in orderto either narrow the options for a specific user or to reduce the numberof user actions required to authenticate (e.g., indicating a specificendpoint for an SSO provider, or even providing an initial token or keyif the user is logged into an external system that redirects to theapplication installation). This installation step may resembleconventional application installation (e.g., iTunes, Google Android AppStore).

Once the application 108 is initialized and the user requests to log-in(407), step 702 commences. 108 will utilize the API as described in FIG.4 proceeding with the general login request 401. The recipient of thisrequest will be the application 101. 101 will then consult theoperational database 105 to determine the authentication/SSO optionsthat have been administered for that individual user and/or user agent,step 703.

Using the pre-packaged Metadata as described above, this system providesfor the creation of enterprise-specific and/or group-specific packagesthat are pre-configured to allow access only to specific medialibraries. As 101 consults 105, given the usage of metadata and/or otheragent specific information, a partial CCU 302 is built and returned tothe user agent 108 in step 704. This partial CCU is constructeddynamically based upon information that is keyed by the user identity ofthe consumer, metadata, etc., and therefore, it will contain possiblydifferent information for different users and/or at different times ofexecution.

In step 705, 108 parses the CCU record upon receipt and launches thespecified Authentication service as needed. Note that if multiple SSOoptions are available in the CCU 302, they will likely be presented in alist and the user may need to select one. Once the user initiates alogin process, the specific actions against that service will result insuccess or failure shown in step 706. An important aspect of thisembodiment is that the CCU 302 may specify 101 as the authenticationendpoint or it may specify one or more from the set or remote services106. The media consumer is not aware of this aspect of operation andsimply “sees” a single authentication window 601, regardless of theactual location of that service.

Upon a successful authentication, the authentication service must returna session context 408 which may be used against any of the contentbackends in the future workflow steps as shown in 707 with the flowdescribed in FIG. 8 commencing immediately.

Note that this embodiment provides for media to be consumed in anoffline mode (e.g., 108 is not connected to the mobile/WAN network.)There are therefore, these two paths for media consumption described inFIG. 8. This test is performed in step 802.

If 102 is determined to be in online mode step 803 commences withadditional detail in shown in the 408, 403, 404 sequence. It is in thissequence that the full CCU record is built where a list is builtcontaining each media asset that is accessible to that specific user.Each media asset is represented by a CCU 302 instance which specifiesall details for all services needed to consume that asset on thespecified device by the authenticated user. This full CCU 302 and asset303 information is then parsed and rendered in the UI of 108 asdescribed in screens 602 through 606 sequentially and in 804 as asummary. The above steps serve to fetch the dynamic list of accessiblemedia along with all aspects of media consumption, and render thatresult to the user.

The user may then make a selection of a specific media asset to view607, and initiates the play sequence. Step 805 makes a determinationwhether the selected media requires a player executable to be launched(e.g., an audio media asset may not require a special playerenvironment). The received CCU 302 instance is consulted and assumingthat a player is required and also that 108 is in online mode (806),step 807 commences.

In step 807, the CCU 302 instance for that specific media asset is againconsulted and all services and/or parameters for consumption of thatmedia asset are prepared and the transfer and presentation of the mediaitself is initiated. Step 808 shows how all information products of step807 are stored locally into 103 for that client such that the offlinepath in FIG. 8 may be executed in the future.

The details of the offline path may be simplified as a small variationof the workflow as described above. If it is determined that the clientis offline in 802, step 804 is executed where the CCU 302 instancespreviously received via 807 and stored via 808, are accessed from localstorage 103. Similarly, if the client is offline, the player executablethat was fetched via 807 and stored via 808 is accessed from localstorage 103. All other aspects of media consumption described in FIG. 8proceed identically from this point.

Regardless of offline/online mode, consumption analytics are trackedduring playback 810. The CCU 302 is consulted as to where to reportthese statistics (e.g., a selection from 201) and the client posts allevents to a remote online service 811.

Upon termination of the consumption activity, the user is returned tostate 801.

Image 608 shows an exemplary extension to systems described above. Inthis embodiment, the CCU system (see FIG. 3) and workflow and API system(see FIG. 4) have been extended to include social media interaction. Inother words a new service domain (e.g., logically similar to 201 or 202)is identified and a new logical column may be added to FIG. 2. Withinthis new service domain, all applicable service endpoints (e.g.,logically similar to 203 or 204) are defined and implemented. These areoptional service selections that may be specified for that servicedomain when the CCU is dynamically constructed. Once completed, any CCUinstance 302 may also then contain directives that associate auser/client/media tuple to the desired new set of functional servicebehaviors. This social media extension example would allow for usercomments, reposting etc., to be strictly controlled by policy and AAAsystems through the use of this embodiment as one in the art canforesee. All of these actions are surfaced in the CCU 302 constructedfor that consumption event.

FIGS. 9-11 includes systems upon which embodiments may be executed.

Referring now to FIG. 9, shown is a block diagram of an example systemwith which embodiments can be used. As seen, system 900 may be asmartphone or other wireless communicator or any other Internet ofThings (IoT) device. A baseband processor 905 is configured to performvarious signal processing with regard to communication signals to betransmitted from or received by the system. In turn, baseband processor905 is coupled to an application processor 910, which may be a main CPUof the system to execute an OS and other system software, in addition touser applications such as many well-known social media and multimediaapps. Application processor 910 may further be configured to perform avariety of other computing operations for the device.

In turn, application processor 910 can couple to a userinterface/display 920 (e.g., touch screen display). In addition,application processor 910 may couple to a memory system including anon-volatile memory, namely a flash memory 930 and a system memory,namely a DRAM 935. As further seen, application processor 910 alsocouples to audio output 995 and a capture device 945 such as one or moreimage capture devices that can record video and/or still images.

A universal integrated circuit card (UICC) 940 comprises a subscriberidentity module, which in some embodiments includes a secure storage tostore secure user information. System 900 may further include a securityprocessor 950 (e.g., Trusted Platform Module (TPM)) that may couple toapplication processor 910. A plurality of sensors 925, including one ormore multi-axis accelerometers may couple to application processor 910to enable input of a variety of sensed information such as motion andother environmental information. In addition, one or more authenticationdevices may be used to receive, for example, user biometric input foruse in authentication operations.

As further illustrated, a near field communication (NFC) contactlessinterface 960 is provided that communicates in a NFC near field via anNFC antenna 965. While separate antennae are shown, understand that insome implementations one antenna or a different set of antennae may beprovided to enable various wireless functionalities.

A power management integrated circuit (PMIC) 915 couples to applicationprocessor 910 to perform platform level power management. To this end,PMIC 915 may issue power management requests to application processor910 to enter certain low power states as desired. Furthermore, based onplatform constraints, PMIC 915 may also control the power level of othercomponents of system 900.

To enable communications to be transmitted and received such as in oneor more internet of things (IoT) networks, various circuitry may becoupled between baseband processor 905 and an antenna 990. Specifically,a radio frequency (RF) transceiver 970 and a wireless local area network(WLAN) transceiver 975 may be present. In general, RF transceiver 970may be used to receive and transmit wireless data and calls according toa given wireless communication protocol such as 3G or 4G wirelesscommunication protocol such as in accordance with a code divisionmultiple access (CDMA), global system for mobile communication (GSM),long term evolution (LTE) or other protocol. In addition a GPS sensor980 may be present, with location information being provided to securityprocessor 950 for use as described herein when context information is tobe used in a pairing process. Other wireless communications such asreceipt or transmission of radio signals (e.g., AM/FM) and other signalsmay also be provided. In addition, via WLAN transceiver 975, localwireless communications, such as according to a Bluetooth™ or IEEE802.11 standard can also be realized.

Referring now to FIG. 10, shown is a block diagram of a system inaccordance with another embodiment. Multiprocessor system 1000 is apoint-to-point interconnect system such as a server system, and includesa first processor 1070 and a second processor 1080 coupled via apoint-to-point interconnect 1050. Each of processors 1070 and 1080 maybe multicore processors such as SoCs, including first and secondprocessor cores (i.e., processor cores 1074 a and 1074 b and processorcores 1084 a and 1084 b), although potentially many more cores may bepresent in the processors. In addition, processors 1070 and 1080 eachmay include a secure engine 1075 and 1085 to perform security operationssuch as attestations, IoT network onboarding or so forth.

First processor 1070 further includes a memory controller hub (MCH) 1072and point-to-point (P-P) interfaces 1076 and 1078. Similarly, secondprocessor 1080 includes a MCH 1082 and P-P interfaces 1086 and 1088.MCH's 1072 and 1082 couple the processors to respective memories, namelya memory 1032 and a memory 1034, which may be portions of main memory(e.g., a DRAM) locally attached to the respective processors. Firstprocessor 1070 and second processor 1080 may be coupled to a chipset1090 via P-P interconnects 1062 and 1064, respectively. Chipset 1090includes P-P interfaces 1094 and 1098.

Furthermore, chipset 1090 includes an interface 1092 to couple chipset1090 with a high performance graphics engine 1038, by a P-P interconnect1039. In turn, chipset 1090 may be coupled to a first bus 1016 via aninterface 1096. Various input/output (I/O) devices 1014 may be coupledto first bus 1016, along with a bus bridge 1018 which couples first bus1016 to a second bus 1020. Various devices may be coupled to second bus1020 including, for example, a keyboard/mouse 1022, communicationdevices 1026 and a data storage unit 1028 such as a non-volatile storageor other mass storage device. As seen, data storage unit 1028 mayinclude code 1030, in one embodiment. As further seen, data storage unit1028 also includes a trusted storage 1029 to store sensitive informationto be protected. Further, an audio I/O 1024 may be coupled to second bus1020.

Referring now to FIG. 11, embodiments may be used in environments whereIoT devices may include wearable devices or other small form factor IoTdevices. Shown is a block diagram of a wearable module 1300 inaccordance with another embodiment. In one particular implementation,module 1300 may be an Intel® Curie™ module that includes multiplecomponents adapted within a single small module that can be implementedas all or part of a wearable device. As seen, module 1300 includes acore 1310 (of course in other embodiments more than one core may bepresent). Such core may be a relatively low complexity in-order core,such as based on an Intel Architecture® Quark™ design. In someembodiments, core 1310 may implement a Trusted Execution Environment(TEE). Core 1310 couples to various components including a sensor hub1320, which may be configured to interact with a plurality of sensors1380, such as one or more biometric, motion environmental or othersensors. A power delivery circuit 1330 is present, along with anon-volatile storage 1340. In an embodiment, this circuit may include arechargeable battery and a recharging circuit, which may in oneembodiment receive charging power wirelessly. One or more input/output(TO) interfaces 1350, such as one or more interfaces compatible with oneor more of USB/SPI/I2C/GPIO protocols, may be present. In addition, awireless transceiver 1390, which may be a Bluetooth™ low energy or othershort-range wireless transceiver is present to enable wirelesscommunications as described herein. Understand that in differentimplementations a wearable module can take many other forms. Wearableand/or IoT devices have, in comparison with a typical general purposeCPU or a GPU, a small form factor, low power requirements, limitedinstruction sets, relatively slow computation throughput, or any of theabove.

The following examples pertain to further embodiments.

Example 1: At least one machine-readable medium having stored thereondata which, if used by a third node that includes at least oneprocessor, causes the third node to perform operations comprising: inresponse to receiving a first identifier for a first node that includesat least one processor, authenticate a first user of the first node viaa first authentication service; in response to receiving a secondidentifier for a second node that includes at least one processor,authenticate a second user of the second node via a secondauthentication service that is unequal to the first authenticationservice; in response to authenticating the first user of the first node,communicate a first list of media assets to the first computing node; inresponse to authenticating the second user of the second node,communicate a second list of media assets to the second computing node;wherein the first list of media assets includes a first number of mediaassets, the second list of media assets includes a second number ofmedia assets, and the first number is unequal to the second number.

The identifier may include a field from the first screen of FIG. 6A. Thefirst node may include a phone and the third node may include a server,computing cluster, and the like. The users may be from differentorganizations (e.g., different companies that both employ an additionalcompany that manages the third node) or different groups within anorganization (e.g., sales vs. marketing groups). Thus, the users mayobtain differing aggregations of media assets (e.g., videos).

Example 2. The at least one medium of example 1: wherein receiving thefirst identifier for the first node includes receiving the firstidentifier for the first node at a first time; wherein the operationsfurther comprise in response to receiving the first identifier for thefirst node at a second time that follows the first time, authenticatethe first user of the first node via at least one of the secondauthentication service or a third authentication service.

Thus, a user may revisit the third node many times over one or moreyears. However, the user's company may have switched authenticationservices during that time. Still, the user may be oblivious to such aswitch as the switch is handled in the background by, for example, aCCU.

Example 3. The at least one medium of example 1, wherein the operationscomprise: in response to authenticating the first user, communicating afirst media player to the first computing node; in response toauthenticating the second user, communicating a second media player tothe second computing node but not the first computing node; wherein thefirst media player corresponds to a first format of media and the secondplayer corresponds to a second format of media; wherein the first formatof media is unequal to the second format of media.

Example 4. The at least one medium of example 3, wherein the first mediaplayer includes an executable file.

Example 5. The at least one medium of example 1, wherein the operationscomprise: in response to authenticating the first user, communicating atleast one first configuration file to the first computing node; inresponse to authenticating the second user, communicating at least onesecond configuration file to the second computing node but not the firstcomputing node.

Such files may include, for example, JSON CCU files.

Example 6. The at least one medium of example 5, wherein: the at leastone first configuration file directs the first user to a first analyticsservice; the at least one first configuration file directs the seconduser to a second analytics service.

Example 7. The at least one medium of example 6, wherein the operationscomprise: in response to authenticating the first user, creating atleast a portion of the first configuration file; in response toauthenticating the second user, creating at least a portion of thesecond configuration file.

For example, portions of a CCU may be formed “on the fly.”

Example 8. The at least one medium of example 7, wherein the first andsecond authentications services are hosted on different computing nodesfrom one another.

For instance, the services may be hosted by different companies thatoperate services on different server systems.

Example 9. The at least one medium of example 5: wherein receiving thefirst identifier for the first node includes receiving the firstidentifier for the first node at a first time; wherein the operationsfurther comprise in response to receiving the first identifier for thefirst node at a second time that follows the first time, communicate athird list of media assets to the first computing node; wherein thethird list of media assets includes a third number of media assets, andthe first number is unequal to the third number.

For instance, the user's aggregated videos may change over time.

Example 10. The at least one medium of example 9, wherein the operationscomprise: determining a characteristic of the first node; in response todetermining the characteristic of the first node, communicating the atleast one first configuration file to the first computing node.

Example 11. The at least one medium of example 10, wherein thecharacteristic of the first node corresponds to a characteristic ofhardware included in the first node.

For instance, a portion (e.g., 1%, 50%, 100%) of a CCU may be formedafter determining a type of phone a user is operating.

Example 12. The at least one medium of example 9, wherein the operationscomprise: determining a characteristic of the first node; in response todetermining the characteristic of the first node, creating a portion ofthe at least one first configuration file and then communicating theportion to the first node.

Example 13. The at least one medium of example 5, wherein the at leastone first configuration file includes configuration information for thefirst authentication service but not the second authentication service.

Example 14. The at least one medium of example 6, wherein the at leastone first configuration file includes configuration information for thefirst analytics service.

Example 15. The at least one medium of example 14, wherein the at leastone first configuration file includes branding information correspondingto a single sign on (SSO) display.

For instance, see the first screen of FIG. 6A.

Example 16. The at least one medium of example 15, wherein the at leastone first configuration file includes configuration information for amedia player.

Example 17. The at least one medium of example 5, wherein the at leastone first configuration file includes a Real Simple Syndication (RSS)document.

Example 18. The at least one medium of example 5: wherein the at leastone first configuration file includes an identifier corresponding to agroup; in response to receiving a fourth identifier for a fourth nodethat includes at least one processor, determine the fourth identifier isincluded within a group that includes the first identifier; in responseto determine the fourth identifier is included within the group,communicating another instance of the at least one first configurationfile to the fourth computing node.

Example 19. The at least one medium of example 5, wherein the operationscomprise in response to authenticating the first user, communicating atleast one third configuration file to the first computing node; whereinthe at least one first configuration file corresponds to a first mediaasset included in the first list; wherein the at least one thirdconfiguration file corresponds to a third media asset included in thefirst list.

For instance, a company may have a standard CCU for a group ofemployees.

Example 1a: An apparatus comprising: a third node including at least onememory and at least one processor, coupled to the at least one memory,to perform operations comprising: in response to receiving a firstidentifier for a first node that includes at least one processor,authenticate a first user of the first node via a first authenticationservice; in response to receiving a second identifier for a second nodethat includes at least one processor, authenticate a second user of thesecond node via a second authentication service that is unequal to thefirst authentication service; in response to authenticating the firstuser of the first node, communicate a first list of media assets to thefirst computing node; in response to authenticating the second user ofthe second node, communicate a second list of media assets to the secondcomputing node; wherein the first list of media assets includes a firstnumber of media assets, the second list of media assets includes asecond number of media assets, and the first number is unequal to thesecond number.

Example 2a. The apparatus of example 1a: wherein receiving the firstidentifier for the first node includes receiving the first identifierfor the first node at a first time; wherein the operations furthercomprise in response to receiving the first identifier for the firstnode at a second time that follows the first time, authenticate thefirst user of the first node via at least one of the secondauthentication service or a third authentication service.

Example 3a. The apparatus of example 1a, wherein the operationscomprise: in response to authenticating the first user, communicating afirst media player to the first computing node; in response toauthenticating the second user, communicating a second media player tothe second computing node but not the first computing node; wherein thefirst media player corresponds to a first format of media and the secondplayer corresponds to a second format of media; wherein the first formatof media is unequal to the second format of media.

Example 4a. The at least one medium of example 3a, wherein the firstmedia player includes an executable file.

Example 5a. The apparatus of example 1a, wherein the operationscomprise: in response to authenticating the first user, communicating atleast one first configuration file to the first computing node; inresponse to authenticating the second user, communicating at least onesecond configuration file to the second computing node but not the firstcomputing node.

Example 6a. The apparatus of example 5a, wherein: the at least one firstconfiguration file directs the first user to a first analytics service;the at least one first configuration file directs the second user to asecond analytics service.

Example 7a. The apparatus of example 6a, wherein the operationscomprise: in response to authenticating the first user, creating atleast a portion of the first configuration file; in response toauthenticating the second user, creating at least a portion of thesecond configuration file.

Example 8a. The apparatus of example 7a, wherein the first and secondauthentications services are hosted on different computing nodes fromone another.

Example 9a. The apparatus of example 5a: wherein receiving the firstidentifier for the first node includes receiving the first identifierfor the first node at a first time; wherein the operations furthercomprise in response to receiving the first identifier for the firstnode at a second time that follows the first time, communicate a thirdlist of media assets to the first computing node; wherein the third listof media assets includes a third number of media assets, and the firstnumber is unequal to the third number.

Example 10a. The apparatus of example 9a, wherein the operationscomprise: determining a characteristic of the first node; in response todetermining the characteristic of the first node, communicating the atleast one first configuration file to the first computing node.

Example 11a. The apparatus of example 10a, wherein the characteristic ofthe first node corresponds to a characteristic of hardware included inthe first node.

Example 12a. The apparatus of example 9a, wherein the operationscomprise: determining a characteristic of the first node; in response todetermining the characteristic of the first node, creating a portion ofthe at least one first configuration file and then communicating theportion to the first node.

Example 13a. The apparatus of example 5a, wherein the at least one firstconfiguration file includes configuration information for the firstauthentication service but not the second authentication service.

Example 14a. The apparatus of example 6a, wherein the at least one firstconfiguration file includes configuration information for the firstanalytics service.

Example 15a. The apparatus of example 14a, wherein the at least onefirst configuration file includes branding information corresponding toa single sign on (SSO) display.

Example 16a. The apparatus of example 15a, wherein the at least onefirst configuration file includes configuration information for a mediaplayer.

Example 17a. The apparatus of example 5a, wherein the at least one firstconfiguration file includes a Real Simple Syndication (RSS) document.

Example 18a. The apparatus of example 5a: wherein the at least one firstconfiguration file includes an identifier corresponding to a group; inresponse to receiving a fourth identifier for a fourth node thatincludes at least one processor, determine the fourth identifier isincluded within a group that includes the first identifier; in responseto determine the fourth identifier is included within the group,communicating another instance of the at least one first configurationfile to the fourth computing node.

Example 19a. The apparatus of example 5a, wherein the operationscomprise in response to authenticating the first user, communicating atleast one third configuration file to the first computing node; whereinthe at least one first configuration file corresponds to a first mediaasset included in the first list; wherein the at least one thirdconfiguration file corresponds to a third media asset included in thefirst list.

Example 1b: At least one machine-readable medium having stored thereondata which, if used by first and second nodes that each include at leastone processor, causes the first and second nodes to perform operationscomprising: the first node communicating a first identifier to a thirdnode that includes at least one processor and that authenticates a firstuser of the first node via a first authentication service; the secondnode communicating a second identifier to the third node thatauthenticates a second user of the second node via a secondauthentication service that is unequal to the first authenticationservice; in response to authenticating the first user of the first node,the first node receiving a first list of media assets from the thirdcomputing node; in response to authenticating the second user of thesecond node, the second node receiving a second list of media assets;wherein the first list of media assets includes a first number of mediaassets, the second list of media assets includes a second number ofmedia assets, and the first number is unequal to the second number.

A computing node, a used herein, may include a distributed computingsystem and does not necessarily mean all parts of the node are includedin a single chassis such as a server rack or a PC.

Example 2b. The at least one medium of example 1b, wherein theoperations comprise: in response to authenticating the first user, thefirst node receiving at least one first configuration file from thethird computing node; in response to authenticating the second user, thesecond node receiving at least one second configuration file from thethird computing.

Persons skilled in the relevant art can appreciate that manymodifications and variations are possible in light of the aboveteaching. Persons skilled in the art will recognize various equivalentcombinations and substitutions for various components shown in theFigures. It is therefore intended that the scope of the invention belimited not by this detailed description, but rather by the claimsappended hereto.

1. At least one non-transitory machine-readable medium having storedthereon data which, if used by a third node that includes at least oneprocessor, causes the third node to perform operations comprising: inresponse to receiving a first identifier for a first node that includesat least one processor, authenticate a first user of the first node viaa first authentication service; in response to receiving a secondidentifier for a second node that includes at least one processor,authenticate a second user of the second node via a secondauthentication service that is unequal to the first authenticationservice; in response to authenticating the first user of the first node,communicate a first list of media assets to the first computing node; inresponse to authenticating the second user of the second node,communicate a second list of media assets to the second computing node;wherein the first list of media assets includes a first number of mediaassets, the second list of media assets includes a second number ofmedia assets, and the first number is unequal to the second number. 2.The at least one medium of claim 1: wherein receiving the firstidentifier for the first node includes receiving the first identifierfor the first node at a first time; wherein the operations furthercomprise in response to receiving the first identifier for the firstnode at a second time that follows the first time, authenticate thefirst user of the first node via at least one of the secondauthentication service or a third authentication service.
 3. The atleast one medium of claim 1, wherein the operations comprise: inresponse to authenticating the first user, communicating a first mediaplayer to the first computing node; in response to authenticating thesecond user, communicating a second media player to the second computingnode but not the first computing node; wherein the first media playercorresponds to a first format of media and the second player correspondsto a second format of media; wherein the first format of media isunequal to the second format of media.
 4. The at least one medium ofclaim 3, wherein the first media player includes an executable file. 5.The at least one medium of claim 1, wherein the operations comprise: inresponse to authenticating the first user, communicating at least onefirst configuration file to the first computing node; in response toauthenticating the second user, communicating at least one secondconfiguration file to the second computing node but not the firstcomputing node.
 6. The at least one medium of claim 5, wherein: the atleast one first configuration file directs the first user to a firstanalytics service; the at least one first configuration file directs thesecond user to a second analytics service.
 7. The at least one medium ofclaim 6, wherein the operations comprise: in response to authenticatingthe first user, creating at least a portion of the first configurationfile; in response to authenticating the second user, creating at least aportion of the second configuration file.
 8. The at least one medium ofclaim 7, wherein the first and second authentication services are hostedon different computing nodes from one another.
 9. The at least onemedium of claim 5: wherein receiving the first identifier for the firstnode includes receiving the first identifier for the first node at afirst time; wherein the operations further comprise in response toreceiving the first identifier for the first node at a second time thatfollows the first time, communicate a third list of media assets to thefirst computing node; wherein the third list of media assets includes athird number of media assets, and the first number is unequal to thethird number.
 10. The at least one medium of claim 9, wherein theoperations comprise: determining a characteristic of the first node; inresponse to determining the characteristic of the first node,communicating the at least one first configuration file to the firstcomputing node.
 11. The at least one medium of claim 10, wherein thecharacteristic of the first node corresponds to a characteristic ofhardware included in the first node.
 12. The at least one medium ofclaim 9, wherein the operations comprise: determining a characteristicof the first node; in response to determining the characteristic of thefirst node, creating a portion of the at least one first configurationfile and then communicating the portion to the first node.
 13. The atleast one medium of claim 5, wherein the at least one firstconfiguration file includes configuration information for the firstauthentication service but not the second authentication service. 14.The at least one medium of claim 6, wherein the at least one firstconfiguration file includes configuration information for the firstanalytics service.
 15. The at least one medium of claim 14, wherein theat least one first configuration file includes branding informationcorresponding to a single sign on (SSO) display.
 16. The at least onemedium of claim 15, wherein the at least one first configuration fileincludes configuration information for a media player.
 17. The at leastone medium of claim 5, wherein the at least one first configuration fileincludes a Real Simple Syndication (RSS) document.
 18. The at least onemedium of claim 8: wherein the at least one first configuration fileincludes an identifier corresponding to a group; in response toreceiving a fourth identifier for a fourth node that includes at leastone processor, determine the fourth identifier is included within agroup that includes the first identifier; in response to determining thefourth identifier is included within the group, communicating anotherinstance of the at least one first configuration file to the fourthcomputing node.
 19. The at least one medium of claim 5: wherein theoperations comprise in response to authenticating the first user,communicating at least one third configuration file to the firstcomputing node; wherein the at least one first configuration filecorresponds to a first media asset included in the first list; whereinthe at least one third configuration file corresponds to a third mediaasset included in the first list. 20-21. (canceled)