System for tracking media content transactions

ABSTRACT

A web server for tracking media content transaction includes a controller adapted to manage an archive of media content for a subscriber and to record a transaction description and a corresponding tracking identifier for a transaction that manipulates the archive.

FIELD OF THE DISCLOSURE

The present disclosure relates generally to media content management andmore specifically to a system for tracking media content transactions.

BACKGROUND

Online storage solutions for managing digital media content such aspersonal videos, pictures, podcasts, etc. provide users nearly nodiscernible trace of a trail the media has followed in getting to andleaving the storage site. Typically when uploading media files to astorage site, the user is apprised that the upload operation is completewith no other notification generally provided. There is also minimaloversight with other transactional activities such as deletions,modifications, or additions of media content managed by the storagesite. Consequently, when someone enters a subscriber's media storageaccount without authorization and misappropriates content or maliciouslydestroys files, the subscriber is often unaware.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 depicts an exemplary embodiment of a communication system;

FIG. 2 depicts an exemplary embodiment of a portal of the communicationsystem;

FIG. 3 depicts an exemplary method operating in portions of thecommunication system; and

FIG. 4 is a diagrammatic representation of a machine in the form of acomputer system within which a set of instructions, when executed, maycause the machine to perform any one or more of the methodologiesdiscussed herein.

DETAILED DESCRIPTION

In one embodiment of the present disclosure, a computer-readable storagemedium can have computer instructions for creating an archive of one ormore media content files, receiving a request to carry out a transactionassociated with the archive, generating a tracking number for thetransaction, carrying out the transaction, generating a description ofthe transaction, recording the description with the tracking number, andtransmitting a notice to a communication device of a subscriber of thearchive comprising a portion of the description and associated trackingnumber.

In one embodiment of the present disclosure, a web server can have acontroller adapted to manage an archive of media content for asubscriber, and record a transaction description and a correspondingtracking identifier for a transaction that manipulates the archive.

In one embodiment of the present disclosure, a media content processorcan have a controller adapted to manage a plurality of transactionsapplied to an archive of media content by recording a transactiondescription and a corresponding identifier for each of the plurality oftransactions.

FIG. 1 depicts an exemplary embodiment of a communication system 100.The communication system 100 can represent an IPTV broadcast mediasystem. In a typical IPTV infrastructure, there is at least one superhead office server (SHS) which receives national media programs fromsatellite and/or media servers from service providers of multimediabroadcast channels. In the present context, media programs can representaudio only content, video only content, and combinations thereof. TheSHS server forwards IP packets associated with the media content tovideo head servers (VHS) via a network of video head offices (VHO)according to a common multicast communication method.

The VHS then distributes multimedia broadcast programs to commercialand/or residential buildings 102 housing a gateway 104 (e.g., aresidential gateway or RG). The gateway 104 distributes broadcastsignals to media content processors 106 such as Set-Top Boxes (STBs)which in turn present broadcast selections to media devices 108 such ascomputers or television units managed in some instances by a mediacontroller 107 (e.g., an infrared or RF remote control). Unicast trafficcan also be exchanged between the media content processors 106 andsubsystems of the IPTV media system for services such as video-on-demand(VoD).

The IPTV media system can be coupled to one or more computing devices130 coupled to an Internet Service Provider (ISP) network 132 serving anumber of functions. In one embodiment for instance, the computingdevices 130 operate as a web or Internet server 132 for providing portalservices over the ISP network 132 to fixed media devices 108 or portablecommunication devices 116 by way of a wireless base station 117 such asin a cellular communication network operating with common protocols(GSM, CDMA, etc.). In another embodiment, the computing devices 130 canoperate as an on-line storage system 134 for managing media content of aplurality of subscribers of the communication system 100.

In yet another embodiment, the computing devices 130 can operate as apresence system 136 for monitoring activities and whereabouts ofsubscribers of the communication system 100. The presence system 136 canfor example detect that the subscriber is in transit with a portablecommunication device 116 by detecting a handover transition between basestations 117 and/or by receiving location coordinates from the portablecommunication device using a Global Positioning System (GPS) receiverincorporated therein. The presence system can also detect that thesubscriber is utilizing a communication device 108 in building 102 basedon network activity emanating from said communication device or consumedthereby.

A satellite broadcast system can be used in place of the IPTV mediasystem. In this embodiment, signals transmitted by a satellite 115 canbe intercepted by a satellite dish receiver 131 coupled to building 102which conveys satellite media signals to the media content processors106 by way of gateway 104. Alternatively, the satellite signals can bereceived and processed by the media content processor 106 over asatellite port of the media content processor coupled to the satellitedish receiver 131. The media content processors 106 can also be equippedwith a broadband port that couples to the ISP network 132 for generalbroadband access.

Although not shown, the communication system 100 can also be combined orreplaced with analog or digital broadcast distributions systems such ascable TV systems. It would be apparent therefore to one of ordinaryskill in the art that the present disclosure can be applied to any mediacontent system.

FIG. 2 depicts an exemplary embodiment of a portal 230 of thecommunication system 100. In FIG. 2, the portal 230 can be accessed by aURL with a common browser such as Microsoft's Internet Explorer using anInternet-capable fixed or portable communication device 108, 116. Theportal 230 can be configured to access a media content processor 106such as the STB of FIG. 1 and services managed thereby such as a DigitalVideo Recorder (DVR), an Electronic Programming Guide (EPG), Video onDemand (VoD) catalog, a personal catalog stored in the STB (e.g.,personal videos, pictures, audio recordings, etc.), and so on by way ofthe gateway 104.

FIG. 3 depicts an exemplary method 300 operating in portions of thecommunication system 100. Method 300 begins with step 302 in which astorage system 134 (referred to herein as SS 132) creates an archive ofmedia content files for a subscriber. The media content can representaudio content (e.g., personal recording, podcasts, MP3 contentdownloaded from iTunes™, ringtones for cell phones, etc.), video content(e.g., downloaded from a VoD catalog, family album video recordings,etc.), and/or still images (e.g., wall paper, personal picture album,etc.).

In step 304 the SS 132 can monitor media content transactions carriedout by the subscriber. A transaction can represent for example anyactivity which the subscriber can undertake while accessing the archive.Such activities can include without limitation modifying a structure ofthe archive (e.g., changing directory or folder structure), reviewing orreading at least one media file in the archive (e.g., visual and/oraudible presentation of a file), retrieving or removing at least onemedia file from the archive (e.g., removing a file from the archive),editing at least one media file in the archive (e.g., changing filename, cropping a picture, deleting portions of the content, etc.),deleting at least one media file in the archive, or recording anadditional media file in the archive. Other transactions that can havean affect on the archive and its content are contemplated by the presentdisclosure.

Step 304 can be used by the SS 132 to detect usage patterns and therebygenerate in step 306 a behavior profile of the subscriber. Commonpattern detection and predictive techniques (e.g., linear regression)can be used in step 306 to predict the behavior of the subscriber. Instep 308, the SS 132 can receive a request to carry out a transactionassociated with the archive from any source that identifies itself asthe subscriber. The request can include common validation informationsuch as a login and password which enables access to the archived mediacontent. The source from which the request was received can be a fixedor portable communication device 108, 116 able to access the ISP network132 and thereby the SS 132. Responsive to the request, the SS 132carries out one or more transactions applied to the archive as directedby the requesting party in step 310.

For each transaction the SS 132 carries out, it generates in step 312 atransaction description and a corresponding tracking number which isrecorded in the archive of the subscriber in step 314. The transactiondescription can describe the time when the transaction was requestedand/or carried out, the type of transaction (e.g., editing, deletion,retrieval, etc.), which media content files were affected, the IPaddress of the computer making the request, and so on. Accordingly, theSS 132 can be programmed to be as probative as necessary to collect asmuch transaction data as may be useful to the subscriber. The trackingnumber can be a string of characters, numbers or combinations thereof.Each tracking number is unique, so that the subscriber can single outeach transaction recorded by the SS 132.

In situations where the subscriber's identity has been misappropriated,it is not always possible to know that the subscriber is not theindividual making the request in step 308. To mitigate circumstancessuch as this, the SS 132 can be programmed in step 316 to look foranomalous behavior with the transaction. The anomalous behavior can bedetected from a deviation between the transaction and the behaviorprofile of the subscriber. For example, the SS 132 could detect anexcessive number of deletions, modifications, or an excessive durationof browsing through media files that have not been viewed by thesubscriber quite some time. As noted earlier, statistical and/orpredictive techniques can be used to detect such deviations.

If no anomalous behavior is detected, method 300 ceases and is repeatedfor subsequent transactions. If an anomalous behavior is detected, theSS 132 can proceed to step 318 where it requests from the presencesystem 136 presence information of the subscriber. The presenceinformation can be used by the SS 132 to select in step 320 acommunication device 108 or 116 of the subscriber that is likely toreceive a notice transmitted in step 322 and alert the subscriberpromptly. The notice can include a portion of the description generatedin step 312 and its corresponding tracking number. The notice can betransmitted at a time during which the archive is being acted on in step310 or after the transaction(s) requested in steps 308-310 arecompleted.

The partial description can include highlights of the transaction (e.g.,time it took place, type of activity—deletion, modification, removal,etc., and affected files). The compact information can be used to reducelatency in transmission and to avoid overwhelming the subscriber withdetails. The notice can be transmitted by any wired or wireless commonmeans of communication. For example, the notice can be transmitted as anemail, a Rich Site Summary (RSS) message feed, a Short Message Service(SMS) message, a Multimedia Message Service (MMS) message, or a phonecall conveying a synthesized speech message that describes thenotice—among other possible methods.

Upon the communication device 108, 116 presenting the subscriber thenotice by way of its user interface or UI (e.g., display and/or audiosystem), the subscriber can respond with a request for more detailedinformation about the transaction. The request can be submitted by thecommunication device 108, 116 to the SS 134 in step 324 accompanied withthe tracking number to assist the SS in located the transaction details.Such a request can be generated by for example the subscriber replyingto the email notice, or by responding to audio options presented by aninteractive voice response system managed by the SS 132.

The SS 132 can present in step 326 the transaction details at thecommunication device 108, 118 along with optional countermeasures toaddress the effects of said transaction. Countermeasures can include forexample a process for undoing at least a portion of the effects of thetransaction. If for example the SS 132 performs daily or weeklyincremental storage backups of its archives, then the SS can offer thesubscriber a means to recover files that were deleted or modified. Inaddition to providing a restoration means, the SS 132 can provide thesubscriber a means to increase security. For example, the SS 132 canprovide a countermeasure to add or change an authorization process toaccess the archive (e.g., change an existing login and password orcreate a new one). The SS 132 can also provide the subscriber a means todiscontinue access for all users if the subscriber determines the threatis significant. If the SS 132 detects that the subscriber has selected acountermeasure in step 328, the SS proceeds to step 330 where it appliesit to the affected archive; otherwise, method 300 ends and is repeatedfor subsequent transactions.

Upon reviewing the aforementioned embodiments, it would be evident to anartisan with ordinary skill in the art that said embodiments can bemodified, reduced, or enhanced without departing from the scope andspirit of the claims described below. For example, method 300 can beadapted so that notices are transmitted to a subscriber for alltransactions without monitoring the usage patterns of the subscriber todetect anomalous transactions. Additionally, method 300 can be adaptedso that notices are always transmitted to the same communication devicewithout a reliance on presence information for the subscriber.

Method 300 can also be adapted in step 324 to establish communicationsbetween a service agent and the subscriber by way of the communicationdevice 108, 116. The service agent can represent a person employed by aservice provider of the communication system 100 to assist thesubscriber in tracing and assessing suspect transactions with one ormore tracking numbers supplied by the subscriber in notices receivedthereby. Alternatively, the service agent can represent an interactivevoice response system managed by the SS 132 that interacts with thesubscriber using synthesized speech, and recognizes subscriber responsesin the form of voice and/or dial-tone keypad entries.

In yet another embodiment, method 300 can be adapted so that it operatesin the media content processor (MCP) 106 rather than a centralizedsystem such as the SS 132. In this embodiment, the MCP 106 createsarchives of media content for a select subscriber. In a multi-usersetting, the MCP 106 can create archived accounts. In either case, theMCP 106 can perform in whole or in part the functions of the SS 132 asdescribed above to provide the subscriber traceability of thetransactions applied to media content archived by the MCP.

These are but a few examples of modifications that can be applied to thepresent disclosure without departing from the scope of the claims.Accordingly, the reader is directed to the claims section for a fullerunderstanding of the breadth and scope of the present disclosure.

FIG. 4 depicts an exemplary diagrammatic representation of a machine inthe form of a computer system 400 within which a set of instructions,when executed, may cause the machine to perform any one or more of themethodologies discussed above. In some embodiments, the machine operatesas a standalone device. In some embodiments, the machine may beconnected (e.g., using a network) to other machines. In a networkeddeployment, the machine may operate in the capacity of a server or aclient user machine in server-client user network environment, or as apeer machine in a peer-to-peer (or distributed) network environment.

The machine may comprise a server computer, a client user computer, apersonal computer (PC), a tablet PC, a laptop computer, a desktopcomputer, a control system, a network router, switch or bridge, or anymachine capable of executing a set of instructions (sequential orotherwise) that specify actions to be taken by that machine. It will beunderstood that a device of the present disclosure includes broadly anyelectronic device that provides voice, video or data communication.Further, while a single machine is illustrated, the term “machine” shallalso be taken to include any collection of machines that individually orjointly execute a set (or multiple sets) of instructions to perform anyone or more of the methodologies discussed herein.

The computer system 400 may include a processor 402 (e.g., a centralprocessing unit (CPU), a graphics processing unit (GPU, or both), a mainmemory 404 and a static memory 406, which communicate with each othervia a bus 408. The computer system 400 may further include a videodisplay unit 410 (e.g., a liquid crystal display (LCD), a flat panel, asolid state display, or a cathode ray tube (CRT)). The computer system400 may include an input device 412 (e.g., a keyboard), a cursor controldevice 414 (e.g., a mouse), a disk drive unit 416, a signal generationdevice 418 (e.g., a speaker or remote control) and a network interfacedevice 420.

The disk drive unit 416 may include a machine-readable medium 422 onwhich is stored one or more sets of instructions (e.g., software 424)embodying any one or more of the methodologies or functions describedherein, including those methods illustrated above. The instructions 424may also reside, completely or at least partially, within the mainmemory 404, the static memory 406, and/or within the processor 402during execution thereof by the computer system 400. The main memory 404and the processor 402 also may constitute machine-readable media.

Dedicated hardware implementations including, but not limited to,application specific integrated circuits, programmable logic arrays andother hardware devices can likewise be constructed to implement themethods described herein. Applications that may include the apparatusand systems of various embodiments broadly include a variety ofelectronic and computer systems. Some embodiments implement functions intwo or more specific interconnected hardware modules or devices withrelated control and data signals communicated between and through themodules, or as portions of an application-specific integrated circuit.Thus, the example system is applicable to software, firmware, andhardware implementations.

In accordance with various embodiments of the present disclosure, themethods described herein are intended for operation as software programsrunning on a computer processor. Furthermore, software implementationscan include, but not limited to, distributed processing orcomponent/object distributed processing, parallel processing, or virtualmachine processing can also be constructed to implement the methodsdescribed herein.

The present disclosure contemplates a machine readable medium containinginstructions 424, or that which receives and executes instructions 424from a propagated signal so that a device connected to a networkenvironment 426 can send or receive voice, video or data, and tocommunicate over the network 426 using the instructions 424. Theinstructions 424 may further be transmitted or received over a network426 via the network interface device 420.

While the machine-readable medium 422 is shown in an example embodimentto be a single medium, the term “machine-readable medium” should betaken to include a single medium or multiple media (e.g., a centralizedor distributed database, and/or associated caches and servers) thatstore the one or more sets of instructions. The term “machine-readablemedium” shall also be taken to include any medium that is capable ofstoring, encoding or carrying a set of instructions for execution by themachine and that cause the machine to perform any one or more of themethodologies of the present disclosure.

The term “machine-readable medium” shall accordingly be taken toinclude, but not be limited to: solid-state memories such as a memorycard or other package that houses one or more read-only (non-volatile)memories, random access memories, or other re-writable (volatile)memories; magneto-optical or optical medium such as a disk or tape; andcarrier wave signals such as a signal embodying computer instructions ina transmission medium; and/or a digital file attachment to e-mail orother self-contained information archive or set of archives isconsidered a distribution medium equivalent to a tangible storagemedium. Accordingly, the disclosure is considered to include any one ormore of a machine-readable medium or a distribution medium, as listedherein and including art-recognized equivalents and successor media, inwhich the software implementations herein are stored.

Although the present specification describes components and functionsimplemented in the embodiments with reference to particular standardsand protocols, the disclosure is not limited to such standards andprotocols. Each of the standards for Internet and other packet switchednetwork transmission (e.g., TCP/IP, UDP/IP, HTML, HTTP) representexamples of the state of the art. Such standards are periodicallysuperseded by faster or more efficient equivalents having essentiallythe same functions. Accordingly, replacement standards and protocolshaving the same functions are considered equivalents.

The illustrations of embodiments described herein are intended toprovide a general understanding of the structure of various embodiments,and they are not intended to serve as a complete description of all theelements and features of apparatus and systems that might make use ofthe structures described herein. Many other embodiments will be apparentto those of skill in the art upon reviewing the above description. Otherembodiments may be utilized and derived therefrom, such that structuraland logical substitutions and changes may be made without departing fromthe scope of this disclosure. Figures are also merely representationaland may not be drawn to scale. Certain proportions thereof may beexaggerated, while others may be minimized. Accordingly, thespecification and drawings are to be regarded in an illustrative ratherthan a restrictive sense.

Such embodiments of the inventive subject matter may be referred toherein, individually and/or collectively, by the term “invention” merelyfor convenience and without intending to voluntarily limit the scope ofthis application to any single invention or inventive concept if morethan one is in fact disclosed. Thus, although specific embodiments havebeen illustrated and described herein, it should be appreciated that anyarrangement calculated to achieve the same purpose may be substitutedfor the specific embodiments shown. This disclosure is intended to coverany and all adaptations or variations of various embodiments.Combinations of the above embodiments, and other embodiments notspecifically described herein, will be apparent to those of skill in theart upon reviewing the above description.

The Abstract of the Disclosure is provided to comply with 37 C.F.R. §1.72(b), requiring an abstract that will allow the reader to quicklyascertain the nature of the technical disclosure. It is submitted withthe understanding that it will not be used to interpret or limit thescope or meaning of the claims. In addition, in the foregoing DetailedDescription, it can be seen that various features are grouped togetherin a single embodiment for the purpose of streamlining the disclosure.This method of disclosure is not to be interpreted as reflecting anintention that the claimed embodiments require more features than areexpressly recited in each claim. Rather, as the following claimsreflect, inventive subject matter lies in less than all features of asingle disclosed embodiment. Thus the following claims are herebyincorporated into the Detailed Description, with each claim standing onits own as a separately claimed subject matter.

1. A computer-readable non-transitory storage medium, comprisingcomputer instructions to: store in an archive a plurality of mediacontent files of a subscriber to the archive; receive a request toperform a transaction corresponding to at least one among reviewing,retrieving, editing and deleting at least one of the plurality of mediacontent files of the subscriber; generate a tracking number of thetransaction and a description for the transaction; perform thetransaction; determine an anomalous access to the plurality of mediacontent files of the subscriber responsive one or more detecteddifferences between the performed transaction and a behavior profile ofthe subscriber comprising past transactions by the subscriber; andtransmit a notice to a communication device of the subscriber responsiveto the determined anomalous access, wherein the notice comprises thetracking number and at least a portion of the description of thetransaction.
 2. The non-transitory storage medium of claim 1, whereinthe plurality of media content files corresponds to at least one amongan audio content file, a video content file, and a still image file. 3.The non-transitory storage medium of claim 1, wherein the transactioncorresponds to modifying a structure of the archive.
 4. Thenon-transitory storage medium of claim 1, further comprising computerinstructions to transmit the notice responsive to the determinedanomalous access.
 5. The non-transitory storage medium of claim 1,wherein the notice is transmitted to the communication device of thesubscriber as one among an email message, a Rich Site Summary messagefeed, a Short Message Service message, a Multimedia Message Servicemessage, and a phone call conveying a synthesized speech message thatdescribes the notice.
 6. The non-transitory storage medium of claim 1,comprising computer instructions to: receive from the communicationdevice of the subscriber the tracking number with a request for adetailed description of the transaction; and perform at least one amongpresenting the communication device the detailed description of thetransaction and establishing communications between a service agent andthe subscriber by way of the communication device.
 7. The non-transitorystorage medium of claim 6, comprising computer instructions to: presentto the communication device one or more countermeasures to addresseffects of the performed transaction; receive from the communicationdevice a selection from the one or more countermeasures; and apply theselected counter-measure to the archive.
 8. The non-transitory storagemedium of claim 7, wherein the one or more countermeasures correspond toat least one among undoing at least a portion of the effects of theperformed transaction, applying a user authorization process to accessthe archive, and preventing access to the archive.
 9. The non-transitorystorage medium of claim 1, wherein the storage medium operates in anetwork element of a communication system supplying media services tothe subscriber, wherein the network element corresponds to one among aweb server managing media content of a plurality of subscribers, and amedia content processor of the subscriber, wherein the communicationsystem corresponds to one among an internet protocol televisioncommunication system, a satellite television communication system, and acable television communication system, and wherein the tracking numbercomprises at least one among a string of characters, a string ofnumbers, and a string of alphanumeric characters.
 10. The non-transitorystorage medium of claim 1, comprising computer instructions to: retrievepresence information associated with the subscriber; and select thecommunication device according to the presence information.
 11. A webserver, comprising a computer system comprising a computer memorycoupled to a processor, wherein the processor is adapted to: store aplurality of media content files of a subscriber in an archive; record atransaction description and a corresponding tracking identifier for atransaction associated with the plurality of media content files of thesubscriber; perform the transaction corresponding to at least one amongreviewing, retrieving, editing and deleting, at least one of theplurality of media contentment files of the subscriber; determine ananomalous access in the archive to the plurality of media content filesof the subscriber responsive to one or more detected differences betweenthe performed transaction and a behavior profile of the subscribercomprising past transactions by the subscriber; transmit to acommunication device of the subscriber a notice responsive to thedetermined anomalous access, wherein the notice comprises a portion ofthe transaction description and the corresponding tracking identifier;retrieve presence information associated with the subscriber; and selectthe communication device according to the presence information.
 12. Theweb server of claim 11, wherein the plurality of media content filescorresponds to one or more among audio content, video content, and stillimage content.
 13. The web server of claim 11, wherein the processor isadapted to: present the communication device with one or morecountermeasures to address the transaction; receive a selectionassociated with the one or more countermeasures; and apply the selectedcountermeasure to the archive.
 14. The web server of claim 13, whereinthe one or more countermeasures correspond to at least one among undoingat least a portion of the effects of the transaction, applying a userauthorization process to access the archive, and preventing access toarchive.
 15. The web server of claim 11, wherein the tracking identifiercomprises at least one among a string of characters, a string ofnumbers, and string of alphanumeric characters.
 16. A media contentprocessor, comprising a computer system comprising a computer memorycoupled to a processor, wherein the processor is adapted to: performtransactions corresponding to at least one among reviewing, retrieving,editing and deleting at least one of a plurality of media contentmentfiles of a subscriber that are stored in an archive: determine ananomalous access to the plurality of media content files of thesubscriber by way of detecting differences between the performedtransactions and a behavior profile of the subscriber comprising pasttransactions in the archive by the subscriber; transmit to acommunication device of the subscriber a notice of the determinedanomalous access, wherein the notice comprises one or morecountermeasures; receive from the communication device a selection fromthe one or more countermeasures; and apply the selected countermeasureto the archive.
 17. The media content processor of claim 16, wherein theplurality of media content files corresponds to one or more among audiocontent, video content, and still image content.
 18. The media contentprocessor of claim 16, wherein the notice further comprises atransaction identifier and a portion of a transaction descriptioncorresponding to the determined anomalous access.
 19. The media contentprocessor of claim 16, wherein the media content processor correspondsto one among an Internet Protocol Television Set-Top Box (IPTV STB)receiver, a satellite TV STB receiver, and a cable TV STB receiver. 20.The media content processor of claim 16, wherein the one or morecountermeasures correspond to at least one among undoing at least aportion of the effects of the performed transaction, applying a userauthorization process to access the archive, and preventing access tothe archive.