Methods and apparatus for secondary content management and fraud prevention

ABSTRACT

Methods and apparatus for secondary content management, including preventing viewing fraud, are disclosed. In one embodiment, apparatus of the present disclosure includes an Advertisement Decisioning Service (ADS) and Manifest Manipulator (MM) configured cooperate to receive client requests for secondary content, select one or more secondary content elements (e.g., advertisements), and generate and transmit one or more identifiers that uniquely identify the client&#39;s request for a session. The selected advertisements in one implementation include embedded beacons or tags used to ensure accurate accounting with regards to the amount or quality of consumption of the advertisement by a user.

COPYRIGHT

A portion of the disclosure of this patent document contains material that is subject to copyright protection. The copyright owner has no objection to the facsimile reproduction by anyone of the patent document or the patent disclosure, as it appears in the Patent and Trademark Office patent files or records, but otherwise reserves all copyright rights whatsoever.

BACKGROUND 1. Technological Field

The disclosure relates generally to the field of content delivery and management, and in one exemplary aspect, methods and apparatus for fraud prevention, such as e.g., preventing illegitimate advertisement view counts, and for ensuring accurate accounting with regards to the amount of an advertisement viewed or otherwise consumed by a client.

2. Description of Related Technology

In managed content distribution networks (such as e.g., cable television HFCu, or satellite networks), advertisements are usually interspersed within a given broadcasted or delivered program. In this manner, every user premises device (e.g., a subscriber's settop box or the like) in a local service area which is currently tuned to the same program channel will receive the same advertisements at approximately the same time and in the same order.

Advertisements or other “secondary content” (including, without limitation, promotions or “info-mercials”, commercials, telescoping information/advertisements, and short segments) that are ultimately viewed by subscribers or other content consumers in such networks can be controlled in several ways. Generally, two categories or subdivisions of these techniques exist: (i) national- or high-level insertion, and (ii) local- or low-level insertion.

Under national level insertion, national networks (such as NBC, ABC, etc.) are responsible for determining the advertisements or promotions that are resident in a given program or other primary content stream or discrete content element. The pre-configured stream is delivered to the network operator (e.g., MSO), and the MSO merely then delivers the stream (content and advertisements) to the relevant subscribers over their network.

Under local-level insertion, the MSO (and even broadcast affiliates) can insert locally-generated advertisements or commercials and other such segments into remotely distributed regional programs before they are delivered to the network subscribers.

Secondary content insertion may comprise a major source of revenue for Internet website operators (e.g., YouTube™), commercial television/content distributors, and for the network operator. For example, where the secondary content comprises advertisements, it may be a main source of income for national television broadcasters and their local over-the-air affiliates. Cable, satellite, and other content distribution networks, as well as Internet content providers, also derive income from the sale of advertising time.

In order for an advertiser to maximize the return on their advertising investment, advertisers, promoters or other entities need to be assured that the secondary content for which they are paying to have displayed are actually being consumed by a client device at the direction of a human who is viewing the secondary content and associated primary or program content. An advertisement accounting service (also referred to as an Advertisement Decisioning Service (ADS) in some contexts) is used within content distribution network infrastructure to determine which individual ones of the secondary (or other) content will be placed in each of the advertisement placement opportunities prior to the delivery of content to the client device. The ADS may include, for example, an ad server or the like. In addition, the ADS is used to keep track of other data, such as e.g., the number of times an individual one of the secondary content is requested by the client device. Somewhat analogous to an Internet advertisement “click through”, this information is used to invoice the advertiser who pays the advertisement distributor based upon the number of advertisements served. However, most of the methods of displaying secondary content are susceptible to computer-automated programs (e.g., “bots”) created by malicious agents. Theses computer-automated programs “spoof” or trick the ADS by communicating data or messaging to the ADS that an advertisement is being requested, when in fact there are no legitimate viewers consuming the advertising. This scenario constitutes one type of “advertisement viewing fraud.” Extant advertising management systems such as the aforementioned ADS do not actually verify that the request for the advertisement is in fact legitimate, but rather merely log such requests and presume that delivery actually occurs, and such delivery is to a legitimate consumer. For example, a typical prior art management system receives a request from a client (e.g., subscriber device) for a manifest file, which contains information such as URLs (universal resource locators) for primary and secondary content elements (e.g., video content and advertisements, respectively). The manifest file request is directed to an entity which coordinates obtaining information about the advertisements that should be inserted into the video stream via the manifest file. The manifest file is then assembled, including a first “accounting” URL for each unique request, and delivered to the requesting client. The client then uses the manifest file to obtain the manifested primary (e.g., video/audio) content. When an advertising break occurs within the primary content, a first advertising-related URL is utilized to notify a network entity that an advertisement is about to be delivered, and presumably viewed by the video rendering client. The video client then requests the video chunks representing the advertisement from the network using the manifest file URLs pertaining to the advertisement.

Unfortunately, a rogue client or surreptitious “bot” can merely perform the aforementioned notification of the network entity one or more times to artificially “trick” the network entity/management system into believing that advertisements are being requested by a valid video client (and presumably being viewed by a human). There is no mechanism to ensure that a requesting “client” requests the entertainment video chunks, or requests all of the video chunks containing the advertisements.

Typically, a principal motivation of the malicious agent in advertisement viewing fraud scenarios is to undermine confidence in the integrity and accounting practices of the distributor, who is paid to distribute the secondary content and associated primary content. This is somewhat similar to “click fraud” scenarios, whereby a “click bot” imitates a legitimate user of a web browser clicking on an ad, thereby generating a charge-per-click without having actual interest in the target of the advertisement's link. However, in click fraud scenarios, the malicious agent is typically a competitor who seeks to beat down the advertiser's website and advertising account. Under any scenario, such malicious activity is highly detrimental and undesirable.

In a related aspect, advertisers (and other content managers or distributers) desire to maintain an accurate accounting of secondary content consumption; e.g., in terms of how much of a given requested secondary content asset was “consumed” by a valid consumer (e.g., website or network user or subscriber, part of target audience, etc.). For example, it is often very telling to an advertiser to know how much of the total runtime of a video and/or audio advertisement was actually rendered for viewing/listening by the consumer; advertisements which (statistically) are only viewed by the target audience for a few seconds before a tune-away or other terminating event occurs may be presumed to be of little interest to that target audience. Existing methods and apparatus for obtaining such data are at best marginally effective, in that they are modeled for prefatory or introductory advertisements for short clips (i.e., at beginning or end of a video segment only), and are generally “binary” in nature (i.e., completed or not completed).

For example, in both managed and unmanaged networks, Internet Protocol (IP) content is typically delivered with embedded secondary content links or elements. For instance, exemplary YouTube™ or similar packetized audio-visual media frequently include an embedded or prefatory advertisement, such as a fifteen-second clip for a product or service. In many cases, the requesting viewer can opt-out of the advertisement (and proceed directly to the requested content element) after a period of time, or by clicking on a graphical control element rendered on the screen (e., a “close window” or “x” box rendered within the viewing window of the content). However, one can only infer so much behavioral motivation or obtain so much useful insight from data indicating only completion, early termination, etc.

Hence, a reliable mechanism for determining “how much” (whether measured temporally, or in terms of other consumption attributes or parameters) of a given advertisement is consumed by a valid user is also needed.

Based on the foregoing, both (i) apparatus and methods for preventing viewership fraud with regards to the distribution of primary content having secondary content inserted therein to a one or more users, and (ii) apparatus and methods for accurately determining a degree or quality of audience consumption of such secondary content, are needed. Ideally, these apparatus and methods would, inter alia, prevent the relevant network infrastructure (e.g., ADS) from counting requests for secondary content unless the secondary content is actually requested by a client, including e.g., a client that is also requesting primary content. Such apparatus and methods would, in addition, also ideally ensure accurate accounting of the consumption of an advertisement or other secondary content element by one or more users.

SUMMARY OF THE DISCLOSURE

The present disclosure provides, inter alia, apparatus and methods for secondary content management and fraud prevention.

In a first aspect, a method of delivering Internet Protocol (IP) packetized media content and advertising content is disclosed. In one embodiment, the delivery is to an IP-enabled client device of a subscriber within a managed content delivery network, and the method includes: authenticating at least one of the subscriber and/or client device to access content via the managed content delivery network; receiving a first communication from the client device for delivery of the IP packetized media content; causing generation of a unique session identifier relating to the first communication; transmitting a manifest file containing the unique session identifier, first information relating to a plurality of media elements, and second information relating to at least one advertising element, to the client device; receiving from the client device another communication, the another communication comprising at least a portion of the second information and the unique session identifier; validating the another communication based at least on the unique session identifier contained therein; causing counting of the validated another communication as a valid advertising request; and causing provision of the at least one advertising element to the client device via an IP transport.

In one variant, the method further includes: receiving a communication containing the unique session identifier and at least a portion of the first information; and causing delivery of at least a portion of the plurality of media elements to the client device via an IP transport.

In one implementation, the receiving the communication containing the unique session identifier and at least a portion of the first information, and the causing delivery of at least a portion of the plurality of media elements to the client device via an IP transport, each occur before the receipt of the another communication; and the receipt of the communication containing the unique session identifier and at least a portion of the first information is a condition precedent for the validating of the another communication.

In another aspect, a method for validating a secondary content request received in a content distribution network is disclosed. In one embodiment, the method includes: receiving a request for provision of secondary content at a secondary content management entity of the content distribution network; examining the request to identify a shared data element present within the request; utilizing information present within the shared data element to validate the secondary content request; and forwarding information to a accounting process enabling the accounting process to count the secondary content request as a valid request.

In one variant, the shared data element comprises an at least periodically unique identifier issued by an entity of the network and transmitted to a valid client of the network for use in a secondary content request, such as e.g., a globally unique identifier (GUID) useful only within the content distribution network.

In another variant, the shared data element comprises a data value previously provided to a particular client device of the content distribution network, the data value having a finite temporal period of validity, and the utilizing the information present in the shared data element to validate the request comprises determining that the request for secondary content including the data value was received by the secondary content management entity within the finite temporal period of validity.

In a further variant, the shared data element comprises a cryptographic hash of a value, the value previously provided to a client of the content distribution network by an entity of the content distribution network; and the utilizing the information present in the shared data element to validate the request comprises: (i) retrieving a copy of the value from local storage within the content distribution network; (ii) utilizing a cryptographic hash algorithm common to both the secondary content management entity and the client, to hash the retrieved copy of the value to generate a local hash; and (iii) comparing the local hash to the cryptographic hash to identify any differences there between.

In another embodiment of the method, the method includes: receiving a first communication from the client device for delivery of the IP packetized media content; causing generation of a unique session identifier relating to the first communication; transmitting a manifest file comprising the unique session identifier, first information relating to a plurality of advertising content elements, and second information relating to the media content, to the client device, the plurality of advertising content elements collectively comprising a complete advertisement; receiving from the client device another communication, the another communication comprising at least: (i) a first portion of the first information, the first portion of the first information relating to a first of the plurality of advertising content elements, and (ii) the unique session identifier; validating the another communication based at least on the unique session identifier contained therein; causing provision of the first of the plurality of advertising content elements to the client device via an IP transport; and receiving from the client device a subsequent communication, the subsequent communication comprising: (i) a second portion of the first information, the second portion of the first information relating to a second of the plurality of advertising content elements, (ii) the unique session identifier, and (iii) a consumption-related value.

In one variant, the consumption-related value is indicative of at least one of a quality or amount of a then-current consumption of the advertisement by the client device.

In another variant, the consumption-related value comprises a value related to an ID3 tag embedded in the second of the plurality of advertising content elements.

In another variant, the consumption-related value comprises a value related to a metadata element embedded in a stream of the second of the plurality of advertising content elements.

In another variant, the another communication further comprises a consumption-related value.

In another aspect of the disclosure, a network apparatus of a content distribution network is provided. In one embodiment, the network apparatus is configured for validating an advertising content request, the advertising content request associated with delivery of packetized media content via an IP (Internet Protocol) transport, and includes: processing apparatus; network interface apparatus in data communication with the processing apparatus and configured to conduct data communications with a plurality of client devices via at least the content distribution network; and storage apparatus in data communication with the processing apparatus and comprising computerized logic executable on the processing apparatus.

In one variant, the computerized logic is configured to, when executed: cause generation of a shared data element for provision to a particular client device; transmit at least the shared data element to the particular client device via the network interface apparatus and the content distribution network; receive a request for provision of advertising content from the particular client device, the request including the shared data element; extract the shared data element present within the request; and utilize at least a portion of the shared data element to validate the advertising content request.

In another variant, the shared data element comprises an identifier which is globally unique at least within the content distribution network for at least a prescribed period of time; the transmission of the shared data element to the particular client device comprises a transmission of a host data structure of which the shared data element is part, the host data structure further comprising data indicating one or more network locations where the packetized media content may be obtained by the particular client device; and the request specifies a universal resource locator (URL) present within the host data structure from which at least a portion of the advertising content can be obtained. The host data structure comprises for example a manifest file comprising (i) one or more URLs corresponding to the one or more locations where the packetized media content may be obtained; and (ii) the URL.

In another variant, the computerized logic is further configured to, when executed, verify that at least a portion of the packetized media content has been previously requested by the particular client device as part of a common session. The common session is identified within the shared data element.

In yet a further variant, the causation of the generation of the shared data element for provision to a particular client device is pursuant to receipt by the network apparatus of a prior request issued by the particular client device to obtain a manifest file relating to the packetized media content.

In a further aspect, a method of delivering Internet Protocol (IP) packetized advertising content to an IP-enabled client device of a user within a content distribution network is disclosed. In one embodiment, the method includes: obtaining a unique identifier; transmitting a data structure comprising at least the unique identifier, and first information relating to a plurality of advertising content elements, to the client device, the plurality of advertising content elements each comprising a portion of a complete advertisement; receiving from the client device a communication, the communication comprising at least: (i) a first portion of the first information, the first portion of the first information relating to a first of the plurality of advertising content elements, and (ii) the unique identifier or a derivative thereof; validating the communication based at least on the unique identifier or derivative of contained therein; causing provision of the first of the plurality of advertising content elements to the client device via an IP transport; and receiving from the client device a subsequent communication, the subsequent communication comprising: (i) a second portion of the first information, the second portion of the first information relating to a second of the plurality of advertising content elements, (ii) the unique identifier or the derivative thereof, and (iii) consumption-related data.

In one variant, the consumption-related data is indicative of at least one of an amount of a then-current consumption of the advertisement by the client device.

In yet another aspect of the disclosure, an IP-enabled client device is provided. In one embodiment, the client device comprises a software component (e.g., middleware or application) configured to receive manifest files with unique identifiers, and issue content requests including one or more of the unique identifiers or derivations thereof.

In yet a further aspect, a method of determining the consumption of a secondary content element is disclosed. In one embodiment, beacons or tags are included within at least portions of an address associated with multi-part secondary content element. Upon transmission of the address by a rendering client, the beacon or tag is extracted from the address, and used to determine how much (e.g., percentage) of the secondary content element has been rendered. In another embodiment, the beacon or tag is embedded within the secondary content element itself, and is extracted upon decode, and sent to the serving device as part of a subsequent communication, so as to assure that decode of the segment has actually occurred, and to indicate progress of the rendering process.

In still another aspect, a method of mitigating or preventing advertising fraud on a content distribution network is disclosed. In one embodiment, the method includes inserting a unique identifier in one or more of a plurality of content segment addresses, such that a requesting client must present the unique identifier (e.g., within a prescribed period of time in one variant) to the serving or managing delivery device before the request is acted upon. In another embodiment, the identifier is embedded within one or more of the content elements (“chunks”) themselves, such that the client must decode the content element(s) to obtain the identifier and retrieve the next content element chunk from the network.

These and other aspects of the disclosure shall become apparent when considered in light of the disclosure provided herein.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a functional block diagram illustrating an exemplary hybrid fiber coax (HFC) cable network configuration useful with various aspects of the present disclosure.

FIG. 1a is a functional block diagram illustrating one exemplary HFC cable network headend configuration useful with various aspects of the present disclosure.

FIG. 1b is a functional block diagram illustrating one exemplary embodiment of a local service node configuration useful with various aspects of the present disclosure.

FIG. 1c is a functional block diagram illustrating one exemplary embodiment of a broadcast switched architecture (BSA) useful with various aspects of the present disclosure.

FIG. 1d is a functional block diagram illustrating one exemplary embodiment of a packetized content delivery network architecture useful with the present disclosure.

FIG. 1e is a functional block diagram illustrating a second exemplary packetized content delivery network architecture useful with various aspects of the present disclosure.

FIG. 2 is a functional block diagram of an exemplary secondary content management architecture, in accordance with various aspects of the present disclosure.

FIG. 3 is a logical flow diagram illustrating one embodiment of a method for preventing secondary content (e.g., advertisement) fraud in a content distribution network.

FIG. 3a is a logical flow diagram illustrating another embodiment of a method for preventing secondary content (e.g., advertisement) fraud in a content distribution network.

FIG. 4 is a logical flow diagram illustrating one embodiment of a method for managing secondary content consumption in a content distribution network.

FIG. 4a is a logical flow diagram illustrating another embodiment of a method for managing secondary content consumption in a content distribution network.

FIG. 4b is a logical flow diagram illustrating yet another embodiment of a method for managing secondary content consumption in a content distribution network.

FIG. 5 is a logical process diagram illustrating an exemplary implementation of the operation of the architecture of FIG. 2, including both advertising fraud prevention and advertising consumption management functions thereof.

All Figures© Copyright 2015 Time Warner Cable Enterprises, Inc. All rights reserved.

DETAILED DESCRIPTION

Reference is now made to the drawings wherein like numerals refer to like parts throughout.

As used herein, the term “advertisement” and similar forms refers without limitation to any audio, visual, or promotion, message, or communication, whether for-profit or otherwise, that is perceptible by a human. Examples of advertisements include so-called “bumper” advertisements (advertisements inserted before or after a client requested program), “pause” advertisements (presented when a client sends a pause control command to a video server or the like), or additional and replacement advertisements.

As used herein, the term “application” refers generally and without limitation to a unit of executable software that implements a certain functionality or theme. The themes of applications vary broadly across any number of disciplines and functions (such as on-demand content management, Internet browsers, e-commerce transactions, brokerage transactions, home entertainment, calculator etc.), and one application may have more than one theme. The unit of executable software generally runs in a predetermined environment; for example, the unit could comprise a downloadable Java Xlet™ that runs within the JavaTV™ environment.

As used herein the term “browser” refers to any computer program, application or module which provides network access capability including, without limitation, Internet browsers adapted for accessing one or more websites or URLs over the Internet, as well as any “user agent” including those adapted for visual, aural, or tactile communications.

As used herein, the terms “client device” and “end user device” include, but are not limited to, set-top boxes (e.g., DSTBs), “smart” televisions, gateways, modems, personal computers (PCs), and minicomputers, whether desktop, laptop, or otherwise, and mobile devices such as handheld computers, PDAs, personal media devices (PMDs), tablets, and smartphones.

As used herein, the term “codec” refers to an video, audio, or other data coding and/or decoding algorithm, process or apparatus including, without limitation, those of the MPEG (e.g., MPEG-1, MPEG-2, MPEG-4, etc.), Real (Real Video, etc.), AC-3 (audio), DiVX, XViD/ViDX, Windows Media Video (e.g., WMV 7, 8, 9, 10), ATI Video codec, or VC-1 (SMPTE standard 421M) families.

As used herein, the term “computer program” or “software” is meant to include any sequence or human or machine cognizable steps which perform a function. Such program may be rendered in virtually any programming language or environment including, for example, C/C++, Fortran, COBOL, PASCAL, assembly language, markup languages (e.g., HTML, SGML, XML, VoXML), and the like, as well as object-oriented environments such as the Common Object Request Broker Architecture (CORBA), Java™ (including J2ME, Java Beans, etc.), Binary Runtime Environment (e.g., BREW), and the like.

As used herein, the term “conditional access” refers to any access control scheme, whether implemented in hardware, software, or firmware (or combinations thereof), including without limitation members of the “Powerkey” family (Powerkey Book 2, Powerkey Book 3, etc.), NDS (including VideoGuard, mVideoGuard, etc.), ANSI/SCTE Standard 52 2003 (DVS-042), incorporated herein by reference in its entirety, and Motorola/General Instrument DigiCipher® family (DigiCipher II, etc.). These can be implemented using, for example, the so-called “CableCard” plug-in security module access technology, a downloadable CA system (DCAS), or otherwise.

The terms “Consumer Premises Equipment (CPE)” and “host device” refer without limitation to any type of electronic equipment located within a consumer's or user's premises and connected to or in communication with a network, and may include client devices or end-user devices. The term “host device” includes terminal devices that have access to digital television content via a satellite, cable, wireless or terrestrial network. The host device functionality may be integrated into a digital television (DTV) set.

As used herein, the term “display” means any type of device adapted to display information, including without limitation CRTs, LCDs, TFTs, plasma displays, LEDs, incandescent and fluorescent devices. Display devices may also include less dynamic devices such as, for example, printers, e-ink devices, and the like.

As used herein, the term “DOCSIS” refers to any of the existing or planned variants of the Data Over Cable Services Interface Specification, including for example DOCSIS versions 1.0, 1.1, 2.0 and 3.0.

As used herein, the term “headend” refers generally to a networked system controlled by an operator (e.g., an MSO or multiple systems operator) that distributes programming to MSO clientele using client devices. Such programming may include literally any information source/receiver including, inter alia, free-to-air TV channels, pay TV channels, interactive TV, and the Internet.

As used herein, the terms “Internet” and “internet” are used interchangeably to refer to inter-networks including, without limitation, the Internet.

As used herein, the term “mass storage” includes any type of integrated circuit or other storage device adapted for storing digital data including, without limitation, ROM. PROM, EEPROM, DRAM, SDRAM, DDR/2 SDRAM, EDO/FPMS, RLDRAM, SRAM, “flash” memory (e.g., NAND/NOR), and PSRAM.

As used herein, the terms “microprocessor” and “digital processor” are meant generally to include all types of digital processing devices including, without limitation, digital signal processors (DSPs), reduced instruction set computers (RISC), general-purpose (CISC) processors, microprocessors, gate arrays (e.g., FPGAs), PLDs, reconfigurable computer fabrics (RCFs), array processors, secure microprocessors, and application-specific integrated circuits (ASICs). Such digital processors may be contained on a single unitary IC die, or distributed across multiple components.

As used herein, the term “modem” refers to any kind of modulation or demodulation process or apparatus including without limitation cable (e.g., DOCSIS compliant) modems, DSL modems, analog modems, and so forth.

As used herein, the terms “MSO” or “multiple systems operator” refer without limitation to a cable, fiber to the home (FTTH), fiber to the curb (FTTC), satellite, Hybrid Fiber Copper (HFCu), or terrestrial network provider having infrastructure required to deliver services including programming and data over those mediums.

As used herein, the terms “network” and “bearer network” refer generally to any type of telecommunications or data network including, without limitation, hybrid fiber coax (HFC) networks, HFCu networks, satellite networks, telco networks, and data networks (including MANs, WANs, LANs, WLANs, internets, and intranets). Such networks or portions thereof may utilize any one or more different topologies (e.g., ring, bus, star, loop, etc.), transmission media (e.g., wired/RF cable, RF wireless, millimeter wave, optical, etc.) and/or communications or networking protocols.

As used herein, the term “network interface” refers to any signal, data, or software interface with a component, network or process including, without limitation, those of the FireWire (e.g., FW400, FW800, etc.), USB (e.g., USB2), Ethernet (e.g., 10/100, 10/100/1000 (Gigabit Ethernet), 10-Gig-E, etc.), MoCA, Coaxsys (e.g., TVnet™), radio frequency tuner (e.g., in-band or OOB, cable modem, etc.), Wi-Fi (802.11), WiMAX (802.16), PAN (e.g., 802.15), or IrDA families.

As used herein, the term “node” refers to any functional entity associated with a network, such as for example: CPE, edge device, server, gateway, router, Optical Line Terminal (OLT), Optical Network Unit (ONU), etc. whether physically discrete or distributed across multiple locations.

As used herein, the term “server” refers to any computerized component, system or entity regardless of form which is adapted to provide data, files, applications, content, or other services to one or more other devices or entities on a computer network.

As used herein, the term “user interface” refers to, without limitation, any visual, graphical, tactile, audible, sensory, or other means of providing information to and/or receiving information from a user or other entity. A user interface may comprise, for example, a computer screen display, touch screen, speech recognition engine, text-to-speech (TTS) algorithm, and so forth.

As used herein, the term “Wi-Fi” refers to, without limitation, any of the variants of IEEE-Std. 802.11 or related standards including e.g., 802.11 a/b/g/n/v/ac.

As used herein, the term “wireless” means any wireless signal, data, communication, or other interface including without limitation Wi-Fi, Bluetooth, 3G (3GPP/3GPP2), HSDPA/HSUPA, TDMA, CDMA (e.g., IS-95A, WCDMA, etc.), FHSS, DSSS, GSM, PAN/802.15, WiMAX (802.16), 802.20, narrowband/FDMA, OFDM, PCS/DCS, LTE/LTE-A, analog cellular, CDPD, satellite systems, mesh networks, millimeter wave or microwave systems, acoustic, and infrared (i.e., IrDA).

Overview

In one exemplary aspect, the present disclosure provides apparatus and methods for preventing or mitigating surreptitious activities such as advertising fraud. In one embodiment described herein, a managed content distribution network (e.g., cable television network) is configured to prevent extant video advertising accounting systems from “counting” requests for advertisements or other secondary content elements unless the advertisement/content element is truly requested by a valid video client (e.g., end user or subscriber device). In one implementation, this is accomplished using a session-specific data which is embedded within e.g., the manifest file delivered to the client. The session-specific data is then transmitted by the requesting client along with its request for advertisement or other assets to the relevant network entity, and the network entity evaluates the transmitted session-specific data to determine whether it meets certain validation criteria before marking the request as “valid” and enabling it to be counted.

Moreover, in another embodiment, the network is configured to further determine that the ostensibly valid requesting client is also validly requesting video assets or other primary content along with the advertisement(s), thereby providing further assurance of the authenticity of the advertisement request.

Using the foregoing techniques, malicious agents such as “bots” are frustrated from tricking the relevant network infrastructure into counting advertisements that are never actually consumed.

In another exemplary aspect, the present disclosure provides apparatus and methods of measuring actual consumption of secondary content (such as advertisements) by valid content consumers. In one embodiment, “beacons” or other such data are introduced into the video advertisement or other secondary content element that can be used to determine, for instance, how much of the advertisement has been delivered. In one implementation, the video player client uses the advertisement accounting URL delivered in the manifest and associated with the advertisement to send the relevant network entity (e.g., ADS) one or more message with information relating to one or more consumption attributes (e.g., for each portion successfully rendered), along with the session-specific data associated with the rendering session.

Detailed Description of Exemplary Embodiments

Exemplary embodiments of the apparatus and methods of the present disclosure are now described in detail. While these exemplary embodiments are described primarily in the context of mentioned managed hybrid fiber coax (HFC) cable architecture having a multiple systems operator (MSO), digital networking capability, IP delivery capability (including e.g., IP-packetized delivery via CMTS/DOCSIS, and/or so called “in band” delivery of IP content such as via an MPEG transport stream carrying IP-packetized content), and a plurality of client devices/CPE, the general principles and advantages of the disclosure may be extended to other types of networks and architectures that are configured to deliver digital media data (e.g., text, video, and/or audio, discrete content elements such as files, executables, etc.). Such other networks or architectures may be broadband, narrowband, wired or wireless, managed or unmanaged, hybridized between two or more topologies or delivery modalities, or otherwise.

It will also be appreciated that while described generally in the context of a network providing service to a customer or consumer (i.e., residential) end user domain, the present disclosure may be readily adapted to other types of environments including, e.g., commercial/enterprise, and government/military applications. Myriad other applications are possible.

Also, while certain aspects are described primarily in the context of the well-known Internet Protocol (described in, inter alia, Internet Protocol DARPA Internet Program Protocol Specification, IETF RCF 791 (September 1981) and Deering, et al., Internet Protocol, Version 6 (IPv6) Specification, IETF RFC 2460 (December 1998) each of which is incorporated herein by reference in its entirety), it will be appreciated that the present disclosure may utilize other types of protocols (and in fact bearer networks to include other internets and intranets) to implement the described functionality.

Other features and advantages of the present disclosure will immediately be recognized by persons of ordinary skill in the art with reference to the attached drawings and detailed description of exemplary embodiments as given below.

Bearer Network—

FIG. 1 illustrates a typical managed content delivery network configuration. The various components of the network 100 include (i) one or more data and application origination points 102; (ii) one or more content sources 103, (iii) one or more application distribution servers 104; (iv) one or more Video-On-Demand (VOD) servers 105, and (v) customer premises equipment (CPE) 106. The distribution server(s) 104, VOD servers 105 and CPE(s) 106 are connected via a bearer (e.g., HFC) network 101. A simple architecture comprising one of each of the aforementioned components 102, 104, 105, 106 is shown in FIG. 1 for simplicity, although it will be recognized that comparable architectures with multiple origination points, distribution servers, VOD servers, and/or CPE devices (as well as different network topologies) may be utilized consistent with the present disclosure. For example, the headend architecture of FIG. 1a (described in greater detail below), or others, may be used.

The data/application origination point 102 comprises any medium that allows data and/or applications (such as a VOD-based or “Watch TV” application) to be transferred to a distribution server 104. This may include for example a third party data source, application vendor website, CD-ROM, external network interface, mass storage device (e.g., RAID system), etc. Such transference may be automatic, initiated upon the occurrence of one or more specified events (such as the receipt of a request packet or ACK), performed manually, or accomplished in any number of other modes readily recognized by those of ordinary skill. The application distribution server 104 comprises a computer system where such applications enter the network system. Distribution servers are well known in the networking arts, and accordingly not described further herein.

The VOD server 105 comprises a computer system where on-demand content is received from one or more of the aforementioned data sources 102 and enter the network system. These servers may generate the content locally, or alternatively act as a gateway or intermediary from a distant source.

The VOD server 105 and application distribution servers 104 are a part of the headend architecture of the network 100. The headend 150 is connected to an internetwork (e.g., the Internet) 111.

Referring now to FIG. 1a , one exemplary embodiment of a headend architecture is described. As shown in FIG. 1a , the headend architecture 150 comprises typical headend components and services including billing module 152, subscriber management system (SMS) and CPE configuration management module 154, cable-modem termination system (CMTS) and OOB system 156, as well as LAN(s) 158, 160 placing the various components in data communication with one another. It will be appreciated that while a bar or bus LAN topology is illustrated, any number of other arrangements as previously referenced (e.g., ring, star, etc.) may be used consistent with the disclosure. It will also be appreciated that the headend configuration depicted in FIG. 1a is high-level, conceptual architecture, and that each MSO may have multiple headends deployed using custom architectures.

The exemplary architecture 150 of FIG. 1a further includes a conditional access system (CAS) 157 and a multiplexer-encrypter-modulator (MEM) 162 coupled to the HFC network 101 adapted to process or condition content for transmission over the network. The distribution servers 164 are coupled to the LAN 160, which provides access to the MEM 162 and network 101 via one or more file servers 170. The VOD servers 105 are coupled to the LAN 160 as well, although other architectures may be employed (such as for example where the VOD servers are associated with a core switching device such as an 802.3z Gigabit Ethernet device). As previously described, information is carried across multiple channels. Thus, the headend must be adapted to acquire the information for the carried channels from various sources. Typically, the channels being delivered from the headend 150 to the CPE 106 (“downstream”) are multiplexed together in the headend, as previously described and sent to neighborhood hubs (FIG. 1b ) via a variety of interposed network components.

Content (e.g., audio, video, data, files, etc.) is provided in each downstream (in-band) channel associated with the relevant service group. To communicate with the headend or intermediary node (e.g., hub server), the CPE 106 may use the out-of-band (OOB) or DOCSIS channels and associated protocols. The OCAP 1.0, 2.0, 3.0 (and subsequent) specification provides for exemplary networking protocols both downstream and upstream, although the present disclosure is in no way limited to these approaches.

“Switched” Networks—

FIG. 1c illustrates an exemplary “switched” network architecture. Switching architectures allow improved efficiency of bandwidth use for ordinary digital broadcast programs. Ideally, the subscriber is unaware of any difference between programs delivered using a switched network and ordinary streaming broadcast delivery.

FIG. 1c shows the implementation details of one exemplary embodiment of this broadcast switched network architecture. Specifically, the headend 150 contains switched broadcast control 190 and media path functions 192; these element cooperating to control and feed, respectively, downstream or edge switching devices 194 at the hub site which are used to selectively switch broadcast streams to various service groups. BSA media path 192 may include a staging processor 195, source programs, and bulk encryption in communication with a switch 275. A BSA server 196 is also disposed at the hub site, and implements functions related to switching and bandwidth conservation (in conjunction with a management entity 198 disposed at the headend). An optical transport ring 197 is utilized to distribute the dense wave-division multiplexed (DWDM) optical signals to each hub in an efficient fashion.

In addition to “broadcast” content (e.g., video programming), the systems of FIGS. 1a and 1c (and 1 d discussed below) also deliver Internet data or video services using the Internet protocol (IP), although other protocols and transport mechanisms of the type well known in the digital communication art may be substituted. One exemplary delivery paradigm comprises delivering MPEG-based video content, with the video transported to user PCs (or IP-based STBs) over the aforementioned DOC SIS channels comprising MPEG (or other video codec such as H.264 or AVC) over IP over MPEG. That is, the higher layer MPEG- or other encoded content is encapsulated using an IP protocol, which then utilizes an MPEG packetization of the type well known in the art for delivery over the RF channels. In this fashion, a parallel delivery mode to the normal broadcast delivery exists; i.e., delivery of video content both over traditional downstream QAMs to the tuner of the user's STB or other receiver device for viewing on the television, and also as packetized IP data over the DOCSIS QAMs to the user's PC or other IP-enabled device via the user's cable modem. Delivery in such packetized modes may be unicast, multicast, or broadcast.

Referring again to FIG. 1c , the IP packets associated with Internet services are received by edge switch 194, and in one embodiment forwarded to the cable modem termination system (CMTS) 199. The CMTS examines the packets, and forwards packets intended for the local network to the edge switch 194. Other packets are discarded or routed to another component. The edge switch 194 forwards the packets receive from the CMTS 199 to the QAM modulator 189, which transmits the packets on one or more physical (QAM-modulated RF) channels to the CPE. The IP packets are typically transmitted on RF channels (e.g., DOCSIS QAMs) that are different that the RF channels used for the broadcast video and audio programming, although this is not a requirement. The CPE 106 are each configured to monitor the particular assigned RF channel (such as via a port or socket ID/address, or other such mechanism) for IP packets intended for the subscriber premises/address that they serve.

“Packet-Optimized Networks”—

While the foregoing network architectures described herein can (and in fact do) carry packetized content (e.g., IP over MPEG for high-speed data or Internet TV, MPEG2 packet content over QAM for MPTS, etc.), they are often not optimized for such delivery. Hence, in accordance with another embodiment of the disclosure, a “packet optimized” delivery network is used for carriage of the packet content (e.g., IPTV content). FIG. 1d illustrates one exemplary implementation of such a network, in the context of a 3GPP IMS (IP Multimedia Subsystem) network with common control plane and service delivery platform (SDP), as described in co-pending U.S. Provisional Patent Application Ser. No. 61/256,903 filed Oct. 30, 2009 and entitled “METHODS AND APPARATUS FOR PACKETIZED CONTENT DELIVERY OVER A CONTENT DELIVERY NETWORK”, which is now published as U.S. Patent Application Publication No. 2011/0103374 of the same title filed on Apr. 21, 2010, each of which is incorporated herein by reference in its entirety. Such a network provides, inter alia, significant enhancements in terms of common control of different services, implementation and management of content delivery sessions according to unicast or multicast models, etc.; however, it is appreciated that the various features of the present disclosure are in no way limited to this or any of the other foregoing architectures.

FIG. 1e shows another exemplary network architecture optimized for the delivery of packetized content disclosure useful with the present disclosure. In addition to on-demand and broadcast content (e.g., video programming), the system of FIG. 1e may deliver Internet data services using the e.g., Internet protocol (IP).

The network 1000 generally comprises a local headend 1001 in communication with at least one hub 1003 via an optical ring 1007. The distribution hub 1003 is able to provide content to various user devices, CPE 1022, and gateway devices 1020, via a network 1005.

Various content sources 1002 are used to provide content to a content server 1004. For example, content may be received from a local, regional, or network content library as discussed in co-owned co-pending U.S. application Ser. No. 12/841,906 filed on Jul. 22, 2010 and entitled “APPARATUS AND METHODS FOR PACKETIZED CONTENT DELIVERY OVER A BANDWIDTH-EFFICIENT NETWORK”, which is incorporated herein by reference in its entirety. Alternatively, content may be received from linear analog or digital feeds, as well as third party content sources. Internet content sources 1010 (such as e.g., a web server) provide Internet content to a packetized content server 1006. Other IP content may also be received at the packetized content server 1006, such as voice over IP (VoIP) and/or IPTV content. Content may also be received from subscriber and non-subscriber devices (e.g., a PC or smartphone-originated user made video). In one embodiment, the functionality of both the content server 1004 and packetized content server 1006 may be integrated into a single server entity.

A central media server located in the headend 1001 may be used as an installed backup to the hub media servers as (i) the primary source for lower demand services, and (ii) as the source of the real time, centrally encoded programs with PVR (personal video recorder) capabilities. By distributing the servers to the hub stations 1003 as shown in FIG. 1e , the size of the fiber transport network associated with delivering VOD services from the central headend media server is advantageously reduced. Hence, each user has access to several server ports located on at least two servers. Multiple paths and channels are available for content and data distribution to each user, assuring high system reliability and enhanced asset availability. Substantial cost benefits are derived from the reduced need for a large content distribution network, and the reduced storage capacity requirements for hub servers (by virtue of the hub servers having to store and distribute less content).

It will also be recognized that a heterogeneous or mixed server approach may be utilized consistent with the disclosure. For example, one server configuration or architecture may be used for servicing cable, satellite, HFCu, etc. subscriber CPE-based session requests, while a different configuration or architecture may be used for servicing mobile client requests. Similarly, the content servers 1004, 1006 may either be single-purpose/dedicated (e.g., where a given server is dedicated only to servicing certain types of requests), or alternatively multi-purpose (e.g., where a given server is capable of servicing requests from different sources).

The network 1000 of FIG. 1e may further include a legacy multiplexer/encrypter/modulator (MEM; not shown) coupled to the network 1005 adapted to “condition” content for transmission over the network. In the present context, the content server 1004 and packetized content server 1006 may be coupled to the aforementioned LAN, thereby providing access to the MEM and network 1005 via one or more file servers (not shown). The content server 1004 and packetized content server 1006 are coupled via the LAN to a headend switching device 1008 such as an 802.3z Gigabit Ethernet (or incipient “10G”) device. Video and audio content is multiplexed at the headend 1001 and transmitted to the edge switch device 1012 (which may also comprise an 802.3z Gigabit Ethernet device).

Individual CPEs 1022 of the implementation of FIG. 1e may be configured to monitor the particular assigned RF channel (such as via a port or socket ID/address, or other such mechanism) for IP packets intended for the subscriber premises/address that they serve.

In the switched digital variant, the IP packets associated with Internet services are received by edge switch, and forwarded to the cable modem termination system (CMTS) 1016. The CMTS examines the packets, and forwards packets intended for the local network to the edge switch. Other packets are in one variant discarded or routed to another component.

The edge switch forwards the packets receive from the CMTS to the QAM modulator, which transmits the packets on one or more physical (QAM-modulated RF) channels to the CPE. The IP packets are typically transmitted on RF channels that are different than the RF channels used for the broadcast video and audio programming, although this is not a requirement. As noted above, the CPE are each configured to monitor the particular assigned RF channel (such as via a port or socket ID/address, or other such mechanism) for IP packets intended for the sub scriber premises/address that they serve.

In one embodiment, both IP data content and IP-packetized audio/video content is delivered to a user via one or more universal edge QAM devices 1018. According to this embodiment, all of the content is delivered on DOCSIS channels, which are received by a premises gateway 1020 (described subsequently herein) and distributed to one or more CPE 1022 in communication therewith. Alternatively, the CPE 1022 may be configured to receive IP content directly without need of the gateway or other intermediary. As a complementary or back-up mechanism, audio/video content may also be provided in downstream (in-band) channels as discussed above; i.e., via traditional “video” in-band QAMs. In this fashion, a co-enabled digital set top box (DSTB) or other CPE could readily tune to the new (in-band) RF video QAM in the event that their IP session over the DOCSIS QAM is for some reason interrupted. This may even be accomplished via appropriate logic within the CPE (e.g., autonomously, or based on signaling received from the headend or other upstream entity, or even at direction of a user in the premises; e.g., by selecting an appropriate DSTB or other CPE function).

In the embodiment illustrated in FIG. 1e , IP packetized content is provided to various user devices via the network 1005. For example, content may be delivered to a gateway apparatus 1020 which distributes content received thereat to one or more CPE 1022 in communication with the apparatus 1020.

In another variant, IP simulcast content and existing on-demand, voice, and broadcast content are all provided to the headend switch device 1008 of FIG. 1e . The headend switch 1008 then provides the content to the optical ring 1007 for provision to one or more distribution hubs 1003. IP simulcast content is in one exemplary implementation retrieved from a plurality of content sources at an IPTV server.

The IP-packet content is transmitted to subscriber devices via the universal edge QAM 1018 and the edge network 1005. The IP video (“simulcast”) content is presented to client devices capable of receiving content over the DOCSIS QAMs. For example, the aforementioned gateway device 1020 (as well as an advanced CPE 1022 such as an IP-enabled DSTB may receive the IP simulcast. Legacy CPE may receive content via the gateway device 1020, or via an audio/video “back-up” MPEG transport stream as previously described.

In the illustrated embodiment, the gateway device 1020 serves as a gateway to the IP content for other client devices (such as other CPE 1022 and PMD). The gateway device 1020 may communicate with one or more connected CPE 1022, as well as utilize Wi-Fi capabilities (where so equipped) to communicate wirelessly to other devices. It will also be recognized that the present disclosure may be configured with one or more short-range wireless links such as Bluetooth for lower bandwidth applications (or PAN for greater bandwidth applications).

It is still further appreciated that the delivery of content may include delivery from an “off-net” distribution hub (not shown) to another network (not shown), not associated with the MSO. In this embodiment, a requesting device (such as CPE 1022 or gateway 1020, or user mobile device) may request content from a local headend 1001 which is transferred over both MSO-maintained (“on-net”) and “off-net” networks, such as an interposed Wi-Fi access point (AP) with non-MSO broadband connection to the Internet, such as a Telco FiOS, 4G LTE modem, or the like (and via which the serving MSO server at e.g., the headend 1001 delivers content).

Exemplary Secondary Content Management Architecture—

Referring now to FIG. 2, an exemplary embodiment of a secondary content management architecture 200 specifically implementing the various aspects of the disclosure is shown and described. It will be appreciated that the architecture 200 of FIG. 2 can be used in conjunction with any of the foregoing network content distribution architectures (i.e., those of FIGS. 1-1 e discussed supra), or can form the basis of its own distribution and delivery architecture.

Additionally, the architectures and systems discussed in co-owned and co-pending U.S. patent application Ser. No. 13/403,802 filed on Feb. 23, 2012 and entitled “APPARATUS AND METHODS FOR PROVIDING CONTENT TO AN IP-ENABLED DEVICE IN A CONTENT DISTRIBUTION NETWORK”, which is incorporated herein by reference in its entirety, may be utilized in conjunction with the present disclosure as well.

As shown in FIG. 2, the exemplary management architecture 200 generally comprises an Advertisement Management Service (AMS) 203, which is configured to select individual ones of a plurality of secondary content (e.g., advertisements, promotions or “info-mercials”, commercials, telescoping information/advertisements, and short segments) for delivery to individual ones of the client 106 from an secondary content store (not shown). The AMS 203 may, in one embodiment, comprise a server or other computerized device and may be adapted to comply with the requirements set forth in the Society of Cable Telecommunications Engineers SCTE 130-1 and SCTE 130-3 Digital Program Insertion—Advertising Systems Interfaces standards, and/or IAB (Interactive Advertising Bureau) standards and practices, including e.g., those set forth in “Traffic Fraud: Best Practices for Reducing Risk to Exposure”, updated May 2015; “OpenRTB Dynamic Native Ads API—Specification Version 1” dated February 2015; “OpenDirect API Specification Version 1.0”, finalized January 2015; “Digital Video In-Stream Ad Format Guidelines” released Jan. 8, 2016; “RTB Project OpenRTB API Specification Version 2.4” (Final Draft) dated March 2016; and “RTB Project OpenRTB Dynamic Native Ads API, Specification Version 1.1” dated March 2016, each of the foregoing incorporated herein by reference in its entirety. In one embodiment, the AMS 203 is in communication with an Advertisement Decisioning Service (ADS) 202, the ADS comprising another computerized network entity which is adapted to determine individual ones of the plurality of secondary content from the content store (not shown) to be inserted into the primary content and delivered to the client 106, based on e.g., selection applications or algorithms running on the ADS.

A receiver/decoder entity 208 of the network 200 receives content (e.g., audio, video, data, files, etc.) which is then encoded at the encoder/transcoder 210 to an appropriate format (codec, bitrate, etc.) for the requesting device 106. In one implementation, video is transcoded from a mezzanine quality down to e.g., MPEG-4. The encoder/transcoder 210 may also be used to transcode the content to MP4 in MPEG-2 transport stream (TS) format in a non-rate adaptive manner. The non-rate adaptive format may be used in this case because the stream has a constant bit rate (CBR) at this stage. Utilization of the MPEG-2 TS container enables the MP4 or other content to be multicast to a plurality of devices on the network. Additionally, the MPEG-2 TS content may be delivered with advertisement or other “secondary” content inserted therein via one or more intermediary advertisement insertion mechanisms (not shown). Exemplary apparatus and methods for selection of secondary content to be inserted (e.g., via a “targeted” approach) are described in co-owned and co-pending U.S. patent application Ser. No. 11/186,452 filed on Jul. 20, 2005 and entitled “METHOD AND APPARATUS FOR BOUNDARY-BASED NETWORK OPERATION”, U.S. patent application Ser. No. 12/284,757 filed on Sep. 24, 2008 and entitled “METHODS AND APPARATUS FOR USER-BASED TARGETED CONTENT DELIVERY”, and U.S. patent application Ser. No. 12/766,433 filed on Apr. 23, 2010 and entitled “APPARATUS AND METHODS FOR DYNAMIC SECONDARY CONTENT AND DATA INSERTION AND DELIVERY”, each of which is incorporated herein by reference in its entirety, although other approaches may be used consistent with the present disclosure.

In one embodiment (see discussion of FIG. 3 infra), the architecture 200 of FIG. 2 is configured to generate a unique identifier (e.g., session ID, such as a globally unique ID or GUID, or identifier which is unique for each particular client device or process) for includion with a manifest file relating to delivery of primary content (e.g., video assets) requested by the user. As detailed subsequently herein, this approach allows the architecture (including AMS via ADS) to prevent false “counts” for secondary content (e.g., advertisements) which are associated with the primary content assets, such as might be instigated by a “bot” or other malicious entity.

In one exemplary implementation of the foregoing architecture, one or more “beacons” or indicators (including, without limitation, advertisement tags, web beacons, and metadata or data containers) are also embedded into e.g., the metadata of the secondary content, the secondary content itself, or associated with the URLs of the secondary content (as described in greater detail below). In one embodiment, the one or more beacons or indicators may comprise quartile beacons, indicating that 25%, 50%, and 75% (and 100% if desired) of the individual one of the secondary content has been “consumed” by the client device that is rendering the content. It will be appreciated that the term “consumed” as used in the present context may have various definitions, including without limitation: (i) receipt of a valid consumption request at the AMS; (ii) receipt of a data indicative of an actual decode of the relevant chunk(s), or (iii) receipt of data indicative of extraction of the beacon/indicator from e.g., the metadata of a received content chunk (without knowledge of actual decode by the client). In one implementation, the one or more beacons may comprise ID3 tags, such as for example as those adapted to comply with the requirements set forth in ID3 tag version 2.3.0 (see e.g., http//id3.org/id3v2.3.0), which is incorporated herein by reference in its entirety. Alternatively, another mechanism to carry or entrain metadata within an ABR streaming protocol can be used, such as without limitation an encoder-agnostic approach such as MPEG-DASH (aka Dynamic Adaptive Streaming over HTTP); see e.g., ISO/IEC Std. 23009-1:2012 published April, 2012, and incorporated herein by reference in its entirety. The embedding functions are performed by, in one embodiment, the encoder/transcoder 210, although depending on the scheme used, such “embedding” may be performed by other entities (such as where the tag or indicator is part of e.g., a URL or other data element other than the encoded content).

The encoded content is passed from the encoder 210 to the packager 212, where various service variants are generated and distributed to an origin server 214. The service variants created by the packager 212 correspond to the various services identified by the content providers 201. Thus, each service variant is, in the illustrated embodiment, provided a different playlist (or manifest) containing one or more triggers or markers for varying content based on various considerations. In addition, certain service variants may have triggers embedded in the manifest which other variants may not have.

In on embodiment, the triggers or markers contained in the primary content mark an event that is of interest. In an exemplary embodiment, the events of interest are secondary content (e.g., advertisement) insertion events. That is to say, the primary content is segmented at least at advertisement insertion breaks. The segmenting functions may be performed by, in one embodiment, a staging processor (not shown). Triggering functions may occur using e.g., in-band signaling. In one embodiment, the trigger comprises an Society of Cable Telecommunication Engineers (SCTE)-35 trigger of the type known in the art. Specifically, an SCTE-35 trigger is a cue message embedded in the transport stream which indicates an insertion event which is used to, inter alia, indicate advertisement insertion points (see e.g., SCTE Standards Document ANSI/SCTE 118-2 2007 entitled “Program-Specific Ad Insertion—Content Provider to Traffic Communication Applications Data Model”, which is incorporated herein by reference in its entirety). In the exemplary embodiment of the present disclosure, the SCTE-35 cue is maintained within the manifest or playlist; it will be appreciated that traditional SCTE-35 cues may be used in addition to those used for embedding beacons or indicators into advertisements as described elsewhere herein. In one exemplary implementation, the SCTE-35 cues are transported in a binary structure in a MPEG-2 transport stream, and are converted to a ASCII- or XML-based structure and embedded in the manifest file which later can trigger the secondary content (e.g., advertisement) insertion.

Still further, the packager may use a Placement Opportunity Interface Specification (POIS) as described by SCTE Standards Document ANSI/SCTE 130-1 200 entitled “Digital Program Insertion—Advertising Systems Interfaces”, which is incorporated herein by reference in its entirety, to signal to the alternate event service of alternate event notifications signaled via SCTE-35 triggers.

When primary content is requested by the client 106, the request is serviced via the edge cache 216 which receives content from the origin server 214. Primary content may be stored at the edge 216 in order to facilitate delivery thereof with less latency than content delivered from the origin server 214 (or even deeper towards the core of the network). A content request from a client device 106 to the edge cache 216 in one implementation contains at least the headend ID (or other identifier) assigned to the device 106 by an authorization server (not shown). Alternatively, the MAC address or other device/user-specific identifier (e.g., IP address) or URL which is associated with a known or determinable location may be utilized. Yet further, location-specific coordinates such as e.g., GPS/A-GPS—generated lat./lon., zip code, or other geolocation data may be used to identify one or more such locations. The edge cache uses the identifier to ensure that the appropriate service variant is provided to the requesting device 106.

During playback of the requested primary content according to the playlist or manifest thereof, the client may reach a trigger (such as a URL redirect trigger which is placed in a manifest at each instance of an SCTE-35 marker by the packager 212), indicating that content may no longer be provided, and/or alternate content is needed. The trigger event in one exemplary implementation causes the CPE 106 to request an appropriate URL from the Manifest Manipulator (MM) 204, another computerized network entity (which may be a software application or process operating on a host server 205 or other hardware environment; e.g., co-located with other network functionality). The MM 204 then queries the ADS 202 for information regarding which individual ones of the plurality of secondary content should be inserted into the content. In one implementation, the ADS 202 consults a list of pre-designated alternative content provided by the content providers 201 to determine which URL (i.e., the URL for which content) should be transmitted to the requesting device 106.

The ADS 202 responds to the MM 204 with a decision which gets translated into a list of URL's that represent the “chunks” of the secondary content that collectively comprise secondary content element (e.g., an entire advertisement). In an exemplary embodiment of the present disclosure, the ADS response also contains one or more unique identifiers (such as, e.g., a session-specific identifier such as a globally unique identifier (GUID) or universally unique identifier (UUID) that uniquely represent the client's request for a session (e.g., a video session)), or yet other types of identifying information. The list of secondary content-related URLs is then inserted into the manifest or playlist that contains the list of addresses or URLs for the associated primary content, whether in addition to, or in substitution of, the primary content URLs. The purpose of implementing the unique identifiers is so that the client is required to request at least one of the actual secondary content “chunks” using the included identifier, in order for an accounting request to be considered legitimate.

The client 106 parses the manifest and requests from the ADS 202 the first URL for each unique secondary content request (referred to herein as an “accounting” URL), which also contains the unique identifier for the session. The ADS 202 verifies that the unique identifier is the actual unique identifier that the ADS 202 had (recently) generated. Upon a successful validation, the ADS 202 considers the client's 106 request based at least in part on the verification of the accounting URL to be legitimate.

It will be appreciated that various implementations described herein may also dictate varying client device configuration (e.g., in terms of application or other software or middleware) in order to accommodate the fraud prevention and/or consumption management functions described herein. For instance, certain embodiments of the CPE 106 of FIG. 2 may be IP-enabled client devices (whether fixed or mobile in form), that may include an MSO or third party “app” thereon for interface with the MSO's IP-packetized content delivery service. The app may, for example, include the necessary code to examine and extract the aforementioned GUID and/or beacons from the received manifest file, and utilize them in forming requests to the ADS or CDN for content delivery, or for informational purposes to the ADS (e.g., messages indicate of beacons for percent completion).

In other implementations, the client 106 may comprise a DSTB (digital settop box) or the like, with middleware which can be “flashed” or updated in order to implement the GUID and/or beacon functionality. Myriad other configurations of CPE 106 useful with the present disclosure will be recognized by those of ordinary skill.

Methods—

Referring now to FIG. 3, an exemplary embodiment of a method 300 for preventing advertisement viewing fraud within a managed network, such as the exemplary network of FIGS. 1-1 e, is illustrated.

As shown, per step 302, one or more primary content elements are obtained. For instance, a number of different programs may be ingested into the network 200 from third party content sources. In one particular implementation of step 302 of the method 300, a content provider 201 creates a cross-reference list of identifiers (such as e.g., headend IDs, geographic or location identifiers, system identifier, market identifier, program ID, stream ID) to appropriate services based on negotiated viewing rights. In one embodiment, each available service may be associated to e.g., a relevant geographic region, and/or according to other criteria.

The content provider 201 publishes the matchup of headend ID (or other ID as indicated above) to particular programming for use by the AMS 203. A new list is generated, in one embodiment, based on particular events (such as a user request), or periodically, or whenever an event notification is needed. The AMS 203 may also request or “pull” the list from the content provider(s). The list is published to the AMS 203 in one embodiment using a WebServices interface, although other approaches may be used consistent with the present disclosure.

The content is marked with one or more markers or triggers. In one embodiment, the markers comprise SCTE-35 markers as discussed above, and indicate alternate program events. In one such implementation, the content provider 201 is responsible for marking events. Alternatively, the content provider 201 may merely provide necessary information to the AMS 203, ADS 202, packager 212, or the origin server 214, and one of these entities may insert appropriate markers or triggers into the relevant events. As yet another alternative, the marker insertion task may be divided between the content providers and one or more other entities, such as based on a prescribed division scheme (e.g., content providers insert certain types of markers, while other entities insert others).

The content is then encoded and published per step 304. In one embodiment, the content is encoded into an ABR (adaptive bit rate) streaming protocol based on a hypertext transfer protocol (HTTP) transport for provision to mobile devices using e.g., HLS or Smooth Streaming, or ISO-DASH, as discussed above. As the content is encoded, the SCTE-35 or otherwise marked alternate program event is converted by the packager 212 to a redirection URL in the manifest or playlist for the content which is ultimately published and stored on the origin server 214 or edge cache 216. Normally, the client device 106 plays the content from the manifest, and when the redirect URL is encountered, it points the client to the MM 204, which acts as a proxy server for the ADS 202. However, in the exemplary embodiment of the present disclosure, the redirect URL resolves to the ADS 202 which, as described elsewhere herewin, validates the client's request.

At step 306, the client requests the manifest for the primary content from the MM 204. For example, one of the previously ingested and encoded/marked programs is requested by the client via e.g., an application program (e.g., guide, web browser, etc.) running thereon, which triggers a request for the manifest file.

At step 308, the MM 204 queries the ADS 202 for information regarding which individual ones of the plurality of secondary content should be inserted into the content. The ADS 202 consults a list of pre-designated alternative content provided by the content providers 201 (or otherwise, such as being based on one or more local advertising campaigns from e.g., an content distributor (MVPD)) to determine which URL (i.e., the URL for which content) should be transmitted to the requesting device 106. In one embodiment, the MM 204 queries the ADS 202 by sending a message.

In one exemplary configuration, the ADS 202 also generates one or more unique identifiers embedded in the data or metadata of the secondary content or associated with the secondary content streamed or transmitted from the head end of the network, such as by the MSO, or by a third party server or service (step 310). The one or more identifiers are again, in one exemplary embodiment, utilized to determine whether an accounting request is to be considered legitimate, by requiring that the client requesting the manifest or playlist present an authentic or valid unique identifier, as discussed elsewhere herein.

In one embodiment, the one or more unique identifiers are “per-session” unique identifier that uniquely represents the client's request for a session (e.g., a video session). In one implementation, the one or more unique identifiers comprise a globally unique identifier (GUID) and/or universally unique identifier (UUID)), although it will be appreciated that other approaches may be used. For instance, in one alternate implementation, the unique identifier may comprise a seed value to be used by a shared one-way hash algorithm possessed by the client and the ADS or MM. As is well known, one-way hashing functions are cryptographic elements which, when a given value (seed) is inserted, produce a wholly unique output value. The algorithm is undiscoverable by the output alone, and hence surreptitious attempts to “hack” the algorithm using the output values are frustrated. The sharing entities (here, client and ADS/MM) should produce an identical output when the seed (input) is identical, and hence this can be used to authenticate the request, such as where the manifest file contains a unique seed (which may be issued on a per-session basis, rotated periodically, or expire, and itself comprise an output of another cryptographic process) which the client operates on using the hash algorithm to generate an output, and returns that output (i.e., in place of or along with the aforementioned GUID) as part of the secondary content request to the ADS.

In another implementation, the selection of URLs or other addressing may be used to indicate authenticity of the secondary content request. For instance, the secondary content URLs disposed within each manifest file (even for the same secondary content asset) may be changed or rotated periodically or per-session, so that each manifest is unique in one or both of (i) one or more URLS used for content delivery, and/or (ii) the order of which the URLs are presented to the ADS. Hence, in one variant, the ADS is configured to select the URLs associated with the chunks of the secondary content element(s) to be served with the manifest file in such a fashion as to be unique in some capacity (there by address, order, both, or some other metric), and later verify this same uniqueness is preserved on any subsequent “client” requests for the request to be considered valid. This approach advantageously allows use of a client which requires no special adaptation of its software/firmware (e.g., to extract and include a GUID or similar in its requests); rather, the client merely extracts the URLs as it normally would and includes them in its request, and it is the URLs themselves (or their order) which act as the “unique identifier”.

Similarly, the GUID or unique identifier can be appended to or embedded within the URL itself, such that “static” URLs can be used for a given secondary element, but validation of the request via the GUID or other identifier can still occur by the ADS.

The list of secondary content-related URLs is then inserted or embedded into the manifest or playlist that contains the list of URLs for the associated primary content. The first URL for each unique secondary content request is an “accounting” URL which also contains the unique identifier for the session.

It is appreciated, however, that other identifiers may be employed, the foregoing being merely illustrative of the overall concept of linking the individual ones of the secondary content being requested to the user/device requesting access to the secondary content and associated primary content. For example, the present disclosure also contemplates using other mechanisms such as those employed in the registration process for authenticating user and/or requesting device identity, discussed in previously referenced co-owned and co-pending U.S. patent application Ser. No. 13/403,802 filed Feb. 23, 2012 and entitled “APPARATUS AND METHODS FOR PROVIDING CONTENT TO AN IP-ENABLED DEVICE IN A CONTENT DISTRIBUTION NETWORK”. Such mechanisms for authenticating user and/or requesting device identity described therein, include e.g., digital certificates, key exchanges, biometric data relating to a user, and so forth.

In one embodiment, the ADS 202 maintains a list of all identifiers that it has generated for secondary content decision requests made for all active sessions.

At step 312, the ADS 204 publishes one or more URLs for the appropriate content that will replace the requested content at the marked event. In other words, the ADS 202 responds to the MM 204 with a decision which gets translated into a list of URL's that comprise the individual ones of secondary content. The ADS 202 may obtain the correct redirect URL from the content providers 201 or, alternatively, the packager 212 or MM 204 may provide the URL's of the primary and secondary content to the ADS 204. As another option or alternative, a local ad campaign (or content distributor (MVPD) may act as the source. The ADS 202 uses the URLs to create the associated service list with the appropriate URLs. In this instance, when the client device 106 encounters the event, and requests a redirect URL the ADS 202 may consult the service list to redirect the device to the appropriate content. The individual ones of secondary content may also optionally contain one or more beacons or tags inserted therein, as discussed infra.

At step 314, the MM 204 inserts the URLs for individual ones of secondary content determined by the ADS 202 into the manifest associated with the insertion points indicated by the triggers contained in the primary content. The MM 204 then provides the manifest to the client 106.

At step 316, the client 106 then parses the manifest, and the device 106 attempts to access content from the network (e.g., CDN) by sending a request for the primary content. The client 106 uses each URL listed in the manifest to request data from the service provider. For URLs that represent the primary content, the requests are typically made to a CDN which returns “chunks” of content to be rendered by the client device.

Per step 318, when an secondary content break occurs, the first secondary content-related URL resolves to the ADS 202, wherein the one or more unique identifiers provided to the client 106 in step 314 are presented (whether as part of the requested URL of the first chunk, as part of each URL of each chunk, as part of a separate message sent to the ADS, or yet other approach.

In one embodiment, the manifest manipulation-based secondary content insertion appears seamless to the end user by configuring the primary content “chunks” and the secondary content “chunks” to align the secondary content break boundaries with the primary content “chunk” boundaries.

At step 320, the verification process is performed. When the ADS 202 receives this request, the ADS 202 verifies that the one or more unique identifiers provided in the request is corresponding one or more unique identifiers that it had recently generated in step 310 (or via other uniqueness attributes as described previously herein). If the one or more unique identifiers is/are determined to be the recently generated one or more unique identifiers, then the ADS 202 performs an accounting function to note that an individual one of the secondary content is about to be delivered (and presumably viewed by the client 106). In other words, upon a successful validation, the ADS 202 considers the client's 106 request based at least in part on the verification of the accounting URL to be legitimate and thus, counts is to be utilized by the content distributor in billing the advertiser. It is noted that in this particular embodiment, no actual consumption or rendering is verified; rather, the presentation of the correct GUID or other data validates the request. Moreover, the exemplary approach of FIG. 3 also does not validate the primary content request via the GUID; rather, the only predicate for delivery of the secondary content chunk(s) is the validation of the secondary content request by the ADS.

Per step 322, the client 106 then requests the other ones of the individual ones of the secondary content from the CDN 214 based upon the remaining secondary content related URLs listed in the manifest file, and receives and renders. Note that in one variant, the validation of step 320 need only occur for the first chunk; all remaining URLs associated with eth secondary content in the manifest file resolve to the CDN (or another non-ADS entity); these are presumed to be valid requests (e.g., if received within a prescribed period of time). Alternatively, in another variant, each secondary content URL may resolve to the ADS, such that validation of each chunk request occurs before the relevant secondary content chunk is delivered. Various combinations of the foregoing may also be utilized, as will be appreciated by the artisan of ordinary skill given the present disclosure.

For each quartile received by the client 106, an accounting message is sent to the ADS 202, allowing the ADS 202 to report on the percentage of the individual one of the secondary content rendered (step 320).

FIG. 3a illustrates an alternate embodiment of the foregoing method.

Specifically, at step 332, the primary content is ingested, and markers for secondary content redirect are inserted as previously described. Next, at step 334, the primary content is encoded, and listed as available.

At step 336, the client requests the manifest file (e.g., via selection of the primary content).

At step 338, a secondary content decision is requested from the ADS 202 by the MM 204. At step 340, the GUID or other identifier is generated, and provided to the MM along with the secondary content insertion decision per step 342.

At step 344, the manifest file is created (including GUID) and sent to the requesting client.

At step 346, the client requests the primary content (which in this case resolves to the ADS for request validation per the GUID inserted therein), or is otherwise validated.

Per step 348, the first request for the secondary content is received at the ADS, and the request is validated based on (i) proper presentation of the GUID or other unique identifier, and (ii) the prior validation of the primary content request from the same client (such as via GUID associated with the primary request per step 346) per step 350. In this fashion, both the presentation of the valid GUID and the prior validated content request are used as indicia of the authenticity of the secondary content request (i.e., the same client is actually consuming the primary content as well as requesting the secondary content).

Finally, the secondary content is delivered to, and rendered by the client 106 (step 352).

Secondary Content Tag or Beacon Insertion—

Referring now to FIG. 4, a further aspect of the disclosure is described, wherein so-called “beacons”, tags, or other indicators are inserted into the secondary content (or associated metadata or URLs) indicate of one or more parameters relating to e.g., the consumption of the secondary content asset by the client device.

At step 402 of the method 400, the primary content is ingested, and markers for secondary content redirect are inserted as previously described.

At step 404, the primary content is encoded, and listed as available.

At step 406, the client requests the manifest file (e.g., via selection of the primary content).

At step 408, a secondary content decision is requested from the ADS 202 by the MM 204. At step 410, the GUID or other identifier is generated, and provided to the MM along with the secondary content insertion decision.

At step 412, the manifest file is created (including GUID) and sent to the requesting client. Also part of step 412 is the “insertion” of one or more beacons or tags into the secondary content. In one exemplary implementation, the insertion of the beacons or tags involves inserting these elements into the metadata associated with the secondary content element (the latter which comprises a series of temporally contiguous chunks of media data).

As a brief aside, “metadata” includes extra data not typically found in (or at least not visible to the users of) the network. This metadata may be validated against relevant specifications if desired, such as e.g., those provided by CableLabs. For each individual secondary content element, a metadata file is generated that specifies which events are associated with that individual secondary content element. For example, a simple “one-association” secondary content element would include metadata that associates the individual secondary content element chunk with a URL where that chunk can be found. The metadata can be rendered in human-readable form if desired. Additional and/or different metadata content may be used, such as, for example, providing user rating data for particular events, source of the content element, etc. The metadata information can be packaged in a prescribed format such as a markup language (e.g., XML, or JSON). International standards for audiovisual metadata, such as the ISO/IEC “Multimedia Content Description Interface” (also referred to as MPEG7), or the TV-Anytime Forum's “Specification Series: S-3 on Metadata”, could also be used as the basis for the metadata.

The metadata is in the exemplary implementation delivered with the manifest file issued by the MM, although other approaches may be used consistent with the disclosure. As described previously, one particular implementation of the foregoing approach uses temporally-related (e.g., quartile or percentage completion) beacons, indicating e.g., 25%, 50%, and 75% and 100% of the individual one of the secondary content has been “consumed” by the client device that is rendering the content.

In one implementation of the method 400, the one or more beacons may comprise ID3 tags (for HLS), or DASH metadata/events. The embedding functions may be performed by, in one embodiment, the encoder/transcoder 210 (FIG. 2), although depending on the scheme used, such “embedding” may be performed by other entities (such as where the tag or indicator is part of e.g., a URL or other data element other than the encoded content).

As noted, the term “consumed” as used in the present context may have various definitions, including without limitation: (i) receipt of a valid consumption request at the AMS; (ii) receipt of a data indicative of an actual decode of the relevant chunk(s), or (iii) receipt of data indicative of extraction of the beacon/indicator from e.g., the metadata of a received content chunk (without knowledge of actual decode by the client). Hence, the present disclosure contemplates variants of the foregoing process wherein the beacon or tag data is embedded in or associated with various different elements delivered to the client. For instance, as noted above, the beacons may be embedded in or be part of the metadata which is associated with the manifest file.

In another implementation, the beacons or tags are embedded in or part of one or more of the URLs associated with the secondary content chunks. In yet another implementation, the beacons or tags are embedded within the encoded content itself (e.g., as part of or after the last GOP, etc. in the encoded MPEG-4 or H.264 content files). In this fashion, a given content chunk must actually be decoded (and presumably rendered) by the client device in order for the beacon or tag to be extracted. See discussions of FIGS. 4a and 4b provided subsequently herein.

At step 414, the client requests the primary content (which in this case resolves to the CDN).

Per step 416, the first request for the secondary content is received at the ADS, the request is validated based on proper presentation of the GUID or other unique identifier, and the requested content chunk(s) then delivered to the client (step 418).

At step 420, the received secondary content chunks are rendered by the client, and the beacons or tags extracted from the metadata (or the content elements themselves, as noted above). Each extracted tag (or information derived therefrom) is then sent to the ADS per step 422. It will be appreciated that various orders of performance of the foregoing steps are contemplated by the present disclosure, such as where e.g., (i) the extracted tags or beacons are sent to the ADS prior to rendering of the encoded content chunk; (ii) the extracted tags or beacons are sent to the ADS during rendering of the encoded content chunk; and (iii) the extracted tags or beacons are sent to the ADS after completion of rendering of the encoded content chunk, such as by way of the subsequent chunk request to the source URL, or as a separate communication. The individual tags/beacons may also be aggregated and sent to the ADS or other responsible network entity as a file or similar, such as via an 00B message protocol.

FIG. 4a shows an alternate methodology to that 400 of FIG. 4. Specifically, at step 432, the primary content is ingested, and markers for secondary content redirect are inserted as previously described. Next, at step 434, the primary content is encoded, and listed as available.

At step 436, the client requests the manifest file (e.g., via selection of the primary content).

At step 438, a secondary content decision is requested from the ADS by the MM. At step 440, the GUID or other identifier is generated, and provided to the MM along with the secondary content insertion decision. Also part of step 440 is the “insertion” of one or more beacons or tags into the URLs associated with the secondary content. In the exemplary implementation of FIG. 4a , the insertion of the beacons or tags involves inserting these elements into or associating them with individual ones of the URLs for the secondary content. For instance, where a secondary content element is divided temporally into N chunks, tags or beacons with data corresponding to 1/N, 2/N, . . . N/N completion may be utilized. Hence, a first tag may be indicative of 1/N completion; i.e., that the first of the N chunks has been at least requested. Other partitioning or indication schemes may be used as well, such as those relating to other consumption-related parameters of interest (e.g., chunks within which a “pause” or termination event was received, a single end-to-end or “full play” of the advertisement, interactivity by the user with a telescoping or other function indicative of possible interest, etc.).

At step 442, the manifest file is created (including GUID) and sent to the requesting client.

At step 444, the client requests the primary content (which in this case resolves to the CDN).

Per step 446, the first request for the secondary content is received at the ADS, the request is validated based on proper presentation of the GUID or other unique identifier, and the requested content chunk(s) then delivered to the client (step 448). Also received at step 446 by the ADS is the nth chunk tag or beacon, which is embedded within or otherwise associated with the requested chunk's URL.

At step 450, the received secondary content chunk is rendered by the client. At or before completion of the nth chunk rendering by the client, the client accesses the manifest for the next URL (including the nth beacon or tag associated therewith), and transmits it to the serving entity (e.g., CDN). In such case, the CDN may pass the received tag to the ADS, or the client may be configured to route the tag portion to the ADS, while routing the URL to the CDN.

Per steps 452 and 454, the foregoing process iterates until all N of the secondary content chunks have been delivered to the client.

FIG. 4b shows yet another alternate methodology to that 400 of FIG. 4. Specifically, at step 460, the primary content is ingested, and markers for secondary content redirect are inserted as previously described. The secondary content is also obtained or identified per step 460.

At step 462, the primary content is encoded, and listed as available.

At step 464, the secondary content is encoded into N separate chunks, and the beacons or tags for each chunk inserted as part of the encoding process (i.e., within the content of each chunk), such that the content chunk has to be decoded to extract the beacon/tag.

At step 466, the client requests the manifest file (e.g., via selection of the primary content).

At step 468, a secondary content decision is requested from the ADS by the MM. At step 469, the GUID or other identifier is generated, and provided to the MM along with the secondary content insertion decision (and associated secondary content asset information).

At step 470, the manifest file is created (including GUID) and sent to the requesting client.

At step 472, the client requests the primary content (which in this case resolves to the CDN).

Per step 474, the first request for the secondary content is received at the ADS, the request is validated based on proper presentation of the GUID or other unique identifier, and the requested content chunk(s) then delivered to the client (step 476).

At step 478, the received secondary content chunk is decoded and rendered by the client. As part of the decode, the nth tag or beacon is extracted from the content element, such as after rendering of the element has completed.

At step 480, it is determined whether the all N chunks have delivered to the client; if not, the method proceeds to step 482, wherein the count (n) is incremented, and the extracted nth tag or beacon is provided to the ADS along with presentation of the URL for the n+1 chunk to e.g., the CDN.

When all N chunks have been delivered (or rendering of N−1 chunks have been confirmed by receipt of the N−1th tag) per step 480, the final (Nth) content element is rendered, the Nth tag extracted, and the Nth tag sent to the ADS per step 484.

It will be recognized that while certain aspects of the disclosure are described in terms of a specific sequence of steps of a method, these descriptions are only illustrative of the broader methods described herein, and may be modified as required by the particular application. Certain steps may be rendered unnecessary or optional under certain circumstances. Additionally, certain steps or functionality may be added to the disclosed embodiments, or the order of performance of two or more steps permuted. All such variations are considered to be encompassed within the embodiments disclosed and claimed herein.

While the above detailed description has shown, described, and pointed out novel features of the disclosed embodiments as applied to various systems, it will be understood that various omissions, substitutions, and changes in the form and details of the device or process illustrated may be made by those skilled in the art without departing from the principles described herein. The foregoing description is of the best mode presently contemplated. This description is in no way meant to be limiting, but rather should be taken as illustrative of the general principles of the disclosure. The scope of the disclosure should be determined with reference to the claims. 

1.-22. (canceled)
 23. A method of mitigating fraud during delivery of Internet Protocol (IP) packetized media content and a plurality of secondary content elements to an IP-enabled client device of a user within a managed content delivery network, the method comprising: receiving a first communication from the IP-enabled client device for delivery of the IP packetized media content; causing generation of a unique session identifier relating to the first communication; transmitting a manifest file containing the unique session identifier and information relating to at least one secondary content element, to the IP-enabled client device; receiving from the IP-enabled client device a second communication, the second communication comprising at least a portion of the information and the unique session identifier or a derivative thereof; validating the second communication based at least on the received unique session identifier or the derivative thereof; and causing provision of the at least a first secondary content element of the plurality of secondary content elements to the IP-enabled client device via an IP transport.
 24. The method of claim 23, further comprising receiving a third communication from the IP-enabled client device, the third communication comprising: (i) at least second information, the second information relating to a second secondary content element of the plurality of secondary content elements content elements; (ii) the unique session identifier or the derivative thereof; and (iii) a consumption-related value.
 25. The method of claim 24, wherein the consumption-related value is indicative of at least one of a quality or amount of a then-current consumption of the at least first secondary content element by the IP-enabled client device.
 26. The method of claim 24, wherein the consumption-related value comprises a value related to beacon data embedded in a data stream comprising the second secondary content element.
 27. The method of claim 26, wherein the beacon data comprises beacon data indicating at least a percentage of the at least first secondary content element consumed by the IP-enabled client device.
 28. Computerized network apparatus for use in a content delivery network, said computerized network apparatus comprising: processing apparatus; network interface apparatus in data communication with the processing apparatus and configured to conduct data communications with a plurality of Internet Protocol (IP)-enabled client devices via at least the content delivery network; and storage apparatus in data communication with said processing apparatus, said storage apparatus comprising at least one computer program having a plurality of instructions configured to, when executed by said processing apparatus, cause the computerized network apparatus to: cause generation of a unique identifier; transmit one or more data structures comprising at least (i) the unique identifier, and (ii) secondary content information relating to a plurality of secondary content components, to an IP-enabled client device of the plurality of IP-enabled client devices, the plurality of secondary content components each comprising a portion of a complete secondary content element; receive a communication initiated from the IP-enabled client device, the communication comprising at least: (i) a first portion of the secondary content information, the first portion of the secondary content information relating to a first one of said plurality of secondary content components, and (ii) data relating to the unique identifier or a derivative thereof; validate the received communication based at least on the data relating to the unique identifier or the derivative thereof; and based at least on the validation, cause provision of the first one of said plurality of secondary content component to the IP-enabled client device via an IP transport.
 29. The computerized network apparatus of claim 28, wherein the generated unique identifier comprises a data value having a finite temporal period of validity.
 30. The computerized network apparatus of claim 29, wherein the plurality of instructions are configured to, when executed by said processing apparatus, cause the computerized network apparatus to validate the received communication within the finite temporal period of validity.
 31. The computerized network apparatus of claim 28, wherein the plurality of instructions are further configured to, when executed by the processing apparatus, cause the computerized network apparatus to authenticate the IP-enabled client device as having access to the content delivery network, the authentication based at least in part on data uniquely associated with the IP-enabled client device.
 32. The computerized network apparatus of claim 28, wherein the plurality of instructions are further configured to, when executed by the processing apparatus, cause the computerized network apparatus to receive a second communication from the IP-enabled client device, the second communication comprising: (i) a second portion of the secondary content information, the second portion relating to a second one of said plurality of secondary content components, (ii) the data relating to the unique identifier or the derivative thereof, and (iii) consumption-related data.
 33. The computerized network apparatus of claim 28, wherein the plurality of instructions are further configured to, when executed by the processing apparatus, cause the computerized network apparatus to: cause insertion of the first one of said plurality of secondary content components within at least one insertion break within a plurality of primary media data; and cause delivery of at least a portion of the plurality of primary media data to the IP-enabled client device.
 34. The computerized network apparatus of claim 28, wherein the plurality of instructions are further configured to, when executed by said processing apparatus, cause the computerized network apparatus to cause the delivery of the at least portion of the plurality of primary media data by utilizing a computerized content caching entity of the content delivery network (i) within a same prescribed geographical region as the IP-enabled client device, and (ii) disposed within an edge portion of the content delivery network and not a core portion.
 35. The computerized network apparatus of claim 28, wherein the communication comprises a secondary content request associated with delivery of packetized media content, and wherein the plurality of instructions are further configured to, when executed by the processing apparatus, cause the computerized network apparatus to: verify that at least a portion of the packetized media content has been previously requested by the IP-enabled client device as part of a common session.
 36. The computerized network apparatus of claim 35, wherein the common session is identified within at least one of: the unique identifier; or the data relating to the unique identifier or a derivative thereof.
 37. The computerized network apparatus of claim 35, wherein the transmission of the one or more data structures comprises a transmission of at least a host data structure comprising data indicative of one or more content delivery network storage locations where the packetized media content may be obtained.
 38. The computerized network apparatus of claim 37, wherein the host data structure comprises a manifest file comprising at least one or more URLs corresponding to the one or more network storage locations where the packetized media content may be obtained.
 39. Network apparatus of a content distribution network, the network apparatus configured for mitigating content viewing fraud, the network apparatus comprising: processing apparatus; network interface apparatus in data communication with the processing apparatus and configured to conduct data communications with a plurality of client devices via at least the content distribution network; and storage apparatus in data communication with the processing apparatus and comprising a plurality of computerized instructions executable on the processing apparatus, the plurality of computerized instructions configured to, when executed: receive a communication from an Internet Protocol (IP)-enabled client device of the plurality of client devices, the communication relating to delivery of IP packetized media content to the IP-enabled client device; cause generation of a unique session identifier relating to the communication; transmit a manifest file comprising the unique session identifier, first information relating to a plurality of advertising content elements, and a second information relating to the IP packetized media content, to the IP-enabled client device, the plurality of advertising content elements collectively comprising a complete advertisement; receive a second communication from the IP-enabled client device, the second communication comprising at least: (i) a first portion of the first information, the first portion of the first information relating to a first one of said plurality of advertising content elements, and (ii) the unique session identifier; validate the second communication based at least on the unique session identifier contained therein; and cause provision of the first one of said plurality of advertising content elements to the IP-enabled client device via an IP transport.
 40. The network apparatus of claim 39, wherein the plurality of computerized instructions are further configured to, when executed, receive a third communication from the IP-enabled client device, the third communication comprising: (i) a second portion of the first information, the second portion of the first information relating to a second one of said plurality of advertising content elements, (ii) the unique session identifier, and (iii) a consumption-related value.
 41. The network apparatus of claim 40, wherein the consumption-related value is indicative of at least one of a quality or an amount of a then-current consumption of the complete advertisement by the IP-enabled client device.
 42. The network apparatus of claim 40, wherein the consumption-related value comprises a value related to an ID3 tag embedded in the plurality of advertising content elements. 