Detecting segments of a video program through image comparisons

    公开(公告)号:US10452919B2

    公开(公告)日:2019-10-22

    申请号:US15669949

    申请日:2017-08-06

    Applicant: NETFLIX, INC.

    Abstract: In an embodiment, a data store storing a first image and a second image; a computer processor coupled to the data store and programmed to: generate a first fingerprint of the first image based on a first plurality of pixels from the first image stored in the data store; generate a second fingerprint of the second image based on a second plurality of pixels from the second image stored in the data store; determine a closeness value between the first fingerprint and the second fingerprint; determine, based on the closeness value, whether the first image matches the second image.

    Web server constraint support
    243.
    发明授权

    公开(公告)号:US10425500B2

    公开(公告)日:2019-09-24

    申请号:US15130679

    申请日:2016-04-15

    Applicant: Netflix, Inc.

    Abstract: Techniques are disclosed for a web server to support constraints specified by a client. In one embodiment, the web server receives, from the client, a request for one or more blocks of data. The request includes one or more constraints provided by the client. The web server may perform an action responsive to an increase in network congestion, based on the one or more constraints. Accordingly, the web server may handle the request in a manner that more closely meets the needs of the client.

    Systems and methods for fraudulent account detection and management

    公开(公告)号:US10332116B2

    公开(公告)日:2019-06-25

    申请号:US14876613

    申请日:2015-10-06

    Applicant: NETFLIX, INC.

    Abstract: Provided herein are systems and methods of monitoring account activity in a streaming media environment. An exemplary system includes a monitoring system, an account creation and management system, and an account payment system. The monitoring system is coupled to the account creation and management system and the account payment system via a network. The processing device of the monitoring system retrieves account information for a first user account. Account information includes user consumption information and user payment information associated with the first user account. The processing device determines a fraudulent account score for the first user account based on at least one of the user consumption information, the user payment information, and account identification information. When the fraudulent account score exceeds an upper threshold, the processing device automatically deletes the first user account from at least one of the account creation and management system and the accounts payment system.

    Techniques for detecting media playback errors

    公开(公告)号:US10306270B2

    公开(公告)日:2019-05-28

    申请号:US15633661

    申请日:2017-06-26

    Applicant: NETFLIX, Inc.

    Abstract: An endpoint device outputs frames of test media during a testing procedure. Each frame of test media includes a test pattern. A test module coupled to the endpoint device samples the test pattern and transmits sample data to a media test engine. The media test engine decodes a binary number from the test pattern and then converts the binary number to an integer value that is associated with the corresponding frame. The media test engine then analyzes sequences of these integer values to identify playback errors associated with the endpoint device.

    Synthetic supernet compression
    246.
    发明授权

    公开(公告)号:US10263890B2

    公开(公告)日:2019-04-16

    申请号:US15237541

    申请日:2016-08-15

    Applicant: Netflix, Inc.

    Inventor: David Bannister

    Abstract: One embodiment of the present invention sets forth a technique for compressing a forwarding table. The technique includes selecting, from a listing of network prefixes, a plurality of network prefixes that are within a range of a subnet. The technique further includes sorting the plurality of network prefixes to generate one or more subgroups of network prefixes and selecting a first subgroup of network prefixes included in the one or more subgroups of network prefixes. The technique further includes generating a synthetic supernet based on the first subgroup of network prefixes.

    Managing content on an ISP cache
    247.
    发明授权

    公开(公告)号:US10182090B2

    公开(公告)日:2019-01-15

    申请号:US14846723

    申请日:2015-09-04

    Applicant: NETFLIX, Inc

    Abstract: One embodiment of the present invention sets forth a method for updating content stored in a cache residing at an internet service provider (ISP) location that includes receiving popularity data associated with a first plurality of content assets, where the popularity data indicate the popularity of each content asset in the first plurality of content assets across a user base that spans multiple geographic regions, generating a manifest that includes a second plurality of content assets based on the popularity data and a geographic location associated with the cache, where each content asset included in the manifest is determined to be popular among users proximate to the geographic location or users with preferences similar to users proximate to the geographic location, and transmitting the manifest to the cache, where the cache is configured to update one or more content assets stored in the cache based on the manifest.

    Gaussian ranking using matrix factorization

    公开(公告)号:US10180968B2

    公开(公告)日:2019-01-15

    申请号:US15044020

    申请日:2016-02-15

    Applicant: NETFLIX, INC.

    Inventor: Harald Steck

    Abstract: In one embodiment of the present invention, a training engine teaches a matrix factorization model to rank items for users based on implicit feedback data and a rank loss function. In operation, the training engine approximates a distribution of scores to corresponding ranks as an approximately Gaussian distribution. Based on this distribution, the training engine selects an activation function that smoothly maps between scores and ranks. To train the matrix factorization model, the training engine directly optimizes the rank loss function based on the activation function and implicit feedback data. By contrast, conventional training engines that optimize approximations of the rank loss function are typically less efficient and produce less accurate ranking models.

    Server selection for content distribution

    公开(公告)号:US09998354B2

    公开(公告)日:2018-06-12

    申请号:US14289552

    申请日:2014-05-28

    Applicant: Netflix, Inc.

    Abstract: In an embodiment, a method comprises receiving a first routing table of a first server computer; receiving a second routing table of a second server computer; receiving a request, from a client computer, for information about content servers that hold a media item title, wherein the request includes a client internet protocol address of the client computer; estimating that the first server computer is closer to the client computer than the second server computer is to the client computer based, at least in part, on the client internet protocol address, the first routing table, and the second routing table; sending, to the client computer, a first address to the client computer based, at least in part, on estimating that the first server computer is closer to the client computer than the second server computer, wherein the first address identifies the media item title stored on the first server computer.

    Distributed traffic management system and techniques

    公开(公告)号:US09954822B2

    公开(公告)日:2018-04-24

    申请号:US15471254

    申请日:2017-03-28

    Applicant: Netflix, Inc.

    Abstract: Approaches, techniques, and mechanisms are disclosed for implementing a distributed firewall. In an embodiment, many different computer assets police incoming messages based on local policy data. This local policy data is synchronized with global policy data. The global policy data is generated by one or more separate analyzers. Each analyzer has access to message logs, or information derived therefrom, for groups of computer assets, and is thus able to generate policies based on intelligence from an entire group as opposed to an isolated asset. Among other effects, some of the approaches, techniques, and mechanisms may be effective even in computing environments with limited supervision over the attack surface, and/or computing environments in which assets may need to make independent decisions with respect to how incoming messages should be handled, on account of latency and/or unreliability in connections to other system components.

Patent Agency Ranking