-
公开(公告)号:US09817827B2
公开(公告)日:2017-11-14
申请号:US13644318
申请日:2012-10-04
Applicant: NETFLIX Inc.
Inventor: Carlos Gomez Uribe , Mohammad Sabah , Vijay Bharadwaj , Sasi Parthasarathy , Siddharth Angrish
CPC classification number: G06F17/30029
Abstract: Techniques are described for determining relationships between user activities and determining search results and content recommendations based on the relationships. A plays-related-to-searches application may determine a relationship score between plays of a media title and searches of a query by determining a distance between a projection of the search onto the space of the users and a projection of plays of the media title onto the space of the users. A plays-after-searches application may determine a score for plays of the streaming media title given the search by multiplying a number of times plays of the media title occur after the query is entered by the number of times any play occurs, and dividing by a product of the number of times plays of the media title occur after any query is entered and the number of times plays of any media title occur after the query is entered.
-
公开(公告)号:US20170272509A1
公开(公告)日:2017-09-21
申请号:US15613801
申请日:2017-06-05
Applicant: NETFLIX, INC.
Inventor: Neil D. HUNT , Stephan G. BETZ
CPC classification number: H04L67/10 , G06F9/448 , G06F9/454 , G06F9/45533 , G06F17/289 , H04N21/25808 , H04N21/25891
Abstract: One embodiment of the present invention sets forth a technique for providing a variation of digital content that is based on a client-specified context token. Localized digital assets, e.g., graphics resources, video resource, audio resources, and text string resources, are stored as a collection of records and are dynamically linked to a assemble a software system based on the client-specified context token to generate the variation of digital content. The client receives the assembled variation of the digital content including the localized digital assets specified by the client-provided context.
-
公开(公告)号:US09767291B2
公开(公告)日:2017-09-19
申请号:US14876354
申请日:2015-10-06
Applicant: NETFLIX, INC.
Inventor: Andy Hoernecke , Jason Chan
CPC classification number: G06F21/577 , G06F11/3688 , G06Q10/0635 , G06Q10/10
Abstract: Provided herein are systems and methods for monitoring and assessing the security and risk presented by applications deployed in a complex computing environment. An exemplary application security system includes a server having a processing device in communication with storage systems, computing devices executing application instances configured to receive and transmit information over a network, and a security testing system including a first test module that is associated with a first application, which is associated with one or more of the application instances. The processing device of the server retrieves information about the first application, including current dependency information of the first application, calculates a security risk score for the first application based on the information, determines a security priority level associated with first application, and associates the security priority level of the first application with the first application in a database of application security information.
-
公开(公告)号:US09727788B2
公开(公告)日:2017-08-08
申请号:US15228143
申请日:2016-08-04
Applicant: Netflix, Inc.
Inventor: Apurvakumar Kansara
IPC: G06K9/00 , G11B27/00 , G11B27/34 , G06K9/46 , H04N21/234 , H04N21/458 , H04N21/6547
CPC classification number: G06K9/00744 , G06K9/00758 , G06K9/4652 , G11B27/005 , G11B27/34 , H04N21/23418 , H04N21/458 , H04N21/6547
Abstract: In an embodiment, a data store storing a first image and a second image; a computer processor coupled to the data store and programmed to: generate a first fingerprint of the first image based on a first plurality of pixels from the first image stored in the data store; generate a second fingerprint of the second image based on a second plurality of pixels from the second image stored in the data store; determine a closeness value between the first fingerprint and the second fingerprint; determine, based on the closeness value, whether the first image matches the second image.
-
公开(公告)号:US20170207911A1
公开(公告)日:2017-07-20
申请号:US15476931
申请日:2017-03-31
Applicant: NETFLIX, INC.
Inventor: Poornaprajna UDUPI , Jason CHAN , Jay ZARFOSS
IPC: H04L9/08
CPC classification number: H04L63/0435 , H04L9/0822 , H04L9/0825 , H04L9/0827 , H04L9/083 , H04L9/0844 , H04L9/088 , H04L9/0891 , H04L9/0894 , H04L63/0428 , H04L63/0442 , H04L63/062 , H04L63/08
Abstract: Embodiments provide techniques generating and managing encryption keys within a computing infrastructure. Embodiments provide a key publisher that generates and maintains key pairs in a list at a configurable interval. In addition, the key publisher publishes the list to other components within the computing infrastructure. Embodiments also provide a key consumer that downloads the list of encrypted key pairs and maintains an active window of keys to can be accepted from client devices that communicate sensitive data to the computing infrastructure. If the key consumer receives a key from a client device that is outside of the active window yet that corresponds to a future key pair in the list, the key consumer advances the active window towards the future key pair.
-
646.
公开(公告)号:US20170206140A1
公开(公告)日:2017-07-20
申请号:US15476926
申请日:2017-03-31
Applicant: NETFLIX, INC.
Inventor: Charles SMITH , Jeffrey Magnusson , Siddharth Anand
CPC classification number: G06F11/1446 , G06F11/1662 , G06F11/2094 , G06F16/2308 , G06F16/2358 , G06F16/2474 , G06F16/2477 , G06F2201/80 , G06F2201/82 , G06F2201/835 , G06F2201/84
Abstract: A method and system for building a point-in-time snapshot of an eventually-consistent data store. The data store includes key-value pairs stored on a plurality of storage nodes. In one embodiment, the data store is implemented as an Apache® Cassandra database running in the “cloud.” The data store includes a journaling mechanism that stores journals (i.e., inconsistent snapshots) of the data store on each node at various intervals. In Cassandra, these snapshots are sorted string tables that may be copied to a back-up storage location. A cluster of processing nodes may retrieve and resolve the inconsistent snapshots to generate a point-in-time snapshot of the data store corresponding to a lagging consistency point. In addition, the point-in-time snapshot may be updated as any new inconsistent snapshots are generated by the data store such that the lagging consistency point associated with the updated point-in-time snapshot is more recent.
-
公开(公告)号:US09680906B2
公开(公告)日:2017-06-13
申请号:US14584174
申请日:2014-12-29
Applicant: NETFLIX, INC.
Inventor: Gregory S. Orzell , John Funge , David Chen
Abstract: Techniques are described for detecting faults in media content based on the behavior of users viewing the media content. Embodiments stream a first instance of media content to one or more users. The behavior of the one or more users is monitored while the users are viewing the streaming first instance of media content. Embodiments then determine whether the first instance of media content is faulty, based on the monitored behavior of the one or more users.
-
648.
公开(公告)号:US20170163556A1
公开(公告)日:2017-06-08
申请号:US15437407
申请日:2017-02-20
Applicant: NETFLIX, INC.
Inventor: Ariel TSEITLIN , Praveen SADHU
IPC: H04L12/917 , H04L29/08
Abstract: Techniques are disclosed for reclaiming resources within a distributed computing system. A reclamation application searches the distributed computing architecture for unused resources, classifies the unused resources, and determines an expiration period based on the classification. The reclamation application determines a candidate owner of the resource based on one or more characteristics of the resource. The reclamation application then notifies the candidate owner that the resource is to be reclaimed unless claimed by the candidate owner within the expiration period. If the candidate owner claims the resource within the expiration period, then the reclamation application terminates the reclamation of the resource. If the candidate owner does not claim the resource within the expiration period, then the reclamation application reclaims the resource after the duration of the expiration period. Advantageously, this approach to reclaiming resources results in more efficient utilization of resources, lower operation and maintenance costs, and improved system security.
-
649.
公开(公告)号:US20170118110A1
公开(公告)日:2017-04-27
申请号:US14922101
申请日:2015-10-23
Applicant: NETFLIX, INC.
Inventor: Michael Lloyd Cohen
IPC: H04L12/717 , G06F9/445 , H04L29/06
CPC classification number: H04L45/42 , G06F8/65 , G06F11/368 , H04L67/42
Abstract: In one embodiment of the present invention, a sticky canary router routes each request associated with a service to either a canary cluster of servers that implement a modification to the service or a baseline cluster of servers that do not implement the modification. The sticky canary router implements a mapping algorithm that determines the routing of each request based on a current time, a time window for the routing, and a characteristic of the request. Notably, the mapping algorithm may be implemented such that, for time segments with duration equal to the time window, the sticky canary router routes all requests received from a particular device in a consistent fashion—either to the canary cluster or to a baseline cluster. Configured thusly, the sticky canary router enables the analysis of approximately full sections of client interactions with the canary servers, thereby facilitating identification of client-side effects of the changes.
-
公开(公告)号:US09621588B2
公开(公告)日:2017-04-11
申请号:US14495631
申请日:2014-09-24
Applicant: Netflix, Inc.
Inventor: Jason Chan , Poornaprajna Udupi , Shashi Madappa
CPC classification number: H04L63/0245 , G06F17/30312 , H04L63/0218 , H04L63/0227 , H04L63/1408 , H04L63/20 , H04L67/10
Abstract: Approaches, techniques, and mechanisms are disclosed for implementing a distributed firewall. In an embodiment, many different computer assets police incoming messages based on local policy data. This local policy data is synchronized with global policy data. The global policy data is generated by one or more separate analyzers. Each analyzer has access to message logs, or information derived therefrom, for groups of computer assets, and is thus able to generate policies based on intelligence from an entire group as opposed to an isolated asset. Among other effects, some of the approaches, techniques, and mechanisms may be effective even in computing environments with limited supervision over the attack surface, and/or computing environments in which assets may need to make independent decisions with respect to how incoming messages should be handled, on account of latency and/or unreliability in connections to other system components.
-
-
-
-
-
-
-
-
-