Abstract:
Media fragmentation may be provided. First, a request for a manifest may be received from a client. Then, in response to the received request for the manifest, the manifest may be sent to the client. Next, a request may be received from the client for a file fragment. The request may indicate a start time and an end time corresponding to the file fragment. The request may be in a format defined by the manifest. Then a lookup table may be queried for a first byte location in a media file corresponding to the start time and a second byte location in the media file corresponding to the end time. Next, a portion of the media file between the first byte location and the second byte location may be extracted from the media file. The portion may comprise the file fragment. The file fragment may be sent to the client.
Abstract:
A media experience policy engine includes three components: an information manager, a policy evaluator, and an enforcement module. The information manager collects information regarding the current state of a media delivery system, such as, for example, usage of a CPU, memory, hard disk, (I/O) interface, and a network. This collected data is then verified by the policy evaluator to see if resource contention is, or is close to, occurring. If so, existing or potential conflicts are dealt with by the enforcement module, which applies corrections, such as, for example, limiting the access of later chronologic users, or degrading the user experience of all users, in accordance with a desired policy in order to vitiate the resource contention and maintain a user experience consistent with the desired policy.
Abstract:
Protecting elementary stream media content is described. In one aspect, data segments within elementary stream media content are identified. Each data segment includes a single video or audio frame. Encryption boundaries for protecting the payload packets are selected to correspond to data segment boundaries. The elementary stream media content is then protected using the selected encryption boundaries.
Abstract:
Program code enabling the streaming of HD content in real-time to a game console is stored on a storage medium remote from the game console. The game console executes software that facilitates transfer of the program code from the remote storage medium to the game console. The program code ensures that sufficient bandwidth exists on a network between the game console and a HD tuner, and enables the streaming of HD content in real-time to the game console.
Abstract:
Protecting elementary stream media content is described. In one aspect, Media Access Units (MAUs) of elementary stream content are identified. Each MAU includes one or more data segments representing a single video or audio frame. Encryption boundaries are selected for each MAU. The encryption boundaries are based on one or more data segments associated with the respective MAU. Portions of each MAU are encrypted based on corresponding encryption boundaries. Each MAU is mapped to a MAU Payload Format. The MAU Payload Format allows a media consumer to process each elementary stream associated with the elementary stream content independent of any different elementary stream. The MAU Payload Format also allows a media consumer to process each MAU in an elementary stream independent of any other MAU.
Abstract:
A client device receives streaming content from a host device. The streaming content is placed in one or more buffers prior to processing. Monitoring as to the capacity and fullness of the buffers is performed at the client device and information is sent to the host device. The host device adjusts the rate or flow of the streaming content based on the information provided by the client device.