Patents by Inventor Charles L. Compton
Charles L. Compton has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20220021930Abstract: A controller receives an encrypted media stream (“EMS”) and an identifier indicative of a selected content key from a headend. The EMS is encrypted with an encryption key and can be decrypted with a corresponding decryption key which is determinable from the selected content key. The controller receives indexes and content keys from the headend prior to receiving the EMS. Each index respectively corresponds to an identifier with one index corresponding to the identifier indicative of the selected content key. The content keys correspond to the indexes with one content key corresponding to the index corresponding to the identifier indicative of the selected content key. The controller selects the index corresponding to the identifier indicative of the selected content key upon receiving the EMS, determines the selected content key from the selected index, determines the decryption key from the selected content key, and decrypts the EMS with the decryption key.Type: ApplicationFiled: August 3, 2021Publication date: January 20, 2022Inventors: James William Fahrny, Charles L. Compton
-
Patent number: 11115709Abstract: A controller receives an encrypted media stream (“EMS”) and an identifier indicative of a selected content key from a headend. The EMS is encrypted with an encryption key and can be decrypted with a corresponding decryption key which is determinable from the selected content key. The controller receives indexes and content keys from the headend prior to receiving the EMS. Each index respectively corresponds to an identifier with one index corresponding to the identifier indicative of the selected content key. The content keys correspond to the indexes with one content key corresponding to the index corresponding to the identifier indicative of the selected content key. The controller selects the index corresponding to the identifier indicative of the selected content key upon receiving the EMS, determines the selected content key from the selected index, determines the decryption key from the selected content key, and decrypts the EMS with the decryption key.Type: GrantFiled: May 27, 2011Date of Patent: September 7, 2021Assignee: Comcast Cable Communications, LLCInventors: James William Fahrny, Charles L. Compton
-
Patent number: 10230799Abstract: Tokens and policy descriptors are used for dynamic on demand session management in a distributed and scalable architecture for on demand sessions and resource management. The architecture includes an on demand client, a purchase server, and a session manager. A purchase token is generated at the purchase server and assigned to the on demand client. The purchase token represents at least one requested asset. In response to an on demand session set-up request corresponding to the purchase token from the on demand client to the session manager, the purchase token is expanded to generate at least one dynamic policy management descriptor for the on demand session. This provides token-based purchase authorization and policy management for on demand services.Type: GrantFiled: July 15, 2013Date of Patent: March 12, 2019Assignee: Comcast Cable Communications, LLCInventors: Weidong Mao, Neville A. Black, Charles L. Compton
-
Publication number: 20180376175Abstract: A content storage method and system for use in a content distribution network are provided. A personal file locker is established on the network for a user. A content-storage-request database is established. The database tracks requests by the user for placing video programs into the user's file locker for personal use by the user. Upon the broadcasting of a video program for which there exists a request by the user to place the video program into the user's file locker, the requested video program is stored in the user's file locker. The stored video program is then made available to the user for viewing. Alternative approaches to content storage methods and systems are also described, including the use of a buffer enhancement to enable the performance of operations on “live” television.Type: ApplicationFiled: December 21, 2017Publication date: December 27, 2018Inventor: Charles L. Compton
-
Patent number: 10038642Abstract: A method of traffic regulation in a packet communication network involves a token bucket associated with a subscriber. Packets arriving at the regulator are handled in accordance with the token bucket configuration. The method involves measuring a demand placed on the network by the subscriber. The token bucket configuration is dynamically adjusted based on the demand. Another method of traffic regulation handles packets arriving at the regulator in accordance with first and second token bucket configurations. The first token bucket regulates packet rate while the second token bucket regulates data rate. Another method of traffic regulation involves handling packets in accordance with a token bucket configuration, where the amount of tokens to be removed is based on the amount of the flow and is further based on a classification of the flow. Packet-level devices for traffic regulation are also contemplated.Type: GrantFiled: March 21, 2016Date of Patent: July 31, 2018Assignee: Comcast Cable Communications, LLCInventors: Charles L. Compton, Richard M. Woundy, John G. Leddy
-
Patent number: 9888267Abstract: A content storage method and system for use in a content distribution network are provided. A personal file locker is established on the network for a user. A content-storage-request database is established. The database tracks requests by the user for placing video programs into the user's file locker for personal use by the user. Upon the broadcasting of a video program for which there exists a request by the user to place the video program into the user's file locker, the requested video program is stored in the user's file locker. The stored video program is then made available to the user for viewing. Alternative approaches to content storage methods and systems are also described, including the use of a buffer enhancement to enable the performance of operations on “live” television.Type: GrantFiled: January 28, 2014Date of Patent: February 6, 2018Assignee: Comcast Cable Communications, LLCInventor: Charles L. Compton
-
Publication number: 20170019340Abstract: A method of traffic regulation in a packet communication network involves a token bucket associated with a subscriber. Packets arriving at the regulator are handled in accordance with the token bucket configuration. The method involves measuring a demand placed on the network by the subscriber. The token bucket configuration is dynamically adjusted based on the demand. Another method of traffic regulation handles packets arriving at the regulator in accordance with first and second token bucket configurations. The first token bucket regulates packet rate while the second token bucket regulates data rate. Another method of traffic regulation involves handling packets in accordance with a token bucket configuration, where the amount of tokens to be removed is based on the amount of the flow and is further based on a classification of the flow. Packet-level devices for traffic regulation are also contemplated.Type: ApplicationFiled: March 21, 2016Publication date: January 19, 2017Inventors: Charles L. Compton, Richard M. Woundy, John G. Leddy
-
Patent number: 9325627Abstract: A method of traffic regulation in a packet communication network involves a token bucket associated with a subscriber. Packets arriving at the regulator are handled in accordance with the token bucket configuration. The method involves measuring a demand placed on the network by the subscriber. The token bucket configuration is dynamically adjusted based on the demand. Another method of traffic regulation handles packets arriving at the regulator in accordance with first and second token bucket configurations. The first token bucket regulates packet rate while the second token bucket regulates data rate. Another method of traffic regulation involves handling packets in accordance with a token bucket configuration, where the amount of tokens to be removed is based on the amount of the flow and is further based on a classification of the flow. Packet-level devices for traffic regulation are also contemplated.Type: GrantFiled: January 13, 2012Date of Patent: April 26, 2016Assignee: Comcast Cable Communications, LLCInventors: Charles L. Compton, Richard M. Woundy, John G. Leddy
-
Publication number: 20140143816Abstract: A content storage method and system for use in a content distribution network are provided. A personal file locker is established on the network for a user. A content-storage-request database is established. The database tracks requests by the user for placing video programs into the user's file locker for personal use by the user. Upon the broadcasting of a video program for which there exists a request by the user to place the video program into the user's file locker, the requested video program is stored in the user's file locker. The stored video program is then made available to the user for viewing. Alternative approaches to content storage methods and systems are also described, including the use of a buffer enhancement to enable the performance of operations on “live” television.Type: ApplicationFiled: January 28, 2014Publication date: May 22, 2014Applicant: Comcast Cable Holdings, LLCInventor: Charles L. Compton
-
Publication number: 20130304854Abstract: Tokens and policy descriptors are used for dynamic on demand session management in a distributed and scalable architecture for on demand sessions and resource management. The architecture includes an on demand client, a purchase server, and a session manager. A purchase token is generated at the purchase server and assigned to the on demand client. The purchase token represents at least one requested asset. In response to an on demand session set-up request corresponding to the purchase token from the on demand client to the session manager, the purchase token is expanded to generate at least one dynamic policy management descriptor for the on demand session. This provides token-based purchase authorization and policy management for on demand services.Type: ApplicationFiled: July 15, 2013Publication date: November 14, 2013Inventors: Weidong Mao, Neville A. Black, Charles L. Compton
-
Patent number: 8504715Abstract: Tokens and policy descriptors are used for dynamic on demand session management in a distributed and scalable architecture for on demand sessions and resource management. The architecture includes an on demand client, a purchase server, and a session manager. A purchase token is generated at the purchase server and assigned to the on demand client. The purchase token represents at least one requested asset. In response to an on demand session set-up request corresponding to the purchase token from the on demand client to the session manager, the purchase token is expanded to generate at least one dynamic policy management descriptor for the on demand session. This provides token-based purchase authorization and policy management for on demand services.Type: GrantFiled: August 23, 2012Date of Patent: August 6, 2013Assignee: Comcast Cable Holdings, LLCInventors: Weidong Mao, Neville A. Black, Charles L. Compton
-
Publication number: 20120324048Abstract: Tokens and policy descriptors are used for dynamic on demand session management in a distributed and scalable architecture for on demand sessions and resource management. The architecture includes an on demand client, a purchase server, and a session manager. A purchase token is generated at the purchase server and assigned to the on demand client. The purchase token represents at least one requested asset. In response to an on demand session set-up request corresponding to the purchase token from the on demand client to the session manager, the purchase token is expanded to generate at least one dynamic policy management descriptor for the on demand session. This provides token-based purchase authorization and policy management for on demand services.Type: ApplicationFiled: August 23, 2012Publication date: December 20, 2012Applicant: COMCAST CABLE HOLDINGS, LLCInventors: Weidong Mao, Neville A. Black, Charles L. Compton
-
Patent number: 8281024Abstract: Tokens and policy descriptors are used for dynamic on demand session management in a distributed and scalable architecture for on demand sessions and resource management. The architecture includes an on demand client, a purchase server, and a session manager. A purchase token is generated at the purchase server and assigned to the on demand client. The purchase token represents at least one requested asset. In response to an on demand session set-up request corresponding to the purchase token from the on demand client to the session manager, the purchase token is expanded to generate at least one dynamic policy management descriptor for the on demand session. This provides token-based purchase authorization and policy management for on demand services.Type: GrantFiled: January 3, 2012Date of Patent: October 2, 2012Assignee: Comcast Cable Holdings, LLCInventors: Weidong Mao, Neville A. Black, Charles L. Compton
-
Publication number: 20120176899Abstract: A method of traffic regulation in a packet communication network involves a token bucket associated with a subscriber. Packets arriving at the regulator are handled in accordance with the token bucket configuration. The method involves measuring a demand placed on the network by the subscriber. The token bucket configuration is dynamically adjusted based on the demand. Another method of traffic regulation handles packets arriving at the regulator in accordance with first and second token bucket configurations. The first token bucket regulates packet rate while the second token bucket regulates data rate. Another method of traffic regulation involves handling packets in accordance with a token bucket configuration, where the amount of tokens to be removed is based on the amount of the flow and is further based on a classification of the flow. Packet-level devices for traffic regulation are also contemplated.Type: ApplicationFiled: January 13, 2012Publication date: July 12, 2012Applicant: COMCAST CABLE HOLDINGS, LLCInventors: Charles L. Compton, Richard M. Woundy, John G. Leddy
-
Publication number: 20120110199Abstract: Tokens and policy descriptors are used for dynamic on demand session management in a distributed and scalable architecture for on demand sessions and resource management. The architecture includes an on demand client, a purchase server, and a session manager. A purchase token is generated at the purchase server and assigned to the on demand client. The purchase token represents at least one requested asset. In response to an on demand session set-up request corresponding to the purchase token from the on demand client to the session manager, the purchase token is expanded to generate at least one dynamic policy management descriptor for the on demand session. This provides token-based purchase authorization and policy management for on demand services.Type: ApplicationFiled: January 3, 2012Publication date: May 3, 2012Applicant: COMCAST CABLE HOLDINGS, LLCInventors: Weidong Mao, Neville A. Black, Charles L. Compton
-
Patent number: 8121033Abstract: A method of traffic regulation in a packet communication network involves a token bucket associated with a subscriber. Packets arriving at the regulator are handled in accordance with the token bucket configuration. The method involves measuring a demand placed on the network by the subscriber. The token bucket configuration is dynamically adjusted based on the demand. Another method of traffic regulation handles packets arriving at the regulator in accordance with first and second token bucket configurations. The first token bucket regulates packet rate while the second token bucket regulates data rate. Another method of traffic regulation involves handling packets in accordance with a token bucket configuration, where the amount of tokens to be removed is based on the amount of the flow and is further based on a classification of the flow. Packet-level devices for traffic regulation are also contemplated.Type: GrantFiled: September 19, 2007Date of Patent: February 21, 2012Assignee: Comcast Cable Holdings, LLCInventors: Charles L. Compton, Richard M. Woundy, John G. Leddy
-
Patent number: 8099508Abstract: Tokens and policy descriptors are used for dynamic on demand session management in a distributed and scalable architecture for on demand sessions and resource management. The architecture includes an on demand client, a purchase server, and a session manager. A purchase token is generated at the purchase server and assigned to the on demand client. The purchase token represents at least one requested asset. In response to an on demand session set-up request corresponding to the purchase token from the on demand client to the session manager, the purchase token is expanded to generate at least one dynamic policy management descriptor for the on demand session. This provides token-based purchase authorization and policy management for on demand services.Type: GrantFiled: December 16, 2005Date of Patent: January 17, 2012Assignee: Comcast Cable Holdings, LLCInventors: Weidong Mao, Neville A. Black, Charles L. Compton
-
Publication number: 20110228942Abstract: A controller receives an encrypted media stream (“EMS”) and an identifier indicative of a selected content key from a headend. The EMS is encrypted with an encryption key and can be decrypted with a corresponding decryption key which is determinable from the selected content key. The controller receives indexes and content keys from the headend prior to receiving the EMS. Each index respectively corresponds to an identifier with one index corresponding to the identifier indicative of the selected content key. The content keys correspond to the indexes with one content key corresponding to the index corresponding to the identifier indicative of the selected content key. The controller selects the index corresponding to the identifier indicative of the selected content key upon receiving the EMS, determines the selected content key from the selected index, determines the decryption key from the selected content key, and decrypts the EMS with the decryption key.Type: ApplicationFiled: May 27, 2011Publication date: September 22, 2011Applicant: COMCAST CABLE HOLDINGS, LLCInventors: James William Fahrny, Charles L. Compton
-
Patent number: 7970132Abstract: A controller receives an encrypted media stream (“EMS”) and an identifier indicative of a selected content key from a headend. The EMS is encrypted with an encryption key and can be decrypted with a corresponding decryption key which is determinable from the selected content key. The controller receives indexes and content keys from the headend prior to receiving the EMS. Each index respectively corresponds to an identifier with one index corresponding to the identifier indicative of the selected content key. The content keys correspond to the indexes with one content key corresponding to the index corresponding to the identifier indicative of the selected content key. The controller selects the index corresponding to the identifier indicative of the selected content key upon receiving the EMS, determines the selected content key from the selected index, determines the decryption key from the selected content key, and decrypts the EMS with the decryption key.Type: GrantFiled: October 21, 2008Date of Patent: June 28, 2011Assignee: Comcast Cable Holdings, LLCInventors: James William Fahrny, Charles L. Compton
-
Publication number: 20090052661Abstract: A controller receives an encrypted media stream (“EMS”) and an identifier indicative of a selected content key from a headend. The EMS is encrypted with an encryption key and can be decrypted with a corresponding decryption key which is determinable from the selected content key. The controller receives indexes and content keys from the headend prior to receiving the EMS. Each index respectively corresponds to an identifier with one index corresponding to the identifier indicative of the selected content key. The content keys correspond to the indexes with one content key corresponding to the index corresponding to the identifier indicative of the selected content key. The controller selects the index corresponding to the identifier indicative of the selected content key upon receiving the EMS, determines the selected content key from the selected index, determines the decryption key from the selected content key, and decrypts the EMS with the decryption key.Type: ApplicationFiled: October 21, 2008Publication date: February 26, 2009Applicant: COMCAST CABLE HOLDINGS, LLCInventors: James William Fahrny, Charles L. Compton