The present disclosure relates generally to downloadable media content and more particularly to conditional downloadable media content, wherein the location of the media content player and its connectivity to an available communication network is at least one condition affecting the media content to be downloaded.
Users of mobile communication devices {hereinafter referred to as “user(s)”} such as smartphones, tablet computers, media content players, and gaming devices, for example, have at their disposal ever increasing amounts of media content to download to their devices. Users have become accustomed to managing the amount of data and even scheduling of data download. However, users do not control the access to servers in every location that their mobile communication device may encounter. For example, there may be some locations during a business or vacation trip in which access to Wi-Fi location is either limited, costly, or non-existent. Notably, even within a large technologically sophisticated country like the United States of America, only seventy-six percent of airports offer free Wi-Fi. Locations outside of metropolitan areas, such as beach resorts, may not have either Wi-Fi or cellular coverage.
In addition, data handling by users can get complicated. For example, a user may decide to store his music and video files on his mobile communication device before traveling. However, such storage often requires synching the mobile communication device with an online database or a local personal computer or storage device. It should also be noted that the amount of storage required for high definition video and high quality audio files is increasing exponentially.
Recent trends include storing the large amounts of data in several offsite servers (i.e., “cloud-based computing”), and restricting or limiting a mobile communication device user's data usage. Should a user exceed a predetermined threshold, the user can be expected to pay an additional fee for the excess data usage. Furthermore, memory or storage capability may be cut because of increased cost, thus affecting applications that use the mobile communication device's onboard memory.
However, certain disadvantages can accompany cloud-based computing, including network overload and poor performance. Another disadvantage can be poor geographical coverage where the most up to date cellular or bandwidth coverage is absent. Currently, 4G technology such as long term evolution wireless (LTE) is replacing 3G technology; yet 4G is not ubiquitous and the need for high-speed data services remains great. Users now expect rapid data transmission and reception.
One final disadvantage may be simply that physical space associated with any one server per user may be limited in order to meet the demands of everyone with a mobile communication device (now estimate to be in the hundreds of millions at a minimum). Likely, the use of extra data space will cost the user additional fees.
Accordingly, there is a need for a method to use location to present desirable and conditional media content.
The accompanying figures, where like reference numerals refer to identical or functionally similar elements throughout the separate views, together with the detailed description below, are incorporated in and form part of the specification, and serve to further illustrate embodiments of concepts that include the claimed invention, and explain various principles and advantages of those embodiments.
Skilled artisans will appreciate that elements in the figures are illustrated for simplicity and clarity and have not necessarily been drawn to scale. For example, the dimensions of some of the elements in the figures may be exaggerated relative to other elements to help to improve understanding of embodiments of the present invention.
The apparatus and method components have been represented where appropriate by conventional symbols in the drawings, showing only those specific details that are pertinent to understanding the embodiments of the present invention so as not to obscure the disclosure with details that will be readily apparent to those of ordinary skill in the art having the benefit of the description herein.
Described herein is a method to present desirable consumable media content for a mobile communication device during the occurrence of a likely future out of data network coverage condition. An itinerary that corresponds to the mobile communication device and its user is determined for example by analyzing calendar or email content. Thereafter, a future period of availability is determined, for a primary data network that is associated with the mobile communication device, by analyzing likely occurrence of an out of data network coverage condition based on the itinerary corresponding to the mobile communication device. Prior to the occurrence of the out of data network coverage condition: the method will calculate the amount and type of downloadable consumable media content that the mobile communication device will present for use during occurrence of the out of data network coverage condition. In addition, the method downloads the consumable media content for consumption (by the user of the mobile communication device) or presentation via the mobile communication device. The amount of media content downloaded is related to the determined future period of out of data network coverage of the primary data network associated with the mobile communication device.
User interface 130 shown in
The communication device (not shown) in which system 100 can be employed inside of or communicatively connected to can be a smartphone, a set-top box (i.e., cable/satellite capable), a personal digital assistant, a music player, tablet computing device, gaming device, mobile phone, portable computer, and various other similar electronic communication devices that are either wired or wireless.
Operation 250 preliminarily estimates length of time the device is out of network coverage by first analyzing calendar, email, social network information in operation 260. Clearly, additional sources of information can be assessed as well, including recent purchase information (e.g., tickets, clothes for a non-local climate, luggage, books, music, pet shelter-care), for example. Likewise, operation 265 can provide out of network coverage information by analyzing data of past routes traveled and the associated time for traveling the past routes, and previous history of time out of network. Notably, operations 260, 265 can be combined or performed separately depending on the efficacy of the derived information.
Upon completion of operations 260, 265, operation 270 finalizes the estimated length of time the device is out of primary network coverage. The final estimation can be used in another method or process to determine amount of downloadable media content the communication device will need or require while operating outside of the primary network coverage area.
Operation 330 searches or analyzes other network options that will enable the download of the media content in operation 320. One criteria for selecting another or second network can be the cost to the user of the communication device. Another criteria can be the cost to the network itself in its capacity to handle the data traffic associated with the downloading of the media content. Operation 340 directs the communication device to receive or download the media content. The download rate can be controlled and the download can be structured to occur automatically.
Thereafter, operation 350 notifies the user of the communication device that the media content is available and presents the media content for the user's consumption. That is video related media content is displayed or presented on the communication device or presented via the communication device to an external display, such as a high-definition display or monitor. Likewise, audio related media content is played through speakers of the communication device or via the communication device to external speakers.
A user may choose to implement one or more preferences for the selection of media content. In one embodiment, the user selects downloadable media content based on size of the data packet. For example, a cross-country airplane trip can require a different sized data packet than a cross-country train ride. For example, one data packet may have more individual songs than another data packet. In a second embodiment, the user can prioritize the downloadable media content to be presented according to whether the media content was recently purchased versus a regular selection by the user. In addition, a user may select subscription-based media content over media content already owned because the subscription-based media content may be more current.
In another embodiment, a user may choose to pre-load certain websites as downloadable media content because he usually surfs the web-sites as part of his daily routine. In contrast, another embodiment offers a user a “concierge” service in that the communication device is provided with suggested downloadable media content that may reflect the user's interest in politics, entertainment, history, geography, and sports, for example. This “concierge” service can be coupled with travel to one or more destinations by the user so that the user has at his disposal advance knowledge, trivia, and tidbits of the local region and its cultural interests.
The selections shown in user interface 460 can be stored in memory permanently or temporally. If stored temporally, the media content can be “flushed” once the communication device has returned to the primary network data coverage. The flushing of the memory can also occur once a predefined time period has passed as well. The flushing of the memory can also occur once the downloadable media content has been consumed once or a predetermined # of times.
Wireless networks operate by transmitting signals from a base to the wireless device using a predetermined protocol. If the device is close enough to the base to transfer data, the device is within the data network coverage. If the device is too far from a base to transfer signals, the device is out of network coverage.
Data such as websites and content that can be transferred to the device is downloadable. When the device is receiving data, the process is commonly referred to “downloading”.
Data may be stored on or within the device's memory location. Eventually the data maybe old and no longer useful for consumption by the device's user or presentable for the device, or the data may have been consumed and maybe no longer desired. In this event, the data takes up valuable space in the memory and should preferably be flushed or deleted from the memory. The cells in the memory may be marked as free and new information may overwrite data no longer needed. The cells may also be overwritten immediately with fixed or random patterns of bits.
In the foregoing specification, specific embodiments have been described. However, one of ordinary skill in the art appreciates that various modifications and changes can be made without departing from the scope of the invention as set forth in the claims below. Accordingly, the specification and figures are to be regarded in an illustrative rather than a restrictive sense, and all such modifications are intended to be included within the scope of present teachings.
The benefits, advantages, solutions to problems, and any element(s) that may cause any benefit, advantage, or solution to occur or become more pronounced are not to be construed as a critical, required, or essential features or elements of any or all the claims. The invention is defined solely by the appended claims including any amendments made during the pendency of this application and all equivalents of those claims as issued.
Moreover in this document, relational terms such as first and second, top and bottom, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. The terms “comprises,” “comprising,” “has”, “having,” “includes”, “including,” “contains”, “containing” or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises, has, includes, contains a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. An element proceeded by “comprises . . . a”, “has . . . a”, “includes . . . a”, “contains . . . a” does not, without more constraints, preclude the existence of additional identical elements in the process, method, article, or apparatus that comprises, has, includes, contains the element. The terms “a” and “an” are defined as one or more unless explicitly stated otherwise herein. The terms “substantially”, “essentially”, “approximately”, “about” or any other version thereof, are defined as being close to as understood by one of ordinary skill in the art, and in one non-limiting embodiment the term is defined to be within 10%, in another embodiment within 5%, in another embodiment within 1% and in another embodiment within 0.5%. The term “coupled” as used herein is defined as connected, although not necessarily directly and not necessarily mechanically. A device or structure that is “configured” in a certain way is configured in at least that way, but may also be configured in ways that are not listed.
Techniques and technologies may be described herein in terms of functional and/or logical block components, and with reference to symbolic representations of operations, processing tasks, and functions that may be performed by various computing components or devices. Such operations, tasks, and functions are sometimes referred to as being computer executed, computerized, software implemented, or computer implemented. In addition these operations are often handled as non-transitory instructions.
In practice, one or more processor devices can carry out the described operations, instructions, tasks, and functions; and the various block components shown in the figures herein may be realized by any number of hardware, software, and/or firmware components configured to perform the specified functions. For example, an embodiment of a system or a component may employ various integrated circuit components, including memory storage elements, digital signal processing elements, logic elements, look up tables, or the like, which may carry out a variety of functions under the control of one or more microprocessors or other equivalent control devices.
For the sake of brevity, conventional techniques related to signal processing, data transmission, signaling, network control, computer architecture, and other functional aspects of the systems (and one or more individual operating components of the systems) may not be described in detail herein. Furthermore, the connecting lines shown in the various figures contained herein are intended to represent exemplary functional relationships as well as possible physical couplings between the various elements. It should be noted that many alternative or additional functional relationships or physical connections may be present in an embodiment of the subject matter.
It will be appreciated that some embodiments may be comprised of one or more generic or specialized processors (or “processing devices”) such as microprocessors, digital signal processors, customized processors and field programmable gate arrays (FPGAs) and unique stored program instructions (including both software and firmware) that control the one or more processors to implement, in conjunction with certain non-processor circuits, some, most, or all of the functions of the method and/or apparatus described herein. Alternatively, some or all functions could be implemented by a state machine that has no stored program instructions, or in one or more application specific integrated circuits (ASICs), in which each function or some combinations of certain of the functions are implemented as custom logic. Of course, a combination of the two approaches could be used.
Moreover, an embodiment can be implemented as a computer-readable storage medium having computer readable code stored thereon for programming a computer (e.g., comprising a processor) to perform a method as described and claimed herein. Likewise, computer-readable storage medium can comprise a non-transitory machine readable storage device, having stored thereon a computer program that include a plurality of code sections for performing operations, steps, or a set of instructions.
Examples of such computer-readable storage mediums include, but are not limited to, a hard disk, a CD-ROM, an optical storage device, a magnetic storage device, a ROM (Read Only Memory), a PROM (Programmable Read Only Memory), an EPROM (Erasable Programmable Read Only Memory), an EEPROM (Electrically Erasable Programmable Read Only Memory) and a Flash memory. Further, it is expected that one of ordinary skill, notwithstanding possibly significant effort and many design choices motivated by, for example, available time, current technology, and economic considerations, when guided by the concepts and principles disclosed herein will be readily capable of generating such software instructions and programs and ICs with minimal experimentation.