SYSTEM AND METHOD FOR A CONTENT FINGERPRINT FILTER

Information

  • Patent Application
  • 20100023499
  • Publication Number
    20100023499
  • Date Filed
    December 24, 2007
    16 years ago
  • Date Published
    January 28, 2010
    14 years ago
Abstract
A system and method for a content fingerprint filter. Various embodiments include receiving content and a preference from a user. The content is encoded without any available identifying information. A technical analysis of the encoded content is performed for one or more technical attributes. The available identifying information is paired with the one or more technical attributes to form a content fingerprint, where the content fingerprint identifies the content. The content fingerprint is combined with the preference to create a content fingerprint filter. The content fingerprint filter is used to filter pieces of available content, where each piece of available content has an associated content fingerprint. Other embodiments are described and claimed.
Description
BACKGROUND

The availability of digital content via an Internet Protocol (IP) connection provides a user with many options to choose from when the user is searching for content. Traditional content identification information may be associated with some of the available content to facilitate the user in searching for desirable content and/or filtering or blocking out undesirable content. Such content identification information may include meta-data tags, closed captioning, ratings, file information, Uniform Resource Locator (URL) links, and so forth.


The availability of the content identification information is typically dependent on the manual entry of this information by the content author or by a third party. Thus, much of the content that is available via an IP connection does not have associated identification information or the associated identification information is not correct. Here, the user will have to actually view or watch the content to understand the nature of the content.





BRIEF DESCRIPTION OF THE DRAWINGS


FIG. 1 illustrates one embodiment of a system.



FIG. 2 illustrates one embodiment of a logic flow.



FIG. 3 illustrates one embodiment of a system.



FIG. 4 illustrates one embodiment of a device.





DETAILED DESCRIPTION

Various embodiments may be generally directed to a system and method for a content fingerprint filter. Embodiments of the invention are directed to creating a filter from content and an indicated preference for the content (repel or attract, for example). In embodiments, the content and preference for the filter are provided by a user. Here, the provided content is put through a process to create an associated content fingerprint. The content fingerprint is then combined with the preference to create the content fingerprint filter.


In embodiments, the same process used to create the content fingerprint for the filter is also used to create fingerprints for other content available to the user. Since the filter and the other available content all have an associated fingerprint that was created via the same process, the filter may be used to provide a more meaningful search for the user through all available content.


In embodiments, the process for creating a fingerprint for content (for both the filter content and other available content) involves technically analyzing content for a variety of technical attributes or a tagged output that assist in content identification. The technical analysis of content may be performed by one or more of a variety of well known content analysis techniques including, but not limited to, facial recognition, voice pattern recognition, logo recognition, audio analysis, voice analysis, video attribute recognition, and so forth. The example content analysis techniques are provided for illustration purposes only and are not meant to limit the invention. In fact, any means of content analysis may be used by embodiments of the invention.


In embodiments, the various content analysis techniques are used to produce an encrypted packet of technical attributes. For each piece of content, its encrypted packet of technical attributes is paired with traditional content identification information (if available) to form a content fingerprint. The content fingerprint may then be used to assist in identifying the content. Other embodiments may be described and claimed.


Various embodiments may comprise one or more elements or components. An element may comprise any structure arranged to perform certain operations. Each element may be implemented as hardware, software, or any combination thereof, as desired for a given set of design parameters or performance constraints. Although an embodiment may be described with a limited number of elements in a certain topology by way of example, the embodiment may include more or less elements in alternate topologies as desired for a given implementation. It is worthy to note that any reference to “one embodiment” or “an embodiment” means that a particular feature, structure, or characteristic described in connection with the embodiment is included in at least one embodiment. The appearances of the phrase “in one embodiment” in various places in the specification are not necessarily all referring to the same embodiment.



FIG. 1 illustrates an embodiment of a system 100. Referring to FIG. 1, system 100 may comprise a content fingerprint module 102, an input device 112, a content fingerprint filter module 114 and a decoder 116. Module 102 may comprise a content encoder module 104, traditional content identification information storage 106, a content analyzer module 108 and content fingerprint storage 110. Each of these elements is described next in more detail.


In embodiments, content fingerprint module 102 is used to create fingerprints for provided content. Content may be provided to content fingerprint module 102 in a variety of ways. For example, content that is to be used to create a filter may be provided by a user via input device 112. Input device 112 may be any type of input device suited for a user to communicate with module 102. Content may be provided to module 102 via an IP connection, via a broadcast service, via another device connected to module 102 by a local area network (LAN), via a peer-to-peer (P2P) connection, and so forth.


Both filter content and other available content may be any type of content. Each piece of content may or may not have traditional content identification information associated with it. Specific examples of filter content may be a text keyword, a photograph or other image, and so forth. These examples are not meant to limit the invention. In embodiments, both filter content and other available content may be media information. Examples of media information may generally include any data or signals representing information meant for a user, such as voice information, video information, audio information, image information, textual information, numerical information, alphanumeric symbols, graphics, and so forth. The embodiments are not limited in this context.


In embodiments, content encoder module 104 is used to encode each piece of content. In embodiments, the encoded content does not include any available traditional content identification information. If one or more pieces of the content have traditional content identification information associated with it, then it may be stored in storage 106 for future access.


In embodiments, content encoder module 104 may include personal video recorder (PVR) functionality. PVR functionality records television data (i.e., requested content) in digital format (e.g., MPEG-1 or MPEG-2 formats) and stores the data in a hard drive or on a server, for example. The data may also be stored in a distributed manner such as on one or more connected devices throughout a home or office environment. In the case of digital media streams, the PVR functionality routes the previously encoded digital media stream to local storage. PVR functionality of module 104 may allow encoding of other types of data and other types of data may be added or substituted for those described as new types of data are developed. For example, content encoder module 104 may include the functionality to encode the content in such a way that technical analysis may be performed on the content. In embodiments, content may be viewed via a player (e.g., content fingerprint module 102) that is delivered via one or more of a variety of ways including, but not necessarily limited to, via web streaming, via downloading from an IP connection, a P2P connection, a Bluetooth connection, a wireless connection, and so forth.


In various embodiments, content analyzer module 108 performs a technical analysis of each piece of encoded content via one or more of the content analysis techniques described above (e.g., facial recognition, voice pattern recognition, logo recognition, audio analysis, voice analysis, video attribute recognition, and so forth). The technical analysis may result in a tagged output or one or more technical attributes for each piece of encoded content. Embodiments of the invention encrypt the technical attributes to form an encrypted packet of technical attributes. Here, each piece of encoded content has its own encrypted packet of technical attributes. The encryption of the technical attributes may be done for compression purposes. The encryption of the technical attributes may also be done for protection purposes so that the fingerprint cannot be altered or used by another not authorized to do so.


In embodiments, content analyzer module 108 performs the technical analysis on the pieces of content in a batched mode. In other embodiments, module 108 performs the technical analysis of the pieces of content in a real-time mode or in a mode that combines batched and real-time modes.


For each piece of encoded content, embodiments of content analyzer module 108 then pairs the encrypted packet of technical attributes with its traditional content identification information (if available) to form a content fingerprint. The content fingerprints may then be stored in content fingerprint storage 110.


The content fingerprint for the filter may then be provided to content fingerprint filter module 114. Filter module 114 may also receive the preference for the filter from content fingerprint module 102 or directly from input device 112. Filter module 114 may combine the content fingerprint and the preference to create the content fingerprint filter. Filter module 114 may provide the content fingerprint filter to decoder 116.


Decoder 116 may also receive other content fingerprints from module 102, each with their associated encoded content. Decoder 116 may be a media player, for example. Since the content fingerprint filter and the other available content all have an associated fingerprint that was created via the same process, decoder 116 may use the filter to provide a more meaningful search for the user through all available content.


As described above and in embodiments, a user may provide a preference for a filter. The preference may indicate “repel” or “attract”, for example. If the preference is repel, then the content fingerprint filter may be used to filter out content from the available content in which the user is not interested. If the preference is attract, then the content fingerprint filter may be used to include content from the available content in which the user is interested. The example preferences of repel and attract are for illustration purposes only and are not meant to limit the invention.


Note that although the functionality of system 100 is described herein as being separated into multiple elements or components, this is not meant to limit the invention. In fact, this functionality may be combined into less or more elements or components.


In various embodiments, system 100 may be implemented as a wireless system, a wired system, or a combination of both. When implemented as a wireless system, system 100 may include components and interfaces suitable for communicating over a wireless shared media, such as one or more antennas, transmitters, receivers, transceivers, amplifiers, filters, control logic, and so forth. An example of wireless shared media may include portions of a wireless spectrum, such as the RF spectrum and so forth. When implemented as a wired system, system 100 may include components and interfaces suitable for communicating over wired communications media, such as input/output (I/O) adapters, physical connectors to connect the I/O adapter with a corresponding wired communications medium, a network interface card (NIC), disc controller, video controller, audio controller, and so forth. Examples of wired communications media may include a wire, cable, metal leads, printed circuit board (PCB), backplane, switch fabric, semiconductor material, twisted-pair wire, co-axial cable, fiber optics, and so forth.


Operations for the embodiments described herein may be further described with reference to the following figures and accompanying examples. Some of the figures may include a logic flow. Although such figures presented herein may include a particular logic flow, it can be appreciated that the logic flow merely provides an example of how the general functionality as described herein can be implemented. Further, the given logic flow does not necessarily have to be executed in the order presented unless otherwise indicated. In addition, the given logic flow may be implemented by a hardware element, a software element executed by a processor, or any combination thereof. The embodiments, however, are not limited to the elements or in the context shown or described in the figures.



FIG. 2 illustrates one embodiment of a logic flow 200. As shown in logic flow 200, a user provides content and a preference to create a filter (block 201). The content is encoded with no identifying information (e.g., no traditional content identification information as described herein) (block 202). The encoded content is analyzed to produce technical attributes of the content. The technical attributes may then be encrypted to produce an encrypted packet (block 204). The encrypted packet and any available traditional content identification information are paired to form a content fingerprint (block 206). The preference and the content fingerprint are combined to create the content fingerprint filter (block 208). The content fingerprint filter is used to repel or attract other available content (block 210).



FIG. 3 illustrates an embodiment of a platform 302 (e.g., content fingerprint module 102 and/or content fingerprint filter module 114 from FIG. 1). In one embodiment, platform 302 may comprise or may be implemented as a media platform 302 such as the Viiv™ media platform made by Intel® Corporation.


In one embodiment, platform 302 may comprise a CPU 312, a chip set 313, one or more drivers 314, one or more network connections 315, an operating system 316, and/or one or more media center applications 317 comprising one or more software applications, for example. Platform 302 may also comprise storage 318 and content fingerprint/filter generation logic 320.


In one embodiment, CPU 312 may comprise one or more processors such as dual-core processors. Examples of dual-core processors include the Pentium® D processor and the Pentium® processor Extreme Edition both made by Intel® Corporation, which may be referred to as the Intel Core Duo® processors, for example.


In one embodiment, chip set 313 may comprise any one of or all of the Intel™ 945 Express Chipset family, the Intel® 955X Express Chipset, Intel® 975X Express Chipset family, plus ICH7-DH or ICH7-MDH controller hubs, which all are made by Intel® Corporation.


In one embodiment, drivers 314 may comprise the Quick Resume Technology Drivers made by Intel® to enable users to instantly turn on and off platform 302 like a television with the touch of a button after initial boot-up, when enabled, for example. In addition, chip set 313 may comprise hardware and/or software support for 5.1 surround sound audio and/or high definition 7.1 surround sound audio, for example. Drivers 314 may include a graphics driver for integrated graphics platforms. In one embodiment, the graphics driver may comprise a peripheral component interconnect (PCI) Express graphics card.


In one embodiment, network connections 315 may comprise the PRO/1000 PM or PRO/100 VE/VM network connection, both made by Intel® Corporation.


In one embodiment, operating system 316 may comprise the Windows® XP Media Center made by Microsoft® Corporation. In other embodiments, operating system 316 may comprise Linux®, as well as other types of operating systems. In one embodiment, one or more media center applications 317 may comprise a media shell to enable users to interact with a remote control from a distance of about 10-feet away from platform 302 or a display device, for example. In one embodiment, the media shell may be referred to as a “10-feet user interface,” for example. In addition, one or more media center applications 317 may comprise the Quick Resume Technology made by Intel®, which allows instant on/off functionality and may allow platform 302 to stream content to media adaptors when the platform appears to be turned “off.”


In one embodiment, storage 318 may comprise the Matrix Storage technology made by Intel® to increase the storage performance and provide enhanced protection for valuable digital media when multiple hard drives are included. In one embodiment, content fingerprint/filter generation logic 320 is used to enable the functionality of the invention as described herein. The embodiments, however, are not limited to the elements or in the context shown or described in FIG. 3.


Platform 302 may establish one or more logical or physical channels to communicate information. The information may include media information and control information. Media information may refer to any data representing content meant for a user. Examples of content may include, for example, data from a voice conversation, videoconference, streaming video, electronic mail (“email”) message, voice mail message, alphanumeric symbols, graphics, image, video, text and so forth. Data from a voice conversation may be, for example, speech information, silence periods, background noise, comfort noise, tones and so forth. Control information may refer to any data representing commands, instructions or control words meant for an automated system. For example, control information may be used to route media information through a system, or instruct a node to process the media information in a predetermined manner. The embodiments, however, are not limited to the elements or in the context shown or described in FIG. 3.



FIG. 4 illustrates one embodiment of a device 400 in which functionality of the present invention as described herein may be implemented. In one embodiment, for example, device 400 may comprise a communication system. In various embodiments, device 400 may comprise a processing system, computing system, mobile computing system, mobile computing device, mobile wireless device, computer, computer platform, computer system, computer sub-system, server, workstation, terminal, personal computer (PC), laptop computer, ultra-laptop computer, portable computer, handheld computer, personal digital assistant (PDA), cellular telephone, combination cellular telephone/PDA, smart phone, pager, one-way pager, two-way pager, messaging device, and so forth. The embodiments are not limited in this context.


In one embodiment, device 400 may be implemented as part of a wired communication system, a wireless communication system, or a combination of both. In one embodiment, for example, device 400 may be implemented as a mobile computing device having wireless capabilities. A mobile computing device may refer to any device having a processing system and a mobile power source or supply, such as one or more batteries, for example.


Examples of a mobile computing device may include a laptop computer, ultra-laptop computer, portable computer, handheld computer, palmtop computer, personal digital assistant (PDA), cellular telephone, combination cellular telephone/PDA, smart phone, pager, one-way pager, two-way pager, messaging device, data communication device, and so forth.


In one embodiment, for example, a mobile computing device may be implemented as a smart phone capable of executing computer applications, as well as voice communications and/or data communications. Although some embodiments may be described with a mobile computing device implemented as a smart phone by way of example, it may be appreciated that other embodiments may be implemented using other wireless mobile computing devices as well. The embodiments are not limited in this context.


As shown in FIG. 4, device 400 may comprise a housing 402, a display 404, an input/output (I/O) device 406, and an antenna 408. Device 400 also may comprise a five-way navigation button 412. I/O device 406 may comprise a suitable keyboard, a microphone, and/or a speaker, for example. Display 404 may comprise any suitable display unit for displaying information appropriate for a mobile computing device. I/O device 406 may comprise any suitable I/O device for entering information into a mobile computing device. Examples for I/O device 406 may include an alphanumeric keyboard, a numeric keypad, a touch pad, input keys, buttons, switches, rocker switches, voice recognition device and software, and so forth. Information also may be entered into device 400 by way of microphone. Such information may be digitized by a voice recognition device. The embodiments are not limited in this context.


Various embodiments may be implemented using hardware elements, software elements, or a combination of both. Examples of hardware elements may include processors, microprocessors, circuits, circuit elements (e.g., transistors, resistors, capacitors, inductors, and so forth), integrated circuits, application specific integrated circuits (ASIC), programmable logic devices (PLD), digital signal processors (DSP), field programmable gate array (FPGA), logic gates, registers, semiconductor device, chips, microchips, chip sets, and so forth. Examples of software may include software components, programs, applications, computer programs, application programs, system programs, machine programs, operating system software, middleware, firmware, software modules, routines, subroutines, functions, methods, procedures, software interfaces, application program interfaces (API), instruction sets, computing code, computer code, code segments, computer code segments, words, values, symbols, or any combination thereof. Determining whether an embodiment is implemented using hardware elements and/or software elements may vary in accordance with any number of factors, such as desired computational rate, power levels, heat tolerances, processing cycle budget, input data rates, output data rates, memory resources, data bus speeds and other design or performance constraints.


Some embodiments may be described using the expression “coupled” and “connected” along with their derivatives. These terms are not intended as synonyms for each other. For example, some embodiments may be described using the terms “connected” and/or “coupled” to indicate that two or more elements are in direct physical or electrical contact with each other. The term “coupled,” however, may also mean that two or more elements are not in direct contact with each other, but yet still co-operate or interact with each other.


Some embodiments may be implemented, for example, using a machine or tangible computer-readable medium or article which may store an instruction or a set of instructions that, if executed by a machine, may cause the machine to perform a method and/or operations in accordance with the embodiments. Such a machine may include, for example, any suitable processing platform, computing platform, computing device, processing device, computing system, processing system, computer, processor, or the like, and may be implemented using any suitable combination of hardware and/or software. The machine-readable medium or article may include, for example, any suitable type of memory unit, memory device, memory article, memory medium, storage device, storage article, storage medium and/or storage unit, for example, memory, removable or non-removable media, erasable or non-erasable media, writeable or re-writeable media, digital or analog media, hard disk, floppy disk, Compact Disk Read Only Memory (CD-ROM), Compact Disk Recordable (CD-R), Compact Disk Rewriteable (CD-RW), optical disk, magnetic media, magneto-optical media, removable memory cards or disks, various types of Digital Versatile Disk (DVD), a tape, a cassette, or the like. The instructions may include any suitable type of code, such as source code, compiled code, interpreted code, executable code, static code, dynamic code, encrypted code, and the like, implemented using any suitable high-level, low-level, object-oriented, visual, compiled and/or interpreted programming language.


Unless specifically stated otherwise, it may be appreciated that terms such as “processing,” “computing,” “calculating,” “determining,” or the like, refer to the action and/or processes of a computer or computing system, or similar electronic computing device, that manipulates and/or transforms data represented as physical quantities (e.g., electronic) within the computing system's registers and/or memories into other data similarly represented as physical quantities within the computing system's memories, registers or other such information storage, transmission or display devices. The embodiments are not limited in this context.


Numerous specific details have been set forth herein to provide a thorough understanding of the embodiments. It will be understood by those skilled in the art, however, that the embodiments may be practiced without these specific details. In other instances, well-known operations, components and circuits have not been described in detail so as not to obscure the embodiments. It can be appreciated that the specific structural and functional details disclosed herein may be representative and do not necessarily limit the scope of the embodiments.


Although the subject matter has been described in language specific to structural features and/or methodological acts, it is to be understood that the subject matter defined in the appended claims is not necessarily limited to the specific features or acts described above. Rather, the specific features and acts described above are disclosed as example forms of implementing the claims.

Claims
  • 1. A method, comprising: receiving content and a preference from a user;encoding the content without any available identifying information;performing a technical analysis of the encoded content for one or more technical attributes;pairing the available identifying information with the one or more technical attributes to form a content fingerprint, wherein the content fingerprint identifies the content; andcombining the content fingerprint and the preference to create a content fingerprint filter.
  • 2. The method of claim 1, wherein the preference is one of repel and attract.
  • 3. The method of claim 1, further comprising: using the content fingerprint filter to filter pieces of available content, wherein each piece of available content has an associated content fingerprint.
  • 4. The method of claim 3, further comprising: receiving each piece of available content via one of an Internet Protocol (IP) connection, a peer-to-peer (P2P) connection, a Bluetooth connection and a wireless connection.
  • 5. The method of claim 1, wherein the one or more technical attributes are encrypted to form an encrypted packet and the available identifying information is paired with the encrypted packet to form the content fingerprint.
  • 6. The method of claim 5, wherein the available identifying information includes at least one of meta-data tags, closed captioning, ratings, and a Uniform Resource Locator (URL) link.
  • 7. The method of claim 1, wherein the technical analysis involves at least one of facial recognition, voice pattern recognition, logo recognition, audio analysis, voice analysis and video attribute recognition.
  • 8. A system, comprising: a content fingerprint module to receive content and a preference from a user, wherein the content fingerprint module to encode content without any available identifying information, and wherein the content fingerprint module to perform a technical analysis of the encoded content for one or more technical attributes and to pair the available identifying information with the one or more technical attributes to form a content fingerprint, wherein the content fingerprint identifies the content; anda content fingerprint filter module to combine the preference and the content fingerprint to create a content fingerprint filter.
  • 9. The system of claim 8, wherein the preference is one of repel and attract.
  • 10. The system of claim 8, wherein the content fingerprint filter to be used to filter pieces of available content, wherein each piece of available content has an associated content fingerprint.
  • 11. The system of claim 10, wherein the content fingerprint module to receive each piece of available content via one of an Internet Protocol (IP) connection, a peer-to-peer (P2P) connection, a Bluetooth connection and a wireless connection.
  • 12. The system of claim 8, wherein the content fingerprint module to encrypt the one or more technical attributes to form an encrypted packet and to pair the available identifying information with the encrypted packet to form the content fingerprint.
  • 13. The system of claim 12, wherein the available identifying information includes at least one of meta-data tags, closed captioning, ratings, and a Uniform Resource Locator (URL) link.
  • 14. The system of claim 8, wherein the technical analysis involves at least one of facial recognition, voice pattern recognition, logo recognition, audio analysis, voice analysis and video attribute recognition.
  • 15. A machine-readable storage medium containing instructions which, when executed by a processing system, cause the processing system to perform a method, the method comprising: receiving content and a preference from a user;encoding the content without any available identifying information;performing a technical analysis of the encoded content for one or more technical attributes;pairing the available identifying information with the one or more technical attributes to form a content fingerprint, wherein the content fingerprint identifies the content; andcombining the content fingerprint and the preference to create a content fingerprint filter.
  • 16. The machine-readable storage medium of claim 15, wherein the preference is one of repel and attract.
  • 17. The machine-readable storage medium of claim 15, further comprising: using the content fingerprint filter to filter pieces of available content, wherein each piece of available content has an associated content fingerprint.
  • 18. The machine-readable storage medium of claim 17, further comprising: receiving each piece of available content via one of an Internet Protocol (IP) connection, a peer-to-peer (P2P) connection, a Bluetooth connection and a wireless connection.
  • 19. The machine-readable storage medium of claim 15, wherein the one or more technical attributes are encrypted to form an encrypted packet and the available identifying information is paired with the encrypted packet to form the content fingerprint.
  • 20. The machine-readable storage medium of claim 15, wherein the technical analysis involves at least one of facial recognition, voice pattern recognition, logo recognition, audio analysis, voice analysis and video attribute recognition.
CROSS-REFERENCE TO RELATED APPLICATIONS

This application is related to U.S. patent application Ser. No. ______, filed on ______, and entitled “System and Method for the Generation of a Content Fingerprint for Content Identification,” by inventors David A. Kroeger, et al. (Attorney Docket P26449).