Methods and apparatus to identify media distributed via a network
First Claim
1. A method for monitoring a media device, the method comprising:
- extracting, by executing an instruction via a processor, first network packet parameters from a first network packet received at a media device when retrieving a first encrypted web page;
storing, at the media device, the first network packet parameters in association with a uniform resource locator for the first encrypted web page, the uniform resource locator received from an extension in a web browser at the media device;
extracting, by executing an instruction via the processor, second network packet parameters from a second network packet received at the media device from an unknown encrypted web page;
when the extension is inoperative, comparing, by executing an instruction via the processor, the second network packet parameters to the first network packet parameters; and
identifying, by executing an instruction via the processor, the unknown encrypted web page as the first encrypted web page when the comparison of the second network packet parameters to the first network packet parameters has a similarity above a threshold.
8 Assignments
0 Petitions
Accused Products
Abstract
Methods, apparatus, systems and articles of manufacture to monitor media presentations are disclosed. An example method includes extracting first network packet parameters from a first network packet received at a media device when retrieving a first encrypted web page, storing, at the media device, the first network packet parameters in association with a uniform resource locator for the first encrypted web page, the uniform resource locator received from an extension in a web browser at the media device, extracting second network packet parameters from a second network packet received at the media device from an unknown encrypted web page, when the extension is inoperative, comparing the second network packet parameters to the first network packet parameters, and identifying the unknown encrypted web page as the first encrypted web page when the comparison of the second network packet to the first network packet parameters has a similarity above a threshold.
-
Citations
42 Claims
-
1. A method for monitoring a media device, the method comprising:
-
extracting, by executing an instruction via a processor, first network packet parameters from a first network packet received at a media device when retrieving a first encrypted web page; storing, at the media device, the first network packet parameters in association with a uniform resource locator for the first encrypted web page, the uniform resource locator received from an extension in a web browser at the media device; extracting, by executing an instruction via the processor, second network packet parameters from a second network packet received at the media device from an unknown encrypted web page; when the extension is inoperative, comparing, by executing an instruction via the processor, the second network packet parameters to the first network packet parameters; and identifying, by executing an instruction via the processor, the unknown encrypted web page as the first encrypted web page when the comparison of the second network packet parameters to the first network packet parameters has a similarity above a threshold. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. An apparatus:
-
a parameter extractor to extract first network packet parameters from a first network packet received at a media device in connection with accessing a first encrypted web page, to store the first network packet parameters in association with a uniform resource locator for the first encrypted web page, the uniform resource locator received from an extension in a web browser at the media device, and to extract second network packet parameters from a second network packet received at the media device from an unknown encrypted web page; and an identifier to, when the extension is inoperative, compare the second network packet parameters to the first network packet parameters and identify the unknown encrypted web page as the first encrypted web page when the comparison of the second network packet parameters to the first network packet parameters has a similarity above a threshold. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28)
-
-
29. A tangible computer readable storage medium comprising instructions that, when executed, cause a media device to at least:
-
extract first network packet parameters from a first network packet when retrieving a first encrypted web page; store the first network packet parameters in association with a uniform resource locator for the first encrypted web page, the uniform resource locator received from an extension in a web browser at the media device; extract second network packet parameters from a second network packet received at the media device from an unknown encrypted web page; when the extension is inoperative, compare the second network packet parameters to the first network packet parameters; and identify the unknown encrypted web page as the first encrypted web page when the comparison of the second network packet parameters to the first network packets parameters has a similarity above a threshold. - View Dependent Claims (30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42)
-
Specification