Unnamed: 0 int64 0 350k | level_0 int64 0 351k | ApplicationNumber int64 9.75M 96.1M | ArtUnit int64 1.6k 3.99k | Abstract stringlengths 1 8.37k | Claims stringlengths 3 292k | abstract-claims stringlengths 68 293k | TechCenter int64 1.6k 3.9k |
|---|---|---|---|---|---|---|---|
6,700 | 6,700 | 16,220,384 | 2,174 | An arrangement of alphabet keys is provided in a total of three rows. Two of the three rows have a total of nine keys each, and the other row has a total of eight keys. The vowel keys are grouped together in a vowel group having a symmetric shape in which an imaginary line extending vertically divides the vowel group into a left half and right half that is a mirror image of the left half. The vowel group traverses the three rows and at least two columns, and at least a portion of the vowel group is located at a center of the arrangement. The consonant keys are arranged in alphabetical order from left to right on opposite sides of vowel group. A vowel key in the vowel group is centered along the imaginary line to be at a midpoint of the vowel group in a horizontal direction. | 1. A keyboard comprising:
an arrangement of alphabet keys, wherein the alphabet keys are provided in a total of three rows extending in a horizontal direction, each alphabet key in the three rows representing one letter of the English-language alphabet so that the three rows of alphabet keys include all consonants and all vowels of the English-language alphabet, wherein two of the three rows of alphabet keys have a total of nine keys each, and one of the three rows of alphabet keys has a total of eight keys, the consonants are represented with consonant keys and vowels are represented by vowel keys, the vowel keys are grouped together in a vowel group having a symmetric shape in which an imaginary line extending vertically perpendicular to the horizontal direction divides the vowel group into a left half and right half that is a mirror image of the left half, the vowel group traversing the three rows and at least two columns, and at least a portion of the vowel group is located at a center of the arrangement, the consonant keys are arranged in alphabetical order from left to right on opposite sides of vowel group, such that three columns of the consonant keys are on one of a left side of the vowel group and a right side of the vowel group and four columns of the consonant keys are on the other of the left side and the right side of the vowel group, and at least one vowel key in the vowel group is centered along the imaginary line to be at a midpoint of the vowel group in the horizontal direction. 2. The keyboard of claim 1, wherein the vowel group is outlined by a visible line or shape delineating the group of vowels from the consonant keys. 3. The keyboard of claim 2, wherein the visible line or shape is substantially triangular shaped. 4. The keyboard of claim 1, wherein the vowel keys have a color, and the consonant keys have no color or have a color that is different than or the same as the color of the vowel keys. 5. The keyboard of claim 1, wherein letters on the consonant keys have a color, and letters on the vowel keys have a color that is different than or the same as the color of the letters on the consonant keys. 6. The keyboard of claim 1, wherein three columns of the consonant keys are on the left side of the vowel group, and four columns of the consonant keys are on the right side of the vowel group. 7. The keyboard of claim 1, wherein four columns of the consonant keys are on the left side of the vowel group, and three columns of the consonant keys are on the right side of the vowel group. 8. The keyboard of claim 1, wherein the consonant keys in each column are vertically aligned with each other so that none of the consonant keys in a column is offset in the horizontal direction from other consonant keys in that column. 9. The keyboard of claim 1, wherein the consonant keys in each column are vertically unaligned with each other so that each consonant key in a column is offset in the horizontal direction from an adjacent consonant key in that column. 10. The keyboard of claim 1, wherein the symmetric shape of the vowel group is substantially triangular, such that vowel key “a” and vowel key “e” are in a first row of the three rows of alphabet keys, vowel key “i” and vowel key “o” are in a second row of the three rows of alphabet keys, and vowel key “u” is in a third row of the three rows of alphabet keys and is centered in the horizontal direction with respect to the vowel key “i” and the vowel key “o”. 11. The keyboard of claim 1, wherein the symmetric shape of the vowel group is substantially triangular, such that vowel key “a” is in a first row of the three rows of alphabet keys, vowel key “e” and vowel key “i” are in a second row of the three rows of alphabet keys, and vowel key “o” and vowel key “u” are in a third row of the three rows of alphabet keys, and vowel key “a” is centered in the horizontal direction with respect to the vowel key “e” and the vowel key “i”. 12. The keyboard of claim 1, wherein the symmetric shape of the vowel group is substantially triangular, such that vowel key “u” is in a first row of the three rows of alphabet keys, vowel key “i” and vowel key “o” are in a second row of the three rows of alphabet keys, and vowel key “a” and vowel key “e” are in a third row of the three rows of alphabet keys, and vowel key “u” is centered in the horizontal direction with respect to the vowel key “i” and the vowel key “o”. 13. The keyboard of claim 1, wherein the symmetric shape of the vowel group is substantially triangular, such that vowel key “i” and vowel key “o” are in a first row of the three rows of alphabet keys, vowel key “a” and vowel key “e” are in a second row of the three rows of alphabet keys, and vowel key “u” is in a third row of the three rows of alphabet keys and is centered in the horizontal direction with respect to the vowel key “a” and the vowel key “e”. 14. The keyboard of claim 1, wherein the symmetric shape of the vowel group is substantially triangular, such that vowel key “u” is in a first row of the three rows of alphabet keys, vowel key “a” and vowel key “e” are in a second row of the three rows of alphabet keys, and vowel key “i” and vowel key “o” are in a third row of the three rows of alphabet keys, and vowel key “u” is centered in the horizontal direction with respect to the vowel key “a” and the vowel key “e”. 15. The keyboard of claim 1, wherein the symmetric shape of the vowel group is an hourglass, such that vowel key “a” and vowel key “e” are in a first row of the three rows of alphabet keys, vowel key “i” is in a second row of the three rows of alphabet keys and is centered in the horizontal direction with respect to the vowel key “a” and the vowel key “e”, and vowel key “o” and vowel key “u” are in a third row of the three rows of alphabet keys. 16. The keyboard of claim 1, wherein the symmetric shape of the vowel group is an hourglass, such that vowel key “o” and vowel key “u” are in a first row of the three rows of alphabet keys, vowel key “i” is in a second row of the three rows of alphabet keys and is centered in the horizontal direction with respect to the vowel key “o” and the vowel key “u”, and vowel key “a” and vowel key “e” are in a third row of the three rows of alphabet keys. 17. The keyboard of claim 1, wherein a consonant key in the upper left corner of the arrangement is vertically unaligned with a consonant key in the lower left corner of the arrangement so that there is an offset in the horizontal direction between the consonant key in the upper left corner of the arrangement and the consonant key in the lower left corner of the arrangement, and
a consonant key in the upper right corner of the arrangement is vertically unaligned with a consonant key in the lower right corner of the arrangement so that there is an offset in the horizontal direction between the consonant key in the upper right corner of the arrangement and the consonant key in the lower right corner of the arrangement. 18. The keyboard of claim 1, wherein an outline around a perimeter of the alphabet keys is a rectangle shape. 19. The keyboard of claim 1, wherein each of the three columns of the consonant keys and each of the four columns of the consonant keys are angled from the vowel group relative to the horizontal direction, so that the arrangement has a curved shape. 20. The keyboard of claim 1, wherein the keyboard is a virtual keyboard on a digital screen. 21. A mobile device having the keyboard of claim 1. 22. The keyboard of claim 20, wherein
the vowel group is outlined by a visible line or shape delineating the group of vowels from the consonant keys, the vowel keys have a color, and the consonant keys have no color or have a color that is different than or the same as the color of the vowel keys, letters on the consonant keys have a color, and letters on the vowel keys have a color that is different than or the same as the color of the letters on the consonant keys, and at least one of an arrangement of the consonant keys, an arrangement of the vowel keys, the symmetric shape of the vowel group, the visible line or shape, a color of the vowel keys, the letters on the consonant keys, and the letters on the vowel keys, is changeable by a user via a computer program, | An arrangement of alphabet keys is provided in a total of three rows. Two of the three rows have a total of nine keys each, and the other row has a total of eight keys. The vowel keys are grouped together in a vowel group having a symmetric shape in which an imaginary line extending vertically divides the vowel group into a left half and right half that is a mirror image of the left half. The vowel group traverses the three rows and at least two columns, and at least a portion of the vowel group is located at a center of the arrangement. The consonant keys are arranged in alphabetical order from left to right on opposite sides of vowel group. A vowel key in the vowel group is centered along the imaginary line to be at a midpoint of the vowel group in a horizontal direction.1. A keyboard comprising:
an arrangement of alphabet keys, wherein the alphabet keys are provided in a total of three rows extending in a horizontal direction, each alphabet key in the three rows representing one letter of the English-language alphabet so that the three rows of alphabet keys include all consonants and all vowels of the English-language alphabet, wherein two of the three rows of alphabet keys have a total of nine keys each, and one of the three rows of alphabet keys has a total of eight keys, the consonants are represented with consonant keys and vowels are represented by vowel keys, the vowel keys are grouped together in a vowel group having a symmetric shape in which an imaginary line extending vertically perpendicular to the horizontal direction divides the vowel group into a left half and right half that is a mirror image of the left half, the vowel group traversing the three rows and at least two columns, and at least a portion of the vowel group is located at a center of the arrangement, the consonant keys are arranged in alphabetical order from left to right on opposite sides of vowel group, such that three columns of the consonant keys are on one of a left side of the vowel group and a right side of the vowel group and four columns of the consonant keys are on the other of the left side and the right side of the vowel group, and at least one vowel key in the vowel group is centered along the imaginary line to be at a midpoint of the vowel group in the horizontal direction. 2. The keyboard of claim 1, wherein the vowel group is outlined by a visible line or shape delineating the group of vowels from the consonant keys. 3. The keyboard of claim 2, wherein the visible line or shape is substantially triangular shaped. 4. The keyboard of claim 1, wherein the vowel keys have a color, and the consonant keys have no color or have a color that is different than or the same as the color of the vowel keys. 5. The keyboard of claim 1, wherein letters on the consonant keys have a color, and letters on the vowel keys have a color that is different than or the same as the color of the letters on the consonant keys. 6. The keyboard of claim 1, wherein three columns of the consonant keys are on the left side of the vowel group, and four columns of the consonant keys are on the right side of the vowel group. 7. The keyboard of claim 1, wherein four columns of the consonant keys are on the left side of the vowel group, and three columns of the consonant keys are on the right side of the vowel group. 8. The keyboard of claim 1, wherein the consonant keys in each column are vertically aligned with each other so that none of the consonant keys in a column is offset in the horizontal direction from other consonant keys in that column. 9. The keyboard of claim 1, wherein the consonant keys in each column are vertically unaligned with each other so that each consonant key in a column is offset in the horizontal direction from an adjacent consonant key in that column. 10. The keyboard of claim 1, wherein the symmetric shape of the vowel group is substantially triangular, such that vowel key “a” and vowel key “e” are in a first row of the three rows of alphabet keys, vowel key “i” and vowel key “o” are in a second row of the three rows of alphabet keys, and vowel key “u” is in a third row of the three rows of alphabet keys and is centered in the horizontal direction with respect to the vowel key “i” and the vowel key “o”. 11. The keyboard of claim 1, wherein the symmetric shape of the vowel group is substantially triangular, such that vowel key “a” is in a first row of the three rows of alphabet keys, vowel key “e” and vowel key “i” are in a second row of the three rows of alphabet keys, and vowel key “o” and vowel key “u” are in a third row of the three rows of alphabet keys, and vowel key “a” is centered in the horizontal direction with respect to the vowel key “e” and the vowel key “i”. 12. The keyboard of claim 1, wherein the symmetric shape of the vowel group is substantially triangular, such that vowel key “u” is in a first row of the three rows of alphabet keys, vowel key “i” and vowel key “o” are in a second row of the three rows of alphabet keys, and vowel key “a” and vowel key “e” are in a third row of the three rows of alphabet keys, and vowel key “u” is centered in the horizontal direction with respect to the vowel key “i” and the vowel key “o”. 13. The keyboard of claim 1, wherein the symmetric shape of the vowel group is substantially triangular, such that vowel key “i” and vowel key “o” are in a first row of the three rows of alphabet keys, vowel key “a” and vowel key “e” are in a second row of the three rows of alphabet keys, and vowel key “u” is in a third row of the three rows of alphabet keys and is centered in the horizontal direction with respect to the vowel key “a” and the vowel key “e”. 14. The keyboard of claim 1, wherein the symmetric shape of the vowel group is substantially triangular, such that vowel key “u” is in a first row of the three rows of alphabet keys, vowel key “a” and vowel key “e” are in a second row of the three rows of alphabet keys, and vowel key “i” and vowel key “o” are in a third row of the three rows of alphabet keys, and vowel key “u” is centered in the horizontal direction with respect to the vowel key “a” and the vowel key “e”. 15. The keyboard of claim 1, wherein the symmetric shape of the vowel group is an hourglass, such that vowel key “a” and vowel key “e” are in a first row of the three rows of alphabet keys, vowel key “i” is in a second row of the three rows of alphabet keys and is centered in the horizontal direction with respect to the vowel key “a” and the vowel key “e”, and vowel key “o” and vowel key “u” are in a third row of the three rows of alphabet keys. 16. The keyboard of claim 1, wherein the symmetric shape of the vowel group is an hourglass, such that vowel key “o” and vowel key “u” are in a first row of the three rows of alphabet keys, vowel key “i” is in a second row of the three rows of alphabet keys and is centered in the horizontal direction with respect to the vowel key “o” and the vowel key “u”, and vowel key “a” and vowel key “e” are in a third row of the three rows of alphabet keys. 17. The keyboard of claim 1, wherein a consonant key in the upper left corner of the arrangement is vertically unaligned with a consonant key in the lower left corner of the arrangement so that there is an offset in the horizontal direction between the consonant key in the upper left corner of the arrangement and the consonant key in the lower left corner of the arrangement, and
a consonant key in the upper right corner of the arrangement is vertically unaligned with a consonant key in the lower right corner of the arrangement so that there is an offset in the horizontal direction between the consonant key in the upper right corner of the arrangement and the consonant key in the lower right corner of the arrangement. 18. The keyboard of claim 1, wherein an outline around a perimeter of the alphabet keys is a rectangle shape. 19. The keyboard of claim 1, wherein each of the three columns of the consonant keys and each of the four columns of the consonant keys are angled from the vowel group relative to the horizontal direction, so that the arrangement has a curved shape. 20. The keyboard of claim 1, wherein the keyboard is a virtual keyboard on a digital screen. 21. A mobile device having the keyboard of claim 1. 22. The keyboard of claim 20, wherein
the vowel group is outlined by a visible line or shape delineating the group of vowels from the consonant keys, the vowel keys have a color, and the consonant keys have no color or have a color that is different than or the same as the color of the vowel keys, letters on the consonant keys have a color, and letters on the vowel keys have a color that is different than or the same as the color of the letters on the consonant keys, and at least one of an arrangement of the consonant keys, an arrangement of the vowel keys, the symmetric shape of the vowel group, the visible line or shape, a color of the vowel keys, the letters on the consonant keys, and the letters on the vowel keys, is changeable by a user via a computer program, | 2,100 |
6,701 | 6,701 | 16,372,247 | 2,135 | A request is received over a link that requests a particular line in memory. A directory state record is identified in memory that identifies a directory state of the particular line. A type of the request is identified from the request. It is determined that the directory state of the particular line is to change from the particular state to a new state based on the directory state of the particular line and the type of the request. The directory state record is changed, in response to receipt of the request, to reflect the new state. A copy of the particular line is sent in response to the request | 1-21. (canceled) 22. An apparatus comprising:
graphics processing circuitry to perform graphics operations; a coherent interconnect fabric comprising:
packet communication links to carry data packets,
packet switching circuitry to establish virtual channels over the packet communication links and to route the data packets in accordance with the virtual channels, and
coherence circuitry to manage coherency states associated with data transmitted in the data packets;
a graphics interconnect to couple the graphics processing circuitry to the coherent interconnect fabric; a memory controller to couple the graphics processing circuitry to a first type of system memory device and a second type of system memory device, wherein first type of system memory device is associated with a first level of performance and the second type of system memory device is associated with a second level of performance greater than the first level of performance, wherein the memory controller is to use the second type of system memory device as a cache to the first type of system memory device; input/output (I/O) interconnect circuitry to couple the coherent interconnect fabric to one or more I/O interfaces of one or more I/O devices and/or one or more I/O interconnects; and power management circuitry to independently regulate power to each of a plurality of domains, including a graphics domain associated with the graphics processing circuitry. 23. The apparatus of claim 22, further comprising:
a distributed directory to store the coherency states, the coherence circuitry to update the coherency states in the distributed directory based, at least in part, on snoop messages transmitted over the packet communication links. 24. The apparatus of claim 22, wherein the packet processing circuitry is to implement credit-based flow control to route the data packets through the virtual channels. 25. The apparatus of claim 22, wherein the coherency states include an exclusive state, a modified state, a clean state, an invalid state, and a forward state. 26. The apparatus of claim 22, wherein different data packets are associated with different traffic classes, the packet processing circuitry to process the data packets in accordance with the associated traffic classes. 27. The apparatus of claim 22, wherein different data packets are associated with different priority values, the packet processing circuitry to process the data packets in accordance with the different priorities. 28. The apparatus of claim 22, wherein the plurality of cores and coherent interconnect fabric are integrated on a first processor chip, the coherent interconnect fabric further comprising:
off-chip coherent interconnect circuitry to extend the coherent interconnect fabric to a second coherent interconnect fabric on a second processor chip. 29. The apparatus of claim 28, wherein the off-chip coherent interconnect circuitry is a first off-chip coherent interconnect circuitry, the coherent interconnect fabric further comprising:
a second off-chip coherent interconnect circuitry to extend the coherent interconnect fabric to a third coherent interconnect fabric on a third processor chip. 30. The apparatus of claim 29, wherein the first off-chip coherent interconnect circuitry is coupled to a first off-chip link coupled to the second coherent interconnect fabric on the second processor chip, and the second off-chip coherent interconnect circuitry is coupled to a second off-chip link coupled to the third coherent interconnect fabric on the third processor chip. 31. The apparatus of claim 22, wherein the one or more I/O interconnects comprise at least one PCI Express interconnect. 32. The apparatus of claim 22, wherein the packet communication links comprise a width of N bits transmitted over N data lines and the coherent interconnect fabric further comprises data link circuitry to process data flits comprising M bits of data where M>N. 33. The apparatus of claim 32, wherein the M bits of data from a flit is to be mapped to successive N-bit sets of data transmitted over the N data lines. 34. The apparatus of claim 22, wherein the packet processing circuitry comprises at least one buffer to temporarily store the data packets carried over the packet communication links. | A request is received over a link that requests a particular line in memory. A directory state record is identified in memory that identifies a directory state of the particular line. A type of the request is identified from the request. It is determined that the directory state of the particular line is to change from the particular state to a new state based on the directory state of the particular line and the type of the request. The directory state record is changed, in response to receipt of the request, to reflect the new state. A copy of the particular line is sent in response to the request1-21. (canceled) 22. An apparatus comprising:
graphics processing circuitry to perform graphics operations; a coherent interconnect fabric comprising:
packet communication links to carry data packets,
packet switching circuitry to establish virtual channels over the packet communication links and to route the data packets in accordance with the virtual channels, and
coherence circuitry to manage coherency states associated with data transmitted in the data packets;
a graphics interconnect to couple the graphics processing circuitry to the coherent interconnect fabric; a memory controller to couple the graphics processing circuitry to a first type of system memory device and a second type of system memory device, wherein first type of system memory device is associated with a first level of performance and the second type of system memory device is associated with a second level of performance greater than the first level of performance, wherein the memory controller is to use the second type of system memory device as a cache to the first type of system memory device; input/output (I/O) interconnect circuitry to couple the coherent interconnect fabric to one or more I/O interfaces of one or more I/O devices and/or one or more I/O interconnects; and power management circuitry to independently regulate power to each of a plurality of domains, including a graphics domain associated with the graphics processing circuitry. 23. The apparatus of claim 22, further comprising:
a distributed directory to store the coherency states, the coherence circuitry to update the coherency states in the distributed directory based, at least in part, on snoop messages transmitted over the packet communication links. 24. The apparatus of claim 22, wherein the packet processing circuitry is to implement credit-based flow control to route the data packets through the virtual channels. 25. The apparatus of claim 22, wherein the coherency states include an exclusive state, a modified state, a clean state, an invalid state, and a forward state. 26. The apparatus of claim 22, wherein different data packets are associated with different traffic classes, the packet processing circuitry to process the data packets in accordance with the associated traffic classes. 27. The apparatus of claim 22, wherein different data packets are associated with different priority values, the packet processing circuitry to process the data packets in accordance with the different priorities. 28. The apparatus of claim 22, wherein the plurality of cores and coherent interconnect fabric are integrated on a first processor chip, the coherent interconnect fabric further comprising:
off-chip coherent interconnect circuitry to extend the coherent interconnect fabric to a second coherent interconnect fabric on a second processor chip. 29. The apparatus of claim 28, wherein the off-chip coherent interconnect circuitry is a first off-chip coherent interconnect circuitry, the coherent interconnect fabric further comprising:
a second off-chip coherent interconnect circuitry to extend the coherent interconnect fabric to a third coherent interconnect fabric on a third processor chip. 30. The apparatus of claim 29, wherein the first off-chip coherent interconnect circuitry is coupled to a first off-chip link coupled to the second coherent interconnect fabric on the second processor chip, and the second off-chip coherent interconnect circuitry is coupled to a second off-chip link coupled to the third coherent interconnect fabric on the third processor chip. 31. The apparatus of claim 22, wherein the one or more I/O interconnects comprise at least one PCI Express interconnect. 32. The apparatus of claim 22, wherein the packet communication links comprise a width of N bits transmitted over N data lines and the coherent interconnect fabric further comprises data link circuitry to process data flits comprising M bits of data where M>N. 33. The apparatus of claim 32, wherein the M bits of data from a flit is to be mapped to successive N-bit sets of data transmitted over the N data lines. 34. The apparatus of claim 22, wherein the packet processing circuitry comprises at least one buffer to temporarily store the data packets carried over the packet communication links. | 2,100 |
6,702 | 6,702 | 14,670,737 | 2,174 | The disclosed device serves for artificial respiration and has a blower connected to a control. Both the control and the blower are arranged in a housing. The control is connected to at least one indicating device and also to at least one operating element. | 1. A device for artificial respiration, wherein the device comprises a blower connected to a control, both the control and the blower being arranged in a housing and the control being connected to at least one indicating device and also at least one operating element, and wherein the indicating device is formed as a display that has a touchscreen function and, using a symbol-based operating structure, can be used as an input device in such a way that respective symbols visualize an assigned function and that a hierarchically structured operating capability is generated by the control. 2. The device of claim 1, wherein different languages can be selected by means of the display. 3. The device of claim 1, wherein a possibility for selecting different languages is provided for a patient menu and an expert menu, wherein a language for the menu concerned is selected by an input button and the input button is connected by logic circuitry to a language selection menu, in which the user can select the language, wherein the input button is also connected by logic circuitry to a language memory and wherein, after confirmation of a language selected, this language is loaded from the memory and used. 4. The device of claim 2, wherein a number of input buttons configured for receiving a user input are provided in a region of the display, wherein the display is connected by logic circuitry to the buttons and has a number of assigned information fields, wherein each information field is assigned to a corresponding input button and configured for indicating graphic items of information that specify various functions of corresponding input buttons, and wherein an information field is designed to indicate graphically whether or not a selected value concerning a parameter or a setting of the respirator can be changed by means of at least one input button. 5. The device of claim 1, wherein the display is connected to an evaluation unit for providing at least one item of qualitative therapy information. 6. The device of claim 1, wherein the respirator comprises an internal data memory for permanently storing operating data. 7. The device of claim 1, wherein selectable operating data can be stored on a memory card. 8. The device of claim 1, wherein a number of input buttons configured for receiving a user input are provided in a region of the display, wherein the display is connected by logic circuitry to the input buttons and comprises a number of assigned information fields, wherein each information field is assigned to a corresponding input button and configured for indicating graphic items of information that specify various functions of the corresponding input buttons, wherein the information field is designed to indicate graphically how many days with memory data are to be transferred to an external memory. 9. The device of claim 8, wherein the external memory is an SD card or USB memory. 10. The device of claim 1, wherein the respirator is designed for carrying out a leak-tightness test of a respiration mask and a corresponding test result can be visualized in a region of the display. 11. The device of claim 10, wherein a pressure used while carrying out the test for the leak-tightness of the mask can be preset by means of the display. 12. The device of claim 10, wherein, after actuating an input button, carrying out of a test procedure for leak-tightness of the mask takes place during therapy in the expert menu, wherein a number of input buttons configured for receiving a user input are provided in a region of the display and wherein the display is connected by logic circuitry to the input buttons and has a number of assigned information fields, wherein each information field is assigned to a corresponding input button and configured for indicating graphic items of information that specify various functions of corresponding input buttons, wherein at least one information field is provided with an assigned input button, wherein the information field is designed to indicate graphically whether or not a selected value concerning a parameter or a setting of the respirator can be changed by means of at least one input button and a change of this state can be achieved by actuating an input button that is assigned to the information field, wherein, after corresponding actuation of the input button, the information field visualizes a closed state and, after that, at least selected values that concern an operation of the respirator can no longer be changed. 13. The device of claim 1, wherein at least one energy-saving option can be selected and can be configured by means of the display. 14. The device of claim 1, wherein at least one item of information with respect to a function of the device and/or operating the device can be visualized by means of the display. 15. A method for indicating user interface information for a respirator comprising a blower connected to a control, both the control and the blower being arranged in a housing, and the control being connected to at least one indicating device and also at least one operating element, wherein the indicating device is formed as a display that has a touchscreen function and, using a symbol-based operating structure, can be used as an input device in such a way that respective symbols visualize an assigned function and that a hierarchically structured operating capability is generated by the control. 16. The method of claim 15, wherein a number of input buttons configured for receiving a user input are provided in a region of the display and wherein the display is connected by logic circuitry to the input buttons and has a number of assigned information fields, wherein each information field is assigned to a corresponding input button and configured for indicating graphic items of information that specify various functions of corresponding input buttons, wherein at least one information field with an assigned input button is provided, wherein the information field is designed to indicate graphically whether a selected value concerning a parameter or a setting of the respirator can be changed by means of at least one input button. | The disclosed device serves for artificial respiration and has a blower connected to a control. Both the control and the blower are arranged in a housing. The control is connected to at least one indicating device and also to at least one operating element.1. A device for artificial respiration, wherein the device comprises a blower connected to a control, both the control and the blower being arranged in a housing and the control being connected to at least one indicating device and also at least one operating element, and wherein the indicating device is formed as a display that has a touchscreen function and, using a symbol-based operating structure, can be used as an input device in such a way that respective symbols visualize an assigned function and that a hierarchically structured operating capability is generated by the control. 2. The device of claim 1, wherein different languages can be selected by means of the display. 3. The device of claim 1, wherein a possibility for selecting different languages is provided for a patient menu and an expert menu, wherein a language for the menu concerned is selected by an input button and the input button is connected by logic circuitry to a language selection menu, in which the user can select the language, wherein the input button is also connected by logic circuitry to a language memory and wherein, after confirmation of a language selected, this language is loaded from the memory and used. 4. The device of claim 2, wherein a number of input buttons configured for receiving a user input are provided in a region of the display, wherein the display is connected by logic circuitry to the buttons and has a number of assigned information fields, wherein each information field is assigned to a corresponding input button and configured for indicating graphic items of information that specify various functions of corresponding input buttons, and wherein an information field is designed to indicate graphically whether or not a selected value concerning a parameter or a setting of the respirator can be changed by means of at least one input button. 5. The device of claim 1, wherein the display is connected to an evaluation unit for providing at least one item of qualitative therapy information. 6. The device of claim 1, wherein the respirator comprises an internal data memory for permanently storing operating data. 7. The device of claim 1, wherein selectable operating data can be stored on a memory card. 8. The device of claim 1, wherein a number of input buttons configured for receiving a user input are provided in a region of the display, wherein the display is connected by logic circuitry to the input buttons and comprises a number of assigned information fields, wherein each information field is assigned to a corresponding input button and configured for indicating graphic items of information that specify various functions of the corresponding input buttons, wherein the information field is designed to indicate graphically how many days with memory data are to be transferred to an external memory. 9. The device of claim 8, wherein the external memory is an SD card or USB memory. 10. The device of claim 1, wherein the respirator is designed for carrying out a leak-tightness test of a respiration mask and a corresponding test result can be visualized in a region of the display. 11. The device of claim 10, wherein a pressure used while carrying out the test for the leak-tightness of the mask can be preset by means of the display. 12. The device of claim 10, wherein, after actuating an input button, carrying out of a test procedure for leak-tightness of the mask takes place during therapy in the expert menu, wherein a number of input buttons configured for receiving a user input are provided in a region of the display and wherein the display is connected by logic circuitry to the input buttons and has a number of assigned information fields, wherein each information field is assigned to a corresponding input button and configured for indicating graphic items of information that specify various functions of corresponding input buttons, wherein at least one information field is provided with an assigned input button, wherein the information field is designed to indicate graphically whether or not a selected value concerning a parameter or a setting of the respirator can be changed by means of at least one input button and a change of this state can be achieved by actuating an input button that is assigned to the information field, wherein, after corresponding actuation of the input button, the information field visualizes a closed state and, after that, at least selected values that concern an operation of the respirator can no longer be changed. 13. The device of claim 1, wherein at least one energy-saving option can be selected and can be configured by means of the display. 14. The device of claim 1, wherein at least one item of information with respect to a function of the device and/or operating the device can be visualized by means of the display. 15. A method for indicating user interface information for a respirator comprising a blower connected to a control, both the control and the blower being arranged in a housing, and the control being connected to at least one indicating device and also at least one operating element, wherein the indicating device is formed as a display that has a touchscreen function and, using a symbol-based operating structure, can be used as an input device in such a way that respective symbols visualize an assigned function and that a hierarchically structured operating capability is generated by the control. 16. The method of claim 15, wherein a number of input buttons configured for receiving a user input are provided in a region of the display and wherein the display is connected by logic circuitry to the input buttons and has a number of assigned information fields, wherein each information field is assigned to a corresponding input button and configured for indicating graphic items of information that specify various functions of corresponding input buttons, wherein at least one information field with an assigned input button is provided, wherein the information field is designed to indicate graphically whether a selected value concerning a parameter or a setting of the respirator can be changed by means of at least one input button. | 2,100 |
6,703 | 6,703 | 15,863,258 | 2,175 | A method and apparatus is disclosed whereby the context of user activity can be used to tailor the ambient information system. The method and apparatus use both short-term context such as recent activity and long-term context such as historical patterns to highlight specific content on channels or widgets that are likely to be of most immediate interest to the user. This contextual information provided by the framework can also be used to make intelligent decisions about how to tailor the user experience after a user has interacted with the item in question. Additionally, context information accumulated on one device such as a mobile phone can be broadcasted to other devices to influence the ambient information display application on a second device such as a desktop based on enabling remote access to the local context repository. | 1. A method of creating context-aware display systems comprising:
determining a current user context including an identity of a user via facial recognition and preferences of the user for particular widgets; and concurrently displaying multiple widgets on the device to highlight the multiple widgets that are most relevant to the current user context. 2. The method of claim 1, further comprising:
authorizing a device to access application data stored on the device in response to the facial recognition; and in response to authorizing the device, presenting an ambient display based on the current user context including concurrently displaying the multiple widgets on the device. 3. The method of claim 1, wherein the multiple widgets are a subset of a plurality of widgets displayed in a serial consumption model, wherein the serial consumption model involves a carousel display of the plurality of widgets, with only a subset of the plurality of widgets visible at a given time. 4. The method of claim 3, wherein the carousel display loops sequentially from a first subset of the plurality of widgets to a second subset of the plurality of widgets. 5. The method of claim 1, further comprising:
enabling a user actionable task that can be supported on each of the highlighted widgets given the current user context and a device capability. 6. The method of claim 5, wherein the user actionable task includes launching an application. 7. The method of claim 1, wherein the device is a mobile device, a set top box, or a desktop PC. 8. An electronic device comprising:
a display; a processor coupled to the display; a storage device coupled to the processor; software means operative on the processor for:
determining a current user context including an identity of a user via facial recognition and preferences of the user for particular widgets; and
concurrently displaying multiple widgets on the device to highlight the multiple widgets that are most relevant to the current user context. 9. The electronic device of claim 8, further comprising software means operative on the processor for:
authorizing a device to access application data stored on the device in response to the facial recognition; and in response to authorizing the device, presenting an ambient display based on the current user context including concurrently displaying the multiple widgets on the device. 10. The electronic device of claim 8, wherein the multiple widgets are a subset of a plurality of widgets displayed in a serial consumption model, wherein the serial consumption model involves a carousel display of the plurality of widgets, with only a subset of the plurality of widgets visible at a given time. 11. The electronic device of claim 10, wherein the carousel display loops sequentially from a first subset of the plurality of widgets to a second subset of the plurality of widgets. 12. The electronic device of claim 8, further comprising software means operative on the processor for:
enabling a user actionable task that can be supported on each of the highlighted widgets given the current user context and a device capability. 13. The electronic device of claim 12, wherein the user actionable task includes launching an application. 14. The electronic device of claim 8, wherein the device is a mobile device, a set top box, or a desktop PC. 15. A non-transitory computer-accessible medium having executable instructions to create context-aware display systems, the executable instructions capable of directing a processor to perform:
determining a current user context including an identity of a user via facial recognition and preferences of the user for particular widgets; and concurrently displaying multiple widgets on the device to highlight the multiple widgets that are most relevant to the current user context. 16. The computer-accessible medium of claim 15, wherein the executable instructions capable of directing the processor to create context-aware display systems further comprise executable instructions capable of directing the processor to perform:
authorizing a device to access application data stored on the device in response to the facial recognition; and in response to authorizing the device, presenting an ambient display based on the current user context including concurrently displaying the multiple widgets on the device. 17. The computer-accessible medium of claim 15, wherein the multiple widgets are a subset of a plurality of widgets displayed in a serial consumption model, wherein the serial consumption model involves a carousel display of the plurality of widgets, with only a subset of the plurality of widgets visible at a given time. 18. The computer-accessible medium of claim 17, wherein the carousel display loops sequentially from a first subset of the plurality of widgets to a second subset of the plurality of widgets. 19. The computer-accessible medium of claim 15, wherein the executable instructions capable of directing the processor to create context-aware display systems further comprise executable instructions capable of directing the processor to perform:
enabling a user actionable task that can be supported on each of the highlighted widgets given the current user context and a device capability. 20. The computer-accessible medium of claim 19, wherein the user actionable task includes launching an application. | A method and apparatus is disclosed whereby the context of user activity can be used to tailor the ambient information system. The method and apparatus use both short-term context such as recent activity and long-term context such as historical patterns to highlight specific content on channels or widgets that are likely to be of most immediate interest to the user. This contextual information provided by the framework can also be used to make intelligent decisions about how to tailor the user experience after a user has interacted with the item in question. Additionally, context information accumulated on one device such as a mobile phone can be broadcasted to other devices to influence the ambient information display application on a second device such as a desktop based on enabling remote access to the local context repository.1. A method of creating context-aware display systems comprising:
determining a current user context including an identity of a user via facial recognition and preferences of the user for particular widgets; and concurrently displaying multiple widgets on the device to highlight the multiple widgets that are most relevant to the current user context. 2. The method of claim 1, further comprising:
authorizing a device to access application data stored on the device in response to the facial recognition; and in response to authorizing the device, presenting an ambient display based on the current user context including concurrently displaying the multiple widgets on the device. 3. The method of claim 1, wherein the multiple widgets are a subset of a plurality of widgets displayed in a serial consumption model, wherein the serial consumption model involves a carousel display of the plurality of widgets, with only a subset of the plurality of widgets visible at a given time. 4. The method of claim 3, wherein the carousel display loops sequentially from a first subset of the plurality of widgets to a second subset of the plurality of widgets. 5. The method of claim 1, further comprising:
enabling a user actionable task that can be supported on each of the highlighted widgets given the current user context and a device capability. 6. The method of claim 5, wherein the user actionable task includes launching an application. 7. The method of claim 1, wherein the device is a mobile device, a set top box, or a desktop PC. 8. An electronic device comprising:
a display; a processor coupled to the display; a storage device coupled to the processor; software means operative on the processor for:
determining a current user context including an identity of a user via facial recognition and preferences of the user for particular widgets; and
concurrently displaying multiple widgets on the device to highlight the multiple widgets that are most relevant to the current user context. 9. The electronic device of claim 8, further comprising software means operative on the processor for:
authorizing a device to access application data stored on the device in response to the facial recognition; and in response to authorizing the device, presenting an ambient display based on the current user context including concurrently displaying the multiple widgets on the device. 10. The electronic device of claim 8, wherein the multiple widgets are a subset of a plurality of widgets displayed in a serial consumption model, wherein the serial consumption model involves a carousel display of the plurality of widgets, with only a subset of the plurality of widgets visible at a given time. 11. The electronic device of claim 10, wherein the carousel display loops sequentially from a first subset of the plurality of widgets to a second subset of the plurality of widgets. 12. The electronic device of claim 8, further comprising software means operative on the processor for:
enabling a user actionable task that can be supported on each of the highlighted widgets given the current user context and a device capability. 13. The electronic device of claim 12, wherein the user actionable task includes launching an application. 14. The electronic device of claim 8, wherein the device is a mobile device, a set top box, or a desktop PC. 15. A non-transitory computer-accessible medium having executable instructions to create context-aware display systems, the executable instructions capable of directing a processor to perform:
determining a current user context including an identity of a user via facial recognition and preferences of the user for particular widgets; and concurrently displaying multiple widgets on the device to highlight the multiple widgets that are most relevant to the current user context. 16. The computer-accessible medium of claim 15, wherein the executable instructions capable of directing the processor to create context-aware display systems further comprise executable instructions capable of directing the processor to perform:
authorizing a device to access application data stored on the device in response to the facial recognition; and in response to authorizing the device, presenting an ambient display based on the current user context including concurrently displaying the multiple widgets on the device. 17. The computer-accessible medium of claim 15, wherein the multiple widgets are a subset of a plurality of widgets displayed in a serial consumption model, wherein the serial consumption model involves a carousel display of the plurality of widgets, with only a subset of the plurality of widgets visible at a given time. 18. The computer-accessible medium of claim 17, wherein the carousel display loops sequentially from a first subset of the plurality of widgets to a second subset of the plurality of widgets. 19. The computer-accessible medium of claim 15, wherein the executable instructions capable of directing the processor to create context-aware display systems further comprise executable instructions capable of directing the processor to perform:
enabling a user actionable task that can be supported on each of the highlighted widgets given the current user context and a device capability. 20. The computer-accessible medium of claim 19, wherein the user actionable task includes launching an application. | 2,100 |
6,704 | 6,704 | 16,564,834 | 2,184 | Packets may be compressed based on predictive analyses. For example, in one embodiment, it is determined that an explicit value for a particular header field can be inferred by the receiver agent, a packet header is constructed that either omits the header field or includes a differential value for the header field in lieu of the explicit value for the header field. The packet header may be decompressed upon receipt by deriving the explicit value for the particular header field. | 1. An apparatus comprising:
a port comprising circuitry to implement one or more layers of an interconnect protocol, wherein the port comprises an agent to:
obtain data to be transmitted to another device over a link based on the interconnect protocol via a packet, wherein the packet is to comprise a header;
determine that a value for a particular header field of the packet can be inferred by the other device based on one or more header field values for a previously transmitted packet; and
cause a header to be constructed for the packet, wherein the header is to be constructed to omit the particular header field from the packet header based on determining that the value for the particular header field may be inferred by the other device;
wherein the port is to use the circuitry to transmit the packet with the header to the other device. 2. The apparatus of claim 1, wherein the particular header field is the same as a header field associated with the header field value for the previously transmitted packet. 3. The apparatus of claim 1, wherein the particular header field is different from a header field associated with the header field value for the previously transmitted packet. 4. The apparatus of claim 1, wherein the agent is further to:
access a cached value for the particular header field; determine an inferred value for the particular header field based on the cached value; and compare the inferred value with the value of the particular header field for the packet. 5. The apparatus of claim 1, wherein the agent is further to cache the inferred value for the particular header field. 6. The apparatus of claim 1, wherein the particular header field is one of a tag header field, an upper address header field, an address header field, a length header field, a steering tag header field, a byte enable header field, a byte count header field, a requester identification header field, a lower address header field, or an optional features header field. 7. The apparatus of claim 1, wherein the interconnect protocol is one of a Peripheral Component Interconnect Express (PCIe)-based protocol, a Universal Serial Bus (USB)-based protocol, a Compute Express Link (CXL)-based protocol, a Cache Coherent Interconnect for Accelerators (CCIX)-based protocol, and a Transmission Control Protocol/Internet Protocol (TCP/IP)-based protocol. 8. The apparatus of claim 7, wherein the interconnect protocol is a PCIe-based protocol, and the packet is a PCIe-based Transaction Layer Packet (TLP). 9. The apparatus of claim 8, wherein the packet is a Memory Request TLP or a Completion TLP. 10. A method comprising:
obtaining, at a sender agent, data to be transmitted to a receiver agent via a packet compatible with a Peripheral Component Interconnect Express (PCIe)-based protocol; determining that a value for a particular header field of the packet can be inferred by the receiver agent based on one or more header field values for a previously transmitted packet; constructing a packet header for the data, wherein constructing the packet header comprises omitting the particular header field from the packet header based on determining that the value for the particular header field may be inferred by the receiver agent; and transmitting the packet with the packet header to the receiver agent. 11. An apparatus comprising:
a port comprising circuitry to implement one or more layers of a Peripheral Component Interconnect Express (PCIe)-based protocol, wherein: the circuitry is to receive a particular packet from another device over a link, wherein the particular packet is compatible with the PCIe-based protocol and the link is based on the PCIe-based protocol; and the agent is to:
detect that a particular header field is omitted from a header of the particular packet;
determine a value for the particular header field based at least in part on a cached value for the particular header field from another packet previously received on the link; and
use the determined value for the particular header field of the particular packet. 12. The apparatus of claim 11, wherein the agent is to determine the value for the particular header field further based on a value for another header field from the previously received packet. 13. The apparatus of claim 11, wherein the agent is to determine the value for the particular header field by adding the cached value for the particular header field and the value for the header field from previously received packet. 14. The apparatus of claim 11, wherein the agent is to determine the value for the particular header field by incrementing the cached value for the particular header field by a predetermined amount. 15. The apparatus of claim 11, wherein the determined value for the particular header field is the same as the cached value for the particular header field. 16. The apparatus of claim 11, wherein the agent is further to cache the determined value for the particular header field. 17. The apparatus of claim 11, wherein the particular header field is a tag header field, an upper address header field, an address header field, a length header field, a steering tag header field, a byte enable header field, a byte count header field, a requester identification header field, a lower address header field, or an optional features header field. 18. The apparatus of claim 11, wherein the particular packet is a PCIe-based Transaction Layer Packet (TLP). 19. A system comprising:
a first device; and a second device coupled to the first device over a link based on a Peripheral Component Interconnect Express (PCIe)-based protocol; wherein the first device comprises a port comprising circuitry to implement one or more layers of the PCIe-based protocol, the port comprising an agent to:
obtain data to be transmitted to the second device over the link via a packet, wherein the packet is to comprise a header;
determine that a value for a particular header field of the packet can be inferred by the second device based on one or more header field values for a previously transmitted packet; and
cause a header to be constructed for the packet, wherein the header is to be constructed to omit the particular header field from the packet header based on determining that the value for the particular header field may be inferred by the other device;
wherein the port is to use the circuitry to transmit the packet with the header to the second device. 20. The system of claim 19, wherein the second device comprises:
a port comprising circuitry to implement one or more layers of the PCIe-based protocol, wherein the circuitry is to receive the packet from the first device over the link and the agent is to:
detect that a particular header field is omitted from the header of the packet;
determine a value for the particular header field based at least in part on a cached value for the particular header field from another packet previously received on the link; and
use the determined value for the particular header field of the particular packet. | Packets may be compressed based on predictive analyses. For example, in one embodiment, it is determined that an explicit value for a particular header field can be inferred by the receiver agent, a packet header is constructed that either omits the header field or includes a differential value for the header field in lieu of the explicit value for the header field. The packet header may be decompressed upon receipt by deriving the explicit value for the particular header field.1. An apparatus comprising:
a port comprising circuitry to implement one or more layers of an interconnect protocol, wherein the port comprises an agent to:
obtain data to be transmitted to another device over a link based on the interconnect protocol via a packet, wherein the packet is to comprise a header;
determine that a value for a particular header field of the packet can be inferred by the other device based on one or more header field values for a previously transmitted packet; and
cause a header to be constructed for the packet, wherein the header is to be constructed to omit the particular header field from the packet header based on determining that the value for the particular header field may be inferred by the other device;
wherein the port is to use the circuitry to transmit the packet with the header to the other device. 2. The apparatus of claim 1, wherein the particular header field is the same as a header field associated with the header field value for the previously transmitted packet. 3. The apparatus of claim 1, wherein the particular header field is different from a header field associated with the header field value for the previously transmitted packet. 4. The apparatus of claim 1, wherein the agent is further to:
access a cached value for the particular header field; determine an inferred value for the particular header field based on the cached value; and compare the inferred value with the value of the particular header field for the packet. 5. The apparatus of claim 1, wherein the agent is further to cache the inferred value for the particular header field. 6. The apparatus of claim 1, wherein the particular header field is one of a tag header field, an upper address header field, an address header field, a length header field, a steering tag header field, a byte enable header field, a byte count header field, a requester identification header field, a lower address header field, or an optional features header field. 7. The apparatus of claim 1, wherein the interconnect protocol is one of a Peripheral Component Interconnect Express (PCIe)-based protocol, a Universal Serial Bus (USB)-based protocol, a Compute Express Link (CXL)-based protocol, a Cache Coherent Interconnect for Accelerators (CCIX)-based protocol, and a Transmission Control Protocol/Internet Protocol (TCP/IP)-based protocol. 8. The apparatus of claim 7, wherein the interconnect protocol is a PCIe-based protocol, and the packet is a PCIe-based Transaction Layer Packet (TLP). 9. The apparatus of claim 8, wherein the packet is a Memory Request TLP or a Completion TLP. 10. A method comprising:
obtaining, at a sender agent, data to be transmitted to a receiver agent via a packet compatible with a Peripheral Component Interconnect Express (PCIe)-based protocol; determining that a value for a particular header field of the packet can be inferred by the receiver agent based on one or more header field values for a previously transmitted packet; constructing a packet header for the data, wherein constructing the packet header comprises omitting the particular header field from the packet header based on determining that the value for the particular header field may be inferred by the receiver agent; and transmitting the packet with the packet header to the receiver agent. 11. An apparatus comprising:
a port comprising circuitry to implement one or more layers of a Peripheral Component Interconnect Express (PCIe)-based protocol, wherein: the circuitry is to receive a particular packet from another device over a link, wherein the particular packet is compatible with the PCIe-based protocol and the link is based on the PCIe-based protocol; and the agent is to:
detect that a particular header field is omitted from a header of the particular packet;
determine a value for the particular header field based at least in part on a cached value for the particular header field from another packet previously received on the link; and
use the determined value for the particular header field of the particular packet. 12. The apparatus of claim 11, wherein the agent is to determine the value for the particular header field further based on a value for another header field from the previously received packet. 13. The apparatus of claim 11, wherein the agent is to determine the value for the particular header field by adding the cached value for the particular header field and the value for the header field from previously received packet. 14. The apparatus of claim 11, wherein the agent is to determine the value for the particular header field by incrementing the cached value for the particular header field by a predetermined amount. 15. The apparatus of claim 11, wherein the determined value for the particular header field is the same as the cached value for the particular header field. 16. The apparatus of claim 11, wherein the agent is further to cache the determined value for the particular header field. 17. The apparatus of claim 11, wherein the particular header field is a tag header field, an upper address header field, an address header field, a length header field, a steering tag header field, a byte enable header field, a byte count header field, a requester identification header field, a lower address header field, or an optional features header field. 18. The apparatus of claim 11, wherein the particular packet is a PCIe-based Transaction Layer Packet (TLP). 19. A system comprising:
a first device; and a second device coupled to the first device over a link based on a Peripheral Component Interconnect Express (PCIe)-based protocol; wherein the first device comprises a port comprising circuitry to implement one or more layers of the PCIe-based protocol, the port comprising an agent to:
obtain data to be transmitted to the second device over the link via a packet, wherein the packet is to comprise a header;
determine that a value for a particular header field of the packet can be inferred by the second device based on one or more header field values for a previously transmitted packet; and
cause a header to be constructed for the packet, wherein the header is to be constructed to omit the particular header field from the packet header based on determining that the value for the particular header field may be inferred by the other device;
wherein the port is to use the circuitry to transmit the packet with the header to the second device. 20. The system of claim 19, wherein the second device comprises:
a port comprising circuitry to implement one or more layers of the PCIe-based protocol, wherein the circuitry is to receive the packet from the first device over the link and the agent is to:
detect that a particular header field is omitted from the header of the packet;
determine a value for the particular header field based at least in part on a cached value for the particular header field from another packet previously received on the link; and
use the determined value for the particular header field of the particular packet. | 2,100 |
6,705 | 6,705 | 14,749,141 | 2,126 | Systems and methods are described for generating recommendations for content items and ranking categories of content based on a user's consumption history. The content items may comprise various forms of media content, including, video, audio, Internet webpages, etc. When a user or consumption device accesses content items, a computing device may monitor the amount of the content items consumed by a user over one or more consumption sessions. In one embodiment, a user may identify content preferences and/or provide other input to the recommendation system to further customize content rankings and recommendations. | 1. A method comprising:
identifying, by a computing device, a first plurality of content items consumed by a user; identifying a first plurality of content elements included in a first ranking category; determining a first ranking for each content element in the first plurality of content elements; identifying a first set of content items in the first plurality of content items corresponding to the first plurality of content elements; for each content item in the first set of content items, adjusting a secondary score value for a content element having a highest first ranking; determining second rankings for each content element in the first plurality of content elements based at least on their respective secondary score value; and generating a content recommendation for the user based at least in part on the second rankings. 2. The method of claim 1, further comprising:
determining a primary score value for each content element in the first plurality of content elements. 3. The method of claim 2, further comprising:
identifying, in the first plurality of content items consumed by the user, one or more content items featuring at least a first content element in the first plurality of content elements. 4. The method of claim 3, further comprising:
for each content item in the one or more content items:
determining an amount of the content item consumed by the user; and
determining a primary score value for the first content element based at least on a threshold amount of the content item consumed by the user. 5. The method of claim 1, further comprising:
adjusting the second rankings for one or more content elements based at least on content preferences of the user. 6. The method of claim 1, further comprising:
determining implicit content favorites for the user based at least on the second rankings. 7. The method of claim 6, wherein a number of implicit favorites for the user is determined based at least in part on a number of content items in the first plurality of content items. 8. The method of claim 1, wherein the first ranking category comprises team sports. 9. A method comprising:
identifying, by a computing device, a first plurality of content items consumed by a user; identifying a first plurality of content elements included in a first ranking category; determining a first ranking for each content element in the first plurality of content elements; identifying a first set of content items in the first plurality of content items corresponding to the first plurality of content elements; for each content element in order of descending first ranking:
identifying one or more content items in the first set of content items corresponding to a content element having a highest first ranking;
adjusting a score value for the content element having the highest first ranking in accordance with the one or more content items in the first set of content items;
determining second rankings for each content element in the first plurality of content elements based at least upon their respective score value; and recommending a first content item for consumption by the user based at least in part on the second rankings. 10. The method of claim 9, further comprising:
outputting for display on a display device at least the first content item. 11. The method of claim 9, further comprising:
enabling the user to interact with a plurality of ranking categories on a user interface. 12. The method of claim 11, further comprising:
receiving, via the user interface, a request for content item recommendations. 13. The method of claim 11, further comprising:
adjusting the second rankings for one or more content elements based at least on data retrieved from a social networking site. 14. A method comprising:
identifying a plurality of content items consumed by a user; determining a first ranking category; ranking a first set of content elements according to a predetermined process based at least on a consumption history of the user and the first ranking category; determining a second set of content elements based at least on a threshold difference in respective secondary score values between one or more ranked content elements in the first set of content elements; and generating a content recommendation for the user based at least in part on a first content element in the second set of content elements. 15. The method of claim 14, further comprising:
identifying one or more content items featuring at least the first content element. 16. The method of claim 14, further comprising:
adjusting a first aspect of a program listing in an electronic program guide based at least on the content recommendation. 17. The method of claim 16, wherein adjusting the first aspect of the program listing further comprises:
visually emphasizing a representation of the program listing in the electronic program guide. 18. The method of claim 14, wherein determining the first ranking category further comprises:
receiving, via a user interface, user input selection indicating at least a first category of content. 19. The method of claim 14, wherein the first ranking category comprises team sports. 20. The method of claim 14, further comprising:
adjusting rankings for the first set of content elements based at least on content preferences of the user. | Systems and methods are described for generating recommendations for content items and ranking categories of content based on a user's consumption history. The content items may comprise various forms of media content, including, video, audio, Internet webpages, etc. When a user or consumption device accesses content items, a computing device may monitor the amount of the content items consumed by a user over one or more consumption sessions. In one embodiment, a user may identify content preferences and/or provide other input to the recommendation system to further customize content rankings and recommendations.1. A method comprising:
identifying, by a computing device, a first plurality of content items consumed by a user; identifying a first plurality of content elements included in a first ranking category; determining a first ranking for each content element in the first plurality of content elements; identifying a first set of content items in the first plurality of content items corresponding to the first plurality of content elements; for each content item in the first set of content items, adjusting a secondary score value for a content element having a highest first ranking; determining second rankings for each content element in the first plurality of content elements based at least on their respective secondary score value; and generating a content recommendation for the user based at least in part on the second rankings. 2. The method of claim 1, further comprising:
determining a primary score value for each content element in the first plurality of content elements. 3. The method of claim 2, further comprising:
identifying, in the first plurality of content items consumed by the user, one or more content items featuring at least a first content element in the first plurality of content elements. 4. The method of claim 3, further comprising:
for each content item in the one or more content items:
determining an amount of the content item consumed by the user; and
determining a primary score value for the first content element based at least on a threshold amount of the content item consumed by the user. 5. The method of claim 1, further comprising:
adjusting the second rankings for one or more content elements based at least on content preferences of the user. 6. The method of claim 1, further comprising:
determining implicit content favorites for the user based at least on the second rankings. 7. The method of claim 6, wherein a number of implicit favorites for the user is determined based at least in part on a number of content items in the first plurality of content items. 8. The method of claim 1, wherein the first ranking category comprises team sports. 9. A method comprising:
identifying, by a computing device, a first plurality of content items consumed by a user; identifying a first plurality of content elements included in a first ranking category; determining a first ranking for each content element in the first plurality of content elements; identifying a first set of content items in the first plurality of content items corresponding to the first plurality of content elements; for each content element in order of descending first ranking:
identifying one or more content items in the first set of content items corresponding to a content element having a highest first ranking;
adjusting a score value for the content element having the highest first ranking in accordance with the one or more content items in the first set of content items;
determining second rankings for each content element in the first plurality of content elements based at least upon their respective score value; and recommending a first content item for consumption by the user based at least in part on the second rankings. 10. The method of claim 9, further comprising:
outputting for display on a display device at least the first content item. 11. The method of claim 9, further comprising:
enabling the user to interact with a plurality of ranking categories on a user interface. 12. The method of claim 11, further comprising:
receiving, via the user interface, a request for content item recommendations. 13. The method of claim 11, further comprising:
adjusting the second rankings for one or more content elements based at least on data retrieved from a social networking site. 14. A method comprising:
identifying a plurality of content items consumed by a user; determining a first ranking category; ranking a first set of content elements according to a predetermined process based at least on a consumption history of the user and the first ranking category; determining a second set of content elements based at least on a threshold difference in respective secondary score values between one or more ranked content elements in the first set of content elements; and generating a content recommendation for the user based at least in part on a first content element in the second set of content elements. 15. The method of claim 14, further comprising:
identifying one or more content items featuring at least the first content element. 16. The method of claim 14, further comprising:
adjusting a first aspect of a program listing in an electronic program guide based at least on the content recommendation. 17. The method of claim 16, wherein adjusting the first aspect of the program listing further comprises:
visually emphasizing a representation of the program listing in the electronic program guide. 18. The method of claim 14, wherein determining the first ranking category further comprises:
receiving, via a user interface, user input selection indicating at least a first category of content. 19. The method of claim 14, wherein the first ranking category comprises team sports. 20. The method of claim 14, further comprising:
adjusting rankings for the first set of content elements based at least on content preferences of the user. | 2,100 |
6,706 | 6,706 | 16,120,719 | 2,119 | A method for managing distributed renewable energy systems comprising receiving first meter data for a plurality of first meters, each of the plurality of first meters associated with a renewable energy power generation component at an institution and measuring an amount of power generated by each associated renewable energy power generation component over a first period of time. Receiving second meter data for a plurality of second meters, each of the plurality of second meters associated with an institution having a renewable energy power generation component and measuring an amount of power consumed by each associated institution over a period of second time. Determining a difference between the amount of power measured by each of the first meters and the amount of power measured by a corresponding one of each of the second meters at each institution. | 1-15. (canceled) 16. A system comprising:
a first solar photovoltaic electricity generation systems coupled to an electric power grid and configured to generate first service data and first meter data defining an amount of energy generated by the first solar photovoltaic electricity generation system on a periodic basis over a first period of time; a first energy consumption system coupled to the first solar photovoltaic electricity generation system and configured to receive electric power from the first solar photovoltaic electricity generation system and to generate second meter data defining an amount of energy consumed by the first energy consumption system on a periodic basis over a second period of time; a second solar photovoltaic electricity generation system coupled to the electric power grid and configured to generate second service data and third meter data defining an amount of energy generated by the second solar photovoltaic electricity generation system on a periodic basis over a third period of time; a second energy consumption system coupled to the second solar photovoltaic electricity generation system and configured to receive electric power from the second solar photovoltaic electricity generation system and to generate fourth meter data defining an amount of energy consumed by the second energy consumption system on a periodic basis over a fourth period of time; and a service provider management system configured to generate maintenance data as a function of the first service data, the first meter data, the second meter data, the second service data, the third meter data and the fourth meter data. 17. The system of claim 16 wherein the service provider management system is configured to generate maintenance data as a function of maintenance service provider availability data. 18. The system of claim 16 wherein the service provider management system is configured to generate maintenance data as a function of availability data for a replacement part. 19. The system of claim 16 wherein the service provider management system is configured to generate maintenance data as a function of efficiency data for a replacement part. 20. The system of claim 16 wherein the service provider management system is configured to generate maintenance data as a function of routine maintenance data for the first photovoltaic system and emergency maintenance data for the second photovoltaic system. 21. The system of claim 16 wherein the service provider management system is configured to generate maintenance data as a function of an availability of a service provider that can perform a first routine maintenance data for the first photovoltaic system and a second routine maintenance for the second photovoltaic system. 22. The system of claim 16 wherein the service provider management system is configured to generate maintenance data as a function of an availability of a service provider that can perform a routine maintenance data for the first photovoltaic system and an emergency maintenance for the second photovoltaic system. 23. The system of claim 16 wherein the service provider management system is configured to generate maintenance data as a function of an availability of a first service provider that can perform a routine maintenance data for the first photovoltaic system and a second service provider that can perform an emergency maintenance for the second photovoltaic system. 24. A method comprising:
generating first service data and first meter data at a first solar photovoltaic electricity generation systems coupled to an electric power grid; defining an amount of energy generated by the first solar photovoltaic electricity generation system on a periodic basis over a first period of time; receiving electric power from the first solar photovoltaic electricity generation system at a first energy consumption system coupled to the first solar photovoltaic electricity generation system; generating second meter data defining an amount of energy consumed by the first energy consumption system on a periodic basis over a second period of time; generating second service data and third meter data at a second solar photovoltaic electricity generation systems coupled to the electric power grid; defining an amount of energy generated by the second solar photovoltaic electricity generation system on a periodic basis over a third period of time; receiving electric power from the second solar photovoltaic electricity generation system at a second energy consumption system coupled to the second solar photovoltaic electricity generation system; generating fourth meter data defining an amount of energy consumed by the second energy consumption system on a periodic basis over a fourth period of time; and generating maintenance data at a service provider management system as a function of the first service data, the first meter data, the second meter data, the second service data, the third meter data and the fourth meter data. 25. The method of claim 24 wherein the service provider management system generates maintenance data as a function of maintenance service provider availability data. 26. The method of claim 24 wherein the service provider management system generates maintenance data as a function of availability data for a replacement part. 27. The method of claim 24 wherein the service provider management system generates maintenance data as a function of efficiency data for a replacement part. 28. The method of claim 24 wherein the service provider management system generates maintenance data as a function of routine maintenance data for the first photovoltaic system and emergency maintenance data for the second photovoltaic system. 29. The method of claim 24 wherein the service provider management system generates maintenance data as a function of an availability of a service provider that can perform a first routine maintenance data for the first photovoltaic system and a second routine maintenance for the second photovoltaic system. 30. The method of claim 24 wherein the service provider management system generates maintenance data as a function of an availability of a service provider that can perform a routine maintenance data for the first photovoltaic system and an emergency maintenance for the second photovoltaic system. 31. The method of claim 24 wherein the service provider management system generates maintenance data as a function of an availability of a first service provider that can perform a routine maintenance data for the first photovoltaic system and a second service provider that can perform an emergency maintenance for the second photovoltaic system. | A method for managing distributed renewable energy systems comprising receiving first meter data for a plurality of first meters, each of the plurality of first meters associated with a renewable energy power generation component at an institution and measuring an amount of power generated by each associated renewable energy power generation component over a first period of time. Receiving second meter data for a plurality of second meters, each of the plurality of second meters associated with an institution having a renewable energy power generation component and measuring an amount of power consumed by each associated institution over a period of second time. Determining a difference between the amount of power measured by each of the first meters and the amount of power measured by a corresponding one of each of the second meters at each institution.1-15. (canceled) 16. A system comprising:
a first solar photovoltaic electricity generation systems coupled to an electric power grid and configured to generate first service data and first meter data defining an amount of energy generated by the first solar photovoltaic electricity generation system on a periodic basis over a first period of time; a first energy consumption system coupled to the first solar photovoltaic electricity generation system and configured to receive electric power from the first solar photovoltaic electricity generation system and to generate second meter data defining an amount of energy consumed by the first energy consumption system on a periodic basis over a second period of time; a second solar photovoltaic electricity generation system coupled to the electric power grid and configured to generate second service data and third meter data defining an amount of energy generated by the second solar photovoltaic electricity generation system on a periodic basis over a third period of time; a second energy consumption system coupled to the second solar photovoltaic electricity generation system and configured to receive electric power from the second solar photovoltaic electricity generation system and to generate fourth meter data defining an amount of energy consumed by the second energy consumption system on a periodic basis over a fourth period of time; and a service provider management system configured to generate maintenance data as a function of the first service data, the first meter data, the second meter data, the second service data, the third meter data and the fourth meter data. 17. The system of claim 16 wherein the service provider management system is configured to generate maintenance data as a function of maintenance service provider availability data. 18. The system of claim 16 wherein the service provider management system is configured to generate maintenance data as a function of availability data for a replacement part. 19. The system of claim 16 wherein the service provider management system is configured to generate maintenance data as a function of efficiency data for a replacement part. 20. The system of claim 16 wherein the service provider management system is configured to generate maintenance data as a function of routine maintenance data for the first photovoltaic system and emergency maintenance data for the second photovoltaic system. 21. The system of claim 16 wherein the service provider management system is configured to generate maintenance data as a function of an availability of a service provider that can perform a first routine maintenance data for the first photovoltaic system and a second routine maintenance for the second photovoltaic system. 22. The system of claim 16 wherein the service provider management system is configured to generate maintenance data as a function of an availability of a service provider that can perform a routine maintenance data for the first photovoltaic system and an emergency maintenance for the second photovoltaic system. 23. The system of claim 16 wherein the service provider management system is configured to generate maintenance data as a function of an availability of a first service provider that can perform a routine maintenance data for the first photovoltaic system and a second service provider that can perform an emergency maintenance for the second photovoltaic system. 24. A method comprising:
generating first service data and first meter data at a first solar photovoltaic electricity generation systems coupled to an electric power grid; defining an amount of energy generated by the first solar photovoltaic electricity generation system on a periodic basis over a first period of time; receiving electric power from the first solar photovoltaic electricity generation system at a first energy consumption system coupled to the first solar photovoltaic electricity generation system; generating second meter data defining an amount of energy consumed by the first energy consumption system on a periodic basis over a second period of time; generating second service data and third meter data at a second solar photovoltaic electricity generation systems coupled to the electric power grid; defining an amount of energy generated by the second solar photovoltaic electricity generation system on a periodic basis over a third period of time; receiving electric power from the second solar photovoltaic electricity generation system at a second energy consumption system coupled to the second solar photovoltaic electricity generation system; generating fourth meter data defining an amount of energy consumed by the second energy consumption system on a periodic basis over a fourth period of time; and generating maintenance data at a service provider management system as a function of the first service data, the first meter data, the second meter data, the second service data, the third meter data and the fourth meter data. 25. The method of claim 24 wherein the service provider management system generates maintenance data as a function of maintenance service provider availability data. 26. The method of claim 24 wherein the service provider management system generates maintenance data as a function of availability data for a replacement part. 27. The method of claim 24 wherein the service provider management system generates maintenance data as a function of efficiency data for a replacement part. 28. The method of claim 24 wherein the service provider management system generates maintenance data as a function of routine maintenance data for the first photovoltaic system and emergency maintenance data for the second photovoltaic system. 29. The method of claim 24 wherein the service provider management system generates maintenance data as a function of an availability of a service provider that can perform a first routine maintenance data for the first photovoltaic system and a second routine maintenance for the second photovoltaic system. 30. The method of claim 24 wherein the service provider management system generates maintenance data as a function of an availability of a service provider that can perform a routine maintenance data for the first photovoltaic system and an emergency maintenance for the second photovoltaic system. 31. The method of claim 24 wherein the service provider management system generates maintenance data as a function of an availability of a first service provider that can perform a routine maintenance data for the first photovoltaic system and a second service provider that can perform an emergency maintenance for the second photovoltaic system. | 2,100 |
6,707 | 6,707 | 15,491,131 | 2,164 | A system, method, and non-transitory computer-readable storage medium for identifying resolutions have been disclosed. The system comprises a server device including a memory, a processor, and a network interface. The memory includes instructions executable by the processor to cause the system to record a series of actions associated with a client device and to receive, from the client device, incident data of an incident that is associated with the series of actions. The memory further includes instructions executable by the processor to cause the system to query a database for resolution information based on the series of actions and the incident data and to transmit a message that includes the resolution information to the client device. | 1. A system for identifying resolutions, the system comprising:
a server device including a memory, a processor, and a network interface, wherein the memory includes instructions executable by the processor to cause the system to:
record a series of actions associated with a client device;
receive, from the client device, incident data of an incident that is associated with the series of actions;
query a database for resolution information based on the series of actions and the incident data; and
transmit a message that includes the resolution information to the client device. 2. The system of claim 1, wherein the incident data includes an object identifier and a description of the incident, further wherein the incident is caused by interaction with an object associated with the object identifier. 3. The system of claim 1, wherein the resolution information includes any of historical information indicating how other incidents related to the incident have been previously resolved and a list of similar resolutions associated with the incident. 4. The system of claim 1, wherein the memory further includes instructions executable by the processor to cause the system to:
store the series of actions and the incident data in a tree type structure in the database. 5. The system of claim 4, wherein the memory further includes instructions executable by the processor to cause the system to:
update the tree type structure using a machine learning mechanism. 6. The system of claim 1, wherein the series of actions includes any of one or more commands of the client device and one or more corresponding transaction steps of the server device, further wherein the one or more commands comprises a set of user interface interactions. 7. The system of claim 1, wherein the memory further includes instructions executable by the processor to cause the system to:
receive a request from the client device to initiate the recording of the series of actions. 8. The system of claim 7, wherein to record the series of actions associated with the client device further comprises to:
continuously record actions associated with the client device; receive an indication of the incident; and identify the series of actions from the continuously recorded actions. 9. The system of claim 1, wherein the memory further includes instructions executable by the processor to cause the system to:
create an incident report including the series of actions and the incident data. 10. A method for identifying resolutions, the method comprising:
recording a series of actions associated with a client device; receiving, from the client device, incident data of an incident that is associated with the series of actions; querying a database for resolution information based on the series of actions and the incident data; and transmitting a message that includes the resolution information to the client device. 11. The method of claim 10, wherein the incident data includes an object identifier and a description of the incident, further wherein the incident is caused by interaction with an object associated with the object identifier. 12. The method of claim 10, wherein the resolution information includes any of historical information indicating how other incidents related to the incident have been previously resolved and a list of similar resolutions associated with the incident. 13. The method of claim 10, further comprising:
storing the series of actions and the incident data in a tree type structure in the database; and updating the tree type structure using a machine learning mechanism. 14. The method of claim 10, wherein the series of actions includes any of one or more commands of the client device and one or more corresponding transaction steps of the server device, further wherein the one or more commands comprises a set of user interface interactions. 15. The method of claim 10, wherein recording the series of actions associated with the client device further comprises:
continuously recording actions associated with the client device; receiving an indication of the incident; and identifying the series of actions from the continuously recorded actions. 16. A non-transitory computer-readable storage medium for identifying resolutions, wherein the non-transitory computer-readable storage medium includes executable instructions that, when executed by a processor, facilitate performance of operations, the operations comprising:
recording a series of actions associated with a client device; receiving, from the client device, incident data of an incident that is associated with the series of actions; querying a database for resolution information based on the series of actions and the incident data; and transmitting a message that includes the resolution information to the client device. 17. The non-transitory computer-readable storage medium of claim 16, wherein the resolution information includes any of historical information indicating how other incidents related to the incident have been previously resolved and a list of similar resolutions associated with the incident. 19. The non-transitory computer-readable storage medium of claim 16, the operations further comprising:
storing the series of transaction steps and the incident data in a tree type structure in the database; and updating the tree type structure using a machine learning mechanism. 20. The non-transitory computer-readable storage medium of claim 19, wherein the operations comprising recording the series of actions associated with the client device includes operations further comprising:
continuously recording actions associated with the client device; receiving an indication of the incident; and identifying the series of actions from the continuously recorded actions. | A system, method, and non-transitory computer-readable storage medium for identifying resolutions have been disclosed. The system comprises a server device including a memory, a processor, and a network interface. The memory includes instructions executable by the processor to cause the system to record a series of actions associated with a client device and to receive, from the client device, incident data of an incident that is associated with the series of actions. The memory further includes instructions executable by the processor to cause the system to query a database for resolution information based on the series of actions and the incident data and to transmit a message that includes the resolution information to the client device.1. A system for identifying resolutions, the system comprising:
a server device including a memory, a processor, and a network interface, wherein the memory includes instructions executable by the processor to cause the system to:
record a series of actions associated with a client device;
receive, from the client device, incident data of an incident that is associated with the series of actions;
query a database for resolution information based on the series of actions and the incident data; and
transmit a message that includes the resolution information to the client device. 2. The system of claim 1, wherein the incident data includes an object identifier and a description of the incident, further wherein the incident is caused by interaction with an object associated with the object identifier. 3. The system of claim 1, wherein the resolution information includes any of historical information indicating how other incidents related to the incident have been previously resolved and a list of similar resolutions associated with the incident. 4. The system of claim 1, wherein the memory further includes instructions executable by the processor to cause the system to:
store the series of actions and the incident data in a tree type structure in the database. 5. The system of claim 4, wherein the memory further includes instructions executable by the processor to cause the system to:
update the tree type structure using a machine learning mechanism. 6. The system of claim 1, wherein the series of actions includes any of one or more commands of the client device and one or more corresponding transaction steps of the server device, further wherein the one or more commands comprises a set of user interface interactions. 7. The system of claim 1, wherein the memory further includes instructions executable by the processor to cause the system to:
receive a request from the client device to initiate the recording of the series of actions. 8. The system of claim 7, wherein to record the series of actions associated with the client device further comprises to:
continuously record actions associated with the client device; receive an indication of the incident; and identify the series of actions from the continuously recorded actions. 9. The system of claim 1, wherein the memory further includes instructions executable by the processor to cause the system to:
create an incident report including the series of actions and the incident data. 10. A method for identifying resolutions, the method comprising:
recording a series of actions associated with a client device; receiving, from the client device, incident data of an incident that is associated with the series of actions; querying a database for resolution information based on the series of actions and the incident data; and transmitting a message that includes the resolution information to the client device. 11. The method of claim 10, wherein the incident data includes an object identifier and a description of the incident, further wherein the incident is caused by interaction with an object associated with the object identifier. 12. The method of claim 10, wherein the resolution information includes any of historical information indicating how other incidents related to the incident have been previously resolved and a list of similar resolutions associated with the incident. 13. The method of claim 10, further comprising:
storing the series of actions and the incident data in a tree type structure in the database; and updating the tree type structure using a machine learning mechanism. 14. The method of claim 10, wherein the series of actions includes any of one or more commands of the client device and one or more corresponding transaction steps of the server device, further wherein the one or more commands comprises a set of user interface interactions. 15. The method of claim 10, wherein recording the series of actions associated with the client device further comprises:
continuously recording actions associated with the client device; receiving an indication of the incident; and identifying the series of actions from the continuously recorded actions. 16. A non-transitory computer-readable storage medium for identifying resolutions, wherein the non-transitory computer-readable storage medium includes executable instructions that, when executed by a processor, facilitate performance of operations, the operations comprising:
recording a series of actions associated with a client device; receiving, from the client device, incident data of an incident that is associated with the series of actions; querying a database for resolution information based on the series of actions and the incident data; and transmitting a message that includes the resolution information to the client device. 17. The non-transitory computer-readable storage medium of claim 16, wherein the resolution information includes any of historical information indicating how other incidents related to the incident have been previously resolved and a list of similar resolutions associated with the incident. 19. The non-transitory computer-readable storage medium of claim 16, the operations further comprising:
storing the series of transaction steps and the incident data in a tree type structure in the database; and updating the tree type structure using a machine learning mechanism. 20. The non-transitory computer-readable storage medium of claim 19, wherein the operations comprising recording the series of actions associated with the client device includes operations further comprising:
continuously recording actions associated with the client device; receiving an indication of the incident; and identifying the series of actions from the continuously recorded actions. | 2,100 |
6,708 | 6,708 | 14,726,182 | 2,139 | The present disclosure describes, among other things, a method for managing and optimizing distributed object storage on a plurality of storage devices of a storage cluster. The method comprises computing, by a states engine, respective scores associated with the storage devices based on a set of characteristics associated with each storage device and a set of weights corresponding to the set of characteristics, and computing, by the states engine, respective bucket weights for leaf nodes and parent node(s) of a hierarchical map of the storage cluster based on the respective scores associated with the storage devices, wherein each leaf nodes represent a corresponding storage device and each parent node aggregates one or more storage devices. | 1. A method for managing and optimizing distributed object storage on a plurality of storage devices of a storage cluster, the method comprising:
computing, by a states engine, respective scores associated with the storage devices based on a set of characteristics associated with each storage device and a set of weights corresponding to the set of characteristics; and computing, by the states engine, respective bucket weights for leaf nodes and parent node(s) of a hierarchical map of the storage cluster based on the respective scores associated with the storage devices, wherein each leaf nodes represent a corresponding storage device and each parent node aggregates one or more storage devices. 2. The method of claim 1, further comprising:
determining, by an optimization engine, based on a pseudo-random data distribution procedure, a plurality of storage devices for distributing object replicas across the storage cluster using the respective bucket weights. 3. The method of claim 1, further comprising:
selecting, by an optimization engine, a primary replica from a plurality of replicas of an object stored in the storage cluster based on the respective scores associated with storage units on which the plurality of replicas are stored. 4. The method of claim 1, wherein the set of characteristics comprises one or more: capacity, latency, average load, peak load, age, data transfer rate, performance rating, power consumption, object volume, number of read requests, number of write requests, and availability of data recovery feature(s). 5. The method of claim 1, wherein computing the respective score comprises computing a weighted sum of characteristics based on the set of characteristics and the set of weights corresponding to the set of characteristics. 6. The method of claim 1, wherein computing the respective score comprises computing a normalized score as the respective score based on
c
+
S
-
Min
c
+
Max
-
Min
,
wherein c is a constant, S is the respective score, Min is the minimum score of all respective scores, and Max is the maximum score of all respective scores. 7. The method of claim 1, wherein computing the respective bucket weight for a particular leaf node representing a corresponding storage device comprises assigning the respective score associated with the corresponding storage device as the respective bucket weight for the particular leaf node. 8. The method of claim 1, wherein computing the respective bucket weight for a particular parent node aggregating one or more storage devices comprises assigning a sum of respective bucket weight(s) for child node(s) of the parent node in the hierarchical map as the respective bucket weight of the particular parent node. 9. The method of claim 1, further comprising:
updating, by the states manager, the respective bucket weights by computing the respective scores again in response to one or more storage devices being added to the storage cluster and/or one or more storage devices being removed from the storage cluster. 10. The method of claim 1, further comprising:
generating, by a visualization generator, a graphical representation of leaf nodes and parent node(s) of the hierarchical map as a tree for display to a user, wherein a particular leaf node of the tree comprises a user interface element graphically illustrating one or more of the characteristics in the set of characteristics associated with the corresponding storage device of being represented by the particular leaf node. 11. A distributed objects storage optimizer for managing and optimizing distributed object storage on a plurality of storage devices of a storage cluster, comprising:
at least one memory element; at least one processor coupled to the at least one memory element; and a states engine that when executed by the at least one processor is configured to:
compute respective scores associated with the storage devices based on a set of characteristics associated with each storage device and a set of weights corresponding to the set of characteristics; and
compute respective bucket weights for leaf nodes and parent node(s) of a hierarchical map of the storage cluster based on the respective scores associated with the storage devices, wherein each leaf nodes represent a corresponding storage device and each parent node aggregates one or more storage devices. 12. The distributed objects storage optimizer of claim 11, further comprising:
an optimization engine that when executed by the at least one processor is configured to determine based on a pseudo-random data distribution procedure, a plurality of storage devices for distributing object replicas across the storage cluster using the respective bucket weights. 13. The distributed objects storage optimizer of claim 11, further comprising:
an optimization engine that when executed by the at least one processor is configured to select a primary replica from a plurality of replicas of an object stored in the storage cluster based on the respective scores associated with storage units on which the plurality of replicas are stored. 14. The distributed objects storage optimizer of claim 11, wherein the set of characteristics comprises one or more: capacity, latency, average load, peak load, age, data transfer rate, performance rating, power consumption, object volume, number of read requests, number of write requests, and availability of data recovery feature(s). 15. The distributed objects storage optimizer of claim 11, wherein computing the respective score comprises computing a weighted sum of characteristics based on the set of characteristics and the set of weights corresponding to the set of characteristics. 16. A computer-readable non-transitory medium comprising one or more instructions, for managing and optimizing distributed object storage on a plurality of storage devices of a storage cluster, that when executed on a processor configure the processor to perform one or more operations comprising:
computing, by a states engine, respective scores associated with the storage devices based on a set of characteristics associated with each storage device and a set of weights corresponding to the set of characteristics; and computing, by the states engine, respective bucket weights for leaf nodes and parent node(s) of a hierarchical map of the storage cluster based on the respective scores associated with the storage devices, wherein each leaf nodes represent a corresponding storage device and each parent node aggregates one or more storage devices. 17. The medium of claim 16, wherein computing the respective score comprises computing a normalized score as the respective score based on
c
+
S
-
Min
c
+
Max
-
Min
,
wherein c is a constant, S is the respective score, Min is the minimum score of all respective scores, and Max is the maximum score of all respective scores. 18. The medium of claim 16, wherein computing the respective bucket weight for a particular leaf node representing a corresponding storage device comprises assigning the respective score associated with the corresponding storage device as the respective bucket weight for the particular leaf node. 19. The medium of claim 16, wherein computing the respective bucket weight for a particular parent node aggregating one or more storage devices comprises assigning a sum of respective bucket weight(s) for child node(s) of the parent node in the hierarchical map as the respective bucket weight of the particular parent node. 20. The medium of claim 16, wherein the operations further comprises:
updating the respective bucket weights by computing the respective scores again in response to one or more storage devices being added to the storage cluster and/or one or more storage devices being removed from the storage cluster. | The present disclosure describes, among other things, a method for managing and optimizing distributed object storage on a plurality of storage devices of a storage cluster. The method comprises computing, by a states engine, respective scores associated with the storage devices based on a set of characteristics associated with each storage device and a set of weights corresponding to the set of characteristics, and computing, by the states engine, respective bucket weights for leaf nodes and parent node(s) of a hierarchical map of the storage cluster based on the respective scores associated with the storage devices, wherein each leaf nodes represent a corresponding storage device and each parent node aggregates one or more storage devices.1. A method for managing and optimizing distributed object storage on a plurality of storage devices of a storage cluster, the method comprising:
computing, by a states engine, respective scores associated with the storage devices based on a set of characteristics associated with each storage device and a set of weights corresponding to the set of characteristics; and computing, by the states engine, respective bucket weights for leaf nodes and parent node(s) of a hierarchical map of the storage cluster based on the respective scores associated with the storage devices, wherein each leaf nodes represent a corresponding storage device and each parent node aggregates one or more storage devices. 2. The method of claim 1, further comprising:
determining, by an optimization engine, based on a pseudo-random data distribution procedure, a plurality of storage devices for distributing object replicas across the storage cluster using the respective bucket weights. 3. The method of claim 1, further comprising:
selecting, by an optimization engine, a primary replica from a plurality of replicas of an object stored in the storage cluster based on the respective scores associated with storage units on which the plurality of replicas are stored. 4. The method of claim 1, wherein the set of characteristics comprises one or more: capacity, latency, average load, peak load, age, data transfer rate, performance rating, power consumption, object volume, number of read requests, number of write requests, and availability of data recovery feature(s). 5. The method of claim 1, wherein computing the respective score comprises computing a weighted sum of characteristics based on the set of characteristics and the set of weights corresponding to the set of characteristics. 6. The method of claim 1, wherein computing the respective score comprises computing a normalized score as the respective score based on
c
+
S
-
Min
c
+
Max
-
Min
,
wherein c is a constant, S is the respective score, Min is the minimum score of all respective scores, and Max is the maximum score of all respective scores. 7. The method of claim 1, wherein computing the respective bucket weight for a particular leaf node representing a corresponding storage device comprises assigning the respective score associated with the corresponding storage device as the respective bucket weight for the particular leaf node. 8. The method of claim 1, wherein computing the respective bucket weight for a particular parent node aggregating one or more storage devices comprises assigning a sum of respective bucket weight(s) for child node(s) of the parent node in the hierarchical map as the respective bucket weight of the particular parent node. 9. The method of claim 1, further comprising:
updating, by the states manager, the respective bucket weights by computing the respective scores again in response to one or more storage devices being added to the storage cluster and/or one or more storage devices being removed from the storage cluster. 10. The method of claim 1, further comprising:
generating, by a visualization generator, a graphical representation of leaf nodes and parent node(s) of the hierarchical map as a tree for display to a user, wherein a particular leaf node of the tree comprises a user interface element graphically illustrating one or more of the characteristics in the set of characteristics associated with the corresponding storage device of being represented by the particular leaf node. 11. A distributed objects storage optimizer for managing and optimizing distributed object storage on a plurality of storage devices of a storage cluster, comprising:
at least one memory element; at least one processor coupled to the at least one memory element; and a states engine that when executed by the at least one processor is configured to:
compute respective scores associated with the storage devices based on a set of characteristics associated with each storage device and a set of weights corresponding to the set of characteristics; and
compute respective bucket weights for leaf nodes and parent node(s) of a hierarchical map of the storage cluster based on the respective scores associated with the storage devices, wherein each leaf nodes represent a corresponding storage device and each parent node aggregates one or more storage devices. 12. The distributed objects storage optimizer of claim 11, further comprising:
an optimization engine that when executed by the at least one processor is configured to determine based on a pseudo-random data distribution procedure, a plurality of storage devices for distributing object replicas across the storage cluster using the respective bucket weights. 13. The distributed objects storage optimizer of claim 11, further comprising:
an optimization engine that when executed by the at least one processor is configured to select a primary replica from a plurality of replicas of an object stored in the storage cluster based on the respective scores associated with storage units on which the plurality of replicas are stored. 14. The distributed objects storage optimizer of claim 11, wherein the set of characteristics comprises one or more: capacity, latency, average load, peak load, age, data transfer rate, performance rating, power consumption, object volume, number of read requests, number of write requests, and availability of data recovery feature(s). 15. The distributed objects storage optimizer of claim 11, wherein computing the respective score comprises computing a weighted sum of characteristics based on the set of characteristics and the set of weights corresponding to the set of characteristics. 16. A computer-readable non-transitory medium comprising one or more instructions, for managing and optimizing distributed object storage on a plurality of storage devices of a storage cluster, that when executed on a processor configure the processor to perform one or more operations comprising:
computing, by a states engine, respective scores associated with the storage devices based on a set of characteristics associated with each storage device and a set of weights corresponding to the set of characteristics; and computing, by the states engine, respective bucket weights for leaf nodes and parent node(s) of a hierarchical map of the storage cluster based on the respective scores associated with the storage devices, wherein each leaf nodes represent a corresponding storage device and each parent node aggregates one or more storage devices. 17. The medium of claim 16, wherein computing the respective score comprises computing a normalized score as the respective score based on
c
+
S
-
Min
c
+
Max
-
Min
,
wherein c is a constant, S is the respective score, Min is the minimum score of all respective scores, and Max is the maximum score of all respective scores. 18. The medium of claim 16, wherein computing the respective bucket weight for a particular leaf node representing a corresponding storage device comprises assigning the respective score associated with the corresponding storage device as the respective bucket weight for the particular leaf node. 19. The medium of claim 16, wherein computing the respective bucket weight for a particular parent node aggregating one or more storage devices comprises assigning a sum of respective bucket weight(s) for child node(s) of the parent node in the hierarchical map as the respective bucket weight of the particular parent node. 20. The medium of claim 16, wherein the operations further comprises:
updating the respective bucket weights by computing the respective scores again in response to one or more storage devices being added to the storage cluster and/or one or more storage devices being removed from the storage cluster. | 2,100 |
6,709 | 6,709 | 16,147,190 | 2,191 | Various systems and methods are provided for implementing a software defined industrial system. In an example, self-descriptive control applications and software modules are provided in the context of orchestratable distributed systems. The self-descriptive control applications may be executed by an orchestrator or like control device, configured to: identify available software modules adapted to perform functional operations in a control system environment; identify operational characteristics that identify characteristics of execution of the available software modules that are available to implement a control system application; select a software module for execution based on the operational configuration and the operational characteristics identified in the manifest; and cause the execution of the selected software module in the control system environment based on an application specification for the control system application. | 1. An apparatus, comprising processing circuitry adapted to:
identify operational aspects of available software modules, the available software modules adapted to perform functional operations in a control system environment; identify operational characteristics from a module manifest, wherein the operational characteristics define an environment for the available software modules to perform a control system application; select a software module of the available software modules, based on the identified operational aspects of the available software modules and the identified operational characteristics from the module manifest; and cause execution of the selected software module in the control system environment, wherein the execution occurs according to an application specification for the control system application. 2. The apparatus of claim 1, wherein the operational aspects of the available software modules relate to one or more of: communication interfaces, starting parameters, platform requirements, dependencies, deployment requirements, or a signature. 3. The apparatus of claim 1, the processing circuitry further adapted to:
generate the application specification for the control system application, based on the operational characteristics, and the selected software module; wherein the application specification defines values for control parameters of the selected software module. 4. The apparatus of claim 3, wherein the application specification indicates a connection from the selected software module to a second selected software module. 5. The apparatus of claim 1, the processing circuitry further adapted to:
evaluate the execution of the selected software module in the control system environment using at least two different hardware architectures; and perform an efficiency measurement of operations executed with the at least two different hardware architectures. 6. The apparatus of claim 1, wherein the control system application and respective software modules are displayed as a visual representation in a graphical user interface, wherein the visual representation is used to establish relationships of one or more inputs or outputs of the software modules within the control system application, wherein the inputs or outputs to the software modules include use of one or more of: a sensor, an actuator, or a controller. 7. The apparatus of claim 1, wherein the apparatus is an orchestration device, wherein the orchestration device is operably coupled to a plurality of execution devices in the control system environment that execute software modules, and wherein the execution of the selected software module via at least one execution devices effects functional operation of one or more control devices in the control system environment. 8. The apparatus of claim 7, wherein the processing circuitry is further adapted to coordinate the execution of the selected software module with an orchestration control strategy within the control system environment. 9. The apparatus of claim 1, wherein the processing circuitry is further adapted to:
select a plurality of software modules, the plurality of software modules including a selection of the software module; and connect the plurality of software modules to each other according to the operational characteristics. 10. A method, comprising:
identifying operational aspects of available software modules, the available software modules adapted to perform functional operations in a control system environment; identifying operational characteristics from a module manifest, wherein the operational characteristics define an environment for the available software modules to perform a control system application; selecting a software module of the available software modules, based on the identified operational aspects of the available software modules and the identified operational characteristics from the module manifest; and causing execution of the selected software module in the control system environment, wherein the execution occurs according to an application specification for the control system application. 11. The method of claim 10, wherein the operational aspects of the available software modules relate to one or more of: communication interfaces, starting parameters, platform requirements, dependencies, deployment requirements, or a signature. 12. The method of claim 10, further comprising:
generating the application specification for the control system application, based on the operational characteristics, and the selected software module; wherein the application specification defines values for control parameters of the selected software module, and wherein the application specification indicates a connection from the selected software module to a second selected software module. 13. The method of claim 10, further comprising:
evaluating the execution of the selected software module in the control system environment using at least two different hardware architectures; and identifying an efficiency measurement of operations executed with the at least two different hardware architectures. 14. The method of claim 10, wherein the control system application and respective software modules are displayed as a visual representation in a graphical user interface, wherein the visual representation is used to establish relationships of one or more inputs or outputs of the software modules within the control system application, wherein the inputs or outputs to the software modules include use of one or more of: a sensor, an actuator, or a controller. 15. The method of claim 10, wherein the method is performed by an orchestration device, wherein the orchestration device is operably coupled to a plurality of execution devices in the control system environment that execute software modules, and wherein the execution of the selected software module via at least one execution devices effects functional operation of one or more control devices in the control system environment. 16. The method of claim 15, further comprising:
coordinating the execution of the selected software module with an orchestration control strategy within the control system environment. 17. The method of claim 15, further comprising:
selecting a plurality of software modules for use in the control system environment, the plurality of software modules including the selection of the software module; and connecting the plurality of software modules to each other according to the operational characteristics. 18. At least one non-transitory machine-readable storage medium including instructions, wherein the instructions, when executed by a processing circuitry of a device, cause the processing circuitry to perform operations comprising:
identifying operational aspects of available software modules, the available software modules adapted to perform functional operations in a control system environment; identifying operational characteristics from a module manifest, wherein the operational characteristics define an environment for the available software modules to perform a control system application; selecting a software module of the available software modules, based on the identified operational aspects of the available software modules and the identified operational characteristics from the module manifest; and causing execution of the selected software module in the control system environment, wherein the execution occurs according to an application specification for the control system application. 19. The machine-readable medium of claim 18, wherein the operational aspects of the available software modules relate to one or more of:
communication interfaces, starting parameters, platform requirements, dependencies, deployment requirements, or a signature. 20. The machine-readable medium of claim 18, the operations further comprising:
generating the application specification for the control system application, based on the operational characteristics, and the selected software module; wherein the application specification defines values for control parameters of the selected software module, and wherein the application specification indicates a connection from the selected software module to a second selected software module. 21. The machine-readable medium of claim 18, the operations further comprising:
evaluating the execution of the selected software module in the control system environment using at least two different hardware architectures; and identifying an efficiency measurement of operations executed with the at least two different hardware architectures. 22. The machine-readable medium of claim 18, wherein the control system application and respective software modules are displayed as a visual representation in a graphical user interface, wherein the visual representation is used to establish relationships of one or more inputs or outputs of the software modules within the control system application, wherein the inputs or outputs to the software modules include use of one or more of: a sensor, an actuator, or a controller. 23. The machine-readable medium of claim 18, wherein the operations are performed by an orchestration device, wherein the orchestration device is operably coupled to a plurality of execution devices in the control system environment that execute software modules, and wherein the execution of the selected software module via at least one execution devices effects functional operation of one or more control devices in the control system environment. 24. The machine-readable medium of claim 23, the operations further comprising:
coordinating the execution of the selected software module with an orchestration control strategy within the control system environment. 25. The machine-readable medium of claim 23, the operations further comprising:
selecting a plurality of software modules for use in the control system environment, the plurality of software modules including the selection of the software module; and connecting the plurality of software modules to each other according to the operational characteristics. | Various systems and methods are provided for implementing a software defined industrial system. In an example, self-descriptive control applications and software modules are provided in the context of orchestratable distributed systems. The self-descriptive control applications may be executed by an orchestrator or like control device, configured to: identify available software modules adapted to perform functional operations in a control system environment; identify operational characteristics that identify characteristics of execution of the available software modules that are available to implement a control system application; select a software module for execution based on the operational configuration and the operational characteristics identified in the manifest; and cause the execution of the selected software module in the control system environment based on an application specification for the control system application.1. An apparatus, comprising processing circuitry adapted to:
identify operational aspects of available software modules, the available software modules adapted to perform functional operations in a control system environment; identify operational characteristics from a module manifest, wherein the operational characteristics define an environment for the available software modules to perform a control system application; select a software module of the available software modules, based on the identified operational aspects of the available software modules and the identified operational characteristics from the module manifest; and cause execution of the selected software module in the control system environment, wherein the execution occurs according to an application specification for the control system application. 2. The apparatus of claim 1, wherein the operational aspects of the available software modules relate to one or more of: communication interfaces, starting parameters, platform requirements, dependencies, deployment requirements, or a signature. 3. The apparatus of claim 1, the processing circuitry further adapted to:
generate the application specification for the control system application, based on the operational characteristics, and the selected software module; wherein the application specification defines values for control parameters of the selected software module. 4. The apparatus of claim 3, wherein the application specification indicates a connection from the selected software module to a second selected software module. 5. The apparatus of claim 1, the processing circuitry further adapted to:
evaluate the execution of the selected software module in the control system environment using at least two different hardware architectures; and perform an efficiency measurement of operations executed with the at least two different hardware architectures. 6. The apparatus of claim 1, wherein the control system application and respective software modules are displayed as a visual representation in a graphical user interface, wherein the visual representation is used to establish relationships of one or more inputs or outputs of the software modules within the control system application, wherein the inputs or outputs to the software modules include use of one or more of: a sensor, an actuator, or a controller. 7. The apparatus of claim 1, wherein the apparatus is an orchestration device, wherein the orchestration device is operably coupled to a plurality of execution devices in the control system environment that execute software modules, and wherein the execution of the selected software module via at least one execution devices effects functional operation of one or more control devices in the control system environment. 8. The apparatus of claim 7, wherein the processing circuitry is further adapted to coordinate the execution of the selected software module with an orchestration control strategy within the control system environment. 9. The apparatus of claim 1, wherein the processing circuitry is further adapted to:
select a plurality of software modules, the plurality of software modules including a selection of the software module; and connect the plurality of software modules to each other according to the operational characteristics. 10. A method, comprising:
identifying operational aspects of available software modules, the available software modules adapted to perform functional operations in a control system environment; identifying operational characteristics from a module manifest, wherein the operational characteristics define an environment for the available software modules to perform a control system application; selecting a software module of the available software modules, based on the identified operational aspects of the available software modules and the identified operational characteristics from the module manifest; and causing execution of the selected software module in the control system environment, wherein the execution occurs according to an application specification for the control system application. 11. The method of claim 10, wherein the operational aspects of the available software modules relate to one or more of: communication interfaces, starting parameters, platform requirements, dependencies, deployment requirements, or a signature. 12. The method of claim 10, further comprising:
generating the application specification for the control system application, based on the operational characteristics, and the selected software module; wherein the application specification defines values for control parameters of the selected software module, and wherein the application specification indicates a connection from the selected software module to a second selected software module. 13. The method of claim 10, further comprising:
evaluating the execution of the selected software module in the control system environment using at least two different hardware architectures; and identifying an efficiency measurement of operations executed with the at least two different hardware architectures. 14. The method of claim 10, wherein the control system application and respective software modules are displayed as a visual representation in a graphical user interface, wherein the visual representation is used to establish relationships of one or more inputs or outputs of the software modules within the control system application, wherein the inputs or outputs to the software modules include use of one or more of: a sensor, an actuator, or a controller. 15. The method of claim 10, wherein the method is performed by an orchestration device, wherein the orchestration device is operably coupled to a plurality of execution devices in the control system environment that execute software modules, and wherein the execution of the selected software module via at least one execution devices effects functional operation of one or more control devices in the control system environment. 16. The method of claim 15, further comprising:
coordinating the execution of the selected software module with an orchestration control strategy within the control system environment. 17. The method of claim 15, further comprising:
selecting a plurality of software modules for use in the control system environment, the plurality of software modules including the selection of the software module; and connecting the plurality of software modules to each other according to the operational characteristics. 18. At least one non-transitory machine-readable storage medium including instructions, wherein the instructions, when executed by a processing circuitry of a device, cause the processing circuitry to perform operations comprising:
identifying operational aspects of available software modules, the available software modules adapted to perform functional operations in a control system environment; identifying operational characteristics from a module manifest, wherein the operational characteristics define an environment for the available software modules to perform a control system application; selecting a software module of the available software modules, based on the identified operational aspects of the available software modules and the identified operational characteristics from the module manifest; and causing execution of the selected software module in the control system environment, wherein the execution occurs according to an application specification for the control system application. 19. The machine-readable medium of claim 18, wherein the operational aspects of the available software modules relate to one or more of:
communication interfaces, starting parameters, platform requirements, dependencies, deployment requirements, or a signature. 20. The machine-readable medium of claim 18, the operations further comprising:
generating the application specification for the control system application, based on the operational characteristics, and the selected software module; wherein the application specification defines values for control parameters of the selected software module, and wherein the application specification indicates a connection from the selected software module to a second selected software module. 21. The machine-readable medium of claim 18, the operations further comprising:
evaluating the execution of the selected software module in the control system environment using at least two different hardware architectures; and identifying an efficiency measurement of operations executed with the at least two different hardware architectures. 22. The machine-readable medium of claim 18, wherein the control system application and respective software modules are displayed as a visual representation in a graphical user interface, wherein the visual representation is used to establish relationships of one or more inputs or outputs of the software modules within the control system application, wherein the inputs or outputs to the software modules include use of one or more of: a sensor, an actuator, or a controller. 23. The machine-readable medium of claim 18, wherein the operations are performed by an orchestration device, wherein the orchestration device is operably coupled to a plurality of execution devices in the control system environment that execute software modules, and wherein the execution of the selected software module via at least one execution devices effects functional operation of one or more control devices in the control system environment. 24. The machine-readable medium of claim 23, the operations further comprising:
coordinating the execution of the selected software module with an orchestration control strategy within the control system environment. 25. The machine-readable medium of claim 23, the operations further comprising:
selecting a plurality of software modules for use in the control system environment, the plurality of software modules including the selection of the software module; and connecting the plurality of software modules to each other according to the operational characteristics. | 2,100 |
6,710 | 6,710 | 16,263,933 | 2,145 | According to one embodiment, a user interface of a device comprising a display configured to output information related to a user interface of the multimedia system, wherein the user interface includes one or more icons indicative of an application of the multimedia system, and a processor in communication with the display and programmed to in response to a first input from a user, allow an arrangement of the one or more icons on the user interface and adjust an original size of the icons to a smaller size, set the arrangement of the one or more icons and adjust the smaller size icons to the original size icons, and output the original size icons on the display with the arrangement. | 1. A multimedia system in a vehicle, comprising:
a display configured to output information related to a user interface of the multimedia system, wherein the user interface includes a plurality of icons indicative of an application of the multimedia system; and a processor in communication with the display and programmed to:
in response to a first input from a user, allow an arrangement of the plurality of icons on the user interface and adjust an original size of each of the plurality of icons to a smaller size, wherein all icons of the user interface are adjusted to the smaller size; and
in response to a second input from a user, set the arrangement of the plurality of icons and adjust each of the smaller size icons to the original size of the plurality of icons, and output the original size plurality of icons on the display, wherein all icons of the user interface are outputted to the original size. 2. The multimedia system of claim 1, wherein the first input from the user is a press-and-hold of the icon on the display. 3. The multimedia system of claim 1, wherein press-and-hold of the icon on the display includes a press-threshold time of one second or more. 4. The multimedia system of claim 1, wherein the processor is further programmed to revert the arrangement when a threshold time is exceeded that the processor does not receive the second input from a user. 5. The multimedia system of claim 1, wherein the processor is further programmed to revert the arrangement if a threshold time is exceeded that the processor does not receive the second input from a user. 6. The multimedia system of claim 1, wherein the original size of the icons is more than 50% larger than the smaller size icons. 7. The multimedia system of claim 1, wherein the original size of the icons is more than 25% larger than the smaller size icons. 8. The multimedia system of claim 1, wherein the display is a touch display. 9. The multimedia system of claim 1, wherein the first input from the user and the second input from the user are different types of inputs. 10. A method of arranging icons on a user interface, comprising:
outputting on display a plurality of icons of the user interface, wherein the plurality of icons are organized in a first arrangement; receiving a first input from a user; shrinking the plurality of icons from an original size to a smaller size, in response to the first input, wherein all icons of the user interface are adjusted to the smaller size; allowing arrangement of the plurality of icons on the user interface in response to the first input; setting a second arrangement of the plurality of icons; and output the plurality of icons to the original size with the second arrangement on the display, wherein all icons of the user interface are output as the original size. 11. The method of arranging icons of claim 10, wherein the method further includes expanding the plurality of icons from the smaller size of the icon to the original size of the icon in response to a second input. 12. The method of arranging icons of claim 10, wherein the method further includes outputting an indicator in response to the first input. 13. The method of arranging icons of claim 12, wherein the method further includes removing the indicator in response to a second input. 14. The method of arranging icons of claim 10, wherein the method further includes expanding the plurality of icons from the smaller size to the original size in response to a threshold time being exceeded. 15. The method of arranging icons of claim 14, wherein the threshold time is two or more seconds. 16. The method of arranging icons of claim 10, wherein the first input from the user is a press and hold. 17. A user interface of a device, comprising:
a display configured to output information related to a user interface of the device, wherein the user interface includes a plurality of icons indicative of an application of the device; and a processor in communication with the display and programmed to:
in response to a first input from a user, allow an arrangement of the plurality of icons on the user interface and adjust an original size of the plurality of icons to a smaller size;
set the arrangement of the plurality of icons and adjust the smaller size to the original size; and output the plurality of icons at the original size on the display with the arrangement. 18. The user interface of claim 17, wherein the processor is further programmed to revert the arrangement when a threshold time is exceeded that the processor does not receive a second input from a user. 19. (canceled) 20. (canceled) 21. The multimedia system of claim 1, wherein the processor is further programmed to move the smaller icons to a fixated area of a grid to output where the smaller icons will be arranged upon the second user input. 22. The multimedia system of claim 1, wherein the plurality of icons includes all of the icons on the user interface. | According to one embodiment, a user interface of a device comprising a display configured to output information related to a user interface of the multimedia system, wherein the user interface includes one or more icons indicative of an application of the multimedia system, and a processor in communication with the display and programmed to in response to a first input from a user, allow an arrangement of the one or more icons on the user interface and adjust an original size of the icons to a smaller size, set the arrangement of the one or more icons and adjust the smaller size icons to the original size icons, and output the original size icons on the display with the arrangement.1. A multimedia system in a vehicle, comprising:
a display configured to output information related to a user interface of the multimedia system, wherein the user interface includes a plurality of icons indicative of an application of the multimedia system; and a processor in communication with the display and programmed to:
in response to a first input from a user, allow an arrangement of the plurality of icons on the user interface and adjust an original size of each of the plurality of icons to a smaller size, wherein all icons of the user interface are adjusted to the smaller size; and
in response to a second input from a user, set the arrangement of the plurality of icons and adjust each of the smaller size icons to the original size of the plurality of icons, and output the original size plurality of icons on the display, wherein all icons of the user interface are outputted to the original size. 2. The multimedia system of claim 1, wherein the first input from the user is a press-and-hold of the icon on the display. 3. The multimedia system of claim 1, wherein press-and-hold of the icon on the display includes a press-threshold time of one second or more. 4. The multimedia system of claim 1, wherein the processor is further programmed to revert the arrangement when a threshold time is exceeded that the processor does not receive the second input from a user. 5. The multimedia system of claim 1, wherein the processor is further programmed to revert the arrangement if a threshold time is exceeded that the processor does not receive the second input from a user. 6. The multimedia system of claim 1, wherein the original size of the icons is more than 50% larger than the smaller size icons. 7. The multimedia system of claim 1, wherein the original size of the icons is more than 25% larger than the smaller size icons. 8. The multimedia system of claim 1, wherein the display is a touch display. 9. The multimedia system of claim 1, wherein the first input from the user and the second input from the user are different types of inputs. 10. A method of arranging icons on a user interface, comprising:
outputting on display a plurality of icons of the user interface, wherein the plurality of icons are organized in a first arrangement; receiving a first input from a user; shrinking the plurality of icons from an original size to a smaller size, in response to the first input, wherein all icons of the user interface are adjusted to the smaller size; allowing arrangement of the plurality of icons on the user interface in response to the first input; setting a second arrangement of the plurality of icons; and output the plurality of icons to the original size with the second arrangement on the display, wherein all icons of the user interface are output as the original size. 11. The method of arranging icons of claim 10, wherein the method further includes expanding the plurality of icons from the smaller size of the icon to the original size of the icon in response to a second input. 12. The method of arranging icons of claim 10, wherein the method further includes outputting an indicator in response to the first input. 13. The method of arranging icons of claim 12, wherein the method further includes removing the indicator in response to a second input. 14. The method of arranging icons of claim 10, wherein the method further includes expanding the plurality of icons from the smaller size to the original size in response to a threshold time being exceeded. 15. The method of arranging icons of claim 14, wherein the threshold time is two or more seconds. 16. The method of arranging icons of claim 10, wherein the first input from the user is a press and hold. 17. A user interface of a device, comprising:
a display configured to output information related to a user interface of the device, wherein the user interface includes a plurality of icons indicative of an application of the device; and a processor in communication with the display and programmed to:
in response to a first input from a user, allow an arrangement of the plurality of icons on the user interface and adjust an original size of the plurality of icons to a smaller size;
set the arrangement of the plurality of icons and adjust the smaller size to the original size; and output the plurality of icons at the original size on the display with the arrangement. 18. The user interface of claim 17, wherein the processor is further programmed to revert the arrangement when a threshold time is exceeded that the processor does not receive a second input from a user. 19. (canceled) 20. (canceled) 21. The multimedia system of claim 1, wherein the processor is further programmed to move the smaller icons to a fixated area of a grid to output where the smaller icons will be arranged upon the second user input. 22. The multimedia system of claim 1, wherein the plurality of icons includes all of the icons on the user interface. | 2,100 |
6,711 | 6,711 | 15,589,160 | 2,154 | Technologies are described providing adaptive query routing in a replicated database environment. The technologies can be used with a variety of replication protocols. Prepared statements, such as for queries, from a database client can be routed to a source node, or a source node and available replica nodes, when a replica node becomes unavailable. When a replica node becomes available again, a prepared statement can be updated to indicate that the updated prepared statement can be executed at nodes including the replica node that is available again. Prepared statement routing can also be used when a portion of replicated data becomes unavailable at a replica node, but a portion of replicated data remains available. | 1. A method, implemented at least in part by a database system node comprising a processing unit and memory, the database system node being one of a plurality of database system nodes and being in communication with at least a portion of the plurality of database system nodes and with a database client, at least one of the plurality of database system nodes being a source node and at least one of the plurality of database system nodes being a replica node, the method comprising:
determining that an availability status of the replica node has changed; receiving a prepared statement from the database client, the prepared statement specifying one or more nodes useable to execute the prepared statement; updating the prepared statement, the updating comprising adding a node to the one or more nodes in the prepared statement, or removing at least one of the one or more nodes in the prepared statement, depending on the type of availability status change of the replica node; and sending the updated prepared statement to the database client. 2. The method of claim 1, wherein the change in status of the replica node comprises the replica node becoming unavailable and updating the prepared statement comprises not including the replica node in the updated prepared statement. 3. The method of claim 1, wherein the change in status of the replica node comprises the replica node becoming available and updating the prepared statement comprises including the replica node in the updated prepared statement. 4. The method of claim 1, the method further comprising:
in response to determining that the availability status of the replica node has changed, incrementing an identifier maintained by the database system node; comparing the incremented identifier with a version timestamp associated with the prepared statement; and determining that the version timestamp identifier is associated with an earlier state of the database system than a state of the database system associated with the incremented identifier; wherein the updating is carried out in response to determining that the version timestamp identifier is associated with an earlier state of the database system. 5. The method of claim 1, wherein the change in status of the replica node comprises the replica node being unavailable and updating the prepared statement comprises specifying that the prepared statement should be executed at the source database system node. 6. The method of claim 1, wherein the change in status of the replica node comprises the replica node being unavailable, the replica node is a first replica node, and updating the prepared statement comprises specifying that the updated prepared statement may be executed at the source database system node and at least a second replica node. 7. The method of claim 1, wherein determining that the availability status of the replica node has changed comprises determining that a portion of data replicated at the replica node is not available, a portion of the replicated data remains available, and updating the prepared statement comprises:
determining data accessed by the prepared statement; determining whether data accessed by the prepared statement includes the portion of data replicated at the replica node that is not available; and if data accessed by the prepared statement is not available at the replica node, not including the replica node in the updated prepared statement. 8. The method of claim 1, wherein determining that the availability status of the replica node has changed comprises determining that a portion of data replicated at the replica node is not available, a portion of the replicated data remains available, and updating the prepared statement comprises:
determining data accessed by the prepared statement; determining whether data accessed by the prepared statement includes the portion of data replicated at the replica node that is not available; and if data accessed by the prepared statement is available at the replica node, including the replica node in the updated prepared statement. 9. The method of claim 1, the method further comprising:
updating a node status store to indicate the change in status of the replica node. 10. The method of claim 9, wherein the node status store maintains status information for at least a portion of the database system nodes, wherein each node is indicated as active or inactive, and updating the prepared statement comprising updating the prepared statement based on nodes having an active status. 11. The method of claim 1, wherein the node is the source node, the replica node is a first replica node and the database system further comprising at least a second replica node, the method further comprising:
receiving a request to commit a database transaction, the database transaction comprising one or more database operations to be replicated at least at the at least a second replica node; beginning a process to commit the database transaction; marking the status of the first replica node as inactive; and after marking the status of the first replica node as inactive, committing the transaction. 12. The method of claim 11, the method further comprising receiving a communication from the at least a second replica node that the at least a second replica node marked the first replica node as inactive, wherein the committing occurs after receiving the communication. 13. The method of claim 11, the method further comprising:
incrementing a first identifier maintained by the source node; and receiving a notification that the at least a second replica node has incremented a second identifier; wherein the first and second identifiers are useable to invalidate prepared statements maintained by the database client and the committing occurs after the incrementing and receiving the notification. 14. A computer system comprising a database client comprising a processing unit and memory that accesses a replicated database system, the replicated database system comprising at least one source node and at least one replica node, the database client configured to perform a prepared statement execution method, the method comprising:
sending a request to a database system node to prepare a statement; receiving a prepared statement from the database system node, the prepared statement specifying at least one database system node on which the prepared statement is executable; sending the prepared statement to the at least one node specified in the prepared statement; and receiving an updated prepared statement, the updated prepared statement specifying one or more nodes on which the updated prepared statement is executable, the one or more nodes comprising a node that was not the at least one node specified in the prepared statement, or omitting the at least one node specified in the prepared statement. 15. The computer system of claim 14, the method further comprising:
sending the updated prepared statement to a node of the one or more nodes specified in the updated prepared statement for execution; and receiving execution results. 16. One or more tangible computer-readable storage media storing computer-executable instructions for causing a computer device operating a first database system node, the computer device comprising a processing unit and memory and storing at least one database table and in communication with a database client and at least second and third database system nodes, programmed thereby to perform a method for facilitating prepared statement execution in a replicated database environment, the method comprising:
determining that an availability status of a replica node of the replicated database environment has changed; recording the availability status change in a data store comprising availability status information for nodes of the replicated database system; incrementing a metadata identifier; receiving a prepared statement from the database client, the prepared statement associated with a version timestamp; comparing the incremented metadata identifier with the version timestamp; determining that the prepared statement should be updated; updating the prepared statement using the availability status information of the data store; and sending the updated prepared statement to the database client. 17. The one or more tangible computer-readable storage media of claim 16, wherein determining that an availability status of a replica node of the replicated database environment has changed comprises determining at least one replicated table that is not accessible at the replica node and recording the availability status change in the data store comprises recording that the at least one replicated table is not available at the replica node. 18. The one or more tangible computer-readable storage media of claim 17, wherein, after the recording, the data store comprises at least one replicated table that is accessible at the replica node. 19. The one or more tangible computer-readable storage media of claim 18, wherein updating the prepared statement comprises comparing tables accessed by the prepared statement with accessible tables recorded in the data store. 20. The one or more tangible computer-readable storage media of claim 16, the method further comprising:
associating the incremented metadata identifier with the updated prepared statement. | Technologies are described providing adaptive query routing in a replicated database environment. The technologies can be used with a variety of replication protocols. Prepared statements, such as for queries, from a database client can be routed to a source node, or a source node and available replica nodes, when a replica node becomes unavailable. When a replica node becomes available again, a prepared statement can be updated to indicate that the updated prepared statement can be executed at nodes including the replica node that is available again. Prepared statement routing can also be used when a portion of replicated data becomes unavailable at a replica node, but a portion of replicated data remains available.1. A method, implemented at least in part by a database system node comprising a processing unit and memory, the database system node being one of a plurality of database system nodes and being in communication with at least a portion of the plurality of database system nodes and with a database client, at least one of the plurality of database system nodes being a source node and at least one of the plurality of database system nodes being a replica node, the method comprising:
determining that an availability status of the replica node has changed; receiving a prepared statement from the database client, the prepared statement specifying one or more nodes useable to execute the prepared statement; updating the prepared statement, the updating comprising adding a node to the one or more nodes in the prepared statement, or removing at least one of the one or more nodes in the prepared statement, depending on the type of availability status change of the replica node; and sending the updated prepared statement to the database client. 2. The method of claim 1, wherein the change in status of the replica node comprises the replica node becoming unavailable and updating the prepared statement comprises not including the replica node in the updated prepared statement. 3. The method of claim 1, wherein the change in status of the replica node comprises the replica node becoming available and updating the prepared statement comprises including the replica node in the updated prepared statement. 4. The method of claim 1, the method further comprising:
in response to determining that the availability status of the replica node has changed, incrementing an identifier maintained by the database system node; comparing the incremented identifier with a version timestamp associated with the prepared statement; and determining that the version timestamp identifier is associated with an earlier state of the database system than a state of the database system associated with the incremented identifier; wherein the updating is carried out in response to determining that the version timestamp identifier is associated with an earlier state of the database system. 5. The method of claim 1, wherein the change in status of the replica node comprises the replica node being unavailable and updating the prepared statement comprises specifying that the prepared statement should be executed at the source database system node. 6. The method of claim 1, wherein the change in status of the replica node comprises the replica node being unavailable, the replica node is a first replica node, and updating the prepared statement comprises specifying that the updated prepared statement may be executed at the source database system node and at least a second replica node. 7. The method of claim 1, wherein determining that the availability status of the replica node has changed comprises determining that a portion of data replicated at the replica node is not available, a portion of the replicated data remains available, and updating the prepared statement comprises:
determining data accessed by the prepared statement; determining whether data accessed by the prepared statement includes the portion of data replicated at the replica node that is not available; and if data accessed by the prepared statement is not available at the replica node, not including the replica node in the updated prepared statement. 8. The method of claim 1, wherein determining that the availability status of the replica node has changed comprises determining that a portion of data replicated at the replica node is not available, a portion of the replicated data remains available, and updating the prepared statement comprises:
determining data accessed by the prepared statement; determining whether data accessed by the prepared statement includes the portion of data replicated at the replica node that is not available; and if data accessed by the prepared statement is available at the replica node, including the replica node in the updated prepared statement. 9. The method of claim 1, the method further comprising:
updating a node status store to indicate the change in status of the replica node. 10. The method of claim 9, wherein the node status store maintains status information for at least a portion of the database system nodes, wherein each node is indicated as active or inactive, and updating the prepared statement comprising updating the prepared statement based on nodes having an active status. 11. The method of claim 1, wherein the node is the source node, the replica node is a first replica node and the database system further comprising at least a second replica node, the method further comprising:
receiving a request to commit a database transaction, the database transaction comprising one or more database operations to be replicated at least at the at least a second replica node; beginning a process to commit the database transaction; marking the status of the first replica node as inactive; and after marking the status of the first replica node as inactive, committing the transaction. 12. The method of claim 11, the method further comprising receiving a communication from the at least a second replica node that the at least a second replica node marked the first replica node as inactive, wherein the committing occurs after receiving the communication. 13. The method of claim 11, the method further comprising:
incrementing a first identifier maintained by the source node; and receiving a notification that the at least a second replica node has incremented a second identifier; wherein the first and second identifiers are useable to invalidate prepared statements maintained by the database client and the committing occurs after the incrementing and receiving the notification. 14. A computer system comprising a database client comprising a processing unit and memory that accesses a replicated database system, the replicated database system comprising at least one source node and at least one replica node, the database client configured to perform a prepared statement execution method, the method comprising:
sending a request to a database system node to prepare a statement; receiving a prepared statement from the database system node, the prepared statement specifying at least one database system node on which the prepared statement is executable; sending the prepared statement to the at least one node specified in the prepared statement; and receiving an updated prepared statement, the updated prepared statement specifying one or more nodes on which the updated prepared statement is executable, the one or more nodes comprising a node that was not the at least one node specified in the prepared statement, or omitting the at least one node specified in the prepared statement. 15. The computer system of claim 14, the method further comprising:
sending the updated prepared statement to a node of the one or more nodes specified in the updated prepared statement for execution; and receiving execution results. 16. One or more tangible computer-readable storage media storing computer-executable instructions for causing a computer device operating a first database system node, the computer device comprising a processing unit and memory and storing at least one database table and in communication with a database client and at least second and third database system nodes, programmed thereby to perform a method for facilitating prepared statement execution in a replicated database environment, the method comprising:
determining that an availability status of a replica node of the replicated database environment has changed; recording the availability status change in a data store comprising availability status information for nodes of the replicated database system; incrementing a metadata identifier; receiving a prepared statement from the database client, the prepared statement associated with a version timestamp; comparing the incremented metadata identifier with the version timestamp; determining that the prepared statement should be updated; updating the prepared statement using the availability status information of the data store; and sending the updated prepared statement to the database client. 17. The one or more tangible computer-readable storage media of claim 16, wherein determining that an availability status of a replica node of the replicated database environment has changed comprises determining at least one replicated table that is not accessible at the replica node and recording the availability status change in the data store comprises recording that the at least one replicated table is not available at the replica node. 18. The one or more tangible computer-readable storage media of claim 17, wherein, after the recording, the data store comprises at least one replicated table that is accessible at the replica node. 19. The one or more tangible computer-readable storage media of claim 18, wherein updating the prepared statement comprises comparing tables accessed by the prepared statement with accessible tables recorded in the data store. 20. The one or more tangible computer-readable storage media of claim 16, the method further comprising:
associating the incremented metadata identifier with the updated prepared statement. | 2,100 |
6,712 | 6,712 | 14,885,195 | 2,164 | The device alert system includes a home gateway coupled to multiple customer premises equipment (CPE) devices. The home gateway monitors communications among the gateway and the CPE devices to detect errors and/or issues arising from use of the gateway or CPE devices. It also has access to textual information describing each of the CPE devices. The home gateway automatically generates a search query by converting the detected error and/or issue into a text string and combining it with the text information describing the CPE device for which the error and/or issue was detected. The home gateway then causes a search to be performed based on the search query and causes the results of the search to be parsed and compared to the query. The home gateway then presents the results of the search to the user to assist the user in resolving the error and/or issue. | 1. A device alert system comprising:
a home gateway for a home network, the home gateway including: a plurality of communications channels for coupling the home gateway to a plurality of customer premises equipment (CPE) devices wherein the plurality of CPE devices includes a display device; a processor, coupled to the plurality of CPE devices via the plurality of communications channels; a memory including: software that configures the processor to monitor communications among the plurality of CPE devices to automatically determine that one of the CPE devices or the home gateway has an error or has an issue and to generate a textual description of the error or issue; software that configures the processor to automatically generate a search query by combining the textual description of the error or issue with a textual description of the one CPE device or home gateway; software that configures the processor to send the query to a search facility; software that configures a processor coupled to the display device to receive from the search facility one or more search results that causes the display device to display the one or more search results; and, software that, in response to receiving a selection of one of the search results, configures the processor coupled to the display device to retrieve and display data corresponding to the selected search result on the display device. 2. The device alert system of claim 1, wherein:
the search facility includes a network server coupled to the home gateway via a network connection, network server including: a browser that receives the search query and provides the search query to a search engine to perform an Internet search and receives the search results in response to the Internet search; software that configures the network server to process the received search results to automatically identify the one or more search results to be presented on the display device by matching the search results to the query; and software that formats the processed search results into a list and provides the formatted list for display on the display device. 3. The device alert system of claim 2, wherein:
the display device is a mobile device coupled to the network server via a telecommunications network and to the home server via a short-range communications channel; the processor coupled to the display device is a processor of the mobile device; and the network server further includes software that transmits the list of formatted search results to the mobile device via the telecommunications network. 4. The device alert system of claim 1, wherein:
the display device includes a processor, a memory and a network interface; and the data that causes the display device to display the one or more search results includes a link to a website containing the search results. 5. The device alert system of claim 1, wherein:
the display device is in a computing device that is configured to receive email messages; and the data that causes the display device to display one or more search results includes an email message containing the one or more search results. 6. The device alert system of claim 1, wherein the software that configures the processor to monitor communications among the plurality of CPE devices to automatically determine that one of the CPE devices or the home gateway has the error or issue further comprises software that configures the processor to cause a notification of the detected error or issue to be displayed to the user on the display device. 7. The device alert system of claim 1, wherein:
the memory of the home gateway includes the search facility which includes: a browser that receives the search query and provides the search query to a search engine to perform an Internet search and receives the search results from the Internet search; software that configures the processor of the home gateway to process the received search results to automatically identify the one or more search results to be presented on the display device by matching the search results to the query; and software that configures the processor of the home gateway to format the processed search results into a list, ranked according to predetermined preferences and provides the formatted list for display on the display device. 8. The device alert system of claim 1, wherein the software that configures the processor to generate the textual description of the error or issue further includes software that searches one of a local database on the home network and the Internet for a definition of the error or issue and, upon receiving a search result including the definition, generates the textual description of the error or issue including the definition. 9. The device alert system of claim 1, wherein each of the communications channels communicates with at least one of the CPE devices according to a predetermined protocol including an error reporting facility and the processor of the home gateway monitors communications among the plurality of CPE devices by receiving error messages from each of the error reporting facilities. 10. The device alert system of claim 9, further including software that configures the processor of the home gateway to detect when a new CPE device is added to the home network and, in response to the detection, obtain information identifying the CPE device using the respective protocol for the CPE device. 11. The device alert system of claim 10 wherein the software that configures the processor to obtain information identifying the new CPE device automatically initiates a search for manuals or tech support documentation for the new CPE device, obtains any manuals or tech support documentation identified in the search and stores the obtained manuals or tech support documentation in a memory of one of the CPE devices coupled to the home network or in the memory of the home gateway. 12. The device alert system of claim 1, further including:
a first database holding the predetermined user preferences and a second database holding predetermined information on sites containing diagnostic information; and the memory of the home gateway further includes software that configures the processor of the home gateway to receive ratings of each of the search results and to modify the second database based on the received ratings; wherein the second database is used by the search facility to process the search results by ranking the search results according to the respective ratings of the sites in the database. 13. A method for providing device alerts in a home network including a home gateway and a plurality of customer premises equipment (CPE) devices coupled to the home gateway, wherein each of the CPE devices exchanges data with the home gateway according to a respective predetermined protocol, the method comprising:
determining, by a processor of the home gateway, whether a data exchange between the home gateway and one of the CPE devices indicates an error or issue according to the respective predetermined protocol; automatically generating, by the processor of the home gateway, a search query by combining a textual description of the indicated error or issue with a textual description of the one CPE device; submitting the generated search query to a search facility, to identify diagnostic information concerning the indicated error or issue; receiving, from the search facility, results including one or more search results relevant to the search query; formatting the one or more results received from the search facility, wherein the one or more results are arranged in order of relevance to the search query; receiving, by the processor of the home gateway, a selection of one of the one or more results and retrieving and displaying data corresponding to the selected search result on a display device coupled to the home gateway. 14. The method of claim 13, wherein the search facility includes a network server coupled to the home gateway via a network connection, and the method further includes:
receiving the search query by a browser of the network server and performing an Internet search using the search query; receiving, by the network server, search results from the Internet search; automatically identifying, by the network server, the one or more search results to be presented to the user by matching the search results to the query; and formatting, by the processor of the home gateway, the one or more search results into a list and displaying the formatted list on a display device coupled to the home gateway. 15. The method of claim 13, further comprising: ranking, by the network server, the identified search results according to predetermined user preferences before displaying the formatted list. 16. The method of claim 15, wherein the home network further includes a first database holding the predetermined user preferences and a second database holding predetermined information on sites containing diagnostic information, and the method further includes receiving, by the processor of the home gateway, ratings of each of the search results and modifying the second database based on the received ratings; wherein the second database is used by the search facility to process the search results by ranking the search results according to the respective ratings of the sites in the database. 17. The method of claim 13, wherein the search facility is internal to the home gateway, and the method further includes
receiving the search query by a browser of the home gateway and performing an Internet search using the search query; receiving, by the processor of the home gateway, search results from the Internet search; automatically identifying, by the processor of the home gateway, the one or more search results to be presented to the user by matching the search results to the query; and formatting, by the processor of the home gateway, the one or more search results into a list and displaying the formatted list, ranked according to predetermined user preferences, on a display device coupled to the home gateway. 18. The method of claim 13 further including:
detecting, according to one of the predetermined protocols, when the home gateway or a CPE device is first powered up on the home network and, in response to the detection:
obtaining information identifying the home gateway or CPE device using the respective protocol for the home gateway or CPE device;
initiating a search for manuals and tech support documentation for the home gateway or CPE device;
obtaining any manuals and tech support documentation identified in the search; and
storing the obtained manuals and tech support documentation in a memory of one of the CPE devices coupled to the home network or in a memory of the home gateway. 19. The method of claim 19, further including:
upon detecting a first connection to the Internet and initiating a search for manuals and tech support document information relevant to a loss of connection to the Internet; and storing the obtained manuals and support documentation relevant to the loss of connection to the Internet in a memory of one of the CPE devices or in the memory of the home gateway. 20. A device alert system comprising:
a display device; a memory device; and a set-top gateway, configured to communicate with a network to provide content from the network to the display device and to the memory device, the set-top gateway including: a processor; a plurality of communication channels, coupled to the processor, the communication channels being configured to send data to and receive data from a plurality of customer premises equipment (CPE) devices including the memory device and the display device according to a respective protocol; and a memory including: software that configures the processor to receive data from the plurality of communication channels and, based on the received data and the respective protocol, to automatically determine that an error has occurred in one of the CPE devices and to generate a textual description of the error; software that configures the processor to automatically retrieve information identifying the one CPE device from the data received from the one CPE device or from the memory device and to convert the identifying information into a textual description of the one CPE device; software that configures the processor to automatically generate a search query by combining the textual description of the error with the textual description of the one CPE device; software that configures the processor to send the search query to a search facility; software that configures the processor to receive a response to the search query from the search facility, the response including a plurality of links to a respective plurality of content items relevant to the error and to the CPE device; software that configures the processor to automatically parse the plurality of links based on at least one of a) relevance to the error and the one CPE device or b) preferences indicated by a user to arrange the plurality of links into a list for presentation to the user; and software that configures the processor to format the links for presentation to the user via the display device and, in response to receiving a selection of one of the links, retrieves and displays data corresponding to the selected link on the display device. | The device alert system includes a home gateway coupled to multiple customer premises equipment (CPE) devices. The home gateway monitors communications among the gateway and the CPE devices to detect errors and/or issues arising from use of the gateway or CPE devices. It also has access to textual information describing each of the CPE devices. The home gateway automatically generates a search query by converting the detected error and/or issue into a text string and combining it with the text information describing the CPE device for which the error and/or issue was detected. The home gateway then causes a search to be performed based on the search query and causes the results of the search to be parsed and compared to the query. The home gateway then presents the results of the search to the user to assist the user in resolving the error and/or issue.1. A device alert system comprising:
a home gateway for a home network, the home gateway including: a plurality of communications channels for coupling the home gateway to a plurality of customer premises equipment (CPE) devices wherein the plurality of CPE devices includes a display device; a processor, coupled to the plurality of CPE devices via the plurality of communications channels; a memory including: software that configures the processor to monitor communications among the plurality of CPE devices to automatically determine that one of the CPE devices or the home gateway has an error or has an issue and to generate a textual description of the error or issue; software that configures the processor to automatically generate a search query by combining the textual description of the error or issue with a textual description of the one CPE device or home gateway; software that configures the processor to send the query to a search facility; software that configures a processor coupled to the display device to receive from the search facility one or more search results that causes the display device to display the one or more search results; and, software that, in response to receiving a selection of one of the search results, configures the processor coupled to the display device to retrieve and display data corresponding to the selected search result on the display device. 2. The device alert system of claim 1, wherein:
the search facility includes a network server coupled to the home gateway via a network connection, network server including: a browser that receives the search query and provides the search query to a search engine to perform an Internet search and receives the search results in response to the Internet search; software that configures the network server to process the received search results to automatically identify the one or more search results to be presented on the display device by matching the search results to the query; and software that formats the processed search results into a list and provides the formatted list for display on the display device. 3. The device alert system of claim 2, wherein:
the display device is a mobile device coupled to the network server via a telecommunications network and to the home server via a short-range communications channel; the processor coupled to the display device is a processor of the mobile device; and the network server further includes software that transmits the list of formatted search results to the mobile device via the telecommunications network. 4. The device alert system of claim 1, wherein:
the display device includes a processor, a memory and a network interface; and the data that causes the display device to display the one or more search results includes a link to a website containing the search results. 5. The device alert system of claim 1, wherein:
the display device is in a computing device that is configured to receive email messages; and the data that causes the display device to display one or more search results includes an email message containing the one or more search results. 6. The device alert system of claim 1, wherein the software that configures the processor to monitor communications among the plurality of CPE devices to automatically determine that one of the CPE devices or the home gateway has the error or issue further comprises software that configures the processor to cause a notification of the detected error or issue to be displayed to the user on the display device. 7. The device alert system of claim 1, wherein:
the memory of the home gateway includes the search facility which includes: a browser that receives the search query and provides the search query to a search engine to perform an Internet search and receives the search results from the Internet search; software that configures the processor of the home gateway to process the received search results to automatically identify the one or more search results to be presented on the display device by matching the search results to the query; and software that configures the processor of the home gateway to format the processed search results into a list, ranked according to predetermined preferences and provides the formatted list for display on the display device. 8. The device alert system of claim 1, wherein the software that configures the processor to generate the textual description of the error or issue further includes software that searches one of a local database on the home network and the Internet for a definition of the error or issue and, upon receiving a search result including the definition, generates the textual description of the error or issue including the definition. 9. The device alert system of claim 1, wherein each of the communications channels communicates with at least one of the CPE devices according to a predetermined protocol including an error reporting facility and the processor of the home gateway monitors communications among the plurality of CPE devices by receiving error messages from each of the error reporting facilities. 10. The device alert system of claim 9, further including software that configures the processor of the home gateway to detect when a new CPE device is added to the home network and, in response to the detection, obtain information identifying the CPE device using the respective protocol for the CPE device. 11. The device alert system of claim 10 wherein the software that configures the processor to obtain information identifying the new CPE device automatically initiates a search for manuals or tech support documentation for the new CPE device, obtains any manuals or tech support documentation identified in the search and stores the obtained manuals or tech support documentation in a memory of one of the CPE devices coupled to the home network or in the memory of the home gateway. 12. The device alert system of claim 1, further including:
a first database holding the predetermined user preferences and a second database holding predetermined information on sites containing diagnostic information; and the memory of the home gateway further includes software that configures the processor of the home gateway to receive ratings of each of the search results and to modify the second database based on the received ratings; wherein the second database is used by the search facility to process the search results by ranking the search results according to the respective ratings of the sites in the database. 13. A method for providing device alerts in a home network including a home gateway and a plurality of customer premises equipment (CPE) devices coupled to the home gateway, wherein each of the CPE devices exchanges data with the home gateway according to a respective predetermined protocol, the method comprising:
determining, by a processor of the home gateway, whether a data exchange between the home gateway and one of the CPE devices indicates an error or issue according to the respective predetermined protocol; automatically generating, by the processor of the home gateway, a search query by combining a textual description of the indicated error or issue with a textual description of the one CPE device; submitting the generated search query to a search facility, to identify diagnostic information concerning the indicated error or issue; receiving, from the search facility, results including one or more search results relevant to the search query; formatting the one or more results received from the search facility, wherein the one or more results are arranged in order of relevance to the search query; receiving, by the processor of the home gateway, a selection of one of the one or more results and retrieving and displaying data corresponding to the selected search result on a display device coupled to the home gateway. 14. The method of claim 13, wherein the search facility includes a network server coupled to the home gateway via a network connection, and the method further includes:
receiving the search query by a browser of the network server and performing an Internet search using the search query; receiving, by the network server, search results from the Internet search; automatically identifying, by the network server, the one or more search results to be presented to the user by matching the search results to the query; and formatting, by the processor of the home gateway, the one or more search results into a list and displaying the formatted list on a display device coupled to the home gateway. 15. The method of claim 13, further comprising: ranking, by the network server, the identified search results according to predetermined user preferences before displaying the formatted list. 16. The method of claim 15, wherein the home network further includes a first database holding the predetermined user preferences and a second database holding predetermined information on sites containing diagnostic information, and the method further includes receiving, by the processor of the home gateway, ratings of each of the search results and modifying the second database based on the received ratings; wherein the second database is used by the search facility to process the search results by ranking the search results according to the respective ratings of the sites in the database. 17. The method of claim 13, wherein the search facility is internal to the home gateway, and the method further includes
receiving the search query by a browser of the home gateway and performing an Internet search using the search query; receiving, by the processor of the home gateway, search results from the Internet search; automatically identifying, by the processor of the home gateway, the one or more search results to be presented to the user by matching the search results to the query; and formatting, by the processor of the home gateway, the one or more search results into a list and displaying the formatted list, ranked according to predetermined user preferences, on a display device coupled to the home gateway. 18. The method of claim 13 further including:
detecting, according to one of the predetermined protocols, when the home gateway or a CPE device is first powered up on the home network and, in response to the detection:
obtaining information identifying the home gateway or CPE device using the respective protocol for the home gateway or CPE device;
initiating a search for manuals and tech support documentation for the home gateway or CPE device;
obtaining any manuals and tech support documentation identified in the search; and
storing the obtained manuals and tech support documentation in a memory of one of the CPE devices coupled to the home network or in a memory of the home gateway. 19. The method of claim 19, further including:
upon detecting a first connection to the Internet and initiating a search for manuals and tech support document information relevant to a loss of connection to the Internet; and storing the obtained manuals and support documentation relevant to the loss of connection to the Internet in a memory of one of the CPE devices or in the memory of the home gateway. 20. A device alert system comprising:
a display device; a memory device; and a set-top gateway, configured to communicate with a network to provide content from the network to the display device and to the memory device, the set-top gateway including: a processor; a plurality of communication channels, coupled to the processor, the communication channels being configured to send data to and receive data from a plurality of customer premises equipment (CPE) devices including the memory device and the display device according to a respective protocol; and a memory including: software that configures the processor to receive data from the plurality of communication channels and, based on the received data and the respective protocol, to automatically determine that an error has occurred in one of the CPE devices and to generate a textual description of the error; software that configures the processor to automatically retrieve information identifying the one CPE device from the data received from the one CPE device or from the memory device and to convert the identifying information into a textual description of the one CPE device; software that configures the processor to automatically generate a search query by combining the textual description of the error with the textual description of the one CPE device; software that configures the processor to send the search query to a search facility; software that configures the processor to receive a response to the search query from the search facility, the response including a plurality of links to a respective plurality of content items relevant to the error and to the CPE device; software that configures the processor to automatically parse the plurality of links based on at least one of a) relevance to the error and the one CPE device or b) preferences indicated by a user to arrange the plurality of links into a list for presentation to the user; and software that configures the processor to format the links for presentation to the user via the display device and, in response to receiving a selection of one of the links, retrieves and displays data corresponding to the selected link on the display device. | 2,100 |
6,713 | 6,713 | 15,722,900 | 2,154 | A massively parallel database management system includes an index store and a payload store including a set of storage systems of different temperatures. Both the index store and the storage system each include a list of clusters. Each cluster includes a set of nodes with storage devices forming a group of segments. Nodes and clusters are connected over high speed links. Each cluster receives data and splits the data into data rows based on a predetermined size. The data rows are randomly and evenly distributed between all nodes of the cluster. | 1. A payload store within a database management system, the payload store comprising:
i) a set of clusters, each cluster within said set of clusters having a set of nodes, each node within said set of nodes having a processing unit, a memory operatively coupled to said processing unit, a network interface operatively coupled to said processing unit and a storage device operatively coupled to said processing unit for storing data; ii) a first cluster within said set of clusters having a first node and a first set of nodes, said first node running a first computer software application; and iii) said first computer software application adapted to:
1) receive a data for storing into said first cluster;
2) split said data into a set of data rows; and
3) randomly distribute said set of data rows between said first set of nodes, wherein each data row within said set of data rows is randomly assigned to a node within said first set of nodes, wherein said node is adapted to write said data row into a storage device of said node. 2. The payload store of claim 1, wherein said first computer software application is further adapted to compress said data and split said compressed data into said set of data rows. 3. The payload store of claim 1, wherein said set of data rows consists of a subset of data rows and a last data row, wherein said subset of data rows have a same size and said last data row has a size that is same as or smaller than said same size. | A massively parallel database management system includes an index store and a payload store including a set of storage systems of different temperatures. Both the index store and the storage system each include a list of clusters. Each cluster includes a set of nodes with storage devices forming a group of segments. Nodes and clusters are connected over high speed links. Each cluster receives data and splits the data into data rows based on a predetermined size. The data rows are randomly and evenly distributed between all nodes of the cluster.1. A payload store within a database management system, the payload store comprising:
i) a set of clusters, each cluster within said set of clusters having a set of nodes, each node within said set of nodes having a processing unit, a memory operatively coupled to said processing unit, a network interface operatively coupled to said processing unit and a storage device operatively coupled to said processing unit for storing data; ii) a first cluster within said set of clusters having a first node and a first set of nodes, said first node running a first computer software application; and iii) said first computer software application adapted to:
1) receive a data for storing into said first cluster;
2) split said data into a set of data rows; and
3) randomly distribute said set of data rows between said first set of nodes, wherein each data row within said set of data rows is randomly assigned to a node within said first set of nodes, wherein said node is adapted to write said data row into a storage device of said node. 2. The payload store of claim 1, wherein said first computer software application is further adapted to compress said data and split said compressed data into said set of data rows. 3. The payload store of claim 1, wherein said set of data rows consists of a subset of data rows and a last data row, wherein said subset of data rows have a same size and said last data row has a size that is same as or smaller than said same size. | 2,100 |
6,714 | 6,714 | 15,139,979 | 2,128 | A device, system, and method use predictive analytics based on an application-centric approach. The method includes receiving a request from an interactive application interacting with a user utilizing a user device for action data indicating an action to be taken by the interactive application during a session with the user device, the request generated by the interactive application based on a decision point associated with the interactive application. The method includes receiving from the interactive application session data associated with the session and the user device. The method includes determining scoring package data associated with the request based on the session data, the scoring package data comprising a predictive model indicative of a plurality of actions to be performed by the interactive application. The method includes generating the action data based on the scoring package data and transmitting the action data to the interactive application. | 1. A method, comprising:
receiving, by a broker device, a request for action data from an interactive application interacting with a user utilizing a user device, the action data indicative of an action to be taken by the interactive application during a session with the user device, the request generated by the interactive application based on a decision point associated with the interactive application; receiving, by the broker device, session data from the interactive application, the session data associated with the session and the user device; determining, by the broker device, scoring package data associated with the request based on the session data, the scoring package data comprising a predictive model indicative of a plurality of actions to be performed by the interactive application; generating, by the broker device, the action data based on the scoring package data; and transmitting, by the broker device, the action data to the interactive application. 2. The method of claim 1, further comprising:
determining, by the broker device, whether a validating operation is to be performed on the predictive model, the validating operation utilizing a randomly generated experiment response to the request; generating, by the broker device, the experiment response for the request, the experiment response replacing the action data; and transmitting, by the broker device, the experiment response to the interactive application. 3. The method of claim 2, wherein the validating operation is performed at a predetermined time interval, at a random time interval, or when a changing trend is determined relative to the predictive model. 4. The method of claim 1, further comprising:
prior to receiving the request, generating the scoring package data by:
receiving, by the broker device, a further request for further action data from a further interactive application interacting with a further user utilizing a further user device during a further session;
receiving, by the broker device, further session data from the further interactive application, the further session data associated with the further session and the further user device;
determining, by the broker device, experiment data as a function of the further session data, the experiment data corresponding to a randomly generated action data for the further session;
transmitting, by the broker device, the experiment data to the further user device;
receiving, by the broker device, response data from the further user device, the response data being indicative of a user response to the experiment data,
wherein the scoring package data is generated based on the response data. 5. The method of claim 4, further comprising:
receiving, by the broker device, additional further requests for additional further action data from additional further interactive applications interactive with additional further users utilizing additional further user devices; receiving, by the broker device, additional further session data from the additional further interactive applications, the additional further session data associated with the additional further sessions and the additional further user devices; determining, by the broker device, further experiment data as a function of the additional further session data, the further experiment data corresponding to a further randomly generated action data for the additional further sessions; transmitting, by the broker device, the further experiment data to the additional further user devices; receiving, by the broker device, further response data from the additional further user devices, the further response data being indicative of a further user response to the further experiment data, wherein the scoring package data is further generated based on the further response data. 6. The method of claim 5, wherein the scoring package data is generated when a predetermined minimum number is reached from a sum of the further request and a number of the additional further requests. 7. The method of claim 1, further comprising:
receiving, by the broker device, response data from the interactive application indicating actual action data that was used, the actual action data being indicative of a user response to the actual response data being used. 8. The method of claim 7, further comprising:
updating, by the broker device, the predictive model and the scoring package data based on the response data. 9. The method of claim 7, wherein the actual action data is the action data or an independent response generated by the interactive application. 10. The method of claim 1, further comprising:
generating, by the broker device, a data request for the session data; and transmitting, by the broker device, the data request to the interactive application, wherein the receiving the session data is in response to the data request. 11. A broker device, comprising:
a transceiver configured to communicate with a scoring device and an interactive application, the interactive application interacting with a user utilizing a user device; a memory arrangement; and a processor coupled to the transceiver and the memory arrangement, wherein the processor is configured to instruct the transceiver to receive a request for action data from the interactive application, the action data indicative of an action to be taken by the interactive application during a session with the user device, the request generated by the interactive application based on a decision point associated with the interactive application, wherein the processor is configured to instruct the transceiver to receive the session data from the interactive application, the session data associated with the session and the user device, wherein the processor is configured to determine scoring package data associated with the request based on the session data, the scoring package data comprising a predictive model indicative of a plurality of actions to be performed by the interactive application, wherein the processor is configured to generate the action data based on the scoring package data. 12. The broker device of claim 11, wherein the processor is further configured to determine whether a validating operation is to be performed on the predictive model, the validating operation utilizing a randomly generated experiment response to the request, wherein the processor is further configured to generate the experiment response for the request, the experiment response replacing the action data, wherein the processor is further configured to instruct the transceiver to transmit the experiment response to the interactive application. 13. The broker device of claim 12, wherein the validating operation is performed at a predetermined time interval, at a random time interval, or when a changing trend is determined relative to the predictive model. 14. The broker device of claim 11, wherein, prior to receiving the request, the processor is configured to generate the scoring package data, wherein the processor is further configured to instruct the transceiver to receive a further request for further action data from a further interactive application interacting with a further user utilizing a further user device during a further session, wherein the processor is further configured to instruct the transceiver to receive further session data from the further interactive application, the further session data associated with the further session and the further user device, wherein the processor is further configured to determine experiment data as a function of the further session data, the experiment data corresponding to a randomly generated action data for the further session, wherein the processor is further configured to instruct the transceiver to transmit the experiment data to the further user device, wherein the processor is further configured to instruct the transceiver to receive response data from the further user device, the response data being indicative of a user response to the experiment data, wherein the scoring package data is generated based on the response data. 15. The broker device of claim 14, wherein the processor is further configured to instruct the transceiver to receive additional further requests for additional further action data from additional further interactive applications interactive with additional further users utilizing additional further user devices, wherein the processor is further configured to instruct the transceiver to receive additional further session data from the additional further interactive applications, the additional further session data associated with the additional further sessions and the additional further user devices, wherein the processor is further configured to determine further experiment data as a function of the additional further session data, the further experiment data corresponding to a further randomly generated action data for the additional further sessions, wherein the processor is further configured to instruct the transceiver to transmit the further experiment data to the additional further user devices, wherein the processor is further configured to instruct the transceiver to receive further response data from the additional further user devices, the further response data being indicative of a further user response to the further experiment data, wherein the scoring package data is further generated based on the further response data. 16. The broker device of claim 15, wherein the scoring package data is generated when a predetermined minimum number is reached from a sum of the further request and a number of the additional further requests. 17. The broker device of claim 11, wherein the processor is further configured to instruct the transceiver to transmit the predicted response to the interactive application, wherein the processor is further configured to instruct the transceiver to receive response data from the interactive application indicating actual action data that was used, the actual action data being indicative of a user response to the actual response data being used. 18. The broker device of claim 17, wherein the processor is further configured to update the predictive model and the scoring package data based on the response data. 19. The broker device of claim 17, wherein the actual action data is the action data or an independent response generated by the interactive application. 20. The broker device of claim 11, wherein the processor is further configured to generate a data request for the session data, wherein the processor is further configured to instruct the transceiver to transmit the data request to the interactive application, wherein the receiving the session data is in response to the data request. | A device, system, and method use predictive analytics based on an application-centric approach. The method includes receiving a request from an interactive application interacting with a user utilizing a user device for action data indicating an action to be taken by the interactive application during a session with the user device, the request generated by the interactive application based on a decision point associated with the interactive application. The method includes receiving from the interactive application session data associated with the session and the user device. The method includes determining scoring package data associated with the request based on the session data, the scoring package data comprising a predictive model indicative of a plurality of actions to be performed by the interactive application. The method includes generating the action data based on the scoring package data and transmitting the action data to the interactive application.1. A method, comprising:
receiving, by a broker device, a request for action data from an interactive application interacting with a user utilizing a user device, the action data indicative of an action to be taken by the interactive application during a session with the user device, the request generated by the interactive application based on a decision point associated with the interactive application; receiving, by the broker device, session data from the interactive application, the session data associated with the session and the user device; determining, by the broker device, scoring package data associated with the request based on the session data, the scoring package data comprising a predictive model indicative of a plurality of actions to be performed by the interactive application; generating, by the broker device, the action data based on the scoring package data; and transmitting, by the broker device, the action data to the interactive application. 2. The method of claim 1, further comprising:
determining, by the broker device, whether a validating operation is to be performed on the predictive model, the validating operation utilizing a randomly generated experiment response to the request; generating, by the broker device, the experiment response for the request, the experiment response replacing the action data; and transmitting, by the broker device, the experiment response to the interactive application. 3. The method of claim 2, wherein the validating operation is performed at a predetermined time interval, at a random time interval, or when a changing trend is determined relative to the predictive model. 4. The method of claim 1, further comprising:
prior to receiving the request, generating the scoring package data by:
receiving, by the broker device, a further request for further action data from a further interactive application interacting with a further user utilizing a further user device during a further session;
receiving, by the broker device, further session data from the further interactive application, the further session data associated with the further session and the further user device;
determining, by the broker device, experiment data as a function of the further session data, the experiment data corresponding to a randomly generated action data for the further session;
transmitting, by the broker device, the experiment data to the further user device;
receiving, by the broker device, response data from the further user device, the response data being indicative of a user response to the experiment data,
wherein the scoring package data is generated based on the response data. 5. The method of claim 4, further comprising:
receiving, by the broker device, additional further requests for additional further action data from additional further interactive applications interactive with additional further users utilizing additional further user devices; receiving, by the broker device, additional further session data from the additional further interactive applications, the additional further session data associated with the additional further sessions and the additional further user devices; determining, by the broker device, further experiment data as a function of the additional further session data, the further experiment data corresponding to a further randomly generated action data for the additional further sessions; transmitting, by the broker device, the further experiment data to the additional further user devices; receiving, by the broker device, further response data from the additional further user devices, the further response data being indicative of a further user response to the further experiment data, wherein the scoring package data is further generated based on the further response data. 6. The method of claim 5, wherein the scoring package data is generated when a predetermined minimum number is reached from a sum of the further request and a number of the additional further requests. 7. The method of claim 1, further comprising:
receiving, by the broker device, response data from the interactive application indicating actual action data that was used, the actual action data being indicative of a user response to the actual response data being used. 8. The method of claim 7, further comprising:
updating, by the broker device, the predictive model and the scoring package data based on the response data. 9. The method of claim 7, wherein the actual action data is the action data or an independent response generated by the interactive application. 10. The method of claim 1, further comprising:
generating, by the broker device, a data request for the session data; and transmitting, by the broker device, the data request to the interactive application, wherein the receiving the session data is in response to the data request. 11. A broker device, comprising:
a transceiver configured to communicate with a scoring device and an interactive application, the interactive application interacting with a user utilizing a user device; a memory arrangement; and a processor coupled to the transceiver and the memory arrangement, wherein the processor is configured to instruct the transceiver to receive a request for action data from the interactive application, the action data indicative of an action to be taken by the interactive application during a session with the user device, the request generated by the interactive application based on a decision point associated with the interactive application, wherein the processor is configured to instruct the transceiver to receive the session data from the interactive application, the session data associated with the session and the user device, wherein the processor is configured to determine scoring package data associated with the request based on the session data, the scoring package data comprising a predictive model indicative of a plurality of actions to be performed by the interactive application, wherein the processor is configured to generate the action data based on the scoring package data. 12. The broker device of claim 11, wherein the processor is further configured to determine whether a validating operation is to be performed on the predictive model, the validating operation utilizing a randomly generated experiment response to the request, wherein the processor is further configured to generate the experiment response for the request, the experiment response replacing the action data, wherein the processor is further configured to instruct the transceiver to transmit the experiment response to the interactive application. 13. The broker device of claim 12, wherein the validating operation is performed at a predetermined time interval, at a random time interval, or when a changing trend is determined relative to the predictive model. 14. The broker device of claim 11, wherein, prior to receiving the request, the processor is configured to generate the scoring package data, wherein the processor is further configured to instruct the transceiver to receive a further request for further action data from a further interactive application interacting with a further user utilizing a further user device during a further session, wherein the processor is further configured to instruct the transceiver to receive further session data from the further interactive application, the further session data associated with the further session and the further user device, wherein the processor is further configured to determine experiment data as a function of the further session data, the experiment data corresponding to a randomly generated action data for the further session, wherein the processor is further configured to instruct the transceiver to transmit the experiment data to the further user device, wherein the processor is further configured to instruct the transceiver to receive response data from the further user device, the response data being indicative of a user response to the experiment data, wherein the scoring package data is generated based on the response data. 15. The broker device of claim 14, wherein the processor is further configured to instruct the transceiver to receive additional further requests for additional further action data from additional further interactive applications interactive with additional further users utilizing additional further user devices, wherein the processor is further configured to instruct the transceiver to receive additional further session data from the additional further interactive applications, the additional further session data associated with the additional further sessions and the additional further user devices, wherein the processor is further configured to determine further experiment data as a function of the additional further session data, the further experiment data corresponding to a further randomly generated action data for the additional further sessions, wherein the processor is further configured to instruct the transceiver to transmit the further experiment data to the additional further user devices, wherein the processor is further configured to instruct the transceiver to receive further response data from the additional further user devices, the further response data being indicative of a further user response to the further experiment data, wherein the scoring package data is further generated based on the further response data. 16. The broker device of claim 15, wherein the scoring package data is generated when a predetermined minimum number is reached from a sum of the further request and a number of the additional further requests. 17. The broker device of claim 11, wherein the processor is further configured to instruct the transceiver to transmit the predicted response to the interactive application, wherein the processor is further configured to instruct the transceiver to receive response data from the interactive application indicating actual action data that was used, the actual action data being indicative of a user response to the actual response data being used. 18. The broker device of claim 17, wherein the processor is further configured to update the predictive model and the scoring package data based on the response data. 19. The broker device of claim 17, wherein the actual action data is the action data or an independent response generated by the interactive application. 20. The broker device of claim 11, wherein the processor is further configured to generate a data request for the session data, wherein the processor is further configured to instruct the transceiver to transmit the data request to the interactive application, wherein the receiving the session data is in response to the data request. | 2,100 |
6,715 | 6,715 | 15,806,917 | 2,199 | Disclosed examples to perform instruction-level graphics processing unit (GPU) profiling based on binary instrumentation include: accessing, via a GPU driver executed by a processor, binary code generated by a GPU compiler based on application programming interface (API)-based code provided by an application; accessing, via the GPU driver executed by the processor, instrumented binary code, the instrumented binary code generated by a binary instrumentation module that inserts profiling instructions in the binary code based on an instrumentation schema provided by a profiling application; and providing, via the GPU driver executed by the processor, the instrumented binary code from the GPU driver to a GPU, the instrumented binary code structured to cause the GPU to collect and store profiling data in a memory based on the profiling instructions while executing the instrumented binary code. | 1. An apparatus to perform instruction-level graphics processing unit (GPU) profiling based on binary instrumentation, comprising:
a processor to execute a GPU driver; a compiler interface of the GPU driver to access binary code generated by a GPU compiler based on application programming interface (API)-based code provided by an application; an instrumentation interface of the GPU driver to access instrumented binary code, the instrumented binary code to be generated by a binary instrumentation module by inserting profiling instructions in the binary code based on an instrumentation schema provided by a profiling application; and a GPU interface to provide the instrumented binary code from the GPU driver to a GPU, the instrumented binary code structured to cause the GPU to generate profiling data based on the profiling instructions while executing the instrumented binary code. 2. An apparatus as defined in claim 1, further including a memory in circuit with the GPU, the GPU to store the profiling data in the memory. 3. An apparatus as defined in claim 1, wherein, before providing the instrumented binary code to the GPU, the GPU interface is to access header information in the instrumented binary code to determine, based on the header information, that the instrumented binary code is to be provided to the GPU. 4. An apparatus as defined in claim 1, wherein the compiler interface is to provide the API-based code from the GPU driver to the GPU compiler. 5. An apparatus as defined in claim 1, wherein the instrumentation interface is to provide the binary code from the GPU driver to the binary instrumentation module. 6. An apparatus as defined in claim 1, further including a profiling application executed by the processor to present the profiling data via a graphical user interface on a display. 7. An apparatus as defined in claim 1, further including:
a profiling application to be executed by the processor to generate the instrumentation schema based on profiling settings; and the binary instrumentation module to be in communication with the profiling application, the binary instrumentation module to:
determine profiling instruction insertion points based on the instrumentation schema; and
generate the instrumented binary code by inserting the profiling instructions at corresponding ones of the profiling instruction insertion points based on the instrumentation schema. 8. An apparatus to perform instruction-level graphics processing unit (GPU) profiling based on binary instrumentation, comprising:
means for executing a GPU driver; means for accessing binary code generated by a GPU compiler based on application programming interface (API)-based code provided by an application; means for accessing instrumented binary code, the instrumented binary code to be generated by a binary instrumentation module by inserting profiling instructions in the binary code based on an instrumentation schema provided by a profiling application; and means for providing the instrumented binary code from the GPU driver to a GPU, the instrumented binary code structured to cause the GPU to generate profiling data based on the profiling instructions while executing the instrumented binary code. 9. An apparatus as defined in claim 8, further including storing means in circuit with the GPU, the GPU to store the profiling data in the storing means. 10. An apparatus as defined in claim 8, further including means for accessing header information to, before providing the instrumented binary code to the GPU, access header information in the instrumented binary code to determine, based on the header information, that the instrumented binary code is to be provided to the GPU. 11. An apparatus as defined in claim 8, further including means for providing the API-based code from the GPU driver to the GPU compiler. 12. An apparatus as defined in claim 8, further including means for providing the binary code from the GPU driver to the binary instrumentation module. 13. An apparatus as defined in claim 8, further including profiling means for presenting the profiling data via a graphical user interface on a display. 14. An apparatus as defined in claim 8, further including:
profiling means for generating the instrumentation schema based on profiling settings; means for determining profiling instruction insertion points based on the instrumentation schema; and means for generating the instrumented binary code by inserting the profiling instructions at corresponding ones of the profiling instruction insertion points based on the instrumentation schema. 15. A non-transitory computer readable medium comprising instructions that, when executed, cause at least one processor to at least:
access, via a graphics processing unit (GPU) driver, binary code generated by a GPU compiler based on application programming interface (API)-based code provided by an application; access, via the GPU driver, instrumented binary code, the instrumented binary code generated by a binary instrumentation module that inserts profiling instructions in the binary code based on an instrumentation schema provided by a profiling application; and provide, via the GPU driver, the instrumented binary code from the GPU driver to a GPU, the instrumented binary code structured to cause the GPU to collect and store profiling data in a memory based on the profiling instructions while executing the instrumented binary code. 16. A non-transitory computer readable medium as defined in claim 15, wherein the instructions are further to cause the at least one processor to, before providing the instrumented binary code to the GPU, access header information in the instrumented binary code to determine, based on the header information, that the instrumented binary code is to be provided to the GPU. 17. A non-transitory computer readable medium as defined in claim 15, wherein the instructions are further to cause the at least one processor to provide the API-based code from the GPU driver to the GPU compiler. 18. A non-transitory computer readable medium as defined in claim 15, wherein the instructions are further to cause the at least one processor to provide the binary code from the GPU driver to the binary instrumentation module. 19. A non-transitory computer readable medium as defined in claim 15, wherein the instructions are further to cause the at least one processor to present the profiling data via a graphical user interface on a display. 20. A non-transitory computer readable medium as defined in claim 15, wherein the instructions are further to cause the at least one processor to:
generate the instrumentation schema based on profiling settings; determine profiling instruction insertion points based on the instrumentation schema; and generate the instrumented binary code by inserting the profiling instructions at corresponding ones of the profiling instruction insertion points based on the instrumentation schema. 21. A method to perform instruction-level graphics processing unit (GPU) profiling based on binary instrumentation, comprising:
accessing, via a GPU driver executed by a processor, binary code generated by a GPU compiler based on application programming interface (API)-based code provided by an application; accessing, via the GPU driver executed by the processor, instrumented binary code, the instrumented binary code generated by a binary instrumentation module that inserts profiling instructions in the binary code based on an instrumentation schema provided by a profiling application; and providing, via the GPU driver executed by the processor, the instrumented binary code from the GPU driver to a GPU, the instrumented binary code structured to cause the GPU to collect and store profiling data in a memory based on the profiling instructions while executing the instrumented binary code. 22. A method as defined in claim 21, further including, before providing the instrumented binary code to the GPU, accessing header information in the instrumented binary code to determine, based on the header information, that the instrumented binary code is to be provided to the GPU. 23. A method as defined in claim 21, further including providing the API-based code from the GPU driver to the GPU compiler. 24. A method as defined in claim 21, further including providing the binary code from the GPU driver to the binary instrumentation module. 25. A method as defined in claim 21, further including presenting the profiling data via a graphical user interface on a display. 26. A method as defined in claim 21, further including:
generating the instrumentation schema based on profiling settings; determining profiling instruction insertion points based on the instrumentation schema; and generating the instrumented binary code by inserting the profiling instructions at corresponding ones of the profiling instruction insertion points based on the instrumentation schema. | Disclosed examples to perform instruction-level graphics processing unit (GPU) profiling based on binary instrumentation include: accessing, via a GPU driver executed by a processor, binary code generated by a GPU compiler based on application programming interface (API)-based code provided by an application; accessing, via the GPU driver executed by the processor, instrumented binary code, the instrumented binary code generated by a binary instrumentation module that inserts profiling instructions in the binary code based on an instrumentation schema provided by a profiling application; and providing, via the GPU driver executed by the processor, the instrumented binary code from the GPU driver to a GPU, the instrumented binary code structured to cause the GPU to collect and store profiling data in a memory based on the profiling instructions while executing the instrumented binary code.1. An apparatus to perform instruction-level graphics processing unit (GPU) profiling based on binary instrumentation, comprising:
a processor to execute a GPU driver; a compiler interface of the GPU driver to access binary code generated by a GPU compiler based on application programming interface (API)-based code provided by an application; an instrumentation interface of the GPU driver to access instrumented binary code, the instrumented binary code to be generated by a binary instrumentation module by inserting profiling instructions in the binary code based on an instrumentation schema provided by a profiling application; and a GPU interface to provide the instrumented binary code from the GPU driver to a GPU, the instrumented binary code structured to cause the GPU to generate profiling data based on the profiling instructions while executing the instrumented binary code. 2. An apparatus as defined in claim 1, further including a memory in circuit with the GPU, the GPU to store the profiling data in the memory. 3. An apparatus as defined in claim 1, wherein, before providing the instrumented binary code to the GPU, the GPU interface is to access header information in the instrumented binary code to determine, based on the header information, that the instrumented binary code is to be provided to the GPU. 4. An apparatus as defined in claim 1, wherein the compiler interface is to provide the API-based code from the GPU driver to the GPU compiler. 5. An apparatus as defined in claim 1, wherein the instrumentation interface is to provide the binary code from the GPU driver to the binary instrumentation module. 6. An apparatus as defined in claim 1, further including a profiling application executed by the processor to present the profiling data via a graphical user interface on a display. 7. An apparatus as defined in claim 1, further including:
a profiling application to be executed by the processor to generate the instrumentation schema based on profiling settings; and the binary instrumentation module to be in communication with the profiling application, the binary instrumentation module to:
determine profiling instruction insertion points based on the instrumentation schema; and
generate the instrumented binary code by inserting the profiling instructions at corresponding ones of the profiling instruction insertion points based on the instrumentation schema. 8. An apparatus to perform instruction-level graphics processing unit (GPU) profiling based on binary instrumentation, comprising:
means for executing a GPU driver; means for accessing binary code generated by a GPU compiler based on application programming interface (API)-based code provided by an application; means for accessing instrumented binary code, the instrumented binary code to be generated by a binary instrumentation module by inserting profiling instructions in the binary code based on an instrumentation schema provided by a profiling application; and means for providing the instrumented binary code from the GPU driver to a GPU, the instrumented binary code structured to cause the GPU to generate profiling data based on the profiling instructions while executing the instrumented binary code. 9. An apparatus as defined in claim 8, further including storing means in circuit with the GPU, the GPU to store the profiling data in the storing means. 10. An apparatus as defined in claim 8, further including means for accessing header information to, before providing the instrumented binary code to the GPU, access header information in the instrumented binary code to determine, based on the header information, that the instrumented binary code is to be provided to the GPU. 11. An apparatus as defined in claim 8, further including means for providing the API-based code from the GPU driver to the GPU compiler. 12. An apparatus as defined in claim 8, further including means for providing the binary code from the GPU driver to the binary instrumentation module. 13. An apparatus as defined in claim 8, further including profiling means for presenting the profiling data via a graphical user interface on a display. 14. An apparatus as defined in claim 8, further including:
profiling means for generating the instrumentation schema based on profiling settings; means for determining profiling instruction insertion points based on the instrumentation schema; and means for generating the instrumented binary code by inserting the profiling instructions at corresponding ones of the profiling instruction insertion points based on the instrumentation schema. 15. A non-transitory computer readable medium comprising instructions that, when executed, cause at least one processor to at least:
access, via a graphics processing unit (GPU) driver, binary code generated by a GPU compiler based on application programming interface (API)-based code provided by an application; access, via the GPU driver, instrumented binary code, the instrumented binary code generated by a binary instrumentation module that inserts profiling instructions in the binary code based on an instrumentation schema provided by a profiling application; and provide, via the GPU driver, the instrumented binary code from the GPU driver to a GPU, the instrumented binary code structured to cause the GPU to collect and store profiling data in a memory based on the profiling instructions while executing the instrumented binary code. 16. A non-transitory computer readable medium as defined in claim 15, wherein the instructions are further to cause the at least one processor to, before providing the instrumented binary code to the GPU, access header information in the instrumented binary code to determine, based on the header information, that the instrumented binary code is to be provided to the GPU. 17. A non-transitory computer readable medium as defined in claim 15, wherein the instructions are further to cause the at least one processor to provide the API-based code from the GPU driver to the GPU compiler. 18. A non-transitory computer readable medium as defined in claim 15, wherein the instructions are further to cause the at least one processor to provide the binary code from the GPU driver to the binary instrumentation module. 19. A non-transitory computer readable medium as defined in claim 15, wherein the instructions are further to cause the at least one processor to present the profiling data via a graphical user interface on a display. 20. A non-transitory computer readable medium as defined in claim 15, wherein the instructions are further to cause the at least one processor to:
generate the instrumentation schema based on profiling settings; determine profiling instruction insertion points based on the instrumentation schema; and generate the instrumented binary code by inserting the profiling instructions at corresponding ones of the profiling instruction insertion points based on the instrumentation schema. 21. A method to perform instruction-level graphics processing unit (GPU) profiling based on binary instrumentation, comprising:
accessing, via a GPU driver executed by a processor, binary code generated by a GPU compiler based on application programming interface (API)-based code provided by an application; accessing, via the GPU driver executed by the processor, instrumented binary code, the instrumented binary code generated by a binary instrumentation module that inserts profiling instructions in the binary code based on an instrumentation schema provided by a profiling application; and providing, via the GPU driver executed by the processor, the instrumented binary code from the GPU driver to a GPU, the instrumented binary code structured to cause the GPU to collect and store profiling data in a memory based on the profiling instructions while executing the instrumented binary code. 22. A method as defined in claim 21, further including, before providing the instrumented binary code to the GPU, accessing header information in the instrumented binary code to determine, based on the header information, that the instrumented binary code is to be provided to the GPU. 23. A method as defined in claim 21, further including providing the API-based code from the GPU driver to the GPU compiler. 24. A method as defined in claim 21, further including providing the binary code from the GPU driver to the binary instrumentation module. 25. A method as defined in claim 21, further including presenting the profiling data via a graphical user interface on a display. 26. A method as defined in claim 21, further including:
generating the instrumentation schema based on profiling settings; determining profiling instruction insertion points based on the instrumentation schema; and generating the instrumented binary code by inserting the profiling instructions at corresponding ones of the profiling instruction insertion points based on the instrumentation schema. | 2,100 |
6,716 | 6,716 | 15,693,256 | 2,174 | A system for providing an audio interface at a mobile device is provided. The mobile device includes an interface programmed detect a loudspeaker system. The mobile device presents, via a user interface, a display screen to receive user input of sweet-spot commands. The mobile devices send sweet-spot parameters to the loudspeaker system in response to the sweet-spot commands. | 1. A system for providing an audio interface at a mobile device, comprising:
a mobile device including an interface programmed to:
detect a loudspeaker system;
present, via a user interface, a display screen to receive user input of sweet-spot commands;
send sweet-spot parameters to the loudspeaker system in response to the sweet-spot commands. 2. The system of claim 1, wherein the mobile device is further programmed to present, via the user interface, a sweet-spot button being moveable on the display screen to receive the sweet-spot command indicating a sweet-spot location. 3. The system of claim 1, wherein the mobile device is further programmed to present, via the user interface, a selectable size option to receive the sweet-spot command indicating a sweet-spot size. 4. The system of claim 1, wherein the mobile device is further programmed to:
present, via the user interface, a setup screen to receive user input of loudspeaker setup input; and present on the setup screen a distance input for receiving a separation distance between loudspeakers. 5. The system of claim 4, wherein the mobile device is further programmed to determine a display screen scale size based on the separation distance between the loudspeakers. 6. The system of claim 4, wherein the mobile device is further programmed to send loudspeaker setup input to the loudspeaker system. 7. A non-transitory computer-readable medium tangibly embodying computer-executable instructions of a software program, the software program being executable by a processor of a computing device to provide operations, comprising:
presenting, via a user interface, a display screen to receive user input of audio commands, wherein the display screen includes at least one sweet-spot button being moveable to select a sweet-spot location. 8. The medium of claim 7, wherein the display screen includes a pair of speaker icons indicating a pair of loudspeakers, wherein the sweet-spot button is movable relative to the pair of speaker icons. 9. The medium of claim 7, further comprising:
presenting a selectable size option for receiving a sweet-spot size input; and presenting the sweet-spot button in one of a plurality of sizes based on the sweet-spot size input. 10. The medium of claim 7, wherein the display screen includes at least two sweet-spot buttons, each sweet-spot button being moveable independently to select at least two sweet-spot locations. 11. The medium of claim 7, wherein the display screen includes an audio player control for controlling and selecting audio media. 12. The medium of claim 7, further comprising:
presenting, via the user interface, a setup screen to receive user input of loudspeaker setup input, wherein the setup screen includes a distance input for receiving a separation distance between loudspeakers. 13. The medium of claim 7, further comprising:
presenting, via the user interface, a panorama control screen for receiving user input of a sound stage size. 14. A method comprising:
presenting a display screen including at least one sweet-spot button being moveable; and dynamically updating the display screen with as the sweet-spot button is moved between at least a first sweet-spot location and a second sweet-spot location. 15. The method of claim 14, further comprising:
presenting a selectable size option for receiving a sweet-spot size input; and updating the display screen to vary a size of the sweet-spot button based on the sweet-spot size input. 16. The method of claim 14, wherein the display screen includes audio beam indicators extending between a pair of speaker icons and the sweet-spot button, wherein dynamically updating the display screen includes dynamically moving the audio beam indicators as the sweet-spot button is moved between the first and second sweet-spot locations. 17. The method of claim 14, further comprising:
presenting a setup screen for receiving user input of loudspeaker setup input. 18. The method of claim 17, further comprising:
determine display screen parameters based on the loudspeaker setup input received. 19. The method of claim 14, further comprising:
presenting a panorama control screen for receiving user input of a sound stage size. 20. The method of claim 14, wherein the display screen includes at least two sweet-spot buttons, each sweet-spot button being moveable independently. | A system for providing an audio interface at a mobile device is provided. The mobile device includes an interface programmed detect a loudspeaker system. The mobile device presents, via a user interface, a display screen to receive user input of sweet-spot commands. The mobile devices send sweet-spot parameters to the loudspeaker system in response to the sweet-spot commands.1. A system for providing an audio interface at a mobile device, comprising:
a mobile device including an interface programmed to:
detect a loudspeaker system;
present, via a user interface, a display screen to receive user input of sweet-spot commands;
send sweet-spot parameters to the loudspeaker system in response to the sweet-spot commands. 2. The system of claim 1, wherein the mobile device is further programmed to present, via the user interface, a sweet-spot button being moveable on the display screen to receive the sweet-spot command indicating a sweet-spot location. 3. The system of claim 1, wherein the mobile device is further programmed to present, via the user interface, a selectable size option to receive the sweet-spot command indicating a sweet-spot size. 4. The system of claim 1, wherein the mobile device is further programmed to:
present, via the user interface, a setup screen to receive user input of loudspeaker setup input; and present on the setup screen a distance input for receiving a separation distance between loudspeakers. 5. The system of claim 4, wherein the mobile device is further programmed to determine a display screen scale size based on the separation distance between the loudspeakers. 6. The system of claim 4, wherein the mobile device is further programmed to send loudspeaker setup input to the loudspeaker system. 7. A non-transitory computer-readable medium tangibly embodying computer-executable instructions of a software program, the software program being executable by a processor of a computing device to provide operations, comprising:
presenting, via a user interface, a display screen to receive user input of audio commands, wherein the display screen includes at least one sweet-spot button being moveable to select a sweet-spot location. 8. The medium of claim 7, wherein the display screen includes a pair of speaker icons indicating a pair of loudspeakers, wherein the sweet-spot button is movable relative to the pair of speaker icons. 9. The medium of claim 7, further comprising:
presenting a selectable size option for receiving a sweet-spot size input; and presenting the sweet-spot button in one of a plurality of sizes based on the sweet-spot size input. 10. The medium of claim 7, wherein the display screen includes at least two sweet-spot buttons, each sweet-spot button being moveable independently to select at least two sweet-spot locations. 11. The medium of claim 7, wherein the display screen includes an audio player control for controlling and selecting audio media. 12. The medium of claim 7, further comprising:
presenting, via the user interface, a setup screen to receive user input of loudspeaker setup input, wherein the setup screen includes a distance input for receiving a separation distance between loudspeakers. 13. The medium of claim 7, further comprising:
presenting, via the user interface, a panorama control screen for receiving user input of a sound stage size. 14. A method comprising:
presenting a display screen including at least one sweet-spot button being moveable; and dynamically updating the display screen with as the sweet-spot button is moved between at least a first sweet-spot location and a second sweet-spot location. 15. The method of claim 14, further comprising:
presenting a selectable size option for receiving a sweet-spot size input; and updating the display screen to vary a size of the sweet-spot button based on the sweet-spot size input. 16. The method of claim 14, wherein the display screen includes audio beam indicators extending between a pair of speaker icons and the sweet-spot button, wherein dynamically updating the display screen includes dynamically moving the audio beam indicators as the sweet-spot button is moved between the first and second sweet-spot locations. 17. The method of claim 14, further comprising:
presenting a setup screen for receiving user input of loudspeaker setup input. 18. The method of claim 17, further comprising:
determine display screen parameters based on the loudspeaker setup input received. 19. The method of claim 14, further comprising:
presenting a panorama control screen for receiving user input of a sound stage size. 20. The method of claim 14, wherein the display screen includes at least two sweet-spot buttons, each sweet-spot button being moveable independently. | 2,100 |
6,717 | 6,717 | 16,434,504 | 2,176 | In general, transparent fuel dispensers are provided, and in particular methods and devices are provided for increasing visibility on a fuel dispensing device. In one embodiment a fuel dispenser is provided having a display that is at least partially transparent at least during certain modes of operation. The display can display information on portions thereof during certain modes of operation as well. | 1. A fuel dispenser, comprising:
a housing having fuel dispensing components disposed therein; a control system in the housing for controlling the dispensing of fuel; and a graphical display located on the housing and configured to display graphical information, the graphical display having:
a transparent mode in which at least a portion of the display is transparent, and
a non-transparent mode in which at least the portion of the display is non-transparent,
wherein the graphical display in the transparent mode allows viewing from a front of the housing, through the display, to outside a rear of the housing and viewing from the rear of the housing, through the display, to outside the front of the housing. 2. The fuel dispenser of claim 1, wherein the graphical display is configured to transition between the transparent mode and the non-transparent mode in response to a trigger. 3. The fuel dispenser of claim 2, wherein the trigger comprises a touch screen on the graphical display that, when touched, causes the graphical display to transition from the transparent mode to the non-transparent mode. 4. The fuel dispenser of claim 2, wherein the trigger comprises a fixed amount of time after a last interaction between a customer and the fuel dispenser that, when activated, causes the graphical display to transition from the transparent mode to the non-transparent mode. 5. The fuel dispenser of claim 2, wherein the trigger is selected from a button on the fuel dispenser, a switch on the fuel dispenser, a keyboard on the fuel dispenser, a motion sensor, a pressure sensor, a sound sensor, a video camera, and a payment device on the fuel dispenser that, when touched, causes the graphical display to transition from the transparent mode to the non-transparent mode. 6. The fuel dispenser of claim 1, wherein the non-transparent mode is a media mode in which the graphical information is present on the display and is visual to a user. 7. The fuel dispenser of claim 1, wherein a curtain is located in the housing and is configured to extend behind the graphical display in the non-transparent mode and retract in the transparent mode. 8. The fuel dispenser of claim 1, further comprising a biometrics reader; and
a processor configured to receive biometrics data from the biometrics reader, configured to determine identity information of a customer using the biometrics data, and configured to cause the fuel dispenser to perform an action using the identity information. 9. The fuel dispenser of claim 8, wherein the biometrics reader is configured to read at least one of a fingerprint, an eye pattern verification, a palm print, DNA, hand geometry, and vein pattern. 10. The fuel dispenser of claim 8, wherein the processor is configured to cause the biometrics data to be transmitted to a remote database for determining whether the biometrics data matches a customer identity. 11. The fuel dispenser of claim 8, wherein the processor is configured to determine whether the biometrics data matches a customer identity. 12. The fuel dispenser of claim 8, wherein the processor is configured to provide the determined identity information of the customer to a remote processor for determining the customer's identity that includes a name or unique identifier, and based on the determined identity information of the customer, a characteristic of the customer including at least one of age, height, gender, and disability status is identified. 13. The fuel dispenser of claim 12, wherein the processor is configured to dynamically reconfigure at least one graphical user interface (GUI) element in the graphical display, the GUI element having at least one of a reconfigured location and a reconfigured size determined using the determined characteristic of the customer. 14. The fuel dispenser of claim 1, further comprising a rear graphical display disposed on a rear side of the housing,
wherein the graphical display is a front graphical display disposed on a front side of the housing, and the rear graphical display is configured to be transparent simultaneously with the front graphical display being in the transparent mode to allow an unobstructed view through the front and rear graphical displays. 15. A method of interacting with a fuel dispenser display, comprising:
activating a fuel dispenser to cause the fuel dispenser to dispense fuel; and upon the activation of the fuel dispenser, causing a graphical display disposed on the fuel dispenser to transition from a non-transparent mode in which at least a portion of the display is non-transparent to a transparent mode in which at least the portion of the display is transparent, wherein the graphical display in the transparent mode allows viewing from a front of the housing, through the display, to outside a rear of the housing and viewing from the rear of the housing, through the display, to outside the front of the housing. 16. The method of claim 15, wherein activating the fuel dispenser includes activating a trigger to cause the graphical display to display media. 17. The method of claim 16, wherein activating the trigger includes touching a touch screen. 18. The method of claim 16, wherein the trigger is selected from a button on the fuel dispenser, a switch on the fuel dispenser, a keyboard on the fuel dispenser, a motion sensor, a pressure sensor, a sound sensor, a video camera, and a payment device on the fuel dispenser. 19. The method of claim 15, wherein activating the fuel dispenser includes activating a trigger including waiting a fixed amount of time after a last interaction between a customer and the fuel dispenser that, when activated, causes the graphical display to become transparent. 20. The method of claim 15, wherein activating the fuel dispenser also activates a curtain that blocks a back of the graphical display when displaying media, the curtain configured to retract into the fuel dispenser when the graphical display is transparent. | In general, transparent fuel dispensers are provided, and in particular methods and devices are provided for increasing visibility on a fuel dispensing device. In one embodiment a fuel dispenser is provided having a display that is at least partially transparent at least during certain modes of operation. The display can display information on portions thereof during certain modes of operation as well.1. A fuel dispenser, comprising:
a housing having fuel dispensing components disposed therein; a control system in the housing for controlling the dispensing of fuel; and a graphical display located on the housing and configured to display graphical information, the graphical display having:
a transparent mode in which at least a portion of the display is transparent, and
a non-transparent mode in which at least the portion of the display is non-transparent,
wherein the graphical display in the transparent mode allows viewing from a front of the housing, through the display, to outside a rear of the housing and viewing from the rear of the housing, through the display, to outside the front of the housing. 2. The fuel dispenser of claim 1, wherein the graphical display is configured to transition between the transparent mode and the non-transparent mode in response to a trigger. 3. The fuel dispenser of claim 2, wherein the trigger comprises a touch screen on the graphical display that, when touched, causes the graphical display to transition from the transparent mode to the non-transparent mode. 4. The fuel dispenser of claim 2, wherein the trigger comprises a fixed amount of time after a last interaction between a customer and the fuel dispenser that, when activated, causes the graphical display to transition from the transparent mode to the non-transparent mode. 5. The fuel dispenser of claim 2, wherein the trigger is selected from a button on the fuel dispenser, a switch on the fuel dispenser, a keyboard on the fuel dispenser, a motion sensor, a pressure sensor, a sound sensor, a video camera, and a payment device on the fuel dispenser that, when touched, causes the graphical display to transition from the transparent mode to the non-transparent mode. 6. The fuel dispenser of claim 1, wherein the non-transparent mode is a media mode in which the graphical information is present on the display and is visual to a user. 7. The fuel dispenser of claim 1, wherein a curtain is located in the housing and is configured to extend behind the graphical display in the non-transparent mode and retract in the transparent mode. 8. The fuel dispenser of claim 1, further comprising a biometrics reader; and
a processor configured to receive biometrics data from the biometrics reader, configured to determine identity information of a customer using the biometrics data, and configured to cause the fuel dispenser to perform an action using the identity information. 9. The fuel dispenser of claim 8, wherein the biometrics reader is configured to read at least one of a fingerprint, an eye pattern verification, a palm print, DNA, hand geometry, and vein pattern. 10. The fuel dispenser of claim 8, wherein the processor is configured to cause the biometrics data to be transmitted to a remote database for determining whether the biometrics data matches a customer identity. 11. The fuel dispenser of claim 8, wherein the processor is configured to determine whether the biometrics data matches a customer identity. 12. The fuel dispenser of claim 8, wherein the processor is configured to provide the determined identity information of the customer to a remote processor for determining the customer's identity that includes a name or unique identifier, and based on the determined identity information of the customer, a characteristic of the customer including at least one of age, height, gender, and disability status is identified. 13. The fuel dispenser of claim 12, wherein the processor is configured to dynamically reconfigure at least one graphical user interface (GUI) element in the graphical display, the GUI element having at least one of a reconfigured location and a reconfigured size determined using the determined characteristic of the customer. 14. The fuel dispenser of claim 1, further comprising a rear graphical display disposed on a rear side of the housing,
wherein the graphical display is a front graphical display disposed on a front side of the housing, and the rear graphical display is configured to be transparent simultaneously with the front graphical display being in the transparent mode to allow an unobstructed view through the front and rear graphical displays. 15. A method of interacting with a fuel dispenser display, comprising:
activating a fuel dispenser to cause the fuel dispenser to dispense fuel; and upon the activation of the fuel dispenser, causing a graphical display disposed on the fuel dispenser to transition from a non-transparent mode in which at least a portion of the display is non-transparent to a transparent mode in which at least the portion of the display is transparent, wherein the graphical display in the transparent mode allows viewing from a front of the housing, through the display, to outside a rear of the housing and viewing from the rear of the housing, through the display, to outside the front of the housing. 16. The method of claim 15, wherein activating the fuel dispenser includes activating a trigger to cause the graphical display to display media. 17. The method of claim 16, wherein activating the trigger includes touching a touch screen. 18. The method of claim 16, wherein the trigger is selected from a button on the fuel dispenser, a switch on the fuel dispenser, a keyboard on the fuel dispenser, a motion sensor, a pressure sensor, a sound sensor, a video camera, and a payment device on the fuel dispenser. 19. The method of claim 15, wherein activating the fuel dispenser includes activating a trigger including waiting a fixed amount of time after a last interaction between a customer and the fuel dispenser that, when activated, causes the graphical display to become transparent. 20. The method of claim 15, wherein activating the fuel dispenser also activates a curtain that blocks a back of the graphical display when displaying media, the curtain configured to retract into the fuel dispenser when the graphical display is transparent. | 2,100 |
6,718 | 6,718 | 16,372,831 | 2,132 | A memory controller specifies, from a nonvolatile memory, a final page candidate, which is a candidate to be the physical page to which data is last written in a logical block. The memory controller executes an upward check process to determine whether the number of programmed physical pages is among a first range number of physical pages in a reverse order from the final page candidate is equal to or greater than a first reference value. The memory controller executes a downward check process determining whether the number of programmed physical pages is among a second range number of physical pages existing in the downward order from the final page candidate is equal to or less than a second reference value, and specifies the physical page to which data is last written in the logical block from results of the upward check process and the downward check process. | 1. A memory system comprising:
a nonvolatile memory including a plurality of physical blocks operable to erase units of data, the plurality of physical blocks having a plurality of physical pages operable to read and write units of data; and a memory controller that controls access of data to the nonvolatile memory, wherein the memory controller is configured to:
integrate the plurality of physical blocks to make up a logical block;
integrate one or more of the plurality of physical pages having a same relative position in the physical blocks among the plurality of physical pages to make up a logical page;
instruct the nonvolatile memory to write data such that the data is arranged in a predetermined first order with respect to the plurality of logical pages, and such that the data is arranged in a predetermined second order with respect to the plurality of physical pages in the logical page;
specify, from the nonvolatile memory, a final page candidate that is a candidate of a physical page in which data is last written in the logical block;
execute an upward check of determining whether a number of programmed physical pages among a first range number of physical pages existing in a reverse order to the second order from the final page candidate is equal to or greater than a first reference value;
execute a downward check of determining whether the number of programmed physical pages among a second range number of physical pages existing in the same order as the second order from the final page candidate is equal to or less than a second reference value; and
specify the physical page in which data is last written in the logical block from results of the upward check and the downward check. 2. The memory system according to claim 1, wherein when upward check determines that the number of programmed physical pages is equal to or greater than the first reference value, and the downward check determines that the number of programmed physical pages is equal to or less than the second reference value, the memory controller is configured to specify the programmed physical page among the first range number of physical pages in the order closest to the second order as the physical page to which data is last written. 3. The memory system according to claim 1, wherein when the upward check determines that the number of programmed physical pages is less than the first reference value, the memory controller is configured to correct the search range of the final page candidate and acquires a new final page candidate. 4. The memory system according to claim 1, wherein when the downward check determines that the number of programmed physical pages is greater than the second reference value, the memory controller is configured to correct the search range of the final page candidate to acquire the new final page candidate. 5. The memory system according to claim 1, wherein the memory controller is configured to acquire the final page candidate by N searches, where N is a natural number equal to or greater than two. 6. The memory system according to claim 1, wherein the memory controller is configured to generate a correction code with respect to data written to the logical block, assign the correction code to the data, and write the data to the logical block,
wherein the first reference value and the second reference value are set to a number of physical pages with a correctable range of error correction capability of the correction code. 7. The memory system according to claim 6, wherein the first reference value is three, and the second reference value is two. 8. The memory system according to claim 1, wherein the first range number is the number of physical pages in one logical page, and the second range number is the number of physical pages in one logical page. 9. The memory system according to claim 1, wherein the nonvolatile memory is a NAND type flash memory. 10. A method for controlling a memory system, the method comprising:
integrating a plurality of physical blocks existing in a nonvolatile memory and being an erasing unit of data, to make up a logical block, the plurality of physical blocks having a plurality of physical pages; integrating physical pages having a same relative position in the physical blocks among the plurality of physical pages in the physical blocks, each of the plurality of physical pages being a reading/writing unit of data, to constitute a logical page; instructing the nonvolatile memory to write data such that data is arranged in a predetermined first order with respect to the plurality of logical pages, and data is arranged in a predetermined second order with respect to the plurality of physical pages in the logical page; specifying, from the nonvolatile memory, a final page candidate which is a candidate to be the physical page to which data is last written in the logical block; executing an upward check of determining whether the number of programmed physical pages among a first range number of physical pages existing in an order from the final page candidate that is the reverse of the second order is equal to or greater than a first reference value; executing a downward check of determining whether the number of programmed physical pages among a second range number of physical pages existing in the same order as the second order from the final page candidate is equal to or less than a second reference value; and specifying the physical page to which data is last written in the logical block from results of the upward check and the downward check. 11. A memory controller for controlling access of data to a nonvolatile memory having a plurality of physical blocks having a plurality of physical pages, the memory controller comprising electrical circuits configured to:
integrate the plurality of physical blocks to make up a logical block, and integrate one or more of the plurality of physical pages having a same relative position in the physical blocks among the plurality of physical pages to make up a logical page; instruct the nonvolatile memory to write data such that the data is arranged in a predetermined first order with respect to the plurality of logical pages, and such that the data is arranged in a predetermined second order with respect to the plurality of physical pages in the logical page; specify, from the nonvolatile memory, a final page candidate that is a candidate of a physical page in which data is last written in the logical block; execute an upward check of determining whether a number of programmed physical pages among a first range number of physical pages existing in a reverse order to the second order from the final page candidate is equal to or greater than a first reference value; execute a downward check of determining whether the number of programmed physical pages among a second range number of physical pages existing in the same order as the second order from the final page candidate is equal to or less than a second reference value; and specify the physical page in which data is last written in the logical block from results of the upward check process and the downward check process. 12. The memory controller of claim 11, wherein the electrical circuits are further configured to erase one or more of the plurality of physical blocks and program one or more of the plurality of physical pages. 13. The memory controller of claim 11, wherein when upward check determines that the number of programmed physical pages is equal to or greater than the first reference value, and the downward check determines that the number of programmed physical pages is equal to or less than the second reference value, the memory controller is configured to specify the programmed physical page among the first range number of physical pages in the order closest to the second order as the physical page to which data is last written. 14. The memory controller of claim 11, wherein when the upward check determines that the number of programmed physical pages is less than the first reference value, the memory controller is configured to correct the search range of the final page candidate and acquire a new final page candidate. 15. The memory controller of claim 11, wherein when the downward check determines that the number of programmed physical pages is greater than the second reference value, the memory controller is configured to correct the search range of the final page candidate to acquire the new final page candidate. 16. The memory controller of claim 11, wherein the memory controller is configured to acquire the final page candidate by N searches, wherein N is a natural number equal to or greater than two. 17. The memory controller of claim 11, wherein the memory controller is configured to generate a correction code with respect to the data written to the logical block and assign the correction code to the data and writes the data to the logical block, and
wherein the first reference value and the second reference value are set to be a number of physical pages with a correctable range of error correction capability of the correction code. 18. The memory controller of claim 17, wherein the first reference value is three, and the second reference value is two. 19. The memory controller of claim 11, wherein the first range number is the number of physical pages in one logical page, and the second range number is the number of physical pages in one logical page. 20. The memory controller of claim 12, wherein the nonvolatile memory is a NAND type flash memory. | A memory controller specifies, from a nonvolatile memory, a final page candidate, which is a candidate to be the physical page to which data is last written in a logical block. The memory controller executes an upward check process to determine whether the number of programmed physical pages is among a first range number of physical pages in a reverse order from the final page candidate is equal to or greater than a first reference value. The memory controller executes a downward check process determining whether the number of programmed physical pages is among a second range number of physical pages existing in the downward order from the final page candidate is equal to or less than a second reference value, and specifies the physical page to which data is last written in the logical block from results of the upward check process and the downward check process.1. A memory system comprising:
a nonvolatile memory including a plurality of physical blocks operable to erase units of data, the plurality of physical blocks having a plurality of physical pages operable to read and write units of data; and a memory controller that controls access of data to the nonvolatile memory, wherein the memory controller is configured to:
integrate the plurality of physical blocks to make up a logical block;
integrate one or more of the plurality of physical pages having a same relative position in the physical blocks among the plurality of physical pages to make up a logical page;
instruct the nonvolatile memory to write data such that the data is arranged in a predetermined first order with respect to the plurality of logical pages, and such that the data is arranged in a predetermined second order with respect to the plurality of physical pages in the logical page;
specify, from the nonvolatile memory, a final page candidate that is a candidate of a physical page in which data is last written in the logical block;
execute an upward check of determining whether a number of programmed physical pages among a first range number of physical pages existing in a reverse order to the second order from the final page candidate is equal to or greater than a first reference value;
execute a downward check of determining whether the number of programmed physical pages among a second range number of physical pages existing in the same order as the second order from the final page candidate is equal to or less than a second reference value; and
specify the physical page in which data is last written in the logical block from results of the upward check and the downward check. 2. The memory system according to claim 1, wherein when upward check determines that the number of programmed physical pages is equal to or greater than the first reference value, and the downward check determines that the number of programmed physical pages is equal to or less than the second reference value, the memory controller is configured to specify the programmed physical page among the first range number of physical pages in the order closest to the second order as the physical page to which data is last written. 3. The memory system according to claim 1, wherein when the upward check determines that the number of programmed physical pages is less than the first reference value, the memory controller is configured to correct the search range of the final page candidate and acquires a new final page candidate. 4. The memory system according to claim 1, wherein when the downward check determines that the number of programmed physical pages is greater than the second reference value, the memory controller is configured to correct the search range of the final page candidate to acquire the new final page candidate. 5. The memory system according to claim 1, wherein the memory controller is configured to acquire the final page candidate by N searches, where N is a natural number equal to or greater than two. 6. The memory system according to claim 1, wherein the memory controller is configured to generate a correction code with respect to data written to the logical block, assign the correction code to the data, and write the data to the logical block,
wherein the first reference value and the second reference value are set to a number of physical pages with a correctable range of error correction capability of the correction code. 7. The memory system according to claim 6, wherein the first reference value is three, and the second reference value is two. 8. The memory system according to claim 1, wherein the first range number is the number of physical pages in one logical page, and the second range number is the number of physical pages in one logical page. 9. The memory system according to claim 1, wherein the nonvolatile memory is a NAND type flash memory. 10. A method for controlling a memory system, the method comprising:
integrating a plurality of physical blocks existing in a nonvolatile memory and being an erasing unit of data, to make up a logical block, the plurality of physical blocks having a plurality of physical pages; integrating physical pages having a same relative position in the physical blocks among the plurality of physical pages in the physical blocks, each of the plurality of physical pages being a reading/writing unit of data, to constitute a logical page; instructing the nonvolatile memory to write data such that data is arranged in a predetermined first order with respect to the plurality of logical pages, and data is arranged in a predetermined second order with respect to the plurality of physical pages in the logical page; specifying, from the nonvolatile memory, a final page candidate which is a candidate to be the physical page to which data is last written in the logical block; executing an upward check of determining whether the number of programmed physical pages among a first range number of physical pages existing in an order from the final page candidate that is the reverse of the second order is equal to or greater than a first reference value; executing a downward check of determining whether the number of programmed physical pages among a second range number of physical pages existing in the same order as the second order from the final page candidate is equal to or less than a second reference value; and specifying the physical page to which data is last written in the logical block from results of the upward check and the downward check. 11. A memory controller for controlling access of data to a nonvolatile memory having a plurality of physical blocks having a plurality of physical pages, the memory controller comprising electrical circuits configured to:
integrate the plurality of physical blocks to make up a logical block, and integrate one or more of the plurality of physical pages having a same relative position in the physical blocks among the plurality of physical pages to make up a logical page; instruct the nonvolatile memory to write data such that the data is arranged in a predetermined first order with respect to the plurality of logical pages, and such that the data is arranged in a predetermined second order with respect to the plurality of physical pages in the logical page; specify, from the nonvolatile memory, a final page candidate that is a candidate of a physical page in which data is last written in the logical block; execute an upward check of determining whether a number of programmed physical pages among a first range number of physical pages existing in a reverse order to the second order from the final page candidate is equal to or greater than a first reference value; execute a downward check of determining whether the number of programmed physical pages among a second range number of physical pages existing in the same order as the second order from the final page candidate is equal to or less than a second reference value; and specify the physical page in which data is last written in the logical block from results of the upward check process and the downward check process. 12. The memory controller of claim 11, wherein the electrical circuits are further configured to erase one or more of the plurality of physical blocks and program one or more of the plurality of physical pages. 13. The memory controller of claim 11, wherein when upward check determines that the number of programmed physical pages is equal to or greater than the first reference value, and the downward check determines that the number of programmed physical pages is equal to or less than the second reference value, the memory controller is configured to specify the programmed physical page among the first range number of physical pages in the order closest to the second order as the physical page to which data is last written. 14. The memory controller of claim 11, wherein when the upward check determines that the number of programmed physical pages is less than the first reference value, the memory controller is configured to correct the search range of the final page candidate and acquire a new final page candidate. 15. The memory controller of claim 11, wherein when the downward check determines that the number of programmed physical pages is greater than the second reference value, the memory controller is configured to correct the search range of the final page candidate to acquire the new final page candidate. 16. The memory controller of claim 11, wherein the memory controller is configured to acquire the final page candidate by N searches, wherein N is a natural number equal to or greater than two. 17. The memory controller of claim 11, wherein the memory controller is configured to generate a correction code with respect to the data written to the logical block and assign the correction code to the data and writes the data to the logical block, and
wherein the first reference value and the second reference value are set to be a number of physical pages with a correctable range of error correction capability of the correction code. 18. The memory controller of claim 17, wherein the first reference value is three, and the second reference value is two. 19. The memory controller of claim 11, wherein the first range number is the number of physical pages in one logical page, and the second range number is the number of physical pages in one logical page. 20. The memory controller of claim 12, wherein the nonvolatile memory is a NAND type flash memory. | 2,100 |
6,719 | 6,719 | 16,021,471 | 2,195 | In an embodiment, a processor for queue selection includes a plurality of processing engines (PEs) to execute threads, and a hardware queue manager. The hardware queue manager is to: detect that a first class lacks valid requests to be scheduled, the first class comprising a first plurality of scheduling queues, the first class associated with a first credit count; select a second class based on a second credit count associated with the second class, the second class comprising a second plurality of scheduling queues; and in response to a selection of the second class based on the second credit count, select a queue in the selected second class. Other embodiments are described and claimed. | 1. A processor comprising:
a plurality of processing engines (PEs) to execute threads; and a hardware queue manager to:
detect that a first class lacks valid requests to be scheduled, the first class comprising a first plurality of scheduling queues, the first class associated with a first credit count;
select a second class based on a second credit count associated with the second class, the second class comprising a second plurality of scheduling queues; and
in response to a selection of the second class based on the second credit count, select a queue in the selected second class. 2. The processor of claim 1, the hardware queue manager to, in response to the selection of the second class based on the second credit count:
increment the first credit count associated with the first class; and decrement the second credit count associated with the second class. 3. The processor of claim 1, wherein the first plurality of scheduling queues and the second first plurality of scheduling queues are included in a memory of the hardware queue manager. 4. The processor of claim 1, the hardware queue manager to:
generate a random number; compare the generated random number to a plurality of number ranges, wherein each number range is associated with a unique class of a plurality of classes; and select the first class in response to a determination that the generated number matches a first number range associated with the first class. 5. The processor of claim 1, the hardware queue manager to:
in response to a detection that the first class lacks valid requests to be scheduled:
for each class of a plurality of classes, determine a difference between a credit count and a saturation value associated with the class; and
select the second class in response to a determination that the second class has a smallest difference between the credit count and the saturation value. 6. The processor of claim 1, the hardware queue manager comprising, for each class of a plurality of classes:
a credit counter associated with the class; and a set of configuration registers associated with the class. 7. The processor of claim 1, wherein the first class is associated with a first priority level, and the second class is associated with a second priority level. 8. The processor of claim 1, the hardware queue manager to, in response to the selection of the second class based on the second credit count:
schedule a request to load a data element in the selected queue. 9. A method comprising:
detecting, by a hardware queue manager in a processor, that a first class lacks valid requests to be scheduled, the first class comprising a first plurality of scheduling queues, the first class associated with a first credit count; selecting, by the hardware queue manager, a second class based on a second credit count associated with the second class, the second class comprising a second plurality of scheduling queues; in response to a selection of the second class based on the second credit count:
incrementing, by the hardware queue manager, the first credit count associated with the first class; and
selecting, by the hardware queue manager, a queue in the selected second class. 10. The method of claim 9, further comprising, in response to a selection of the second class based on the second credit count:
decrementing, by the hardware queue manager, the second credit count associated with the second class. 11. The method of claim 9, further comprising, in response to a selection of the second class based on the second credit count:
scheduling, by the hardware queue manager, a request to load data in the selected queue. 12. The method of claim 9, further comprising:
in response to detection that the first class lacks valid requests to be scheduled:
for each class of a plurality of classes, determining a difference between a credit count and a saturation value associated with the class;
determining that the second class has a smallest difference between the credit count and the saturation value; and
selecting the second class in response to a determination that the second class has the smallest difference between the associated credit count and the saturation value. 13. The method of claim 9, further comprising, prior to detection that the first class lacks valid requests to be scheduled:
selecting the first class based on an assigned proportion of scheduling bandwidth assigned to the first class, wherein the first class is included in a plurality of classes, wherein each class of the plurality of classes is assigned a particular proportion of scheduling bandwidth. 14. The method of claim 9, further comprising:
in response to detection that a third class lacks valid requests to be scheduled:
selecting a fourth class and a fifth class;
determining that the fourth class and the fifth class are tied in credit count; and
in response to a determination that the fourth class and the fifth class are tied in credit count, using a tie-break arbiter to select the fourth class. 15. The method of claim 14, further comprising, after using the tie-break arbiter to select the fourth class:
incrementing a third credit count associated with the third class; and decrementing a fourth credit count associated with the fourth class. 16. A system comprising:
a processor comprising a plurality of processing engines and a queue manager unit, the queue manager unit to:
detect that a first class lacks valid requests to be scheduled, the first class comprising a first set of queues, the first class associated with a first credit count;
select a second class based on a second credit count associated with the second class, the second class comprising a second set of queues;
in response to a selection of the second class based on the second credit count:
increment the first credit count associated with the first class; and
select a queue in the selected second class; and
a system memory coupled to the processor. 17. The system of claim 16, the queue manager unit to, in response to a selection of the second class based on the second credit count:
decrement the second credit count associated with the second class. 18. The system of claim 16, the queue manager unit comprising:
a plurality of request buffers; and a plurality of queues divided into a plurality of classes, each class comprising a unique group of multiple queues. 19. The system of claim 16, the queue manager unit to, in response to the selection of the second class based on the second credit count:
schedule a request to load a data element in the selected queue. 20. The system of claim 16, the queue manager unit to:
in response to a detection that the first class lacks valid requests to be scheduled:
for each class of a plurality of classes, determine a difference between a credit count and a saturation value associated with the class; and
select the second class in response to a determination that the second class has a smallest difference between the credit count and the saturation value. | In an embodiment, a processor for queue selection includes a plurality of processing engines (PEs) to execute threads, and a hardware queue manager. The hardware queue manager is to: detect that a first class lacks valid requests to be scheduled, the first class comprising a first plurality of scheduling queues, the first class associated with a first credit count; select a second class based on a second credit count associated with the second class, the second class comprising a second plurality of scheduling queues; and in response to a selection of the second class based on the second credit count, select a queue in the selected second class. Other embodiments are described and claimed.1. A processor comprising:
a plurality of processing engines (PEs) to execute threads; and a hardware queue manager to:
detect that a first class lacks valid requests to be scheduled, the first class comprising a first plurality of scheduling queues, the first class associated with a first credit count;
select a second class based on a second credit count associated with the second class, the second class comprising a second plurality of scheduling queues; and
in response to a selection of the second class based on the second credit count, select a queue in the selected second class. 2. The processor of claim 1, the hardware queue manager to, in response to the selection of the second class based on the second credit count:
increment the first credit count associated with the first class; and decrement the second credit count associated with the second class. 3. The processor of claim 1, wherein the first plurality of scheduling queues and the second first plurality of scheduling queues are included in a memory of the hardware queue manager. 4. The processor of claim 1, the hardware queue manager to:
generate a random number; compare the generated random number to a plurality of number ranges, wherein each number range is associated with a unique class of a plurality of classes; and select the first class in response to a determination that the generated number matches a first number range associated with the first class. 5. The processor of claim 1, the hardware queue manager to:
in response to a detection that the first class lacks valid requests to be scheduled:
for each class of a plurality of classes, determine a difference between a credit count and a saturation value associated with the class; and
select the second class in response to a determination that the second class has a smallest difference between the credit count and the saturation value. 6. The processor of claim 1, the hardware queue manager comprising, for each class of a plurality of classes:
a credit counter associated with the class; and a set of configuration registers associated with the class. 7. The processor of claim 1, wherein the first class is associated with a first priority level, and the second class is associated with a second priority level. 8. The processor of claim 1, the hardware queue manager to, in response to the selection of the second class based on the second credit count:
schedule a request to load a data element in the selected queue. 9. A method comprising:
detecting, by a hardware queue manager in a processor, that a first class lacks valid requests to be scheduled, the first class comprising a first plurality of scheduling queues, the first class associated with a first credit count; selecting, by the hardware queue manager, a second class based on a second credit count associated with the second class, the second class comprising a second plurality of scheduling queues; in response to a selection of the second class based on the second credit count:
incrementing, by the hardware queue manager, the first credit count associated with the first class; and
selecting, by the hardware queue manager, a queue in the selected second class. 10. The method of claim 9, further comprising, in response to a selection of the second class based on the second credit count:
decrementing, by the hardware queue manager, the second credit count associated with the second class. 11. The method of claim 9, further comprising, in response to a selection of the second class based on the second credit count:
scheduling, by the hardware queue manager, a request to load data in the selected queue. 12. The method of claim 9, further comprising:
in response to detection that the first class lacks valid requests to be scheduled:
for each class of a plurality of classes, determining a difference between a credit count and a saturation value associated with the class;
determining that the second class has a smallest difference between the credit count and the saturation value; and
selecting the second class in response to a determination that the second class has the smallest difference between the associated credit count and the saturation value. 13. The method of claim 9, further comprising, prior to detection that the first class lacks valid requests to be scheduled:
selecting the first class based on an assigned proportion of scheduling bandwidth assigned to the first class, wherein the first class is included in a plurality of classes, wherein each class of the plurality of classes is assigned a particular proportion of scheduling bandwidth. 14. The method of claim 9, further comprising:
in response to detection that a third class lacks valid requests to be scheduled:
selecting a fourth class and a fifth class;
determining that the fourth class and the fifth class are tied in credit count; and
in response to a determination that the fourth class and the fifth class are tied in credit count, using a tie-break arbiter to select the fourth class. 15. The method of claim 14, further comprising, after using the tie-break arbiter to select the fourth class:
incrementing a third credit count associated with the third class; and decrementing a fourth credit count associated with the fourth class. 16. A system comprising:
a processor comprising a plurality of processing engines and a queue manager unit, the queue manager unit to:
detect that a first class lacks valid requests to be scheduled, the first class comprising a first set of queues, the first class associated with a first credit count;
select a second class based on a second credit count associated with the second class, the second class comprising a second set of queues;
in response to a selection of the second class based on the second credit count:
increment the first credit count associated with the first class; and
select a queue in the selected second class; and
a system memory coupled to the processor. 17. The system of claim 16, the queue manager unit to, in response to a selection of the second class based on the second credit count:
decrement the second credit count associated with the second class. 18. The system of claim 16, the queue manager unit comprising:
a plurality of request buffers; and a plurality of queues divided into a plurality of classes, each class comprising a unique group of multiple queues. 19. The system of claim 16, the queue manager unit to, in response to the selection of the second class based on the second credit count:
schedule a request to load a data element in the selected queue. 20. The system of claim 16, the queue manager unit to:
in response to a detection that the first class lacks valid requests to be scheduled:
for each class of a plurality of classes, determine a difference between a credit count and a saturation value associated with the class; and
select the second class in response to a determination that the second class has a smallest difference between the credit count and the saturation value. | 2,100 |
6,720 | 6,720 | 16,314,277 | 2,116 | A variable refrigerant flow (VRF) system for a building includes an outdoor VRF unit, a plurality of indoor VRF units, a battery, and a predictive VRF controller. The outdoor VRF unit includes powered VRF components configured to apply heating or cooling to a refrigerant. The indoor VRF units are configured to use the heated or cooled refrigerant to provide heating or cooling to a plurality of building zones. The battery is configured to store electric energy and discharge the stored electric energy for use in powering the powered VRF components. The predictive VRF controller is configured to optimize a predictive cost function to determine an optimal amount of electric energy to purchase from an energy grid and an optimal amount of electric energy to store in the battery or discharge from the battery for use in powering the powered VRF components at each time step of an optimization period. | 1. A variable refrigerant flow (VRF) system for a building, the VRF system comprising:
an outdoor VRF unit comprising one or more powered VRF components configured to apply heating or cooling to a refrigerant; a plurality of indoor VRF units configured to receive the heated or cooled refrigerant from the outdoor VRF unit and to use the heated or cooled refrigerant to provide heating or cooling to a plurality of building zones; a battery configured to store electric energy and discharge the stored electric energy for use in powering the powered VRF components; and a predictive VRF controller configured to optimize a predictive cost function to determine an optimal amount of electric energy to purchase from an energy grid and an optimal amount of electric energy to store in the battery or discharge from the battery for use in powering the powered VRF components at each time step of an optimization period. 2. The VRF system of claim 1, further comprising one or more photovoltaic panels configured to collect photovoltaic energy;
wherein the predictive VRF controller is configured to determine an optimal amount of the photovoltaic energy to store in the battery and an optimal amount of the photovoltaic energy to be consumed by the powered VRF components at each time step of the optimization period. 3. The VRF system of claim 1, wherein the outdoor VRF unit comprises a refrigeration circuit including a heat exchanger, a compressor configured to circulate the refrigerant through the heat exchanger, and a fan configured to modulate a rate of heat transfer in the heat exchanger;
wherein the powered VRF components comprise the compressor and the fan; wherein the predictive cost function accounts for a cost of operating the compressor and the fan at each time step of the optimization period. 4. The VRF system of claim 1, wherein the predictive cost function accounts for:
a cost of the electric energy purchased from the energy grid; and a cost savings resulting from discharging stored electric energy from the battery at each time step of the optimization period. 5. The VRF system of claim 1, wherein the predictive VRF controller is configured to:
receive energy pricing data defining a cost per unit of electric energy purchased from the energy grid at each time step of the optimization period; and use the energy pricing data as inputs to the predictive cost function. 6. The VRF system of claim 1, wherein the predictive cost function accounts for a demand charge based on a maximum power consumption of the VRF system during a demand charge period that overlaps at least partially with the optimization period;
wherein the predictive VRF controller is configured to receive energy pricing data defining the demand charge and to use the energy pricing data as inputs to the predictive cost function. 7. The VRF system of claim 1, wherein the predictive VRF controller comprises:
an economic controller configured to determine optimal power setpoints for the powered VRF components and for the battery at each time step of the optimization period; a tracking controller configured to use the optimal power setpoints to determine optimal temperature setpoints for the building zones or the refrigerant at each time step of the optimization period; and an equipment controller configured to use the optimal temperature setpoints to generate control signals for the powered VRF components and for the battery at each time step of the optimization period. 8. A variable refrigerant flow (VRF) system for a building, the VRF system comprising:
an outdoor VRF unit comprising one or more powered VRF components configured to apply heating or cooling to a refrigerant; a plurality of indoor VRF units configured to receive the heated or cooled refrigerant from the outdoor VRF unit and to use the heated or cooled refrigerant to provide heating or cooling to a plurality of building zones; and a predictive VRF controller configured to optimize a predictive cost function to determine an optimal amount of electric energy to purchase from an energy grid and an optimal amount of electric energy to be consumed by the powered VRF components at each time step of an optimization period. 9. The VRF system of claim 8, further comprising one or more photovoltaic panels configured to collect photovoltaic energy;
wherein the predictive VRF controller is configured to determine an optimal amount of the photovoltaic energy to store in the battery and an optimal amount of the photovoltaic energy to be consumed by the powered VRF components at each time step of the optimization period. 10. The VRF system of claim 8, wherein the outdoor VRF unit comprises a refrigeration circuit including a heat exchanger, a compressor configured to circulate the refrigerant through the heat exchanger, and a fan configured to modulate a rate of heat transfer in the heat exchanger;
wherein the powered VRF components comprise the compressor and the fan; wherein the predictive cost function accounts for a cost of operating the compressor and the fan at each time step of the optimization period. 11. The VRF system of claim 8, wherein the predictive cost function accounts for a cost of the electric energy purchased from the energy grid at each time step of the optimization period. 12. The VRF system of claim 1, wherein the predictive VRF controller is configured to:
receive energy pricing data defining a cost per unit of electric energy purchased from the energy grid at each time step of the optimization period; and use the energy pricing data as inputs to the predictive cost function. 13. The VRF system of claim 1, wherein the predictive cost function accounts for a demand charge based on a maximum power consumption of the VRF system during a demand charge period that overlaps at least partially with the optimization period;
wherein the predictive VRF controller is configured to receive energy pricing data defining the demand charge and to use the energy pricing data as inputs to the predictive cost function. 14. The VRF system of claim 1, wherein the predictive VRF controller comprises:
an economic controller configured to determine optimal power setpoints for the powered VRF components at each time step of the optimization period; a tracking controller configured to use the optimal power setpoints to determine optimal temperature setpoints for the building zones or the refrigerant at each time step of the optimization period; and an equipment controller configured to use the optimal temperature setpoints to generate control signals for the powered VRF components at each time step of the optimization period. 15. A method for operating a variable refrigerant flow (VRF) system, the method comprising:
receiving, at a predictive controller of the VRF system, energy pricing data defining energy prices for each of a plurality of time steps in an optimization period; using the energy pricing data as inputs to a predictive cost function that defines a cost of operating the VRF system over a duration of the optimization period; optimizing the predictive cost function to determine optimal power setpoints for one or more powered components of the VRF system and for a battery of the VRF system; using the optimal power setpoints to generate temperature setpoints for a zone temperature or refrigerant temperature affected by the VRF system; using the temperature setpoints to generate control signals for the powered components of the VRF system; and operating the powered components of the VRF system to achieve the temperature setpoints. 16. The method of claim 15, wherein optimizing the predictive cost function comprises determining an optimal amount of electric energy to purchase from an energy grid and an optimal amount of electric energy to store in the battery or discharge from the battery for use in powering the powered components of the VRF system at each time step of an optimization period. 17. The method of claim 15, further comprising operating a refrigeration circuit in an outdoor VRF unit of the VRF system to apply heating or cooling to a refrigerant, the refrigeration circuit comprising a heat exchanger, a compressor configured to circulate the refrigerant through the heat exchanger, and a fan configured to modulate a rate of heat transfer in the heat exchanger;
wherein the powered components of the VRF system comprise the compressor and the fan of the outdoor VRF unit; wherein the predictive cost function accounts for a cost of operating the compressor and the fan at each time step of the optimization period. 18. The method of claim 15, further comprising operating a fan of an indoor VRF unit of the VRF system to transfer heat between the refrigerant and one or more building zones;
wherein the powered components of the VRF system comprise the fan of the indoor VRF unit. 19. The method of claim 15, wherein the predictive cost function accounts for a demand charge based on a maximum power consumption of the VRF system during a demand charge period that overlaps at least partially with the optimization period;
the method further comprising using the energy pricing data as inputs to the predictive cost function to define the demand charge. 20. The method of claim 15, further comprising:
obtaining photovoltaic energy from one or more photovoltaic panels of the VRF system; and determining an optimal amount of the photovoltaic energy to store in the battery and an optimal amount of the photovoltaic energy to be consumed by the powered components of the VRF system at each time step of the optimization period. | A variable refrigerant flow (VRF) system for a building includes an outdoor VRF unit, a plurality of indoor VRF units, a battery, and a predictive VRF controller. The outdoor VRF unit includes powered VRF components configured to apply heating or cooling to a refrigerant. The indoor VRF units are configured to use the heated or cooled refrigerant to provide heating or cooling to a plurality of building zones. The battery is configured to store electric energy and discharge the stored electric energy for use in powering the powered VRF components. The predictive VRF controller is configured to optimize a predictive cost function to determine an optimal amount of electric energy to purchase from an energy grid and an optimal amount of electric energy to store in the battery or discharge from the battery for use in powering the powered VRF components at each time step of an optimization period.1. A variable refrigerant flow (VRF) system for a building, the VRF system comprising:
an outdoor VRF unit comprising one or more powered VRF components configured to apply heating or cooling to a refrigerant; a plurality of indoor VRF units configured to receive the heated or cooled refrigerant from the outdoor VRF unit and to use the heated or cooled refrigerant to provide heating or cooling to a plurality of building zones; a battery configured to store electric energy and discharge the stored electric energy for use in powering the powered VRF components; and a predictive VRF controller configured to optimize a predictive cost function to determine an optimal amount of electric energy to purchase from an energy grid and an optimal amount of electric energy to store in the battery or discharge from the battery for use in powering the powered VRF components at each time step of an optimization period. 2. The VRF system of claim 1, further comprising one or more photovoltaic panels configured to collect photovoltaic energy;
wherein the predictive VRF controller is configured to determine an optimal amount of the photovoltaic energy to store in the battery and an optimal amount of the photovoltaic energy to be consumed by the powered VRF components at each time step of the optimization period. 3. The VRF system of claim 1, wherein the outdoor VRF unit comprises a refrigeration circuit including a heat exchanger, a compressor configured to circulate the refrigerant through the heat exchanger, and a fan configured to modulate a rate of heat transfer in the heat exchanger;
wherein the powered VRF components comprise the compressor and the fan; wherein the predictive cost function accounts for a cost of operating the compressor and the fan at each time step of the optimization period. 4. The VRF system of claim 1, wherein the predictive cost function accounts for:
a cost of the electric energy purchased from the energy grid; and a cost savings resulting from discharging stored electric energy from the battery at each time step of the optimization period. 5. The VRF system of claim 1, wherein the predictive VRF controller is configured to:
receive energy pricing data defining a cost per unit of electric energy purchased from the energy grid at each time step of the optimization period; and use the energy pricing data as inputs to the predictive cost function. 6. The VRF system of claim 1, wherein the predictive cost function accounts for a demand charge based on a maximum power consumption of the VRF system during a demand charge period that overlaps at least partially with the optimization period;
wherein the predictive VRF controller is configured to receive energy pricing data defining the demand charge and to use the energy pricing data as inputs to the predictive cost function. 7. The VRF system of claim 1, wherein the predictive VRF controller comprises:
an economic controller configured to determine optimal power setpoints for the powered VRF components and for the battery at each time step of the optimization period; a tracking controller configured to use the optimal power setpoints to determine optimal temperature setpoints for the building zones or the refrigerant at each time step of the optimization period; and an equipment controller configured to use the optimal temperature setpoints to generate control signals for the powered VRF components and for the battery at each time step of the optimization period. 8. A variable refrigerant flow (VRF) system for a building, the VRF system comprising:
an outdoor VRF unit comprising one or more powered VRF components configured to apply heating or cooling to a refrigerant; a plurality of indoor VRF units configured to receive the heated or cooled refrigerant from the outdoor VRF unit and to use the heated or cooled refrigerant to provide heating or cooling to a plurality of building zones; and a predictive VRF controller configured to optimize a predictive cost function to determine an optimal amount of electric energy to purchase from an energy grid and an optimal amount of electric energy to be consumed by the powered VRF components at each time step of an optimization period. 9. The VRF system of claim 8, further comprising one or more photovoltaic panels configured to collect photovoltaic energy;
wherein the predictive VRF controller is configured to determine an optimal amount of the photovoltaic energy to store in the battery and an optimal amount of the photovoltaic energy to be consumed by the powered VRF components at each time step of the optimization period. 10. The VRF system of claim 8, wherein the outdoor VRF unit comprises a refrigeration circuit including a heat exchanger, a compressor configured to circulate the refrigerant through the heat exchanger, and a fan configured to modulate a rate of heat transfer in the heat exchanger;
wherein the powered VRF components comprise the compressor and the fan; wherein the predictive cost function accounts for a cost of operating the compressor and the fan at each time step of the optimization period. 11. The VRF system of claim 8, wherein the predictive cost function accounts for a cost of the electric energy purchased from the energy grid at each time step of the optimization period. 12. The VRF system of claim 1, wherein the predictive VRF controller is configured to:
receive energy pricing data defining a cost per unit of electric energy purchased from the energy grid at each time step of the optimization period; and use the energy pricing data as inputs to the predictive cost function. 13. The VRF system of claim 1, wherein the predictive cost function accounts for a demand charge based on a maximum power consumption of the VRF system during a demand charge period that overlaps at least partially with the optimization period;
wherein the predictive VRF controller is configured to receive energy pricing data defining the demand charge and to use the energy pricing data as inputs to the predictive cost function. 14. The VRF system of claim 1, wherein the predictive VRF controller comprises:
an economic controller configured to determine optimal power setpoints for the powered VRF components at each time step of the optimization period; a tracking controller configured to use the optimal power setpoints to determine optimal temperature setpoints for the building zones or the refrigerant at each time step of the optimization period; and an equipment controller configured to use the optimal temperature setpoints to generate control signals for the powered VRF components at each time step of the optimization period. 15. A method for operating a variable refrigerant flow (VRF) system, the method comprising:
receiving, at a predictive controller of the VRF system, energy pricing data defining energy prices for each of a plurality of time steps in an optimization period; using the energy pricing data as inputs to a predictive cost function that defines a cost of operating the VRF system over a duration of the optimization period; optimizing the predictive cost function to determine optimal power setpoints for one or more powered components of the VRF system and for a battery of the VRF system; using the optimal power setpoints to generate temperature setpoints for a zone temperature or refrigerant temperature affected by the VRF system; using the temperature setpoints to generate control signals for the powered components of the VRF system; and operating the powered components of the VRF system to achieve the temperature setpoints. 16. The method of claim 15, wherein optimizing the predictive cost function comprises determining an optimal amount of electric energy to purchase from an energy grid and an optimal amount of electric energy to store in the battery or discharge from the battery for use in powering the powered components of the VRF system at each time step of an optimization period. 17. The method of claim 15, further comprising operating a refrigeration circuit in an outdoor VRF unit of the VRF system to apply heating or cooling to a refrigerant, the refrigeration circuit comprising a heat exchanger, a compressor configured to circulate the refrigerant through the heat exchanger, and a fan configured to modulate a rate of heat transfer in the heat exchanger;
wherein the powered components of the VRF system comprise the compressor and the fan of the outdoor VRF unit; wherein the predictive cost function accounts for a cost of operating the compressor and the fan at each time step of the optimization period. 18. The method of claim 15, further comprising operating a fan of an indoor VRF unit of the VRF system to transfer heat between the refrigerant and one or more building zones;
wherein the powered components of the VRF system comprise the fan of the indoor VRF unit. 19. The method of claim 15, wherein the predictive cost function accounts for a demand charge based on a maximum power consumption of the VRF system during a demand charge period that overlaps at least partially with the optimization period;
the method further comprising using the energy pricing data as inputs to the predictive cost function to define the demand charge. 20. The method of claim 15, further comprising:
obtaining photovoltaic energy from one or more photovoltaic panels of the VRF system; and determining an optimal amount of the photovoltaic energy to store in the battery and an optimal amount of the photovoltaic energy to be consumed by the powered components of the VRF system at each time step of the optimization period. | 2,100 |
6,721 | 6,721 | 14,623,429 | 2,144 | An association of one or more renditions of external content items with a document is provided. A user may create a document, and may select to insert a piece of external content into the document. When the user selects to insert the external content into the document, a URL of the location where the content resides may be associated with the document. Other asset data may also be associated with the content item, such as public copyright license information and other relevant information, and may encoded into the document. When the document is shared, the asset data may also be provided. Accordingly, the consuming application software may be enabled to follow the URL and utilize other asset data to retrieve the content item. | 1. A method for associating external content with a document, the method comprising:
receiving an indication of a selection to include one or more external content items in a document; writing asset information associated with the one or more external content items into a directory of assets associated with the document; navigating to the one or more locations of the one or more source files where the one or more external content items are located; and retrieving the one or more external content items for display in the document. 2. The method of claim 1, wherein writing asset information associated with an external content item comprises writing a location specified by a uniform resource locator (URL) of a source file where the external content item is stored into the directory of assets associated with the document. 3. The method of claim 2, further comprising writing copyright license information associated with an external content item into the directory of assets associated with the document. 4. The method of claim 2, further comprising writing expiration notice information associated with an external content item into the directory of assets associated with the document. 5. The method of claim 1, wherein writing asset information associated with the one or more external content items into a directory of assets associated with the document comprises writing asset information associated with an external content item into a directory of assets encoded into the document. 6. The method of claim 1, wherein writing asset information associated with the one or more external content items into a directory of assets associated with the document further comprises encoding a location specified by a uniform resource locator (URL) of the directory of assets into the document. 7. The method of claim 1, wherein navigating to the one or more locations of the one or more source files where the one or more external content items are located further comprises displaying the one or more source files in a user interface. 8. A system for associating external content with a document, the system comprising:
one or more processors; and a memory coupled to the one or more processors, the one or more processors operable to:
receive an indication of a selection to include one or more external content items in a document, wherein the one or more external content items are located in one or more external source files; and
write asset information associated with the one or more external content items into a directory of assets associated with the document;
navigate to the one or more locations of the one or more source files where the one or more external content items are located; and
retrieve the one or more external content items for display in the document. 9. The system of claim 8, wherein the directory of assets associated with the document comprises locations specified by uniform resource locators (URLs) of the source files where the one or more external content items are stored. 10. The system of claim 9, wherein the directory of assets associated with the document further comprises one or more of:
copyright license information associated with an external content item; and expiration notice information associated with an external content item. 11. The system of claim 8, wherein the processor, in writing asset information associated with the one or more external content items into a directory of assets associated with the document, is further operable to write asset information associated with an external content item into a directory of assets encoded into the document. 12. The system of claim 8, wherein the processor, in writing asset information associated with the one or more external content items into a directory of assets associated with the document, is further operable to encode a location specified by uniform resource locators (URLs) of the directory of assets into the document. 13. The system of claim 12, wherein the directory of assets is managed by a directory manager server. 14. The system of claim 12, wherein navigate to the one or more locations of the one or more source files where the one or more external content items are located further comprises to display the one or more source files in a user interface. 15. One or more computer-readable storage media having computer-executable instructions embodied thereon that, when executed by at least one processor, cause at least one processor to perform a method for associating external content with a document, the method comprising:
receiving an indication of a selection to include one or more external content items in a document; writing asset information associated with the one or more external content items into a directory of assets associated with the document; navigating to the one or more locations of the one or more source files where the one or more external content items are located; and retrieving the one or more external content items for display in the document. 16. The method of claim 15, wherein writing asset information associated with an external content item comprises writing a location specified by a uniform resource locator (URL) of a source file where the external content item is stored into the directory of assets associated with the document. 17. The method of claim 16, further comprising writing copyright license information associated with an external content item into the directory of assets associated with the document. 18. The method of claim 16, further comprising writing expiration notice information associated with an external content item into the directory of assets associated with the document. 19. The method of claim 15, wherein writing asset information associated with the one or more external content items into a directory of assets associated with the document comprises writing asset information associated with an external content item into a directory of assets encoded into the document. 20. The method of claim 15, wherein writing asset information associated with the one or more external content items into a directory of assets associated with the document further comprises encoding a location specified by a uniform resource locator (URL) of the directory of assets into the document. | An association of one or more renditions of external content items with a document is provided. A user may create a document, and may select to insert a piece of external content into the document. When the user selects to insert the external content into the document, a URL of the location where the content resides may be associated with the document. Other asset data may also be associated with the content item, such as public copyright license information and other relevant information, and may encoded into the document. When the document is shared, the asset data may also be provided. Accordingly, the consuming application software may be enabled to follow the URL and utilize other asset data to retrieve the content item.1. A method for associating external content with a document, the method comprising:
receiving an indication of a selection to include one or more external content items in a document; writing asset information associated with the one or more external content items into a directory of assets associated with the document; navigating to the one or more locations of the one or more source files where the one or more external content items are located; and retrieving the one or more external content items for display in the document. 2. The method of claim 1, wherein writing asset information associated with an external content item comprises writing a location specified by a uniform resource locator (URL) of a source file where the external content item is stored into the directory of assets associated with the document. 3. The method of claim 2, further comprising writing copyright license information associated with an external content item into the directory of assets associated with the document. 4. The method of claim 2, further comprising writing expiration notice information associated with an external content item into the directory of assets associated with the document. 5. The method of claim 1, wherein writing asset information associated with the one or more external content items into a directory of assets associated with the document comprises writing asset information associated with an external content item into a directory of assets encoded into the document. 6. The method of claim 1, wherein writing asset information associated with the one or more external content items into a directory of assets associated with the document further comprises encoding a location specified by a uniform resource locator (URL) of the directory of assets into the document. 7. The method of claim 1, wherein navigating to the one or more locations of the one or more source files where the one or more external content items are located further comprises displaying the one or more source files in a user interface. 8. A system for associating external content with a document, the system comprising:
one or more processors; and a memory coupled to the one or more processors, the one or more processors operable to:
receive an indication of a selection to include one or more external content items in a document, wherein the one or more external content items are located in one or more external source files; and
write asset information associated with the one or more external content items into a directory of assets associated with the document;
navigate to the one or more locations of the one or more source files where the one or more external content items are located; and
retrieve the one or more external content items for display in the document. 9. The system of claim 8, wherein the directory of assets associated with the document comprises locations specified by uniform resource locators (URLs) of the source files where the one or more external content items are stored. 10. The system of claim 9, wherein the directory of assets associated with the document further comprises one or more of:
copyright license information associated with an external content item; and expiration notice information associated with an external content item. 11. The system of claim 8, wherein the processor, in writing asset information associated with the one or more external content items into a directory of assets associated with the document, is further operable to write asset information associated with an external content item into a directory of assets encoded into the document. 12. The system of claim 8, wherein the processor, in writing asset information associated with the one or more external content items into a directory of assets associated with the document, is further operable to encode a location specified by uniform resource locators (URLs) of the directory of assets into the document. 13. The system of claim 12, wherein the directory of assets is managed by a directory manager server. 14. The system of claim 12, wherein navigate to the one or more locations of the one or more source files where the one or more external content items are located further comprises to display the one or more source files in a user interface. 15. One or more computer-readable storage media having computer-executable instructions embodied thereon that, when executed by at least one processor, cause at least one processor to perform a method for associating external content with a document, the method comprising:
receiving an indication of a selection to include one or more external content items in a document; writing asset information associated with the one or more external content items into a directory of assets associated with the document; navigating to the one or more locations of the one or more source files where the one or more external content items are located; and retrieving the one or more external content items for display in the document. 16. The method of claim 15, wherein writing asset information associated with an external content item comprises writing a location specified by a uniform resource locator (URL) of a source file where the external content item is stored into the directory of assets associated with the document. 17. The method of claim 16, further comprising writing copyright license information associated with an external content item into the directory of assets associated with the document. 18. The method of claim 16, further comprising writing expiration notice information associated with an external content item into the directory of assets associated with the document. 19. The method of claim 15, wherein writing asset information associated with the one or more external content items into a directory of assets associated with the document comprises writing asset information associated with an external content item into a directory of assets encoded into the document. 20. The method of claim 15, wherein writing asset information associated with the one or more external content items into a directory of assets associated with the document further comprises encoding a location specified by a uniform resource locator (URL) of the directory of assets into the document. | 2,100 |
6,722 | 6,722 | 16,223,820 | 2,135 | A system has a processor including a plurality of processor cores, a memory controller, and an input-output memory management unit. The plurality of processor cores implements a plurality of virtual machines. The system further has a device in communication with the input-output memory management unit, the device including a bus controller, a device memory controller, an encryption module, a device memory, and a computational resource. The device is to implement a plurality of virtual functions. The device provides a device memory access request from a virtual function to the device memory controller. The virtual function is associated with a virtual function identifier. The device is to determine an encryption key associated with the virtual function, decrypt information stored at the device memory using the encryption key, and provide the decrypted information in a processor memory access request to the processor. | 1. A method for managing access to device resources, the method comprising:
providing a device memory access request from a virtual function to a device memory controller to access a device memory, the virtual function associated with a virtual function identifier; determining an encryption key associated with the virtual function using the virtual function identifier; and decrypting with an encryption module an information stored at the device memory using the encryption key. 2. The method of claim 1, further comprising providing the decrypted information in a processor memory access request from the device to a virtual machine implemented on a processor in communication with the device. 3. The method of claim 1, processing the information in response to instructions from a virtual machine implemented on a processor in communication with the device. 4. The method of claim 1, wherein determining the encryption key includes determining the encryption key from a key table using the virtual function identifier. 5. The method of claim 1, further comprising:
providing from the virtual function a write request to the device memory controller, the write request including the information; and encrypting the information of the write request based on the encryption key. 6. The method of claim 1, wherein the device memory access request has an associated physical address to be accessed, the method further comprising determining whether the device memory at the physical address is encrypted based on an indicator associated with the physical address in a translation table. 7. The method of claim 1, wherein the device memory access request has an associated device physical address, the method further comprising determining using a function map table whether the device memory at the device physical address is accessible to the virtual function based on the virtual function identifier. 8. The method of claim 1, further comprising determining using a function map table whether the device memory at a device physical address corresponds to a function physical address used in page table translation. 9. The method of claim 1, further comprising assigning the encryption key to the virtual function using a security module. 10. A method for managing access to a device memory of a device, the method comprising:
receiving at a device memory controller a device memory access request from a virtual function implemented on a computational resource of the device, the device memory access request including a virtual address; translating using the memory controller the virtual address to a physical address of the device memory with a translation table; determining whether virtual function has access to device memory at the physical address using a function map table; and completing the device memory access request at the physical address when the virtual function has access to the device memory at the physical address. 11. The method of claim 10, further comprising providing information stored on the device memory at the physical address in a processor memory access request from the device to a virtual machine implemented on a processor in communication with the device. 12. The method of claim 10, wherein the function map table includes an entry pairing an identifier of the virtual function with the physical address. 13. The method of claim 10, further comprising determining whether information stored at the physical address of the device memory is encrypted using the translation table. 14. The method of claim 13, further comprising determining an encryption key based on an identifier associated with the virtual function and decrypting the information using the encryption key. 15. A system comprising:
a processor including a plurality of processor cores, a memory controller, and an input-output memory management unit, the plurality of processor cores to implement a plurality of virtual machines; and a device in communication with the input-output memory management unit, the device including a bus controller, a device memory controller, an encryption module, a device memory, and a computational resource, the device to implement a plurality of virtual functions; wherein the device is to:
provide a device memory access request from a virtual function of the plurality of virtual functions to the device memory controller to access the device memory, the virtual function associated with a virtual function identifier;
determine an encryption key associated with the virtual function using the virtual function identifier;
decrypt with the encryption module an information stored at the device memory using the encryption key; and
provide the decrypted information in a processor memory access request from the device to a virtual machine implemented on the processor. 16. The system of claim 15, wherein to determine the encryption key includes to determine the encryption key from a key table stored in the device memory using the virtual function identifier. 17. The system of claim 15, wherein the device is to further:
provide from the virtual function a write request to the device memory controller, the write request including the information; encrypt the information of the write request based on the encryption key; and store the encrypted information on the device memory. 18. The system of claim 15, wherein the device memory access request has an associated physical address to be accessed, wherein the device is to further determine whether the device memory at the physical address is encrypted based on an indicator associated with the physical address in a translation table. 19. The system of claim 15, wherein the processor memory access request has an associated physical address, wherein the device is to further determine using a function mapping table whether the device memory at the physical address is accessible to the virtual function based on the virtual function identifier. 20. The system of claim 15, wherein the device is to further assign the encryption key to the virtual function using a security module. | A system has a processor including a plurality of processor cores, a memory controller, and an input-output memory management unit. The plurality of processor cores implements a plurality of virtual machines. The system further has a device in communication with the input-output memory management unit, the device including a bus controller, a device memory controller, an encryption module, a device memory, and a computational resource. The device is to implement a plurality of virtual functions. The device provides a device memory access request from a virtual function to the device memory controller. The virtual function is associated with a virtual function identifier. The device is to determine an encryption key associated with the virtual function, decrypt information stored at the device memory using the encryption key, and provide the decrypted information in a processor memory access request to the processor.1. A method for managing access to device resources, the method comprising:
providing a device memory access request from a virtual function to a device memory controller to access a device memory, the virtual function associated with a virtual function identifier; determining an encryption key associated with the virtual function using the virtual function identifier; and decrypting with an encryption module an information stored at the device memory using the encryption key. 2. The method of claim 1, further comprising providing the decrypted information in a processor memory access request from the device to a virtual machine implemented on a processor in communication with the device. 3. The method of claim 1, processing the information in response to instructions from a virtual machine implemented on a processor in communication with the device. 4. The method of claim 1, wherein determining the encryption key includes determining the encryption key from a key table using the virtual function identifier. 5. The method of claim 1, further comprising:
providing from the virtual function a write request to the device memory controller, the write request including the information; and encrypting the information of the write request based on the encryption key. 6. The method of claim 1, wherein the device memory access request has an associated physical address to be accessed, the method further comprising determining whether the device memory at the physical address is encrypted based on an indicator associated with the physical address in a translation table. 7. The method of claim 1, wherein the device memory access request has an associated device physical address, the method further comprising determining using a function map table whether the device memory at the device physical address is accessible to the virtual function based on the virtual function identifier. 8. The method of claim 1, further comprising determining using a function map table whether the device memory at a device physical address corresponds to a function physical address used in page table translation. 9. The method of claim 1, further comprising assigning the encryption key to the virtual function using a security module. 10. A method for managing access to a device memory of a device, the method comprising:
receiving at a device memory controller a device memory access request from a virtual function implemented on a computational resource of the device, the device memory access request including a virtual address; translating using the memory controller the virtual address to a physical address of the device memory with a translation table; determining whether virtual function has access to device memory at the physical address using a function map table; and completing the device memory access request at the physical address when the virtual function has access to the device memory at the physical address. 11. The method of claim 10, further comprising providing information stored on the device memory at the physical address in a processor memory access request from the device to a virtual machine implemented on a processor in communication with the device. 12. The method of claim 10, wherein the function map table includes an entry pairing an identifier of the virtual function with the physical address. 13. The method of claim 10, further comprising determining whether information stored at the physical address of the device memory is encrypted using the translation table. 14. The method of claim 13, further comprising determining an encryption key based on an identifier associated with the virtual function and decrypting the information using the encryption key. 15. A system comprising:
a processor including a plurality of processor cores, a memory controller, and an input-output memory management unit, the plurality of processor cores to implement a plurality of virtual machines; and a device in communication with the input-output memory management unit, the device including a bus controller, a device memory controller, an encryption module, a device memory, and a computational resource, the device to implement a plurality of virtual functions; wherein the device is to:
provide a device memory access request from a virtual function of the plurality of virtual functions to the device memory controller to access the device memory, the virtual function associated with a virtual function identifier;
determine an encryption key associated with the virtual function using the virtual function identifier;
decrypt with the encryption module an information stored at the device memory using the encryption key; and
provide the decrypted information in a processor memory access request from the device to a virtual machine implemented on the processor. 16. The system of claim 15, wherein to determine the encryption key includes to determine the encryption key from a key table stored in the device memory using the virtual function identifier. 17. The system of claim 15, wherein the device is to further:
provide from the virtual function a write request to the device memory controller, the write request including the information; encrypt the information of the write request based on the encryption key; and store the encrypted information on the device memory. 18. The system of claim 15, wherein the device memory access request has an associated physical address to be accessed, wherein the device is to further determine whether the device memory at the physical address is encrypted based on an indicator associated with the physical address in a translation table. 19. The system of claim 15, wherein the processor memory access request has an associated physical address, wherein the device is to further determine using a function mapping table whether the device memory at the physical address is accessible to the virtual function based on the virtual function identifier. 20. The system of claim 15, wherein the device is to further assign the encryption key to the virtual function using a security module. | 2,100 |
6,723 | 6,723 | 16,104,004 | 2,156 | A method includes generating a dynamic audio file configured to be added to a conventional media library as a static asset, but including dynamic primary content. Generating the file includes inserting audio content formatted for processing and playout by conventional media players. The audio content includes an audible preamble at a beginning of the audio content, and primary content. Generating the file also includes inserting a tag associated with the dynamic portion of the primary content and a content start indicator. The tag specifies a source address used by an updater application to retrieve updated primary audio content. The content start indicator specifies a starting point of the primary content within the dynamic audio file, and is used by the updater application to strip the audible preamble from the dynamic audio file during the update process. | 1. A method comprising:
generating a dynamic audio file configured to be added to a conventional media library as a static asset, but including dynamic primary content, the generating including;
inserting, into the dynamic audio file, audio content formatted for processing and playout by one or more conventional media players, the audio content including:
an audible preamble at a beginning of the audio content;
primary content;
inserting, into the dynamic audio file, at least one tag associated with at least one dynamic portion of the primary content, the at least one tag specifying a source address used by an updater application to retrieve, during update of the dynamic audio file, updated primary audio content to replace the primary content; and
inserting, into the dynamic audio file, a content start indicator specifying a starting point of the primary content within the dynamic audio file, the content start indicator used by the updater application to strip the audible preamble from the dynamic audio file during update of the dynamic audio file. 2. The method of claim 1, wherein the audible preamble includes instructions for downloading the updater application. 3. The method of claim 1, wherein the source address includes:
a uniform resource locator (URL) specifying a publicly available address. 4. The method of claim 1, further comprising:
inserting, into the dynamic audio file, a tag specifying an alternate source address used by the updater application to retrieve updated primary audio content if the updated primary audio content is unavailable at the source address. 5. The method of claim 1, further comprising:
inserting, into the dynamic audio file, a tag specifying a maximum time the updater application is permitted to shift a request to update the dynamic audio file. 6. The method of claim 1, wherein the content start indicator designates an offset measured from the beginning of the audio content. 7. The method of claim 1, further comprising:
inserting, into the dynamic audio file, a tag specifying an update time associated with the primary content. 8. The method of claim 1, further comprising:
inserting, into the dynamic audio file, a tag specifying an update frequency associated with the primary content. 9. A method comprising:
sending, to a user computer with updater application thereon, a dynamic audio file including initial audio content formatted for processing and playout by one or more conventional media players, the initial audio content including:
an audible preamble positioned at a beginning of the initial audio content;
primary content;
at least one tag associated with at least one dynamic portion of the primary content, the at least one tag specifying a source address;
a content start indicator specifying a starting point of the primary content within the dynamic audio file;
receiving a request from the updater application for updated primary audio content for the dynamic audio file, wherein the request includes the source address; in response to receiving the request creating updated audio content by:
obtaining updated primary audio content using the source address;
removing a portion of the initial audio content prior to the content start indicator, the portion of the initial audio content prior to the content start indicator corresponding to the audible preamble; and
sending the updated audio content to the user computer for enabling the updater application to replace the initial audio content with the updated audio content. 10. The method of claim 9, wherein the audible preamble includes instructions for downloading the updater application. 11. The method of claim 9, wherein the source address includes:
a uniform resource locator (URL) specifying a publicly available address. 12. The method of claim 9, further comprising:
inserting, into the dynamic audio file, a tag specifying a maximum time the updater application is permitted to delay updating the dynamic audio file. 13. The method of claim 9, wherein the content start indicator designates an offset measured from the beginning of the initial audio content. 14. The method of claim 9, further comprising:
inserting, into the dynamic audio file, a tag specifying an update time associated with the primary content. 15. A non-transitory computer readable medium tangibly embodying a program of instructions configured to be stored in a memory and executed by a processor, the program of instructions comprising:
at least one instruction to generate a dynamic audio file configured to be added to a conventional media library as a static asset, but including dynamic primary content; at least one instruction to insert, into the dynamic audio file, audio content formatted for processing and playout by one or more conventional media players, the audio content including:
an audible preamble at a beginning of the audio content;
primary content;
at least one instruction to insert, into the dynamic audio file, at least one tag associated with at least one dynamic portion of the primary content, the at least one tag specifying a source address used by an updater application to retrieve, during update of the dynamic audio file, updated primary audio content to replace the primary content; and at least one instruction to insert, into the dynamic audio file, a content start indicator specifying a starting point of the primary content within the dynamic audio file, the content start indicator used by the updater application to strip the audible preamble from the dynamic audio file during update of the dynamic audio file. 16. The non-transitory computer readable medium of claim 15, wherein the audible preamble includes instructions for downloading the updater application. 17. The non-transitory computer readable medium of claim 15, wherein the source address includes:
a uniform resource locator (URL) specifying a publicly available address. 18. The non-transitory computer readable medium of claim 15, further comprising:
at least one instruction to insert, into the dynamic audio file, a tag specifying an alternate source address used by the updater application to retrieve updated primary audio content if the updated primary audio content is unavailable at the source address. 19. The non-transitory computer readable medium of claim 15, further comprising:
at least one instruction to insert, into the dynamic audio file, a tag specifying a maximum time the updater application is permitted to shift a request to update the dynamic audio file. 20. The non-transitory computer readable medium of claim 15, further comprising:
at least one instruction to insert, into the dynamic audio file, a tag specifying an update frequency associated with the primary content. | A method includes generating a dynamic audio file configured to be added to a conventional media library as a static asset, but including dynamic primary content. Generating the file includes inserting audio content formatted for processing and playout by conventional media players. The audio content includes an audible preamble at a beginning of the audio content, and primary content. Generating the file also includes inserting a tag associated with the dynamic portion of the primary content and a content start indicator. The tag specifies a source address used by an updater application to retrieve updated primary audio content. The content start indicator specifies a starting point of the primary content within the dynamic audio file, and is used by the updater application to strip the audible preamble from the dynamic audio file during the update process.1. A method comprising:
generating a dynamic audio file configured to be added to a conventional media library as a static asset, but including dynamic primary content, the generating including;
inserting, into the dynamic audio file, audio content formatted for processing and playout by one or more conventional media players, the audio content including:
an audible preamble at a beginning of the audio content;
primary content;
inserting, into the dynamic audio file, at least one tag associated with at least one dynamic portion of the primary content, the at least one tag specifying a source address used by an updater application to retrieve, during update of the dynamic audio file, updated primary audio content to replace the primary content; and
inserting, into the dynamic audio file, a content start indicator specifying a starting point of the primary content within the dynamic audio file, the content start indicator used by the updater application to strip the audible preamble from the dynamic audio file during update of the dynamic audio file. 2. The method of claim 1, wherein the audible preamble includes instructions for downloading the updater application. 3. The method of claim 1, wherein the source address includes:
a uniform resource locator (URL) specifying a publicly available address. 4. The method of claim 1, further comprising:
inserting, into the dynamic audio file, a tag specifying an alternate source address used by the updater application to retrieve updated primary audio content if the updated primary audio content is unavailable at the source address. 5. The method of claim 1, further comprising:
inserting, into the dynamic audio file, a tag specifying a maximum time the updater application is permitted to shift a request to update the dynamic audio file. 6. The method of claim 1, wherein the content start indicator designates an offset measured from the beginning of the audio content. 7. The method of claim 1, further comprising:
inserting, into the dynamic audio file, a tag specifying an update time associated with the primary content. 8. The method of claim 1, further comprising:
inserting, into the dynamic audio file, a tag specifying an update frequency associated with the primary content. 9. A method comprising:
sending, to a user computer with updater application thereon, a dynamic audio file including initial audio content formatted for processing and playout by one or more conventional media players, the initial audio content including:
an audible preamble positioned at a beginning of the initial audio content;
primary content;
at least one tag associated with at least one dynamic portion of the primary content, the at least one tag specifying a source address;
a content start indicator specifying a starting point of the primary content within the dynamic audio file;
receiving a request from the updater application for updated primary audio content for the dynamic audio file, wherein the request includes the source address; in response to receiving the request creating updated audio content by:
obtaining updated primary audio content using the source address;
removing a portion of the initial audio content prior to the content start indicator, the portion of the initial audio content prior to the content start indicator corresponding to the audible preamble; and
sending the updated audio content to the user computer for enabling the updater application to replace the initial audio content with the updated audio content. 10. The method of claim 9, wherein the audible preamble includes instructions for downloading the updater application. 11. The method of claim 9, wherein the source address includes:
a uniform resource locator (URL) specifying a publicly available address. 12. The method of claim 9, further comprising:
inserting, into the dynamic audio file, a tag specifying a maximum time the updater application is permitted to delay updating the dynamic audio file. 13. The method of claim 9, wherein the content start indicator designates an offset measured from the beginning of the initial audio content. 14. The method of claim 9, further comprising:
inserting, into the dynamic audio file, a tag specifying an update time associated with the primary content. 15. A non-transitory computer readable medium tangibly embodying a program of instructions configured to be stored in a memory and executed by a processor, the program of instructions comprising:
at least one instruction to generate a dynamic audio file configured to be added to a conventional media library as a static asset, but including dynamic primary content; at least one instruction to insert, into the dynamic audio file, audio content formatted for processing and playout by one or more conventional media players, the audio content including:
an audible preamble at a beginning of the audio content;
primary content;
at least one instruction to insert, into the dynamic audio file, at least one tag associated with at least one dynamic portion of the primary content, the at least one tag specifying a source address used by an updater application to retrieve, during update of the dynamic audio file, updated primary audio content to replace the primary content; and at least one instruction to insert, into the dynamic audio file, a content start indicator specifying a starting point of the primary content within the dynamic audio file, the content start indicator used by the updater application to strip the audible preamble from the dynamic audio file during update of the dynamic audio file. 16. The non-transitory computer readable medium of claim 15, wherein the audible preamble includes instructions for downloading the updater application. 17. The non-transitory computer readable medium of claim 15, wherein the source address includes:
a uniform resource locator (URL) specifying a publicly available address. 18. The non-transitory computer readable medium of claim 15, further comprising:
at least one instruction to insert, into the dynamic audio file, a tag specifying an alternate source address used by the updater application to retrieve updated primary audio content if the updated primary audio content is unavailable at the source address. 19. The non-transitory computer readable medium of claim 15, further comprising:
at least one instruction to insert, into the dynamic audio file, a tag specifying a maximum time the updater application is permitted to shift a request to update the dynamic audio file. 20. The non-transitory computer readable medium of claim 15, further comprising:
at least one instruction to insert, into the dynamic audio file, a tag specifying an update frequency associated with the primary content. | 2,100 |
6,724 | 6,724 | 15,605,291 | 2,181 | A method and apparatus of integrating memory stacks includes providing a first memory die of a first memory technology and a second memory die of a second memory technology. A first logic die is in communication with the first memory die of the first memory technology, and includes a first memory controller including a first memory control function for interpreting requests in accordance with a first protocol for the first memory technology. A second logic die is in communication with the second memory die of the second memory technology and includes a second memory controller including a second memory control function for interpreting requests in accordance with a second protocol for the second memory technology. A memory operation request is received at the first or second memory controller, and the memory operation request is performed in accordance with the associated first memory protocol or the second memory protocol. | 1. A method of integrating memory stacks, comprising:
providing a first memory die of a first memory technology; providing a first logic die in communication with the first memory die of the first memory technology, the first logic die including a first memory controller including a first memory control function for interpreting requests in accordance with a first protocol for the first memory technology; providing a second memory die of a second memory technology; providing a second logic die in communication with the second memory die of the second memory technology, the second logic die including a second memory controller including a second memory control function for interpreting requests in accordance with a second protocol for the second memory technology; receiving a memory operation request at the first memory controller or the second memory controller; and performing the memory operation request in accordance with the associated first memory protocol or the second memory protocol. 2. The method of claim 1, wherein the memory operation request is received at both the first memory controller and the second memory controller over a sidebus connection associated with each of the first memory controller and the second memory controller. 3. The method of claim 2, wherein the memory operation request includes a request for a memory access to the first memory die or the second memory die and the first memory controller performs the memory operation request. 4. The method of claim 3, wherein the first memory controller receives the memory operation request from a processor via the sidebus connection and communicates data to the processor via the sidebus connection. 5. The method of claim 2, wherein the memory operation request includes a request for a memory access to the second memory die of the second memory technology and the second memory controller performs the memory operation request. 6. The method of claim 5, wherein the second memory controller receives the memory operation request from a processor via the sidebus connection and communicates data to the processor via the sidebus connection. 7. The method of claim 1, wherein the memory operation request is received at the first memory controller over a connection associated with the first memory controller and a processor. 8. The method of claim 7 wherein the memory operation request is associated with a memory access to the first memory die of the first memory technology and the first memory controller performs the memory operation request. 9. The method of claim 7, wherein the memory operation request is associated with a memory access to the second memory die of the second memory technology and the first memory controller communicates the memory operation request to the second memory controller. 10. The method of claim 9, wherein the second memory controller performs the memory operation request and provides data to the processor via the first memory controller. 11. The method of claim 1, further comprising associating the first memory die of the first memory technology with the second memory controller. 12. The method of claim 11, further comprising performing memory operations by the second memory controller to the first memory die of the first memory technology. 13. The method of claim 12, wherein the second memory controller transfers data from the first memory die of the first memory technology to the second memory die of the second memory technology and from the second memory die of the second memory technology to the first memory die of the first memory technology. 14. The method of claim 13, wherein the first memory die of the first memory technology is a cache for storing data from the second memory die of the second memory technology or the second memory die is a cache for storing data from the first memory die of the first memory technology. 15. The method of claim 1, wherein the first memory technology and the second memory technology include any one of the following memory technologies: dynamic random access memory (DRAM), phase-change memory (PCM), Flash memory, or static random access memory (SRAM). 16. The method of claim 15, wherein the first memory technology and the second memory technology are the same memory technology type. 17. The method of claim 15, wherein the first memory technology and the second memory technology are different memory technology types. 18. The method of claim 1, further comprising aligning a through silicon via (TSV) of a topmost memory die of the first memory technology to a logic die immediately above the topmost memory die of the first memory technology. 19. The method of claim 1, further comprising aligning a through silicon via (TSV) of a bottommost memory die of the first memory technology to a logic die immediately below the bottommost memory die of the first memory technology. 20. The method of claim 1, further comprising performing a memory test on the first memory die of the first memory technology by the first memory controller. 21. The method of claim 1, further comprising performing a memory test on the second memory die of the second memory technology by the second memory controller. 22. The method of claim 1, further comprising providing a crossbar in at least the second logic die, wherein the crossbar communicates with any memory location in a memory die of either the first memory technology or the second memory technology. 23. The method of claim 1, further comprising providing compute logic in one or both of the first logic die and the second logic die, wherein the compute logic performs computations on data that is stored in the memory stack associated with the respective first logic die or second logic die. 24. An apparatus comprising:
a first memory die of a first memory technology; a first logic die in communication with the first memory die of the first memory technology, the first logic die including a first memory controller including a first memory control function for interpreting requests in accordance with a first protocol for the first memory technology; a second memory die of a second memory technology; and a second logic die in communication with the second memory die of the second memory technology, the second logic die including a second memory controller including a second memory control function for interpreting requests in accordance with a second protocol for the second memory technology, wherein the first memory controller or the second memory controller receives a memory operation request and performs the memory operation request in accordance with the associated first memory protocol or the second memory protocol. 25. The apparatus of claim 24, further comprising:
a sidebus connection associated with each of the first memory controller and the second memory controller, wherein the memory operation request is received at both the first memory controller and the second memory controller over the sidebus connection. 26. The apparatus of claim 25, wherein the memory operation request includes a request for a memory access to the first memory die of the first memory technology and the first memory controller performs the memory operation request. 27. The apparatus of claim 26, wherein the first memory controller receives the memory operation request from a processor via the sidebus connection and communicates data to the processor via the sidebus connection. 28. The apparatus of claim 25, wherein the memory operation request includes a request for a memory access to the second memory die of the second memory technology and the second memory controller performs the memory operation request. 29. The apparatus of claim 28, wherein the second memory controller receives the memory operation request from a processor via the sidebus connection and communicates data to the processor via the sidebus connection. 30. The apparatus of claim 24, wherein the memory operation request is received at the first memory controller over a connection associated with the first memory controller and a processor. 31. The apparatus of claim 30 wherein the memory operation request is associated with a memory access to the first memory die of the first memory technology and the first memory controller performs the memory operation request. 32. The apparatus of claim 30, wherein the memory operation request is associated with a memory access to the second memory die of the second memory technology and the first memory controller communicates the memory operation request to the second memory controller. 33. The apparatus of claim 32, wherein the second memory controller performs the memory operation request and provides data to the processor via the first memory controller. 34. The apparatus of claim 24, wherein the first memory die of the first memory technology is associated with the second memory controller. 35. The apparatus of claim 34, wherein the second memory controller performs memory operations on the first memory die of the first memory technology. 36. The apparatus of claim 35, wherein the second memory controller transfers data from the first memory die of the first memory technology to the second memory die of the second memory technology and from the second memory die of the second memory technology to the first memory die of the first memory technology. 37. The apparatus of claim 36, wherein the first memory die of the first memory technology is a cache for storing data from the second memory die of the second memory technology or the second memory die of the second memory technology is a cache for storing data from the first memory die of the first memory technology. 38. The apparatus of claim 24, wherein the first memory technology and the second memory technology include any one of the following memory technologies: dynamic random access memory (DRAM), phase-change memory (PCM), Flash memory, or static random access memory (SRAM). 39. The apparatus of claim 38, wherein the first memory technology and the second memory technology are the same memory technology type. 40. The apparatus of claim 38, wherein the first memory technology and the second memory technology are different memory technology types. 41. The apparatus of claim 24, wherein at least the first logic die includes a sense amplifier in communication with a memory location of the second memory die of the second memory technology. 42. The apparatus of claim 24, wherein at least the first logic die includes a voltage regulator for compensating power during transmission of signals in the apparatus. 43. The apparatus of claim 24, wherein at least the first logic die includes an amplifier to amplify signals transmitted in the apparatus. 44. The apparatus of claim 24, wherein the first logic die further includes a second memory control function for interpreting requests in accordance with the second protocol for the second memory technology. 45. A method of testing memory, comprising:
providing a first memory die of a first memory technology; providing a first logic die in communication with the first memory die of the first memory technology, the first logic die including testing logic for testing memory areas in accordance with a first protocol for the first memory technology; and performing, by the testing logic, a test on memory areas included in the first memory die of the first memory technology to identify failed memory areas. 46. The method of claim 45, further comprising:
providing a second memory die of a second memory technology; providing a second logic die in communication with the second memory die of the second memory technology, the second logic die including a testing logic for testing memory areas in accordance with a second protocol for the second memory technology; and performing, by the testing logic, a test on memory areas included in the second memory die of the second memory technology to identify failed memory areas. 47. The method of claim 46, further comprising, upon passing of memory tests, connecting the first memory die of the first memory technology and first logic die to the second memory die of the second memory technology and second logic die. | A method and apparatus of integrating memory stacks includes providing a first memory die of a first memory technology and a second memory die of a second memory technology. A first logic die is in communication with the first memory die of the first memory technology, and includes a first memory controller including a first memory control function for interpreting requests in accordance with a first protocol for the first memory technology. A second logic die is in communication with the second memory die of the second memory technology and includes a second memory controller including a second memory control function for interpreting requests in accordance with a second protocol for the second memory technology. A memory operation request is received at the first or second memory controller, and the memory operation request is performed in accordance with the associated first memory protocol or the second memory protocol.1. A method of integrating memory stacks, comprising:
providing a first memory die of a first memory technology; providing a first logic die in communication with the first memory die of the first memory technology, the first logic die including a first memory controller including a first memory control function for interpreting requests in accordance with a first protocol for the first memory technology; providing a second memory die of a second memory technology; providing a second logic die in communication with the second memory die of the second memory technology, the second logic die including a second memory controller including a second memory control function for interpreting requests in accordance with a second protocol for the second memory technology; receiving a memory operation request at the first memory controller or the second memory controller; and performing the memory operation request in accordance with the associated first memory protocol or the second memory protocol. 2. The method of claim 1, wherein the memory operation request is received at both the first memory controller and the second memory controller over a sidebus connection associated with each of the first memory controller and the second memory controller. 3. The method of claim 2, wherein the memory operation request includes a request for a memory access to the first memory die or the second memory die and the first memory controller performs the memory operation request. 4. The method of claim 3, wherein the first memory controller receives the memory operation request from a processor via the sidebus connection and communicates data to the processor via the sidebus connection. 5. The method of claim 2, wherein the memory operation request includes a request for a memory access to the second memory die of the second memory technology and the second memory controller performs the memory operation request. 6. The method of claim 5, wherein the second memory controller receives the memory operation request from a processor via the sidebus connection and communicates data to the processor via the sidebus connection. 7. The method of claim 1, wherein the memory operation request is received at the first memory controller over a connection associated with the first memory controller and a processor. 8. The method of claim 7 wherein the memory operation request is associated with a memory access to the first memory die of the first memory technology and the first memory controller performs the memory operation request. 9. The method of claim 7, wherein the memory operation request is associated with a memory access to the second memory die of the second memory technology and the first memory controller communicates the memory operation request to the second memory controller. 10. The method of claim 9, wherein the second memory controller performs the memory operation request and provides data to the processor via the first memory controller. 11. The method of claim 1, further comprising associating the first memory die of the first memory technology with the second memory controller. 12. The method of claim 11, further comprising performing memory operations by the second memory controller to the first memory die of the first memory technology. 13. The method of claim 12, wherein the second memory controller transfers data from the first memory die of the first memory technology to the second memory die of the second memory technology and from the second memory die of the second memory technology to the first memory die of the first memory technology. 14. The method of claim 13, wherein the first memory die of the first memory technology is a cache for storing data from the second memory die of the second memory technology or the second memory die is a cache for storing data from the first memory die of the first memory technology. 15. The method of claim 1, wherein the first memory technology and the second memory technology include any one of the following memory technologies: dynamic random access memory (DRAM), phase-change memory (PCM), Flash memory, or static random access memory (SRAM). 16. The method of claim 15, wherein the first memory technology and the second memory technology are the same memory technology type. 17. The method of claim 15, wherein the first memory technology and the second memory technology are different memory technology types. 18. The method of claim 1, further comprising aligning a through silicon via (TSV) of a topmost memory die of the first memory technology to a logic die immediately above the topmost memory die of the first memory technology. 19. The method of claim 1, further comprising aligning a through silicon via (TSV) of a bottommost memory die of the first memory technology to a logic die immediately below the bottommost memory die of the first memory technology. 20. The method of claim 1, further comprising performing a memory test on the first memory die of the first memory technology by the first memory controller. 21. The method of claim 1, further comprising performing a memory test on the second memory die of the second memory technology by the second memory controller. 22. The method of claim 1, further comprising providing a crossbar in at least the second logic die, wherein the crossbar communicates with any memory location in a memory die of either the first memory technology or the second memory technology. 23. The method of claim 1, further comprising providing compute logic in one or both of the first logic die and the second logic die, wherein the compute logic performs computations on data that is stored in the memory stack associated with the respective first logic die or second logic die. 24. An apparatus comprising:
a first memory die of a first memory technology; a first logic die in communication with the first memory die of the first memory technology, the first logic die including a first memory controller including a first memory control function for interpreting requests in accordance with a first protocol for the first memory technology; a second memory die of a second memory technology; and a second logic die in communication with the second memory die of the second memory technology, the second logic die including a second memory controller including a second memory control function for interpreting requests in accordance with a second protocol for the second memory technology, wherein the first memory controller or the second memory controller receives a memory operation request and performs the memory operation request in accordance with the associated first memory protocol or the second memory protocol. 25. The apparatus of claim 24, further comprising:
a sidebus connection associated with each of the first memory controller and the second memory controller, wherein the memory operation request is received at both the first memory controller and the second memory controller over the sidebus connection. 26. The apparatus of claim 25, wherein the memory operation request includes a request for a memory access to the first memory die of the first memory technology and the first memory controller performs the memory operation request. 27. The apparatus of claim 26, wherein the first memory controller receives the memory operation request from a processor via the sidebus connection and communicates data to the processor via the sidebus connection. 28. The apparatus of claim 25, wherein the memory operation request includes a request for a memory access to the second memory die of the second memory technology and the second memory controller performs the memory operation request. 29. The apparatus of claim 28, wherein the second memory controller receives the memory operation request from a processor via the sidebus connection and communicates data to the processor via the sidebus connection. 30. The apparatus of claim 24, wherein the memory operation request is received at the first memory controller over a connection associated with the first memory controller and a processor. 31. The apparatus of claim 30 wherein the memory operation request is associated with a memory access to the first memory die of the first memory technology and the first memory controller performs the memory operation request. 32. The apparatus of claim 30, wherein the memory operation request is associated with a memory access to the second memory die of the second memory technology and the first memory controller communicates the memory operation request to the second memory controller. 33. The apparatus of claim 32, wherein the second memory controller performs the memory operation request and provides data to the processor via the first memory controller. 34. The apparatus of claim 24, wherein the first memory die of the first memory technology is associated with the second memory controller. 35. The apparatus of claim 34, wherein the second memory controller performs memory operations on the first memory die of the first memory technology. 36. The apparatus of claim 35, wherein the second memory controller transfers data from the first memory die of the first memory technology to the second memory die of the second memory technology and from the second memory die of the second memory technology to the first memory die of the first memory technology. 37. The apparatus of claim 36, wherein the first memory die of the first memory technology is a cache for storing data from the second memory die of the second memory technology or the second memory die of the second memory technology is a cache for storing data from the first memory die of the first memory technology. 38. The apparatus of claim 24, wherein the first memory technology and the second memory technology include any one of the following memory technologies: dynamic random access memory (DRAM), phase-change memory (PCM), Flash memory, or static random access memory (SRAM). 39. The apparatus of claim 38, wherein the first memory technology and the second memory technology are the same memory technology type. 40. The apparatus of claim 38, wherein the first memory technology and the second memory technology are different memory technology types. 41. The apparatus of claim 24, wherein at least the first logic die includes a sense amplifier in communication with a memory location of the second memory die of the second memory technology. 42. The apparatus of claim 24, wherein at least the first logic die includes a voltage regulator for compensating power during transmission of signals in the apparatus. 43. The apparatus of claim 24, wherein at least the first logic die includes an amplifier to amplify signals transmitted in the apparatus. 44. The apparatus of claim 24, wherein the first logic die further includes a second memory control function for interpreting requests in accordance with the second protocol for the second memory technology. 45. A method of testing memory, comprising:
providing a first memory die of a first memory technology; providing a first logic die in communication with the first memory die of the first memory technology, the first logic die including testing logic for testing memory areas in accordance with a first protocol for the first memory technology; and performing, by the testing logic, a test on memory areas included in the first memory die of the first memory technology to identify failed memory areas. 46. The method of claim 45, further comprising:
providing a second memory die of a second memory technology; providing a second logic die in communication with the second memory die of the second memory technology, the second logic die including a testing logic for testing memory areas in accordance with a second protocol for the second memory technology; and performing, by the testing logic, a test on memory areas included in the second memory die of the second memory technology to identify failed memory areas. 47. The method of claim 46, further comprising, upon passing of memory tests, connecting the first memory die of the first memory technology and first logic die to the second memory die of the second memory technology and second logic die. | 2,100 |
6,725 | 6,725 | 16,075,301 | 2,117 | A method builds a workpiece using an additive manufacturing process, wherein the workpiece is built up by consolidating material in a layer-by-layer manner. The method includes receiving an initial geometric model defining surface geometry of the workpiece, determining workpiece slices to be consolidated as layers of the workpiece during the additive manufacturing process from the initial geometric model, determining adjusted positions of the workpiece slices adjusted from initial positions of the workpiece slices as determined from the initial geometric model, the determination of the adjusted positions based upon warping of the workpiece expected to occur during or after the additive manufacturing process, and building the workpiece using the additive manufacturing process, wherein the workpiece slices are formed in the adjusted positions. | 1. A method of building a workpiece using an additive manufacturing process, wherein the workpiece is built up by consolidating material in a layer-by-layer manner, the method comprising receiving an initial geometric model defining surface geometry of the workpiece, determining workpiece slices to be consolidated as layers of the workpiece during the additive manufacturing process from the initial geometric model, determining adjusted positions of the workpiece slices adjusted from initial positions of the workpiece slices as determined from the initial geometric model, the determination of the adjusted positions based upon warping of the workpiece expected to occur during or after the additive manufacturing process, and building the workpiece using the additive manufacturing process, wherein the workpiece slices are formed in the adjusted positions. 2. A method according to claim 1, wherein the adjusted positions of the workpiece slices are such that warping of the workpiece during or after the build returns the workpiece to or towards the desired surface geometry as defined in the initial geometric model. 3. A method according to claim 1, wherein the adjusted positions are shifts from the initial positions in a direction counter to a direction of movement during the expected warping of the workpiece. 4. A method according to claim 1, comprising determining warping of the workpiece expected to occur during or after the additive manufacturing process. 5. A method according to claim 4, wherein determining warping of the workpiece expected to occur during or after the additive manufacturing process comprises determining a degree of warping of a test workpiece built using the additive manufacturing process in accordance with the initial geometric model. 6. A method according to claim 5, wherein the test workpiece is built using the initial positions of the workpiece slices. 7. A method according to claim 5, wherein the degree of warping is determined by measuring the test workpiece after warping has occurred. 8. A method according to claim 7 comprising determining, from the measurements, positions of test workpiece slices built during the additive manufacturing process after distortion of the test workpiece and determining the adjusted positions of the workpiece slices from comparing positions of the test workpiece slices to the initial positions of the workpiece slices. 9. A method according to claim 8, wherein determining positions of the test workpiece slices comprises generating, from the measurements of the test workpiece, a measured geometric model defining surface geometry of the test workpiece and slicing the measured geometric model to determine positions of the test workpiece slices. 10. A method according to claim 8 comprising, for each test workpiece slice of a plurality of the test workpiece slices, measuring a plurality of points on a surface of the test workpiece in a plane corresponding to the test workpiece slice and determining a position of the test workpiece slice from the plurality of points measured in the plane. 11. A method according to claim 8, wherein the adjusted positions are an adjustment of the positions of the workpiece slices in a direction opposite to a direction of displacement of the test workpiece slices from the initial positions of the workpiece slices. 12. A method according to claim 8, wherein a magnitude of the adjustment of the positions of the workpiece slices is based upon a magnitude of the displacement of the test workpiece slices from the initial positions of the workpiece slices. 13. A method according to claim 5, wherein the workpiece is built in the same orientation in a build volume as the test workpiece. 14. A method according to claim 5, wherein the workpiece is built with the same supports as the test workpiece. 15. A method according to claim 5, wherein the workpiece is built in the same position within a build volume as the test workpiece. 16. A method according to claim 5, wherein the adjusted positions take into account a difference in a build of the workpiece and a build of the test workpiece. 17. A method according to claim 16, comprising determining the adjusted positions using a mapping describing how the adjusted positions should be modified based upon the difference between the builds. 18. A method according to claim 16, wherein the difference comprises a difference in a position in a build volume in which the workpiece is built compared to the test workpiece. 19. A method according to claim 4, comprising determining the warping of the workpiece expected to occur during or after the additive manufacturing process from a thermal model of the build/workpiece. 20. A system comprising a processor, the processor arranged to determine workpiece slices to be consolidated as layers of the workpiece during an additive manufacturing process from an initial geometric model defining surface geometry of a workpiece, determine adjusted positions of the workpiece slices adjusted from initial positions of the workpiece slices as determined from the initial geometric model, the determination of the adjusted positions based upon warping of the workpiece expected to occur during or after the additive manufacturing process, and generate a build file for instructing an additive manufacturing apparatus to build the workpiece using the additive manufacturing process, wherein the workpiece slices are formed in the adjusted positions. 21. A data carrier having instructions stored thereon, which, when executed by a processor, causes the processor to determine workpiece slices to be consolidated as layers of the workpiece during an additive manufacturing process from an initial geometric model defining surface geometry of a workpiece, determine adjusted positions of the workpiece slices adjusted from initial positions of the workpiece slices as determined from the initial geometric model, the determination of the adjusted positions based upon warping of the workpiece expected to occur during or after the additive manufacturing process, and generate a build file for instructing an additive manufacturing apparatus to build the workpiece using the additive manufacturing process, wherein the workpiece slices are formed in the adjusted positions. | A method builds a workpiece using an additive manufacturing process, wherein the workpiece is built up by consolidating material in a layer-by-layer manner. The method includes receiving an initial geometric model defining surface geometry of the workpiece, determining workpiece slices to be consolidated as layers of the workpiece during the additive manufacturing process from the initial geometric model, determining adjusted positions of the workpiece slices adjusted from initial positions of the workpiece slices as determined from the initial geometric model, the determination of the adjusted positions based upon warping of the workpiece expected to occur during or after the additive manufacturing process, and building the workpiece using the additive manufacturing process, wherein the workpiece slices are formed in the adjusted positions.1. A method of building a workpiece using an additive manufacturing process, wherein the workpiece is built up by consolidating material in a layer-by-layer manner, the method comprising receiving an initial geometric model defining surface geometry of the workpiece, determining workpiece slices to be consolidated as layers of the workpiece during the additive manufacturing process from the initial geometric model, determining adjusted positions of the workpiece slices adjusted from initial positions of the workpiece slices as determined from the initial geometric model, the determination of the adjusted positions based upon warping of the workpiece expected to occur during or after the additive manufacturing process, and building the workpiece using the additive manufacturing process, wherein the workpiece slices are formed in the adjusted positions. 2. A method according to claim 1, wherein the adjusted positions of the workpiece slices are such that warping of the workpiece during or after the build returns the workpiece to or towards the desired surface geometry as defined in the initial geometric model. 3. A method according to claim 1, wherein the adjusted positions are shifts from the initial positions in a direction counter to a direction of movement during the expected warping of the workpiece. 4. A method according to claim 1, comprising determining warping of the workpiece expected to occur during or after the additive manufacturing process. 5. A method according to claim 4, wherein determining warping of the workpiece expected to occur during or after the additive manufacturing process comprises determining a degree of warping of a test workpiece built using the additive manufacturing process in accordance with the initial geometric model. 6. A method according to claim 5, wherein the test workpiece is built using the initial positions of the workpiece slices. 7. A method according to claim 5, wherein the degree of warping is determined by measuring the test workpiece after warping has occurred. 8. A method according to claim 7 comprising determining, from the measurements, positions of test workpiece slices built during the additive manufacturing process after distortion of the test workpiece and determining the adjusted positions of the workpiece slices from comparing positions of the test workpiece slices to the initial positions of the workpiece slices. 9. A method according to claim 8, wherein determining positions of the test workpiece slices comprises generating, from the measurements of the test workpiece, a measured geometric model defining surface geometry of the test workpiece and slicing the measured geometric model to determine positions of the test workpiece slices. 10. A method according to claim 8 comprising, for each test workpiece slice of a plurality of the test workpiece slices, measuring a plurality of points on a surface of the test workpiece in a plane corresponding to the test workpiece slice and determining a position of the test workpiece slice from the plurality of points measured in the plane. 11. A method according to claim 8, wherein the adjusted positions are an adjustment of the positions of the workpiece slices in a direction opposite to a direction of displacement of the test workpiece slices from the initial positions of the workpiece slices. 12. A method according to claim 8, wherein a magnitude of the adjustment of the positions of the workpiece slices is based upon a magnitude of the displacement of the test workpiece slices from the initial positions of the workpiece slices. 13. A method according to claim 5, wherein the workpiece is built in the same orientation in a build volume as the test workpiece. 14. A method according to claim 5, wherein the workpiece is built with the same supports as the test workpiece. 15. A method according to claim 5, wherein the workpiece is built in the same position within a build volume as the test workpiece. 16. A method according to claim 5, wherein the adjusted positions take into account a difference in a build of the workpiece and a build of the test workpiece. 17. A method according to claim 16, comprising determining the adjusted positions using a mapping describing how the adjusted positions should be modified based upon the difference between the builds. 18. A method according to claim 16, wherein the difference comprises a difference in a position in a build volume in which the workpiece is built compared to the test workpiece. 19. A method according to claim 4, comprising determining the warping of the workpiece expected to occur during or after the additive manufacturing process from a thermal model of the build/workpiece. 20. A system comprising a processor, the processor arranged to determine workpiece slices to be consolidated as layers of the workpiece during an additive manufacturing process from an initial geometric model defining surface geometry of a workpiece, determine adjusted positions of the workpiece slices adjusted from initial positions of the workpiece slices as determined from the initial geometric model, the determination of the adjusted positions based upon warping of the workpiece expected to occur during or after the additive manufacturing process, and generate a build file for instructing an additive manufacturing apparatus to build the workpiece using the additive manufacturing process, wherein the workpiece slices are formed in the adjusted positions. 21. A data carrier having instructions stored thereon, which, when executed by a processor, causes the processor to determine workpiece slices to be consolidated as layers of the workpiece during an additive manufacturing process from an initial geometric model defining surface geometry of a workpiece, determine adjusted positions of the workpiece slices adjusted from initial positions of the workpiece slices as determined from the initial geometric model, the determination of the adjusted positions based upon warping of the workpiece expected to occur during or after the additive manufacturing process, and generate a build file for instructing an additive manufacturing apparatus to build the workpiece using the additive manufacturing process, wherein the workpiece slices are formed in the adjusted positions. | 2,100 |
6,726 | 6,726 | 16,743,219 | 2,186 | A system and method functions to automatically determine a capability of a consumer electronic device and capabilities of ports of an appliance to which the consumer electronic device is connected. The system and method further detects a port of the appliance to which a consumer electronic device is connected. When it is determined that the consumer electronic device is not connected to a port of the appliance that best supports the determined capability of the consumer electronic device, the system and method will automatically provide a user with instructions, e.g., via use of a speaker and/or a display, by which the user can reconnect the consumer electronic device to another port of the appliance having a determined capability that is better suited to the determined capability of the consumer electronic device. | 1. A method for optimizing utilization of a sink appliance having a plurality of ports, comprising:
using a first data indicative of a make and type of a source appliance to determine a capability of the source appliance; determining if the capability of the source appliance and a capability of at least a first one of the plurality of ports of the sink appliance match; and in response to it being determined that the capability of the source appliance and the capability of the at least one of the plurality of ports of the sink appliance match, causing an instruction to be provided to a user to inform the user that the consumer electronic device source appliance should be connected to the at least one of the plurality of ports of the sink appliance. 2. The method as recited in claim 1, wherein the plurality of ports each comprise a High-Definition Multimedia Interface port. 3. The method as recited in claim 1, wherein the first data is read from Extended Display Identification Data received by the sink appliance from the source appliance. 4. The method as recited in claim 1, wherein the first data is read from Consumer Electronics Control related data received by the sink appliance from the source appliance. 5. The method as recited in claim 1, wherein the capability of the source appliance comprises a video resolution capability. 6. The method as recited in claim 1, wherein the first data is provided by a controlling device application configured to control functional operations of the source appliance. 7. The method as recited in claim 1, wherein the sink appliance comprises a television. 8. The method as recited in claim 1, comprising causing the sink appliance to automatically enable the capability of the at least one of the plurality of ports of the sink appliance. 9. (canceled) 10. The method as recited in claim 1, comprising providing a remote server with the first data to determine the capability of the source appliance. 11. An appliance, comprising:
a processing device; a plurality of ports in communication with the processing device; and a memory having instructions executable by the processing device, the instructions, when executed by the processing device, causing the appliance to: use first data indicative of a make and type of a source appliance to determine a capability of the source appliance; determine if the capability of the consumer device and a capability of at least a first one of the plurality of ports match; and in response to it being determined that the capability of the source appliance and the capability of the at least one of the plurality of ports match, cause an instruction to be provided to a user to inform the user that the source appliance should be connected to the at least one of the plurality of ports. 12. The appliance as recited in claim 11, wherein the plurality of ports each comprise a High-Definition Multimedia Interface port. 13. The appliance as recited in claim 11, wherein the first data is read from the signal comprises Extended Display Identification Data received from the source appliance. 14. The appliance as recited in claim 11, wherein the first data is read from Consumer Electronics Control related data received from the source appliance. 15. The appliance as recited in claim 11, wherein the capability of the source appliance comprises a video resolution capability. 16. The appliance as recited in claim 11, wherein the first data is provided by a controlling device application configured to control functional operations of the source appliance. 17. The appliance as recited in claim 11, wherein the appliance comprises a television. 18. The appliance as recited in claim 11, wherein the instructions cause the appliance to provide a remote server with the first data to determine the capability of the consumer device. 19. The appliance as recited in claim 11, wherein the instructions cause the appliance to automatically enable the capability at the at least one of the plurality of ports. | A system and method functions to automatically determine a capability of a consumer electronic device and capabilities of ports of an appliance to which the consumer electronic device is connected. The system and method further detects a port of the appliance to which a consumer electronic device is connected. When it is determined that the consumer electronic device is not connected to a port of the appliance that best supports the determined capability of the consumer electronic device, the system and method will automatically provide a user with instructions, e.g., via use of a speaker and/or a display, by which the user can reconnect the consumer electronic device to another port of the appliance having a determined capability that is better suited to the determined capability of the consumer electronic device.1. A method for optimizing utilization of a sink appliance having a plurality of ports, comprising:
using a first data indicative of a make and type of a source appliance to determine a capability of the source appliance; determining if the capability of the source appliance and a capability of at least a first one of the plurality of ports of the sink appliance match; and in response to it being determined that the capability of the source appliance and the capability of the at least one of the plurality of ports of the sink appliance match, causing an instruction to be provided to a user to inform the user that the consumer electronic device source appliance should be connected to the at least one of the plurality of ports of the sink appliance. 2. The method as recited in claim 1, wherein the plurality of ports each comprise a High-Definition Multimedia Interface port. 3. The method as recited in claim 1, wherein the first data is read from Extended Display Identification Data received by the sink appliance from the source appliance. 4. The method as recited in claim 1, wherein the first data is read from Consumer Electronics Control related data received by the sink appliance from the source appliance. 5. The method as recited in claim 1, wherein the capability of the source appliance comprises a video resolution capability. 6. The method as recited in claim 1, wherein the first data is provided by a controlling device application configured to control functional operations of the source appliance. 7. The method as recited in claim 1, wherein the sink appliance comprises a television. 8. The method as recited in claim 1, comprising causing the sink appliance to automatically enable the capability of the at least one of the plurality of ports of the sink appliance. 9. (canceled) 10. The method as recited in claim 1, comprising providing a remote server with the first data to determine the capability of the source appliance. 11. An appliance, comprising:
a processing device; a plurality of ports in communication with the processing device; and a memory having instructions executable by the processing device, the instructions, when executed by the processing device, causing the appliance to: use first data indicative of a make and type of a source appliance to determine a capability of the source appliance; determine if the capability of the consumer device and a capability of at least a first one of the plurality of ports match; and in response to it being determined that the capability of the source appliance and the capability of the at least one of the plurality of ports match, cause an instruction to be provided to a user to inform the user that the source appliance should be connected to the at least one of the plurality of ports. 12. The appliance as recited in claim 11, wherein the plurality of ports each comprise a High-Definition Multimedia Interface port. 13. The appliance as recited in claim 11, wherein the first data is read from the signal comprises Extended Display Identification Data received from the source appliance. 14. The appliance as recited in claim 11, wherein the first data is read from Consumer Electronics Control related data received from the source appliance. 15. The appliance as recited in claim 11, wherein the capability of the source appliance comprises a video resolution capability. 16. The appliance as recited in claim 11, wherein the first data is provided by a controlling device application configured to control functional operations of the source appliance. 17. The appliance as recited in claim 11, wherein the appliance comprises a television. 18. The appliance as recited in claim 11, wherein the instructions cause the appliance to provide a remote server with the first data to determine the capability of the consumer device. 19. The appliance as recited in claim 11, wherein the instructions cause the appliance to automatically enable the capability at the at least one of the plurality of ports. | 2,100 |
6,727 | 6,727 | 16,096,484 | 2,113 | The present disclosure provides methods for detecting faults in a distributed computing network system. The method includes receiving, from a management services, authority information identifying peer computing devices of a distributed computing network system. For each respective peer computing device, a first message comprising a first instance of a dataset and a second message comprising a second instance of the dataset are received. Where the first peer computing device and the second peer computing device have authority over the data set, it is determined whether the first instance of the dataset matches the second instance of the dataset. Where the first instance of the dataset does not match the second instance of the dataset, a fault message is sent to the management services indicating that a fault has been detected at the first peer computing device. | 1. A method for detecting faults in a distributed computing network system hosting and executing an application comprising a plurality of data sets, the distributed computing network system comprising a plurality of peer computing devices and management services, wherein each peer computing device communicates with other peer computing devices in the distributed computing network system via communication links, wherein the plurality of the peer computing devices execute computer-readable instructions of the application, the method comprising:
at a first peer computing device of the plurality of peer computing devices of the distributed computing network system:
receiving, from the management services, authority information and storing in memory the authority information, the authority information identifying each respective peer computing device of the distributed computing network system, and for each receptive peer computing device, which ones of the plurality of datasets the respective peer computing device has authority over;
receiving a first message comprising a first instance of a data set, a second message comprising a second instance of the data set, and third message comprising a third instance of the data set, wherein the second message is received from a second peer computing device of the plurality of peer computing devices, and the third message received from a third peer computing device of the plurality of peer computing devices;
in response to determining, using the authority information, that each of the first peer computing device, the second peer computing device, and the third peer computing device has authority over the dataset, determining whether the first instance of the dataset, the second instance of the dataset, and the third instance of the dataset match; and,
in response to determining that the first instance of the dataset, the second instance of the dataset, and the third instance of the dataset do not match, sending, to the management server, a fault message indicating that a fault has been detected at the first peer computing device. 2. The method of claim 1, further comprising:
in response to determining that each of the first peer computing device, the second peer computing device, and the third peer computing device do not have authority over the dataset, replacing the dataset stored in the memory of the first peer computing device with the first instance of the dataset included in the first message. 3. The method of claim 1, further comprising:
receiving new authority information from the management server; and replacing the authority information maintained in the memory with the new authority information. 4. The method of claim 1, wherein determining whether the first instance of the dataset, the second instance of the dataset, and the third instance of the dataset match comprises comparing the first instance of the dataset, the second instance of the dataset, and the third instance of the dataset and determining whether the comparison of the first instance of the dataset, the second instance of the dataset, and the third instance of the dataset is within a predetermined threshold. 5. The method of claim 1, wherein the first message comprises a first timestamp indicative of a time the first instance of the dataset was generated, the second message comprises a second timestamp indicative of a time the second instance of the dataset was generated, and the third message comprises a third timestamp indicative of a time the third instance of the dataset was generated; and wherein determining whether the first instance of the dataset, the second instance of the dataset, and the third instance of the dataset match comprises:
extrapolating the first instance of the dataset, the second instance of the dataset, and the third instance of the dataset to the one of the first, second, and third timestamp; and determining whether the first instance of the dataset, the second instance of the dataset, and the third instance of the dataset match within the predefined tolerance. 6. The method of claim 1, wherein the fault message includes the first instance of the data set, the second instance of the data set, and the third instance of the data set for further validation. 7. The method of claim 1, wherein the first message is received from another peer computing device of the plurality of computing devices. 8. The method of claim 1, wherein the first message is generated by the first peer computing device of the plurality of peer computing devices. 9. A method for detecting faults in a distributed computing network system hosting and executing an application comprising a plurality of data sets, the distributed computing network system comprising a plurality of peer computing devices and management server, wherein each peer computing device communicates with other peer computing devices in the distributed computing network system via communication links, wherein the plurality of the peer computing devices execute computer-readable instructions of the application, the method comprising:
at a first peer computing device of the plurality of peer computing devices of the distributed computing network system:
receiving, from the management server, authority information and storing in memory the authority information, the authority information identifying each respective peer computing devices of the distributed computing network system, and for each receptive peer computing device, which ones of the plurality of datasets the respective peer computing device has been assigned authority over;
receiving a first message comprising a first instance of a dataset and a second message comprising a second instance of the dataset, wherein the first message is received from the first peer computing device or another peer computing device of the plurality of peer computing devices, wherein the second message is received from a second peer computing device of the plurality of peer computing devices;
in response to determining, using the authority information, that the first peer computing device and the second peer computing device have authority over the data set, determining whether the first instance of the dataset matches the second instance of the dataset; and,
in response to determining that the first instance of the dataset does not match the second instance of the dataset, sending, to the management server, a fault message indicating that a fault has been detected at the first peer computing device. 10. The method of claim 9, further comprising:
in response to determining that each of the first peer computing device, and the second computing device do not have authority over the dataset, replacing the dataset stored in the memory of the peer computing device with the first instance of the dataset included in the first message. 11. The method of claim 9, further comprising:
receiving new authority information from the management server; and replacing the authority information maintained in the memory with the new authority information. 12. A method of detecting faults of a distributed computing network system running an application, the distributed computing network system comprising peer computing devices and management services storing authority information identifying each respective peer computing device of the distributed computing network system, and for each receptive peer computing device, which ones of the plurality of data sets the respective peer computing device has authority over, the method comprising:
receiving, from least two peer computing devices of peer authority group, a fault message comprising all instances of a dataset received at the peer computing device; identify which of the at least two the peer computing devices of the authority group has a fault; incrementing a fault counter for the identified peer computing device; when the said faulty peer counter for the identified peer computing device exceeds a threshold: updating the authority information stored in the management services to change the authority of the identified peer computing device over the dataset; and sending to all peer computing devices in the distributed computing network system the new authority information. 13. A method of detecting faults of a distributed computing network system running an application, the distributed computing network system comprising peer computing devices and management services storing authority information identifying each respective peer computing device of the distributed computing network system, and for each receptive peer computing device, which ones of the plurality of data sets the respective peer computing device has authority over, the method comprising:
receiving, from a peer computing device of peer authority group, a fault message comprising all instances of a dataset received at the peer computing device; incrementing a fault counter for the peer computing device; when the said faulty peer counter for the peer computing device exceeds a threshold: updating the authority information stored in the management services to change the authority of the peer computing device over the dataset; and sending to all peer computing devices in the distributed computing network system the new authority information. | The present disclosure provides methods for detecting faults in a distributed computing network system. The method includes receiving, from a management services, authority information identifying peer computing devices of a distributed computing network system. For each respective peer computing device, a first message comprising a first instance of a dataset and a second message comprising a second instance of the dataset are received. Where the first peer computing device and the second peer computing device have authority over the data set, it is determined whether the first instance of the dataset matches the second instance of the dataset. Where the first instance of the dataset does not match the second instance of the dataset, a fault message is sent to the management services indicating that a fault has been detected at the first peer computing device.1. A method for detecting faults in a distributed computing network system hosting and executing an application comprising a plurality of data sets, the distributed computing network system comprising a plurality of peer computing devices and management services, wherein each peer computing device communicates with other peer computing devices in the distributed computing network system via communication links, wherein the plurality of the peer computing devices execute computer-readable instructions of the application, the method comprising:
at a first peer computing device of the plurality of peer computing devices of the distributed computing network system:
receiving, from the management services, authority information and storing in memory the authority information, the authority information identifying each respective peer computing device of the distributed computing network system, and for each receptive peer computing device, which ones of the plurality of datasets the respective peer computing device has authority over;
receiving a first message comprising a first instance of a data set, a second message comprising a second instance of the data set, and third message comprising a third instance of the data set, wherein the second message is received from a second peer computing device of the plurality of peer computing devices, and the third message received from a third peer computing device of the plurality of peer computing devices;
in response to determining, using the authority information, that each of the first peer computing device, the second peer computing device, and the third peer computing device has authority over the dataset, determining whether the first instance of the dataset, the second instance of the dataset, and the third instance of the dataset match; and,
in response to determining that the first instance of the dataset, the second instance of the dataset, and the third instance of the dataset do not match, sending, to the management server, a fault message indicating that a fault has been detected at the first peer computing device. 2. The method of claim 1, further comprising:
in response to determining that each of the first peer computing device, the second peer computing device, and the third peer computing device do not have authority over the dataset, replacing the dataset stored in the memory of the first peer computing device with the first instance of the dataset included in the first message. 3. The method of claim 1, further comprising:
receiving new authority information from the management server; and replacing the authority information maintained in the memory with the new authority information. 4. The method of claim 1, wherein determining whether the first instance of the dataset, the second instance of the dataset, and the third instance of the dataset match comprises comparing the first instance of the dataset, the second instance of the dataset, and the third instance of the dataset and determining whether the comparison of the first instance of the dataset, the second instance of the dataset, and the third instance of the dataset is within a predetermined threshold. 5. The method of claim 1, wherein the first message comprises a first timestamp indicative of a time the first instance of the dataset was generated, the second message comprises a second timestamp indicative of a time the second instance of the dataset was generated, and the third message comprises a third timestamp indicative of a time the third instance of the dataset was generated; and wherein determining whether the first instance of the dataset, the second instance of the dataset, and the third instance of the dataset match comprises:
extrapolating the first instance of the dataset, the second instance of the dataset, and the third instance of the dataset to the one of the first, second, and third timestamp; and determining whether the first instance of the dataset, the second instance of the dataset, and the third instance of the dataset match within the predefined tolerance. 6. The method of claim 1, wherein the fault message includes the first instance of the data set, the second instance of the data set, and the third instance of the data set for further validation. 7. The method of claim 1, wherein the first message is received from another peer computing device of the plurality of computing devices. 8. The method of claim 1, wherein the first message is generated by the first peer computing device of the plurality of peer computing devices. 9. A method for detecting faults in a distributed computing network system hosting and executing an application comprising a plurality of data sets, the distributed computing network system comprising a plurality of peer computing devices and management server, wherein each peer computing device communicates with other peer computing devices in the distributed computing network system via communication links, wherein the plurality of the peer computing devices execute computer-readable instructions of the application, the method comprising:
at a first peer computing device of the plurality of peer computing devices of the distributed computing network system:
receiving, from the management server, authority information and storing in memory the authority information, the authority information identifying each respective peer computing devices of the distributed computing network system, and for each receptive peer computing device, which ones of the plurality of datasets the respective peer computing device has been assigned authority over;
receiving a first message comprising a first instance of a dataset and a second message comprising a second instance of the dataset, wherein the first message is received from the first peer computing device or another peer computing device of the plurality of peer computing devices, wherein the second message is received from a second peer computing device of the plurality of peer computing devices;
in response to determining, using the authority information, that the first peer computing device and the second peer computing device have authority over the data set, determining whether the first instance of the dataset matches the second instance of the dataset; and,
in response to determining that the first instance of the dataset does not match the second instance of the dataset, sending, to the management server, a fault message indicating that a fault has been detected at the first peer computing device. 10. The method of claim 9, further comprising:
in response to determining that each of the first peer computing device, and the second computing device do not have authority over the dataset, replacing the dataset stored in the memory of the peer computing device with the first instance of the dataset included in the first message. 11. The method of claim 9, further comprising:
receiving new authority information from the management server; and replacing the authority information maintained in the memory with the new authority information. 12. A method of detecting faults of a distributed computing network system running an application, the distributed computing network system comprising peer computing devices and management services storing authority information identifying each respective peer computing device of the distributed computing network system, and for each receptive peer computing device, which ones of the plurality of data sets the respective peer computing device has authority over, the method comprising:
receiving, from least two peer computing devices of peer authority group, a fault message comprising all instances of a dataset received at the peer computing device; identify which of the at least two the peer computing devices of the authority group has a fault; incrementing a fault counter for the identified peer computing device; when the said faulty peer counter for the identified peer computing device exceeds a threshold: updating the authority information stored in the management services to change the authority of the identified peer computing device over the dataset; and sending to all peer computing devices in the distributed computing network system the new authority information. 13. A method of detecting faults of a distributed computing network system running an application, the distributed computing network system comprising peer computing devices and management services storing authority information identifying each respective peer computing device of the distributed computing network system, and for each receptive peer computing device, which ones of the plurality of data sets the respective peer computing device has authority over, the method comprising:
receiving, from a peer computing device of peer authority group, a fault message comprising all instances of a dataset received at the peer computing device; incrementing a fault counter for the peer computing device; when the said faulty peer counter for the peer computing device exceeds a threshold: updating the authority information stored in the management services to change the authority of the peer computing device over the dataset; and sending to all peer computing devices in the distributed computing network system the new authority information. | 2,100 |
6,728 | 6,728 | 15,658,106 | 2,124 | Curating high-quality ground truth is an important but difficult part of training a cognitive system. The invention greatly simplifies this process by determining the value that particular training data has in improving existing ground truth. Candidate training data of different types (text, audio, images) is extracted from an interaction log, and each entry is analyzed to arrive at a training value score. The analysis generates multiple component scores which are combined for the final score. The component scores may include a per-feature variability score, a cross-feature variability score, and an accuracy score. A set of the unverified entries may be presented to a user based on the training value scores, and the user can select which of the entries in the set should be included as new ground truths. The ground truths can then be updated by adding the selected entries. | 1.-7. (canceled) 8. A computer system comprising:
one or more processors which process program instructions; a memory device connected to said one or more processors; and program instructions residing in said memory device for providing instances of training data for a cognitive system by receiving existing ground truths for the cognitive system, receiving a log of interactions representing separable pieces of potential training data for the cognitive system, extracting a plurality of unverified entries from the log, analyzing each unverified entry to generate a respective training value score indicative of an improvement to the cognitive system relative to the existing ground truths, and selecting one or more of the unverified entries as new ground truths for the cognitive system based on the training value scores. 9. The computer system of claim 8 wherein the analyzing includes:
identifying at least one feature of the potential training data;
compiling statistical information regarding the feature relative to the existing ground truth; and
generating a per-feature variability score for a given unverified entry based on any change to the statistical information that would be imposed by including the given unverified entry in the ground truths. 10. The computer system of claim 8 wherein the analyzing includes:
identifying at least one feature of the potential training data;
grouping the existing ground truths into a plurality of clusters based on the feature according to a clustering algorithm; and
generating a cross-feature variability score for a given unverified entry based on which of the clusters the given unverified entry would be included in according to the clustering algorithm. 11. The computer system of claim 8 wherein the analyzing includes:
computing accuracies of the cognitive system for different types of ground truths;
determining that a given unverified entry is a particular one of the types; and
generating an accuracy score for a given unverified entry based on the accuracy of the cognitive system for the particular type of the given unverified entry. 12. The computer system of claim 8 wherein the analyzing includes:
generating a per-feature variability score for a given unverified entry;
generating a cross-feature variability score for the given unverified entry;
generating an accuracy score for the given unverified entry; and
combining the per-feature variability score, the cross-feature variability score, and the accuracy score to yield the training value score for the given unverified entry. 13. The computer system of claim 8 wherein the selecting includes:
presenting a set of the unverified entries to a user based on the training value scores; and
receiving a user selection from the set. 14. The computer system of claim 8 wherein said program instructions further update the ground truths with the selected entries. 15. A computer program product comprising:
a computer readable storage medium; and program instructions residing in said storage medium for providing instances of training data for a cognitive system by receiving existing ground truths for the cognitive system, receiving a log of interactions representing separable pieces of potential training data for the cognitive system, extracting a plurality of unverified entries from the log, analyzing each unverified entry to generate a respective training value score indicative of an improvement to the cognitive system relative to the existing ground truths, and selecting one or more of the unverified entries as new ground truths for the cognitive system based on the training value scores. 16. The computer program product of claim 15 wherein said analyzing includes:
identifying at least one feature of the potential training data;
compiling statistical information regarding the feature relative to the existing ground truth; and
generating a per-feature variability score for a given unverified entry based on any change to the statistical information that would be imposed by including the given unverified entry in the ground truths. 17. The computer program product of claim 15 wherein the analyzing includes:
identifying at least one feature of the potential training data;
grouping the existing ground truths into a plurality of clusters based on the feature according to a clustering algorithm; and
generating a cross-feature variability score for a given unverified entry based on which of the clusters the given unverified entry would be included in according to the clustering algorithm. 18. The computer program product of claim 15 wherein the analyzing includes:
computing accuracies of the cognitive system for different types of ground truths;
determining that a given unverified entry is a particular one of the types; and
generating an accuracy score for a given unverified entry based on the accuracy of the cognitive system for the particular type of the given unverified entry. 19. The computer program product of claim 15 wherein the analyzing includes:
generating a per-feature variability score for a given unverified entry;
generating a cross-feature variability score for the given unverified entry;
generating an accuracy score for the given unverified entry; and
combining the per-feature variability score, the cross-feature variability score, and the accuracy score to yield the training value score for the given unverified entry. 20. The computer program product of claim 15 wherein the selecting includes:
presenting a set of the unverified entries to a user based on the training value scores; and
receiving a user selection from the set. | Curating high-quality ground truth is an important but difficult part of training a cognitive system. The invention greatly simplifies this process by determining the value that particular training data has in improving existing ground truth. Candidate training data of different types (text, audio, images) is extracted from an interaction log, and each entry is analyzed to arrive at a training value score. The analysis generates multiple component scores which are combined for the final score. The component scores may include a per-feature variability score, a cross-feature variability score, and an accuracy score. A set of the unverified entries may be presented to a user based on the training value scores, and the user can select which of the entries in the set should be included as new ground truths. The ground truths can then be updated by adding the selected entries.1.-7. (canceled) 8. A computer system comprising:
one or more processors which process program instructions; a memory device connected to said one or more processors; and program instructions residing in said memory device for providing instances of training data for a cognitive system by receiving existing ground truths for the cognitive system, receiving a log of interactions representing separable pieces of potential training data for the cognitive system, extracting a plurality of unverified entries from the log, analyzing each unverified entry to generate a respective training value score indicative of an improvement to the cognitive system relative to the existing ground truths, and selecting one or more of the unverified entries as new ground truths for the cognitive system based on the training value scores. 9. The computer system of claim 8 wherein the analyzing includes:
identifying at least one feature of the potential training data;
compiling statistical information regarding the feature relative to the existing ground truth; and
generating a per-feature variability score for a given unverified entry based on any change to the statistical information that would be imposed by including the given unverified entry in the ground truths. 10. The computer system of claim 8 wherein the analyzing includes:
identifying at least one feature of the potential training data;
grouping the existing ground truths into a plurality of clusters based on the feature according to a clustering algorithm; and
generating a cross-feature variability score for a given unverified entry based on which of the clusters the given unverified entry would be included in according to the clustering algorithm. 11. The computer system of claim 8 wherein the analyzing includes:
computing accuracies of the cognitive system for different types of ground truths;
determining that a given unverified entry is a particular one of the types; and
generating an accuracy score for a given unverified entry based on the accuracy of the cognitive system for the particular type of the given unverified entry. 12. The computer system of claim 8 wherein the analyzing includes:
generating a per-feature variability score for a given unverified entry;
generating a cross-feature variability score for the given unverified entry;
generating an accuracy score for the given unverified entry; and
combining the per-feature variability score, the cross-feature variability score, and the accuracy score to yield the training value score for the given unverified entry. 13. The computer system of claim 8 wherein the selecting includes:
presenting a set of the unverified entries to a user based on the training value scores; and
receiving a user selection from the set. 14. The computer system of claim 8 wherein said program instructions further update the ground truths with the selected entries. 15. A computer program product comprising:
a computer readable storage medium; and program instructions residing in said storage medium for providing instances of training data for a cognitive system by receiving existing ground truths for the cognitive system, receiving a log of interactions representing separable pieces of potential training data for the cognitive system, extracting a plurality of unverified entries from the log, analyzing each unverified entry to generate a respective training value score indicative of an improvement to the cognitive system relative to the existing ground truths, and selecting one or more of the unverified entries as new ground truths for the cognitive system based on the training value scores. 16. The computer program product of claim 15 wherein said analyzing includes:
identifying at least one feature of the potential training data;
compiling statistical information regarding the feature relative to the existing ground truth; and
generating a per-feature variability score for a given unverified entry based on any change to the statistical information that would be imposed by including the given unverified entry in the ground truths. 17. The computer program product of claim 15 wherein the analyzing includes:
identifying at least one feature of the potential training data;
grouping the existing ground truths into a plurality of clusters based on the feature according to a clustering algorithm; and
generating a cross-feature variability score for a given unverified entry based on which of the clusters the given unverified entry would be included in according to the clustering algorithm. 18. The computer program product of claim 15 wherein the analyzing includes:
computing accuracies of the cognitive system for different types of ground truths;
determining that a given unverified entry is a particular one of the types; and
generating an accuracy score for a given unverified entry based on the accuracy of the cognitive system for the particular type of the given unverified entry. 19. The computer program product of claim 15 wherein the analyzing includes:
generating a per-feature variability score for a given unverified entry;
generating a cross-feature variability score for the given unverified entry;
generating an accuracy score for the given unverified entry; and
combining the per-feature variability score, the cross-feature variability score, and the accuracy score to yield the training value score for the given unverified entry. 20. The computer program product of claim 15 wherein the selecting includes:
presenting a set of the unverified entries to a user based on the training value scores; and
receiving a user selection from the set. | 2,100 |
6,729 | 6,729 | 16,242,955 | 2,136 | A computer-implemented method, according to one embodiment, includes: receiving one or more suggestions which correspond to placement of data in storage, where the one or more suggestions are based on data workload characteristics. The one or more suggestions are used to identify portions of actual data stored in actual storage which correspond to the one or more suggestions. For each of the identified portions of the actual data stored in the first tier, the one or more suggestions is further used to determine whether to transfer the given identified portion of the actual data to the second tier. Moreover, in response to determining to transfer at least one of the identified portions of the actual data to the second tier, one or more instructions are sent to transfer the at least one of the identified portions of the actual data from the first tier to the second tier. | 1. A computer-implemented method, comprising:
receiving one or more suggestions which correspond to placement of data in storage, wherein the one or more suggestions are based on data workload characteristics; using the one or more suggestions to identify portions of actual data stored in actual storage which correspond to the one or more suggestions, wherein the actual storage includes: a first tier having two or more shared nodes, and a second tier having at least one shared nothing node; for each of the identified portions of the actual data stored in the first tier, using the one or more suggestions to determine whether to transfer the given identified portion of the actual data to the second tier; and in response to determining to transfer at least one of the identified portions of the actual data to the second tier, sending one or more instructions to transfer the at least one of the identified portions of the actual data from the first tier to the second tier. 2. The computer-implemented method of claim 1, wherein each of the at least one shared nothing node in the second tier includes special purpose hardware. 3. The computer-implemented method of claim 2, wherein the special purpose hardware is selected from the group consisting of: a graphics processing unit, a solid state drive cache, an application-specific integrated circuit, and non-volatile memory express. 4. The computer-implemented method of claim 1, wherein the first tier is configured to stripe data across the two or more shared nodes, with a proviso that the second tier is not configured to stripe data across two or more of the at least one shared nothing node. 5. The computer-implemented method of claim 1, wherein the first and second tiers are included in a same namespace. 6. The computer-implemented method of claim 1, comprising:
using the one or more suggestions to identify portions of newly received data which correspond thereto; for each of the identified portions of the newly received data, using the one or more suggestions to determine whether to store the given identified portion of the newly received data in the second tier; in response to determining to store the given identified portion of the newly received data in the second tier, sending one or more instructions to store the given identified portion of the newly received data in the second tier; and in response to determining to not store the given identified portion of the newly received data in the second tier, sending one or more instructions to store the given identified portion of the newly received data in the first tier. 7. The computer-implemented method of claim 1, wherein the data workload characteristics are generated using information selected from the group consisting of: read and/or write patterns, corresponding file types, and corresponding portions of a file. 8. A computer program product comprising a computer readable storage medium having program instructions embodied therewith, the program instructions readable and/or executable by a processor to cause the processor to:
receive, by the processor, one or more suggestions which correspond to placement of data in storage, wherein the one or more suggestions are based on data workload characteristics; use, by the processor, the one or more suggestions to identify portions of actual data stored in actual storage which correspond to the one or more suggestions, wherein the actual storage includes: a first tier having two or more shared nodes, and a second tier having at least one shared nothing node; for each of the identified portions of the actual data stored in the first tier, use, by the processor, the one or more suggestions to determine whether to transfer the given identified portion of the actual data to the second tier; and in response to determining to transfer at least one of the identified portions of the actual data to the second tier, send, by the processor, one or more instructions to transfer the at least one of the identified portions of the actual data from the first tier to the second tier. 9. The computer program product of claim 8, wherein each of the at least one shared nothing node in the second tier includes special purpose hardware, wherein the special purpose hardware is selected from the group consisting of: a graphics processing unit, a solid state drive cache, an application-specific integrated circuit, and non-volatile memory express. 10. The computer program product of claim 8, wherein the first tier is configured to stripe data across the two or more shared nodes, with a proviso that the second tier is not configured to stripe data across two or more of the at least one shared nothing node. 11. The computer program product of claim 8, wherein the first and second tiers are included in a same namespace. 12. The computer program product of claim 8, the program instructions readable and/or executable by the processor to cause the processor to:
use, by the processor, the one or more suggestions to identify portions of newly received data which correspond thereto; for each of the identified portions of the newly received data, use, by the processor, the one or more suggestions to determine whether to store the given identified portion of the newly received data in the second tier; in response to determining to store the given identified portion of the newly received data in the second tier, send, by the processor, one or more instructions to store the given identified portion of the newly received data in the second tier; and in response to determining to not store the given identified portion of the newly received data in the second tier, send, by the processor, one or more instructions to store the given identified portion of the newly received data in the first tier. 13. The computer program product of claim 8, wherein the data workload characteristics are generated using information selected from the group consisting of: read and/or write patterns, corresponding file types, and corresponding portions of a file. 14. A system, comprising:
a processor; and logic integrated with the processor, executable by the processor, or integrated with and executable by the processor, the logic being configured to: receive, by the processor, one or more suggestions which correspond to placement of data in storage, wherein the one or more suggestions are based on data workload characteristics; use, by the processor, the one or more suggestions to identify portions of actual data stored in actual storage which correspond to the one or more suggestions, wherein the actual storage includes: a first tier having two or more shared nodes, and a second tier having at least one shared nothing node; for each of the identified portions of the actual data stored in the first tier, use, by the processor, the one or more suggestions to determine whether to transfer the given identified portion of the actual data to the second tier; and in response to determining to transfer at least one of the identified portions of the actual data to the second tier, send, by the processor, one or more instructions to transfer the at least one of the identified portions of the actual data from the first tier to the second tier. 15. The system of claim 14, wherein each of the at least one shared nothing node in the second tier includes special purpose hardware, wherein the special purpose hardware is selected from the group consisting of: a graphics processing unit, a solid state drive cache, an application-specific integrated circuit, and non-volatile memory express. 16. The system of claim 14, wherein the first tier is configured to stripe data across the two or more shared nodes, with a proviso that the second tier is not configured to stripe data across two or more of the at least one shared nothing node. 17. The system of claim 14, wherein the first and second tiers are included in a same namespace. 18. The system of claim 14, the logic being configured to:
use, by the processor, the one or more suggestions to identify portions of newly received data which correspond thereto; for each of the identified portions of the newly received data, use, by the processor, the one or more suggestions to determine whether to store the given identified portion of the newly received data in the second tier; in response to determining to store the given identified portion of the newly received data in the second tier, send, by the processor, one or more instructions to store the given identified portion of the newly received data in the second tier; and in response to determining to not store the given identified portion of the newly received data in the second tier, send, by the processor, one or more instructions to store the given identified portion of the newly received data in the first tier. 19. The system of claim 14, wherein the data workload characteristics are generated using information selected from the group consisting of: read and/or write patterns, corresponding file types, and corresponding portions of a file. 20. A computer-implemented method, comprising:
analyzing workload characteristics of data stored in a clustered filesystem, wherein the clustered filesystem is implemented in storage which includes a first tier having two or more shared nodes, and a second tier having at least one shared nothing node, wherein the first and second tiers are included in a same namespace; using the analyzed workload characteristics to generate one or more suggestions which correspond to placement of the data in the storage; and using the one or more suggestions to transfer at least some of the data in the storage between the first and second tiers. 21. The computer-implemented method of claim 20, wherein a first inode structure which corresponds to the first tier is maintained separately from a second inode structure which corresponds to the second tier. 22. The computer-implemented method of claim 20, wherein each of the at least one shared nothing node in the second tier includes special purpose hardware, wherein the special purpose hardware is selected from the group consisting of: a graphics processing unit, a solid state drive cache, an application-specific integrated circuit, and non-volatile memory express. 23. A system, comprising:
storage which includes a first tier having two or more shared nodes, and a second tier having at least one shared nothing node, wherein the first and second tiers are included in a same namespace; a processor; and logic integrated with the processor, executable by the processor, or integrated with and executable by the processor, the logic being configured to: analyze, by the processor, workload characteristics of data stored in the storage; use, by the processor, the analyzed workload characteristics to generate one or more suggestions which correspond to placement of the data in the storage; and use, by the processor, the one or more suggestions to transfer at least some of the data in the storage between the first and second tiers. 24. The system of claim 23, wherein a first inode structure which corresponds to the first tier is maintained separately from a second inode structure which corresponds to the second tier. 25. The system of claim 23, wherein each of the at least one shared nothing node in the second tier includes special purpose hardware, wherein the special purpose hardware is selected from the group consisting of: a graphics processing unit, a solid state drive cache, an application-specific integrated circuit, and non-volatile memory express. | A computer-implemented method, according to one embodiment, includes: receiving one or more suggestions which correspond to placement of data in storage, where the one or more suggestions are based on data workload characteristics. The one or more suggestions are used to identify portions of actual data stored in actual storage which correspond to the one or more suggestions. For each of the identified portions of the actual data stored in the first tier, the one or more suggestions is further used to determine whether to transfer the given identified portion of the actual data to the second tier. Moreover, in response to determining to transfer at least one of the identified portions of the actual data to the second tier, one or more instructions are sent to transfer the at least one of the identified portions of the actual data from the first tier to the second tier.1. A computer-implemented method, comprising:
receiving one or more suggestions which correspond to placement of data in storage, wherein the one or more suggestions are based on data workload characteristics; using the one or more suggestions to identify portions of actual data stored in actual storage which correspond to the one or more suggestions, wherein the actual storage includes: a first tier having two or more shared nodes, and a second tier having at least one shared nothing node; for each of the identified portions of the actual data stored in the first tier, using the one or more suggestions to determine whether to transfer the given identified portion of the actual data to the second tier; and in response to determining to transfer at least one of the identified portions of the actual data to the second tier, sending one or more instructions to transfer the at least one of the identified portions of the actual data from the first tier to the second tier. 2. The computer-implemented method of claim 1, wherein each of the at least one shared nothing node in the second tier includes special purpose hardware. 3. The computer-implemented method of claim 2, wherein the special purpose hardware is selected from the group consisting of: a graphics processing unit, a solid state drive cache, an application-specific integrated circuit, and non-volatile memory express. 4. The computer-implemented method of claim 1, wherein the first tier is configured to stripe data across the two or more shared nodes, with a proviso that the second tier is not configured to stripe data across two or more of the at least one shared nothing node. 5. The computer-implemented method of claim 1, wherein the first and second tiers are included in a same namespace. 6. The computer-implemented method of claim 1, comprising:
using the one or more suggestions to identify portions of newly received data which correspond thereto; for each of the identified portions of the newly received data, using the one or more suggestions to determine whether to store the given identified portion of the newly received data in the second tier; in response to determining to store the given identified portion of the newly received data in the second tier, sending one or more instructions to store the given identified portion of the newly received data in the second tier; and in response to determining to not store the given identified portion of the newly received data in the second tier, sending one or more instructions to store the given identified portion of the newly received data in the first tier. 7. The computer-implemented method of claim 1, wherein the data workload characteristics are generated using information selected from the group consisting of: read and/or write patterns, corresponding file types, and corresponding portions of a file. 8. A computer program product comprising a computer readable storage medium having program instructions embodied therewith, the program instructions readable and/or executable by a processor to cause the processor to:
receive, by the processor, one or more suggestions which correspond to placement of data in storage, wherein the one or more suggestions are based on data workload characteristics; use, by the processor, the one or more suggestions to identify portions of actual data stored in actual storage which correspond to the one or more suggestions, wherein the actual storage includes: a first tier having two or more shared nodes, and a second tier having at least one shared nothing node; for each of the identified portions of the actual data stored in the first tier, use, by the processor, the one or more suggestions to determine whether to transfer the given identified portion of the actual data to the second tier; and in response to determining to transfer at least one of the identified portions of the actual data to the second tier, send, by the processor, one or more instructions to transfer the at least one of the identified portions of the actual data from the first tier to the second tier. 9. The computer program product of claim 8, wherein each of the at least one shared nothing node in the second tier includes special purpose hardware, wherein the special purpose hardware is selected from the group consisting of: a graphics processing unit, a solid state drive cache, an application-specific integrated circuit, and non-volatile memory express. 10. The computer program product of claim 8, wherein the first tier is configured to stripe data across the two or more shared nodes, with a proviso that the second tier is not configured to stripe data across two or more of the at least one shared nothing node. 11. The computer program product of claim 8, wherein the first and second tiers are included in a same namespace. 12. The computer program product of claim 8, the program instructions readable and/or executable by the processor to cause the processor to:
use, by the processor, the one or more suggestions to identify portions of newly received data which correspond thereto; for each of the identified portions of the newly received data, use, by the processor, the one or more suggestions to determine whether to store the given identified portion of the newly received data in the second tier; in response to determining to store the given identified portion of the newly received data in the second tier, send, by the processor, one or more instructions to store the given identified portion of the newly received data in the second tier; and in response to determining to not store the given identified portion of the newly received data in the second tier, send, by the processor, one or more instructions to store the given identified portion of the newly received data in the first tier. 13. The computer program product of claim 8, wherein the data workload characteristics are generated using information selected from the group consisting of: read and/or write patterns, corresponding file types, and corresponding portions of a file. 14. A system, comprising:
a processor; and logic integrated with the processor, executable by the processor, or integrated with and executable by the processor, the logic being configured to: receive, by the processor, one or more suggestions which correspond to placement of data in storage, wherein the one or more suggestions are based on data workload characteristics; use, by the processor, the one or more suggestions to identify portions of actual data stored in actual storage which correspond to the one or more suggestions, wherein the actual storage includes: a first tier having two or more shared nodes, and a second tier having at least one shared nothing node; for each of the identified portions of the actual data stored in the first tier, use, by the processor, the one or more suggestions to determine whether to transfer the given identified portion of the actual data to the second tier; and in response to determining to transfer at least one of the identified portions of the actual data to the second tier, send, by the processor, one or more instructions to transfer the at least one of the identified portions of the actual data from the first tier to the second tier. 15. The system of claim 14, wherein each of the at least one shared nothing node in the second tier includes special purpose hardware, wherein the special purpose hardware is selected from the group consisting of: a graphics processing unit, a solid state drive cache, an application-specific integrated circuit, and non-volatile memory express. 16. The system of claim 14, wherein the first tier is configured to stripe data across the two or more shared nodes, with a proviso that the second tier is not configured to stripe data across two or more of the at least one shared nothing node. 17. The system of claim 14, wherein the first and second tiers are included in a same namespace. 18. The system of claim 14, the logic being configured to:
use, by the processor, the one or more suggestions to identify portions of newly received data which correspond thereto; for each of the identified portions of the newly received data, use, by the processor, the one or more suggestions to determine whether to store the given identified portion of the newly received data in the second tier; in response to determining to store the given identified portion of the newly received data in the second tier, send, by the processor, one or more instructions to store the given identified portion of the newly received data in the second tier; and in response to determining to not store the given identified portion of the newly received data in the second tier, send, by the processor, one or more instructions to store the given identified portion of the newly received data in the first tier. 19. The system of claim 14, wherein the data workload characteristics are generated using information selected from the group consisting of: read and/or write patterns, corresponding file types, and corresponding portions of a file. 20. A computer-implemented method, comprising:
analyzing workload characteristics of data stored in a clustered filesystem, wherein the clustered filesystem is implemented in storage which includes a first tier having two or more shared nodes, and a second tier having at least one shared nothing node, wherein the first and second tiers are included in a same namespace; using the analyzed workload characteristics to generate one or more suggestions which correspond to placement of the data in the storage; and using the one or more suggestions to transfer at least some of the data in the storage between the first and second tiers. 21. The computer-implemented method of claim 20, wherein a first inode structure which corresponds to the first tier is maintained separately from a second inode structure which corresponds to the second tier. 22. The computer-implemented method of claim 20, wherein each of the at least one shared nothing node in the second tier includes special purpose hardware, wherein the special purpose hardware is selected from the group consisting of: a graphics processing unit, a solid state drive cache, an application-specific integrated circuit, and non-volatile memory express. 23. A system, comprising:
storage which includes a first tier having two or more shared nodes, and a second tier having at least one shared nothing node, wherein the first and second tiers are included in a same namespace; a processor; and logic integrated with the processor, executable by the processor, or integrated with and executable by the processor, the logic being configured to: analyze, by the processor, workload characteristics of data stored in the storage; use, by the processor, the analyzed workload characteristics to generate one or more suggestions which correspond to placement of the data in the storage; and use, by the processor, the one or more suggestions to transfer at least some of the data in the storage between the first and second tiers. 24. The system of claim 23, wherein a first inode structure which corresponds to the first tier is maintained separately from a second inode structure which corresponds to the second tier. 25. The system of claim 23, wherein each of the at least one shared nothing node in the second tier includes special purpose hardware, wherein the special purpose hardware is selected from the group consisting of: a graphics processing unit, a solid state drive cache, an application-specific integrated circuit, and non-volatile memory express. | 2,100 |
6,730 | 6,730 | 16,400,930 | 2,143 | A contextual awareness system for an aircraft and a method from controlling the same are provided. The aircraft, for example, may include, but is not limited to, a touch screen display, a memory configured to store rules defining a relationship between a plurality of data fields, and a processor configured to determine when a data field displayed on the touch screen display is selected, determine at least one data field which is related to the selected data field based upon the rules defining the relationship between a plurality of data fields, generate display data for the touch screen display, the display data comprising a virtual keyboard and a contextual awareness display area, the contextual awareness display area displaying the selected field and the at least one data field which is related to the selected data, and update the selected data field based upon input from the virtual keyboard. | 1. An aircraft, comprising:
a touch screen display; a memory configured to store rules defining a relationship between a plurality of data fields; and a processor communicatively coupled to the touch screen display and the memory, the processor configured to:
determine when a data field displayed on the touch screen display is selected by a user;
determine at least one data field which is related to the selected data field based upon the rules defining the relationship between a plurality of data fields stored in the memory;
generate display data for the touch screen display, the display data comprising a virtual keyboard and a contextual awareness display area, the contextual awareness display area displaying the selected field and the at least one data field which is related to the selected data; and
update the selected data field based upon input from the virtual keyboard. 2. The aircraft of claim 1, further comprising:
a control system communicatively coupled to the processor, the control system configured to control operation of the aircraft based upon the updated selected field. 3. The aircraft of claim 1, wherein the at least one data field which is related to the selected data field varies depending upon a phase of flight of the aircraft. 4. The aircraft of claim 1, wherein when rules further define a task associated with the selected data field, the task requiring user input for at least two of the plurality of data fields. 5. The aircraft of claim 4, wherein the processor is further configured to automatically select a next data field associated with the task when the selected data field is updated based upon input from the virtual keyboard. 6. The aircraft of claim 1, wherein a background around the virtual keyboard is at least partially transparent. 7. The aircraft of claim 1, where a size of the contextual awareness display area varies depending upon a number of data fields determined to be related to the selected data field. 8. The aircraft of claim 7, where a format of the virtual keyboard varies depending upon the size of the contextual awareness display area. 9. The aircraft of claim 1, wherein the generate display data causes the determined at least data field which is related to the selected data field to scroll across the contextual awareness display area when a number of the determined at least data field which is related to the selected data field is greater than a predetermined threshold. 10. The aircraft of claim 1, wherein the at least one data field which is related to the selected data field is not displayed on the touch screen display prior to the selected data field being selected. 11. A method of operating a contextual awareness system for an aircraft, comprising:
generating, by a processor, contextual awareness display data for the contextual awareness system and outputting the contextual awareness display data to a touch screen display, the contextual awareness display data comprising a plurality of data fields; receiving, by the processor, input selecting one of the plurality of data fields from the touch screen display; determining, by the processor, at least one related data field to the selected one of the plurality of data fields based upon a chunking rule associated with the selected one of the plurality of data fields; generating, by the processor, updated contextual awareness display data for the contextual awareness system and outputting the updated contextual awareness display data to the touch screen display, the updated contextual awareness display data comprising a virtual keyboard and a contextual awareness display area, the contextual awareness display area displaying the selected one of the plurality of data fields and the at least related data field to the selected one of the plurality of data field; and updating the selected data field based upon input to the virtual keyboard. 12. The method of claim 11, further comprising controlling, by a control system communicatively coupled to the processor, an operation of the aircraft based upon the updated selected field. 13. The method of claim 11, wherein the at least one related data field to the selected one of the plurality of data fields varies depending upon a phase of flight of the aircraft. 14. The method of claim 11, wherein when chunking rule further defines a task associated with the selected one of the plurality of data fields, the task requiring user input for at least two of the plurality of data fields. 15. The method of claim 14, further comprising automatically selecting a next data field associated with the task when the selected one of the plurality of data fields is updated based upon input from the virtual keyboard. 16. The method of claim 11, wherein a background around the virtual keyboard is at least partially transparent. 17. The method of claim 11, where a size of the contextual awareness display area varies depending upon a number of related data fields determined to the selected one of the plurality of data fields. 18. The method of claim 17, where a format of the virtual keyboard varies depending upon the size of the contextual awareness display area. 19. The method of claim 11, wherein the updated contextual awareness display data causes the at least one related data field to the selected one of the plurality of data fields to scroll across the contextual awareness display area when a number of the related data field to the selected one of the plurality of data fields is greater than a predetermined threshold. 20. The method of claim 11, wherein at least one related data field to the selected one of the plurality of data fields is not displayed on the touch screen display prior to the selected one of the plurality of data fields being selected. | A contextual awareness system for an aircraft and a method from controlling the same are provided. The aircraft, for example, may include, but is not limited to, a touch screen display, a memory configured to store rules defining a relationship between a plurality of data fields, and a processor configured to determine when a data field displayed on the touch screen display is selected, determine at least one data field which is related to the selected data field based upon the rules defining the relationship between a plurality of data fields, generate display data for the touch screen display, the display data comprising a virtual keyboard and a contextual awareness display area, the contextual awareness display area displaying the selected field and the at least one data field which is related to the selected data, and update the selected data field based upon input from the virtual keyboard.1. An aircraft, comprising:
a touch screen display; a memory configured to store rules defining a relationship between a plurality of data fields; and a processor communicatively coupled to the touch screen display and the memory, the processor configured to:
determine when a data field displayed on the touch screen display is selected by a user;
determine at least one data field which is related to the selected data field based upon the rules defining the relationship between a plurality of data fields stored in the memory;
generate display data for the touch screen display, the display data comprising a virtual keyboard and a contextual awareness display area, the contextual awareness display area displaying the selected field and the at least one data field which is related to the selected data; and
update the selected data field based upon input from the virtual keyboard. 2. The aircraft of claim 1, further comprising:
a control system communicatively coupled to the processor, the control system configured to control operation of the aircraft based upon the updated selected field. 3. The aircraft of claim 1, wherein the at least one data field which is related to the selected data field varies depending upon a phase of flight of the aircraft. 4. The aircraft of claim 1, wherein when rules further define a task associated with the selected data field, the task requiring user input for at least two of the plurality of data fields. 5. The aircraft of claim 4, wherein the processor is further configured to automatically select a next data field associated with the task when the selected data field is updated based upon input from the virtual keyboard. 6. The aircraft of claim 1, wherein a background around the virtual keyboard is at least partially transparent. 7. The aircraft of claim 1, where a size of the contextual awareness display area varies depending upon a number of data fields determined to be related to the selected data field. 8. The aircraft of claim 7, where a format of the virtual keyboard varies depending upon the size of the contextual awareness display area. 9. The aircraft of claim 1, wherein the generate display data causes the determined at least data field which is related to the selected data field to scroll across the contextual awareness display area when a number of the determined at least data field which is related to the selected data field is greater than a predetermined threshold. 10. The aircraft of claim 1, wherein the at least one data field which is related to the selected data field is not displayed on the touch screen display prior to the selected data field being selected. 11. A method of operating a contextual awareness system for an aircraft, comprising:
generating, by a processor, contextual awareness display data for the contextual awareness system and outputting the contextual awareness display data to a touch screen display, the contextual awareness display data comprising a plurality of data fields; receiving, by the processor, input selecting one of the plurality of data fields from the touch screen display; determining, by the processor, at least one related data field to the selected one of the plurality of data fields based upon a chunking rule associated with the selected one of the plurality of data fields; generating, by the processor, updated contextual awareness display data for the contextual awareness system and outputting the updated contextual awareness display data to the touch screen display, the updated contextual awareness display data comprising a virtual keyboard and a contextual awareness display area, the contextual awareness display area displaying the selected one of the plurality of data fields and the at least related data field to the selected one of the plurality of data field; and updating the selected data field based upon input to the virtual keyboard. 12. The method of claim 11, further comprising controlling, by a control system communicatively coupled to the processor, an operation of the aircraft based upon the updated selected field. 13. The method of claim 11, wherein the at least one related data field to the selected one of the plurality of data fields varies depending upon a phase of flight of the aircraft. 14. The method of claim 11, wherein when chunking rule further defines a task associated with the selected one of the plurality of data fields, the task requiring user input for at least two of the plurality of data fields. 15. The method of claim 14, further comprising automatically selecting a next data field associated with the task when the selected one of the plurality of data fields is updated based upon input from the virtual keyboard. 16. The method of claim 11, wherein a background around the virtual keyboard is at least partially transparent. 17. The method of claim 11, where a size of the contextual awareness display area varies depending upon a number of related data fields determined to the selected one of the plurality of data fields. 18. The method of claim 17, where a format of the virtual keyboard varies depending upon the size of the contextual awareness display area. 19. The method of claim 11, wherein the updated contextual awareness display data causes the at least one related data field to the selected one of the plurality of data fields to scroll across the contextual awareness display area when a number of the related data field to the selected one of the plurality of data fields is greater than a predetermined threshold. 20. The method of claim 11, wherein at least one related data field to the selected one of the plurality of data fields is not displayed on the touch screen display prior to the selected one of the plurality of data fields being selected. | 2,100 |
6,731 | 6,731 | 14,989,654 | 2,164 | Emails can be recovered in a quick and granular fashion by restoring an EDB within an emulated Exchange server environment and then creating a full-text index for each mailbox in the restored EDB. The full-text index could then be employed to perform searches for particular emails thereby leveraging the granular search capabilities that the full-text index provides. Any emails that are identified by searching the full-text index can then be retrieved from the restored EDB in the emulated Exchange environment and populated into the production Exchange environment. In this way, a user can restore specific emails to the production environment in a quick and efficient manner. | 1. A method for restoring emails comprising:
creating an emulated Exchange environment that emulates a production Exchange environment; restoring an EDB to the emulated Exchange environment from a backup that was created from an EDB in the production Exchange environment; creating a full-text index for each of a number of mailboxes in the EDB that was restored to the emulated Exchange environment; retrieving a particular email from the EDB that was restored to the emulated Exchange environment; and restoring the particular email to the production Exchange environment. 2. The method of claim 1, further comprising:
querying at least one of the full-text indexes to produce a result set; and obtaining an identifier of the particular email from the result set, wherein the particular email is retrieved using the identifier. 3. The method of claim 1, wherein creating a full-text index for each of a number of mailboxes in the EDB that was restored to the emulated Exchange environment comprises:
for each of the number of mailboxes, accessing the EDB to retrieve each email in the mailbox, at least some of the emails including content that is not formatted as plain text; for each accessed email:
converting content of the email that is not formatted as plain text into plain text;
creating an indexing request that identifies a full-text index corresponding to the mailbox and that includes the content of the email in plain text format; and
submitting the indexing request to cause the content of the email to be stored in the full-text index. 4. The method of claim 3, wherein the content that is not formatted as plain text comprises a body of the email. 5. The method of claim 3, wherein the content that is not formatted as plain text comprises an attachment of the email. 6. The method of claim 3, wherein the content of the email is included in the indexing request as name/value pairs. 7. The method of claim 6, wherein the name/value pairs include an identifier of the email that is employed within the EDB to uniquely identify the email within the EDB. 8. The method of claim 7, wherein the particular email is retrieved from the EDB using the identifier. 9. The method of claim 6, wherein, for any email that includes an attachment, the indexing request is structured to cause the content of the attachment to be stored separately from but hierarchically associated with the content of the email. 10. A recovery manager for restoring emails comprising:
an emulated Exchange environment that emulates a production Exchange environment and that is configured to interface with a data protection server to cause a backup of the production Exchange environment to be restored into the emulated Exchange environment, the backup including an EDB; an indexing component configured to generate full-text indexes for mailboxes contained within the EDB once the EDB is restored into the emulated Exchange environment; and a recovery console configured to query the full-text indexes to identify particular emails, to obtain the particular emails from the EDB in the emulated Exchange environment, and to restore the particular emails obtained from the EDB in the emulated Exchange environment into an EDB in the production Exchange environment. 11. The recovery manager of claim 10 wherein the recovery console obtains the particular emails by employing identifiers of the particular emails that were obtained from the full-text indexes. 12. The recovery manager of claim 10, wherein generating full-text indexes comprises converting non-plain-text portions of emails or attachments into plain text. 13. The recovery manager of claim 10, wherein generating full-text indexes comprises submitting indexing requests that include content of emails in name/value pairs. 14. The recovery manager of claim 13, wherein the name/value pairs include a pair for a body of an email with the content of the body in plain text format and a pair for content of an attachment with the content of the attachment in plain text format. 15. The recovery manager of claim 14, wherein the name/value pairs include a pair for an identifier of an email that is employed within the EDB to uniquely identify the email. 16. The recovery manager of claim 15, wherein querying the full-text indexes to identify particular emails comprises retrieving the identifiers of the particular emails from corresponding name/value pairs, and wherein obtaining the particular emails from the EDB in the emulated Exchange environment comprises specifying the identifiers of the particular emails in one or more calls to an API for accessing the EDB. 17. The recovery manager of claim 10, wherein the indexing component comprises:
a database worker pool that is configured to launch a number of database mailbox enumerators, each database mailbox enumerator being configured to employ a database controller to access a particular mailbox within the EDB to retrieve emails from the particular mailbox, each database mailbox enumerator being further configured to convert each email into email data that is in plain text format; and an index writer pool that is configured to launch a number of index writers, each index writer being configured to receive the email data from a corresponding database mailbox enumerator and to generate one or more indexing requests for storing the email data in a corresponding full-text index. 18. A method for enabling individual emails to be restored, the method comprising:
creating an emulated Exchange environment that emulates a production Exchange environment; restoring an EDB to the emulated Exchange environment from a backup that was created from an EDB in the production Exchange environment; retrieving, from each of a plurality of mailboxes stored in the EDB restored to the emulated Exchange environment, each email stored in the mailbox; converting content of a body or of an attachment of at least some of the emails into a plain text format; for each mailbox, generating one or more indexing requests for storing the emails of the mailbox in a full-text index, the one or more indexing requests including content of the emails represented as name/value pairs where the value of each name/value pair is in plain text format; and submitting the one or more indexing requests for each mailbox to thereby cause a full-text index to be created for each mailbox. 19. The method of claim 18, further comprising:
receiving a request to query at least one full-text index; and returning results of the query, the results including an identifier employed within the EDB to uniquely identify a particular email. 20. The method of claim 19, further comprising:
employing the identifier to retrieve the particular email from the EDB in the emulated Exchange environment; and restoring the particular email to an EDB in the production Exchange environment. | Emails can be recovered in a quick and granular fashion by restoring an EDB within an emulated Exchange server environment and then creating a full-text index for each mailbox in the restored EDB. The full-text index could then be employed to perform searches for particular emails thereby leveraging the granular search capabilities that the full-text index provides. Any emails that are identified by searching the full-text index can then be retrieved from the restored EDB in the emulated Exchange environment and populated into the production Exchange environment. In this way, a user can restore specific emails to the production environment in a quick and efficient manner.1. A method for restoring emails comprising:
creating an emulated Exchange environment that emulates a production Exchange environment; restoring an EDB to the emulated Exchange environment from a backup that was created from an EDB in the production Exchange environment; creating a full-text index for each of a number of mailboxes in the EDB that was restored to the emulated Exchange environment; retrieving a particular email from the EDB that was restored to the emulated Exchange environment; and restoring the particular email to the production Exchange environment. 2. The method of claim 1, further comprising:
querying at least one of the full-text indexes to produce a result set; and obtaining an identifier of the particular email from the result set, wherein the particular email is retrieved using the identifier. 3. The method of claim 1, wherein creating a full-text index for each of a number of mailboxes in the EDB that was restored to the emulated Exchange environment comprises:
for each of the number of mailboxes, accessing the EDB to retrieve each email in the mailbox, at least some of the emails including content that is not formatted as plain text; for each accessed email:
converting content of the email that is not formatted as plain text into plain text;
creating an indexing request that identifies a full-text index corresponding to the mailbox and that includes the content of the email in plain text format; and
submitting the indexing request to cause the content of the email to be stored in the full-text index. 4. The method of claim 3, wherein the content that is not formatted as plain text comprises a body of the email. 5. The method of claim 3, wherein the content that is not formatted as plain text comprises an attachment of the email. 6. The method of claim 3, wherein the content of the email is included in the indexing request as name/value pairs. 7. The method of claim 6, wherein the name/value pairs include an identifier of the email that is employed within the EDB to uniquely identify the email within the EDB. 8. The method of claim 7, wherein the particular email is retrieved from the EDB using the identifier. 9. The method of claim 6, wherein, for any email that includes an attachment, the indexing request is structured to cause the content of the attachment to be stored separately from but hierarchically associated with the content of the email. 10. A recovery manager for restoring emails comprising:
an emulated Exchange environment that emulates a production Exchange environment and that is configured to interface with a data protection server to cause a backup of the production Exchange environment to be restored into the emulated Exchange environment, the backup including an EDB; an indexing component configured to generate full-text indexes for mailboxes contained within the EDB once the EDB is restored into the emulated Exchange environment; and a recovery console configured to query the full-text indexes to identify particular emails, to obtain the particular emails from the EDB in the emulated Exchange environment, and to restore the particular emails obtained from the EDB in the emulated Exchange environment into an EDB in the production Exchange environment. 11. The recovery manager of claim 10 wherein the recovery console obtains the particular emails by employing identifiers of the particular emails that were obtained from the full-text indexes. 12. The recovery manager of claim 10, wherein generating full-text indexes comprises converting non-plain-text portions of emails or attachments into plain text. 13. The recovery manager of claim 10, wherein generating full-text indexes comprises submitting indexing requests that include content of emails in name/value pairs. 14. The recovery manager of claim 13, wherein the name/value pairs include a pair for a body of an email with the content of the body in plain text format and a pair for content of an attachment with the content of the attachment in plain text format. 15. The recovery manager of claim 14, wherein the name/value pairs include a pair for an identifier of an email that is employed within the EDB to uniquely identify the email. 16. The recovery manager of claim 15, wherein querying the full-text indexes to identify particular emails comprises retrieving the identifiers of the particular emails from corresponding name/value pairs, and wherein obtaining the particular emails from the EDB in the emulated Exchange environment comprises specifying the identifiers of the particular emails in one or more calls to an API for accessing the EDB. 17. The recovery manager of claim 10, wherein the indexing component comprises:
a database worker pool that is configured to launch a number of database mailbox enumerators, each database mailbox enumerator being configured to employ a database controller to access a particular mailbox within the EDB to retrieve emails from the particular mailbox, each database mailbox enumerator being further configured to convert each email into email data that is in plain text format; and an index writer pool that is configured to launch a number of index writers, each index writer being configured to receive the email data from a corresponding database mailbox enumerator and to generate one or more indexing requests for storing the email data in a corresponding full-text index. 18. A method for enabling individual emails to be restored, the method comprising:
creating an emulated Exchange environment that emulates a production Exchange environment; restoring an EDB to the emulated Exchange environment from a backup that was created from an EDB in the production Exchange environment; retrieving, from each of a plurality of mailboxes stored in the EDB restored to the emulated Exchange environment, each email stored in the mailbox; converting content of a body or of an attachment of at least some of the emails into a plain text format; for each mailbox, generating one or more indexing requests for storing the emails of the mailbox in a full-text index, the one or more indexing requests including content of the emails represented as name/value pairs where the value of each name/value pair is in plain text format; and submitting the one or more indexing requests for each mailbox to thereby cause a full-text index to be created for each mailbox. 19. The method of claim 18, further comprising:
receiving a request to query at least one full-text index; and returning results of the query, the results including an identifier employed within the EDB to uniquely identify a particular email. 20. The method of claim 19, further comprising:
employing the identifier to retrieve the particular email from the EDB in the emulated Exchange environment; and restoring the particular email to an EDB in the production Exchange environment. | 2,100 |
6,732 | 6,732 | 13,468,128 | 2,193 | Dependency information corresponding to an artifact can be generated. In response to the generation of the dependency information, information version information is generated for the dependency corresponding to that of the artifact. In response to the update of the artifact, the dependency information corresponding to the artifact is updated. In response to the update of the dependency information, new version information is assigned to the updated dependency information, such that the new version information corresponds to the version information of the updated artifact. | 1. An apparatus comprising:
an information-generating unit configured to generate dependency information corresponding to an artifact; a version-generating unit configured to, in response to the generation of the dependency information, generate for the dependency information version information corresponding to that of the artifact; an information-updating unit configured to, in response to the update of the artifact, update the dependency information corresponding to the artifact; and a version-updating unit configured to, in response to the update of the dependency information, assign new version information to the updated dependency information, such that the new version information corresponds to the version information of the updated artifact. 2. The apparatus according to claim 1, wherein the information-generating unit is configured to generate dependency information by the way selected from one or more of the following:
static scanning; program compilation; and dynamic scanning. 3. The apparatus according to claim 1, wherein the version-generating unit is configured to regard the generated dependency information as an artifact, and generate version information for the dependency information according to the creation manner of the artifact version information. 4. The apparatus according to claim 1, wherein the version-generating unit is configured to generate version information for the dependency information in a different way than that of the creation of the artifact version information. 5. The apparatus according to claim 1, wherein the information-updating unit is configured to detect the update of the artifact by the way selected from one or more of the following items:
detecting the operation on interactive interfaces; detecting the change of the version information of the artifact; scanning the artifact regularly; and receiving reports of changes. 6. The apparatus according to claim 1, wherein the information-updating unit is configured to reanalyze the updated artifact, and regenerate dependency information as the updated dependency information. 7. The apparatus according to claim 1, wherein the information-updating unit is configured to obtain a part of the artifact which is different before and after the update, and revise the dependency information based on the differential part, thereby obtaining the updated dependency information. 8. The apparatus according to claim 1, wherein the information-updating unit comprises:
a check-out module configured to, in response to the check-out of the artifact, check-out the dependency information corresponding to the artifact;
an update module, configured to, based on the updated artifact, update the dependency information; and
a check-in module configured to, in response to the check-in of the updated artifact, check-in the updated dependency information. 9. The apparatus according to claim 1, wherein the information-updating unit comprises:
a check-out module configured to, in response to the check-out of the artifact, check-out the dependency information corresponding to the artifact; and an update-check-in module configured to, in response to the check-in of the updated artifact, update the corresponding dependency information based on the updated artifact, and check-in the updated dependency information. 10. The apparatus according to claim 9, wherein the version-updating unit is configured to, in response to the check-in of the dependency information, update the version information of the dependency information according to the manner for updating the artifact version information. 11. The apparatus according to claim 1, further comprising a query unit, configured to query about dependency information of artifacts in response to the request from users, wherein the request from users comprises a direct query request and/or a nested query request. 12. A method comprising:
generating dependency information corresponding to an artifact; in response to the generation of the dependency information, generating for the dependency information version information corresponding to that of the artifact; in response to the update of the artifact, updating the dependency information corresponding to the artifact; and in response to the update of the dependency information, assigning new version information to the updated dependency information, such that the new version information corresponds to the version information of the updated artifact. 13. The method according to claim 12, wherein generating dependency information corresponding to the artifact comprises generating dependency information by the way selected from one or more of the following:
static scanning; program compilation; and dynamic scanning. 14. The method according to claim 12, wherein in response to the update of the artifact, updating the dependency information corresponding to the artifact comprises detecting the update of the artifact by the way selected from one or more of the following items:
detecting the operation on interactive interfaces; detecting the change of the version information of the artifact; scanning the artifact regularly; and receiving reports of changes. 15. The method according to claim 12, wherein updating the dependency information corresponding to the artifact comprises reanalyzing the updated artifact, and regenerating dependency information as the updated dependency information. 16. The method according to claim 12, wherein updating the dependency information corresponding to the artifact comprises obtaining a part of the artifact which is different before and after the update, and revising the dependency information based on the differential part, thereby obtaining the updated dependency information. 17. The method according to claim 12, wherein in response to the update of the artifact, updating the dependency information corresponding to the artifact comprises:
in response to the check-out of the artifact, checking out the dependency information corresponding to the artifact; based on the updated artifact, updating the dependency information; and in response to the check-in of the updated artifact, checking in the updated dependency information. 18. The method according to claim 12, wherein in response to the update of the artifact, updating the dependency information corresponding to the artifact comprises:
in response to the check-out of the artifact, checking out the dependency information corresponding to the artifact; and in response to the check-in of the updated artifact, updating the corresponding dependency information based on the updated artifact, and checking in the updated dependency information. 19. The method according to claim 17, wherein assigning new version information to the updated dependency information comprises, in response to the check-in of the dependency information, updating the version information of the dependency information according to the manner for updating the artifact version information. 20. The method according to claim 12, further comprising a query step to query about dependency information of artifacts in response to the request from users, wherein the request from users comprises a direct query request and/or a nested query request. 21. A system comprising:
one or more processors, one or more computer-readable memories and one or more computer-readable, tangible storage devices; program instructions, stored on at least one of the one or more storage devices for execution by at least one of the one or more processors via at least one of the one or more memories, to generate dependency information corresponding to an artifact; program instructions, stored on at least one of the one or more storage devices for execution by at least one of the one or more processors via at least one of the one or more memories, to, in response to the generation of the dependency information, generate for the dependency information version information corresponding to that of the artifact; program instructions, stored on at least one of the one or more storage devices for execution by at least one of the one or more processors via at least one of the one or more memories, to, in response to the update of the artifact, update the dependency information corresponding to the artifact; and program instructions, stored on at least one of the one or more storage devices for execution by at least one of the one or more processors via at least one of the one or more memories, to, in response to the update of the dependency information, assign new version information to the updated dependency information, such that the new version information corresponds to the version information of the updated artifact. 22. The system according to claim 21, further comprising:
program instructions, stored on at least one of the one or more storage devices for execution by at least one of the one or more processors via at least one of the one or more memories, to, update the dependency information corresponding to the artifact by: (i) in response to the check-out of the artifact, checking out the dependency information corresponding to the artifact; (ii) based on the updated artifact, updating the dependency information; and (iii) in response to the check-in of the updated artifact, checking in the updated dependency information. 23. The system according to claim 21, further comprising:
program instructions, stored on at least one of the one or more storage devices for execution by at least one of the one or more processors via at least one of the one or more memories, to, update the dependency information corresponding to the artifact by: in response to the check-out of the artifact, checking out the dependency information corresponding to the artifact; and in response to the check-in of the updated artifact, updating the corresponding dependency information based on the updated artifact, and checking in the updated dependency information. 24. A computer program product comprising:
one or more computer-readable storage devices; program instructions, stored on at least one of the one or more storage devices, to generate dependency information corresponding to an artifact; program instructions, stored on at least one of the one or more storage devices, to, in response to the generation of the dependency information, generate for the dependency information version information corresponding to that of the artifact; program instructions, stored on at least one of the one or more storage devices, to, in response to the update of the artifact, update the dependency information corresponding to the artifact; and program instructions, stored on at least one of the one or more storage devices, to, in response to the update of the dependency information, assign new version information to the updated dependency information, such that the new version information corresponds to the version information of the updated artifact. 25. The computer program product of claim 24, wherein program instructions to update the dependency information corresponding to the artifact comprises program instructions to obtain a part of the artifact which is different before and after the update, and program instructions to revise the dependency information based on the differential part, thereby obtaining the updated dependency information. | Dependency information corresponding to an artifact can be generated. In response to the generation of the dependency information, information version information is generated for the dependency corresponding to that of the artifact. In response to the update of the artifact, the dependency information corresponding to the artifact is updated. In response to the update of the dependency information, new version information is assigned to the updated dependency information, such that the new version information corresponds to the version information of the updated artifact.1. An apparatus comprising:
an information-generating unit configured to generate dependency information corresponding to an artifact; a version-generating unit configured to, in response to the generation of the dependency information, generate for the dependency information version information corresponding to that of the artifact; an information-updating unit configured to, in response to the update of the artifact, update the dependency information corresponding to the artifact; and a version-updating unit configured to, in response to the update of the dependency information, assign new version information to the updated dependency information, such that the new version information corresponds to the version information of the updated artifact. 2. The apparatus according to claim 1, wherein the information-generating unit is configured to generate dependency information by the way selected from one or more of the following:
static scanning; program compilation; and dynamic scanning. 3. The apparatus according to claim 1, wherein the version-generating unit is configured to regard the generated dependency information as an artifact, and generate version information for the dependency information according to the creation manner of the artifact version information. 4. The apparatus according to claim 1, wherein the version-generating unit is configured to generate version information for the dependency information in a different way than that of the creation of the artifact version information. 5. The apparatus according to claim 1, wherein the information-updating unit is configured to detect the update of the artifact by the way selected from one or more of the following items:
detecting the operation on interactive interfaces; detecting the change of the version information of the artifact; scanning the artifact regularly; and receiving reports of changes. 6. The apparatus according to claim 1, wherein the information-updating unit is configured to reanalyze the updated artifact, and regenerate dependency information as the updated dependency information. 7. The apparatus according to claim 1, wherein the information-updating unit is configured to obtain a part of the artifact which is different before and after the update, and revise the dependency information based on the differential part, thereby obtaining the updated dependency information. 8. The apparatus according to claim 1, wherein the information-updating unit comprises:
a check-out module configured to, in response to the check-out of the artifact, check-out the dependency information corresponding to the artifact;
an update module, configured to, based on the updated artifact, update the dependency information; and
a check-in module configured to, in response to the check-in of the updated artifact, check-in the updated dependency information. 9. The apparatus according to claim 1, wherein the information-updating unit comprises:
a check-out module configured to, in response to the check-out of the artifact, check-out the dependency information corresponding to the artifact; and an update-check-in module configured to, in response to the check-in of the updated artifact, update the corresponding dependency information based on the updated artifact, and check-in the updated dependency information. 10. The apparatus according to claim 9, wherein the version-updating unit is configured to, in response to the check-in of the dependency information, update the version information of the dependency information according to the manner for updating the artifact version information. 11. The apparatus according to claim 1, further comprising a query unit, configured to query about dependency information of artifacts in response to the request from users, wherein the request from users comprises a direct query request and/or a nested query request. 12. A method comprising:
generating dependency information corresponding to an artifact; in response to the generation of the dependency information, generating for the dependency information version information corresponding to that of the artifact; in response to the update of the artifact, updating the dependency information corresponding to the artifact; and in response to the update of the dependency information, assigning new version information to the updated dependency information, such that the new version information corresponds to the version information of the updated artifact. 13. The method according to claim 12, wherein generating dependency information corresponding to the artifact comprises generating dependency information by the way selected from one or more of the following:
static scanning; program compilation; and dynamic scanning. 14. The method according to claim 12, wherein in response to the update of the artifact, updating the dependency information corresponding to the artifact comprises detecting the update of the artifact by the way selected from one or more of the following items:
detecting the operation on interactive interfaces; detecting the change of the version information of the artifact; scanning the artifact regularly; and receiving reports of changes. 15. The method according to claim 12, wherein updating the dependency information corresponding to the artifact comprises reanalyzing the updated artifact, and regenerating dependency information as the updated dependency information. 16. The method according to claim 12, wherein updating the dependency information corresponding to the artifact comprises obtaining a part of the artifact which is different before and after the update, and revising the dependency information based on the differential part, thereby obtaining the updated dependency information. 17. The method according to claim 12, wherein in response to the update of the artifact, updating the dependency information corresponding to the artifact comprises:
in response to the check-out of the artifact, checking out the dependency information corresponding to the artifact; based on the updated artifact, updating the dependency information; and in response to the check-in of the updated artifact, checking in the updated dependency information. 18. The method according to claim 12, wherein in response to the update of the artifact, updating the dependency information corresponding to the artifact comprises:
in response to the check-out of the artifact, checking out the dependency information corresponding to the artifact; and in response to the check-in of the updated artifact, updating the corresponding dependency information based on the updated artifact, and checking in the updated dependency information. 19. The method according to claim 17, wherein assigning new version information to the updated dependency information comprises, in response to the check-in of the dependency information, updating the version information of the dependency information according to the manner for updating the artifact version information. 20. The method according to claim 12, further comprising a query step to query about dependency information of artifacts in response to the request from users, wherein the request from users comprises a direct query request and/or a nested query request. 21. A system comprising:
one or more processors, one or more computer-readable memories and one or more computer-readable, tangible storage devices; program instructions, stored on at least one of the one or more storage devices for execution by at least one of the one or more processors via at least one of the one or more memories, to generate dependency information corresponding to an artifact; program instructions, stored on at least one of the one or more storage devices for execution by at least one of the one or more processors via at least one of the one or more memories, to, in response to the generation of the dependency information, generate for the dependency information version information corresponding to that of the artifact; program instructions, stored on at least one of the one or more storage devices for execution by at least one of the one or more processors via at least one of the one or more memories, to, in response to the update of the artifact, update the dependency information corresponding to the artifact; and program instructions, stored on at least one of the one or more storage devices for execution by at least one of the one or more processors via at least one of the one or more memories, to, in response to the update of the dependency information, assign new version information to the updated dependency information, such that the new version information corresponds to the version information of the updated artifact. 22. The system according to claim 21, further comprising:
program instructions, stored on at least one of the one or more storage devices for execution by at least one of the one or more processors via at least one of the one or more memories, to, update the dependency information corresponding to the artifact by: (i) in response to the check-out of the artifact, checking out the dependency information corresponding to the artifact; (ii) based on the updated artifact, updating the dependency information; and (iii) in response to the check-in of the updated artifact, checking in the updated dependency information. 23. The system according to claim 21, further comprising:
program instructions, stored on at least one of the one or more storage devices for execution by at least one of the one or more processors via at least one of the one or more memories, to, update the dependency information corresponding to the artifact by: in response to the check-out of the artifact, checking out the dependency information corresponding to the artifact; and in response to the check-in of the updated artifact, updating the corresponding dependency information based on the updated artifact, and checking in the updated dependency information. 24. A computer program product comprising:
one or more computer-readable storage devices; program instructions, stored on at least one of the one or more storage devices, to generate dependency information corresponding to an artifact; program instructions, stored on at least one of the one or more storage devices, to, in response to the generation of the dependency information, generate for the dependency information version information corresponding to that of the artifact; program instructions, stored on at least one of the one or more storage devices, to, in response to the update of the artifact, update the dependency information corresponding to the artifact; and program instructions, stored on at least one of the one or more storage devices, to, in response to the update of the dependency information, assign new version information to the updated dependency information, such that the new version information corresponds to the version information of the updated artifact. 25. The computer program product of claim 24, wherein program instructions to update the dependency information corresponding to the artifact comprises program instructions to obtain a part of the artifact which is different before and after the update, and program instructions to revise the dependency information based on the differential part, thereby obtaining the updated dependency information. | 2,100 |
6,733 | 6,733 | 15,593,729 | 2,186 | A data processing apparatus 2 includes a plurality of power domains controlled by respective power control signals PCS. Power control circuitry 22 includes mapping circuitry which maps a plurality of power status signals PSS indicative of the power status of respective power domains, and received from those power domains, to form the power control signals which are then supplied power domains. The mapping circuitry may be controlled by mapping parameters stored within a memory mapped array. The mapping parameters may specify that a given power control signal is either sensitive or insensitive to the power status of a particular other power domain within the data processing apparatus 2 . The mapping parameters may be fixed or software programmable. | 1. Power control circuitry for controlling power supplied to a plurality of power domains within a processing apparatus, said power control circuitry comprising:
mapping circuitry to map a plurality of power status signals indicative of power status of respective power domains within said plurality of power domains to a plurality of power control signals to control power status of respective power domains within said plurality of power domains. 2. Power control circuitry as claimed in claim 1, wherein said mapping circuitry is responsive to a plurality of mapping parameters specifying relationships between said plurality of power status signals and said plurality of power control signals. 3. Power control circuitry as claimed in claim 2, wherein said relationships specified by respective values of said mapping parameters specify one or more of:
a given power control signal is independent of a given power status signal; said given power control signal has a given control signal value when said given power status signal has a given status signal value; and said given power control signal has a given control value dependent upon a limit of values among a given plurality of said power status signals. 4. Power control circuitry as claimed in claim 2, wherein one or more of said plurality of mapping parameters are software programmable. 5. Power control circuitry as claimed in claim 2, wherein one or more of said plurality of mapping parameters are fixed. 6. Power control circuitry as claimed in claim 2, wherein said plurality of mapping parameters are accessible as memory mapped values within a memory address space of a data processing apparatus. 7. Power control circuitry as claimed in claim 2, wherein said plurality of mapping parameters correspond to an array of mapping parameters. 8. Power control circuitry as claimed in claim 7, wherein within said array of mapping parameters said plurality of power status signals corresponds to one of rows of said array or columns of said array and said plurality of power control signals to another of said rows of said array or said columns of said array. 9. Power control circuitry as claimed in claim 1, wherein a target power control signal generated by said mapping circuitry for a target power domain of said plurality of power domains indicates that said target power domain should be in an active state if any one of one or more of said power status signals upon which said target power control signal depends indicates that respective corresponding power domains are in an active state. 10. Power control circuitry as claimed in claim 9, wherein said active state is powered to perform data processing operations. 11. Power control circuitry as claimed in claim 1, wherein a target power control signal generated by said mapping circuitry for a target power domain of said plurality of power domains indicates that said target power domain should be in an inactive state if all of one or more of said power status signals upon which said target power control signal depends indicates that respective corresponding power domains are in an inactive state. 12. Power control circuitry as claimed in claim 9, wherein said inactive state is one of unpowered or in a data retention state to retain state and unable to perform data processing operations. 13. Power control circuitry as claimed in claim 2, wherein said mapping circuitry comprises combinatorial logic circuitry for generating respective ones of said plurality of power control signals in dependence upon logical combinations of one or more of said plurality of power status signals and said plurality of mapping parameters. 14. Power control circuitry as claimed in claim 1, wherein said plurality of mapping parameters include at least one self-controlling parameter to permit specifying a relationship whereby a power control signal for a given power domain within said plurality of power domains is dependent upon a power status signal of said given power domain. 15. Power control circuitry as claimed in claim 14, wherein, when said power status signal of said given power domain indicates that said given power domain is powered to perform data processing and self-controlling parameter for said given power domain has a first value, said power control signal for said given power domain controls said given power domain to remain powered until said self-controlling parameter for said given power domain is changed from said first value. 16. Power control circuitry as claimed in claim 14, wherein said at least one self-controlling parameter is software programmable. 17. Power control circuitry as claimed in claim 1, wherein said plurality of power control signals comprise a plurality of wake up signals to signal corresponding ones of said plurality of power domains to perform a power state transition. 18. An integrated circuit comprising power control circuitry as claimed in claim 1, wherein said plurality of power domains comprise functional blocks within said integrated circuit. 19. An integrated circuit as claimed in claim 18, wherein said functional blocks comprise one or more of:
a general purpose processor; a graphics processor; a cryptographic processor; a direct memory access unit; a memory; and an input/output interface. 20. Power control circuitry for controlling power supplied to a plurality of power domains within a processing apparatus, said power control circuitry comprising:
mapping means for mapping a plurality of power status signals indicative of power status of respective power domains within said plurality of power domains to a plurality of power control signals to control power status of respective power domains within said plurality of power domains. 21. A method of controlling power supplied to a plurality of power domains within a processing apparatus, said method comprising:
mapping with mapping circuitry a plurality of power status signals indicative of power status of respective power domains within said plurality of power domains to a plurality of power control signals to control power status of respective power domains within said plurality of power domains. | A data processing apparatus 2 includes a plurality of power domains controlled by respective power control signals PCS. Power control circuitry 22 includes mapping circuitry which maps a plurality of power status signals PSS indicative of the power status of respective power domains, and received from those power domains, to form the power control signals which are then supplied power domains. The mapping circuitry may be controlled by mapping parameters stored within a memory mapped array. The mapping parameters may specify that a given power control signal is either sensitive or insensitive to the power status of a particular other power domain within the data processing apparatus 2 . The mapping parameters may be fixed or software programmable.1. Power control circuitry for controlling power supplied to a plurality of power domains within a processing apparatus, said power control circuitry comprising:
mapping circuitry to map a plurality of power status signals indicative of power status of respective power domains within said plurality of power domains to a plurality of power control signals to control power status of respective power domains within said plurality of power domains. 2. Power control circuitry as claimed in claim 1, wherein said mapping circuitry is responsive to a plurality of mapping parameters specifying relationships between said plurality of power status signals and said plurality of power control signals. 3. Power control circuitry as claimed in claim 2, wherein said relationships specified by respective values of said mapping parameters specify one or more of:
a given power control signal is independent of a given power status signal; said given power control signal has a given control signal value when said given power status signal has a given status signal value; and said given power control signal has a given control value dependent upon a limit of values among a given plurality of said power status signals. 4. Power control circuitry as claimed in claim 2, wherein one or more of said plurality of mapping parameters are software programmable. 5. Power control circuitry as claimed in claim 2, wherein one or more of said plurality of mapping parameters are fixed. 6. Power control circuitry as claimed in claim 2, wherein said plurality of mapping parameters are accessible as memory mapped values within a memory address space of a data processing apparatus. 7. Power control circuitry as claimed in claim 2, wherein said plurality of mapping parameters correspond to an array of mapping parameters. 8. Power control circuitry as claimed in claim 7, wherein within said array of mapping parameters said plurality of power status signals corresponds to one of rows of said array or columns of said array and said plurality of power control signals to another of said rows of said array or said columns of said array. 9. Power control circuitry as claimed in claim 1, wherein a target power control signal generated by said mapping circuitry for a target power domain of said plurality of power domains indicates that said target power domain should be in an active state if any one of one or more of said power status signals upon which said target power control signal depends indicates that respective corresponding power domains are in an active state. 10. Power control circuitry as claimed in claim 9, wherein said active state is powered to perform data processing operations. 11. Power control circuitry as claimed in claim 1, wherein a target power control signal generated by said mapping circuitry for a target power domain of said plurality of power domains indicates that said target power domain should be in an inactive state if all of one or more of said power status signals upon which said target power control signal depends indicates that respective corresponding power domains are in an inactive state. 12. Power control circuitry as claimed in claim 9, wherein said inactive state is one of unpowered or in a data retention state to retain state and unable to perform data processing operations. 13. Power control circuitry as claimed in claim 2, wherein said mapping circuitry comprises combinatorial logic circuitry for generating respective ones of said plurality of power control signals in dependence upon logical combinations of one or more of said plurality of power status signals and said plurality of mapping parameters. 14. Power control circuitry as claimed in claim 1, wherein said plurality of mapping parameters include at least one self-controlling parameter to permit specifying a relationship whereby a power control signal for a given power domain within said plurality of power domains is dependent upon a power status signal of said given power domain. 15. Power control circuitry as claimed in claim 14, wherein, when said power status signal of said given power domain indicates that said given power domain is powered to perform data processing and self-controlling parameter for said given power domain has a first value, said power control signal for said given power domain controls said given power domain to remain powered until said self-controlling parameter for said given power domain is changed from said first value. 16. Power control circuitry as claimed in claim 14, wherein said at least one self-controlling parameter is software programmable. 17. Power control circuitry as claimed in claim 1, wherein said plurality of power control signals comprise a plurality of wake up signals to signal corresponding ones of said plurality of power domains to perform a power state transition. 18. An integrated circuit comprising power control circuitry as claimed in claim 1, wherein said plurality of power domains comprise functional blocks within said integrated circuit. 19. An integrated circuit as claimed in claim 18, wherein said functional blocks comprise one or more of:
a general purpose processor; a graphics processor; a cryptographic processor; a direct memory access unit; a memory; and an input/output interface. 20. Power control circuitry for controlling power supplied to a plurality of power domains within a processing apparatus, said power control circuitry comprising:
mapping means for mapping a plurality of power status signals indicative of power status of respective power domains within said plurality of power domains to a plurality of power control signals to control power status of respective power domains within said plurality of power domains. 21. A method of controlling power supplied to a plurality of power domains within a processing apparatus, said method comprising:
mapping with mapping circuitry a plurality of power status signals indicative of power status of respective power domains within said plurality of power domains to a plurality of power control signals to control power status of respective power domains within said plurality of power domains. | 2,100 |
6,734 | 6,734 | 15,637,353 | 2,159 | The current document is directed to a resource-exchange system that facilitates resource exchange and sharing among computing facilities. The currently disclosed methods and systems employ efficient, distributed-search methods and subsystems within distributed computer systems that include large numbers of geographically distributed data centers to locate resource-provider computing facilities that match the resource needs of resource-consumer computing-facilities based on attribute values associated with the needed resources, the resource providers, and the resource consumers. The resource-exchange system organizes and tracks operations related to a resource exchange using a resource-exchange context. In one implementation, each resource-exchange context represents the stages of, and information related to, placement of one or more computational-resources-consuming entities on behalf of a resource consumer within a resource-provider computing facility and execution of the one or more computational-resources-consuming entities within the resource-provider computing facility. | 1. An automated resource-exchange system comprising:
multiple resource-provider computing facilities that each includes
multiple computers, each having one or more processors and one or more memories, and
a local cloud-exchange instance;
a resource-consumer computing facility that includes
multiple computers, each having one or more processors and one or more memories, and
a local cloud-exchange instance; and
a cloud-exchange system implemented on one or more physical computers, each including one or more processors and one or more memories, the cloud-exchange system including
a cloud-exchange engine that interoperates with the local cloud-exchange instances of the multiple resource-provider computing facilities and the resource-consumer computing facility to carry out a resource exchange by
receiving a resource-exchange request from the resource-consumer computing facility,
generating an initial set of candidate resource-provider computing facilities,
selecting a resource-provider computing facility to provide a resource requested in the resource-exchange request to the resource-consumer computing facility using a distributed-search-based auction, and
facilitating the resource exchange,
a distributed-search engine that identifies a set of one or more final candidate resource-provider computing facilities from the initial set of candidate resource-provider computing facilities, and
a resource-exchange context that stores information related to the resource exchange, including a buy policy, and that encodes a current state for the resource exchange. 2. The automated resource-exchange system of claim 1 wherein the resource requested in the resource-exchange request comprises computational resources for running one or more computational-resources-consuming entities on behalf of the resource-consumer computing facility for a specified period of time. 3. The automated resource-exchange system of claim 1 wherein the buy policy includes one or more filters that each specifies a value or range of values for a parameter associated with the resource exchange. 4. The automated resource-exchange system of claim 1 wherein the current state for the resource exchange is one of one or more states that is each included in one of three sets of states corresponding to three phases of the resource exchange, the three phases including:
a pre-auction phase;
an auction phase; and
a post-auction phase. 5. The automated resource-exchange system of claim 4 wherein, during the pre-auction phase, the local cloud-exchange instance within the resource-consumer computing facility:
assigns a buy policy to a set of one or more computational-resources-consuming entities to generate a buy-policy-associated set of one or more computational-resources-consuming entities;
activates the buy-policy-associated set of one or more computational-resources-consuming entities;
generates the resource-exchange request, the resource-exchange request containing a description of the one or more computational-resources-consuming entities and the buy policy; and
transmits the resource-exchange request to the cloud-exchange system. 6. The automated resource-exchange system of claim 4 wherein, during the pre-auction phase, the cloud-exchange system:
receives a resource-exchange request that contains a description of one or more computational-resources-consuming entities and a buy policy;
uses filters in the buy policy and resource-provider information stored within the cloud-exchange system to generate the initial set of candidate resource-provider computing facilities; and
generates an active search context to define and control a distributed-search-based auction. 7. The automated resource-exchange system of claim 4 wherein, during the auction phase, the cloud-exchange system:
initializes the active search context, including initializing a scoring function using a received buy policy;
submits the active search context to the distributed search engine, which identifies the set of one or more final candidate resource-provider computing facilities from the initial set of candidate resource-provider computing facilities; and
iteratively
selects an as yet unselected highest-scored resource-provider computing facility from the set of one or more final candidate resource-provider computing facilities, and
when the selected resource-provider is verified by the cloud-exchange system, identifies the selected resource-provider computing facility as the selected resource-provider computing facility to provide a resource requested in the resource-exchange request to the resource-consumer computing facility. 8. The automated resource-exchange system of claim 4 wherein, during the auction phase, the distributed search engine within the cloud-exchange system:
receives an active search context that includes a scoring function;
transmits bid requests to the local cloud-exchange instance in each of the candidate resource-provider computing facilities of the initial set of candidate resource-provider computing facilities; and
processes bids returned by the local cloud-exchange instances of the candidate resource-provider computing facilities in the initial set of candidate resource-provider computing facilities in response to the transmitted bid requests by using the scoring function to generate a score for each bid. 9. The automated resource-exchange system of claim 4 wherein, during the auction phase, the local cloud-exchange instances of the candidate resource-provider computing facilities in the initial set of candidate resource-provider computing facilities:
receive bid requests from the cloud-exchange system and return bids to the cloud-exchange system; and
receive information requests from the cloud-exchange system and return the requested information to the cloud-exchange system. 10. The automated resource-exchange system of claim 4 wherein, during the auction phase, the distributed search engine within the cloud-exchange system:
receives an active search context that includes a scoring function; and
processes bids automatically generated by the cloud-exchange system on behalf of the candidate resource-provider computing facilities in the initial set of candidate resource-provider computing facilities. 11. The automated resource-exchange system of claim 4 wherein, during the post-auction phase, the cloud-exchange system:
coordinates with the local cloud-exchange instance of the resource-provider computing facility selected to provide the requested resource to the resource-consumer computing facility; and
when provision of the requested resource to the resource-consumer computing facility is terminated, transmits information to a third-party financial-transaction service. 12. The automated resource-exchange system of claim 11 wherein the resource comprises computational resources for running one or more computational-resources-consuming entities on behalf of the resource-consumer computing facility for a specified period of time; and wherein provision of the requested resource to the resource-consumer computing facility comprises one of
sending information from the local cloud-exchange instance of the resource-consumer computing facility to the local cloud-exchange instance of the resource-provider computing facility selected to provide the requested resource to the resource-consumer computing facility and using the information by the selected resource-provider computing facility to build and launch execution of the one or more computational-resources-consuming entities within the selected resource-provider computing facility, and
migrating the one or more computational-resources-consuming entities from the resource-consumer computing facility to the resource-provider computing facility selected to provide the requested resource to the resource-consumer computing facility. 13. The automated resource-exchange system of claim 11 wherein provision of the requested resource to the resource-consumer computing facility is terminated by one of:
an eviction by the cloud-exchange system;
an eviction by the local cloud-exchange instance of the resource-provider computing facility selected to provide the requested resource to the resource-consumer computing facility;
an eviction by the local cloud-exchange instance of the resource-consumer computing facility;
expiration of a lease period; and
a resource-provision failure. 14. A method, carried out within an automated resource-exchange system comprising multiple resource-provider computing facilities, a resource-consumer computing facility, and a cloud-exchange system, that carries out a resource exchange in which the resource-consumer computing facility receives a resource from a resource-provider computing facility selected by the cloud-exchange system, the method comprising:
generating a resource-exchange context that stores information related to the resource exchange, including a buy policy, and that encodes a current state for the resource exchange; and controlling the resource-exchange system through a sequence of state changes, according to the resource-exchange context, to
generate a resource-exchange request by the resource-consumer computing facility;
receive, by the cloud-exchange system, the resource-exchange request from the resource-consumer computing facility,
generate, by the cloud-exchange system, an initial set of candidate resource-provider computing facilities,
select, by the cloud-exchange system, a resource-provider computing facility to provide a resource requested in the resource-exchange request to the resource-consumer computing facility using a distributed-search-based auction, and
facilitate, by the cloud-exchange system, the resource exchange. 15. The method of claim 14 wherein each of the multiple resource-provider computing facilities includes
multiple computers, each including one or more processors and one or more memories, and
a local cloud-exchange instance;
wherein the resource-consumer computing facility includes
multiple computers, each including one or more processors and one or more memories, and
a local cloud-exchange instance; and
wherein the cloud-exchange system is implemented on one or more physical computers, each including one or more processors and one or more memories and includes
a cloud-exchange engine,
a distributed-search engine that identifies a set of one or more final candidate resource-provider computing facilities from the initial set of candidate resource-provider computing facilities, and
a resource-exchange context that stores information related to the resource exchange, including a buy policy, and that encodes a current state for the resource exchange. 16. The method of claim 15 wherein the current state for the resource exchange is one of one or more states that is each included in one of three sets of states corresponding to three phases of the resource exchange, the three phases including:
a pre-auction phase;
an auction phase; and
a post-auction phase. 17. The method of claim 16 wherein, during the pre-auction phase, the local cloud-exchange instance within the resource-consumer computing facility:
assigns a buy policy to a set of one or more computational-resources-consuming entities to generate a buy-policy-associated set of one or more computational-resources-consuming entities;
activates the buy-policy-associated set of one or more computational-resources-consuming entities;
generates the resource-exchange request, the resource-exchange request containing a description of the one or more computational-resources-consuming entities and the buy policy; and
transmits the resource-exchange request to the cloud-exchange system. 18. The method of claim 16 wherein, during the pre-auction phase, the cloud-exchange system:
receives a resource-exchange request that contains a description of one or more computational-resources-consuming entities and a buy policy;
uses filters in the buy policy and resource-provider information stored within the cloud-exchange system to generate the initial set of candidate resource-provider computing facilities; and
generates an active search context to define a distributed-search-based auction. 19. The method of claim 16 wherein, during the auction phase, the cloud-exchange system:
initializes the active search context, including initializing a scoring function using a received buy policy;
submits the active search context to the distributed search engine, which identifies the set of one or more final candidate resource-provider computing facilities from the initial set of candidate resource-provider computing facilities; and
iteratively
selects an as yet unselected highest-scored resource-provider computing facility from the set of one or more final candidate resource-provider computing facilities, and
when the selected resource-provider is verified by the cloud-exchange system, identifies the selected resource-provider computing facility as the selected resource-provider computing facility to provide a resource requested in the resource-exchange request to the resource-consumer computing facility. 20. The method of claim 16 wherein, during the post-auction phase, the cloud-exchange system:
coordinates with the local cloud-exchange instance of the resource-provider computing facility selected to provide the requested resource to the resource-consumer computing facility; and
when provision of the requested resource to the resource-consumer computing facility is terminated, transmits information to a third-party financial-transaction service. 21. The method of claim 20 wherein the resource comprises computational resources for running one or more computational-resources-consuming entities on behalf of the resource-consumer computing facility for a specified period of time; and wherein provision of the requested resource to the resource-consumer computing facility comprises one of
sending information from the local cloud-exchange instance of the resource-consumer computing facility to the local cloud-exchange instance of the resource-provider computing facility selected to provide the requested resource to the resource-consumer computing facility and using the information by the selected resource-provider computing facility to build and launch execution of the one or more computational-resources-consuming entities within the selected resource-provider computing facility, and
migrating the one or more computational-resources-consuming entities from the resource-consumer computing facility to the resource-provider computing facility selected to provide the requested resource to the resource-consumer computing facility. 22. The method of claim 20 wherein provision of the requested resource to the resource-consumer computing facility is terminated by one of:
an eviction by the cloud-exchange system;
an eviction by the local cloud-exchange instance of the resource-provider computing facility selected to provide the requested resource to the resource-consumer computing facility;
an eviction by the local cloud-exchange instance of the resource-consumer computing facility;
expiration of a lease period; and
a resource-provision failure. 23. The method of claim 22 wherein the resource comprises computational resources for running one or more computational-resources-consuming entities on behalf of the resource-consumer computing facility for a specified period of time; wherein provision of the requested resource to the resource-consumer computing facility comprises one of
sending information from the local cloud-exchange instance of the resource-consumer computing facility to the local cloud-exchange instance of the resource-provider computing facility selected to provide the requested resource to the resource-consumer computing facility and using the information by the selected resource-provider computing facility to build and launch execution of the one or more computational-resources-consuming entities within the selected resource-provider computing facility, and
migrating the one or more computational-resources-consuming entities from the resource-consumer computing facility to the resource-provider computing facility selected to provide the requested resource to the resource-consumer computing facility; and
wherein, following termination of provision of the requested resource to the resource-consumer computing facility, the one or more computational-resources-consuming entities migrate back to the resource consumer for inclusion in a new resource-exchange request sent by the resource-consumer computing facility to the cloud-exchange system. 24. A physical data-storage device encoded with computer instructions that, when executed by processors with an automated resource-exchange system comprising multiple resource-provider computing facilities, a resource-consumer computing facility, and a cloud-exchange system, that carries out a resource exchange in which the resource-consumer computing facility receives a resource from a resource-provider computing facility selected by the cloud-exchange system, control the automated resource-exchange system to:
generate a resource-exchange context that stores information related to the resource exchange, including a buy policy, and that encodes a current state for the resource exchange; generate a resource-exchange request by the resource-consumer computing facility; receive, by the cloud-exchange system, the resource-exchange request from the resource-consumer computing facility, generate, by the cloud-exchange system, an initial set of candidate resource-provider computing facilities, select, by the cloud-exchange system, a resource-provider computing facility to provide a resource requested in the resource-exchange request to the resource-consumer computing facility using a distributed-search-based auction, and facilitate, by the cloud-exchange system, the resource exchange. | The current document is directed to a resource-exchange system that facilitates resource exchange and sharing among computing facilities. The currently disclosed methods and systems employ efficient, distributed-search methods and subsystems within distributed computer systems that include large numbers of geographically distributed data centers to locate resource-provider computing facilities that match the resource needs of resource-consumer computing-facilities based on attribute values associated with the needed resources, the resource providers, and the resource consumers. The resource-exchange system organizes and tracks operations related to a resource exchange using a resource-exchange context. In one implementation, each resource-exchange context represents the stages of, and information related to, placement of one or more computational-resources-consuming entities on behalf of a resource consumer within a resource-provider computing facility and execution of the one or more computational-resources-consuming entities within the resource-provider computing facility.1. An automated resource-exchange system comprising:
multiple resource-provider computing facilities that each includes
multiple computers, each having one or more processors and one or more memories, and
a local cloud-exchange instance;
a resource-consumer computing facility that includes
multiple computers, each having one or more processors and one or more memories, and
a local cloud-exchange instance; and
a cloud-exchange system implemented on one or more physical computers, each including one or more processors and one or more memories, the cloud-exchange system including
a cloud-exchange engine that interoperates with the local cloud-exchange instances of the multiple resource-provider computing facilities and the resource-consumer computing facility to carry out a resource exchange by
receiving a resource-exchange request from the resource-consumer computing facility,
generating an initial set of candidate resource-provider computing facilities,
selecting a resource-provider computing facility to provide a resource requested in the resource-exchange request to the resource-consumer computing facility using a distributed-search-based auction, and
facilitating the resource exchange,
a distributed-search engine that identifies a set of one or more final candidate resource-provider computing facilities from the initial set of candidate resource-provider computing facilities, and
a resource-exchange context that stores information related to the resource exchange, including a buy policy, and that encodes a current state for the resource exchange. 2. The automated resource-exchange system of claim 1 wherein the resource requested in the resource-exchange request comprises computational resources for running one or more computational-resources-consuming entities on behalf of the resource-consumer computing facility for a specified period of time. 3. The automated resource-exchange system of claim 1 wherein the buy policy includes one or more filters that each specifies a value or range of values for a parameter associated with the resource exchange. 4. The automated resource-exchange system of claim 1 wherein the current state for the resource exchange is one of one or more states that is each included in one of three sets of states corresponding to three phases of the resource exchange, the three phases including:
a pre-auction phase;
an auction phase; and
a post-auction phase. 5. The automated resource-exchange system of claim 4 wherein, during the pre-auction phase, the local cloud-exchange instance within the resource-consumer computing facility:
assigns a buy policy to a set of one or more computational-resources-consuming entities to generate a buy-policy-associated set of one or more computational-resources-consuming entities;
activates the buy-policy-associated set of one or more computational-resources-consuming entities;
generates the resource-exchange request, the resource-exchange request containing a description of the one or more computational-resources-consuming entities and the buy policy; and
transmits the resource-exchange request to the cloud-exchange system. 6. The automated resource-exchange system of claim 4 wherein, during the pre-auction phase, the cloud-exchange system:
receives a resource-exchange request that contains a description of one or more computational-resources-consuming entities and a buy policy;
uses filters in the buy policy and resource-provider information stored within the cloud-exchange system to generate the initial set of candidate resource-provider computing facilities; and
generates an active search context to define and control a distributed-search-based auction. 7. The automated resource-exchange system of claim 4 wherein, during the auction phase, the cloud-exchange system:
initializes the active search context, including initializing a scoring function using a received buy policy;
submits the active search context to the distributed search engine, which identifies the set of one or more final candidate resource-provider computing facilities from the initial set of candidate resource-provider computing facilities; and
iteratively
selects an as yet unselected highest-scored resource-provider computing facility from the set of one or more final candidate resource-provider computing facilities, and
when the selected resource-provider is verified by the cloud-exchange system, identifies the selected resource-provider computing facility as the selected resource-provider computing facility to provide a resource requested in the resource-exchange request to the resource-consumer computing facility. 8. The automated resource-exchange system of claim 4 wherein, during the auction phase, the distributed search engine within the cloud-exchange system:
receives an active search context that includes a scoring function;
transmits bid requests to the local cloud-exchange instance in each of the candidate resource-provider computing facilities of the initial set of candidate resource-provider computing facilities; and
processes bids returned by the local cloud-exchange instances of the candidate resource-provider computing facilities in the initial set of candidate resource-provider computing facilities in response to the transmitted bid requests by using the scoring function to generate a score for each bid. 9. The automated resource-exchange system of claim 4 wherein, during the auction phase, the local cloud-exchange instances of the candidate resource-provider computing facilities in the initial set of candidate resource-provider computing facilities:
receive bid requests from the cloud-exchange system and return bids to the cloud-exchange system; and
receive information requests from the cloud-exchange system and return the requested information to the cloud-exchange system. 10. The automated resource-exchange system of claim 4 wherein, during the auction phase, the distributed search engine within the cloud-exchange system:
receives an active search context that includes a scoring function; and
processes bids automatically generated by the cloud-exchange system on behalf of the candidate resource-provider computing facilities in the initial set of candidate resource-provider computing facilities. 11. The automated resource-exchange system of claim 4 wherein, during the post-auction phase, the cloud-exchange system:
coordinates with the local cloud-exchange instance of the resource-provider computing facility selected to provide the requested resource to the resource-consumer computing facility; and
when provision of the requested resource to the resource-consumer computing facility is terminated, transmits information to a third-party financial-transaction service. 12. The automated resource-exchange system of claim 11 wherein the resource comprises computational resources for running one or more computational-resources-consuming entities on behalf of the resource-consumer computing facility for a specified period of time; and wherein provision of the requested resource to the resource-consumer computing facility comprises one of
sending information from the local cloud-exchange instance of the resource-consumer computing facility to the local cloud-exchange instance of the resource-provider computing facility selected to provide the requested resource to the resource-consumer computing facility and using the information by the selected resource-provider computing facility to build and launch execution of the one or more computational-resources-consuming entities within the selected resource-provider computing facility, and
migrating the one or more computational-resources-consuming entities from the resource-consumer computing facility to the resource-provider computing facility selected to provide the requested resource to the resource-consumer computing facility. 13. The automated resource-exchange system of claim 11 wherein provision of the requested resource to the resource-consumer computing facility is terminated by one of:
an eviction by the cloud-exchange system;
an eviction by the local cloud-exchange instance of the resource-provider computing facility selected to provide the requested resource to the resource-consumer computing facility;
an eviction by the local cloud-exchange instance of the resource-consumer computing facility;
expiration of a lease period; and
a resource-provision failure. 14. A method, carried out within an automated resource-exchange system comprising multiple resource-provider computing facilities, a resource-consumer computing facility, and a cloud-exchange system, that carries out a resource exchange in which the resource-consumer computing facility receives a resource from a resource-provider computing facility selected by the cloud-exchange system, the method comprising:
generating a resource-exchange context that stores information related to the resource exchange, including a buy policy, and that encodes a current state for the resource exchange; and controlling the resource-exchange system through a sequence of state changes, according to the resource-exchange context, to
generate a resource-exchange request by the resource-consumer computing facility;
receive, by the cloud-exchange system, the resource-exchange request from the resource-consumer computing facility,
generate, by the cloud-exchange system, an initial set of candidate resource-provider computing facilities,
select, by the cloud-exchange system, a resource-provider computing facility to provide a resource requested in the resource-exchange request to the resource-consumer computing facility using a distributed-search-based auction, and
facilitate, by the cloud-exchange system, the resource exchange. 15. The method of claim 14 wherein each of the multiple resource-provider computing facilities includes
multiple computers, each including one or more processors and one or more memories, and
a local cloud-exchange instance;
wherein the resource-consumer computing facility includes
multiple computers, each including one or more processors and one or more memories, and
a local cloud-exchange instance; and
wherein the cloud-exchange system is implemented on one or more physical computers, each including one or more processors and one or more memories and includes
a cloud-exchange engine,
a distributed-search engine that identifies a set of one or more final candidate resource-provider computing facilities from the initial set of candidate resource-provider computing facilities, and
a resource-exchange context that stores information related to the resource exchange, including a buy policy, and that encodes a current state for the resource exchange. 16. The method of claim 15 wherein the current state for the resource exchange is one of one or more states that is each included in one of three sets of states corresponding to three phases of the resource exchange, the three phases including:
a pre-auction phase;
an auction phase; and
a post-auction phase. 17. The method of claim 16 wherein, during the pre-auction phase, the local cloud-exchange instance within the resource-consumer computing facility:
assigns a buy policy to a set of one or more computational-resources-consuming entities to generate a buy-policy-associated set of one or more computational-resources-consuming entities;
activates the buy-policy-associated set of one or more computational-resources-consuming entities;
generates the resource-exchange request, the resource-exchange request containing a description of the one or more computational-resources-consuming entities and the buy policy; and
transmits the resource-exchange request to the cloud-exchange system. 18. The method of claim 16 wherein, during the pre-auction phase, the cloud-exchange system:
receives a resource-exchange request that contains a description of one or more computational-resources-consuming entities and a buy policy;
uses filters in the buy policy and resource-provider information stored within the cloud-exchange system to generate the initial set of candidate resource-provider computing facilities; and
generates an active search context to define a distributed-search-based auction. 19. The method of claim 16 wherein, during the auction phase, the cloud-exchange system:
initializes the active search context, including initializing a scoring function using a received buy policy;
submits the active search context to the distributed search engine, which identifies the set of one or more final candidate resource-provider computing facilities from the initial set of candidate resource-provider computing facilities; and
iteratively
selects an as yet unselected highest-scored resource-provider computing facility from the set of one or more final candidate resource-provider computing facilities, and
when the selected resource-provider is verified by the cloud-exchange system, identifies the selected resource-provider computing facility as the selected resource-provider computing facility to provide a resource requested in the resource-exchange request to the resource-consumer computing facility. 20. The method of claim 16 wherein, during the post-auction phase, the cloud-exchange system:
coordinates with the local cloud-exchange instance of the resource-provider computing facility selected to provide the requested resource to the resource-consumer computing facility; and
when provision of the requested resource to the resource-consumer computing facility is terminated, transmits information to a third-party financial-transaction service. 21. The method of claim 20 wherein the resource comprises computational resources for running one or more computational-resources-consuming entities on behalf of the resource-consumer computing facility for a specified period of time; and wherein provision of the requested resource to the resource-consumer computing facility comprises one of
sending information from the local cloud-exchange instance of the resource-consumer computing facility to the local cloud-exchange instance of the resource-provider computing facility selected to provide the requested resource to the resource-consumer computing facility and using the information by the selected resource-provider computing facility to build and launch execution of the one or more computational-resources-consuming entities within the selected resource-provider computing facility, and
migrating the one or more computational-resources-consuming entities from the resource-consumer computing facility to the resource-provider computing facility selected to provide the requested resource to the resource-consumer computing facility. 22. The method of claim 20 wherein provision of the requested resource to the resource-consumer computing facility is terminated by one of:
an eviction by the cloud-exchange system;
an eviction by the local cloud-exchange instance of the resource-provider computing facility selected to provide the requested resource to the resource-consumer computing facility;
an eviction by the local cloud-exchange instance of the resource-consumer computing facility;
expiration of a lease period; and
a resource-provision failure. 23. The method of claim 22 wherein the resource comprises computational resources for running one or more computational-resources-consuming entities on behalf of the resource-consumer computing facility for a specified period of time; wherein provision of the requested resource to the resource-consumer computing facility comprises one of
sending information from the local cloud-exchange instance of the resource-consumer computing facility to the local cloud-exchange instance of the resource-provider computing facility selected to provide the requested resource to the resource-consumer computing facility and using the information by the selected resource-provider computing facility to build and launch execution of the one or more computational-resources-consuming entities within the selected resource-provider computing facility, and
migrating the one or more computational-resources-consuming entities from the resource-consumer computing facility to the resource-provider computing facility selected to provide the requested resource to the resource-consumer computing facility; and
wherein, following termination of provision of the requested resource to the resource-consumer computing facility, the one or more computational-resources-consuming entities migrate back to the resource consumer for inclusion in a new resource-exchange request sent by the resource-consumer computing facility to the cloud-exchange system. 24. A physical data-storage device encoded with computer instructions that, when executed by processors with an automated resource-exchange system comprising multiple resource-provider computing facilities, a resource-consumer computing facility, and a cloud-exchange system, that carries out a resource exchange in which the resource-consumer computing facility receives a resource from a resource-provider computing facility selected by the cloud-exchange system, control the automated resource-exchange system to:
generate a resource-exchange context that stores information related to the resource exchange, including a buy policy, and that encodes a current state for the resource exchange; generate a resource-exchange request by the resource-consumer computing facility; receive, by the cloud-exchange system, the resource-exchange request from the resource-consumer computing facility, generate, by the cloud-exchange system, an initial set of candidate resource-provider computing facilities, select, by the cloud-exchange system, a resource-provider computing facility to provide a resource requested in the resource-exchange request to the resource-consumer computing facility using a distributed-search-based auction, and facilitate, by the cloud-exchange system, the resource exchange. | 2,100 |
6,735 | 6,735 | 13,200,898 | 2,484 | A video recording and playback network comprises a video source, a plurality of recorders, a local server, and a client device. The plurality of recorders records video from the video source. The local server generates a playlist comprising one or more ordered video segments which together cover a desired time range. The playlist associates one of the plurality of recorders with each video segment. The client device plays back video according to the playlist by streaming each video segment, in sequence, from the associated recorder. | 1. A video recording and playback network comprising:
a video source; a plurality of recorders which record video from the video source; a local server which generates a playlist comprising one or more ordered video segments which together cover a desired time range, said playlist associating one of the plurality of recorders with each video segment. a client device which plays back video according to the playlist by streaming each video segment, in sequence, from the associated recorder. 2. The video recording and playback network of claim 1, wherein the local server generates the playlist by selecting the highest quality video available from any of the plurality of recorders at each time over the desired time range. 3. The video recording and playback network of claim 2, wherein the selected video is the video with the highest resolution. 4. The video recording and playback network of claim 2, wherein the selected video is the video with the highest frame rate. 5. The video recording and playback network of claim 2, wherein the local server secondarily selects video to minimize recorder load. 6. The video recording and playback network of claim 2, wherein the local server secondarily maximizes the length of each video segment. 7. The video recording and playback network of claim 1, wherein the playlist provides start and stop times and configuration information for each video segment. 8. The video recording and playback network of claim 7, wherein the configuration information for each video segment includes codec information or vendor-specific information for the one of the plurality of recorders associated with the video segment. 9. The video recording and playback network of claim 8, wherein the plurality of recorders records video in a plurality of mutually incompatible formats. 10. A system for merging multiple recorded video timelines, the system comprising:
a plurality of recorders which record video from a common video source; a local server which assembles a playlist of one or more ordered video segments selected to provide the highest video quality from video available from the plurality of recorders, each video segment having a start time and a stop time, and specifying one of the plurality of recorders from which to stream video between the start time and the stop time; and a client device which streams video from the playlist, the client device comprising:
a plurality of session drivers, each capable of processing video from one or more of the recorders; and
a device manager which selects one of the plurality of session drivers for each video segment on the playlist. 11. The system of claim 10, wherein each of the session drivers is associated with at least one of the plurality of recorders. 12. The system of claim 10, wherein the local server includes a library of recorders which associates each recorder with a specific video source. 13. The system of claim 12, wherein the library also associates each recorder with a location, and wherein the local server prefers recorders at closer locations when assembling the playlist. 14. The system of claim 10, wherein the playlist includes configuration options associated with each video segment and used by the plurality of session drivers. 15. The system of claim 14, wherein the configuration options include playback frame rate and vendor-specific information specific to the specified recorder. 16. A video processing server running a software video processing method, the software video processing method comprising:
receiving a digital playlist request from a client device, the digital playlist request specifying a video source and a time range; querying each of a plurality of video recorders for a video status indicating the availability from each recorder of video footage from the specified video source and time range; and assembling, based on the video status, an ordered digital playlist configured for streaming and playback by the client device, the ordered digital playlist identifying one or more video segments from the specified video source via the plurality of recorders, the one or more video segments together covering the specified time range. 17. The method of claim 16, wherein the ordered digital playlist is assembled by selecting the highest quality video available from any of the plurality of digital video recorders, at each time. 18. The method of claim 16, wherein the video status is a digital message indicating whether the digital video recorder has video available for the specified time range, and if so, the frame rate and resolution of the available video. 19. The method of claim 16, wherein the playlist comprises a start and stop time and configuration settings for each video segment. 20. A video client device running a software video playback method, the software video playback method comprising:
transmitting a digital playlist request to a video server, the playlist request specifying a video source and a time range; receiving an ordered digital playlist from the video server, the ordered digital playlist identifying one or more video segments each having a start time, a stop time, and a specified recorder, such that the video segments together provide the specified time range from the specified video source; streaming each video segment in sequence from its specified recorder; and rendering each video segment at a client-side monitor as it is streamed. 21. The method of claim 20, wherein streaming each video segment comprises:
selecting a session driver based on the associated recorder; providing the session driver with the start and stop time and configuration settings for the video segment; and retrieving and processing video from the start time to the stop time from the associated recorder, using the configuration settings. | A video recording and playback network comprises a video source, a plurality of recorders, a local server, and a client device. The plurality of recorders records video from the video source. The local server generates a playlist comprising one or more ordered video segments which together cover a desired time range. The playlist associates one of the plurality of recorders with each video segment. The client device plays back video according to the playlist by streaming each video segment, in sequence, from the associated recorder.1. A video recording and playback network comprising:
a video source; a plurality of recorders which record video from the video source; a local server which generates a playlist comprising one or more ordered video segments which together cover a desired time range, said playlist associating one of the plurality of recorders with each video segment. a client device which plays back video according to the playlist by streaming each video segment, in sequence, from the associated recorder. 2. The video recording and playback network of claim 1, wherein the local server generates the playlist by selecting the highest quality video available from any of the plurality of recorders at each time over the desired time range. 3. The video recording and playback network of claim 2, wherein the selected video is the video with the highest resolution. 4. The video recording and playback network of claim 2, wherein the selected video is the video with the highest frame rate. 5. The video recording and playback network of claim 2, wherein the local server secondarily selects video to minimize recorder load. 6. The video recording and playback network of claim 2, wherein the local server secondarily maximizes the length of each video segment. 7. The video recording and playback network of claim 1, wherein the playlist provides start and stop times and configuration information for each video segment. 8. The video recording and playback network of claim 7, wherein the configuration information for each video segment includes codec information or vendor-specific information for the one of the plurality of recorders associated with the video segment. 9. The video recording and playback network of claim 8, wherein the plurality of recorders records video in a plurality of mutually incompatible formats. 10. A system for merging multiple recorded video timelines, the system comprising:
a plurality of recorders which record video from a common video source; a local server which assembles a playlist of one or more ordered video segments selected to provide the highest video quality from video available from the plurality of recorders, each video segment having a start time and a stop time, and specifying one of the plurality of recorders from which to stream video between the start time and the stop time; and a client device which streams video from the playlist, the client device comprising:
a plurality of session drivers, each capable of processing video from one or more of the recorders; and
a device manager which selects one of the plurality of session drivers for each video segment on the playlist. 11. The system of claim 10, wherein each of the session drivers is associated with at least one of the plurality of recorders. 12. The system of claim 10, wherein the local server includes a library of recorders which associates each recorder with a specific video source. 13. The system of claim 12, wherein the library also associates each recorder with a location, and wherein the local server prefers recorders at closer locations when assembling the playlist. 14. The system of claim 10, wherein the playlist includes configuration options associated with each video segment and used by the plurality of session drivers. 15. The system of claim 14, wherein the configuration options include playback frame rate and vendor-specific information specific to the specified recorder. 16. A video processing server running a software video processing method, the software video processing method comprising:
receiving a digital playlist request from a client device, the digital playlist request specifying a video source and a time range; querying each of a plurality of video recorders for a video status indicating the availability from each recorder of video footage from the specified video source and time range; and assembling, based on the video status, an ordered digital playlist configured for streaming and playback by the client device, the ordered digital playlist identifying one or more video segments from the specified video source via the plurality of recorders, the one or more video segments together covering the specified time range. 17. The method of claim 16, wherein the ordered digital playlist is assembled by selecting the highest quality video available from any of the plurality of digital video recorders, at each time. 18. The method of claim 16, wherein the video status is a digital message indicating whether the digital video recorder has video available for the specified time range, and if so, the frame rate and resolution of the available video. 19. The method of claim 16, wherein the playlist comprises a start and stop time and configuration settings for each video segment. 20. A video client device running a software video playback method, the software video playback method comprising:
transmitting a digital playlist request to a video server, the playlist request specifying a video source and a time range; receiving an ordered digital playlist from the video server, the ordered digital playlist identifying one or more video segments each having a start time, a stop time, and a specified recorder, such that the video segments together provide the specified time range from the specified video source; streaming each video segment in sequence from its specified recorder; and rendering each video segment at a client-side monitor as it is streamed. 21. The method of claim 20, wherein streaming each video segment comprises:
selecting a session driver based on the associated recorder; providing the session driver with the start and stop time and configuration settings for the video segment; and retrieving and processing video from the start time to the stop time from the associated recorder, using the configuration settings. | 2,400 |
6,736 | 6,736 | 13,817,077 | 2,412 | The present invention provides a method and apparatus for use in non-adaptive retransmission. The method comprises: configuring an uplink UL demodulation reference signal DM-RS for retransmission in response to a retransmission request. In one embodiment, the demodulation reference signal DM-RS is configured to be the same as a demodulation reference signal for an initial transmission. In another embodiment, the demodulation reference signal DM-RS is configured with respect to the number of layer(s) for retransmission according to predetermined rules for the initial transmission. | 1. A method for use in non-adaptive retransmission, the method comprising:
configuring an uplink UL demodulation reference signal DM-RS for retransmission in response to a retransmission request. 2. The method according to claim 1, wherein said configuring comprises: configuring the demodulation reference signal DM-RS to be the same as a demodulation reference signal for an initial transmission. 3. The method according to claim 1, wherein said configuring comprises: configuring the demodulation reference signal DM-RS with respect to a transmission situation in retransmission according to predetermined rules for the initial transmission. 4. The method according to claim 3, wherein the transmission situation in the retransmission comprises the number of layers for retransmission. 5. The method according to claim 2, further comprising:
receiving a cyclic shift indicator CSI in downlink control information DCI, the cyclic shift indicator CSI indicating the configuration of the demodulation reference signal of the first layer for initial transmission; and deriving the configuration of demodulation reference signal of remaining layer(s) for the initial transmission according to the predetermined rules for the initial transmission based on the received cyclic shift indicator CSI. 6. The method according to claim 4, further comprising:
receiving a cyclic shift indicator CSI in a downlink control information DCI, the cyclic shift indicator CSI indicating the configuration of the demodulation reference signal of the first layer for initial transmission; wherein said configuring further comprises: deriving the configuration of demodulation reference signal of layer(s) for the retransmission with respect to the number of layer(s) for retransmission according to the predetermined rules for the initial transmission, based on the received cyclic shift indicator CSI. 7. The method according to claim 1, wherein said configuring comprises: configuring a cyclic shift CS and an orthogonal cover code OCC of the demodulation reference signal DM-RS. 8. An apparatus for use in non-adaptive retransmission, comprising:
configuration means for configuring an uplink UL demodulation reference signal DM-RS for retransmission in response to a retransmission request. 9. The apparatus according to claim 8, wherein the configuration means is used to configure the demodulation reference signal DM-RS to be the same as a demodulation reference signal for an initial transmission. 10. The apparatus according to claim 8, wherein the configuration means is used to configure the demodulation reference signal DM-RS with respect to the transmission situation in retransmission according to predetermined rules for the initial transmission. 11. The apparatus according to claim 10, wherein the transmission situation in the retransmission comprises the number of layers for retransmission. 12. The apparatus according to claim 9, further comprising:
receiving means for receiving a cyclic shift indicator CSI in downlink control information DCI, the cyclic shift indicator CSI indicating configuration of the demodulation reference signal of the first layer for initial transmission; and the configuration means is further used to derive the configuration of demodulation reference signal of remaining layer(s) for the initial transmission according to the predetermined rules for the initial transmission, based on the received cyclic shift indicator CSI. 13. The apparatus according to claim 11, further comprising:
receiving means for receiving a cyclic shift indicator CSI in downlink control information DCI, the cyclic shift indicator CSI indicating the configuration of the demodulation reference signal of the first layer for initial transmission; wherein said configuration means is further used to: derive the configuration of demodulation reference signal of layer(s) for the retransmission with respect to the number of layer(s) for retransmission according to the predetermined rules for the initial transmission, based on the received cyclic shift indicator CSI. 14. The apparatus according to claim 8, wherein said configuration means is used to configure a cyclic shift CS and an orthogonal cover code OCC of the demodulation reference signal DM-RS. | The present invention provides a method and apparatus for use in non-adaptive retransmission. The method comprises: configuring an uplink UL demodulation reference signal DM-RS for retransmission in response to a retransmission request. In one embodiment, the demodulation reference signal DM-RS is configured to be the same as a demodulation reference signal for an initial transmission. In another embodiment, the demodulation reference signal DM-RS is configured with respect to the number of layer(s) for retransmission according to predetermined rules for the initial transmission.1. A method for use in non-adaptive retransmission, the method comprising:
configuring an uplink UL demodulation reference signal DM-RS for retransmission in response to a retransmission request. 2. The method according to claim 1, wherein said configuring comprises: configuring the demodulation reference signal DM-RS to be the same as a demodulation reference signal for an initial transmission. 3. The method according to claim 1, wherein said configuring comprises: configuring the demodulation reference signal DM-RS with respect to a transmission situation in retransmission according to predetermined rules for the initial transmission. 4. The method according to claim 3, wherein the transmission situation in the retransmission comprises the number of layers for retransmission. 5. The method according to claim 2, further comprising:
receiving a cyclic shift indicator CSI in downlink control information DCI, the cyclic shift indicator CSI indicating the configuration of the demodulation reference signal of the first layer for initial transmission; and deriving the configuration of demodulation reference signal of remaining layer(s) for the initial transmission according to the predetermined rules for the initial transmission based on the received cyclic shift indicator CSI. 6. The method according to claim 4, further comprising:
receiving a cyclic shift indicator CSI in a downlink control information DCI, the cyclic shift indicator CSI indicating the configuration of the demodulation reference signal of the first layer for initial transmission; wherein said configuring further comprises: deriving the configuration of demodulation reference signal of layer(s) for the retransmission with respect to the number of layer(s) for retransmission according to the predetermined rules for the initial transmission, based on the received cyclic shift indicator CSI. 7. The method according to claim 1, wherein said configuring comprises: configuring a cyclic shift CS and an orthogonal cover code OCC of the demodulation reference signal DM-RS. 8. An apparatus for use in non-adaptive retransmission, comprising:
configuration means for configuring an uplink UL demodulation reference signal DM-RS for retransmission in response to a retransmission request. 9. The apparatus according to claim 8, wherein the configuration means is used to configure the demodulation reference signal DM-RS to be the same as a demodulation reference signal for an initial transmission. 10. The apparatus according to claim 8, wherein the configuration means is used to configure the demodulation reference signal DM-RS with respect to the transmission situation in retransmission according to predetermined rules for the initial transmission. 11. The apparatus according to claim 10, wherein the transmission situation in the retransmission comprises the number of layers for retransmission. 12. The apparatus according to claim 9, further comprising:
receiving means for receiving a cyclic shift indicator CSI in downlink control information DCI, the cyclic shift indicator CSI indicating configuration of the demodulation reference signal of the first layer for initial transmission; and the configuration means is further used to derive the configuration of demodulation reference signal of remaining layer(s) for the initial transmission according to the predetermined rules for the initial transmission, based on the received cyclic shift indicator CSI. 13. The apparatus according to claim 11, further comprising:
receiving means for receiving a cyclic shift indicator CSI in downlink control information DCI, the cyclic shift indicator CSI indicating the configuration of the demodulation reference signal of the first layer for initial transmission; wherein said configuration means is further used to: derive the configuration of demodulation reference signal of layer(s) for the retransmission with respect to the number of layer(s) for retransmission according to the predetermined rules for the initial transmission, based on the received cyclic shift indicator CSI. 14. The apparatus according to claim 8, wherein said configuration means is used to configure a cyclic shift CS and an orthogonal cover code OCC of the demodulation reference signal DM-RS. | 2,400 |
6,737 | 6,737 | 14,128,166 | 2,425 | The present invention is directed to playing an alternative pre-stored content in place of a particular type of content received by the player within a transport stream comprising a plurality of types of content. The invention can be useful in providing targeted advertising, where, when combined with profiling techniques, alternative content of interest to a viewer can be substituted in the transport stream in place of the received content. According to other embodiments of the present invention, computing resources and communication bandwidth use can be saved by playing pre-stored content instead of the received content. Embodiments of the present invention provide for the maintenance of the pre-stored material by storing appropriate content as it is received in the transport stream or by deleting pre-stored content when deemed appropriate to do so. An embodiment of the present invention may be deployed in a personal video player/recorder. | 1. A method for processing a transport stream including content of a first type, content of a second type, and a piece of metadata comprising switching information associated with the content of the second type using a media player, the method comprising:
analyzing the switching information using a conditional access module of the media player at least to determine whether or not the switching information comprises information to switch to the alternative content, the media player further comprising a storage device for storing at least one alternative content and a presentation module to present the processed transport stream; if the switching information corresponds to the alternative content, then replacing the content of the second type by at least part of the alternative content; if the switching information does not correspond to the alternative content, then further processing the content of the second type. 2. The method according to claim 1, wherein the replacing of the content of the second type by the alternative content includes:
selecting the alternative content based on a comparison between a viewer profile and a content description associated with the alternative content. 3. The method according to claim 1, wherein further processing of the content of the second type includes storing the content of the second type in the alternative content memory. 4. The method according to claim I, wherein further processing of the content of the second type includes:
comparing a viewer profile and a content description associated with the alternative content; and based on the comparison of the viewer profile and the content description, storing the selected content of the second type in the alternative content memory. 5. The method according to claim 1, wherein each alternative content is associated with a unique identifier and the piece of metadata is a piece of program specific information, and the switching information is an encrypted tag, the encrypted tag comprising a unique identifier of the content of the second type, the analysis of the switching information including:
decrypting the encrypted tag using the conditional access module to get the unique identifier of the content of the second type; and selecting the alternative content whose unique identifier matches the unique identifier of the content of the second type. 6. The method according to claim 5, wherein the encrypted tag further comprises a flag, the flag indicating that a content immediately following the content of the first type is the content of the second type, the method further comprising replacing the content of the second type by the selected alternative content. 7. The method according to claim 5, wherein the encrypted tag further comprises:
a flag, the flag indicating that a content following the content of the first type is a content of the second type; and a repeat index indicating a time when the content of the second type is to be presented; the method further comprising replacing the content of the second type by the selected alternative content at the time indicated by the repeat index. 8. The method according to claim 1, wherein the piece of metadata is an electronic control message comprising the switching information. 9. The method according to claim 8, wherein the switching information comprises a release command, the method further comprising terminating the replacement of the content of the second type. 10. A media player for processing a transport stream, the media player comprising:
an input for receiving a digital media transmission from a content source, the digital media transmission comprising content of a first type, and content of a second type having a unique identifier, and a piece of metadata associated with the content of the second type; a conditional access module; a storage medium; and a presentation module to present the processed transport stream; wherein said media player is configured to perform the method according to claim 1. 11. A media player for processing a transport stream, the media player comprising:
an input for receiving a digital media transmission from a content source, the digital media transmission comprising content of a first type, content of a second type having a unique identifier, and a piece of metadata associated with the content of the second type; a conditional access module; a storage medium; and a presentation module to present the processed transport stream; wherein said media player is configured to perform the method according to claim 2. 12. A media player for processing a transport stream, the media player comprising:
an input for receiving a digital media transmission from a content source, the digital media transmission comprising content of a first type, content of a second type having a unique identifier, and a piece of metadata associated with the content of the second type; a conditional access module; a storage medium; and a presentation module to present the processed transport stream; wherein said media player is configured to perform the method according to claim 3. 13. A media player for processing a transport stream, the media player comprising:
an input for receiving a digital media transmission from a content source, the digital media transmission comprising content of a first type, content of a second type having a unique identifier, and a piece of metadata associated with the content of the second type; a conditional access module; a storage medium; and a presentation module to present the processed transport stream; wherein said media player is configured to perform the method according to claim 4. 14. A media player for processing a transport stream, the media player comprising:
an input for receiving a digital media transmission from a content source, the digital media transmission comprising content of a first type, content of a second type having a unique identifier, and a piece of metadata associated with the content of the second type; a conditional access module; a storage medium; and a presentation module to present the processed transport stream; wherein said media player is configured to perform the method according to claim 5. 15. A media player for processing a transport stream, the media player comprising:
an input for receiving a digital media transmission from a content source, the digital media transmission comprising content of a first type, content of a second type having a unique identifier, and a piece of metadata associated with the content of the second type; a conditional access module; a storage medium; and a presentation module to present the processed transport stream; wherein said media player is configured to perform the method according to claim 6. 16. A media player for processing a transport stream, the media player comprising:
an input for receiving a digital media transmission from a content source, the digital media transmission comprising content of a first type, content of a second type having a unique identifier, and a piece of metadata associated with the content of the second type; a conditional access module; a storage medium; and a presentation module to present the processed transport stream; wherein said media player is configured to perform the method according to claim 7. 17. A media player for processing a transport stream, the media player comprising:
an input for receiving a digital media transmission from a content source, the digital media transmission comprising content of a first type, content of a second type having a unique identifier, and a piece of metadata associated with the content of the second type; a conditional access module; a storage medium; and a presentation module to present the processed transport stream; wherein said media player is configured to perform the method according to claim 8. 18. A media player for processing a transport stream, the media player comprising:
an input for receiving a digital media transmission from a content source, the digital media transmission comprising content of a first type, content of a second type having a unique identifier, and a piece of metadata associated with the content of the second type; a conditional access module; a storage medium; and a presentation module to present the processed transport stream; wherein said media player is configured to perform the method according to claim 9. | The present invention is directed to playing an alternative pre-stored content in place of a particular type of content received by the player within a transport stream comprising a plurality of types of content. The invention can be useful in providing targeted advertising, where, when combined with profiling techniques, alternative content of interest to a viewer can be substituted in the transport stream in place of the received content. According to other embodiments of the present invention, computing resources and communication bandwidth use can be saved by playing pre-stored content instead of the received content. Embodiments of the present invention provide for the maintenance of the pre-stored material by storing appropriate content as it is received in the transport stream or by deleting pre-stored content when deemed appropriate to do so. An embodiment of the present invention may be deployed in a personal video player/recorder.1. A method for processing a transport stream including content of a first type, content of a second type, and a piece of metadata comprising switching information associated with the content of the second type using a media player, the method comprising:
analyzing the switching information using a conditional access module of the media player at least to determine whether or not the switching information comprises information to switch to the alternative content, the media player further comprising a storage device for storing at least one alternative content and a presentation module to present the processed transport stream; if the switching information corresponds to the alternative content, then replacing the content of the second type by at least part of the alternative content; if the switching information does not correspond to the alternative content, then further processing the content of the second type. 2. The method according to claim 1, wherein the replacing of the content of the second type by the alternative content includes:
selecting the alternative content based on a comparison between a viewer profile and a content description associated with the alternative content. 3. The method according to claim 1, wherein further processing of the content of the second type includes storing the content of the second type in the alternative content memory. 4. The method according to claim I, wherein further processing of the content of the second type includes:
comparing a viewer profile and a content description associated with the alternative content; and based on the comparison of the viewer profile and the content description, storing the selected content of the second type in the alternative content memory. 5. The method according to claim 1, wherein each alternative content is associated with a unique identifier and the piece of metadata is a piece of program specific information, and the switching information is an encrypted tag, the encrypted tag comprising a unique identifier of the content of the second type, the analysis of the switching information including:
decrypting the encrypted tag using the conditional access module to get the unique identifier of the content of the second type; and selecting the alternative content whose unique identifier matches the unique identifier of the content of the second type. 6. The method according to claim 5, wherein the encrypted tag further comprises a flag, the flag indicating that a content immediately following the content of the first type is the content of the second type, the method further comprising replacing the content of the second type by the selected alternative content. 7. The method according to claim 5, wherein the encrypted tag further comprises:
a flag, the flag indicating that a content following the content of the first type is a content of the second type; and a repeat index indicating a time when the content of the second type is to be presented; the method further comprising replacing the content of the second type by the selected alternative content at the time indicated by the repeat index. 8. The method according to claim 1, wherein the piece of metadata is an electronic control message comprising the switching information. 9. The method according to claim 8, wherein the switching information comprises a release command, the method further comprising terminating the replacement of the content of the second type. 10. A media player for processing a transport stream, the media player comprising:
an input for receiving a digital media transmission from a content source, the digital media transmission comprising content of a first type, and content of a second type having a unique identifier, and a piece of metadata associated with the content of the second type; a conditional access module; a storage medium; and a presentation module to present the processed transport stream; wherein said media player is configured to perform the method according to claim 1. 11. A media player for processing a transport stream, the media player comprising:
an input for receiving a digital media transmission from a content source, the digital media transmission comprising content of a first type, content of a second type having a unique identifier, and a piece of metadata associated with the content of the second type; a conditional access module; a storage medium; and a presentation module to present the processed transport stream; wherein said media player is configured to perform the method according to claim 2. 12. A media player for processing a transport stream, the media player comprising:
an input for receiving a digital media transmission from a content source, the digital media transmission comprising content of a first type, content of a second type having a unique identifier, and a piece of metadata associated with the content of the second type; a conditional access module; a storage medium; and a presentation module to present the processed transport stream; wherein said media player is configured to perform the method according to claim 3. 13. A media player for processing a transport stream, the media player comprising:
an input for receiving a digital media transmission from a content source, the digital media transmission comprising content of a first type, content of a second type having a unique identifier, and a piece of metadata associated with the content of the second type; a conditional access module; a storage medium; and a presentation module to present the processed transport stream; wherein said media player is configured to perform the method according to claim 4. 14. A media player for processing a transport stream, the media player comprising:
an input for receiving a digital media transmission from a content source, the digital media transmission comprising content of a first type, content of a second type having a unique identifier, and a piece of metadata associated with the content of the second type; a conditional access module; a storage medium; and a presentation module to present the processed transport stream; wherein said media player is configured to perform the method according to claim 5. 15. A media player for processing a transport stream, the media player comprising:
an input for receiving a digital media transmission from a content source, the digital media transmission comprising content of a first type, content of a second type having a unique identifier, and a piece of metadata associated with the content of the second type; a conditional access module; a storage medium; and a presentation module to present the processed transport stream; wherein said media player is configured to perform the method according to claim 6. 16. A media player for processing a transport stream, the media player comprising:
an input for receiving a digital media transmission from a content source, the digital media transmission comprising content of a first type, content of a second type having a unique identifier, and a piece of metadata associated with the content of the second type; a conditional access module; a storage medium; and a presentation module to present the processed transport stream; wherein said media player is configured to perform the method according to claim 7. 17. A media player for processing a transport stream, the media player comprising:
an input for receiving a digital media transmission from a content source, the digital media transmission comprising content of a first type, content of a second type having a unique identifier, and a piece of metadata associated with the content of the second type; a conditional access module; a storage medium; and a presentation module to present the processed transport stream; wherein said media player is configured to perform the method according to claim 8. 18. A media player for processing a transport stream, the media player comprising:
an input for receiving a digital media transmission from a content source, the digital media transmission comprising content of a first type, content of a second type having a unique identifier, and a piece of metadata associated with the content of the second type; a conditional access module; a storage medium; and a presentation module to present the processed transport stream; wherein said media player is configured to perform the method according to claim 9. | 2,400 |
6,738 | 6,738 | 14,587,197 | 2,462 | A telecommunications system includes a network device that receives a data signal over a first communication network and in accordance with a first communication protocol. The network device generates an acknowledgement command for a remote device to transmit an acknowledgement signal over a second communication network and in accordance with a second communication protocol. The acknowledgement signal acknowledges receipt of the data signal at the network device. | 1. A telecommunications system comprising:
a network device programmed to receive a data signal over a first communication network and in accordance with a first communication protocol, wherein the network device is programmed to generate an acknowledgement command for a remote device to transmit an acknowledgement signal over a second communication network and in accordance with a second communication protocol, wherein the acknowledgement signal acknowledges receipt of the data signal at the network device. 2. The telecommunications system of claim 1, wherein the first communication network includes a satellite communication network and wherein the second communication network includes a cellular communication network. 3. The telecommunications system of claim 1, wherein the network device is programmed to parse the data signal and determine whether the data signal was transmitted in accordance with the first communication protocol. 4. The telecommunications system of claim 3, wherein the network device is programmed to generate the acknowledgement command if the data signal was transmitted in accordance with the first communication protocol. 5. The telecommunications system of claim 1, wherein network device is programmed to pair with the remote device. 6. The telecommunications system of claim 5, wherein the network device is programmed to wirelessly pair with the remote device. 7. The telecommunications system of claim 1, wherein the network device is programmed to pair with a plurality of remote devices and select at least one of the plurality of remote devices to transmit the acknowledgement signal. 8. The telecommunications system of claim 1, wherein the first communication protocol includes the transmission control protocol. 9. A telecommunications system comprising:
a network device programmed to receive a data signal over a first communication network and in accordance with a first communication protocol, a remote device programmed to transmit an acknowledgement signal over a second communication network and in accordance with a second communication protocol different from the first communication protocol, wherein the network device is programmed to transmit an acknowledgement command to the remote device, and wherein the remote device is programmed to transmit the acknowledgement signal in response to receiving the acknowledgement command, wherein the acknowledgement signal acknowledges receipt of the data signal at the network device. 10. The telecommunications system of claim 9, wherein the first communication network includes a satellite communication network and wherein the second communication network includes a cellular communication network. 11. The telecommunications system of claim 9, wherein the network device is programmed to parse the data signal and determine whether the data signal was transmitted in accordance with the first communication protocol. 12. The telecommunications system of claim 9, wherein the network device is programmed to generate the acknowledgement command if the data signal was transmitted in accordance with the first communication protocol. 13. The telecommunications system of claim 9, wherein network device is programmed to pair with the remote device. 14. The telecommunications system of claim 13, wherein the network device is configured to wirelessly pair with the remote device. 15. The telecommunications system of claim 9, wherein the network device is programmed to select the remote device from among a plurality of remote devices. 16. The telecommunications system of claim 9, wherein the first communication protocol includes the transmission control protocol. 17. A method comprising:
receiving a data signal over a first communication network and in accordance with a first communication protocol; generating an acknowledgement command for a remote device to transmit an acknowledgement signal over a second communication network and in accordance with a second communication protocol, wherein the acknowledgement signal acknowledges receipt of the data signal at the network device; and transmitting the acknowledgement command to the remote device. 18. The method of claim 17, wherein the first communication network includes a satellite communication network and wherein the second communication network includes a cellular communication network. 19. The method of claim 17, further comprising:
parsing the data signal; and determining whether the data signal was transmitted in accordance with the first communication protocol. 20. The method of claim 17, further comprising:
wirelessly pairing with a plurality of remote devices; and selecting at least one of the plurality of remote devices to transmit the acknowledgement signal. | A telecommunications system includes a network device that receives a data signal over a first communication network and in accordance with a first communication protocol. The network device generates an acknowledgement command for a remote device to transmit an acknowledgement signal over a second communication network and in accordance with a second communication protocol. The acknowledgement signal acknowledges receipt of the data signal at the network device.1. A telecommunications system comprising:
a network device programmed to receive a data signal over a first communication network and in accordance with a first communication protocol, wherein the network device is programmed to generate an acknowledgement command for a remote device to transmit an acknowledgement signal over a second communication network and in accordance with a second communication protocol, wherein the acknowledgement signal acknowledges receipt of the data signal at the network device. 2. The telecommunications system of claim 1, wherein the first communication network includes a satellite communication network and wherein the second communication network includes a cellular communication network. 3. The telecommunications system of claim 1, wherein the network device is programmed to parse the data signal and determine whether the data signal was transmitted in accordance with the first communication protocol. 4. The telecommunications system of claim 3, wherein the network device is programmed to generate the acknowledgement command if the data signal was transmitted in accordance with the first communication protocol. 5. The telecommunications system of claim 1, wherein network device is programmed to pair with the remote device. 6. The telecommunications system of claim 5, wherein the network device is programmed to wirelessly pair with the remote device. 7. The telecommunications system of claim 1, wherein the network device is programmed to pair with a plurality of remote devices and select at least one of the plurality of remote devices to transmit the acknowledgement signal. 8. The telecommunications system of claim 1, wherein the first communication protocol includes the transmission control protocol. 9. A telecommunications system comprising:
a network device programmed to receive a data signal over a first communication network and in accordance with a first communication protocol, a remote device programmed to transmit an acknowledgement signal over a second communication network and in accordance with a second communication protocol different from the first communication protocol, wherein the network device is programmed to transmit an acknowledgement command to the remote device, and wherein the remote device is programmed to transmit the acknowledgement signal in response to receiving the acknowledgement command, wherein the acknowledgement signal acknowledges receipt of the data signal at the network device. 10. The telecommunications system of claim 9, wherein the first communication network includes a satellite communication network and wherein the second communication network includes a cellular communication network. 11. The telecommunications system of claim 9, wherein the network device is programmed to parse the data signal and determine whether the data signal was transmitted in accordance with the first communication protocol. 12. The telecommunications system of claim 9, wherein the network device is programmed to generate the acknowledgement command if the data signal was transmitted in accordance with the first communication protocol. 13. The telecommunications system of claim 9, wherein network device is programmed to pair with the remote device. 14. The telecommunications system of claim 13, wherein the network device is configured to wirelessly pair with the remote device. 15. The telecommunications system of claim 9, wherein the network device is programmed to select the remote device from among a plurality of remote devices. 16. The telecommunications system of claim 9, wherein the first communication protocol includes the transmission control protocol. 17. A method comprising:
receiving a data signal over a first communication network and in accordance with a first communication protocol; generating an acknowledgement command for a remote device to transmit an acknowledgement signal over a second communication network and in accordance with a second communication protocol, wherein the acknowledgement signal acknowledges receipt of the data signal at the network device; and transmitting the acknowledgement command to the remote device. 18. The method of claim 17, wherein the first communication network includes a satellite communication network and wherein the second communication network includes a cellular communication network. 19. The method of claim 17, further comprising:
parsing the data signal; and determining whether the data signal was transmitted in accordance with the first communication protocol. 20. The method of claim 17, further comprising:
wirelessly pairing with a plurality of remote devices; and selecting at least one of the plurality of remote devices to transmit the acknowledgement signal. | 2,400 |
6,739 | 6,739 | 14,548,782 | 2,434 | In one aspect, a device includes a processor and a memory accessible to the processor. The memory bears instructions executable by the processor to access a messaging account and parse contents of the messaging account to identify personal information to at least obscure in the messaging account. | 1. A device, comprising:
a processor; and a memory accessible to the processor and bearing instructions executable by the processor to: access a messaging account; and parse contents of the messaging account to identify personal information to at least obscure in the messaging account. 2. The device of claim 1, wherein the at least obscuring comprises deleting the personal information from the messaging account. 3. The device of claim 1, wherein the instructions are further executable to:
in response to identification of at least some personal information to obscure in the messaging account, obscure the personal information from being observed upon access to one or more messages in which the personal information appears. 4. The device of claim 3, wherein the personal information is obscured by redacting the personal information in the one or more messages in which it appears. 5. The device of claim 3, wherein the personal information is irreversibly obscured. 6. The device of claim 1, wherein the instructions are further executable to:
in response to identification of at least some personal information in at least one message attachment to obscure in the messaging accounts obscure the personal information in the at least one attachment from being observed upon access to the at least one attachment. cm 7. The device of claim 2, wherein the instructions are further executable to: in response to identification of at least some personal information to delete from the messaging account, delete the personal information from one or more respective messages in which it exists. 8. The device of claim 2, wherein the instructions are further executable to:
in response to identification of at least some personal information to delete from the messaging account, delete one or more messages containing the personal information. 9. The device of claim 2, wherein the instructions are further executable to:
in response to identification of at least some personal information to delete from the messaging account in a message attachment, delete the attachment. 10. The device of claim 9, wherein the message attachment at least comprises an audio message. 11. The device of claim 1, wherein the personal information is information selected from the group consisting of: social security number information, bank account number information, password information, loan information, credit card number information, health insurance information, medical record information, bank name information, credit card provider information, health insurance provider name information, healthcare provider name information, bank routing number information. 12. The device of claim 1, wherein the messaging account is an account selected from the group consisting of: an email account, a text messaging account. 13. The device of claim 1, wherein the contents of the messaging account are parsed in response to a command from a user without further input from a user. 14. The device of claim 1, wherein the contents of the messaging account are parsed at intervals in response to a command to parse the contents of the messaging account at intervals to identity personal information to at least obscure in the messaging account. 15. The device of claim 1, wherein the instructions are further executable to:
in response to identification of at least some personal information to obscure in one or more messages stored in the messaging account, provide at least one enhanced element of security to access the one or more messages relative to one or more security protocols otherwise required to access messages in the messaging account. 16. The device of claim 1, comprising a display, wherein the instructions are further executable to:
in response to identification of at least some personal information to at least one of obscure in the messaging account and delete from the messaging account, present on the display at least first information pertaining to one or more respective messages containing the personal information, present a first option for a user to obscure the personal information in one or more of the respective messages, and present a second option for a user to delete one or more of the respective messages. 17. A method, comprising:
accessing messages in an account; and parsing the messages to identify information to at least obfuscate in the account. 18. The method of claim 17, comprising:
receiving the information to identify from a user. 19. The method of claim 17, comprising:
parsing the messages to identify information to at least obfuscate in the account based on at least one of key words and key numerical formats. 20. A computer readable storage medium that is not a carrier wave, the computer readable storage medium comprising instructions executable by a processor to:
access messages associated with a messaging account; identify information to at least one of obfuscate in the messages and remove from the messaging account; and at least one of obfuscate the information, and remove the information from the messaging account. 21. The computer readable storage medium of claim 20, wherein the instructions are executable to:
in response to identification of at least some of the information in at least a first message, render the first message unable to be forwarded from the messaging account. | In one aspect, a device includes a processor and a memory accessible to the processor. The memory bears instructions executable by the processor to access a messaging account and parse contents of the messaging account to identify personal information to at least obscure in the messaging account.1. A device, comprising:
a processor; and a memory accessible to the processor and bearing instructions executable by the processor to: access a messaging account; and parse contents of the messaging account to identify personal information to at least obscure in the messaging account. 2. The device of claim 1, wherein the at least obscuring comprises deleting the personal information from the messaging account. 3. The device of claim 1, wherein the instructions are further executable to:
in response to identification of at least some personal information to obscure in the messaging account, obscure the personal information from being observed upon access to one or more messages in which the personal information appears. 4. The device of claim 3, wherein the personal information is obscured by redacting the personal information in the one or more messages in which it appears. 5. The device of claim 3, wherein the personal information is irreversibly obscured. 6. The device of claim 1, wherein the instructions are further executable to:
in response to identification of at least some personal information in at least one message attachment to obscure in the messaging accounts obscure the personal information in the at least one attachment from being observed upon access to the at least one attachment. cm 7. The device of claim 2, wherein the instructions are further executable to: in response to identification of at least some personal information to delete from the messaging account, delete the personal information from one or more respective messages in which it exists. 8. The device of claim 2, wherein the instructions are further executable to:
in response to identification of at least some personal information to delete from the messaging account, delete one or more messages containing the personal information. 9. The device of claim 2, wherein the instructions are further executable to:
in response to identification of at least some personal information to delete from the messaging account in a message attachment, delete the attachment. 10. The device of claim 9, wherein the message attachment at least comprises an audio message. 11. The device of claim 1, wherein the personal information is information selected from the group consisting of: social security number information, bank account number information, password information, loan information, credit card number information, health insurance information, medical record information, bank name information, credit card provider information, health insurance provider name information, healthcare provider name information, bank routing number information. 12. The device of claim 1, wherein the messaging account is an account selected from the group consisting of: an email account, a text messaging account. 13. The device of claim 1, wherein the contents of the messaging account are parsed in response to a command from a user without further input from a user. 14. The device of claim 1, wherein the contents of the messaging account are parsed at intervals in response to a command to parse the contents of the messaging account at intervals to identity personal information to at least obscure in the messaging account. 15. The device of claim 1, wherein the instructions are further executable to:
in response to identification of at least some personal information to obscure in one or more messages stored in the messaging account, provide at least one enhanced element of security to access the one or more messages relative to one or more security protocols otherwise required to access messages in the messaging account. 16. The device of claim 1, comprising a display, wherein the instructions are further executable to:
in response to identification of at least some personal information to at least one of obscure in the messaging account and delete from the messaging account, present on the display at least first information pertaining to one or more respective messages containing the personal information, present a first option for a user to obscure the personal information in one or more of the respective messages, and present a second option for a user to delete one or more of the respective messages. 17. A method, comprising:
accessing messages in an account; and parsing the messages to identify information to at least obfuscate in the account. 18. The method of claim 17, comprising:
receiving the information to identify from a user. 19. The method of claim 17, comprising:
parsing the messages to identify information to at least obfuscate in the account based on at least one of key words and key numerical formats. 20. A computer readable storage medium that is not a carrier wave, the computer readable storage medium comprising instructions executable by a processor to:
access messages associated with a messaging account; identify information to at least one of obfuscate in the messages and remove from the messaging account; and at least one of obfuscate the information, and remove the information from the messaging account. 21. The computer readable storage medium of claim 20, wherein the instructions are executable to:
in response to identification of at least some of the information in at least a first message, render the first message unable to be forwarded from the messaging account. | 2,400 |
6,740 | 6,740 | 14,634,465 | 2,485 | The present approach relates to the measure of the planar tilt of a slide on a microscope using an integrated auto-focuser. The tilt of the slide can be used to detect improperly loaded slides (i.e. if the slide is resting on either the cover-slip or a printed barcode), compensate for misalignment between the microscope optical axis and the slide, and reduce subsequent focusing times. | 1. A computer-implemented method for assessing tilt of a slide, comprising:
acquiring a plurality of autofocus measurements at fixed locations on a slide and along a first dimension generally perpendicular to a slide holder on which the slide is positioned, wherein the different fixed locations are independent of the presence or absence of a tissue sample at the fixed locations; fitting a surface to the plurality of autofocus measurements; and based on the fit of the surface to the plurality of autofocus measurements, deriving a measure of the tilt of the slide relative to the slide holder. 2. The computer-implemented method of claim 1, wherein the plurality of autofocus measurements comprises three or more autofocus measurements and wherein the surface comprises a plane. 3. The computer-implemented method of claim 1, wherein the plurality of autofocus measurements comprises five or more autofocus measurements and wherein the surface comprises a second-order surface. 4. The computer-implemented method of claim 1, wherein acquiring the plurality of autofocus measurements comprises scanning a laser autofocuser through transition interfaces at each of the different fixed locations and, based on the measurements obtained by the laser autofocuser, determining at least one of a slide top or a slide bottom at each of the different fixed locations. 5. The computer-implemented method of claim 1, wherein deriving the measure of the tilt of the slide comprises deriving a first angle corresponding to the tilt along a second dimension defining one axis of the slide holder and a second angle corresponding to the tilt along a third dimension defining a second axis of the slide holder, wherein the first dimension, the second dimension, and the third dimension are perpendicular to one another. 6. The computer-implemented method of claim 1, further comprising:
providing the measure of the tilt of the slide to an autofocus algorithm that uses the measure of the tilt to determine focus points along the slide; and acquiring one or more images of the slide using the focus points determined by the autofocus algorithm. 7. The computer-implemented method of claim 1, further comprising:
comparing the measure of the tilt of the slide to a comparison criterion; and providing a notification if the tilt of the slide exceeds the comparison criterion. 8. The computer-implemented method of claim 7, wherein comparing the measure of the tilt of the slide to the comparison criterion comprises determining if the measure of the tilt is within a focusing range of an objective lens. 9. The computer-implemented method of claim 7, wherein the comparison criterion is determined by dividing a depth of focus by a field of view size for a given objective lens. 10. A computer-implemented for imaging a slide, comprising:
generating or receiving a measured tilt of a slide positioned on a slide holder of a microscope; automatically focusing a microscope objective using the measured tilt to establish an initial focus position for a first location on the slide; acquiring one or more automatically focused images of the slide at different locations on the slide using the microscope objective, wherein the microscope objective is automatically focused at each location to account for at least the measured tilt. 11. The computer-implemented method of claim 10, wherein the measured tilt corresponds to the tilt of a fitted plane or second-order surface. 12. The computer-implemented method of claim 10, wherein automatically focusing the microscope objective comprises automatically moving the microscope objective to compensate at least for the measured tilt. 13. The computer-implemented method of claim 10, wherein automatic focusing of the objective is image-based but uses the measured tilt to establish the initial focus position. 14. The computer-implemented method of claim 10, comprising:
removing the slide from the slide holder; replacing the slide on the slide holder; re-imaging the slide, once replaced on the slide holder, using a set of automatic focus values determined during a previous round of imaging as starting points for a current round of imaging. 15. The computer-implemented method of claim 14, wherein using the set of automatic focus values determined during the previous round of imaging as starting points comprises computing a planar shift and transform from the previous focus positions to account for the current planar shift. 16. A digital microscopy imaging system, comprising:
a stage configured to hold a slide; an objective and image sensor configured to acquire images of a portion of the slide, when present; a position controller configured to move one or both of the objective and the stage relative to one another in accordance with an imaging protocol; a controller configured to control operation of one or both of the position controller and the image sensor; a laser autofocuser configured to emit a ranging beam toward the stage; a memory storing one or more routines; and a processing component configured to execute the one or more routines stored in the memory, wherein the one or more routines, when executed by the processing component, cause acts to be performed comprising:
acquiring a plurality of autofocus measurements using the laser autofocuser, wherein autofocus measurements are acquired at different fixed locations relative to the slide, when present, and wherein the fixed locations are independent of the presence or absence of a tissue sample at the fixed locations;
fitting a surface to the plurality of autofocus measurements; and
based on the fit of the surface to the plurality of autofocus measurements, deriving a measure of the tilt of the slide relative to the slide holder. 17. The digital microscopy imaging system of claim 16, wherein the one or more routines, when executed by the processing component, cause additional acts to be performed: comprising:
automatically generating one or more focus points for the objective based on the surface; moving the objective based on the generated focus points; acquiring images of the slide. 18. The digital microscopy imaging system of claim 17, wherein the one or more routines, when executed by the processing component, cause additional acts to be performed: comprising:
upon removal and replacement of the slide on the stage, computing a shift and transform from a set of previous focus positions to account for a current shift; and acquiring a second set of images based on the transformed set of focus positions. 19. The digital microscopy imaging system of claim 16, wherein the surface comprises a plane or a second order surface. 20. The digital microscopy imaging system of claim 17, wherein the one or more routines, when executed by the processing component, cause additional acts to be performed: comprising:
comparing the measure of the tilt of the slide to a comparison criterion; and providing a notification if the tilt of the slide exceeds the comparison criterion. | The present approach relates to the measure of the planar tilt of a slide on a microscope using an integrated auto-focuser. The tilt of the slide can be used to detect improperly loaded slides (i.e. if the slide is resting on either the cover-slip or a printed barcode), compensate for misalignment between the microscope optical axis and the slide, and reduce subsequent focusing times.1. A computer-implemented method for assessing tilt of a slide, comprising:
acquiring a plurality of autofocus measurements at fixed locations on a slide and along a first dimension generally perpendicular to a slide holder on which the slide is positioned, wherein the different fixed locations are independent of the presence or absence of a tissue sample at the fixed locations; fitting a surface to the plurality of autofocus measurements; and based on the fit of the surface to the plurality of autofocus measurements, deriving a measure of the tilt of the slide relative to the slide holder. 2. The computer-implemented method of claim 1, wherein the plurality of autofocus measurements comprises three or more autofocus measurements and wherein the surface comprises a plane. 3. The computer-implemented method of claim 1, wherein the plurality of autofocus measurements comprises five or more autofocus measurements and wherein the surface comprises a second-order surface. 4. The computer-implemented method of claim 1, wherein acquiring the plurality of autofocus measurements comprises scanning a laser autofocuser through transition interfaces at each of the different fixed locations and, based on the measurements obtained by the laser autofocuser, determining at least one of a slide top or a slide bottom at each of the different fixed locations. 5. The computer-implemented method of claim 1, wherein deriving the measure of the tilt of the slide comprises deriving a first angle corresponding to the tilt along a second dimension defining one axis of the slide holder and a second angle corresponding to the tilt along a third dimension defining a second axis of the slide holder, wherein the first dimension, the second dimension, and the third dimension are perpendicular to one another. 6. The computer-implemented method of claim 1, further comprising:
providing the measure of the tilt of the slide to an autofocus algorithm that uses the measure of the tilt to determine focus points along the slide; and acquiring one or more images of the slide using the focus points determined by the autofocus algorithm. 7. The computer-implemented method of claim 1, further comprising:
comparing the measure of the tilt of the slide to a comparison criterion; and providing a notification if the tilt of the slide exceeds the comparison criterion. 8. The computer-implemented method of claim 7, wherein comparing the measure of the tilt of the slide to the comparison criterion comprises determining if the measure of the tilt is within a focusing range of an objective lens. 9. The computer-implemented method of claim 7, wherein the comparison criterion is determined by dividing a depth of focus by a field of view size for a given objective lens. 10. A computer-implemented for imaging a slide, comprising:
generating or receiving a measured tilt of a slide positioned on a slide holder of a microscope; automatically focusing a microscope objective using the measured tilt to establish an initial focus position for a first location on the slide; acquiring one or more automatically focused images of the slide at different locations on the slide using the microscope objective, wherein the microscope objective is automatically focused at each location to account for at least the measured tilt. 11. The computer-implemented method of claim 10, wherein the measured tilt corresponds to the tilt of a fitted plane or second-order surface. 12. The computer-implemented method of claim 10, wherein automatically focusing the microscope objective comprises automatically moving the microscope objective to compensate at least for the measured tilt. 13. The computer-implemented method of claim 10, wherein automatic focusing of the objective is image-based but uses the measured tilt to establish the initial focus position. 14. The computer-implemented method of claim 10, comprising:
removing the slide from the slide holder; replacing the slide on the slide holder; re-imaging the slide, once replaced on the slide holder, using a set of automatic focus values determined during a previous round of imaging as starting points for a current round of imaging. 15. The computer-implemented method of claim 14, wherein using the set of automatic focus values determined during the previous round of imaging as starting points comprises computing a planar shift and transform from the previous focus positions to account for the current planar shift. 16. A digital microscopy imaging system, comprising:
a stage configured to hold a slide; an objective and image sensor configured to acquire images of a portion of the slide, when present; a position controller configured to move one or both of the objective and the stage relative to one another in accordance with an imaging protocol; a controller configured to control operation of one or both of the position controller and the image sensor; a laser autofocuser configured to emit a ranging beam toward the stage; a memory storing one or more routines; and a processing component configured to execute the one or more routines stored in the memory, wherein the one or more routines, when executed by the processing component, cause acts to be performed comprising:
acquiring a plurality of autofocus measurements using the laser autofocuser, wherein autofocus measurements are acquired at different fixed locations relative to the slide, when present, and wherein the fixed locations are independent of the presence or absence of a tissue sample at the fixed locations;
fitting a surface to the plurality of autofocus measurements; and
based on the fit of the surface to the plurality of autofocus measurements, deriving a measure of the tilt of the slide relative to the slide holder. 17. The digital microscopy imaging system of claim 16, wherein the one or more routines, when executed by the processing component, cause additional acts to be performed: comprising:
automatically generating one or more focus points for the objective based on the surface; moving the objective based on the generated focus points; acquiring images of the slide. 18. The digital microscopy imaging system of claim 17, wherein the one or more routines, when executed by the processing component, cause additional acts to be performed: comprising:
upon removal and replacement of the slide on the stage, computing a shift and transform from a set of previous focus positions to account for a current shift; and acquiring a second set of images based on the transformed set of focus positions. 19. The digital microscopy imaging system of claim 16, wherein the surface comprises a plane or a second order surface. 20. The digital microscopy imaging system of claim 17, wherein the one or more routines, when executed by the processing component, cause additional acts to be performed: comprising:
comparing the measure of the tilt of the slide to a comparison criterion; and providing a notification if the tilt of the slide exceeds the comparison criterion. | 2,400 |
6,741 | 6,741 | 11,323,850 | 2,498 | An intelligent location based services and navigation hybrid system comprising a client having location based service capability and a server, the system setting a condition for new or updates of a relevant information by the server and/or client, selecting the relevant information for the updates by the server, transmitting the relevant information from the server, receiving the updates of the relevant information by the client, and selecting an operational mode by the client. | 1. An intelligent location based services and navigation hybrid system comprising a client having location based service capability and a server further comprises:
setting a condition for updates of a relevant information by the server or client, or a combination thereof; selecting the relevant information for the updates by the server or client, or a combination thereof; transmitting the relevant information from the server or client; receiving the updates of the relevant information by the server or client; and selecting an operational mode by the client. 2. The system as claimed in claim 1 wherein setting the condition for the updates of the relevant information by the server or client, or a combination thereof, comprises setting an interval to send the updates from the server or client. 3. The system as claimed in claim 1 wherein setting the condition for the updates of the relevant information by the server or client, or a combination thereof comprises setting event conditions for the server or client to send the updates. 4. The system as claimed in claim 1 wherein determining the operational mode by the client comprises determining an on-line or off-line operation of the client. 5. The system as claimed in claim 1 wherein selecting the relevant information for the updates by the server or client comprises determining a portion of the relevant information for optimization of the updates provided by the server or client. 6. The intelligent location based services and navigation hybrid system comprising a client having location based service capability and a server further comprises:
setting a condition for updates of a relevant information by the server or client, or a combination thereof; requesting the updates for the relevant information by the server or client; selecting the relevant information for the updates by the server or client; transmitting the relevant information from the server or client; receiving the updates of the relevant information by the server or client; determining storage of the updates of the relevant information received by the client; and selecting an operational mode as an on-line or off-line mode by the client. 7. The system as claimed in claim 6 wherein receiving the updates of the relevant information by the server or client comprises connecting a wired terminal to the client. 8. The system as claimed in claim 6 wherein transmitting the relevant information from the server or client comprises utilizing a communication path for the transmission of the updates of the relevant information. 9. The system as claimed in claim 6 wherein determining the storage of the updates of the relevant information received by the client comprises selectively storing the relevant information to a memory by the client. 10. The system as claimed in claim 6 wherein selecting the operational mode as on-line or off-line by the client comprises utilizing a memory of the client with the relevant information stored for off-line operation. 11. An intelligent location based services and navigation hybrid system comprising a client having location based service capability and a server comprising:
a control circuitry within the server or client for setting conditions for updates of a relevant information; a selection circuitry within the server or client for selecting the relevant information for the updates by the server or client; a transmission circuitry within the server or client for controlling the transmission of relevant information from the server or client; an update circuitry within the server or client for controlling the updates of the relevant information received by the server or client; and a mode select circuitry within the client for selecting an operational mode of the client. 12. The system as claimed in claim 11 wherein the control circuitry within the server or client for setting condition for the updates of the relevant information further comprises an interval setting circuitry for setting an interval to send the updates from the server. 13. The system as claimed in claim 11 wherein the control circuitry within the server or client, or a combination thereof, for setting condition for the updates of the relevant information further comprises an event setting circuitry for setting event conditions to for the server or client to send the updates. 14. The system as claimed in claim 11 wherein the mode select circuitry within the client comprises an on-line or off-line operation of the client. 15. The system as claimed in claim 11 wherein the selection circuitry within the server or client comprises selection optimization circuitry for selecting a portion of the relevant information as the updates provided by the server. 16. The system as claimed in claim 11 wherein the mode select circuitry within the client further comprises data storage for storing the updates of the relevant information received by the client. 17. The system as claimed in claim 11 wherein the update circuitry within the server or client further comprises an interface circuitry for connecting to a wired service provider to receive the relevant information. 18. The system as claimed in claim 11 further comprising a communication path between the server and the client for transmitting the updates of the relevant information between the server and client. 19. The system as claimed in claim 16 wherein the mode select circuitry within the client comprises a data selection circuitry for selectively storing the updates of the relevant information received by the client in the data storage of the client. 20. The system as claimed in claim 16 wherein the data storage provides memory for the relevant information during an off-line operation of the client. | An intelligent location based services and navigation hybrid system comprising a client having location based service capability and a server, the system setting a condition for new or updates of a relevant information by the server and/or client, selecting the relevant information for the updates by the server, transmitting the relevant information from the server, receiving the updates of the relevant information by the client, and selecting an operational mode by the client.1. An intelligent location based services and navigation hybrid system comprising a client having location based service capability and a server further comprises:
setting a condition for updates of a relevant information by the server or client, or a combination thereof; selecting the relevant information for the updates by the server or client, or a combination thereof; transmitting the relevant information from the server or client; receiving the updates of the relevant information by the server or client; and selecting an operational mode by the client. 2. The system as claimed in claim 1 wherein setting the condition for the updates of the relevant information by the server or client, or a combination thereof, comprises setting an interval to send the updates from the server or client. 3. The system as claimed in claim 1 wherein setting the condition for the updates of the relevant information by the server or client, or a combination thereof comprises setting event conditions for the server or client to send the updates. 4. The system as claimed in claim 1 wherein determining the operational mode by the client comprises determining an on-line or off-line operation of the client. 5. The system as claimed in claim 1 wherein selecting the relevant information for the updates by the server or client comprises determining a portion of the relevant information for optimization of the updates provided by the server or client. 6. The intelligent location based services and navigation hybrid system comprising a client having location based service capability and a server further comprises:
setting a condition for updates of a relevant information by the server or client, or a combination thereof; requesting the updates for the relevant information by the server or client; selecting the relevant information for the updates by the server or client; transmitting the relevant information from the server or client; receiving the updates of the relevant information by the server or client; determining storage of the updates of the relevant information received by the client; and selecting an operational mode as an on-line or off-line mode by the client. 7. The system as claimed in claim 6 wherein receiving the updates of the relevant information by the server or client comprises connecting a wired terminal to the client. 8. The system as claimed in claim 6 wherein transmitting the relevant information from the server or client comprises utilizing a communication path for the transmission of the updates of the relevant information. 9. The system as claimed in claim 6 wherein determining the storage of the updates of the relevant information received by the client comprises selectively storing the relevant information to a memory by the client. 10. The system as claimed in claim 6 wherein selecting the operational mode as on-line or off-line by the client comprises utilizing a memory of the client with the relevant information stored for off-line operation. 11. An intelligent location based services and navigation hybrid system comprising a client having location based service capability and a server comprising:
a control circuitry within the server or client for setting conditions for updates of a relevant information; a selection circuitry within the server or client for selecting the relevant information for the updates by the server or client; a transmission circuitry within the server or client for controlling the transmission of relevant information from the server or client; an update circuitry within the server or client for controlling the updates of the relevant information received by the server or client; and a mode select circuitry within the client for selecting an operational mode of the client. 12. The system as claimed in claim 11 wherein the control circuitry within the server or client for setting condition for the updates of the relevant information further comprises an interval setting circuitry for setting an interval to send the updates from the server. 13. The system as claimed in claim 11 wherein the control circuitry within the server or client, or a combination thereof, for setting condition for the updates of the relevant information further comprises an event setting circuitry for setting event conditions to for the server or client to send the updates. 14. The system as claimed in claim 11 wherein the mode select circuitry within the client comprises an on-line or off-line operation of the client. 15. The system as claimed in claim 11 wherein the selection circuitry within the server or client comprises selection optimization circuitry for selecting a portion of the relevant information as the updates provided by the server. 16. The system as claimed in claim 11 wherein the mode select circuitry within the client further comprises data storage for storing the updates of the relevant information received by the client. 17. The system as claimed in claim 11 wherein the update circuitry within the server or client further comprises an interface circuitry for connecting to a wired service provider to receive the relevant information. 18. The system as claimed in claim 11 further comprising a communication path between the server and the client for transmitting the updates of the relevant information between the server and client. 19. The system as claimed in claim 16 wherein the mode select circuitry within the client comprises a data selection circuitry for selectively storing the updates of the relevant information received by the client in the data storage of the client. 20. The system as claimed in claim 16 wherein the data storage provides memory for the relevant information during an off-line operation of the client. | 2,400 |
6,742 | 6,742 | 14,775,937 | 2,433 | Sending encrypted data to a service provider includes exchanging an encryption key between an entity and a service provider without retaining the encryption key and while hiding an identity of said entity from the service provider and forwarding encrypted data based on the encryption key to the service provider from the entity while hiding the identity of the entity from the service provider. | 1. A computer program product for sending encrypted data to a service provider, comprising:
a non-transitory computer readable storage medium, said non-transitory computer readable storage medium comprising computer readable program code embodied therewith, said computer readable program code comprising program instructions that, when executed, causes a processor to:
exchange an encryption key between an entity and a service provider without retaining said encryption key and while hiding an identity of said entity from said service provider; and
forward encrypted data based on said encryption key to said service provider from said entity while hiding said identity of said entity from said service provider. 2. The computer program product of claim 1, further comprising computer readable program code comprising program instructions that, when executed, causes said processor to forward an encrypted message based on said encryption key to said entity from said service provider. 3. The computer program product of claim 1, wherein said encrypted data contains sensitive information that is replaced with a randomized unique identification such that said sensitive information is hidden from said service provider. 4. The computer program product of claim 1, wherein said sensitive information includes entity names, hostnames, internet protocol (IP) addresses, media access control (MAC) address, entity identifiers, or combinations thereof. 5. The computer program product of claim 1, further comprising computer readable program code comprising program instructions that, when executed, causes said processor to provide said entity an option to establish a relationship with a service provider. 6. The computer program product of claim 1, further comprising computer readable program code comprising program instructions that, when executed, causes said processor to create a relationship with entity with an establishment of a billing record. 7. A system for sending encrypted data to a service provider, comprising:
program instructions stored in memory that cause a processor to operate multiple engines; an exchange engine to exchange an encryption key between an entity and a service provider without retaining said encryption key and while hiding an identity of said entity from said service provider; an encryption engine to encrypt entity data based on said encryption key; and forwarding engine to forward encrypted data based on said encryption key to said service provider from said entity while hiding said identity of said entity from said service provider. 8. The system of claim 7, further comprising an anonymizing engine to cause said encrypted data to hide sensitive information such that an identity of said entity is hidden from said service provider. 9. The system of claim 8, wherein said anonymizing engine to replace sensitive information with a randomized unique identification such that said sensitive information is hidden from said service provider. 10. The system of claim 8, wherein said sensitive information includes entity names, hostnames, internet protocol (IP) addresses, media access control (MAC) address, entity identifiers, or combinations thereof. 11. The system of claim 8, further comprising a tracking engine to track said randomized unique identification and its corresponding sensitive information. 12. The system of claim 7, wherein said exchanging engine to implement an anonymous key exchange protocol or a semi-anonymous key exchange protocol to exchange said encryption key. 13. A method for sending encrypted data to a service provider, comprising:
exchanging an encryption key between an entity and a service provider without retaining said encryption key and while hiding an identity of said entity from said service provider; forwarding encrypted data based on said encryption key to said service provider from said entity while hiding said identity of said entity from said service provider; and forwarding an encrypted message based on said encryption key to said entity from said service provider such that an identity of said entity is hidden from said service provider. 14. The method of claim 13, wherein said encrypted message includes results of services from said service provider. 15. The method of claim 13, wherein sensitive information in said encrypted data is hidden to said service provider while other portions of said encrypted data are discernible to said service provider based on said encryption key. | Sending encrypted data to a service provider includes exchanging an encryption key between an entity and a service provider without retaining the encryption key and while hiding an identity of said entity from the service provider and forwarding encrypted data based on the encryption key to the service provider from the entity while hiding the identity of the entity from the service provider.1. A computer program product for sending encrypted data to a service provider, comprising:
a non-transitory computer readable storage medium, said non-transitory computer readable storage medium comprising computer readable program code embodied therewith, said computer readable program code comprising program instructions that, when executed, causes a processor to:
exchange an encryption key between an entity and a service provider without retaining said encryption key and while hiding an identity of said entity from said service provider; and
forward encrypted data based on said encryption key to said service provider from said entity while hiding said identity of said entity from said service provider. 2. The computer program product of claim 1, further comprising computer readable program code comprising program instructions that, when executed, causes said processor to forward an encrypted message based on said encryption key to said entity from said service provider. 3. The computer program product of claim 1, wherein said encrypted data contains sensitive information that is replaced with a randomized unique identification such that said sensitive information is hidden from said service provider. 4. The computer program product of claim 1, wherein said sensitive information includes entity names, hostnames, internet protocol (IP) addresses, media access control (MAC) address, entity identifiers, or combinations thereof. 5. The computer program product of claim 1, further comprising computer readable program code comprising program instructions that, when executed, causes said processor to provide said entity an option to establish a relationship with a service provider. 6. The computer program product of claim 1, further comprising computer readable program code comprising program instructions that, when executed, causes said processor to create a relationship with entity with an establishment of a billing record. 7. A system for sending encrypted data to a service provider, comprising:
program instructions stored in memory that cause a processor to operate multiple engines; an exchange engine to exchange an encryption key between an entity and a service provider without retaining said encryption key and while hiding an identity of said entity from said service provider; an encryption engine to encrypt entity data based on said encryption key; and forwarding engine to forward encrypted data based on said encryption key to said service provider from said entity while hiding said identity of said entity from said service provider. 8. The system of claim 7, further comprising an anonymizing engine to cause said encrypted data to hide sensitive information such that an identity of said entity is hidden from said service provider. 9. The system of claim 8, wherein said anonymizing engine to replace sensitive information with a randomized unique identification such that said sensitive information is hidden from said service provider. 10. The system of claim 8, wherein said sensitive information includes entity names, hostnames, internet protocol (IP) addresses, media access control (MAC) address, entity identifiers, or combinations thereof. 11. The system of claim 8, further comprising a tracking engine to track said randomized unique identification and its corresponding sensitive information. 12. The system of claim 7, wherein said exchanging engine to implement an anonymous key exchange protocol or a semi-anonymous key exchange protocol to exchange said encryption key. 13. A method for sending encrypted data to a service provider, comprising:
exchanging an encryption key between an entity and a service provider without retaining said encryption key and while hiding an identity of said entity from said service provider; forwarding encrypted data based on said encryption key to said service provider from said entity while hiding said identity of said entity from said service provider; and forwarding an encrypted message based on said encryption key to said entity from said service provider such that an identity of said entity is hidden from said service provider. 14. The method of claim 13, wherein said encrypted message includes results of services from said service provider. 15. The method of claim 13, wherein sensitive information in said encrypted data is hidden to said service provider while other portions of said encrypted data are discernible to said service provider based on said encryption key. | 2,400 |
6,743 | 6,743 | 14,136,104 | 2,485 | Camera heads and associated rotating contact assemblies are disclosed. In one embodiment a slip-ring assembly includes a rotating contact assembly including slip rings having a cylindrical ring assembly and a flexible or bendable brush assembly. Brush elements may flexed to remain in contact with corresponding ring assembly electrical contacts. Bush contacts may be coated or have attached contact assemblies to increase hardness and oxide resistance with materials such as palladium nickel, rhodium, or hard gold, though a variety of other materials may be used as a suitable coating. | 1. A camera head, comprising:
a housing; an imager disposed within the housing on a first element movable relative to the housing; a second element rotationally movable relative to the first element, the second element including an electrical output connection; and a slip ring coupled between the first element and the second element to provide an electrical connection between an output of the imager and the electrical output connection, wherein the slip ring comprises: a cylindrical ring assembly including one or more ring electrical contacts; and a brush assembly disposed around the cylindrical ring assembly, the brush assembly including a brush element including a plurality of tines or fingers including electrical contacts, wherein one or more of the brush electrical contacts are positioned in contact with corresponding ones of the one or more ring electrical contacts. 2. The camera head of claim 1, further including a counterweight to self-level the imaging sensor via gravity. 3. The camera head of claim 1, wherein the brush assembly comprises a brush element, wherein the brush electrical contacts are on or within the brush element. 4. The camera head of claim 1, wherein the electrical contacts are electrical circuit traces on the tines or fingers. 5. The camera head of claim 3, wherein the fingers or tines of the brush elements are interleaved in the brush assembly. 6. The camera head of claim 3, wherein the brush element comprises a printed circuit board (PCB) and the electrical contacts are electrically conductive areas on the PCB. 7. The camera head of claim 6, wherein the electrically conductive areas on the PCB are circuit traces. 8. The camera head of claim 1, wherein the brush electrical contacts are coated with one or more of palladium, nickel, rhodium, and hard gold to decrease frictional contact erosion and/or corrosion. 9. The camera head of claim 1, wherein the cylindrical ring assembly includes one or more contact rings. 10. The camera head of claim 9, wherein the cylindrical ring assembly includes a plurality of contact rings and one or more dielectric separate rings. 11. The camera head of claim 10, further including a contact guide cap. 12. The camera head of claim 1, further comprising a lubricant disposed on a slip contact surface. 13. The camera head of claim 1, further comprising a grease or flypaper placed on internal surfaces to scavenge dirt and debris. 14. The camera head of claim 13, wherein the grease or flypaper is disposed on one or more contact surfaces of the slip ring. 15. The camera head of claim 1, wherein at least one of the electrical connections is soldered with a low temperature, compliant solder. 16. The camera head of claim 15, wherein the low temperate, compliant solder comprises one or more of Alpha WS-852, Indium Corp. alloys 281, and Indium Corp. alloys 282. 17. The camera head of claim 1, further comprising a desiccant material to remove moisture. 18. The camera head of claim 1, wherein the position of the rings and brushes are interchanged. 19. The camera head of claim 1, wherein the camera head includes one or more bearings. 20. The camera head of claim 19, wherein the bearing are ball bearings including ceramic balls. 21. The camera head of claim 1, wherein the rings are fabricated using an oven reflow soldering process. | Camera heads and associated rotating contact assemblies are disclosed. In one embodiment a slip-ring assembly includes a rotating contact assembly including slip rings having a cylindrical ring assembly and a flexible or bendable brush assembly. Brush elements may flexed to remain in contact with corresponding ring assembly electrical contacts. Bush contacts may be coated or have attached contact assemblies to increase hardness and oxide resistance with materials such as palladium nickel, rhodium, or hard gold, though a variety of other materials may be used as a suitable coating.1. A camera head, comprising:
a housing; an imager disposed within the housing on a first element movable relative to the housing; a second element rotationally movable relative to the first element, the second element including an electrical output connection; and a slip ring coupled between the first element and the second element to provide an electrical connection between an output of the imager and the electrical output connection, wherein the slip ring comprises: a cylindrical ring assembly including one or more ring electrical contacts; and a brush assembly disposed around the cylindrical ring assembly, the brush assembly including a brush element including a plurality of tines or fingers including electrical contacts, wherein one or more of the brush electrical contacts are positioned in contact with corresponding ones of the one or more ring electrical contacts. 2. The camera head of claim 1, further including a counterweight to self-level the imaging sensor via gravity. 3. The camera head of claim 1, wherein the brush assembly comprises a brush element, wherein the brush electrical contacts are on or within the brush element. 4. The camera head of claim 1, wherein the electrical contacts are electrical circuit traces on the tines or fingers. 5. The camera head of claim 3, wherein the fingers or tines of the brush elements are interleaved in the brush assembly. 6. The camera head of claim 3, wherein the brush element comprises a printed circuit board (PCB) and the electrical contacts are electrically conductive areas on the PCB. 7. The camera head of claim 6, wherein the electrically conductive areas on the PCB are circuit traces. 8. The camera head of claim 1, wherein the brush electrical contacts are coated with one or more of palladium, nickel, rhodium, and hard gold to decrease frictional contact erosion and/or corrosion. 9. The camera head of claim 1, wherein the cylindrical ring assembly includes one or more contact rings. 10. The camera head of claim 9, wherein the cylindrical ring assembly includes a plurality of contact rings and one or more dielectric separate rings. 11. The camera head of claim 10, further including a contact guide cap. 12. The camera head of claim 1, further comprising a lubricant disposed on a slip contact surface. 13. The camera head of claim 1, further comprising a grease or flypaper placed on internal surfaces to scavenge dirt and debris. 14. The camera head of claim 13, wherein the grease or flypaper is disposed on one or more contact surfaces of the slip ring. 15. The camera head of claim 1, wherein at least one of the electrical connections is soldered with a low temperature, compliant solder. 16. The camera head of claim 15, wherein the low temperate, compliant solder comprises one or more of Alpha WS-852, Indium Corp. alloys 281, and Indium Corp. alloys 282. 17. The camera head of claim 1, further comprising a desiccant material to remove moisture. 18. The camera head of claim 1, wherein the position of the rings and brushes are interchanged. 19. The camera head of claim 1, wherein the camera head includes one or more bearings. 20. The camera head of claim 19, wherein the bearing are ball bearings including ceramic balls. 21. The camera head of claim 1, wherein the rings are fabricated using an oven reflow soldering process. | 2,400 |
6,744 | 6,744 | 13,319,769 | 2,443 | The present invention relates to a method for assigning a network address to a first node in a network comprising a plurality of second nodes, the method comprising the steps of: (a) assigning a stochastic address to the first node, (b) the first node transmitting an announcement message to a first control device, (c) the first control device checking whether the assigned network address is available, and (d) upon detecting that the assigned address is not available, the first control device transmitting a message requesting the change of the assigned address | 1. A method for assigning a network address to a first node in a network comprising a plurality of second nodes, the method comprising:
assigning a stochastic address to the first node, transmitting, by the first node, an announcement message to a first control device, checking, by the first control device, whether the assigned network address is available, and upon detecting that the assigned address is not available, transmitting, by the first control device, a message requesting the change of the assigned address. 2. The method of claim 1, wherein the assigning comprises a parent node of the first node assigning the stochastic address to the first node, wherein the stochastic address is different from a list of already in use addresses stored by the parent node. 3. The method of claim 2, wherein, prior to the assigning, the first node submits a proposed network address, and wherein the parent node assigns the proposed network address as the assigned network address if the proposed network address is not included in the list of already in use addresses. 4. The method of claim 1, wherein the first node transmits the announcement message to the first control device by broadcasting the announcement message to all neighboring nodes. 5. The method of claim 1, wherein the network is subdivided in a plurality of sub-networks interconnected by means of at least one backbone, wherein each sub-network is coupled to the backbone by means of at least one dedicated control device, wherein the first node and the first control device belong to a first sub-network. 6. The method of claim 5, wherein the checking comprises
the first control device checking in a control device list of already in use addresses whether the assigned network address is included in this control device list, and upon failing to find the assigned network address in the control device list, submitting the network address to other control devices connected to the backbone. 7. The method of claim 6, wherein the checking further comprises the other control devices checking whether the assigned network address is included in their own control device list of already in use addresses. 8. The method of claim 7, wherein the first control device further comprises a list of available network addresses, and wherein the transmitting further comprises
the first control device selecting an available network address from the list of available network addresses, and transmitting the selected available network address with the message requesting the change of the assigned address. 9. The method of claim 8, further comprising the first node using the selected network address and broadcasting an announcement message to its neighbor nodes, said announcement message including the selected network address. 10. The method of claim 8, wherein each control device comprises respectively a list of available addresses. 11. The method of claim 10, wherein step the transmitting further comprises the first control device checking whether the number of remaining available network addresses in the list of available network addresses is below a threshold, and requesting the network a new list of available addresses. 12. (canceled) 13. A control device comprising communication means for communicating in a network comprising a plurality of nodes, the control device comprising
means for receiving an announcement message from a first node, said message including an assigned network address of the first node, checking means for checking whether the assigned network address is available, and transmitting means for, upon detecting that the assigned address is not available, transmitting to the first node a message requesting the change of the assigned address. 14. (canceled) 15. (canceled) | The present invention relates to a method for assigning a network address to a first node in a network comprising a plurality of second nodes, the method comprising the steps of: (a) assigning a stochastic address to the first node, (b) the first node transmitting an announcement message to a first control device, (c) the first control device checking whether the assigned network address is available, and (d) upon detecting that the assigned address is not available, the first control device transmitting a message requesting the change of the assigned address1. A method for assigning a network address to a first node in a network comprising a plurality of second nodes, the method comprising:
assigning a stochastic address to the first node, transmitting, by the first node, an announcement message to a first control device, checking, by the first control device, whether the assigned network address is available, and upon detecting that the assigned address is not available, transmitting, by the first control device, a message requesting the change of the assigned address. 2. The method of claim 1, wherein the assigning comprises a parent node of the first node assigning the stochastic address to the first node, wherein the stochastic address is different from a list of already in use addresses stored by the parent node. 3. The method of claim 2, wherein, prior to the assigning, the first node submits a proposed network address, and wherein the parent node assigns the proposed network address as the assigned network address if the proposed network address is not included in the list of already in use addresses. 4. The method of claim 1, wherein the first node transmits the announcement message to the first control device by broadcasting the announcement message to all neighboring nodes. 5. The method of claim 1, wherein the network is subdivided in a plurality of sub-networks interconnected by means of at least one backbone, wherein each sub-network is coupled to the backbone by means of at least one dedicated control device, wherein the first node and the first control device belong to a first sub-network. 6. The method of claim 5, wherein the checking comprises
the first control device checking in a control device list of already in use addresses whether the assigned network address is included in this control device list, and upon failing to find the assigned network address in the control device list, submitting the network address to other control devices connected to the backbone. 7. The method of claim 6, wherein the checking further comprises the other control devices checking whether the assigned network address is included in their own control device list of already in use addresses. 8. The method of claim 7, wherein the first control device further comprises a list of available network addresses, and wherein the transmitting further comprises
the first control device selecting an available network address from the list of available network addresses, and transmitting the selected available network address with the message requesting the change of the assigned address. 9. The method of claim 8, further comprising the first node using the selected network address and broadcasting an announcement message to its neighbor nodes, said announcement message including the selected network address. 10. The method of claim 8, wherein each control device comprises respectively a list of available addresses. 11. The method of claim 10, wherein step the transmitting further comprises the first control device checking whether the number of remaining available network addresses in the list of available network addresses is below a threshold, and requesting the network a new list of available addresses. 12. (canceled) 13. A control device comprising communication means for communicating in a network comprising a plurality of nodes, the control device comprising
means for receiving an announcement message from a first node, said message including an assigned network address of the first node, checking means for checking whether the assigned network address is available, and transmitting means for, upon detecting that the assigned address is not available, transmitting to the first node a message requesting the change of the assigned address. 14. (canceled) 15. (canceled) | 2,400 |
6,745 | 6,745 | 13,202,670 | 2,411 | A NodeB for a WCDMA system, arranged to transmit instructions to a UE for the UE's uplink transmissions. The NodeB is arranged to transmit the instructions on a dedicated downlink physical channel which the NodeB is arranged to use for transmissions to a plurality of UEs and which comprises a plurality of radio frames, where each radio frame comprises a number of slots and each slot comprises a number of WCDMA symbols. The instructions to the UE comprise Transmit Power Commands as well as other instructions to the UE for the UE's uplink transmissions. The NodeB is arranged to use a first WCDMA slot format for the TPC commands to the UE and a second WCDMA slot format for the other instructions to the UE. | 1. A NodeB for a WCDMA system, the NodeB being arranged to transmit instructions to a UE for the UE's uplink transmissions, the NodeB being arranged to transmit said instructions on a dedicated downlink physical channel which the NodeB is arranged to use for transmissions to a plurality of UEs and which comprises a plurality of radio frames, with each radio frame comprising a number of slots, each slot comprising a number of WCDMA symbols, the instructions to the UE comprising Transmit Power Commands, TPC commands as well as other instructions to the UE for the UE's uplink transmissions, the NodeB being arranged to use a first WCDMA slot format for the TPC commands to the UE and a second WCDMA slot format for the other instructions to the UE. 2. The NodeB of claim 1, being arranged to transmit instructions to more than one UE in one and the same WCDMA symbol. 3. The NodeB of claim 1, being arranged to transmit said other instructions to a UE over several slots, using said second WCDMA slot format. 4. The NodeB of claim 1, being arranged to use said second WCDMA slot format with a frequency which varies according to the UE's speed of movement, so that the ratio between the number of slots with TPC and said other instructions vary adaptively with the UE's speed of movement. 5. The NodeB of claim 1, in which the other instructions to a UE comprise instructions for uplink beam forming by the UE. 6. The NodeB of claim 1, in which the other instructions to a UE for the UE's uplink transmissions comprise instructions on the number of MIMO streams to be used by the UE in uplink MIMO transmissions. 7. The NodeB of claim 1, in which the dedicated downlink physical channel is the WCDMA F-DPCH channel. 8. A UE for a WCDMA system, the UE being arranged to receive instructions from a NodeB for uplink transmissions, the UE being arranged to receive said instructions on a dedicated downlink physical channel which is used by the NodeB for transmissions to a plurality of UEs and which comprises a plurality of radio frames, with each radio frame comprising a number of slots, each slot comprising a number of WCDMA symbols, the UE being arranged to use a certain slot format to interpret a slot, the instructions from the NodeB comprising Transmit Power Commands, TPC commands as well as other instructions for uplink transmissions, the UE being arranged to use a first WCDMA slot format to locate TPC commands and a second WCDMA slot format to locate the other instructions. 9. The UE of claim 8, being arranged to receive instructions which comprise a part of a WCDMA symbol. 10. The UE of claim 8, being arranged to receive said other instructions over several slots, using said second WCDMA slot format. 11. The UE of claim 8, in which the other instructions from the NodeB comprise instructions for uplink beam forming by the UE. 12. The UE of claim 8, in which the other instructions from the NodeB comprise instructions on the number of MIMO streams to be used by the UE in uplink MIMO transmissions. 13. The UE of claim 8, in which the dedicated downlink physical channel is the WCDMA F-DPCH channel. 14. A method for operating a NodeB for a WCDMA system, the method comprising transmitting instructions to a UE for the UE's uplink transmissions, and transmitting said instructions on a dedicated downlink physical channel which the NodeB is arranged to use for transmissions to a plurality of UEs and which comprises a plurality of radio frames, with each radio frame comprising a number of slots, each slot comprising a number of WCDMA symbols, the method further comprising including in the instructions to the UE Transmit Power Commands, TPC commands as well as other instructions for the UE's uplink transmissions, the method further comprising the use of a first WCDMA slot format for the TPC commands to the UE and a second WCDMA slot format for the other instructions to the UE. 15. The method of claim 14, comprising transmitting instructions to more than one UE in one and the same WCDMA symbol. 16. The method of claim 14, comprising transmitting said other instructions to a UE over several slots, using said second WCDMA slot format. 17. The method of claim 14, comprising using said second WCDMA slot format with a frequency which varies according to the UE's speed of movement, so that the ratio between the number of slots with TPC and said other instructions is varied adaptively with the UE's (120) speed of movement. 18. The method of claim 14, according to which the other instructions to a UE comprise instructions for uplink beam forming by the UE. 19. The method of claim 14, according to which the other instructions to a UE for the UE's uplink transmissions comprise instructions on the number of MIMO streams to be used by the UE in uplink MIMO transmissions. 20. A method for operating a UE for a WCDMA system, comprising receiving instructions from a NodeB for uplink transmissions, the instructions comprising Transmit Power Commands, TPC commands as well as other instructions for uplink transmissions, and receiving the instructions on a dedicated downlink physical channel which is used by the NodeB for transmissions to a plurality of UEs and which comprises a plurality of radio frames, with each radio frame comprising a number of slots, each slot comprising a number of WCDMA symbols, the method comprising using a certain slot format to interpret a received slot, the method comprising using a first WCDMA slot format to locate TPC commands and a second WCDMA slot format to locate the other instructions. 21. The method of claim 20, comprising receiving instructions which comprise less than an entire WCDMA symbol. 22. The method of claim 20, comprising receiving said other instructions over several slots, using said second WCDMA slot format. 23. The method of claim 20, according to which the other instructions from the NodeB comprise instructions for uplink beam forming by the UE. 24. The method of claim 20, according to which the other instructions from the NodeB comprise instructions on the number of MIMO streams to be used by the UE in uplink MIMO transmissions. 25. The method of claim 20, according to which the dedicated downlink physical channel is the WCDMA F-DPCH channel. | A NodeB for a WCDMA system, arranged to transmit instructions to a UE for the UE's uplink transmissions. The NodeB is arranged to transmit the instructions on a dedicated downlink physical channel which the NodeB is arranged to use for transmissions to a plurality of UEs and which comprises a plurality of radio frames, where each radio frame comprises a number of slots and each slot comprises a number of WCDMA symbols. The instructions to the UE comprise Transmit Power Commands as well as other instructions to the UE for the UE's uplink transmissions. The NodeB is arranged to use a first WCDMA slot format for the TPC commands to the UE and a second WCDMA slot format for the other instructions to the UE.1. A NodeB for a WCDMA system, the NodeB being arranged to transmit instructions to a UE for the UE's uplink transmissions, the NodeB being arranged to transmit said instructions on a dedicated downlink physical channel which the NodeB is arranged to use for transmissions to a plurality of UEs and which comprises a plurality of radio frames, with each radio frame comprising a number of slots, each slot comprising a number of WCDMA symbols, the instructions to the UE comprising Transmit Power Commands, TPC commands as well as other instructions to the UE for the UE's uplink transmissions, the NodeB being arranged to use a first WCDMA slot format for the TPC commands to the UE and a second WCDMA slot format for the other instructions to the UE. 2. The NodeB of claim 1, being arranged to transmit instructions to more than one UE in one and the same WCDMA symbol. 3. The NodeB of claim 1, being arranged to transmit said other instructions to a UE over several slots, using said second WCDMA slot format. 4. The NodeB of claim 1, being arranged to use said second WCDMA slot format with a frequency which varies according to the UE's speed of movement, so that the ratio between the number of slots with TPC and said other instructions vary adaptively with the UE's speed of movement. 5. The NodeB of claim 1, in which the other instructions to a UE comprise instructions for uplink beam forming by the UE. 6. The NodeB of claim 1, in which the other instructions to a UE for the UE's uplink transmissions comprise instructions on the number of MIMO streams to be used by the UE in uplink MIMO transmissions. 7. The NodeB of claim 1, in which the dedicated downlink physical channel is the WCDMA F-DPCH channel. 8. A UE for a WCDMA system, the UE being arranged to receive instructions from a NodeB for uplink transmissions, the UE being arranged to receive said instructions on a dedicated downlink physical channel which is used by the NodeB for transmissions to a plurality of UEs and which comprises a plurality of radio frames, with each radio frame comprising a number of slots, each slot comprising a number of WCDMA symbols, the UE being arranged to use a certain slot format to interpret a slot, the instructions from the NodeB comprising Transmit Power Commands, TPC commands as well as other instructions for uplink transmissions, the UE being arranged to use a first WCDMA slot format to locate TPC commands and a second WCDMA slot format to locate the other instructions. 9. The UE of claim 8, being arranged to receive instructions which comprise a part of a WCDMA symbol. 10. The UE of claim 8, being arranged to receive said other instructions over several slots, using said second WCDMA slot format. 11. The UE of claim 8, in which the other instructions from the NodeB comprise instructions for uplink beam forming by the UE. 12. The UE of claim 8, in which the other instructions from the NodeB comprise instructions on the number of MIMO streams to be used by the UE in uplink MIMO transmissions. 13. The UE of claim 8, in which the dedicated downlink physical channel is the WCDMA F-DPCH channel. 14. A method for operating a NodeB for a WCDMA system, the method comprising transmitting instructions to a UE for the UE's uplink transmissions, and transmitting said instructions on a dedicated downlink physical channel which the NodeB is arranged to use for transmissions to a plurality of UEs and which comprises a plurality of radio frames, with each radio frame comprising a number of slots, each slot comprising a number of WCDMA symbols, the method further comprising including in the instructions to the UE Transmit Power Commands, TPC commands as well as other instructions for the UE's uplink transmissions, the method further comprising the use of a first WCDMA slot format for the TPC commands to the UE and a second WCDMA slot format for the other instructions to the UE. 15. The method of claim 14, comprising transmitting instructions to more than one UE in one and the same WCDMA symbol. 16. The method of claim 14, comprising transmitting said other instructions to a UE over several slots, using said second WCDMA slot format. 17. The method of claim 14, comprising using said second WCDMA slot format with a frequency which varies according to the UE's speed of movement, so that the ratio between the number of slots with TPC and said other instructions is varied adaptively with the UE's (120) speed of movement. 18. The method of claim 14, according to which the other instructions to a UE comprise instructions for uplink beam forming by the UE. 19. The method of claim 14, according to which the other instructions to a UE for the UE's uplink transmissions comprise instructions on the number of MIMO streams to be used by the UE in uplink MIMO transmissions. 20. A method for operating a UE for a WCDMA system, comprising receiving instructions from a NodeB for uplink transmissions, the instructions comprising Transmit Power Commands, TPC commands as well as other instructions for uplink transmissions, and receiving the instructions on a dedicated downlink physical channel which is used by the NodeB for transmissions to a plurality of UEs and which comprises a plurality of radio frames, with each radio frame comprising a number of slots, each slot comprising a number of WCDMA symbols, the method comprising using a certain slot format to interpret a received slot, the method comprising using a first WCDMA slot format to locate TPC commands and a second WCDMA slot format to locate the other instructions. 21. The method of claim 20, comprising receiving instructions which comprise less than an entire WCDMA symbol. 22. The method of claim 20, comprising receiving said other instructions over several slots, using said second WCDMA slot format. 23. The method of claim 20, according to which the other instructions from the NodeB comprise instructions for uplink beam forming by the UE. 24. The method of claim 20, according to which the other instructions from the NodeB comprise instructions on the number of MIMO streams to be used by the UE in uplink MIMO transmissions. 25. The method of claim 20, according to which the dedicated downlink physical channel is the WCDMA F-DPCH channel. | 2,400 |
6,746 | 6,746 | 14,247,654 | 2,414 | The present invention provides a method for transmitting messages in a telecommunications network, in which a first message service and a second message service are available. Dedicated messages of the first message service are sent, using messages of the second message service. The method of the present invention has the particular advantage, that an optimized transmission scheme can be maintained for the dedicated messages of the first message service, | 1. A method for transmitting multimedia messages of a multimedia message service using short messages of a short message service in a telecommunications network, the method comprising:
embedding a multimedia message within a data portion of a short message, the data portion following a header portion of the short message; including in said short message a first identifier indicating that said multimedia message is present in said data portion; including in the data portion of the short message a second identifier indicating a type of said multimedia message; and transmitting the short message to a receiver. 2. The method of claim 14, wherein the first identifier is included in the header portion of the short message. 3. The method of claim 14, wherein the first identifier is included in the data portion of the short message. 4. The method of claim 14, wherein the first identifier and the second identifier are included in a user data header of the data portion. 5. The method of claim 14, wherein the first identifier, the second identifier and the multimedia message are included in a user data header of the data portion. 6. The method of claim 14, wherein the multimedia message service is MMS. 7. The method of claim 14, wherein the multimedia message is selected from a predefined group of MMS messages. 8. The method of claim 20, wherein the predefined group of MMS messages comprises MMS notification messages, MMS session establishment messages, MMS session establishment receipt messages, MMS notification-query messages, MMS acknowledgement messages, and MMS pull-push messages. 9. The method of claim 14, wherein the short message service is SMS. 10. The method of claim 14, wherein the receiver is at least a portion of: a cellular phone, a short message service center, or an MMS relay. 11. A transmitter capable of transmitting multimedia messages of a multimedia message service using short messages of a short message service in a telecommunications network, wherein the transmitter is configured to:
embed a multimedia message within a data portion of a short message, the data portion following a header portion of the short message; include in said short message a first identifier indicating that said multimedia message is present in said data portion; include in the data portion of the short message a second identifier indicating a type of said multimedia message; and transmit the short message to a receiver. 12. The transmitter of claim 11, wherein the first identifier is included in the header portion of the short message. 13. The transmitter of claim 11, wherein the first identifier is included in the data portion of the short message. 14. The transmitter of claim 11, wherein the first identifier and the second identifier are included in a user data header of the data portion. 15. The transmitter of claim 11, wherein the first identifier, the second identifier and the multimedia message are included in a user data header of the data portion. 16. The transmitter of claim 11, wherein the multimedia message service is MMS. 17. The transmitter of claim 11, wherein the multimedia message is selected from a predefined group of MMS messages. 18. The transmitter of claim 17, wherein the predefined group of MMS messages comprises MMS notification messages, MMS session establishment messages, MMS session establishment receipt messages, MMS notification-query messages, MMS acknowledgement messages, and MMS pull-push messages. 19. The transmitter of claim 11, wherein the short message service is SMS. 20. The transmitter of claim 11, wherein the receiver is at least a portion of: a cellular phone, a short message service center or an MMS relay. | The present invention provides a method for transmitting messages in a telecommunications network, in which a first message service and a second message service are available. Dedicated messages of the first message service are sent, using messages of the second message service. The method of the present invention has the particular advantage, that an optimized transmission scheme can be maintained for the dedicated messages of the first message service,1. A method for transmitting multimedia messages of a multimedia message service using short messages of a short message service in a telecommunications network, the method comprising:
embedding a multimedia message within a data portion of a short message, the data portion following a header portion of the short message; including in said short message a first identifier indicating that said multimedia message is present in said data portion; including in the data portion of the short message a second identifier indicating a type of said multimedia message; and transmitting the short message to a receiver. 2. The method of claim 14, wherein the first identifier is included in the header portion of the short message. 3. The method of claim 14, wherein the first identifier is included in the data portion of the short message. 4. The method of claim 14, wherein the first identifier and the second identifier are included in a user data header of the data portion. 5. The method of claim 14, wherein the first identifier, the second identifier and the multimedia message are included in a user data header of the data portion. 6. The method of claim 14, wherein the multimedia message service is MMS. 7. The method of claim 14, wherein the multimedia message is selected from a predefined group of MMS messages. 8. The method of claim 20, wherein the predefined group of MMS messages comprises MMS notification messages, MMS session establishment messages, MMS session establishment receipt messages, MMS notification-query messages, MMS acknowledgement messages, and MMS pull-push messages. 9. The method of claim 14, wherein the short message service is SMS. 10. The method of claim 14, wherein the receiver is at least a portion of: a cellular phone, a short message service center, or an MMS relay. 11. A transmitter capable of transmitting multimedia messages of a multimedia message service using short messages of a short message service in a telecommunications network, wherein the transmitter is configured to:
embed a multimedia message within a data portion of a short message, the data portion following a header portion of the short message; include in said short message a first identifier indicating that said multimedia message is present in said data portion; include in the data portion of the short message a second identifier indicating a type of said multimedia message; and transmit the short message to a receiver. 12. The transmitter of claim 11, wherein the first identifier is included in the header portion of the short message. 13. The transmitter of claim 11, wherein the first identifier is included in the data portion of the short message. 14. The transmitter of claim 11, wherein the first identifier and the second identifier are included in a user data header of the data portion. 15. The transmitter of claim 11, wherein the first identifier, the second identifier and the multimedia message are included in a user data header of the data portion. 16. The transmitter of claim 11, wherein the multimedia message service is MMS. 17. The transmitter of claim 11, wherein the multimedia message is selected from a predefined group of MMS messages. 18. The transmitter of claim 17, wherein the predefined group of MMS messages comprises MMS notification messages, MMS session establishment messages, MMS session establishment receipt messages, MMS notification-query messages, MMS acknowledgement messages, and MMS pull-push messages. 19. The transmitter of claim 11, wherein the short message service is SMS. 20. The transmitter of claim 11, wherein the receiver is at least a portion of: a cellular phone, a short message service center or an MMS relay. | 2,400 |
6,747 | 6,747 | 14,962,251 | 2,495 | A method and a system for controlling a virtual environment of a user, e.g., a child is provided. In the virtual environment, users are able to interact with other users using messages. Each message is made up of one or more items contained in a dictionary. Information is transmitted, e.g., by email, to an agent, e.g., a parent. The transmitted information is information that may be used to authorize the agent to control the virtual environment of the user. The virtual environment of the user is controlled by setting a level of interaction at which the user is permitted to interact with others. The messages may include pre-written messages and messages composed by a user using items contained in the dictionary. A message checker bars unsuitable combinations made up of items contained in the dictionary. Inappropriate language and personally identifiable information may be excluded from the contents of the messages. | 1-36. (canceled) 37. A method comprising:
providing a virtual environment in which users interact with one another using system-generated prewritten messages and user-generated messages; transmitting information to an agent; receiving from the agent a return transmission of the information to authorize the agent to control the virtual environment of a first one of the users; and controlling the virtual environment of the first user based on additional information received from the agent setting a permitted level of the first user's interaction with other users, the level of interaction determining whether the first user can use the user-generated messages, the user-generated messages being assembled by the first user using only items contained in a system permissible items dictionary. 38. A method according to claim 37, further comprising:
checking user-generated messages using a message checker to prevent communication of user-generated messages comprising predetermined combinations of items from the system permissible items dictionary. 39. A method according to claim 38, wherein the system dictionary and the message checker exclude user-generated messages permitting personal identification of the first user and content deemed inappropriate for the user based on the user's age. 40. A method according to claim 37, wherein the information is transmitted to the agent by email. 41. A method according to claim 38, wherein the level of permitted interaction can be set to an enhanced level at which the first user may communicate with only selected others of the users using user-generated messages and a higher level at which the user may communicate with all other users using user-generated messages. 42. A method according to claim 41, further comprising one of:
selecting selected at least a second one of the users with which the first user is permitted to communicate at the enhanced level; and selecting a third one of the users to be barred from communication with the user at the enhanced level. 43. A method according to claim 38, wherein the level of permitted interaction can be set to one of a first level at which no other users are permitted to enter a virtual space designated for the first user, a second level at which only selected ones of the other users are permitted to enter the virtual space designated for the first user, and a third level at which all other users are permitted to enter the virtual space designated for the first user. 44. A method according to claim 43, further comprising at least one of:
selecting a second one of the users to be permitted to enter the virtual space designated for the first user at the second level; and selecting a third one of the users to be barred from entering the virtual space designated for the first user. 45. A method according to claim 41, wherein only the agent is authorized to set the level of permitted interaction to the second or third level. 46. A method according to claim 43, wherein only the agent is authorized to set the level of permitted interaction to the third level. 47. A method according to claim 37, wherein the first user is a child and the agent is a parent of the child. 48. A system comprising:
a virtual environment in which a first user is permitted to interact with other users using messages; a system dictionary containing items that can be used to form the messages, wherein the permissible items include system-generated prewritten messages and a group of permissible items which may be assembled by the first user to form user-generated messages, the user-generated messages being permitted to include only items selected from the group of permissible items; first transmission means for transmitting information to an agent; an authorization module receiving from the agent a return transmission of the information to authorize the agent to control the virtual environment of the first user; and control means controlling the virtual environment of the first user based on additional information received from the agent setting a permitted level of the first user's interaction with other users, the level of interaction comprising a selection of whether the first user can use the user-generated messages. 49. A system according to claim 48, further comprising:
a message checker that prevents communication of user-generated messages comprising predetermined combinations of items selected from the group of permissible items. 50. A system according to claim 49, wherein the message checker prevents communication of user-generated messages permitting personal identification of the first user and content deemed inappropriate for the first user based on an age of the first user. 51. A system according to claim 48, wherein the information is transmitted to the agent by email. 52. A system according to claim 49, wherein the level of permitted interaction can be set to one of an enhanced level at which the first user may communicate with only selected other users using user-generated messages and a higher level at which the first user may communicate with all other users using user-generated messages. 53. A system according to claim 52, further comprising:
selection means for at least one of selecting other users to be permitted to enter a virtual space designated for the first user at the second level and selecting at least one other user to be barred from entering the virtual space designated for the first user. 54. A system according to claim 52, wherein the level of permitted interaction can be set to one of a first level at which no other users are permitted to enter a virtual space designated for the first user, a second level at which only selected other users are permitted to enter the virtual space designated for the first user, and a third level at which all other users are permitted to enter the virtual space designated for the first user. 55. A system according to claim 54, further comprising:
selection means for one of selecting other users to be permitted to enter the virtual space designated for the first user at the second level and selecting other users to be barred from entering the virtual space designated for the first user. 56. A system according to claim 52, wherein only the agent is authorized to set the level of communication to the second or third level. 57. A system according to claim 54, wherein only the agent is authorized to set the level of interaction to third level. 58. A system according to claim 48, wherein the first user is a child and the agent is a parent of the child. | A method and a system for controlling a virtual environment of a user, e.g., a child is provided. In the virtual environment, users are able to interact with other users using messages. Each message is made up of one or more items contained in a dictionary. Information is transmitted, e.g., by email, to an agent, e.g., a parent. The transmitted information is information that may be used to authorize the agent to control the virtual environment of the user. The virtual environment of the user is controlled by setting a level of interaction at which the user is permitted to interact with others. The messages may include pre-written messages and messages composed by a user using items contained in the dictionary. A message checker bars unsuitable combinations made up of items contained in the dictionary. Inappropriate language and personally identifiable information may be excluded from the contents of the messages.1-36. (canceled) 37. A method comprising:
providing a virtual environment in which users interact with one another using system-generated prewritten messages and user-generated messages; transmitting information to an agent; receiving from the agent a return transmission of the information to authorize the agent to control the virtual environment of a first one of the users; and controlling the virtual environment of the first user based on additional information received from the agent setting a permitted level of the first user's interaction with other users, the level of interaction determining whether the first user can use the user-generated messages, the user-generated messages being assembled by the first user using only items contained in a system permissible items dictionary. 38. A method according to claim 37, further comprising:
checking user-generated messages using a message checker to prevent communication of user-generated messages comprising predetermined combinations of items from the system permissible items dictionary. 39. A method according to claim 38, wherein the system dictionary and the message checker exclude user-generated messages permitting personal identification of the first user and content deemed inappropriate for the user based on the user's age. 40. A method according to claim 37, wherein the information is transmitted to the agent by email. 41. A method according to claim 38, wherein the level of permitted interaction can be set to an enhanced level at which the first user may communicate with only selected others of the users using user-generated messages and a higher level at which the user may communicate with all other users using user-generated messages. 42. A method according to claim 41, further comprising one of:
selecting selected at least a second one of the users with which the first user is permitted to communicate at the enhanced level; and selecting a third one of the users to be barred from communication with the user at the enhanced level. 43. A method according to claim 38, wherein the level of permitted interaction can be set to one of a first level at which no other users are permitted to enter a virtual space designated for the first user, a second level at which only selected ones of the other users are permitted to enter the virtual space designated for the first user, and a third level at which all other users are permitted to enter the virtual space designated for the first user. 44. A method according to claim 43, further comprising at least one of:
selecting a second one of the users to be permitted to enter the virtual space designated for the first user at the second level; and selecting a third one of the users to be barred from entering the virtual space designated for the first user. 45. A method according to claim 41, wherein only the agent is authorized to set the level of permitted interaction to the second or third level. 46. A method according to claim 43, wherein only the agent is authorized to set the level of permitted interaction to the third level. 47. A method according to claim 37, wherein the first user is a child and the agent is a parent of the child. 48. A system comprising:
a virtual environment in which a first user is permitted to interact with other users using messages; a system dictionary containing items that can be used to form the messages, wherein the permissible items include system-generated prewritten messages and a group of permissible items which may be assembled by the first user to form user-generated messages, the user-generated messages being permitted to include only items selected from the group of permissible items; first transmission means for transmitting information to an agent; an authorization module receiving from the agent a return transmission of the information to authorize the agent to control the virtual environment of the first user; and control means controlling the virtual environment of the first user based on additional information received from the agent setting a permitted level of the first user's interaction with other users, the level of interaction comprising a selection of whether the first user can use the user-generated messages. 49. A system according to claim 48, further comprising:
a message checker that prevents communication of user-generated messages comprising predetermined combinations of items selected from the group of permissible items. 50. A system according to claim 49, wherein the message checker prevents communication of user-generated messages permitting personal identification of the first user and content deemed inappropriate for the first user based on an age of the first user. 51. A system according to claim 48, wherein the information is transmitted to the agent by email. 52. A system according to claim 49, wherein the level of permitted interaction can be set to one of an enhanced level at which the first user may communicate with only selected other users using user-generated messages and a higher level at which the first user may communicate with all other users using user-generated messages. 53. A system according to claim 52, further comprising:
selection means for at least one of selecting other users to be permitted to enter a virtual space designated for the first user at the second level and selecting at least one other user to be barred from entering the virtual space designated for the first user. 54. A system according to claim 52, wherein the level of permitted interaction can be set to one of a first level at which no other users are permitted to enter a virtual space designated for the first user, a second level at which only selected other users are permitted to enter the virtual space designated for the first user, and a third level at which all other users are permitted to enter the virtual space designated for the first user. 55. A system according to claim 54, further comprising:
selection means for one of selecting other users to be permitted to enter the virtual space designated for the first user at the second level and selecting other users to be barred from entering the virtual space designated for the first user. 56. A system according to claim 52, wherein only the agent is authorized to set the level of communication to the second or third level. 57. A system according to claim 54, wherein only the agent is authorized to set the level of interaction to third level. 58. A system according to claim 48, wherein the first user is a child and the agent is a parent of the child. | 2,400 |
6,748 | 6,748 | 14,339,527 | 2,495 | Methods and apparatus for generation of session audit log displays are disclosed. Audit log data is captured in association with at least one session in a computerized system. A video presentation is generated based on the captured audio log data. A video presentation of at least a part of the at least one session can then be displayed based on the generated data. | 1. A method comprising:
obtaining audit log data captured in association with at least one session in a computerized system, generating data for a video presentation based on the captured audio log data, and causing display of the video presentation of at least a part of the at least one session based on the generated data. 2. The method of claim 1, comprising selecting a session from a plurality of sessions. 3. The method of claim 1, comprising highlighting search terms used for finding or selecting a session for the video presentation. 4. The method of claim 1, comprising timing the video presentation according to timing of events taking place in an original session. 5. The method of claim 1, comprising compressing periods of inactivity in the video presentation. 6. The method of claim 1, causing presentation of duplicates of earlier video frames during periods of inactivity in the video presentation. 7. The method of claim 1, comprising obtaining audit log data for at least one of a Secure Shell (SSH) session, a Remote Desktop (RDP) session and an encrypted session protocol session. 8. The method of claim 1, comprising causing display of a web page incorporating the video presentation. 9. The method of claim 1, comprising capturing the audit log data by capturing data associated with an encrypted protocol session where a graphical protocol is used for generating displays, and causing reproduction of the displays as a video presentation based on the generated data. 10. The method of claim 1, comprising processing graphical data by Optical Character Recognition (OCR) to extract one or more text segments from at least one display and/or indexing text segments from one or more captured sessions for fast searching. 11. The method of claim 1, wherein the audit log data is captured by a data capture entity provided in a node of the computerized system. 12. The method of claim 11, comprising capturing the data by a man-in-the middle attack or by a bastion host. 13. The method of claim 1, comprising
capturing encrypted data, and decryption of the captured data based on at least one key from a database. 14. The method of claim 1, wherein said captured audit log data is stored in a searchable data store. 15. The method of claim 1, wherein the captured audit log data for a session comprises at least one of
at least a portion of content associated with the session, a timestamp when a particular portion of content associated with the session was transmitted, characters input by a user in association with the session, metadata about the session, and information about the perplexity of the session. 16. The method of claim 1, comprising generating the video presentation by generating images of displays during the session based on the captured audit log data and encoding the generated images as video frames into a video stream. 17. A method comprising:
receiving a request for a video representation of at least a part of a session, reading audit log data captured for the session from a storage, extracting content associated with the session, processing the extracted content through an emulator to produce frame images indicative of events during the session to generate a video stream, and p1 causing the video stream to be displayed by a user interface of the requestor. 18. A method according to claim 17, comprising generating sound and/or visual effects that coincide user actions during the session and/or points of interest in the video presentation. 19. A method according to claim 17, comprising initiating generation of the video presentation during the session. 20. An apparatus for a computerized system comprising at least one processor, and at least one memory including computer program code, wherein the at least one memory and the computer program code are configured, with the at least one processor, to cause the apparatus to
receive audit log data captured in association with at least one session in the computerized system, generate data for a video presentation based on the captured audio log data, and cause display of the video presentation of at least a part of the at least one session based on the generated data. 21. The apparatus of claim 20, configured further to at least one of
time the video presentation according to timing of events taking place in an original session, compress periods of inactivity in the video presentation, cause presentation of duplicates of earlier video frames during periods of inactivity in the video presentation, cause display of a web page incorporating the video presentation, generate sound and/or visual effects that coincide user actions during the session, generate sound and/or visual effects that coincide with points of interest in the video presentation, and initiate generation of the video presentation during the session. 22. The apparatus of claim 20, wherein the audit log data is captured from an encrypted protocol session where a graphical protocol is used for generating displays, the apparatus being configured to reproduce the displays as a video presentation based on the generated data. 23. The apparatus of claim 20, comprising a data capture entity that is separate from a terminal involved in the session. 24. The apparatus of claim 23, wherein the data capture entity is configured to provide a man-in-the middle attack or a bastion host to capture the audit log data. 25. The apparatus of claim 23, configured to capture encrypted data and decrypt the captured data based on at least one key obtained from a database. 26. The apparatus of claim 20, comprising a searchable data store for storage of said captured audit log data. 27. The apparatus of claim 20, configured to generate the video presentation based on generation of images of displays during the session based on the captured audit log data and encoding of the generated images as video frames into a video stream. 28. The apparatus of claim 20, configured to
receive a request for the video representation associated with a session, read audit log data captured for the session from a storage, process information extracted from the audio log data through an emulator to produce at least one frame image indicative of events during the session to generate a video stream, and cause the video stream to be displayed by a user interface of the requestor. 29. A non-transitory computer readable media, comprising program code for causing a processor to perform instructions for a method comprising:
obtaining audit log data captured in association with at least one session in a computerized system, generating data for a video presentation based on the captured audio log data, and causing display of the video presentation of at least a part of the at least one session based on the generated data. | Methods and apparatus for generation of session audit log displays are disclosed. Audit log data is captured in association with at least one session in a computerized system. A video presentation is generated based on the captured audio log data. A video presentation of at least a part of the at least one session can then be displayed based on the generated data.1. A method comprising:
obtaining audit log data captured in association with at least one session in a computerized system, generating data for a video presentation based on the captured audio log data, and causing display of the video presentation of at least a part of the at least one session based on the generated data. 2. The method of claim 1, comprising selecting a session from a plurality of sessions. 3. The method of claim 1, comprising highlighting search terms used for finding or selecting a session for the video presentation. 4. The method of claim 1, comprising timing the video presentation according to timing of events taking place in an original session. 5. The method of claim 1, comprising compressing periods of inactivity in the video presentation. 6. The method of claim 1, causing presentation of duplicates of earlier video frames during periods of inactivity in the video presentation. 7. The method of claim 1, comprising obtaining audit log data for at least one of a Secure Shell (SSH) session, a Remote Desktop (RDP) session and an encrypted session protocol session. 8. The method of claim 1, comprising causing display of a web page incorporating the video presentation. 9. The method of claim 1, comprising capturing the audit log data by capturing data associated with an encrypted protocol session where a graphical protocol is used for generating displays, and causing reproduction of the displays as a video presentation based on the generated data. 10. The method of claim 1, comprising processing graphical data by Optical Character Recognition (OCR) to extract one or more text segments from at least one display and/or indexing text segments from one or more captured sessions for fast searching. 11. The method of claim 1, wherein the audit log data is captured by a data capture entity provided in a node of the computerized system. 12. The method of claim 11, comprising capturing the data by a man-in-the middle attack or by a bastion host. 13. The method of claim 1, comprising
capturing encrypted data, and decryption of the captured data based on at least one key from a database. 14. The method of claim 1, wherein said captured audit log data is stored in a searchable data store. 15. The method of claim 1, wherein the captured audit log data for a session comprises at least one of
at least a portion of content associated with the session, a timestamp when a particular portion of content associated with the session was transmitted, characters input by a user in association with the session, metadata about the session, and information about the perplexity of the session. 16. The method of claim 1, comprising generating the video presentation by generating images of displays during the session based on the captured audit log data and encoding the generated images as video frames into a video stream. 17. A method comprising:
receiving a request for a video representation of at least a part of a session, reading audit log data captured for the session from a storage, extracting content associated with the session, processing the extracted content through an emulator to produce frame images indicative of events during the session to generate a video stream, and p1 causing the video stream to be displayed by a user interface of the requestor. 18. A method according to claim 17, comprising generating sound and/or visual effects that coincide user actions during the session and/or points of interest in the video presentation. 19. A method according to claim 17, comprising initiating generation of the video presentation during the session. 20. An apparatus for a computerized system comprising at least one processor, and at least one memory including computer program code, wherein the at least one memory and the computer program code are configured, with the at least one processor, to cause the apparatus to
receive audit log data captured in association with at least one session in the computerized system, generate data for a video presentation based on the captured audio log data, and cause display of the video presentation of at least a part of the at least one session based on the generated data. 21. The apparatus of claim 20, configured further to at least one of
time the video presentation according to timing of events taking place in an original session, compress periods of inactivity in the video presentation, cause presentation of duplicates of earlier video frames during periods of inactivity in the video presentation, cause display of a web page incorporating the video presentation, generate sound and/or visual effects that coincide user actions during the session, generate sound and/or visual effects that coincide with points of interest in the video presentation, and initiate generation of the video presentation during the session. 22. The apparatus of claim 20, wherein the audit log data is captured from an encrypted protocol session where a graphical protocol is used for generating displays, the apparatus being configured to reproduce the displays as a video presentation based on the generated data. 23. The apparatus of claim 20, comprising a data capture entity that is separate from a terminal involved in the session. 24. The apparatus of claim 23, wherein the data capture entity is configured to provide a man-in-the middle attack or a bastion host to capture the audit log data. 25. The apparatus of claim 23, configured to capture encrypted data and decrypt the captured data based on at least one key obtained from a database. 26. The apparatus of claim 20, comprising a searchable data store for storage of said captured audit log data. 27. The apparatus of claim 20, configured to generate the video presentation based on generation of images of displays during the session based on the captured audit log data and encoding of the generated images as video frames into a video stream. 28. The apparatus of claim 20, configured to
receive a request for the video representation associated with a session, read audit log data captured for the session from a storage, process information extracted from the audio log data through an emulator to produce at least one frame image indicative of events during the session to generate a video stream, and cause the video stream to be displayed by a user interface of the requestor. 29. A non-transitory computer readable media, comprising program code for causing a processor to perform instructions for a method comprising:
obtaining audit log data captured in association with at least one session in a computerized system, generating data for a video presentation based on the captured audio log data, and causing display of the video presentation of at least a part of the at least one session based on the generated data. | 2,400 |
6,749 | 6,749 | 12,888,221 | 2,477 | Certain aspects of the present disclosure present medium access control (MAC) protocols for uplink Spatial Division Multiple Access (SDMA) transmissions by one or more stations (STAs). An access point (AP) may receive one or more requests for uplink SDMA transmission from a plurality of stations. The access point may schedule the transmissions by sending a signal to the stations to notify them of the parameters of the uplink SDMA transmissions such as start time, duration of the transmission, spatial streams assigned to each station, and so on. | 1. A method for wireless communications, comprising:
receiving, from one or more apparatuses, one or more request messages for a transmission slot for a spatial division multiple access (SDMA) transmission; and transmitting a transmit opportunity (TXOP) start frame to one or more of the apparatuses to indicate start of a SDMA TXOP. 2. The method of claim 1, wherein the transmitting comprises:
determining an amount of resource requested by each of the apparatuses that sent the request messages; and transmitting the TXOP start frame if the amount of resource is greater than or equal to a threshold value. 3. The method of claim 1, wherein the TXOP start frame comprises an indication of the apparatuses that are scheduled to transmit during the SDMA TXOP, and one or more spatial streams assigned to each of the apparatuses. 4. The method of claim 1, wherein the TXOP start frame comprises an indication of duration of the SDMA TXOP. 5. The method of claim 1, further comprising:
transmitting one or more acknowledgement frames to the one or more apparatuses to acknowledge reception of one or more SDMA transmissions, wherein the acknowledgement frames are sent sequentially. 6. The method of claim 5, wherein the acknowledgement frames are sent if a short inter-frame space (SIFS) time is passed after end of the SDMA TXOP. 7. The method of claim 6, wherein the acknowledgement frames are separated with SIFS durations. 8. The method of claim 1, further comprising:
receiving one or more SDMA transmissions from the apparatuses according to the TXOP start frame, wherein at least one of the SDMA transmissions comprises an indication of an acknowledgement policy that does not require immediate transmission of an acknowledgement frame. 9. A method for wireless communications, comprising:
transmitting a request message for a transmission slot for a spatial division multiple access (SDMA) transmission; receiving a transmit opportunity (TXOP) start frame comprising an indication of start of a SDMA transmission; and transmitting SDMA data during a TXOP in accordance with the TXOP start frame. 10. The method of claim 9, wherein the transmitting the SDMA data comprises:
transmitting the SDMA data on one or more spatial streams utilizing an assigned duration for the TXOP, wherein the spatial streams and the assigned duration are received in the TXOP start frame. 11. The method of claim 9, wherein the SDMA data comprises an indication of an acknowledgement policy that does not require immediate transmission of an acknowledgement frame. 12. The method of claim 11, wherein the SDMA data comprises one or more Block Acknowledgement Request (BAR) frames. 13. The method of claim 9, further comprising:
transmitting a request for acknowledgement after transmission of the SDMA data. 14. The method of claim 13, wherein the request for acknowledgement is transmitted after a back-off timer expires, wherein the TXOP start frame comprises a value for the back-off timer. 15. The method of claim 9, wherein the SDMA data comprises one or more medium access control protocol data units (MPDUs). 16. An apparatus for wireless communications, comprising:
a receiver configured to receive, from one or more apparatuses, one or more request messages for a transmission slot for a spatial division multiple access (SDMA) transmission; and a transmitter configured to transmit a transmit opportunity (TXOP) start frame to one or more of the apparatuses to indicate start of a SDMA TXOP. 17. The apparatus of claim 16, further comprising:
circuit configured to determine an amount of resource requested by each of the apparatuses that sent the request messages, wherein the transmitter is further configured to transmit the TXOP start frame if the amount of resource is greater than or equal to a threshold value. 18. The apparatus of claim 16, wherein the TXOP start frame comprises an indication of the apparatuses that are scheduled to transmit during the SDMA TXOP, and one or more spatial streams assigned to each of the apparatuses. 19. The apparatus of claim 16, wherein the TXOP start frame comprises an indication of duration of the SDMA TXOP. 20. The apparatus of claim 16, wherein the transmitter is further configured to transmit one or more acknowledgement frames to the one or more apparatuses to acknowledge reception of one or more SDMA transmissions, wherein the acknowledgement frames are sent sequentially. 21. The apparatus of claim 20, wherein the acknowledgement frames are sent if a short inter-frame space (SIFS) time is passed after end of the SDMA TXOP. 22. The apparatus of claim 21, wherein the acknowledgement frames are separated with SIFS durations. 23. The apparatus of claim 16, wherein the receiver is further configured to receive one or more SDMA transmissions from the apparatuses according to the TXOP start frame, wherein at least one of the SDMA transmissions comprises an indication of an acknowledgement policy that does not require immediate transmission of an acknowledgement frame. 24. An apparatus for wireless communications, comprising:
a transmitter configured to transmit a request message for a transmission slot for a spatial division multiple access (SDMA) transmission; a receiver configured to receive a transmit opportunity (TXOP) start frame comprising an indication of start of a SDMA transmission; and wherein the transmitter is further configured to transmit SDMA data during a TXOP in accordance with the TXOP start frame. 25. The apparatus of claim 24, wherein the transmitter is further configured to transmit the SDMA data on one or more spatial streams utilizing an assigned duration for the TXOP, wherein the spatial streams and the assigned duration are received in the TXOP start frame. 26. The apparatus of claim 24, wherein the SDMA data comprises an indication of an acknowledgement policy that does not require immediate transmission of an acknowledgement frame. 27. The apparatus of claim 26, wherein the SDMA data comprises one or more Block Acknowledgement Request (BAR) frames. 28. The apparatus of claim 24, wherein the transmitter is further configured to transmit a request for acknowledgement after transmission of the SDMA data. 29. The apparatus of claim 28, wherein the request for acknowledgement is transmitted after a back-off timer expires, wherein the TXOP start frame comprises a value for the back-off timer. 30. The apparatus of claim 24, wherein the SDMA data comprises one or more medium access control protocol data units (MPDUs). 31. An apparatus for wireless communications, comprising:
means for receiving, from one or more apparatuses, one or more request messages for a transmission slot for a spatial division multiple access (SDMA) transmission; and means for transmitting a transmit opportunity (TXOP) start frame to one or more of the apparatuses to indicate start of a SDMA TXOP. 32. The apparatus of claim 31, wherein the means for transmitting comprises:
means for determining an amount of resource requested by each of the apparatuses that sent the request messages; and means for transmitting the TXOP start frame if the amount of resource is greater than or equal to a threshold value. 33. The apparatus of claim 31, wherein the TXOP start frame comprises an indication of the apparatuses that are scheduled to transmit during the SDMA TXOP, and one or more spatial streams assigned to each of the apparatuses. 34. The apparatus of claim 31, wherein the TXOP start frame comprises an indication of duration of the SDMA TXOP. 35. The apparatus of claim 31, the means for transmitting further comprises:
means for transmitting one or more acknowledgement frames to the one or more apparatuses to acknowledge reception of one or more SDMA transmissions, wherein the acknowledgement frames are sent sequentially. 36. The apparatus of claim 35, wherein the acknowledgement frames are sent if a short inter-frame space (SIFS) time is passed after end of the SDMA TXOP. 37. The apparatus of claim 36, wherein the acknowledgement frames are separated with SIFS durations. 38. The apparatus of claim 31, wherein the means for receiving further comprises:
means for receiving one or more SDMA transmissions from the apparatuses according to the TXOP start frame, wherein at least one of the SDMA transmissions comprises an indication of an acknowledgement policy that does not require immediate transmission of an acknowledgement frame. 39. An apparatus for wireless communications, comprising:
means for transmitting a request message for a transmission slot for a spatial division multiple access (SDMA) transmission; means for receiving a transmit opportunity (TXOP) start frame comprising an indication of start of a SDMA transmission; and wherein the means for transmitting further comprises means for transmitting SDMA data during a TXOP in accordance with the TXOP start frame. 40. The apparatus of claim 39, wherein the means for transmitting the SDMA data comprises:
means for transmitting the SDMA data on one or more spatial streams utilizing an assigned duration for the TXOP, wherein the spatial streams and the assigned duration are received in the TXOP start frame. 41. The apparatus of claim 39, wherein the SDMA data comprises an indication of an acknowledgement policy that does not require immediate transmission of an acknowledgement frame. 42. The apparatus of claim 41, wherein the SDMA data comprises one or more Block Acknowledgement Request (BAR) frames. 43. The apparatus of claim 39, wherein the means for transmitting further comprises:
means for transmitting a request for acknowledgement after transmission of the SDMA data. 44. The apparatus of claim 43, wherein the request for acknowledgement is transmitted after a back-off timer expires, wherein the TXOP start frame comprises a value for the back-off timer. 45. The apparatus of claim 39, wherein the SDMA data comprises one or more medium access control protocol data units (MPDUs). 46. A computer-program product for wireless communications, comprising a computer-readable medium comprising instructions executable for:
receiving, from one or more apparatuses, one or more request messages for a transmission slot for a spatial division multiple access (SDMA) transmission; and transmitting a transmit opportunity (TXOP) start frame to one or more of the apparatuses to indicate start of a SDMA TXOP. 47. A computer-program product for wireless communications, comprising a computer-readable medium comprising instructions executable for:
transmitting a request message for a transmission slot for a spatial division multiple access (SDMA) transmission; receiving a transmit opportunity (TXOP) start frame comprising an indication of start of a SDMA transmission; and transmitting SDMA data during a TXOP in accordance with the TXOP start frame. 48. An access point for wireless communications, comprising:
a plurality of antennas, a receiver configured to receive, via the plurality of antennas, from one or more apparatuses, one or more request messages for a transmission slot for a spatial division multiple access (SDMA) transmission; and a transmitter configured to transmit a transmit opportunity (TXOP) start frame to one or more of the apparatuses to indicate start of a SDMA TXOP. 49. A station for wireless communications, comprising:
at least one antenna; a transmitter configured to transmit, via the at least one antenna, a request message for a transmission slot for a spatial division multiple access (SDMA) transmission; a receiver configured to receive a transmit opportunity (TXOP) start frame comprising an indication of start of a SDMA transmission; and wherein the transmitter is further configured to transmit SDMA data during a TXOP in accordance with the TXOP start frame. | Certain aspects of the present disclosure present medium access control (MAC) protocols for uplink Spatial Division Multiple Access (SDMA) transmissions by one or more stations (STAs). An access point (AP) may receive one or more requests for uplink SDMA transmission from a plurality of stations. The access point may schedule the transmissions by sending a signal to the stations to notify them of the parameters of the uplink SDMA transmissions such as start time, duration of the transmission, spatial streams assigned to each station, and so on.1. A method for wireless communications, comprising:
receiving, from one or more apparatuses, one or more request messages for a transmission slot for a spatial division multiple access (SDMA) transmission; and transmitting a transmit opportunity (TXOP) start frame to one or more of the apparatuses to indicate start of a SDMA TXOP. 2. The method of claim 1, wherein the transmitting comprises:
determining an amount of resource requested by each of the apparatuses that sent the request messages; and transmitting the TXOP start frame if the amount of resource is greater than or equal to a threshold value. 3. The method of claim 1, wherein the TXOP start frame comprises an indication of the apparatuses that are scheduled to transmit during the SDMA TXOP, and one or more spatial streams assigned to each of the apparatuses. 4. The method of claim 1, wherein the TXOP start frame comprises an indication of duration of the SDMA TXOP. 5. The method of claim 1, further comprising:
transmitting one or more acknowledgement frames to the one or more apparatuses to acknowledge reception of one or more SDMA transmissions, wherein the acknowledgement frames are sent sequentially. 6. The method of claim 5, wherein the acknowledgement frames are sent if a short inter-frame space (SIFS) time is passed after end of the SDMA TXOP. 7. The method of claim 6, wherein the acknowledgement frames are separated with SIFS durations. 8. The method of claim 1, further comprising:
receiving one or more SDMA transmissions from the apparatuses according to the TXOP start frame, wherein at least one of the SDMA transmissions comprises an indication of an acknowledgement policy that does not require immediate transmission of an acknowledgement frame. 9. A method for wireless communications, comprising:
transmitting a request message for a transmission slot for a spatial division multiple access (SDMA) transmission; receiving a transmit opportunity (TXOP) start frame comprising an indication of start of a SDMA transmission; and transmitting SDMA data during a TXOP in accordance with the TXOP start frame. 10. The method of claim 9, wherein the transmitting the SDMA data comprises:
transmitting the SDMA data on one or more spatial streams utilizing an assigned duration for the TXOP, wherein the spatial streams and the assigned duration are received in the TXOP start frame. 11. The method of claim 9, wherein the SDMA data comprises an indication of an acknowledgement policy that does not require immediate transmission of an acknowledgement frame. 12. The method of claim 11, wherein the SDMA data comprises one or more Block Acknowledgement Request (BAR) frames. 13. The method of claim 9, further comprising:
transmitting a request for acknowledgement after transmission of the SDMA data. 14. The method of claim 13, wherein the request for acknowledgement is transmitted after a back-off timer expires, wherein the TXOP start frame comprises a value for the back-off timer. 15. The method of claim 9, wherein the SDMA data comprises one or more medium access control protocol data units (MPDUs). 16. An apparatus for wireless communications, comprising:
a receiver configured to receive, from one or more apparatuses, one or more request messages for a transmission slot for a spatial division multiple access (SDMA) transmission; and a transmitter configured to transmit a transmit opportunity (TXOP) start frame to one or more of the apparatuses to indicate start of a SDMA TXOP. 17. The apparatus of claim 16, further comprising:
circuit configured to determine an amount of resource requested by each of the apparatuses that sent the request messages, wherein the transmitter is further configured to transmit the TXOP start frame if the amount of resource is greater than or equal to a threshold value. 18. The apparatus of claim 16, wherein the TXOP start frame comprises an indication of the apparatuses that are scheduled to transmit during the SDMA TXOP, and one or more spatial streams assigned to each of the apparatuses. 19. The apparatus of claim 16, wherein the TXOP start frame comprises an indication of duration of the SDMA TXOP. 20. The apparatus of claim 16, wherein the transmitter is further configured to transmit one or more acknowledgement frames to the one or more apparatuses to acknowledge reception of one or more SDMA transmissions, wherein the acknowledgement frames are sent sequentially. 21. The apparatus of claim 20, wherein the acknowledgement frames are sent if a short inter-frame space (SIFS) time is passed after end of the SDMA TXOP. 22. The apparatus of claim 21, wherein the acknowledgement frames are separated with SIFS durations. 23. The apparatus of claim 16, wherein the receiver is further configured to receive one or more SDMA transmissions from the apparatuses according to the TXOP start frame, wherein at least one of the SDMA transmissions comprises an indication of an acknowledgement policy that does not require immediate transmission of an acknowledgement frame. 24. An apparatus for wireless communications, comprising:
a transmitter configured to transmit a request message for a transmission slot for a spatial division multiple access (SDMA) transmission; a receiver configured to receive a transmit opportunity (TXOP) start frame comprising an indication of start of a SDMA transmission; and wherein the transmitter is further configured to transmit SDMA data during a TXOP in accordance with the TXOP start frame. 25. The apparatus of claim 24, wherein the transmitter is further configured to transmit the SDMA data on one or more spatial streams utilizing an assigned duration for the TXOP, wherein the spatial streams and the assigned duration are received in the TXOP start frame. 26. The apparatus of claim 24, wherein the SDMA data comprises an indication of an acknowledgement policy that does not require immediate transmission of an acknowledgement frame. 27. The apparatus of claim 26, wherein the SDMA data comprises one or more Block Acknowledgement Request (BAR) frames. 28. The apparatus of claim 24, wherein the transmitter is further configured to transmit a request for acknowledgement after transmission of the SDMA data. 29. The apparatus of claim 28, wherein the request for acknowledgement is transmitted after a back-off timer expires, wherein the TXOP start frame comprises a value for the back-off timer. 30. The apparatus of claim 24, wherein the SDMA data comprises one or more medium access control protocol data units (MPDUs). 31. An apparatus for wireless communications, comprising:
means for receiving, from one or more apparatuses, one or more request messages for a transmission slot for a spatial division multiple access (SDMA) transmission; and means for transmitting a transmit opportunity (TXOP) start frame to one or more of the apparatuses to indicate start of a SDMA TXOP. 32. The apparatus of claim 31, wherein the means for transmitting comprises:
means for determining an amount of resource requested by each of the apparatuses that sent the request messages; and means for transmitting the TXOP start frame if the amount of resource is greater than or equal to a threshold value. 33. The apparatus of claim 31, wherein the TXOP start frame comprises an indication of the apparatuses that are scheduled to transmit during the SDMA TXOP, and one or more spatial streams assigned to each of the apparatuses. 34. The apparatus of claim 31, wherein the TXOP start frame comprises an indication of duration of the SDMA TXOP. 35. The apparatus of claim 31, the means for transmitting further comprises:
means for transmitting one or more acknowledgement frames to the one or more apparatuses to acknowledge reception of one or more SDMA transmissions, wherein the acknowledgement frames are sent sequentially. 36. The apparatus of claim 35, wherein the acknowledgement frames are sent if a short inter-frame space (SIFS) time is passed after end of the SDMA TXOP. 37. The apparatus of claim 36, wherein the acknowledgement frames are separated with SIFS durations. 38. The apparatus of claim 31, wherein the means for receiving further comprises:
means for receiving one or more SDMA transmissions from the apparatuses according to the TXOP start frame, wherein at least one of the SDMA transmissions comprises an indication of an acknowledgement policy that does not require immediate transmission of an acknowledgement frame. 39. An apparatus for wireless communications, comprising:
means for transmitting a request message for a transmission slot for a spatial division multiple access (SDMA) transmission; means for receiving a transmit opportunity (TXOP) start frame comprising an indication of start of a SDMA transmission; and wherein the means for transmitting further comprises means for transmitting SDMA data during a TXOP in accordance with the TXOP start frame. 40. The apparatus of claim 39, wherein the means for transmitting the SDMA data comprises:
means for transmitting the SDMA data on one or more spatial streams utilizing an assigned duration for the TXOP, wherein the spatial streams and the assigned duration are received in the TXOP start frame. 41. The apparatus of claim 39, wherein the SDMA data comprises an indication of an acknowledgement policy that does not require immediate transmission of an acknowledgement frame. 42. The apparatus of claim 41, wherein the SDMA data comprises one or more Block Acknowledgement Request (BAR) frames. 43. The apparatus of claim 39, wherein the means for transmitting further comprises:
means for transmitting a request for acknowledgement after transmission of the SDMA data. 44. The apparatus of claim 43, wherein the request for acknowledgement is transmitted after a back-off timer expires, wherein the TXOP start frame comprises a value for the back-off timer. 45. The apparatus of claim 39, wherein the SDMA data comprises one or more medium access control protocol data units (MPDUs). 46. A computer-program product for wireless communications, comprising a computer-readable medium comprising instructions executable for:
receiving, from one or more apparatuses, one or more request messages for a transmission slot for a spatial division multiple access (SDMA) transmission; and transmitting a transmit opportunity (TXOP) start frame to one or more of the apparatuses to indicate start of a SDMA TXOP. 47. A computer-program product for wireless communications, comprising a computer-readable medium comprising instructions executable for:
transmitting a request message for a transmission slot for a spatial division multiple access (SDMA) transmission; receiving a transmit opportunity (TXOP) start frame comprising an indication of start of a SDMA transmission; and transmitting SDMA data during a TXOP in accordance with the TXOP start frame. 48. An access point for wireless communications, comprising:
a plurality of antennas, a receiver configured to receive, via the plurality of antennas, from one or more apparatuses, one or more request messages for a transmission slot for a spatial division multiple access (SDMA) transmission; and a transmitter configured to transmit a transmit opportunity (TXOP) start frame to one or more of the apparatuses to indicate start of a SDMA TXOP. 49. A station for wireless communications, comprising:
at least one antenna; a transmitter configured to transmit, via the at least one antenna, a request message for a transmission slot for a spatial division multiple access (SDMA) transmission; a receiver configured to receive a transmit opportunity (TXOP) start frame comprising an indication of start of a SDMA transmission; and wherein the transmitter is further configured to transmit SDMA data during a TXOP in accordance with the TXOP start frame. | 2,400 |
6,750 | 6,750 | 14,574,337 | 2,493 | A cryptography service allows for management of cryptographic keys and for the evaluation of security expectations when processing incoming requests. In some contexts, the cryptography service, upon receiving a request to perform a cryptographic operation, evaluates a set of security expectations to determine whether the cryptographic key or keys usable to perform the cryptographic operation should be trusted. A response to the request is dependent on evaluation of the security expectations. | 1. A computer-implemented method, comprising:
receiving, from a requestor associated with a customer of a service provider, a web service request whose fulfillment includes performance of a cryptographic operation; selecting, based at least in part on information in the web service request, a cryptographic key from a plurality of cryptographic keys managed by the service provider for a plurality of customers of the service provider; determining a set of security expectations applicable to the web service request, the set of security expectations defining a set of conditions applicable to the selected cryptographic key that, when fulfilled and regardless of whether the selected cryptographic key is usable to perform the cryptographic operation, indicate that a result of the cryptographic operation is trusted; evaluating the set of security expectations against the selected cryptographic key; generating a response to the web service requests based at least in part on evaluation of the set of security expectations; and providing the generated response. 2. The computer-implemented method of claim 1, wherein the set of security expectations are specified in the request. 3. The computer-implemented method of claim 1, wherein:
the method further comprises:
determining, a set of policies applicable to the request, the set of policies from a stored plurality of policy documents; and
determining that the set of policies allows fulfillment of the request; and
determining the set of security expectations includes determining at least one security expectation from the determined set of policies. 4. The computer-implemented method of claim 3, wherein the method further comprises:
receiving, from an entity authorized by the customer to modify policies, a web service request to enforce the set of security expectations to a set of policies associated with the customer; and fulfilling the request by modifying the set of policies to include the set of security expectations. 5. The computer-implemented method of claim 3, wherein the cryptographic operations is decryption or digital signature verification. 6. A system, comprising at least one computing device configured to implement one or more services, the one or more services configured to:
receive, from a client, a request to perform a cryptographic operation; determine a cryptographic key for performance of the cryptographic operation, the cryptographic key being from a set of cryptographic keys managed by the system; determine, based at least in part on information contained in the request, a set of conditions under which a result of performance of the cryptographic operation should be trusted by the client; generate, based at least in part on the cryptographic key and the determined set of conditions, a response to the request; and provide the generated response to the client. 7. The system of claim 6, wherein the one or more services are further configured to determine at least one condition of the set of conditions as a result of the at least one condition being specified in the request. 8. The system of claim 6, wherein:
the client is authenticated as an identity; and the one or more services are configured to determine the set of conditions by at least:
selecting a subset of a set policies as applicable to the identity; and
determining at least one condition of the set of conditions as a result of the at least one condition being specified in the subset of the set of policies. 9. The system of claim 8, wherein:
the system is operated by a service provider; the set of policies is programmatically modifiable by a customer of the service provider associated with the identity. 10. The system of claim 6, wherein the system is a device with hardware-based protection of the set of cryptographic keys and from which the cryptographic keys are programmatically unexportable from the device in plaintext form. 11. The system of claim 6, wherein:
the cryptographic key is managed by the system on behalf of a first customer of a service provider; and the set of cryptographic keys comprises a second cryptographic key that is managed by the system on behalf of a second customer of the service provider. 12. The system of claim 11, wherein the client is operated by a third customer of the service provider. 13. The system of claim 6, wherein the generated response includes information indicating a result of evaluation of the set of conditions. 14. The system of claim 6, wherein the set of conditions require that the cryptographic key be from a set of cryptographic keys specified as trusted. 15. A non-transitory computer-readable storage medium having stored thereon executable instructions that, when executed by one or more processors of a computer system, cause the computer system to provide a service that is configured to:
determine, based at least in part on information included in a request, from a requestor, whose fulfillment involves a cryptographic operation involving a cryptographic key, a set of conditions applicable to the cryptographic key for determining whether the requestor should trust a result of the cryptographic operation, the cryptographic key being from a set of cryptographic keys managed by the computer system for a plurality of entities, each with a corresponding subset of the set of cryptographic keys; evaluate the determined set of conditions to determine a manner of fulfilling the request; and as a result of evaluation of the determined set of conditions indicating the cryptographic key can be trusted, causing the cryptographic operation to be performed and the result of the cryptographic operation to be provided in response to the request. 16. The non-transitory computer-readable storage medium of claim 15, wherein the entities are customers of a service provider that operates the computer system. 17. The non-transitory computer-readable storage medium of claim 15, wherein the instructions that cause the computer system to determine the set of conditions, when executed by the one or more processors, cause the system to obtain at least one condition of the set of conditions from a policy associated with an identity that submitted the request. 18. The non-transitory computer-readable storage medium of claim 15, wherein the request is a web service request. 19. The non-transitory computer-readable storage medium of claim 15, wherein the one or more conditions are based at least in part on an inherent property of the cryptographic key. 20. The non-transitory computer-readable storage medium of claim 15, wherein at least one condition from the determined set of conditions is specified by the request. 21. The non-transitory computer-readable storage medium of claim 20, wherein the set of conditions includes multiple conditions connected with Boolean operators. 22. The non-transitory computer-readable storage medium of claim 15, wherein the instructions further include instructions that, when executed by the one or more processors, cause the computer system to evaluate a set of policies applicable to the request as a prerequisite to evaluation of the determined set of conditions. | A cryptography service allows for management of cryptographic keys and for the evaluation of security expectations when processing incoming requests. In some contexts, the cryptography service, upon receiving a request to perform a cryptographic operation, evaluates a set of security expectations to determine whether the cryptographic key or keys usable to perform the cryptographic operation should be trusted. A response to the request is dependent on evaluation of the security expectations.1. A computer-implemented method, comprising:
receiving, from a requestor associated with a customer of a service provider, a web service request whose fulfillment includes performance of a cryptographic operation; selecting, based at least in part on information in the web service request, a cryptographic key from a plurality of cryptographic keys managed by the service provider for a plurality of customers of the service provider; determining a set of security expectations applicable to the web service request, the set of security expectations defining a set of conditions applicable to the selected cryptographic key that, when fulfilled and regardless of whether the selected cryptographic key is usable to perform the cryptographic operation, indicate that a result of the cryptographic operation is trusted; evaluating the set of security expectations against the selected cryptographic key; generating a response to the web service requests based at least in part on evaluation of the set of security expectations; and providing the generated response. 2. The computer-implemented method of claim 1, wherein the set of security expectations are specified in the request. 3. The computer-implemented method of claim 1, wherein:
the method further comprises:
determining, a set of policies applicable to the request, the set of policies from a stored plurality of policy documents; and
determining that the set of policies allows fulfillment of the request; and
determining the set of security expectations includes determining at least one security expectation from the determined set of policies. 4. The computer-implemented method of claim 3, wherein the method further comprises:
receiving, from an entity authorized by the customer to modify policies, a web service request to enforce the set of security expectations to a set of policies associated with the customer; and fulfilling the request by modifying the set of policies to include the set of security expectations. 5. The computer-implemented method of claim 3, wherein the cryptographic operations is decryption or digital signature verification. 6. A system, comprising at least one computing device configured to implement one or more services, the one or more services configured to:
receive, from a client, a request to perform a cryptographic operation; determine a cryptographic key for performance of the cryptographic operation, the cryptographic key being from a set of cryptographic keys managed by the system; determine, based at least in part on information contained in the request, a set of conditions under which a result of performance of the cryptographic operation should be trusted by the client; generate, based at least in part on the cryptographic key and the determined set of conditions, a response to the request; and provide the generated response to the client. 7. The system of claim 6, wherein the one or more services are further configured to determine at least one condition of the set of conditions as a result of the at least one condition being specified in the request. 8. The system of claim 6, wherein:
the client is authenticated as an identity; and the one or more services are configured to determine the set of conditions by at least:
selecting a subset of a set policies as applicable to the identity; and
determining at least one condition of the set of conditions as a result of the at least one condition being specified in the subset of the set of policies. 9. The system of claim 8, wherein:
the system is operated by a service provider; the set of policies is programmatically modifiable by a customer of the service provider associated with the identity. 10. The system of claim 6, wherein the system is a device with hardware-based protection of the set of cryptographic keys and from which the cryptographic keys are programmatically unexportable from the device in plaintext form. 11. The system of claim 6, wherein:
the cryptographic key is managed by the system on behalf of a first customer of a service provider; and the set of cryptographic keys comprises a second cryptographic key that is managed by the system on behalf of a second customer of the service provider. 12. The system of claim 11, wherein the client is operated by a third customer of the service provider. 13. The system of claim 6, wherein the generated response includes information indicating a result of evaluation of the set of conditions. 14. The system of claim 6, wherein the set of conditions require that the cryptographic key be from a set of cryptographic keys specified as trusted. 15. A non-transitory computer-readable storage medium having stored thereon executable instructions that, when executed by one or more processors of a computer system, cause the computer system to provide a service that is configured to:
determine, based at least in part on information included in a request, from a requestor, whose fulfillment involves a cryptographic operation involving a cryptographic key, a set of conditions applicable to the cryptographic key for determining whether the requestor should trust a result of the cryptographic operation, the cryptographic key being from a set of cryptographic keys managed by the computer system for a plurality of entities, each with a corresponding subset of the set of cryptographic keys; evaluate the determined set of conditions to determine a manner of fulfilling the request; and as a result of evaluation of the determined set of conditions indicating the cryptographic key can be trusted, causing the cryptographic operation to be performed and the result of the cryptographic operation to be provided in response to the request. 16. The non-transitory computer-readable storage medium of claim 15, wherein the entities are customers of a service provider that operates the computer system. 17. The non-transitory computer-readable storage medium of claim 15, wherein the instructions that cause the computer system to determine the set of conditions, when executed by the one or more processors, cause the system to obtain at least one condition of the set of conditions from a policy associated with an identity that submitted the request. 18. The non-transitory computer-readable storage medium of claim 15, wherein the request is a web service request. 19. The non-transitory computer-readable storage medium of claim 15, wherein the one or more conditions are based at least in part on an inherent property of the cryptographic key. 20. The non-transitory computer-readable storage medium of claim 15, wherein at least one condition from the determined set of conditions is specified by the request. 21. The non-transitory computer-readable storage medium of claim 20, wherein the set of conditions includes multiple conditions connected with Boolean operators. 22. The non-transitory computer-readable storage medium of claim 15, wherein the instructions further include instructions that, when executed by the one or more processors, cause the computer system to evaluate a set of policies applicable to the request as a prerequisite to evaluation of the determined set of conditions. | 2,400 |
6,751 | 6,751 | 13,813,293 | 2,486 | A method for down sampling data comprising the steps of down-sampling the data; and carrying out a motion compensation step on the down-sampled data which motion compensation step is carried out in the frequency domain, further comprising the step of transforming the data back to the spatial domain after the step of motion compensation has been performed. | 1. A method of decoding video data, comprising:
down-sampling the data in the frequency domain; carrying out a motion compensation step on the down-sampled data, which motion compensation step is carried out in the frequency domain, and transforming the data back to the spatial domain after the motion compensation step has been performed. 2. A method according to claim 1 wherein the down-sampling comprises carrying out a second order down-sampling process of the data. 3. A method according to claim 2 in which the down-sampling is a zig-zag scan aligned down-sampling scheme. 4. A method according to claim 1, wherein:
the down-sampling comprises retaining only a first partial set of coefficients from among a block of frequency-domain coefficients and discarding the other coefficients of the block, said first set being chosen according to a first pattern; and the transforming of the data back to the spatial domain comprises applying an inverse transform to a second set of frequency-domain coefficients, said second set being chosen according to a second, different pattern. 5. A method according to claim 4, wherein the second set of coefficients is a proper subset of the first set of coefficients. 6. A method according to claim 1, wherein the down-sampling of the data comprises:
retaining only a partial set of luma coefficients from among a block of frequency-domain luma coefficients; and retaining only a partial set of chroma coefficients from among a block of frequency-domain chroma coefficients, wherein the set of chroma coefficients contains fewer coefficients than the set of luma coefficients. 7. A method according to claim 1, further comprising decoding successive first and second frames of video data, wherein the transforming of the data back to the spatial domain is performed at a first resolution for the first frame and a second, different resolution for the second frame. 8. A method according to claim 1, further comprising, in the transforming of the data back to the spatial domain, applying additional processing to the video data as part of the inverse transform. 9. A method according to claim 8, wherein the additional processing comprises at least one of: sharpening; blurring; rotating; mirroring; transposing; translating; brightness change; and contrast change of a frame of the video data. 10. A method according to claim 1, wherein, in the down-sampling of the data:
a first number of coefficients are retained in a first block in the interior of a frame; and a second, greater number of coefficients are retained in a second block at the border of the frame. 11. A method according to claim 1, wherein the video data is encoded according to one of the following standards: MPEG-4; VC-1; and H.264. 12. A video decoder, comprising:
an element that down-samples video data in the frequency domain, and an element that performs motion compensation on the down-sampled data in the frequency domain, wherein the decoder transforms the data back to the spatial domain after the motion compensation has been performed. | A method for down sampling data comprising the steps of down-sampling the data; and carrying out a motion compensation step on the down-sampled data which motion compensation step is carried out in the frequency domain, further comprising the step of transforming the data back to the spatial domain after the step of motion compensation has been performed.1. A method of decoding video data, comprising:
down-sampling the data in the frequency domain; carrying out a motion compensation step on the down-sampled data, which motion compensation step is carried out in the frequency domain, and transforming the data back to the spatial domain after the motion compensation step has been performed. 2. A method according to claim 1 wherein the down-sampling comprises carrying out a second order down-sampling process of the data. 3. A method according to claim 2 in which the down-sampling is a zig-zag scan aligned down-sampling scheme. 4. A method according to claim 1, wherein:
the down-sampling comprises retaining only a first partial set of coefficients from among a block of frequency-domain coefficients and discarding the other coefficients of the block, said first set being chosen according to a first pattern; and the transforming of the data back to the spatial domain comprises applying an inverse transform to a second set of frequency-domain coefficients, said second set being chosen according to a second, different pattern. 5. A method according to claim 4, wherein the second set of coefficients is a proper subset of the first set of coefficients. 6. A method according to claim 1, wherein the down-sampling of the data comprises:
retaining only a partial set of luma coefficients from among a block of frequency-domain luma coefficients; and retaining only a partial set of chroma coefficients from among a block of frequency-domain chroma coefficients, wherein the set of chroma coefficients contains fewer coefficients than the set of luma coefficients. 7. A method according to claim 1, further comprising decoding successive first and second frames of video data, wherein the transforming of the data back to the spatial domain is performed at a first resolution for the first frame and a second, different resolution for the second frame. 8. A method according to claim 1, further comprising, in the transforming of the data back to the spatial domain, applying additional processing to the video data as part of the inverse transform. 9. A method according to claim 8, wherein the additional processing comprises at least one of: sharpening; blurring; rotating; mirroring; transposing; translating; brightness change; and contrast change of a frame of the video data. 10. A method according to claim 1, wherein, in the down-sampling of the data:
a first number of coefficients are retained in a first block in the interior of a frame; and a second, greater number of coefficients are retained in a second block at the border of the frame. 11. A method according to claim 1, wherein the video data is encoded according to one of the following standards: MPEG-4; VC-1; and H.264. 12. A video decoder, comprising:
an element that down-samples video data in the frequency domain, and an element that performs motion compensation on the down-sampled data in the frequency domain, wherein the decoder transforms the data back to the spatial domain after the motion compensation has been performed. | 2,400 |
6,752 | 6,752 | 13,516,587 | 2,489 | The present invention relates to a method for generating a stereoscopic video stream ( 101 ) comprising composite images (C) which comprise information about a right image (R) and a left image (L). According to the method, pixels are selected from the right image (R) and from the left image (L), and then the selected pixels are entered into a composite image (C) of the stereoscopic video stream. The method also provides for entering all the pixels of the right image (R) and all the pixels of the left image (L) into the composite image (C) by leaving one of said two images unchanged and breaking up the other one into regions (R 1, R 2, R 3 ) comprising a plurality of pixels. Said regions are subsequently entered into the composite image (C). The invention also relates to a method for reconstructing the right and left images starting from a composite image, as well as to devices allowing said methods to be implemented. | 1. A method for generating a stereoscopic video stream (101) comprising composite images (C), said composite images (C) comprising information about a right image (R) and a left image (L), wherein
pixels of said right image (R) and pixels of said left image (L) are selected, and said selected pixels are entered into a composite image (C) of said stereoscopic video stream, the method being characterised in that all the pixels of said right image (R) and all the pixels of said left image (L) are entered into said composite image (C) by leaving one of said two images unchanged and breaking up the other one into regions (R1, R2, R3) comprising a plurality of pixels and entering said regions into said composite image (C). 2. A method according to claim 1, wherein said other image is broken up into the smallest possible number of regions by taking into account the space available in the composite image (C) and the space occupied by said one image (L) left unchanged. 3. A method according to claim 2, wherein said smallest number is the minimum number necessary to occupy the space left free by said unchanged image. 4. A method according to claim 1, wherein said regions are obtained through the steps of:
dividing said other image (R) into two equally sized portions, dividing one of said two portions into two equally sized portions. 5. A method according to claim 1, wherein said regions (R1, R2, R3) are entered into said composite image by means of translation operations only. 6. A method according to claim 1, wherein said regions (R1, R2, R3) are entered into said composite image (C) by means of translation and/or rotation operations. 7. A method according to claim 1, wherein at least one portion of the space remained free in the composite image is used for entering a signal necessary for reconstructing the right and left images at demultiplexer level. 8. A method according to claim 1, wherein, before entering one of said regions into said composite image, a specular inversion operation is carried out along one side of said one region. 9. A method according to claim 8, wherein said one region is entered into said composite image with one side bordering on one side of another image or region, so that pixels relating to a same spatial area are arranged side by side. 10. A method according to claim 1, wherein said regions have a rectangular shape. 11. A method according to claim 1, wherein said regions comprise contiguous groups of columns of pixels of said image. 12. A method according to claim 1, wherein at least two of said regions have at least one pixel group in common, said pixel group being arranged in a boundary area between said at least two of said regions. 13. A method according to claim 1, wherein at least one of said regions that is entered into said composite image is separated from other regions of the composite image that comprise pixels copied from said right image or said left image. 14. A method according to claim 1, wherein
a sequence of right images and a sequence of left images are received, a sequence of composite images is generated by starting from said sequences of right and left images, said sequence of composite images is compressed. 15. A method for reconstructing a pair of images by starting from a composite image, comprising the steps of:
generating a first one of said right (R) and left (L) images by copying one single group of contiguous pixels from a region of said composite image, generating a second image of said right (R) and left (L) images by copying other groups of contiguous pixels from different regions (R1, R2, R3) of said composite image. 16. A method according to claim 15, wherein the information for generating said pair of images is extracted from an area of said composite image. 17. A method according to claim 20, wherein said information is encoded according to a bar code. 18. A method according to claim 15, wherein the generation of said second image comprises at least one phase of specular inversion of a group of pixels of at least one of said different regions. 19. A method according to claim 15, wherein the generation of said second image comprises at least one phase of removing pixels from at least one of said regions. 20. A method according to claim 19, wherein the pixels are removed from a boundary area of said at least one region. 21. A method according to claim 15, wherein said second image is generated by subjecting said pixel regions to translation operations only. 22. A method according to claim 15, wherein said second image is generated by subjecting said pixel regions to rotation and/or translation operations. 23. A device (100) for generating composite images (C), comprising means (104) for receiving a right image and a left image and means (105) for generating a composite image (C) comprising information about said right image and said left image, characterised by comprising means adapted to implement the method according to claim 1. 24. A device (1100) for reconstructing a pair of images by starting from a composite image, characterised by implementing the method according to claim 15. 25. A stereoscopic video stream (1101) characterised by comprising at least one composite image (C) generated by means of the method according to claim 1. | The present invention relates to a method for generating a stereoscopic video stream ( 101 ) comprising composite images (C) which comprise information about a right image (R) and a left image (L). According to the method, pixels are selected from the right image (R) and from the left image (L), and then the selected pixels are entered into a composite image (C) of the stereoscopic video stream. The method also provides for entering all the pixels of the right image (R) and all the pixels of the left image (L) into the composite image (C) by leaving one of said two images unchanged and breaking up the other one into regions (R 1, R 2, R 3 ) comprising a plurality of pixels. Said regions are subsequently entered into the composite image (C). The invention also relates to a method for reconstructing the right and left images starting from a composite image, as well as to devices allowing said methods to be implemented.1. A method for generating a stereoscopic video stream (101) comprising composite images (C), said composite images (C) comprising information about a right image (R) and a left image (L), wherein
pixels of said right image (R) and pixels of said left image (L) are selected, and said selected pixels are entered into a composite image (C) of said stereoscopic video stream, the method being characterised in that all the pixels of said right image (R) and all the pixels of said left image (L) are entered into said composite image (C) by leaving one of said two images unchanged and breaking up the other one into regions (R1, R2, R3) comprising a plurality of pixels and entering said regions into said composite image (C). 2. A method according to claim 1, wherein said other image is broken up into the smallest possible number of regions by taking into account the space available in the composite image (C) and the space occupied by said one image (L) left unchanged. 3. A method according to claim 2, wherein said smallest number is the minimum number necessary to occupy the space left free by said unchanged image. 4. A method according to claim 1, wherein said regions are obtained through the steps of:
dividing said other image (R) into two equally sized portions, dividing one of said two portions into two equally sized portions. 5. A method according to claim 1, wherein said regions (R1, R2, R3) are entered into said composite image by means of translation operations only. 6. A method according to claim 1, wherein said regions (R1, R2, R3) are entered into said composite image (C) by means of translation and/or rotation operations. 7. A method according to claim 1, wherein at least one portion of the space remained free in the composite image is used for entering a signal necessary for reconstructing the right and left images at demultiplexer level. 8. A method according to claim 1, wherein, before entering one of said regions into said composite image, a specular inversion operation is carried out along one side of said one region. 9. A method according to claim 8, wherein said one region is entered into said composite image with one side bordering on one side of another image or region, so that pixels relating to a same spatial area are arranged side by side. 10. A method according to claim 1, wherein said regions have a rectangular shape. 11. A method according to claim 1, wherein said regions comprise contiguous groups of columns of pixels of said image. 12. A method according to claim 1, wherein at least two of said regions have at least one pixel group in common, said pixel group being arranged in a boundary area between said at least two of said regions. 13. A method according to claim 1, wherein at least one of said regions that is entered into said composite image is separated from other regions of the composite image that comprise pixels copied from said right image or said left image. 14. A method according to claim 1, wherein
a sequence of right images and a sequence of left images are received, a sequence of composite images is generated by starting from said sequences of right and left images, said sequence of composite images is compressed. 15. A method for reconstructing a pair of images by starting from a composite image, comprising the steps of:
generating a first one of said right (R) and left (L) images by copying one single group of contiguous pixels from a region of said composite image, generating a second image of said right (R) and left (L) images by copying other groups of contiguous pixels from different regions (R1, R2, R3) of said composite image. 16. A method according to claim 15, wherein the information for generating said pair of images is extracted from an area of said composite image. 17. A method according to claim 20, wherein said information is encoded according to a bar code. 18. A method according to claim 15, wherein the generation of said second image comprises at least one phase of specular inversion of a group of pixels of at least one of said different regions. 19. A method according to claim 15, wherein the generation of said second image comprises at least one phase of removing pixels from at least one of said regions. 20. A method according to claim 19, wherein the pixels are removed from a boundary area of said at least one region. 21. A method according to claim 15, wherein said second image is generated by subjecting said pixel regions to translation operations only. 22. A method according to claim 15, wherein said second image is generated by subjecting said pixel regions to rotation and/or translation operations. 23. A device (100) for generating composite images (C), comprising means (104) for receiving a right image and a left image and means (105) for generating a composite image (C) comprising information about said right image and said left image, characterised by comprising means adapted to implement the method according to claim 1. 24. A device (1100) for reconstructing a pair of images by starting from a composite image, characterised by implementing the method according to claim 15. 25. A stereoscopic video stream (1101) characterised by comprising at least one composite image (C) generated by means of the method according to claim 1. | 2,400 |
6,753 | 6,753 | 14,766,598 | 2,414 | For controlling random access individually for a given sector of a cell ( 10 ), a transmission delay of a backhaul connection (B 1 , B 2 , B 3 , B 4 ) of a radio station ( 200 - 1, 200 - 2, 200 - 3, 200 - 4 ) serving the sector of the cell ( 10 ) is determined. Depending on the transmission delay, at least one time window is determined. The at least one time window defines a maximum allowed time between two messages of a random access procedure. The at least one time window is indicated via the radio station ( 200 - 1, 200 - 2, 200 - 3, 200 - 4 ) to one or more user equipments ( 50 - 1, 50 - 2, 50 - 3 ) in the cell ( 10 ). For this purpose, sector individual system information may be transmitted via different radio stations ( 200 - 1, 200 - 2, 200 - 3, 200 - 4 ) of the cell. | 1-62. (canceled) 63. A method of controlling access to a cell of a mobile network, the method comprising:
determining a transmission delay of a backhaul connection of a radio station serving the cell; depending on the transmission delay, determining at least one time window defining a maximum allowed time between two messages of a random access procedure; and indicating, via the radio station, the at least one time window to one or more user equipments in the cell. 64. The method of claim 63:
wherein the at least one time window comprises a time window defining a maximum allowed time between a sending a random access preamble by a user equipment and receiving a random access response by the user equipment; or wherein the at least one time window comprises a time window defining a maximum allowed time between sending a scheduled transmission by a user equipment and receiving a contention resolution message by the user equipment. 65. The method of claim 63, further comprising determining the transmission delay by measuring a time difference between sending a probe message on the backhaul connection and receiving a response to the probe message. 66. The method of claim 63, wherein determining the at least one time window comprises determining the at least one time window based on an antenna configuration of the radio station or on an a processing performance of the radio station. 67. The method of claim 63, further comprising:
for each of multiple radio stations serving the cell, determining the transmission delay of a backhaul connection of the radio station; for each of the radio stations, determining the at least one time window from the determined transmission delay; and for each of the radio stations, indicating the determined at least one time window via the radio station to one or more user equipments. 68. The method of claim 67, further comprising for at least two of the radio stations, allocating different resources for sending system information indicating the at least one window size. 69. The method of claim 68, wherein the different resources are separated in time domain, code domain, and/or frequency domain. 70. The method of claim 63, wherein the method is performed by a cell controller of the cell, the radio station being connected via its backhaul connection to the cell controller. 71. The method of claim 63, wherein the method is performed by the radio station, the radio station being connected via its backhaul connection to a cell controller of the cell. 72. A cell controller for serving a cell of a mobile network, the cell controller comprising:
at least one processor; at least one interface for establishing a backhaul connection to a radio station serving the cell; wherein the at least one processor is configured to:
determine a transmission delay of the backhaul connection;
depending on the transmission delay, determine at least one time window defining a maximum allowed time between two messages of a random access procedure; and
indicate, via the radio station, the at least one time window size to one or more user equipments in the cell. 73. The cell controller of claim 72:
wherein the at least one time window comprises a time window defining a maximum allowed time between a sending a random access preamble by a user equipment and receiving a random access response by the user equipment; or wherein the at least one time window comprises a time window defining a maximum allowed time between sending a scheduled transmission by a user equipment and receiving a contention resolution message by the user equipment. 74. The cell controller of claim 72, wherein the at least one processor is configured to determine the transmission delay by measuring a time difference between sending a probe message on the backhaul connection and receiving a response to the probe message. 75. The cell controller of claim 72, wherein the at least one processor is configured to determine the at least one time window further depending on an antenna configuration of the radio station or on an a processing performance of the radio station. 76. The cell controller of claim 72, wherein the at least one processor is configured to:
for each of multiple radio stations serving the cell, determine the transmission delay of a backhaul connection from the radio station to the at least one interface of the cell controller; for each of the radio stations, determine the at least one time window from the determined transmission delay, and for each of the radio stations, indicate the determined at least one time window via the radio station to one or more user equipments. 77. The cell controller of claim 76, wherein at least one processor is configured to, for at least two of the radio stations, allocate different resources for sending information indicating the at least one window size. 78. The cell controller of claim 77, wherein the different resources are separated in at least one of a time domain, a code domain, and a frequency domain. 79. The cell controller of claim 72, wherein the cell operates according to Long Term Evolution radio access technology and the cell controller is an evolved Node B. 80. A radio station for serving a cell of a mobile network, the radio station comprising:
at least one processor; an interface for establishing a backhaul connection to a cell controller of the cell; and a radio interface, wherein the at least one processor is configured to:
determine a transmission delay of the backhaul connection;
depending on the transmission delay, determine at least one time window defining a maximum allowed time between two messages of a random access procedure; and
indicate, via the radio interface, the at least one time window size to one or more user equipments in the cell. 81. The radio station of claim 80:
wherein the at least one time window comprises a time window defining a maximum allowed time between a sending a random access preamble by a user equipment and receiving a random access response by the user equipment; or wherein the at least one time window comprises a time window defining a maximum allowed time between sending a scheduled transmission by a user equipment and receiving a contention resolution message by the user equipment. 82. The radio station of claim 80, wherein the at least one processor is configured to determine the transmission delay by measuring a time difference between sending a probe message on the backhaul connection and receiving a response to the probe message. 83. The radio station of claim 80, wherein the at least one processor is configured to determine the at least one time window further depending on an antenna configuration of the radio station or on a processing performance of the radio station. 84. The radio station of claim 80, wherein the cell operates according to Long Term Evolution radio access technology and the cell controller is an evolved Node B. 85. A computer program product stored in a non-transitory computer readable medium for controlling access to a cell of a mobile network, the computer program product comprising software instructions which, when run on at least one processor of a cell controller for serving a cell of a mobile network, causes the cell to:
determine a transmission delay of a backhaul connection of a radio station serving the cell; depending on the transmission delay, determine at least one time window defining a maximum allowed time between two messages of a random access procedure; and indicate, via the radio station, the at least one time window to one or more user equipments in the cell. | For controlling random access individually for a given sector of a cell ( 10 ), a transmission delay of a backhaul connection (B 1 , B 2 , B 3 , B 4 ) of a radio station ( 200 - 1, 200 - 2, 200 - 3, 200 - 4 ) serving the sector of the cell ( 10 ) is determined. Depending on the transmission delay, at least one time window is determined. The at least one time window defines a maximum allowed time between two messages of a random access procedure. The at least one time window is indicated via the radio station ( 200 - 1, 200 - 2, 200 - 3, 200 - 4 ) to one or more user equipments ( 50 - 1, 50 - 2, 50 - 3 ) in the cell ( 10 ). For this purpose, sector individual system information may be transmitted via different radio stations ( 200 - 1, 200 - 2, 200 - 3, 200 - 4 ) of the cell.1-62. (canceled) 63. A method of controlling access to a cell of a mobile network, the method comprising:
determining a transmission delay of a backhaul connection of a radio station serving the cell; depending on the transmission delay, determining at least one time window defining a maximum allowed time between two messages of a random access procedure; and indicating, via the radio station, the at least one time window to one or more user equipments in the cell. 64. The method of claim 63:
wherein the at least one time window comprises a time window defining a maximum allowed time between a sending a random access preamble by a user equipment and receiving a random access response by the user equipment; or wherein the at least one time window comprises a time window defining a maximum allowed time between sending a scheduled transmission by a user equipment and receiving a contention resolution message by the user equipment. 65. The method of claim 63, further comprising determining the transmission delay by measuring a time difference between sending a probe message on the backhaul connection and receiving a response to the probe message. 66. The method of claim 63, wherein determining the at least one time window comprises determining the at least one time window based on an antenna configuration of the radio station or on an a processing performance of the radio station. 67. The method of claim 63, further comprising:
for each of multiple radio stations serving the cell, determining the transmission delay of a backhaul connection of the radio station; for each of the radio stations, determining the at least one time window from the determined transmission delay; and for each of the radio stations, indicating the determined at least one time window via the radio station to one or more user equipments. 68. The method of claim 67, further comprising for at least two of the radio stations, allocating different resources for sending system information indicating the at least one window size. 69. The method of claim 68, wherein the different resources are separated in time domain, code domain, and/or frequency domain. 70. The method of claim 63, wherein the method is performed by a cell controller of the cell, the radio station being connected via its backhaul connection to the cell controller. 71. The method of claim 63, wherein the method is performed by the radio station, the radio station being connected via its backhaul connection to a cell controller of the cell. 72. A cell controller for serving a cell of a mobile network, the cell controller comprising:
at least one processor; at least one interface for establishing a backhaul connection to a radio station serving the cell; wherein the at least one processor is configured to:
determine a transmission delay of the backhaul connection;
depending on the transmission delay, determine at least one time window defining a maximum allowed time between two messages of a random access procedure; and
indicate, via the radio station, the at least one time window size to one or more user equipments in the cell. 73. The cell controller of claim 72:
wherein the at least one time window comprises a time window defining a maximum allowed time between a sending a random access preamble by a user equipment and receiving a random access response by the user equipment; or wherein the at least one time window comprises a time window defining a maximum allowed time between sending a scheduled transmission by a user equipment and receiving a contention resolution message by the user equipment. 74. The cell controller of claim 72, wherein the at least one processor is configured to determine the transmission delay by measuring a time difference between sending a probe message on the backhaul connection and receiving a response to the probe message. 75. The cell controller of claim 72, wherein the at least one processor is configured to determine the at least one time window further depending on an antenna configuration of the radio station or on an a processing performance of the radio station. 76. The cell controller of claim 72, wherein the at least one processor is configured to:
for each of multiple radio stations serving the cell, determine the transmission delay of a backhaul connection from the radio station to the at least one interface of the cell controller; for each of the radio stations, determine the at least one time window from the determined transmission delay, and for each of the radio stations, indicate the determined at least one time window via the radio station to one or more user equipments. 77. The cell controller of claim 76, wherein at least one processor is configured to, for at least two of the radio stations, allocate different resources for sending information indicating the at least one window size. 78. The cell controller of claim 77, wherein the different resources are separated in at least one of a time domain, a code domain, and a frequency domain. 79. The cell controller of claim 72, wherein the cell operates according to Long Term Evolution radio access technology and the cell controller is an evolved Node B. 80. A radio station for serving a cell of a mobile network, the radio station comprising:
at least one processor; an interface for establishing a backhaul connection to a cell controller of the cell; and a radio interface, wherein the at least one processor is configured to:
determine a transmission delay of the backhaul connection;
depending on the transmission delay, determine at least one time window defining a maximum allowed time between two messages of a random access procedure; and
indicate, via the radio interface, the at least one time window size to one or more user equipments in the cell. 81. The radio station of claim 80:
wherein the at least one time window comprises a time window defining a maximum allowed time between a sending a random access preamble by a user equipment and receiving a random access response by the user equipment; or wherein the at least one time window comprises a time window defining a maximum allowed time between sending a scheduled transmission by a user equipment and receiving a contention resolution message by the user equipment. 82. The radio station of claim 80, wherein the at least one processor is configured to determine the transmission delay by measuring a time difference between sending a probe message on the backhaul connection and receiving a response to the probe message. 83. The radio station of claim 80, wherein the at least one processor is configured to determine the at least one time window further depending on an antenna configuration of the radio station or on a processing performance of the radio station. 84. The radio station of claim 80, wherein the cell operates according to Long Term Evolution radio access technology and the cell controller is an evolved Node B. 85. A computer program product stored in a non-transitory computer readable medium for controlling access to a cell of a mobile network, the computer program product comprising software instructions which, when run on at least one processor of a cell controller for serving a cell of a mobile network, causes the cell to:
determine a transmission delay of a backhaul connection of a radio station serving the cell; depending on the transmission delay, determine at least one time window defining a maximum allowed time between two messages of a random access procedure; and indicate, via the radio station, the at least one time window to one or more user equipments in the cell. | 2,400 |
6,754 | 6,754 | 14,615,129 | 2,492 | Some embodiments described herein relate to a method of defining and/or calculating an accuracy score for untrusted location data. The method can include receiving multiple signals including location data. Some or all of the signals may include untrusted location data. When a signal including location data is received, that location data can be stored, for example in a database. The accuracy score can be defined based on the number of entries in the database matching the received location data. If location data is statistically overrepresented in the database, it may be an indication that the location data has been assigned by an untrusted third party, rather than organically determined by the mobile communication device. Accordingly, a relatively low accuracy score indicating that the location data is synthetic can be defined when received location data matches a location that is statistically overrepresented in the database. | 1. An apparatus, comprising:
a network module configured to receive a signal identifying an untrusted location, the untrusted location associated with a mobile communication device, the untrusted location having an unknown accuracy; a first data source comparator module implemented in at least one of a processor or a memory, the first data source comparator module configured to compare the untrusted location to a database of known spoofed locations to define a first match when the untrusted location matches a known spoofed location from the database; a second data source comparator module implemented in at least one of a processor or memory, the second data source comparator module configured to compare the untrusted location to a plurality of locations previously received by the network module to define a second match when the untrusted location is statistically overrepresented in the plurality of locations; and a spoofed location detection module operably coupled to the first data source comparator module, the second data source comparator module, and the network module, the spoofed location detection module configured to determine if the untrusted location was determined by the mobile communication device, the spoofed location detection module configured to determine based, at least in part, on at least one of (1) the first match, or (2) the second match. 2. The apparatus of claim 1, wherein the network module is configured to send a signal including the untrusted location and an indication that the untrusted location is spoofed. 3. The apparatus of claim 1, further comprising:
a location scoring module operably coupled to the second data source comparator module, the location scoring module configured to estimate an accuracy of the location based, at least in part, on the second data source comparator module comparing the location to the plurality of locations preciously received by the network module. 4. The apparatus of claim 1, wherein the database of known spoofed locations includes at least one of (1) a table of IP addresses linked to locations, (2) major metropolitan landmarks, or (3) cellular tower locations. 5. A non-transitory processor readable medium storing code representing instructions to be executed by a processor, the code comprising code to cause the processor to:
receive, from a first server, a signal including untrusted location data; define an accuracy score for the untrusted location data based, at least in part, on a comparison of the untrusted location data to a plurality of predefined synthetic locations, each predefined synthetic location from the plurality of synthetic locations being a single location that a third party represents as corresponding to multiple locations; and send, to a second server, a signal including the untrusted location data and the accuracy score collectively representing trusted location data. 6. The non-transitory processor readable medium of claim 5, wherein the untrusted location data is spoofed location data, and the accuracy score is defined such that, when the accuracy score is below a threshold level, the untrusted location data can be identified as spoofed location data. 7. The non-transitory processor readable medium of claim 5, wherein:
the untrusted location data is associated with a mobile communication device; the accuracy score is below a low accuracy threshold; and the code to cause the processor to send the signal including the accuracy score includes code to cause the processor to send the signal such that the second server disregards the untrusted location data when evaluating a location of the mobile communication device. 8. The non-transitory processor readable medium of claim 5, wherein each synthetic location from the plurality of synthetic locations is a centroid of a geographic area. 9. The non-transitory processor readable medium of claim 5, wherein the each synthetic location from the plurality of synthetic locations is a published location associated with a point of interest. 10. The non-transitory processor readable medium of claim 5, wherein:
the untrusted location data is associated with a mobile communication device; and the code configured to cause the processor to define the accuracy score includes code to cause the processor to calculate the accuracy score based on a likelihood that the untrusted location data was supplied by a device other than the mobile communication device. 11. The non-transitory processor readable medium of claim 5, wherein:
the untrusted location data is associated with a mobile communication device; the first server is not the mobile communication device; and the code configured to cause the processor to calculate the accuracy score includes code to cause the processor to estimate a probability that the untrusted location data was supplied by the first server. 12. The non-transitory processor readable medium of claim 5, wherein the first server is the second server. 13. The non-transitory processor readable medium of claim 5, the code further comprising code to cause the processor to receive a request to verify the accuracy of the location data, the accuracy score defined in response to the request. 14. The non-transitory processor readable medium of claim 5, wherein the signal including the untrusted location data is a first signal including first untrusted location data, the trusted location data is first trusted location data, the code further comprising code to cause the processor to:
define a record in a database for the first location data; receive a signal including second untrusted location data after defining the record in the database, the second untrusted location data matching the first untrusted location data; define an accuracy score for the second untrusted location data based, at least in part, on a probability of the untrusted second location data matching the first untrusted location data; and send a signal including the second untrusted location data and the accuracy score for the second untrusted location data collectively representing second trusted location data. 15. The non-transitory processor readable medium of claim 14, wherein
the code to cause the processor to define the accuracy score for the second untrusted location data includes code to cause the processor to define the accuracy score for the second untrusted location data based, at least in part, on a comparison of the second untrusted location data to the plurality of synthetic locations. 16. A non-transitory processor readable medium storing code representing instructions to be executed by a processor, the code comprising code to cause the processor to:
receive a plurality of signals, each signal from the plurality of signals identifying a location from a plurality of locations; define a record in a database for each location from the plurality of locations; receive a signal identifying an untrusted location; define an accuracy score for the untrusted location based, at least in part, on a number of records in the database matching the untrusted location in the database; and send, a signal including the accuracy score for the location. 17. The non-transitory processor readable medium of claim 16, wherein:
the untrusted location is a first untrusted location; and a signal from the plurality of signals identifies a second untrusted location. 18. The non-transitory processor readable medium of claim 16, wherein a record in the database matches the untrusted location when a location for that record exactly matches the untrusted location. 19. The non-transitory processor readable medium of claim 16, wherein:
each location from the plurality of locations has a precision; the untrusted location has a precision; and a record in the database matches the untrusted location when a location for that record matches the untrusted location within the lesser of (1) the precision of that location from the plurality of locations or (2) the precision of the untrusted location. 20. The non-transitory processor readable medium of claim 16, wherein a record in the database matches the untrusted location when a location for that record is within a predetermined distance of the untrusted location. 21. The non-transitory processor readable medium of claim 16, wherein:
the untrusted location is a first location, each location from the plurality of locations appears in the database with a frequency such that the database has a measure of central tendency of frequency, the code further comprising code to cause the processor to: identify a plurality of records in the database for a second location matching the first location, a frequency of the second location being more than a predetermined number of standard deviations from the measure of central tendency of frequency. 22. The non-transitory processor readable medium of claim 21, the code further comprising code to cause the processor to:
determine that the frequency of the second location is a synthetic outlier based on matching the second location to a predefined synthetic location from a plurality of predefined synthetic locations, each predefined synthetic location from the plurality of synthetic locations being a single location that a third party represents as corresponding to multiple locations; and the code to cause the processor to define the accuracy score for the first location includes code to cause the processor to define a low accuracy score based, at least in part, on (1) the frequency of the second location being more than a predetermined number of standard deviations the measure of central tendency of frequency and (2) determining that the frequency of the second location is a synthetic outlier. 23. The non-transitory processor readable medium of claim 21, the code further comprising code to cause the processor to:
determine that the frequency is an organic outlier based on the second location not matching a predefined synthetic location from a plurality of predefined synthetic locations, each predefined synthetic location from the plurality of synthetic locations being a single location that a third party represents as corresponding to multiple locations; and the code to cause the processor to define the accuracy score for the first location includes code to cause the processor to define an accuracy score greater than a low accuracy score based, at least in part, on determining that the frequency of the second location is an organic outlier. 24. The non-transitory processor readable medium of claim 21, the code further comprising code to cause the processor to:
select a third location within 100 feet of the second location; and determine that the third location appears in the database with a frequency greater than the measure of central tendency of frequency; determine that the second location is an organic outlier based, at least in part, on the frequency of the third location; and the code to cause the processor to define the accuracy score for the first location includes code to cause the processor to define an accuracy score greater than a low accuracy score based, at least in part, on determining that the second location is an organic outlier. | Some embodiments described herein relate to a method of defining and/or calculating an accuracy score for untrusted location data. The method can include receiving multiple signals including location data. Some or all of the signals may include untrusted location data. When a signal including location data is received, that location data can be stored, for example in a database. The accuracy score can be defined based on the number of entries in the database matching the received location data. If location data is statistically overrepresented in the database, it may be an indication that the location data has been assigned by an untrusted third party, rather than organically determined by the mobile communication device. Accordingly, a relatively low accuracy score indicating that the location data is synthetic can be defined when received location data matches a location that is statistically overrepresented in the database.1. An apparatus, comprising:
a network module configured to receive a signal identifying an untrusted location, the untrusted location associated with a mobile communication device, the untrusted location having an unknown accuracy; a first data source comparator module implemented in at least one of a processor or a memory, the first data source comparator module configured to compare the untrusted location to a database of known spoofed locations to define a first match when the untrusted location matches a known spoofed location from the database; a second data source comparator module implemented in at least one of a processor or memory, the second data source comparator module configured to compare the untrusted location to a plurality of locations previously received by the network module to define a second match when the untrusted location is statistically overrepresented in the plurality of locations; and a spoofed location detection module operably coupled to the first data source comparator module, the second data source comparator module, and the network module, the spoofed location detection module configured to determine if the untrusted location was determined by the mobile communication device, the spoofed location detection module configured to determine based, at least in part, on at least one of (1) the first match, or (2) the second match. 2. The apparatus of claim 1, wherein the network module is configured to send a signal including the untrusted location and an indication that the untrusted location is spoofed. 3. The apparatus of claim 1, further comprising:
a location scoring module operably coupled to the second data source comparator module, the location scoring module configured to estimate an accuracy of the location based, at least in part, on the second data source comparator module comparing the location to the plurality of locations preciously received by the network module. 4. The apparatus of claim 1, wherein the database of known spoofed locations includes at least one of (1) a table of IP addresses linked to locations, (2) major metropolitan landmarks, or (3) cellular tower locations. 5. A non-transitory processor readable medium storing code representing instructions to be executed by a processor, the code comprising code to cause the processor to:
receive, from a first server, a signal including untrusted location data; define an accuracy score for the untrusted location data based, at least in part, on a comparison of the untrusted location data to a plurality of predefined synthetic locations, each predefined synthetic location from the plurality of synthetic locations being a single location that a third party represents as corresponding to multiple locations; and send, to a second server, a signal including the untrusted location data and the accuracy score collectively representing trusted location data. 6. The non-transitory processor readable medium of claim 5, wherein the untrusted location data is spoofed location data, and the accuracy score is defined such that, when the accuracy score is below a threshold level, the untrusted location data can be identified as spoofed location data. 7. The non-transitory processor readable medium of claim 5, wherein:
the untrusted location data is associated with a mobile communication device; the accuracy score is below a low accuracy threshold; and the code to cause the processor to send the signal including the accuracy score includes code to cause the processor to send the signal such that the second server disregards the untrusted location data when evaluating a location of the mobile communication device. 8. The non-transitory processor readable medium of claim 5, wherein each synthetic location from the plurality of synthetic locations is a centroid of a geographic area. 9. The non-transitory processor readable medium of claim 5, wherein the each synthetic location from the plurality of synthetic locations is a published location associated with a point of interest. 10. The non-transitory processor readable medium of claim 5, wherein:
the untrusted location data is associated with a mobile communication device; and the code configured to cause the processor to define the accuracy score includes code to cause the processor to calculate the accuracy score based on a likelihood that the untrusted location data was supplied by a device other than the mobile communication device. 11. The non-transitory processor readable medium of claim 5, wherein:
the untrusted location data is associated with a mobile communication device; the first server is not the mobile communication device; and the code configured to cause the processor to calculate the accuracy score includes code to cause the processor to estimate a probability that the untrusted location data was supplied by the first server. 12. The non-transitory processor readable medium of claim 5, wherein the first server is the second server. 13. The non-transitory processor readable medium of claim 5, the code further comprising code to cause the processor to receive a request to verify the accuracy of the location data, the accuracy score defined in response to the request. 14. The non-transitory processor readable medium of claim 5, wherein the signal including the untrusted location data is a first signal including first untrusted location data, the trusted location data is first trusted location data, the code further comprising code to cause the processor to:
define a record in a database for the first location data; receive a signal including second untrusted location data after defining the record in the database, the second untrusted location data matching the first untrusted location data; define an accuracy score for the second untrusted location data based, at least in part, on a probability of the untrusted second location data matching the first untrusted location data; and send a signal including the second untrusted location data and the accuracy score for the second untrusted location data collectively representing second trusted location data. 15. The non-transitory processor readable medium of claim 14, wherein
the code to cause the processor to define the accuracy score for the second untrusted location data includes code to cause the processor to define the accuracy score for the second untrusted location data based, at least in part, on a comparison of the second untrusted location data to the plurality of synthetic locations. 16. A non-transitory processor readable medium storing code representing instructions to be executed by a processor, the code comprising code to cause the processor to:
receive a plurality of signals, each signal from the plurality of signals identifying a location from a plurality of locations; define a record in a database for each location from the plurality of locations; receive a signal identifying an untrusted location; define an accuracy score for the untrusted location based, at least in part, on a number of records in the database matching the untrusted location in the database; and send, a signal including the accuracy score for the location. 17. The non-transitory processor readable medium of claim 16, wherein:
the untrusted location is a first untrusted location; and a signal from the plurality of signals identifies a second untrusted location. 18. The non-transitory processor readable medium of claim 16, wherein a record in the database matches the untrusted location when a location for that record exactly matches the untrusted location. 19. The non-transitory processor readable medium of claim 16, wherein:
each location from the plurality of locations has a precision; the untrusted location has a precision; and a record in the database matches the untrusted location when a location for that record matches the untrusted location within the lesser of (1) the precision of that location from the plurality of locations or (2) the precision of the untrusted location. 20. The non-transitory processor readable medium of claim 16, wherein a record in the database matches the untrusted location when a location for that record is within a predetermined distance of the untrusted location. 21. The non-transitory processor readable medium of claim 16, wherein:
the untrusted location is a first location, each location from the plurality of locations appears in the database with a frequency such that the database has a measure of central tendency of frequency, the code further comprising code to cause the processor to: identify a plurality of records in the database for a second location matching the first location, a frequency of the second location being more than a predetermined number of standard deviations from the measure of central tendency of frequency. 22. The non-transitory processor readable medium of claim 21, the code further comprising code to cause the processor to:
determine that the frequency of the second location is a synthetic outlier based on matching the second location to a predefined synthetic location from a plurality of predefined synthetic locations, each predefined synthetic location from the plurality of synthetic locations being a single location that a third party represents as corresponding to multiple locations; and the code to cause the processor to define the accuracy score for the first location includes code to cause the processor to define a low accuracy score based, at least in part, on (1) the frequency of the second location being more than a predetermined number of standard deviations the measure of central tendency of frequency and (2) determining that the frequency of the second location is a synthetic outlier. 23. The non-transitory processor readable medium of claim 21, the code further comprising code to cause the processor to:
determine that the frequency is an organic outlier based on the second location not matching a predefined synthetic location from a plurality of predefined synthetic locations, each predefined synthetic location from the plurality of synthetic locations being a single location that a third party represents as corresponding to multiple locations; and the code to cause the processor to define the accuracy score for the first location includes code to cause the processor to define an accuracy score greater than a low accuracy score based, at least in part, on determining that the frequency of the second location is an organic outlier. 24. The non-transitory processor readable medium of claim 21, the code further comprising code to cause the processor to:
select a third location within 100 feet of the second location; and determine that the third location appears in the database with a frequency greater than the measure of central tendency of frequency; determine that the second location is an organic outlier based, at least in part, on the frequency of the third location; and the code to cause the processor to define the accuracy score for the first location includes code to cause the processor to define an accuracy score greater than a low accuracy score based, at least in part, on determining that the second location is an organic outlier. | 2,400 |
6,755 | 6,755 | 15,081,674 | 2,447 | A computer-implemented system and method for providing a dynamic execution environment. In an embodiment, the system and method comprises receiving a base user interface from a server, creating and storing one or more intermediate representations (IRs) which represent a mapping between the base user interface and a modified user interface, executing the one or more IRs to intercept network communication from the server, map between the base user interface and the modified user interface, and send the modified user interface to one or more clients, and executing the one or more IRs to intercept network communication from the one or more clients to the server with user data, map between the modified user interface and the base user interface, and send the base user interface and the user data to the server. | 1. (canceled) 2. A computer-implemented method for providing an event-trapping mechanism in a dynamic execution environment, the method comprising, by at least one hardware processor:
creating one or more execution blocks from a function stored in a script, wherein each of the one or more execution blocks is associated with a sequence of screen events of a user interface; storing the one or more execution blocks as handlers; and executing at least one of the one or more handlers independently from the others, when the associated sequence of screen events for the handler is detected in network traffic. 3. The method of claim 2, wherein the sequence of screen events is one or more of an on-screen event, an on-error event, and an on-message event. 4. The method of claim 2, wherein an entry event for the function is stored in an event array which associates events with functions. 5. The method of claim 2, wherein the one or more handlers exist in one or more sequences of screen events. 6. The method of claim 2, wherein the script contains goto statements for moving between the one or more handlers. 7. The method of claim 2, wherein the associated sequence of screen events are document object model events. 8. The method of claim 2, wherein the network traffic is traffic between a client and a server such that the dynamic execution environment is an intermediary monitoring the network traffic. 9. The method of claim 8, wherein the handlers are stored in a memory of the dynamic execution environment. 10. A system for providing an event-trapping mechanism in a dynamic execution environment, comprising:
at least one hardware processor configured to perform the steps comprising:
creating one or more execution blocks from a function stored in a script,
wherein each of the one or more execution blocks is associated with a sequence of screen events of a user interface;
storing the one or more execution blocks as handlers; and
executing at least one of the one or more handlers independently from the others, when the associated sequence of screen events for the handler is detected in network traffic. 11. The system of claim 10, wherein the sequence of screen events is one or more of an on-screen event, an on-error event, and an on-message event. 12. The system of claim 10, wherein an entry event for the function is stored in an event array which associates events with functions. 13. The system of claim 10, wherein the one or more handlers exist in one or more sequences of screen events. 14. The system of claim 10, wherein the script contains goto statements for moving between the one or more handlers. 15. The system of claim 10, wherein the associated sequence of screen events are document object model events. 16. The system of claim 10, wherein the network traffic is traffic between a client and a server such that the dynamic execution environment is an intermediary monitoring the network traffic. 17. The method of claim 16, wherein the handlers are stored in a memory of the dynamic execution environment. | A computer-implemented system and method for providing a dynamic execution environment. In an embodiment, the system and method comprises receiving a base user interface from a server, creating and storing one or more intermediate representations (IRs) which represent a mapping between the base user interface and a modified user interface, executing the one or more IRs to intercept network communication from the server, map between the base user interface and the modified user interface, and send the modified user interface to one or more clients, and executing the one or more IRs to intercept network communication from the one or more clients to the server with user data, map between the modified user interface and the base user interface, and send the base user interface and the user data to the server.1. (canceled) 2. A computer-implemented method for providing an event-trapping mechanism in a dynamic execution environment, the method comprising, by at least one hardware processor:
creating one or more execution blocks from a function stored in a script, wherein each of the one or more execution blocks is associated with a sequence of screen events of a user interface; storing the one or more execution blocks as handlers; and executing at least one of the one or more handlers independently from the others, when the associated sequence of screen events for the handler is detected in network traffic. 3. The method of claim 2, wherein the sequence of screen events is one or more of an on-screen event, an on-error event, and an on-message event. 4. The method of claim 2, wherein an entry event for the function is stored in an event array which associates events with functions. 5. The method of claim 2, wherein the one or more handlers exist in one or more sequences of screen events. 6. The method of claim 2, wherein the script contains goto statements for moving between the one or more handlers. 7. The method of claim 2, wherein the associated sequence of screen events are document object model events. 8. The method of claim 2, wherein the network traffic is traffic between a client and a server such that the dynamic execution environment is an intermediary monitoring the network traffic. 9. The method of claim 8, wherein the handlers are stored in a memory of the dynamic execution environment. 10. A system for providing an event-trapping mechanism in a dynamic execution environment, comprising:
at least one hardware processor configured to perform the steps comprising:
creating one or more execution blocks from a function stored in a script,
wherein each of the one or more execution blocks is associated with a sequence of screen events of a user interface;
storing the one or more execution blocks as handlers; and
executing at least one of the one or more handlers independently from the others, when the associated sequence of screen events for the handler is detected in network traffic. 11. The system of claim 10, wherein the sequence of screen events is one or more of an on-screen event, an on-error event, and an on-message event. 12. The system of claim 10, wherein an entry event for the function is stored in an event array which associates events with functions. 13. The system of claim 10, wherein the one or more handlers exist in one or more sequences of screen events. 14. The system of claim 10, wherein the script contains goto statements for moving between the one or more handlers. 15. The system of claim 10, wherein the associated sequence of screen events are document object model events. 16. The system of claim 10, wherein the network traffic is traffic between a client and a server such that the dynamic execution environment is an intermediary monitoring the network traffic. 17. The method of claim 16, wherein the handlers are stored in a memory of the dynamic execution environment. | 2,400 |
6,756 | 6,756 | 14,527,146 | 2,424 | An apparatus is provided. The apparatus includes a communication unit configured to communicate with a first electronic device, and a control unit operatively coupled with the communication unit, the control unit configured to receive, from the first electronic device via the communication unit, information associated with a playback location of multimedia data, the multimedia data to be presented at a second electronic device operatively coupled with the apparatus, based at least in part on the information, and transmit at least one portion of the multimedia data, to the second electronic device. | 1. An apparatus comprising:
a communication unit configured to communicate with a first electronic device; and a control unit operatively coupled with the communication unit, the control unit configured to: receive, from the first electronic device via the communication unit, information associated with a playback location of multimedia data, the multimedia data to be presented at a second electronic device operatively coupled with the apparatus, based at least in part on the information; and transmit at least one portion of the multimedia data, to the second electronic device. 2. The apparatus of claim 1, wherein the playback location corresponds to a location following another location at which a previous presentation of the multimedia data stopped or paused. 3. The apparatus of claim 1, wherein the information comprises:
at least one of a frame number or a time corresponding to the playback location. 4. The apparatus of claim 1, wherein the at least one portion is received from the first electronic device. 5. The apparatus of claim 1, wherein the control unit is configured to determine the at least one portion based on the information. 6. The apparatus of claim 1, wherein the at least one portion comprises a specified portion following the playback location. 7. The apparatus of claim 1, wherein the control unit is configured to:
receive other information associated with at least one of an identification, a type, a title, a time, a resolution, a bit rate, or a codec corresponding to the multimedia data. 8. The apparatus of claim 1, wherein the control unit is configured to:
receive, from the first electronic device, a message to request presenting the at least one portion. 9. The apparatus of claim 1, wherein the control unit is configured to:
receive, from the first electronic device, a message to request turning on or turning off at least one of the second electronic device or the apparatus. 10. The apparatus of claim 1, wherein the control unit is configured to:
receive, from the first electronic device, a message to request at least one of pausing, stopping, fast forwarding or rewinding the at least one portion. 11. An apparatus comprising:
a communication unit configured to communicate with a first electronic device; and a control unit operatively coupled with the communication unit, the control unit configured to: receive, from the first electronic device via the communication unit, information to identify multimedia data, receive, from the first electronic device via the communication unit, a message to request presenting at least one portion of the multimedia data; decode the at least one portion based on the information; and transmit the decoded at least one portion to a second electronic device operatively coupled to the apparatus, such that the at least one portion can be presented at the second electronic device. 12. The apparatus of claim 11, wherein the information is included in the message. 13. The apparatus of claim 11, wherein the control unit is configured to:
obtain the at least one portion from the first electronic device. 14. The apparatus of claim 11, wherein the decoded at least one portion can be presented at the second electronic device in real time. 15. The apparatus of claim 11, wherein the control unit is further configured to:
stop transmitting of at least part of the decoded at least one portion based on another message. 16. An apparatus comprising:
a communication unit configured to wirelessly communicate with a first electronic device; and a control unit operatively coupled with the communication unit, the control unit configured to: receive, from the first electronic device via the communication unit, information to identify multimedia data, with a message to request presenting at least one portion of the multimedia data; obtain, from the first electronic device, the at least one portion; and transmit the at least one portion to a second electronic device operatively coupled with the apparatus, such that the at least one portion can be presented at the second electronic device in real time. 17. The apparatus of claim 16, wherein the information comprises:
at least one of an identification, a type, a title, a time, a resolution, a bit rate, a frame, and a codec corresponding to the multimedia data. 18. An apparatus comprising:
a communication unit configured to communicate with a first electronic device; and a control unit operatively coupled with the communication unit, the control unit configured to: obtain a user input to present at least one portion of multimedia data at a second electronic device operatively coupled with the first electronic device; and transmit, to the first electronic device, the at least one portion and information to identify the at least one portion, based on the user input. 19. The apparatus of claim 18, wherein the control unit is configured to:
provide a user interface to obtain the user input. 20. The apparatus of claim 19, wherein the providing of the user interface comprises a menu to control playing of the multimedia data. 21. The apparatus of claim 18, wherein the control unit is configured to:
receive another user input to stop transmitting at least a part of the at least one portion. 22. The apparatus of claim 18, wherein the control unit is configured to:
transmit, to the first electronic device via the communication unit, a message to request presenting the at least one portion. 23. The apparatus of claim 22, wherein the control unit is configured to:
transmit the at least one portion in response to a response message corresponding to the message, the response message received from the first electronic device. 24. The apparatus of claim 22, wherein the control unit is configured to:
display an indicator that the first electronic device is available to communicate with the apparatus in response to a response message corresponding to the message, the response message received from the first electronic device. | An apparatus is provided. The apparatus includes a communication unit configured to communicate with a first electronic device, and a control unit operatively coupled with the communication unit, the control unit configured to receive, from the first electronic device via the communication unit, information associated with a playback location of multimedia data, the multimedia data to be presented at a second electronic device operatively coupled with the apparatus, based at least in part on the information, and transmit at least one portion of the multimedia data, to the second electronic device.1. An apparatus comprising:
a communication unit configured to communicate with a first electronic device; and a control unit operatively coupled with the communication unit, the control unit configured to: receive, from the first electronic device via the communication unit, information associated with a playback location of multimedia data, the multimedia data to be presented at a second electronic device operatively coupled with the apparatus, based at least in part on the information; and transmit at least one portion of the multimedia data, to the second electronic device. 2. The apparatus of claim 1, wherein the playback location corresponds to a location following another location at which a previous presentation of the multimedia data stopped or paused. 3. The apparatus of claim 1, wherein the information comprises:
at least one of a frame number or a time corresponding to the playback location. 4. The apparatus of claim 1, wherein the at least one portion is received from the first electronic device. 5. The apparatus of claim 1, wherein the control unit is configured to determine the at least one portion based on the information. 6. The apparatus of claim 1, wherein the at least one portion comprises a specified portion following the playback location. 7. The apparatus of claim 1, wherein the control unit is configured to:
receive other information associated with at least one of an identification, a type, a title, a time, a resolution, a bit rate, or a codec corresponding to the multimedia data. 8. The apparatus of claim 1, wherein the control unit is configured to:
receive, from the first electronic device, a message to request presenting the at least one portion. 9. The apparatus of claim 1, wherein the control unit is configured to:
receive, from the first electronic device, a message to request turning on or turning off at least one of the second electronic device or the apparatus. 10. The apparatus of claim 1, wherein the control unit is configured to:
receive, from the first electronic device, a message to request at least one of pausing, stopping, fast forwarding or rewinding the at least one portion. 11. An apparatus comprising:
a communication unit configured to communicate with a first electronic device; and a control unit operatively coupled with the communication unit, the control unit configured to: receive, from the first electronic device via the communication unit, information to identify multimedia data, receive, from the first electronic device via the communication unit, a message to request presenting at least one portion of the multimedia data; decode the at least one portion based on the information; and transmit the decoded at least one portion to a second electronic device operatively coupled to the apparatus, such that the at least one portion can be presented at the second electronic device. 12. The apparatus of claim 11, wherein the information is included in the message. 13. The apparatus of claim 11, wherein the control unit is configured to:
obtain the at least one portion from the first electronic device. 14. The apparatus of claim 11, wherein the decoded at least one portion can be presented at the second electronic device in real time. 15. The apparatus of claim 11, wherein the control unit is further configured to:
stop transmitting of at least part of the decoded at least one portion based on another message. 16. An apparatus comprising:
a communication unit configured to wirelessly communicate with a first electronic device; and a control unit operatively coupled with the communication unit, the control unit configured to: receive, from the first electronic device via the communication unit, information to identify multimedia data, with a message to request presenting at least one portion of the multimedia data; obtain, from the first electronic device, the at least one portion; and transmit the at least one portion to a second electronic device operatively coupled with the apparatus, such that the at least one portion can be presented at the second electronic device in real time. 17. The apparatus of claim 16, wherein the information comprises:
at least one of an identification, a type, a title, a time, a resolution, a bit rate, a frame, and a codec corresponding to the multimedia data. 18. An apparatus comprising:
a communication unit configured to communicate with a first electronic device; and a control unit operatively coupled with the communication unit, the control unit configured to: obtain a user input to present at least one portion of multimedia data at a second electronic device operatively coupled with the first electronic device; and transmit, to the first electronic device, the at least one portion and information to identify the at least one portion, based on the user input. 19. The apparatus of claim 18, wherein the control unit is configured to:
provide a user interface to obtain the user input. 20. The apparatus of claim 19, wherein the providing of the user interface comprises a menu to control playing of the multimedia data. 21. The apparatus of claim 18, wherein the control unit is configured to:
receive another user input to stop transmitting at least a part of the at least one portion. 22. The apparatus of claim 18, wherein the control unit is configured to:
transmit, to the first electronic device via the communication unit, a message to request presenting the at least one portion. 23. The apparatus of claim 22, wherein the control unit is configured to:
transmit the at least one portion in response to a response message corresponding to the message, the response message received from the first electronic device. 24. The apparatus of claim 22, wherein the control unit is configured to:
display an indicator that the first electronic device is available to communicate with the apparatus in response to a response message corresponding to the message, the response message received from the first electronic device. | 2,400 |
6,757 | 6,757 | 13,800,946 | 2,454 | A communications system including one or more alert gates and an alert controller. Each alert gate is configured to detect a different type of alert feed corresponding to a particular kind of alert. The alert controller is connected to the alert gates and operable to receive detected alerts from the alert gates and to deliver the detected alerts to a user of the communications system. | 1.-40. (canceled) 41. A method comprising:
detecting, using one or more processors, an alert; presenting, to a user associated with the alert, an alert notification representative of the alert; detecting a selection, by the user, of the alert notification; and presenting, in response to the detected selection, information associated with the alert than the first alert notification. 42. A method comprising:
detecting, using one or more processors, an alert; presenting, to a user associated with the alert, a alert notification representative of the alert; detecting an interaction, by the user, with the alert notification; and presenting, in response to the detected interaction, information associated with the alert than the first alert notification. | A communications system including one or more alert gates and an alert controller. Each alert gate is configured to detect a different type of alert feed corresponding to a particular kind of alert. The alert controller is connected to the alert gates and operable to receive detected alerts from the alert gates and to deliver the detected alerts to a user of the communications system.1.-40. (canceled) 41. A method comprising:
detecting, using one or more processors, an alert; presenting, to a user associated with the alert, an alert notification representative of the alert; detecting a selection, by the user, of the alert notification; and presenting, in response to the detected selection, information associated with the alert than the first alert notification. 42. A method comprising:
detecting, using one or more processors, an alert; presenting, to a user associated with the alert, a alert notification representative of the alert; detecting an interaction, by the user, with the alert notification; and presenting, in response to the detected interaction, information associated with the alert than the first alert notification. | 2,400 |
6,758 | 6,758 | 11,751,445 | 2,468 | Methods and apparatus to communicate using a multi-fidelity audio gateway are described. One example method receives information associated with at least one communication service via a multi-fidelity audio gateway and selects at least one communication path for use by the gateway device based on the communication service. | 1-5. (canceled) 6. A method comprising:
receiving information associated with at least one voice communication service via a multi-fidelity audio gateway; and selecting at least one output communication path for use by the multi-fidelity audio gateway based on the at least one voice communication service. 7. The method as defined in claim 6, wherein the at least one output communication path is associated with an audio fidelity. 8. The method as defined in claim 7, wherein the audio fidelity is based on at least a sampling rate, a number of bits, or a compression algorithm. 9. The method as defined in claim 6, wherein the voice communication services comprise Internet protocol based communication services. 10. The method as defined in claim 6, wherein the at least one voice communication service comprises at least one of a voice over internet protocol, a public switched telephone network service, or a speech recognition service. 11. The method as defined in claim 6, wherein selecting the at least one output communication path for use by the multi-fidelity audio gateway device based on the at least one voice communication service comprises selecting the at least one output communication path based on a bandwidth of an internet network connection. 12. A media system comprising:
a processor to process information associated with at least one voice communication service; and a multi-fidelity audio gateway coupled to the processor to select an output communication path to configure the media system for use with the at least one voice communication service. 13. A media system as defined in claim 12, wherein the multi-fidelity audio gateway is associated with a plurality of audio fidelities. 14. A media system as defined in claim 13, wherein each of the audio fidelities is based on at least a sampling rate, a number of bits, or a compression algorithm. 15. A media system as defined in claim 12, wherein the media system is to interact with a remote device to capture audio from a person and convey the captured audio to the media system. 16. A media system as defined in claim 15, wherein the media system is to convey the captured audio from a person to another person. 17. A media system as defined in claim 12, wherein the multi-fidelity audio gateway is provided via a service module. 18. A media system as defined in claim 17, wherein the service module is to be received by the media system while the media system is operating. 19. A media system as defined in claim 17, wherein the media system is to be associated with at least one additional service module to provide at least one service to the media system. 20. A media system as defined in claim 19, wherein the multi-fidelity audio gateway is to interact with the at least one additional service module. 21. An apparatus to control a media system, comprising:
an audio interface to receive first audio information from the media system via a communication link and present the first audio information to a person; and an audio instrument to receive audio from the person and convey second audio information to the media system via the communication link. 22. An apparatus as defined in claim 21, further comprising a processor to convert the first audio information into digital information. 23. An apparatus as defined in claim 21, further comprising a communication device is to convey audio information via the communication link. 24. An apparatus as defined in claim 23, wherein the media system is to convey the second audio information to another person via a voice communication service associated with the media system. 25. An apparatus as defined in claim 21, wherein the media system is to receive the first audio information via a voice communication service associated with the media system. 26. An apparatus as defined in claim 25, wherein the media system is to convey the first audio information via a communication device. 27-29. (canceled) 30. An apparatus comprising:
means for processing information associated with at least one voice communication service; and means for selecting at least one output communication path to configure a media system for use with the at least one voice communication service. 31. An apparatus as defined in claim 29, wherein the at least one output communication path is associated with an audio fidelity. 32. An apparatus as defined in claim 30, wherein the audio fidelity is based on at least a sampling rate, a number of bits, or a compression algorithm. 33. An apparatus as defined in claim 29, wherein the at least one voice communication service comprises at least one of a voice over internet protocol, a public switched telephone network service, or a speech recognition service. 34. An apparatus as defined in claim 29, wherein the means for selecting the output communication path comprises means for selecting the at least one communication path based on a bandwidth of an internet network connection. | Methods and apparatus to communicate using a multi-fidelity audio gateway are described. One example method receives information associated with at least one communication service via a multi-fidelity audio gateway and selects at least one communication path for use by the gateway device based on the communication service.1-5. (canceled) 6. A method comprising:
receiving information associated with at least one voice communication service via a multi-fidelity audio gateway; and selecting at least one output communication path for use by the multi-fidelity audio gateway based on the at least one voice communication service. 7. The method as defined in claim 6, wherein the at least one output communication path is associated with an audio fidelity. 8. The method as defined in claim 7, wherein the audio fidelity is based on at least a sampling rate, a number of bits, or a compression algorithm. 9. The method as defined in claim 6, wherein the voice communication services comprise Internet protocol based communication services. 10. The method as defined in claim 6, wherein the at least one voice communication service comprises at least one of a voice over internet protocol, a public switched telephone network service, or a speech recognition service. 11. The method as defined in claim 6, wherein selecting the at least one output communication path for use by the multi-fidelity audio gateway device based on the at least one voice communication service comprises selecting the at least one output communication path based on a bandwidth of an internet network connection. 12. A media system comprising:
a processor to process information associated with at least one voice communication service; and a multi-fidelity audio gateway coupled to the processor to select an output communication path to configure the media system for use with the at least one voice communication service. 13. A media system as defined in claim 12, wherein the multi-fidelity audio gateway is associated with a plurality of audio fidelities. 14. A media system as defined in claim 13, wherein each of the audio fidelities is based on at least a sampling rate, a number of bits, or a compression algorithm. 15. A media system as defined in claim 12, wherein the media system is to interact with a remote device to capture audio from a person and convey the captured audio to the media system. 16. A media system as defined in claim 15, wherein the media system is to convey the captured audio from a person to another person. 17. A media system as defined in claim 12, wherein the multi-fidelity audio gateway is provided via a service module. 18. A media system as defined in claim 17, wherein the service module is to be received by the media system while the media system is operating. 19. A media system as defined in claim 17, wherein the media system is to be associated with at least one additional service module to provide at least one service to the media system. 20. A media system as defined in claim 19, wherein the multi-fidelity audio gateway is to interact with the at least one additional service module. 21. An apparatus to control a media system, comprising:
an audio interface to receive first audio information from the media system via a communication link and present the first audio information to a person; and an audio instrument to receive audio from the person and convey second audio information to the media system via the communication link. 22. An apparatus as defined in claim 21, further comprising a processor to convert the first audio information into digital information. 23. An apparatus as defined in claim 21, further comprising a communication device is to convey audio information via the communication link. 24. An apparatus as defined in claim 23, wherein the media system is to convey the second audio information to another person via a voice communication service associated with the media system. 25. An apparatus as defined in claim 21, wherein the media system is to receive the first audio information via a voice communication service associated with the media system. 26. An apparatus as defined in claim 25, wherein the media system is to convey the first audio information via a communication device. 27-29. (canceled) 30. An apparatus comprising:
means for processing information associated with at least one voice communication service; and means for selecting at least one output communication path to configure a media system for use with the at least one voice communication service. 31. An apparatus as defined in claim 29, wherein the at least one output communication path is associated with an audio fidelity. 32. An apparatus as defined in claim 30, wherein the audio fidelity is based on at least a sampling rate, a number of bits, or a compression algorithm. 33. An apparatus as defined in claim 29, wherein the at least one voice communication service comprises at least one of a voice over internet protocol, a public switched telephone network service, or a speech recognition service. 34. An apparatus as defined in claim 29, wherein the means for selecting the output communication path comprises means for selecting the at least one communication path based on a bandwidth of an internet network connection. | 2,400 |
6,759 | 6,759 | 14,016,022 | 2,498 | A method of protecting confidential data stored in a computing device. In one embodiment, data items are encrypted using content-encryption keys that are not present in the device while the device is locked. When a user unlocks the device, the content- encryption keys are computed using at least one externally stored key that is retrieved from a key storage service using a credential regenerated from a protocredential stored in the device and one or more secrets supplied by a user. | 1. A method of protecting confidential data stored in a computing device, comprising:
storing the confidential data in encrypted form; regenerating a credential from a protocredential stored in the device and one or more secrets not stored in the device; requesting a content-encryption key from a key storage service, the credential being used to authenticate the request; and using the content-encryption key to decrypt the confidential data. 2. A method of protecting confidential data stored in a computing device, comprising:
storing the confidential data in encrypted form; regenerating a credential from a protocredential stored in the device and one or more secrets not stored in the device; requesting an externally stored key from a key storage service, the credential being used to authenticate the request; performing a computation of a content-encryption key using the externally stored key as an input to the computation; and using the content-encryption key to decrypt the confidential data. 3. The method of claim 2, wherein the computation of the content-encryption key takes as further inputs one or more additional externally stored keys retrieved from one or more key storage services and includes computing a key from a plurality of externally stored keys using secret sharing. 4. The method of claim 2, wherein the computation takes as further inputs the one or more secrets not stored in the device. 5. The method of claim 2, wherein the computation takes as a further input a hardware key. 6. The method of claim 2, wherein the credential comprises a private key that is part of a key pair pertaining to a public key cryptosystem. 7. The method of claim 2, wherein the one or more secrets not stored in the device comprise a passcode. 8. The method of claim 7, wherein regenerating the credential comprises deriving a parameter of the credential from the passcode by means of a key derivation function. 9. The method of claim 2, wherein the one or more secrets not stored in the device comprise a biometric sample. 10. A computing device, comprising:
one or more processors; and a storage subsystem containing encrypted confidential data and containing instructions executable by the one or more processors for: regenerating a credential from a protocredential stored in the device and one or more secrets not stored in the device; requesting an externally stored key from a key storage service, the credential being used to authenticate the request; performing a computation of a content-encryption key using the externally stored key as an input to the computation; and using the content-encryption key to decrypt the confidential data. 11. The computing device of claim 10, wherein the computation of the content-encryption key takes as further inputs one or more additional externally stored keys retrieved from one or more key storage services and includes computing a key from a plurality of externally stored keys using secret sharing. 12. The computing device of claim 10, wherein the computation takes as further inputs the one or more secrets not stored in the device. 13. The computing device of claim 10, wherein the computation takes as a further input a hardware key. 14. The computing device of claim 10, wherein the credential comprises a private key that is part of a key pair pertaining to a public key cryptosystem. 15. The computing device of claim 10, wherein the one or more secrets not stored in the device comprise a passcode, and regenerating the credential comprises deriving a parameter of the credential from the passcode by means of a key derivation function. 16. The computing device of claim 10, wherein the confidential data comprises the contents of a file. 17. The computing device of claim 10, wherein the confidential data comprises a storage volume. 18. A system, comprising:
a computing device; a key storage service containing an externally stored key of the computing device; and a network connecting the computing device to the key storage service,
wherein the computing device comprises:
one or more processors; and
a storage subsystem containing encrypted data and containing instructions executable by the one or more processors for:
regenerating a credential from a protocredential stored in the device and one or more secrets not stored in the device;
requesting an externally stored key from a key storage service, the credential being used to authenticate the request;
performing a computation of a content-encryption key using the externally stored key as an input to the computation; and
using the content-encryption key to decrypt the confidential data. 19. The system of claim 18, wherein the key storage service disables a record containing the externally stored key after a configured number of consecutive authentication failures of requests for the externally stored key. 20. The system of claim 19, wherein the credential comprises a private key that is part of a key pair pertaining to a public key cryptosystem, the one or more secrets not stored in the device comprise a passcode, and regenerating the credential comprises deriving a parameter of the credential from the passcode by means of a key derivation function. | A method of protecting confidential data stored in a computing device. In one embodiment, data items are encrypted using content-encryption keys that are not present in the device while the device is locked. When a user unlocks the device, the content- encryption keys are computed using at least one externally stored key that is retrieved from a key storage service using a credential regenerated from a protocredential stored in the device and one or more secrets supplied by a user.1. A method of protecting confidential data stored in a computing device, comprising:
storing the confidential data in encrypted form; regenerating a credential from a protocredential stored in the device and one or more secrets not stored in the device; requesting a content-encryption key from a key storage service, the credential being used to authenticate the request; and using the content-encryption key to decrypt the confidential data. 2. A method of protecting confidential data stored in a computing device, comprising:
storing the confidential data in encrypted form; regenerating a credential from a protocredential stored in the device and one or more secrets not stored in the device; requesting an externally stored key from a key storage service, the credential being used to authenticate the request; performing a computation of a content-encryption key using the externally stored key as an input to the computation; and using the content-encryption key to decrypt the confidential data. 3. The method of claim 2, wherein the computation of the content-encryption key takes as further inputs one or more additional externally stored keys retrieved from one or more key storage services and includes computing a key from a plurality of externally stored keys using secret sharing. 4. The method of claim 2, wherein the computation takes as further inputs the one or more secrets not stored in the device. 5. The method of claim 2, wherein the computation takes as a further input a hardware key. 6. The method of claim 2, wherein the credential comprises a private key that is part of a key pair pertaining to a public key cryptosystem. 7. The method of claim 2, wherein the one or more secrets not stored in the device comprise a passcode. 8. The method of claim 7, wherein regenerating the credential comprises deriving a parameter of the credential from the passcode by means of a key derivation function. 9. The method of claim 2, wherein the one or more secrets not stored in the device comprise a biometric sample. 10. A computing device, comprising:
one or more processors; and a storage subsystem containing encrypted confidential data and containing instructions executable by the one or more processors for: regenerating a credential from a protocredential stored in the device and one or more secrets not stored in the device; requesting an externally stored key from a key storage service, the credential being used to authenticate the request; performing a computation of a content-encryption key using the externally stored key as an input to the computation; and using the content-encryption key to decrypt the confidential data. 11. The computing device of claim 10, wherein the computation of the content-encryption key takes as further inputs one or more additional externally stored keys retrieved from one or more key storage services and includes computing a key from a plurality of externally stored keys using secret sharing. 12. The computing device of claim 10, wherein the computation takes as further inputs the one or more secrets not stored in the device. 13. The computing device of claim 10, wherein the computation takes as a further input a hardware key. 14. The computing device of claim 10, wherein the credential comprises a private key that is part of a key pair pertaining to a public key cryptosystem. 15. The computing device of claim 10, wherein the one or more secrets not stored in the device comprise a passcode, and regenerating the credential comprises deriving a parameter of the credential from the passcode by means of a key derivation function. 16. The computing device of claim 10, wherein the confidential data comprises the contents of a file. 17. The computing device of claim 10, wherein the confidential data comprises a storage volume. 18. A system, comprising:
a computing device; a key storage service containing an externally stored key of the computing device; and a network connecting the computing device to the key storage service,
wherein the computing device comprises:
one or more processors; and
a storage subsystem containing encrypted data and containing instructions executable by the one or more processors for:
regenerating a credential from a protocredential stored in the device and one or more secrets not stored in the device;
requesting an externally stored key from a key storage service, the credential being used to authenticate the request;
performing a computation of a content-encryption key using the externally stored key as an input to the computation; and
using the content-encryption key to decrypt the confidential data. 19. The system of claim 18, wherein the key storage service disables a record containing the externally stored key after a configured number of consecutive authentication failures of requests for the externally stored key. 20. The system of claim 19, wherein the credential comprises a private key that is part of a key pair pertaining to a public key cryptosystem, the one or more secrets not stored in the device comprise a passcode, and regenerating the credential comprises deriving a parameter of the credential from the passcode by means of a key derivation function. | 2,400 |
6,760 | 6,760 | 14,862,521 | 2,469 | A method of monitoring instant messaging usage can include identifying an instant messaging session between a plurality of participants, selecting a participant in the instant messaging session, identifying at least one attribute of the instant messaging session, and identifying at least one attribute of the selected participant. The method further can include determining an instant messaging usage metric for the selected participant according to the at least one attribute of the instant messaging session and the at least one attribute of the selected participant and outputting the instant messaging usage metric of the selected participant. | 1-20. (canceled) 21. A computer-implemented method, comprising:
selecting a participant in an instant messaging session between a plurality of participants; weighting an identified attribute of the instant messaging session; weighting an identified attribute of the selected participant; and determining, based upon the weighted attributes of the instant messaging session and the selected participant, an instant messaging usage metric for the selected participant. 22. The method of claim 21, further comprising
dynamically updating the instant messaging usage metric for each succeeding instant messaging session. 23. The method of claim 21, further comprising:
identifying another participant in the instant messaging session; and identifying an attribute of the another other participant. 24. The method of claim 21, wherein
the identified attribute of the selected participant is whether the selected participant is a sending participant or a receiving participant. 25. The method of claim 21, wherein
the identified attribute of the instant messaging session is a data type of the instant messaging session. 26. The method of claim 21, further comprising
determining, based upon the instant messaging usage metric, a fee for instant messaging usage by the selected participant. 27. The method of claim 21, further comprising:
comparing the instant messaging usage metric for the selected participant to a predetermined instant messaging usage allotment for the selected participant; and outputting, upon the instant messaging usage metric exceeding the instant messaging usage allotment, an alert. 28. A computer hardware system, comprising:
at least one hardware processor configured to initiate the following executable operations:
selecting a participant in an instant messaging session between a plurality of participants;
weighting an identified attribute of the instant messaging session;
weighting an identified attribute of the selected participant; and
determining, based upon the weighted attributes of the instant messaging session and the selected participant, an instant messaging usage metric for the selected participant. 29. The system of claim 28, wherein the executable operations further include
dynamically updating the instant messaging usage metric for each succeeding instant messaging session. 30. The system of claim 28, wherein the executable operations further include:
identifying another participant in the instant messaging session; and identifying an attribute of the another other participant. 31. The system of claim 28, wherein
the identified attribute of the selected participant is whether the selected participant is a sending participant or a receiving participant. 32. The system of claim 28, wherein
the identified attribute of the instant messaging session is a data type of the instant messaging session. 33. The system of claim 28, wherein the executable operations further include
determining, based upon the instant messaging usage metric, a fee for instant messaging usage by the selected participant. 34. The system of claim 28, wherein the executable operations further include:
comparing the instant messaging usage metric for the selected participant to a predetermined instant messaging usage allotment for the selected participant; and outputting, upon the instant messaging usage metric exceeding the instant messaging usage allotment, an alert. 35. A computer program product, comprising:
a computer storage device having stored therein computer usable program code, the computer usable program code, which when executed by a computer hardware system, causes the computer hardware system to perform:
selecting a participant in an instant messaging session between a plurality of participants;
weighting an identified attribute of the instant messaging session;
weighting an identified attribute of the selected participant; and
determining, based upon the weighted attributes of the instant messaging session and the selected participant, an instant messaging usage metric for the selected participant. 36. The computer program product of claim 35, wherein the computer usable program code further causes the computer hardware system to perform
dynamically updating the instant messaging usage metric for each succeeding instant messaging session. 37. The computer program product of claim 35, wherein the computer usable program code further causes the computer hardware system to perform:
identifying another participant in the instant messaging session; and identifying an attribute of the another other participant. 38. The computer program product of claim 35, wherein
the identified attribute of the selected participant is whether the selected participant is a sending participant or a receiving participant. 39. The computer program product of claim 35, wherein
the identified attribute of the instant messaging session is a data type of the instant messaging session. 40. The computer program product of claim 35, wherein the computer usable program code further causes the computer hardware system to perform
determining, based upon the instant messaging usage metric, a fee for instant messaging usage by the selected participant. | A method of monitoring instant messaging usage can include identifying an instant messaging session between a plurality of participants, selecting a participant in the instant messaging session, identifying at least one attribute of the instant messaging session, and identifying at least one attribute of the selected participant. The method further can include determining an instant messaging usage metric for the selected participant according to the at least one attribute of the instant messaging session and the at least one attribute of the selected participant and outputting the instant messaging usage metric of the selected participant.1-20. (canceled) 21. A computer-implemented method, comprising:
selecting a participant in an instant messaging session between a plurality of participants; weighting an identified attribute of the instant messaging session; weighting an identified attribute of the selected participant; and determining, based upon the weighted attributes of the instant messaging session and the selected participant, an instant messaging usage metric for the selected participant. 22. The method of claim 21, further comprising
dynamically updating the instant messaging usage metric for each succeeding instant messaging session. 23. The method of claim 21, further comprising:
identifying another participant in the instant messaging session; and identifying an attribute of the another other participant. 24. The method of claim 21, wherein
the identified attribute of the selected participant is whether the selected participant is a sending participant or a receiving participant. 25. The method of claim 21, wherein
the identified attribute of the instant messaging session is a data type of the instant messaging session. 26. The method of claim 21, further comprising
determining, based upon the instant messaging usage metric, a fee for instant messaging usage by the selected participant. 27. The method of claim 21, further comprising:
comparing the instant messaging usage metric for the selected participant to a predetermined instant messaging usage allotment for the selected participant; and outputting, upon the instant messaging usage metric exceeding the instant messaging usage allotment, an alert. 28. A computer hardware system, comprising:
at least one hardware processor configured to initiate the following executable operations:
selecting a participant in an instant messaging session between a plurality of participants;
weighting an identified attribute of the instant messaging session;
weighting an identified attribute of the selected participant; and
determining, based upon the weighted attributes of the instant messaging session and the selected participant, an instant messaging usage metric for the selected participant. 29. The system of claim 28, wherein the executable operations further include
dynamically updating the instant messaging usage metric for each succeeding instant messaging session. 30. The system of claim 28, wherein the executable operations further include:
identifying another participant in the instant messaging session; and identifying an attribute of the another other participant. 31. The system of claim 28, wherein
the identified attribute of the selected participant is whether the selected participant is a sending participant or a receiving participant. 32. The system of claim 28, wherein
the identified attribute of the instant messaging session is a data type of the instant messaging session. 33. The system of claim 28, wherein the executable operations further include
determining, based upon the instant messaging usage metric, a fee for instant messaging usage by the selected participant. 34. The system of claim 28, wherein the executable operations further include:
comparing the instant messaging usage metric for the selected participant to a predetermined instant messaging usage allotment for the selected participant; and outputting, upon the instant messaging usage metric exceeding the instant messaging usage allotment, an alert. 35. A computer program product, comprising:
a computer storage device having stored therein computer usable program code, the computer usable program code, which when executed by a computer hardware system, causes the computer hardware system to perform:
selecting a participant in an instant messaging session between a plurality of participants;
weighting an identified attribute of the instant messaging session;
weighting an identified attribute of the selected participant; and
determining, based upon the weighted attributes of the instant messaging session and the selected participant, an instant messaging usage metric for the selected participant. 36. The computer program product of claim 35, wherein the computer usable program code further causes the computer hardware system to perform
dynamically updating the instant messaging usage metric for each succeeding instant messaging session. 37. The computer program product of claim 35, wherein the computer usable program code further causes the computer hardware system to perform:
identifying another participant in the instant messaging session; and identifying an attribute of the another other participant. 38. The computer program product of claim 35, wherein
the identified attribute of the selected participant is whether the selected participant is a sending participant or a receiving participant. 39. The computer program product of claim 35, wherein
the identified attribute of the instant messaging session is a data type of the instant messaging session. 40. The computer program product of claim 35, wherein the computer usable program code further causes the computer hardware system to perform
determining, based upon the instant messaging usage metric, a fee for instant messaging usage by the selected participant. | 2,400 |
6,761 | 6,761 | 12,267,365 | 2,476 | A wireless communication device transmits a device beacon in accordance with a system timing of a wireless wide area network (WWAN). For one example, the beacon is transmitted relative to WWAN uplink channels of the time-frequency space of the uplink WWAN channel assignment. In response to the reception of the device beacon by another wireless communication device, a peer to peer communication session is established. | 1. A wireless communication device comprising:
a wireless wide area network (WWAN) transceiver configured to receive WWAN signals from a base station; and a device beacon detector configured to apply WWAN system timing information derived from the WWAN signals to receive a device beacon transmitted by another wireless communication device in accordance with the WWAN system timing information. 2. The wireless communication device of claim 1, wherein the WWAN transceiver is further configured to transmit a device proximity message to the WWAN invoking transmission of a search message instructing the another wireless communication device to adjust a searching scheme for searching for wireless communication device. 3. The wireless communication device of claim 1, further comprising a WLAN interface configured to transmit a device proximity message to the another wireless communication device indicting that the device beacon was received. 4. The wireless communication device of claim 1, wherein the device beacon detector comprises a WWAN receiver configured to receive WWAN uplink signals, the device beacon transmitted within a WWAN uplink channel. 5. The wireless communication device of claim 4, wherein the device beacon is transmitted within a WWAN subcarrier time slot. 6. The wireless communication device of claim 5, wherein the device beacon is transmitted within a WWAN OFDM subcarrier time slot. 7. The wireless communication device of claim 6, wherein the device beacon is transmitted within a WWAN Single-Carrier Frequency Division Multiple Access (SC-FDMA) subcarrier time slot. 8. The wireless communication device of claim 1, wherein the device beacon Is transmitted in accordance with WWAN system timing information received at the another wireless communication device from a WWAN base station. 9. The wireless communication device of claim 1, further comprising a transceiver for peer-to-peer communication with the another wireless communication device. 10. A mobile wireless communication device comprising:
a wireless wide area network (WWAN) receiver configured to receive WWAN downlink signals from a WWAN; a device beacon generator configured to generate a device beacon signal based on a WWAN system timing derived from the WWAN downlink signals. 11. The mobile wireless communication device of claim 10, further comprising:
a searcher configured to search for transceiver node signals transmitted by a transceiver node and responsive to a search signal transmitted in response to detection of the device beacon signal at the transceiver node by adjusting a searching scheme of searching for the transceiver node signals. 12. The mobile wireless communication device of claim 11, wherein the transceiver node is a wireless local area network (WLAN) access point and the searcher is further configured to adjust the searching scheme by activating a wireless local area network (WLAN) receiver. 13. The mobile wireless communication device of claim 11, wherein the transceiver node is a femtocell base station and the searcher is further configured to adjust the searching scheme by changing searching parameters increasing the likelihood for detecting the transceiver node signals. 14. The mobile wireless communication device of claim 11, wherein the transceiver node is another wireless communication device. 15. The mobile wireless communication device of claim 11, wherein search signal is received from the WWAN. | A wireless communication device transmits a device beacon in accordance with a system timing of a wireless wide area network (WWAN). For one example, the beacon is transmitted relative to WWAN uplink channels of the time-frequency space of the uplink WWAN channel assignment. In response to the reception of the device beacon by another wireless communication device, a peer to peer communication session is established.1. A wireless communication device comprising:
a wireless wide area network (WWAN) transceiver configured to receive WWAN signals from a base station; and a device beacon detector configured to apply WWAN system timing information derived from the WWAN signals to receive a device beacon transmitted by another wireless communication device in accordance with the WWAN system timing information. 2. The wireless communication device of claim 1, wherein the WWAN transceiver is further configured to transmit a device proximity message to the WWAN invoking transmission of a search message instructing the another wireless communication device to adjust a searching scheme for searching for wireless communication device. 3. The wireless communication device of claim 1, further comprising a WLAN interface configured to transmit a device proximity message to the another wireless communication device indicting that the device beacon was received. 4. The wireless communication device of claim 1, wherein the device beacon detector comprises a WWAN receiver configured to receive WWAN uplink signals, the device beacon transmitted within a WWAN uplink channel. 5. The wireless communication device of claim 4, wherein the device beacon is transmitted within a WWAN subcarrier time slot. 6. The wireless communication device of claim 5, wherein the device beacon is transmitted within a WWAN OFDM subcarrier time slot. 7. The wireless communication device of claim 6, wherein the device beacon is transmitted within a WWAN Single-Carrier Frequency Division Multiple Access (SC-FDMA) subcarrier time slot. 8. The wireless communication device of claim 1, wherein the device beacon Is transmitted in accordance with WWAN system timing information received at the another wireless communication device from a WWAN base station. 9. The wireless communication device of claim 1, further comprising a transceiver for peer-to-peer communication with the another wireless communication device. 10. A mobile wireless communication device comprising:
a wireless wide area network (WWAN) receiver configured to receive WWAN downlink signals from a WWAN; a device beacon generator configured to generate a device beacon signal based on a WWAN system timing derived from the WWAN downlink signals. 11. The mobile wireless communication device of claim 10, further comprising:
a searcher configured to search for transceiver node signals transmitted by a transceiver node and responsive to a search signal transmitted in response to detection of the device beacon signal at the transceiver node by adjusting a searching scheme of searching for the transceiver node signals. 12. The mobile wireless communication device of claim 11, wherein the transceiver node is a wireless local area network (WLAN) access point and the searcher is further configured to adjust the searching scheme by activating a wireless local area network (WLAN) receiver. 13. The mobile wireless communication device of claim 11, wherein the transceiver node is a femtocell base station and the searcher is further configured to adjust the searching scheme by changing searching parameters increasing the likelihood for detecting the transceiver node signals. 14. The mobile wireless communication device of claim 11, wherein the transceiver node is another wireless communication device. 15. The mobile wireless communication device of claim 11, wherein search signal is received from the WWAN. | 2,400 |
6,762 | 6,762 | 12,768,475 | 2,453 | A communication system includes a server and a client that transmits messages to the server. The messages include data and descriptive tags and may be in XML format. The server initiates a negotiation with the client relating to message format switching. If the client indicates that the client can accept message format switching, the server instructs the client to switch further messages to a simpler message format including solely data. | 1. A method of operating a communication system comprising:
receiving messages from a client, the messages of a first format comprising data and descriptive tags; initiating a negotiation with the client relating to message format switching; receiving an indication from the client that the client can accept message format switching; and transmitting to the client an instruction to transmit messages of a second format. 2. The method of claim 1, further comprising:
monitoring a message workload from the client; performing a statistical analysis on the message workload from the client; and determining, based at least in part on the statistical analysis of the message workload from the client, whether it would be efficient to switch message format; and wherein initiating a negotiation with the client relating to message format switching comprises initiating a negotiation with the client upon a determination that it would be efficient to switch message format. 3. The method of claim 2, wherein performing a statistical analysis on the message workload from the client comprises determining that the message workload from the client is above a predetermined threshold. 4. The method of claim 2, further comprising transmitting to the client a description of the second format. 5. The method of claim 1, further comprising verifying that the messages of the first format are not being modified before being received. 6. The method of claim 1, wherein the second format consists of data. 7. A method of operating a client in a communication system, the method comprising:
transmitting messages of a first format comprising data and descriptive tags; receiving a handshake seeking verification that the client supports message format switching; transmitting an indication that the client can accept message format switching; receiving an instruction to switch message format; and transmitting further messages of a second format. 8. The method of claim 7, further comprising receiving a description of the second format. 9. The method of claim 7, wherein the second message format is wire format. 10. A computer program product for operating a server, the computer program product comprising:
a computer readable storage medium having computer readable instructions embodied therewith, the computer readable instructions comprising: computer readable instructions configured to receive messages from a client, the messages of a first format comprising data and descriptive tags; computer readable instructions configured to initiate a negotiation with the client relating to message format switching; computer readable instructions configured to receive an indication from the client that the client can accept message format switching; and computer readable instructions configured to transmit to the client an instruction to transmit messages of a second format. 11. The computer program product of claim 10, further comprising:
computer readable instructions configured to monitor a message workload from the client; computer readable instructions configured to perform a statistical analysis on the message workload from the client; and computer readable instructions configured to determine, based at least in part on the statistical analysis of the message workload from the client, whether it would be efficient to switch message format; and wherein the computer readable instructions configured to initiate a negotiation with the client relating to message format switching comprises computer readable instructions configured to initiate a negotiation with the client upon a determination that it would be efficient to switch message format. 12. The computer program product of claim 11, wherein computer readable instructions configured to perform a statistical analysis on the message workload from the client comprises computer readable instructions configured to determine that the message workload from the client is above a predetermined threshold. 13. The computer program product of claim 11, further comprising computer readable instructions configured to transmit to the client a description of the second format. 14. The computer program product of claim 10, further comprising computer readable instructions configured to verify that the messages of the first format are not being modified after being transmitted by the client and before being received by the server. 15. The computer program product of claim 10, wherein the second format consists of data. | A communication system includes a server and a client that transmits messages to the server. The messages include data and descriptive tags and may be in XML format. The server initiates a negotiation with the client relating to message format switching. If the client indicates that the client can accept message format switching, the server instructs the client to switch further messages to a simpler message format including solely data.1. A method of operating a communication system comprising:
receiving messages from a client, the messages of a first format comprising data and descriptive tags; initiating a negotiation with the client relating to message format switching; receiving an indication from the client that the client can accept message format switching; and transmitting to the client an instruction to transmit messages of a second format. 2. The method of claim 1, further comprising:
monitoring a message workload from the client; performing a statistical analysis on the message workload from the client; and determining, based at least in part on the statistical analysis of the message workload from the client, whether it would be efficient to switch message format; and wherein initiating a negotiation with the client relating to message format switching comprises initiating a negotiation with the client upon a determination that it would be efficient to switch message format. 3. The method of claim 2, wherein performing a statistical analysis on the message workload from the client comprises determining that the message workload from the client is above a predetermined threshold. 4. The method of claim 2, further comprising transmitting to the client a description of the second format. 5. The method of claim 1, further comprising verifying that the messages of the first format are not being modified before being received. 6. The method of claim 1, wherein the second format consists of data. 7. A method of operating a client in a communication system, the method comprising:
transmitting messages of a first format comprising data and descriptive tags; receiving a handshake seeking verification that the client supports message format switching; transmitting an indication that the client can accept message format switching; receiving an instruction to switch message format; and transmitting further messages of a second format. 8. The method of claim 7, further comprising receiving a description of the second format. 9. The method of claim 7, wherein the second message format is wire format. 10. A computer program product for operating a server, the computer program product comprising:
a computer readable storage medium having computer readable instructions embodied therewith, the computer readable instructions comprising: computer readable instructions configured to receive messages from a client, the messages of a first format comprising data and descriptive tags; computer readable instructions configured to initiate a negotiation with the client relating to message format switching; computer readable instructions configured to receive an indication from the client that the client can accept message format switching; and computer readable instructions configured to transmit to the client an instruction to transmit messages of a second format. 11. The computer program product of claim 10, further comprising:
computer readable instructions configured to monitor a message workload from the client; computer readable instructions configured to perform a statistical analysis on the message workload from the client; and computer readable instructions configured to determine, based at least in part on the statistical analysis of the message workload from the client, whether it would be efficient to switch message format; and wherein the computer readable instructions configured to initiate a negotiation with the client relating to message format switching comprises computer readable instructions configured to initiate a negotiation with the client upon a determination that it would be efficient to switch message format. 12. The computer program product of claim 11, wherein computer readable instructions configured to perform a statistical analysis on the message workload from the client comprises computer readable instructions configured to determine that the message workload from the client is above a predetermined threshold. 13. The computer program product of claim 11, further comprising computer readable instructions configured to transmit to the client a description of the second format. 14. The computer program product of claim 10, further comprising computer readable instructions configured to verify that the messages of the first format are not being modified after being transmitted by the client and before being received by the server. 15. The computer program product of claim 10, wherein the second format consists of data. | 2,400 |
6,763 | 6,763 | 14,443,432 | 2,472 | Methods and communication network nodes for forwarding UE measurement results.
A method is provided which is performed by a first communication network node of a communication network for obtaining measurement results from a wireless communication device in accordance with a Layer 1 communication protocol. A request is formulated 302 for information related to measurements performed by the wireless communication device, the request is sent 304 to a second communication network node, and the requested 302 information is received 306 forwarded from the second communication network node, in accordance with the Layer 1 communication protocol.
By implementing functionality in communication network nodes of a communication network for requesting and forwarding UE measurement results between each other, where the UE measurements results has been delivered to a second one of the communication network on the Layer 1 communication protocol, the first one of the communication network nodes may be enabled to retrieve the UE measurement results in accordance with the Layer 1 communication protocol even if the Layer 1 communication protocol is terminated in the second one of the communication network nodes. Thereby, the first communication network node may retrieve and take the UE measurement results into account when controlling communication of data in the system, which may give rise to a more efficient utilising of installed communication resources. | 1-29. (canceled) 30. A method performed by a first communication network node of a communication network for obtaining measurement results from a wireless communication device in accordance with a Layer 1 communication protocol, the method comprising:
formulating a request for information related to measurements performed by the wireless communication device; sending the request to a second communication network node; and receiving, from the second communication network node, the requested information in accordance with the Layer 1 communication protocol. 31. The method according to claim 30, wherein formulating the request comprises defining that the information will comprise as at least one of: a measurement identity, a measurement type, a measurement value, the complete measurement result, and an indication that the wireless communication device has triggered the measurement. 32. The method according to claim 30, wherein sending the request comprises sending a User Equipment power Headroom (UPH) Filtering Measurement Forwarding Request Information Element (IE) included in at least one of: a radio link setup request message, a radio link addition request message, a radio link reconfiguration prepare message, and a radio link reconfiguration request message. 33. The method according to claim 30, wherein receiving the requested information comprises receiving the requested information formulated as UPH Filtering Value IE of a UE Measurement Forwarding IE included in a radio link parameter update indication message. 34. The method according to claim 30, further comprising adjusting a communication network deployment strategy of the communication network based on the received information. 35. A first communication network node adapted to be arranged in a communication network for obtaining measurement results from a wireless communication device in accordance with a Layer 1 communication protocol, the first communication network node comprising:
a communication circuit; and a controller; wherein the controller is configured to formulate a request for information related to measurements performed by the wireless communication device, and the communication circuit is configured to forward the formed request to a second communication network node and receive, from the second communication network node, the requested information in accordance with the Layer 1 communication protocol. 36. The first communication network node according to claim 35, wherein the controller is configured to formulate the request as defining that the information will comprise as at least one of: a measurement identity, a measurement type, a measurement value, the complete measurement result, and an indication that the wireless communication device has triggered the measurement. 37. The first communication network node according to claim 35, wherein the communication module is configured to send the request formed as a User Equipment Power Headroom (UPH) Filtering Measurement Forwarding Request Information Element (IE) included in at least one of: a radio link setup request message, a radio link addition request message, a radio link reconfiguration prepare message, and a radio link reconfiguration request message. 38. The first communication network node according to claim 35, wherein the communication circuit is configured to receive the requested information formulated as an UPH Filtering Value IE of a UE Measurement Forwarding IE included in a radio link parameter update indication message. 39. The first communication network node according to claim 35, wherein the controller is further configured to adjust a communication network deployment strategy of the communication network based on the received information. 40. The first communication network node according to claim 35, wherein the communication circuit is configured to receive the information forwarded from the second communication network node formulated as a UPH filtering value delivered in accordance with the Layer 1 communication protocol. 41. The first communication network node according to claim 35, wherein the first communication network node is a Radio Network Controller (RNC). 42. A method performed by a second communication network node of a communication network for forwarding measurement results from a wireless communication device to a first communication network node in accordance with a Layer 1 communication protocol, the method comprising:
receiving, from the first communication network node, a request for information related to measurements performed by the wireless communication device; receiving from the wireless communication device, measurement results of the performed measurements delivered on the Layer 1 communication protocol; and forwarding, to the first communication network node, the information according to the received request in accordance with the received request. 43. The method according to claim 41, wherein receiving the request for information comprises receiving a definition that the information will comprise as at least one of: a measurement identity, a measurement type, a measurement value, the complete measurement results, and an indication that the wireless communication device has triggered the measurement. 44. The method according to claim 42, further comprising extracting the information to be forwarded from the received measurement results, by utilizing the received definition. 45. The method according to claim 41, wherein receiving the request for information comprises receiving a User Equipment power Headroom (UPH) Filtering Measurement Forwarding Request Information Element (IE) included in at least one of: a radio link setup request message, a radio link addition request message, a radio link reconfiguration prepare message, and a radio link reconfiguration request message. 46. The method according to claim 42, wherein forwarding the information according to the received request comprises forwarding the requested information formulated as UPH Filtering Value IE of a UE Measurement Forwarding IE included in a radio link parameter update indication message. 47. A second communication network node adapted to be arranged in a communication network for forwarding measurement results from a wireless communication device to a first communication network node in accordance with a Layer 1 communication protocol, the second communication network node comprising:
a communication circuit; and a controller; wherein the communication circuit is configured to receive, from the first communication network node, a request for information related to measurements performed by the wireless communication device, and receive, from the wireless communication device, measurement results of the performed measurements in accordance with the Layer 1 communication protocol, wherein the controller is configured to extract the information according to the received request, and wherein the communication circuit is further configured to forward the extracted information to the first communication network node, in accordance with the received request. 48. The second communication network node according to claim 47, wherein the controller is configured to receive the request for information comprising a definition that the information will comprise as at least one of: a measurement identity, a measurement type, a measurement value, the complete measurement result, and an indication that the wireless communication device has triggered the measurement. 49. The second communication network node according to claim 48, wherein the controller is configured to extract the information to be forwarded from the received measurement results, by utilizing the received definition. 50. The second communication network node according to claim 47, wherein the communication circuit is configured to receive the request for information formed as a User Equipment Power Headroom (UPH) Filtering Measurement Forwarding Request Information Element (IE) included in at least one of: a radio link setup request message, a radio link addition request message, a radio link reconfiguration prepare message, and a radio link reconfiguration request message. 51. The second communication network node according to claim 47, wherein communication circuit is configured to forward the requested information formulated as UPH Filtering Value IE of a UE Measurement Forwarding IE included in a radio link parameter update indication message. 52. The second communication network node according to claim 47, wherein the communication circuit is configured to forward the information formulated as a UPH filtering value of Layer 1 signaling. 53. The second communication network node according to claim 47, wherein the second communication network node is an eNodeB. 54. A system for enabling a first communication network node to obtain measurement results from a wireless communication device on a layer 1 communication protocol, the system comprising:
the first communication network node configured to request a second communication network node to forward at least one part of measurement results received from the wireless communication device to the first communication network node; and the second communication network node configured to receive the measurement results from the wireless communication device and to forward the at least one part of the measurement results to the first communication network node in accordance with the Layer 1 communication protocol. 55. The system according to claim 54, wherein the first communication network node is implemented as an RNC, and the second communication network node is implemented as a NodeB. 56. A non-transitory computer readable medium, having thereon a computer program comprising program instructions, the computer program being loadable into a data-processing unit of a first communication network node of a communication network and configured so that when the program instructions are executed by the data-processing unit, the program instructions cause the first communication network node to:
formulate a request for information related to measurements performed by a wireless communication device; send the request to a second communication network node; and receive, from the second communication network node, the requested information in accordance with the Layer 1 communication protocol. | Methods and communication network nodes for forwarding UE measurement results.
A method is provided which is performed by a first communication network node of a communication network for obtaining measurement results from a wireless communication device in accordance with a Layer 1 communication protocol. A request is formulated 302 for information related to measurements performed by the wireless communication device, the request is sent 304 to a second communication network node, and the requested 302 information is received 306 forwarded from the second communication network node, in accordance with the Layer 1 communication protocol.
By implementing functionality in communication network nodes of a communication network for requesting and forwarding UE measurement results between each other, where the UE measurements results has been delivered to a second one of the communication network on the Layer 1 communication protocol, the first one of the communication network nodes may be enabled to retrieve the UE measurement results in accordance with the Layer 1 communication protocol even if the Layer 1 communication protocol is terminated in the second one of the communication network nodes. Thereby, the first communication network node may retrieve and take the UE measurement results into account when controlling communication of data in the system, which may give rise to a more efficient utilising of installed communication resources.1-29. (canceled) 30. A method performed by a first communication network node of a communication network for obtaining measurement results from a wireless communication device in accordance with a Layer 1 communication protocol, the method comprising:
formulating a request for information related to measurements performed by the wireless communication device; sending the request to a second communication network node; and receiving, from the second communication network node, the requested information in accordance with the Layer 1 communication protocol. 31. The method according to claim 30, wherein formulating the request comprises defining that the information will comprise as at least one of: a measurement identity, a measurement type, a measurement value, the complete measurement result, and an indication that the wireless communication device has triggered the measurement. 32. The method according to claim 30, wherein sending the request comprises sending a User Equipment power Headroom (UPH) Filtering Measurement Forwarding Request Information Element (IE) included in at least one of: a radio link setup request message, a radio link addition request message, a radio link reconfiguration prepare message, and a radio link reconfiguration request message. 33. The method according to claim 30, wherein receiving the requested information comprises receiving the requested information formulated as UPH Filtering Value IE of a UE Measurement Forwarding IE included in a radio link parameter update indication message. 34. The method according to claim 30, further comprising adjusting a communication network deployment strategy of the communication network based on the received information. 35. A first communication network node adapted to be arranged in a communication network for obtaining measurement results from a wireless communication device in accordance with a Layer 1 communication protocol, the first communication network node comprising:
a communication circuit; and a controller; wherein the controller is configured to formulate a request for information related to measurements performed by the wireless communication device, and the communication circuit is configured to forward the formed request to a second communication network node and receive, from the second communication network node, the requested information in accordance with the Layer 1 communication protocol. 36. The first communication network node according to claim 35, wherein the controller is configured to formulate the request as defining that the information will comprise as at least one of: a measurement identity, a measurement type, a measurement value, the complete measurement result, and an indication that the wireless communication device has triggered the measurement. 37. The first communication network node according to claim 35, wherein the communication module is configured to send the request formed as a User Equipment Power Headroom (UPH) Filtering Measurement Forwarding Request Information Element (IE) included in at least one of: a radio link setup request message, a radio link addition request message, a radio link reconfiguration prepare message, and a radio link reconfiguration request message. 38. The first communication network node according to claim 35, wherein the communication circuit is configured to receive the requested information formulated as an UPH Filtering Value IE of a UE Measurement Forwarding IE included in a radio link parameter update indication message. 39. The first communication network node according to claim 35, wherein the controller is further configured to adjust a communication network deployment strategy of the communication network based on the received information. 40. The first communication network node according to claim 35, wherein the communication circuit is configured to receive the information forwarded from the second communication network node formulated as a UPH filtering value delivered in accordance with the Layer 1 communication protocol. 41. The first communication network node according to claim 35, wherein the first communication network node is a Radio Network Controller (RNC). 42. A method performed by a second communication network node of a communication network for forwarding measurement results from a wireless communication device to a first communication network node in accordance with a Layer 1 communication protocol, the method comprising:
receiving, from the first communication network node, a request for information related to measurements performed by the wireless communication device; receiving from the wireless communication device, measurement results of the performed measurements delivered on the Layer 1 communication protocol; and forwarding, to the first communication network node, the information according to the received request in accordance with the received request. 43. The method according to claim 41, wherein receiving the request for information comprises receiving a definition that the information will comprise as at least one of: a measurement identity, a measurement type, a measurement value, the complete measurement results, and an indication that the wireless communication device has triggered the measurement. 44. The method according to claim 42, further comprising extracting the information to be forwarded from the received measurement results, by utilizing the received definition. 45. The method according to claim 41, wherein receiving the request for information comprises receiving a User Equipment power Headroom (UPH) Filtering Measurement Forwarding Request Information Element (IE) included in at least one of: a radio link setup request message, a radio link addition request message, a radio link reconfiguration prepare message, and a radio link reconfiguration request message. 46. The method according to claim 42, wherein forwarding the information according to the received request comprises forwarding the requested information formulated as UPH Filtering Value IE of a UE Measurement Forwarding IE included in a radio link parameter update indication message. 47. A second communication network node adapted to be arranged in a communication network for forwarding measurement results from a wireless communication device to a first communication network node in accordance with a Layer 1 communication protocol, the second communication network node comprising:
a communication circuit; and a controller; wherein the communication circuit is configured to receive, from the first communication network node, a request for information related to measurements performed by the wireless communication device, and receive, from the wireless communication device, measurement results of the performed measurements in accordance with the Layer 1 communication protocol, wherein the controller is configured to extract the information according to the received request, and wherein the communication circuit is further configured to forward the extracted information to the first communication network node, in accordance with the received request. 48. The second communication network node according to claim 47, wherein the controller is configured to receive the request for information comprising a definition that the information will comprise as at least one of: a measurement identity, a measurement type, a measurement value, the complete measurement result, and an indication that the wireless communication device has triggered the measurement. 49. The second communication network node according to claim 48, wherein the controller is configured to extract the information to be forwarded from the received measurement results, by utilizing the received definition. 50. The second communication network node according to claim 47, wherein the communication circuit is configured to receive the request for information formed as a User Equipment Power Headroom (UPH) Filtering Measurement Forwarding Request Information Element (IE) included in at least one of: a radio link setup request message, a radio link addition request message, a radio link reconfiguration prepare message, and a radio link reconfiguration request message. 51. The second communication network node according to claim 47, wherein communication circuit is configured to forward the requested information formulated as UPH Filtering Value IE of a UE Measurement Forwarding IE included in a radio link parameter update indication message. 52. The second communication network node according to claim 47, wherein the communication circuit is configured to forward the information formulated as a UPH filtering value of Layer 1 signaling. 53. The second communication network node according to claim 47, wherein the second communication network node is an eNodeB. 54. A system for enabling a first communication network node to obtain measurement results from a wireless communication device on a layer 1 communication protocol, the system comprising:
the first communication network node configured to request a second communication network node to forward at least one part of measurement results received from the wireless communication device to the first communication network node; and the second communication network node configured to receive the measurement results from the wireless communication device and to forward the at least one part of the measurement results to the first communication network node in accordance with the Layer 1 communication protocol. 55. The system according to claim 54, wherein the first communication network node is implemented as an RNC, and the second communication network node is implemented as a NodeB. 56. A non-transitory computer readable medium, having thereon a computer program comprising program instructions, the computer program being loadable into a data-processing unit of a first communication network node of a communication network and configured so that when the program instructions are executed by the data-processing unit, the program instructions cause the first communication network node to:
formulate a request for information related to measurements performed by a wireless communication device; send the request to a second communication network node; and receive, from the second communication network node, the requested information in accordance with the Layer 1 communication protocol. | 2,400 |
6,764 | 6,764 | 15,017,598 | 2,477 | A system and method for improving efficiency of satellite communications is described. In one embodiment, efficient satellite communications is enabled through event-driven reporting by a mobile terminal. | 1-12. (canceled) 13. A method performed by a mobile terminal, comprising:
awakening, by the mobile terminal, from a sleep mode; analyzing activity on a communication timeslot that is assigned to mobile terminals and on a communication timeslot that is not assigned to mobile terminals; identifying, based on the analyzing, either the communication timeslot that is assigned to mobile terminals or the communication timeslot that is not assigned to mobile terminals as a usable communication timeslot; and transmitting a report based on the identified usable communication timeslot. 14. The method of claim 13, wherein the identifying comprises identifying a communication timeslot of a scheduled reporting communication timeslot type that is assigned to mobile terminals. 15. The method of claim 14, wherein transmitting comprises transmitting the report to an operation center on a timeslot of the scheduled reporting communication timeslot type. 16. The method of claim 13, wherein the identifying comprises identifying a communication timeslot of an unscheduled reporting communication timeslot type that is not assigned to mobile terminals. 17. The method of claim 13, wherein the analyzing comprises analyzing time division multiplexed timeslots. 18. The method of claim 13, wherein the transmitting comprises transmitting on a time division multiple access timeslot. 19. The method of claim 13, wherein the identifying comprises identifying a communication timeslot of an event reporting timeslot type. 20. The method of claim 13, wherein the identifying comprises identifying a communication timeslot of a scheduled reporting timeslot type that is not currently assigned to a mobile terminal. 21. A mobile terminal, comprising:
an awake state and a sleep mode; a communication timeslot identifier configured to analyze, upon transition from the sleep mode to the awake state, activity on a communication timeslot that is assigned to mobile terminals and on a communication timeslot that is not assigned to mobile terminals, and to identify, based on the analyzing, either the communication timeslot assigned to mobile terminals or the communication timeslot not assigned to mobile terminals as a usable communication timeslot; and a transmitter configured to transmit a report on the identified usable communication timeslot. 22. The method of claim 21, wherein the communication timeslot identifier is configured to identify a communication timeslot of a scheduled reporting communication timeslot type that is assigned to mobile terminals. 23. The mobile terminal of claim 22, wherein the transmitter is configured to transmit the report to an operation center on a timeslot of the scheduled reporting communication timeslot type. 24. The method of claim 21, wherein the communication timeslot identifier is configured to identify a communication timeslot of an unscheduled reporting communication timeslot type that is not assigned to mobile terminals. 25. The mobile terminal of claim 21, wherein the communication timeslot identifier is configured to analyze time division multiplexed timeslots. 26. The mobile terminal of claim 21, wherein the transmitter is configured to transmit on a time division multiple access timeslot. 27. The mobile terminal of claim 21, wherein the communication timeslot identifier is configured to identify a communication timeslot of an event reporting timeslot type. 28. The mobile terminal of claim 21, wherein the communication timeslot identifier is configured to identify a communication timeslot of a scheduled reporting timeslot type that is not currently assigned to a mobile terminal. | A system and method for improving efficiency of satellite communications is described. In one embodiment, efficient satellite communications is enabled through event-driven reporting by a mobile terminal.1-12. (canceled) 13. A method performed by a mobile terminal, comprising:
awakening, by the mobile terminal, from a sleep mode; analyzing activity on a communication timeslot that is assigned to mobile terminals and on a communication timeslot that is not assigned to mobile terminals; identifying, based on the analyzing, either the communication timeslot that is assigned to mobile terminals or the communication timeslot that is not assigned to mobile terminals as a usable communication timeslot; and transmitting a report based on the identified usable communication timeslot. 14. The method of claim 13, wherein the identifying comprises identifying a communication timeslot of a scheduled reporting communication timeslot type that is assigned to mobile terminals. 15. The method of claim 14, wherein transmitting comprises transmitting the report to an operation center on a timeslot of the scheduled reporting communication timeslot type. 16. The method of claim 13, wherein the identifying comprises identifying a communication timeslot of an unscheduled reporting communication timeslot type that is not assigned to mobile terminals. 17. The method of claim 13, wherein the analyzing comprises analyzing time division multiplexed timeslots. 18. The method of claim 13, wherein the transmitting comprises transmitting on a time division multiple access timeslot. 19. The method of claim 13, wherein the identifying comprises identifying a communication timeslot of an event reporting timeslot type. 20. The method of claim 13, wherein the identifying comprises identifying a communication timeslot of a scheduled reporting timeslot type that is not currently assigned to a mobile terminal. 21. A mobile terminal, comprising:
an awake state and a sleep mode; a communication timeslot identifier configured to analyze, upon transition from the sleep mode to the awake state, activity on a communication timeslot that is assigned to mobile terminals and on a communication timeslot that is not assigned to mobile terminals, and to identify, based on the analyzing, either the communication timeslot assigned to mobile terminals or the communication timeslot not assigned to mobile terminals as a usable communication timeslot; and a transmitter configured to transmit a report on the identified usable communication timeslot. 22. The method of claim 21, wherein the communication timeslot identifier is configured to identify a communication timeslot of a scheduled reporting communication timeslot type that is assigned to mobile terminals. 23. The mobile terminal of claim 22, wherein the transmitter is configured to transmit the report to an operation center on a timeslot of the scheduled reporting communication timeslot type. 24. The method of claim 21, wherein the communication timeslot identifier is configured to identify a communication timeslot of an unscheduled reporting communication timeslot type that is not assigned to mobile terminals. 25. The mobile terminal of claim 21, wherein the communication timeslot identifier is configured to analyze time division multiplexed timeslots. 26. The mobile terminal of claim 21, wherein the transmitter is configured to transmit on a time division multiple access timeslot. 27. The mobile terminal of claim 21, wherein the communication timeslot identifier is configured to identify a communication timeslot of an event reporting timeslot type. 28. The mobile terminal of claim 21, wherein the communication timeslot identifier is configured to identify a communication timeslot of a scheduled reporting timeslot type that is not currently assigned to a mobile terminal. | 2,400 |
6,765 | 6,765 | 13,264,320 | 2,487 | The present invention relates to an image processing device and method which enable encoding efficiency in intra prediction to be improved.
In the event that the optimal intra prediction mode is mode 0 , adjacent pixels to be used for prediction of the current block are pixels A 0 , A 1 , A 2 , and A 3 . According to these pixels and a 6-tap FIR filter, pixels a −0.5 , a +0.5 , and so on with ½ pixel precision are generated, and further, pixels a −0.75 , a −0.25 , a +0.25 , and a +0.75 with ¼ pixel precision are generated by linear interpolation. Subsequently, the optimal shift amount is determined with a value of −0.75 through +0.75 that is phase difference between an integer pixel and generated fractional pixel precision serving as a candidate of the shift amount in the horizontal direction. The present invention may be applied to an image encoding device which performs encoding using the H.264/AVC system, for example. | 1. An image processing device comprising:
mode determining means configured to determine a prediction mode for intra prediction regarding the intra prediction block to be subjected intra prediction as to image data; phase shift means configured to shift the phase of an adjacent pixel adjacent to said intra prediction block with a predetermined positional relation in accordance with a shift direction according to said prediction mode determined by said mode determining means, and a shift amount serving as a candidate; shift amount determining means configured to determine the optimal shift amount of said phase as to said adjacent pixel using said adjacent pixel and said adjacent pixel of which the phase is shifted by said phase shift means; and prediction image generating means configured to generate a prediction image of said intra prediction block using said adjacent pixel of which the phase is shifted in accordance with said optimal shift amount determined by said shift amount determining means. 2. The image processing device according to claim 1, further comprising:
encoding means configured to encode difference information between the image of said intra prediction block, and said prediction image generated by said prediction image generating means to generate an encoded stream; and transmission means configured to transmit shift amount information indicating said optimal shift amount determined by said shift amount determining means, and prediction mode information indicating said prediction mode determined by said mode determining means along with an encoded stream generated by said encoding means. 3. The image processing device according to claim 2, wherein said encoding means encode difference information indicating difference between said optimal shift amount determined regarding said intra prediction block, and optimal shift amount determined regarding a block which provides MostProbableMode as said shift amount information;
and wherein said transmission means transmit an encoded stream generated by said encoding means, and said difference information. 4. The image processing device according to claim 1, wherein said phase shift means inhibit shift of said phase in the event that said prediction mode determined by said mode determining means is a DC prediction mode. 5. The image processing device according to claim 1, wherein said phase shift means shift the phase in the horizontal direction as to an upper adjacent pixel of said adjacent pixels in accordance with a shift amount serving as said candidate, and inhibit shift of the phase in the vertical direction as to a left adjacent pixel of said adjacent pixels in the event that said prediction mode determined by said mode determining means is a Vertical prediction mode, Diag_Down_Left prediction mode, or Vertical_Left prediction mode. 6. The image processing device according to claim 1, wherein said phase shift means shift the phase in the vertical direction as to a left adjacent pixel of said adjacent pixels in accordance with a shift amount serving as said candidate, and inhibit shift of the phase in the horizontal direction as to an upper adjacent pixel of said adjacent pixels in the event that said prediction mode determined by said mode determining means is a Horizontal prediction mode, or Horizontal_Up prediction mode. 7. The image processing device according to claim 1, wherein said mode determining means determine all of the prediction modes of said intra prediction;
and wherein said phase shift means shift the phase of said adjacent pixel in accordance with shift directions according to said all of the prediction modes determined by said mode determining means, and a shift amount serving as a candidate; and wherein said shift amount determining means use said adjacent pixel and said adjacent pixel of which phase is shifted by said phase shift means to determine the optimal shift amount of said phase, and the optimal prediction mode as to said adjacent pixel. 8. The image processing device according to claim 1, further comprising:
motion prediction compensation means configured to perform inter motion prediction regarding the inter motion prediction block of said image; wherein said phase shift means use a filter used at the time of fractional pixel precision prediction by said motion prediction compensation means to shift the phase of said adjacent pixel. 9. An image processing method comprising the step of:
causing an image processing device
to determine the prediction mode of intra prediction regarding an intra prediction block to be processed for intra prediction as to image data;
to shift the phase of an adjacent pixel adjacent to said intra prediction block with a predetermined positional relation in accordance with a shift direction according to said determined prediction mode, and a shift amount serving as a candidate;
to determine the optimal shift amount of said phase as to said adjacent pixel using said adjacent pixel and said adjacent pixel of which the phase is shifted; and
to generate a prediction image of said intra prediction block using said adjacent pixel of which the phase is shifted in accordance with said determined optimal shift amount. 10. An image processing device comprising:
reception means configured to receive prediction mode information indicating the prediction mode of intra prediction regarding an intra prediction block to be processed for intra prediction, and shift amount information indicating a shift amount for shifting the phase of an adjacent pixel adjacent to said intra prediction block with a predetermined positional relation according to the prediction mode indicated by said prediction mode information; phase shift means configured to shift the phase of said adjacent pixel in accordance with a shift direction and a shift amount according to said prediction mode received by said reception means; and prediction image generating means configured to generate a prediction image of said intra prediction block using said adjacent pixel of which the phase is shifted by said phase shift means. 11. The image processing device according to claim 10, wherein said reception means receive difference information indicating difference between a shift amount regarding said intra prediction block, and a shift amount regarding a block which provides MostProbableMode as said shift amount information. 12. The image processing device according to claim 10, further comprising:
decoding mans configured to decode said intra prediction block using a prediction image generated by said prediction image generating means. 13. The image processing device according to claim 12, wherein said decoding means decode the prediction mode information received by said reception means, and said shift amount information. 14. The image processing device according to claim 10, wherein said phase shift means inhibit shift of the phase of said adjacent pixel in the event that said prediction mode decoded by said decoding means is a DC prediction mode. 15. The image processing device according to claim 10, wherein said phase shift means shift the phase in the horizontal direction as to an upper adjacent pixel of said adjacent pixels in accordance with said shift amount decoded by said decoding means, and inhibit shift of the phase in the vertical direction as to a left adjacent pixel of said adjacent pixels in the event that said prediction mode decoded by said decoding means is a Vertical prediction mode, Diag_Down_Left prediction mode, or Vertical_Left prediction mode. 16. The image processing device according to claim 10, wherein said phase shift means shift the phase in the vertical direction as to a left adjacent pixel of said adjacent pixels in accordance with said shift amount decoded by said decoding means, and inhibit shift of the phase in the horizontal direction as to an upper adjacent pixel of said adjacent pixels in the event that said prediction mode decoded by said decoding means is a Horizontal prediction mode, or Horizontal_Up prediction mode. 17. The image processing device according to claim 10, further comprising:
motion prediction compensation means configured to perform inter motion prediction using a motion vector to be decoded by said decoding means along with an encoded inter motion prediction block; wherein said phase shift means shift the phase of said adjacent pixel using a filter to be used at the time of fractional pixel precision prediction by said motion prediction compensation means. 18. An image processing method comprising the step of:
causing an image processing device
to receive prediction mode information indicating the prediction mode of intra prediction regarding an intra prediction block to be processed for intra prediction, and shift amount information indicating a shift amount for shifting the phase of an adjacent pixel adjacent to said intra prediction block with a predetermined positional relation according to the prediction mode indicated by said prediction mode information;
to shift the phase of said adjacent pixel in accordance with a shift direction and a shift amount according to said received prediction mode; and
to generate a prediction image of said intra prediction block using said adjacent pixel of which the phase is shifted. | The present invention relates to an image processing device and method which enable encoding efficiency in intra prediction to be improved.
In the event that the optimal intra prediction mode is mode 0 , adjacent pixels to be used for prediction of the current block are pixels A 0 , A 1 , A 2 , and A 3 . According to these pixels and a 6-tap FIR filter, pixels a −0.5 , a +0.5 , and so on with ½ pixel precision are generated, and further, pixels a −0.75 , a −0.25 , a +0.25 , and a +0.75 with ¼ pixel precision are generated by linear interpolation. Subsequently, the optimal shift amount is determined with a value of −0.75 through +0.75 that is phase difference between an integer pixel and generated fractional pixel precision serving as a candidate of the shift amount in the horizontal direction. The present invention may be applied to an image encoding device which performs encoding using the H.264/AVC system, for example.1. An image processing device comprising:
mode determining means configured to determine a prediction mode for intra prediction regarding the intra prediction block to be subjected intra prediction as to image data; phase shift means configured to shift the phase of an adjacent pixel adjacent to said intra prediction block with a predetermined positional relation in accordance with a shift direction according to said prediction mode determined by said mode determining means, and a shift amount serving as a candidate; shift amount determining means configured to determine the optimal shift amount of said phase as to said adjacent pixel using said adjacent pixel and said adjacent pixel of which the phase is shifted by said phase shift means; and prediction image generating means configured to generate a prediction image of said intra prediction block using said adjacent pixel of which the phase is shifted in accordance with said optimal shift amount determined by said shift amount determining means. 2. The image processing device according to claim 1, further comprising:
encoding means configured to encode difference information between the image of said intra prediction block, and said prediction image generated by said prediction image generating means to generate an encoded stream; and transmission means configured to transmit shift amount information indicating said optimal shift amount determined by said shift amount determining means, and prediction mode information indicating said prediction mode determined by said mode determining means along with an encoded stream generated by said encoding means. 3. The image processing device according to claim 2, wherein said encoding means encode difference information indicating difference between said optimal shift amount determined regarding said intra prediction block, and optimal shift amount determined regarding a block which provides MostProbableMode as said shift amount information;
and wherein said transmission means transmit an encoded stream generated by said encoding means, and said difference information. 4. The image processing device according to claim 1, wherein said phase shift means inhibit shift of said phase in the event that said prediction mode determined by said mode determining means is a DC prediction mode. 5. The image processing device according to claim 1, wherein said phase shift means shift the phase in the horizontal direction as to an upper adjacent pixel of said adjacent pixels in accordance with a shift amount serving as said candidate, and inhibit shift of the phase in the vertical direction as to a left adjacent pixel of said adjacent pixels in the event that said prediction mode determined by said mode determining means is a Vertical prediction mode, Diag_Down_Left prediction mode, or Vertical_Left prediction mode. 6. The image processing device according to claim 1, wherein said phase shift means shift the phase in the vertical direction as to a left adjacent pixel of said adjacent pixels in accordance with a shift amount serving as said candidate, and inhibit shift of the phase in the horizontal direction as to an upper adjacent pixel of said adjacent pixels in the event that said prediction mode determined by said mode determining means is a Horizontal prediction mode, or Horizontal_Up prediction mode. 7. The image processing device according to claim 1, wherein said mode determining means determine all of the prediction modes of said intra prediction;
and wherein said phase shift means shift the phase of said adjacent pixel in accordance with shift directions according to said all of the prediction modes determined by said mode determining means, and a shift amount serving as a candidate; and wherein said shift amount determining means use said adjacent pixel and said adjacent pixel of which phase is shifted by said phase shift means to determine the optimal shift amount of said phase, and the optimal prediction mode as to said adjacent pixel. 8. The image processing device according to claim 1, further comprising:
motion prediction compensation means configured to perform inter motion prediction regarding the inter motion prediction block of said image; wherein said phase shift means use a filter used at the time of fractional pixel precision prediction by said motion prediction compensation means to shift the phase of said adjacent pixel. 9. An image processing method comprising the step of:
causing an image processing device
to determine the prediction mode of intra prediction regarding an intra prediction block to be processed for intra prediction as to image data;
to shift the phase of an adjacent pixel adjacent to said intra prediction block with a predetermined positional relation in accordance with a shift direction according to said determined prediction mode, and a shift amount serving as a candidate;
to determine the optimal shift amount of said phase as to said adjacent pixel using said adjacent pixel and said adjacent pixel of which the phase is shifted; and
to generate a prediction image of said intra prediction block using said adjacent pixel of which the phase is shifted in accordance with said determined optimal shift amount. 10. An image processing device comprising:
reception means configured to receive prediction mode information indicating the prediction mode of intra prediction regarding an intra prediction block to be processed for intra prediction, and shift amount information indicating a shift amount for shifting the phase of an adjacent pixel adjacent to said intra prediction block with a predetermined positional relation according to the prediction mode indicated by said prediction mode information; phase shift means configured to shift the phase of said adjacent pixel in accordance with a shift direction and a shift amount according to said prediction mode received by said reception means; and prediction image generating means configured to generate a prediction image of said intra prediction block using said adjacent pixel of which the phase is shifted by said phase shift means. 11. The image processing device according to claim 10, wherein said reception means receive difference information indicating difference between a shift amount regarding said intra prediction block, and a shift amount regarding a block which provides MostProbableMode as said shift amount information. 12. The image processing device according to claim 10, further comprising:
decoding mans configured to decode said intra prediction block using a prediction image generated by said prediction image generating means. 13. The image processing device according to claim 12, wherein said decoding means decode the prediction mode information received by said reception means, and said shift amount information. 14. The image processing device according to claim 10, wherein said phase shift means inhibit shift of the phase of said adjacent pixel in the event that said prediction mode decoded by said decoding means is a DC prediction mode. 15. The image processing device according to claim 10, wherein said phase shift means shift the phase in the horizontal direction as to an upper adjacent pixel of said adjacent pixels in accordance with said shift amount decoded by said decoding means, and inhibit shift of the phase in the vertical direction as to a left adjacent pixel of said adjacent pixels in the event that said prediction mode decoded by said decoding means is a Vertical prediction mode, Diag_Down_Left prediction mode, or Vertical_Left prediction mode. 16. The image processing device according to claim 10, wherein said phase shift means shift the phase in the vertical direction as to a left adjacent pixel of said adjacent pixels in accordance with said shift amount decoded by said decoding means, and inhibit shift of the phase in the horizontal direction as to an upper adjacent pixel of said adjacent pixels in the event that said prediction mode decoded by said decoding means is a Horizontal prediction mode, or Horizontal_Up prediction mode. 17. The image processing device according to claim 10, further comprising:
motion prediction compensation means configured to perform inter motion prediction using a motion vector to be decoded by said decoding means along with an encoded inter motion prediction block; wherein said phase shift means shift the phase of said adjacent pixel using a filter to be used at the time of fractional pixel precision prediction by said motion prediction compensation means. 18. An image processing method comprising the step of:
causing an image processing device
to receive prediction mode information indicating the prediction mode of intra prediction regarding an intra prediction block to be processed for intra prediction, and shift amount information indicating a shift amount for shifting the phase of an adjacent pixel adjacent to said intra prediction block with a predetermined positional relation according to the prediction mode indicated by said prediction mode information;
to shift the phase of said adjacent pixel in accordance with a shift direction and a shift amount according to said received prediction mode; and
to generate a prediction image of said intra prediction block using said adjacent pixel of which the phase is shifted. | 2,400 |
6,766 | 6,766 | 13,724,507 | 2,474 | Methods and systems may provide for accumulating sensor-based information from a plurality of mobile devices and identifying context information in the sensor-based information, wherein the context information is relevant to a particular mobile device in the plurality of mobile devices. Additionally, an operational recommendation may be sent to the particular mobile device based on the context information. In one example, the operational recommendation identifies one or more of a power management action, a performance management action, a wireless interface selection and a wireless access point selection. | 1. A system comprising:
logic, the logic at least partially comprising hardware logic, to:
accumulate sensor-based information from a plurality of mobile devices;
identify in the sensor-based information context information relevant to a particular mobile device in the plurality of mobile devices; and
send an operational recommendation to the particular mobile device based at least in part on the context information. 2. The system of claim 1, wherein the operational recommendation is to identify one or more of a power management action, a performance management action, a wireless interface selection and a wireless access point selection. 3. The system of claim 1, wherein the context information is to be identified based on one or more of a location, a wireless connectivity and a battery life of the particular mobile device. 4. The system of claim 1, wherein the sensor-based information is to include raw sensor data. 5. The system of claim 4, wherein the raw sensor data is to include one or more of received signal strength (RSS) data, accelerometer data, wireless access point identifier data and battery life data. 6. The system of claim 1, wherein the sensor-based information is to include device-generated context information. 7. The system of claim 1, wherein the hardware logic is to filter out a portion of the sensor-based information to obtain a reduced set of sensor-based information, wherein the context information is to be identified in the reduced set of sensor-based information. 8. The system of claim 7, further including a cloud repository, wherein the hardware logic is to store the reduced set of sensor-based information to the cloud repository. 9. A non-transitory computer readable storage medium comprising a set of instructions which, if executed by a computer, cause a computer to:
accumulate sensor-based information from a plurality of mobile devices; identify in the sensor-based information context information relevant to a particular mobile device in the plurality of mobile devices; and send an operational recommendation to the particular mobile device based on the context information. 10. The medium of claim 9, wherein the operational recommendation is to identify one or more of a power management action, a performance management action, a wireless interface selection and a wireless access point selection. 11. The medium of claim 9, wherein the context information is to be identified based on one or more of a location, a wireless connectivity and a battery life of the particular mobile device. 12. The medium of claim 9, wherein the sensor-based information is to include raw sensor data. 13. The medium of claim 12, wherein the raw sensor data is to include one or more of received signal strength (RSS) data, accelerometer data, wireless access point identifier data and battery life data. 14. The medium of claim 9, wherein the sensor-based information is to include device-generated context information. 15. The medium of claim 9, wherein the instructions, if executed, cause a computer to filter out a portion of the sensor-based information to obtain a reduced set of sensor-based information, wherein the context information is to be identified in the reduced set of sensor-based information. 16. The medium of claim 15, wherein the instructions, if executed, cause a computer to store the reduced set of sensor-based information to a cloud repository. 17. A mobile device comprising:
one or more local sensors; and logic, the logic at least partially comprising hardware logic, to:
obtain sensor-based information from the one or more local sensors; and
send the sensor-based information to a server and receive an operational recommendation from the server, wherein the operational recommendation is to include first context information associated with sensor-based information from one or more additional mobile devices. 18. The mobile device of claim 17, wherein the operational recommendation is to identify one or more of a power management action, a performance management action, a wireless interface selection and a wireless access point selection. 19. The mobile device of claim 17, wherein the sensor-based information from the one or more local sensors is to include raw sensor data. 20. The mobile device of claim 19, wherein the raw sensor data is to include one or more of received signal strength (RSS) data, accelerometer data, wireless access point identifier data and battery life data. 21. The mobile device of claim 17, further including a context module to identify second context information associated with raw sensor data from the one or more local sensors, wherein the second context information is to be sent to the server. 22. The mobile device of claim 17, wherein the sensor-based information from the one or more local sensors and the sensor-based information from the one or more additional mobile devices are to be different types of information. 23. A non-transitory computer readable storage medium comprising a set of instructions which, if executed by a mobile device, cause the mobile device to:
obtain sensor-based information from one or more local sensors of the mobile device; send the sensor-based information to a server; and receive an operational recommendation from the server, wherein the operational recommendation is to include context information associated with sensor-based information from one or more additional mobile devices. 24. The medium of claim 23, wherein the operational recommendation is to identify one or more of a power management action, a performance management action, a wireless interface selection and a wireless access point selection. 25. The medium of claim 23, wherein the sensor-based information from the one or more local sensors is to include raw sensor data. 26. The medium of claim 25, wherein the raw sensor data is to include one or more of received signal strength (RSS) data, accelerometer data, wireless access point identifier data and battery life data. 27. The medium of claim 23, wherein the sensor-based information from the one or more local sensors is to include device-generated context information. 28. The medium of claim 23, wherein the sensor-based information from the one or more local sensors and the sensor-based information from the one or more additional mobile devices are to be different types of information. | Methods and systems may provide for accumulating sensor-based information from a plurality of mobile devices and identifying context information in the sensor-based information, wherein the context information is relevant to a particular mobile device in the plurality of mobile devices. Additionally, an operational recommendation may be sent to the particular mobile device based on the context information. In one example, the operational recommendation identifies one or more of a power management action, a performance management action, a wireless interface selection and a wireless access point selection.1. A system comprising:
logic, the logic at least partially comprising hardware logic, to:
accumulate sensor-based information from a plurality of mobile devices;
identify in the sensor-based information context information relevant to a particular mobile device in the plurality of mobile devices; and
send an operational recommendation to the particular mobile device based at least in part on the context information. 2. The system of claim 1, wherein the operational recommendation is to identify one or more of a power management action, a performance management action, a wireless interface selection and a wireless access point selection. 3. The system of claim 1, wherein the context information is to be identified based on one or more of a location, a wireless connectivity and a battery life of the particular mobile device. 4. The system of claim 1, wherein the sensor-based information is to include raw sensor data. 5. The system of claim 4, wherein the raw sensor data is to include one or more of received signal strength (RSS) data, accelerometer data, wireless access point identifier data and battery life data. 6. The system of claim 1, wherein the sensor-based information is to include device-generated context information. 7. The system of claim 1, wherein the hardware logic is to filter out a portion of the sensor-based information to obtain a reduced set of sensor-based information, wherein the context information is to be identified in the reduced set of sensor-based information. 8. The system of claim 7, further including a cloud repository, wherein the hardware logic is to store the reduced set of sensor-based information to the cloud repository. 9. A non-transitory computer readable storage medium comprising a set of instructions which, if executed by a computer, cause a computer to:
accumulate sensor-based information from a plurality of mobile devices; identify in the sensor-based information context information relevant to a particular mobile device in the plurality of mobile devices; and send an operational recommendation to the particular mobile device based on the context information. 10. The medium of claim 9, wherein the operational recommendation is to identify one or more of a power management action, a performance management action, a wireless interface selection and a wireless access point selection. 11. The medium of claim 9, wherein the context information is to be identified based on one or more of a location, a wireless connectivity and a battery life of the particular mobile device. 12. The medium of claim 9, wherein the sensor-based information is to include raw sensor data. 13. The medium of claim 12, wherein the raw sensor data is to include one or more of received signal strength (RSS) data, accelerometer data, wireless access point identifier data and battery life data. 14. The medium of claim 9, wherein the sensor-based information is to include device-generated context information. 15. The medium of claim 9, wherein the instructions, if executed, cause a computer to filter out a portion of the sensor-based information to obtain a reduced set of sensor-based information, wherein the context information is to be identified in the reduced set of sensor-based information. 16. The medium of claim 15, wherein the instructions, if executed, cause a computer to store the reduced set of sensor-based information to a cloud repository. 17. A mobile device comprising:
one or more local sensors; and logic, the logic at least partially comprising hardware logic, to:
obtain sensor-based information from the one or more local sensors; and
send the sensor-based information to a server and receive an operational recommendation from the server, wherein the operational recommendation is to include first context information associated with sensor-based information from one or more additional mobile devices. 18. The mobile device of claim 17, wherein the operational recommendation is to identify one or more of a power management action, a performance management action, a wireless interface selection and a wireless access point selection. 19. The mobile device of claim 17, wherein the sensor-based information from the one or more local sensors is to include raw sensor data. 20. The mobile device of claim 19, wherein the raw sensor data is to include one or more of received signal strength (RSS) data, accelerometer data, wireless access point identifier data and battery life data. 21. The mobile device of claim 17, further including a context module to identify second context information associated with raw sensor data from the one or more local sensors, wherein the second context information is to be sent to the server. 22. The mobile device of claim 17, wherein the sensor-based information from the one or more local sensors and the sensor-based information from the one or more additional mobile devices are to be different types of information. 23. A non-transitory computer readable storage medium comprising a set of instructions which, if executed by a mobile device, cause the mobile device to:
obtain sensor-based information from one or more local sensors of the mobile device; send the sensor-based information to a server; and receive an operational recommendation from the server, wherein the operational recommendation is to include context information associated with sensor-based information from one or more additional mobile devices. 24. The medium of claim 23, wherein the operational recommendation is to identify one or more of a power management action, a performance management action, a wireless interface selection and a wireless access point selection. 25. The medium of claim 23, wherein the sensor-based information from the one or more local sensors is to include raw sensor data. 26. The medium of claim 25, wherein the raw sensor data is to include one or more of received signal strength (RSS) data, accelerometer data, wireless access point identifier data and battery life data. 27. The medium of claim 23, wherein the sensor-based information from the one or more local sensors is to include device-generated context information. 28. The medium of claim 23, wherein the sensor-based information from the one or more local sensors and the sensor-based information from the one or more additional mobile devices are to be different types of information. | 2,400 |
6,767 | 6,767 | 14,379,827 | 2,467 | Data Block Transmission with Variable Retransmission Feedback Time For communicating data between a transmitter ( 10 ) and a receiver ( 14 ), wireless transmission of data blocks is implemented on the basis a retransmission protocol with variable value of a feedback time. The feedback time defines a time interval between transmission of one of the data blocks ( 22 ) and transmission of a feedback message ( 23 ) indicating whether the data block ( 22 ) was successfully received. The transmitter ( 10 ) or the receiver ( 14 ) determines the value of the feedback time. Depending on the determined value of the feedback time, the transmitter ( 10 ) controls transmission of the data block ( 22 ) to the receiver and/or the receiver ( 14 ) controls reception of the data block ( 22 ) at the receiver ( 14 ). The transmitter ( 10 ) may for example be a base station of a mobile network, and the receiver ( 14 ) may be a terminal device connected to the mobile network. (FIG. 1 ) | 1-27. (canceled) 28. A method of controlling wireless transmission of data blocks between a transmitter and a receiver based on a retransmission protocol with a variable value of a feedback time, the feedback time defining a time interval between transmission of one of the data blocks and transmission of a feedback message indicating whether the data block was successfully received, the method comprising:
the transmitter determining the value of the feedback time; the transmitter controlling transmission of the data block to the receiver based on the determined value of the feedback time. 29. The method of claim 28, further comprising the transmitter determining the feedback time based on a size of the data block. 30. The method of claim 28, further comprising the transmitter controlling the size of the data block based on the determined value of feedback time. 31. The method of claim 30, further comprising the transmitter controlling the size of the data block based on radio channel conditions. 32. The method of claim 28, further comprising the transmitter controlling retransmission of the data block based on the determined value of the feedback time. 33. The method of claim 28, further comprising:
the transmitter receiving control data; the transmitter determining the value of the feedback time based on the received control data. 34. The method of claim 33, wherein the transmitter receives the control data from the receiver. 35. The method of claim 33, wherein the transmitter receives the control data from a control node. 36. The method of claim 28, further comprising the transmitter determining the value of the feedback time based on data indicating a device category of the receiver. 37. The method of claim 28, further comprising:
the transmitter receiving data related to the receiver from a database; the transmitter determining the value of the feedback time based on the data received from the database. 38. The method of claim 28, further comprising the transmitter sending control data indicating the determined value of the feedback time to the receiver. 39. The method of claim 28, wherein:
the transmitter is a base station of a mobile network; the receiver is a terminal device. 40. A method of controlling wireless transmission of data blocks between a transmitter and a receiver based on a retransmission protocol with variable value of a feedback time, the feedback time defining a time interval between transmission of one of the data blocks and transmission of a feedback message indicating whether the data block was successfully received, the method comprising:
the receiver determining the value of the feedback time; the receiver controlling reception of the data block at the receiver based on the determined value of the feedback time. 41. The method of claim 40, further comprising:
the receiver receiving control data from the transmitter; the receiver determining the value of the feedback time based on the received control data. 42. The method of claim 40, further comprising the receiver sending control data indicating the determined value of the feedback time to the transmitter. 43. The method of claim 40, further comprising:
the receiver determining a maximum data block size based on the determined value of the feedback time; the receiver sending control data indicating the determined maximum data block size to the transmitter. 44. The method of claim 43, wherein the receiver determines the maximum data block size based on radio channel conditions. 45. The method of claim 40, further comprising the receiver entering or leaving a low power mode based on the determined value of the feedback time. 46. The method of claim 40, further comprising the receiver scaling an operating voltage or adjusting a clock frequency based on the determined value of the feedback time. 47. The method of claim 40, further comprising the receiver determining the value of the feedback time based on an amount of processing resources which are available at the receiver for processing of signals for transmission of the data block. 48. The method of claim 40, wherein:
the transmitter is a base station of a mobile network; and the receiver is a terminal device. 49. A transmitter, comprising:
a radio interface for wireless transmission of data blocks to a receiver; a processing circuit, wherein the processing circuit is configured to:
control transmission of the data blocks based on a retransmission protocol with variable value of a feedback time, the feedback time defining a time interval between transmission of one of the data blocks and transmission of a feedback message indicating whether the data block was successfully received;
determine the value of the feedback time;
control transmission of the data block to the receiver, via the radio interface, based on the determined value of the feedback time. 50. A receiver, comprising:
a radio interface for wireless reception of data blocks from a transmitter; and a processing circuit, wherein the processing circuit is configured to:
control reception of the data blocks based on a retransmission protocol with variable value of a feedback time, the feedback time defining a time interval between transmission of one of the data blocks and transmission of a feedback message indicating whether the data block was successfully received;
determine the value of the feedback time;
control reception of the data block at the receiver, via the radio interface, based on the determined value of the feedback time. 51. A computer program product stored in a non-transitory computer readable medium for controlling wireless transmission of data blocks between a transmitter and a receiver based on a retransmission protocol with a variable value of a feedback time, the feedback time defining a time interval between transmission of one of the data blocks and transmission of a feedback message indicating whether the data block was successfully received, the computer program product comprising software instructions which, when run on a processing circuit of the transmitter, causes the transmitter to:
determine the value of the feedback time; control transmission of the data block to the receiver based on the determined value of the feedback time. 52. A computer program product stored in a non-transitory computer readable medium for controlling wireless transmission of data blocks between a transmitter and a receiver based on a retransmission protocol with a variable value of a feedback time, the feedback time defining a time interval between transmission of one of the data blocks and transmission of a feedback message indicating whether the data block was successfully received, the computer program product comprising software instructions which, when run on a processing circuit of the receiver, causes the receiver to:
determine the value of the feedback time; control reception of the data block at the receiver based on the determined value of the feedback time. | Data Block Transmission with Variable Retransmission Feedback Time For communicating data between a transmitter ( 10 ) and a receiver ( 14 ), wireless transmission of data blocks is implemented on the basis a retransmission protocol with variable value of a feedback time. The feedback time defines a time interval between transmission of one of the data blocks ( 22 ) and transmission of a feedback message ( 23 ) indicating whether the data block ( 22 ) was successfully received. The transmitter ( 10 ) or the receiver ( 14 ) determines the value of the feedback time. Depending on the determined value of the feedback time, the transmitter ( 10 ) controls transmission of the data block ( 22 ) to the receiver and/or the receiver ( 14 ) controls reception of the data block ( 22 ) at the receiver ( 14 ). The transmitter ( 10 ) may for example be a base station of a mobile network, and the receiver ( 14 ) may be a terminal device connected to the mobile network. (FIG. 1 )1-27. (canceled) 28. A method of controlling wireless transmission of data blocks between a transmitter and a receiver based on a retransmission protocol with a variable value of a feedback time, the feedback time defining a time interval between transmission of one of the data blocks and transmission of a feedback message indicating whether the data block was successfully received, the method comprising:
the transmitter determining the value of the feedback time; the transmitter controlling transmission of the data block to the receiver based on the determined value of the feedback time. 29. The method of claim 28, further comprising the transmitter determining the feedback time based on a size of the data block. 30. The method of claim 28, further comprising the transmitter controlling the size of the data block based on the determined value of feedback time. 31. The method of claim 30, further comprising the transmitter controlling the size of the data block based on radio channel conditions. 32. The method of claim 28, further comprising the transmitter controlling retransmission of the data block based on the determined value of the feedback time. 33. The method of claim 28, further comprising:
the transmitter receiving control data; the transmitter determining the value of the feedback time based on the received control data. 34. The method of claim 33, wherein the transmitter receives the control data from the receiver. 35. The method of claim 33, wherein the transmitter receives the control data from a control node. 36. The method of claim 28, further comprising the transmitter determining the value of the feedback time based on data indicating a device category of the receiver. 37. The method of claim 28, further comprising:
the transmitter receiving data related to the receiver from a database; the transmitter determining the value of the feedback time based on the data received from the database. 38. The method of claim 28, further comprising the transmitter sending control data indicating the determined value of the feedback time to the receiver. 39. The method of claim 28, wherein:
the transmitter is a base station of a mobile network; the receiver is a terminal device. 40. A method of controlling wireless transmission of data blocks between a transmitter and a receiver based on a retransmission protocol with variable value of a feedback time, the feedback time defining a time interval between transmission of one of the data blocks and transmission of a feedback message indicating whether the data block was successfully received, the method comprising:
the receiver determining the value of the feedback time; the receiver controlling reception of the data block at the receiver based on the determined value of the feedback time. 41. The method of claim 40, further comprising:
the receiver receiving control data from the transmitter; the receiver determining the value of the feedback time based on the received control data. 42. The method of claim 40, further comprising the receiver sending control data indicating the determined value of the feedback time to the transmitter. 43. The method of claim 40, further comprising:
the receiver determining a maximum data block size based on the determined value of the feedback time; the receiver sending control data indicating the determined maximum data block size to the transmitter. 44. The method of claim 43, wherein the receiver determines the maximum data block size based on radio channel conditions. 45. The method of claim 40, further comprising the receiver entering or leaving a low power mode based on the determined value of the feedback time. 46. The method of claim 40, further comprising the receiver scaling an operating voltage or adjusting a clock frequency based on the determined value of the feedback time. 47. The method of claim 40, further comprising the receiver determining the value of the feedback time based on an amount of processing resources which are available at the receiver for processing of signals for transmission of the data block. 48. The method of claim 40, wherein:
the transmitter is a base station of a mobile network; and the receiver is a terminal device. 49. A transmitter, comprising:
a radio interface for wireless transmission of data blocks to a receiver; a processing circuit, wherein the processing circuit is configured to:
control transmission of the data blocks based on a retransmission protocol with variable value of a feedback time, the feedback time defining a time interval between transmission of one of the data blocks and transmission of a feedback message indicating whether the data block was successfully received;
determine the value of the feedback time;
control transmission of the data block to the receiver, via the radio interface, based on the determined value of the feedback time. 50. A receiver, comprising:
a radio interface for wireless reception of data blocks from a transmitter; and a processing circuit, wherein the processing circuit is configured to:
control reception of the data blocks based on a retransmission protocol with variable value of a feedback time, the feedback time defining a time interval between transmission of one of the data blocks and transmission of a feedback message indicating whether the data block was successfully received;
determine the value of the feedback time;
control reception of the data block at the receiver, via the radio interface, based on the determined value of the feedback time. 51. A computer program product stored in a non-transitory computer readable medium for controlling wireless transmission of data blocks between a transmitter and a receiver based on a retransmission protocol with a variable value of a feedback time, the feedback time defining a time interval between transmission of one of the data blocks and transmission of a feedback message indicating whether the data block was successfully received, the computer program product comprising software instructions which, when run on a processing circuit of the transmitter, causes the transmitter to:
determine the value of the feedback time; control transmission of the data block to the receiver based on the determined value of the feedback time. 52. A computer program product stored in a non-transitory computer readable medium for controlling wireless transmission of data blocks between a transmitter and a receiver based on a retransmission protocol with a variable value of a feedback time, the feedback time defining a time interval between transmission of one of the data blocks and transmission of a feedback message indicating whether the data block was successfully received, the computer program product comprising software instructions which, when run on a processing circuit of the receiver, causes the receiver to:
determine the value of the feedback time; control reception of the data block at the receiver based on the determined value of the feedback time. | 2,400 |
6,768 | 6,768 | 14,805,431 | 2,434 | Methods of securely encrypting and decrypting data stored within computer readable memory of a device are described. Additionally, a memory encryption unit architecture ( 200 ) is described. A disclosed encryption method comprises the steps of: providing ( 122 ) a key; encrypting ( 126 ) the data stored in the computer readable memory using the key; generating ( 132 ) an authentication code based on parameters stored in the computer readable memory; wrapping ( 136 ) the key using the authentication code to generate a wrapped key; and storing the wrapped key in the computer readable memory ( 30 ), wherein the validity of the wrapped key is linked to the authenticity of the data stored in the computer readable memory. This prevents successful decryption in the event of execution of modified or malicious code that alters the data stored in the computer readable memory. | 1. A method of encrypting data stored within computer readable memory of a device, the method comprising the steps of:
providing a key; encrypting the data stored in the computer readable memory using the key; generating an authentication code based on parameters stored in the computer readable memory; wrapping the key using the authentication code to generate a wrapped key; and storing the wrapped key in the computer readable memory, wherein the validity of the wrapped key is linked to the authenticity of the data stored in the computer readable memory. 2. The method of claim 1, wherein the step of encrypting the data comprises:
generating a ciphertext using the key for at least one memory location located within the computer readable memory. 3. The method of claim 2, wherein the parameters include the ciphertext of at least one memory location in the memory. 4. The method of claim 3, wherein the step of wrapping the key comprises the step of performing a message authentication code on the ciphertext encrypted by the said key. 5. The method of claim 1, wherein the step of wrapping the key comprises the step of encrypting the key using the message authentication code. 6. The method of claim 4, wherein the message authentication code is a message authentication code, either cipher based, hash based or any other cryptographic process. 7. The method of claim 1, wherein providing a key comprises the step of storing the key in a memory encryption unit, known as MEU. 8. The method of claim 7, wherein the step of encrypting the data is undertaken by the MEU. 9. The method of claim 7, wherein the step of wrapping the key is undertaken on the MEU. 10. The method of claim 1, wherein the computer readable memory is a non volatile memory, such as EEPROM. 11. A method of decrypting data stored within computer readable memory of a device, said method comprising the steps of:
retrieving a first wrapped key from the computer readable memory; computing a first authentication code based on parameters stored in the computer readable memory; unwrapping the first wrapped key using the authentication code to retrieve a key; and decrypting the encrypted data using the key to provide the decrypted data, wherein the validity of the key is linked to the authenticity of the data stored in the computer readable memory. 12. The method of claim 11, further comprising the steps of:
retrieving a second wrapped key from the computer readable memory; computing a second authentication code based on parameters dependent upon every location of the computer readable memory; and decrypting all the data stored in the computer readable memory, such that the validity of all the decrypted data stored in the computer readable memory is dependent upon the authenticity of the data stored in the computer readable memory. 13. The method of claim 11, wherein the first and/or a second wrapped key is provided by an encryption method comprising the steps of:
providing a key, encrypting the data stored in the computer readable memory using the key, generating an authentication code based on parameters stored in the computer readable memory, wrapping the key using the authentication code to generate a wrapped key, and storing the wrapped key in the computer readable memory, wherein the validity of the wrapped key is linked to the authenticity of the data stored in the computer readable memory. 14. A memory encryption unit for encrypting data stored in a computer readable memory, said memory encryption unit comprising:
a plurality of buffers and a plurality of units, wherein the buffers comprise: a key register for receiving a key; a cipher-based message authentication code register for receiving and storing an authentication code, the authentication code linked to the data stored in the computer readable memory; and a wrapped key register for receiving and transmitting a wrapped key, wherein the wrapped key is the key encrypted with the authentication code, and wherein the units comprise: an encryption core for encrypting and decrypting data stored in the computer readable memory using the key; and an operation module for implementing the authentication code. 15. The memory encryption unit of claim 14, further comprising an address decoding and generation unit for providing the key to the encryption core and for providing the authentication code to the data exclusive or. | Methods of securely encrypting and decrypting data stored within computer readable memory of a device are described. Additionally, a memory encryption unit architecture ( 200 ) is described. A disclosed encryption method comprises the steps of: providing ( 122 ) a key; encrypting ( 126 ) the data stored in the computer readable memory using the key; generating ( 132 ) an authentication code based on parameters stored in the computer readable memory; wrapping ( 136 ) the key using the authentication code to generate a wrapped key; and storing the wrapped key in the computer readable memory ( 30 ), wherein the validity of the wrapped key is linked to the authenticity of the data stored in the computer readable memory. This prevents successful decryption in the event of execution of modified or malicious code that alters the data stored in the computer readable memory.1. A method of encrypting data stored within computer readable memory of a device, the method comprising the steps of:
providing a key; encrypting the data stored in the computer readable memory using the key; generating an authentication code based on parameters stored in the computer readable memory; wrapping the key using the authentication code to generate a wrapped key; and storing the wrapped key in the computer readable memory, wherein the validity of the wrapped key is linked to the authenticity of the data stored in the computer readable memory. 2. The method of claim 1, wherein the step of encrypting the data comprises:
generating a ciphertext using the key for at least one memory location located within the computer readable memory. 3. The method of claim 2, wherein the parameters include the ciphertext of at least one memory location in the memory. 4. The method of claim 3, wherein the step of wrapping the key comprises the step of performing a message authentication code on the ciphertext encrypted by the said key. 5. The method of claim 1, wherein the step of wrapping the key comprises the step of encrypting the key using the message authentication code. 6. The method of claim 4, wherein the message authentication code is a message authentication code, either cipher based, hash based or any other cryptographic process. 7. The method of claim 1, wherein providing a key comprises the step of storing the key in a memory encryption unit, known as MEU. 8. The method of claim 7, wherein the step of encrypting the data is undertaken by the MEU. 9. The method of claim 7, wherein the step of wrapping the key is undertaken on the MEU. 10. The method of claim 1, wherein the computer readable memory is a non volatile memory, such as EEPROM. 11. A method of decrypting data stored within computer readable memory of a device, said method comprising the steps of:
retrieving a first wrapped key from the computer readable memory; computing a first authentication code based on parameters stored in the computer readable memory; unwrapping the first wrapped key using the authentication code to retrieve a key; and decrypting the encrypted data using the key to provide the decrypted data, wherein the validity of the key is linked to the authenticity of the data stored in the computer readable memory. 12. The method of claim 11, further comprising the steps of:
retrieving a second wrapped key from the computer readable memory; computing a second authentication code based on parameters dependent upon every location of the computer readable memory; and decrypting all the data stored in the computer readable memory, such that the validity of all the decrypted data stored in the computer readable memory is dependent upon the authenticity of the data stored in the computer readable memory. 13. The method of claim 11, wherein the first and/or a second wrapped key is provided by an encryption method comprising the steps of:
providing a key, encrypting the data stored in the computer readable memory using the key, generating an authentication code based on parameters stored in the computer readable memory, wrapping the key using the authentication code to generate a wrapped key, and storing the wrapped key in the computer readable memory, wherein the validity of the wrapped key is linked to the authenticity of the data stored in the computer readable memory. 14. A memory encryption unit for encrypting data stored in a computer readable memory, said memory encryption unit comprising:
a plurality of buffers and a plurality of units, wherein the buffers comprise: a key register for receiving a key; a cipher-based message authentication code register for receiving and storing an authentication code, the authentication code linked to the data stored in the computer readable memory; and a wrapped key register for receiving and transmitting a wrapped key, wherein the wrapped key is the key encrypted with the authentication code, and wherein the units comprise: an encryption core for encrypting and decrypting data stored in the computer readable memory using the key; and an operation module for implementing the authentication code. 15. The memory encryption unit of claim 14, further comprising an address decoding and generation unit for providing the key to the encryption core and for providing the authentication code to the data exclusive or. | 2,400 |
6,769 | 6,769 | 13,951,839 | 2,477 | A system and method for optimizing power consumption of energy harvesting nodes in a wireless sensor network. In one embodiment, a system includes a network coordinator. The network coordinator includes a wireless transceiver and a controller. The wireless transceiver is configured to provide access to the wireless sensor network. The controller is configured to determine whether a wireless device that is wirelessly communicating with the network coordinator is powered via energy harvesting. The controller is also configured to schedule, based on a determination that the wireless device is powered via energy harvesting, the wireless device to communicate via the wireless sensor network using a priority timeslot of a superframe of the wireless sensor network. The priority timeslot is a timeslot occurring in an initial portion of the superframe. | 1. A method comprising:
determining, by a network coordinator of a wireless network, whether a wireless device that is wirelessly communicating with the network coordinator is powered via energy harvesting; and scheduling, by the network coordinator, based on a determination that the wireless device is powered by energy harvesting, the wireless device to communicate via the wireless network using a priority timeslot of a superframe of the wireless network; wherein the priority timeslot is a timeslot occurring in an initial portion of the superframe. 2. The method of claim 1, wherein the determining comprises extracting, by the network coordinator, from a wireless transmission of the wireless device, information indicating whether the wireless device is powered by energy harvesting. 3. The method of claim 1, further comprising transitioning, by the wireless device, from an operating power state to a low power state based on the priority timeslot of the superframe having elapsed. 4. The method of claim 1, wherein the priority timeslot is a timeslot of the super frame that is earlier in the superframe than a timeslot assigned to any wireless node not powered via energy harvesting. 5. The method of claim 1, further comprising including, by the wireless device, in a transmission directed to the wireless coordinator, information indicating that wireless device is powered via energy harvesting. 6. The method of claim 1, further comprising transitioning, by the wireless device, from the low power state to the operating power state at inception of the priority timeslot of the superframe. 7. The method of claim 1, further comprising reassigning a wireless node not powered via energy harvesting to communicate via a first timeslot rather than a second timeslot currently used by the wireless node, and assigning the second timeslot for communication by the wireless device; wherein the first timeslot is later in the superframe than the second timeslot. 8. A system, comprising:
a wireless device comprising an energy harvesting subsystem configured to power the wireless device; and a network coordinator configured to manage access to a wireless network, the network coordinator comprising:
a controller configured to:
determine whether the wireless device is powered via energy harvesting; and
schedule, based on a determination that the wireless device is powered by energy harvesting, the wireless device to communicate via the wireless network using a priority timeslot of a superframe of the wireless network;
wherein the priority timeslot is a timeslot occurring in an initial portion of the superframe. 9. The system of claim 8, wherein the controller is further configured to extract, from a wireless transmission of the wireless device, information indicating whether the wireless device is powered by energy harvesting. 10. The system of claim 8, wherein the wireless device is configured to provide, to the wireless coordinator, via a request to access the wireless network, information indicating that the wireless device is powered via energy harvesting. 11. The system of claim 8 wherein the wireless device is configured to transition from an operating power state to a low power state based on the priority timeslot of the superframe having elapsed. 12. The system of claim 8, wherein the priority timeslot is a timeslot of the super frame that is earlier in the superframe than any timeslot assigned to a wireless node not powered via energy harvesting. 13. The system of claim 8, wherein the energy harvesting subsystem is configured to extract energy from at least one of wind, solar, vibration, radio frequency, and thermal energy sources. 14. The system of claim 8, further comprising a wireless node that is not powered via energy harvesting. 15. The system of claim 14, wherein the controller is configured to reassign the wireless node to communicate via a first timeslot rather than a second timeslot currently used by the wireless node, and assign the second timeslot for communication by the wireless device; wherein the first timeslot is later in the superframe than the second timeslot. 16. A network coordinator, comprising:
a wireless transceiver configured to provide access to a wireless network; and a controller configured to:
determine whether a wireless device that is wirelessly communicating with the network coordinator is powered via energy harvesting; and
schedule, based on a determination that the wireless device is powered by energy harvesting, the wireless device to communicate via the wireless network using a priority timeslot of a superframe of the wireless network;
wherein the priority timeslot is a timeslot occurring in an initial portion of the superframe. 17. The network coordinator of claim 16 wherein the controller is further configured to extract, from a wireless transmission of the wireless device, information indicating whether the wireless device is powered by energy harvesting. 18. The network coordinator of claim 16 wherein the priority timeslot is a timeslot of the super frame that is earlier in the superframe than any timeslot assigned to a wireless node not powered via energy harvesting. 19. The network coordinator of claim 16 wherein the controller is configured to reassign the wireless node to communicate via a first timeslot rather than a second timeslot currently used by the wireless node, and assign the second timeslot for communication by the wireless device; wherein the first timeslot is later in the superframe than the second timeslot. 20. The network coordinator of claim 16, wherein the wireless network is a wireless sensor network. | A system and method for optimizing power consumption of energy harvesting nodes in a wireless sensor network. In one embodiment, a system includes a network coordinator. The network coordinator includes a wireless transceiver and a controller. The wireless transceiver is configured to provide access to the wireless sensor network. The controller is configured to determine whether a wireless device that is wirelessly communicating with the network coordinator is powered via energy harvesting. The controller is also configured to schedule, based on a determination that the wireless device is powered via energy harvesting, the wireless device to communicate via the wireless sensor network using a priority timeslot of a superframe of the wireless sensor network. The priority timeslot is a timeslot occurring in an initial portion of the superframe.1. A method comprising:
determining, by a network coordinator of a wireless network, whether a wireless device that is wirelessly communicating with the network coordinator is powered via energy harvesting; and scheduling, by the network coordinator, based on a determination that the wireless device is powered by energy harvesting, the wireless device to communicate via the wireless network using a priority timeslot of a superframe of the wireless network; wherein the priority timeslot is a timeslot occurring in an initial portion of the superframe. 2. The method of claim 1, wherein the determining comprises extracting, by the network coordinator, from a wireless transmission of the wireless device, information indicating whether the wireless device is powered by energy harvesting. 3. The method of claim 1, further comprising transitioning, by the wireless device, from an operating power state to a low power state based on the priority timeslot of the superframe having elapsed. 4. The method of claim 1, wherein the priority timeslot is a timeslot of the super frame that is earlier in the superframe than a timeslot assigned to any wireless node not powered via energy harvesting. 5. The method of claim 1, further comprising including, by the wireless device, in a transmission directed to the wireless coordinator, information indicating that wireless device is powered via energy harvesting. 6. The method of claim 1, further comprising transitioning, by the wireless device, from the low power state to the operating power state at inception of the priority timeslot of the superframe. 7. The method of claim 1, further comprising reassigning a wireless node not powered via energy harvesting to communicate via a first timeslot rather than a second timeslot currently used by the wireless node, and assigning the second timeslot for communication by the wireless device; wherein the first timeslot is later in the superframe than the second timeslot. 8. A system, comprising:
a wireless device comprising an energy harvesting subsystem configured to power the wireless device; and a network coordinator configured to manage access to a wireless network, the network coordinator comprising:
a controller configured to:
determine whether the wireless device is powered via energy harvesting; and
schedule, based on a determination that the wireless device is powered by energy harvesting, the wireless device to communicate via the wireless network using a priority timeslot of a superframe of the wireless network;
wherein the priority timeslot is a timeslot occurring in an initial portion of the superframe. 9. The system of claim 8, wherein the controller is further configured to extract, from a wireless transmission of the wireless device, information indicating whether the wireless device is powered by energy harvesting. 10. The system of claim 8, wherein the wireless device is configured to provide, to the wireless coordinator, via a request to access the wireless network, information indicating that the wireless device is powered via energy harvesting. 11. The system of claim 8 wherein the wireless device is configured to transition from an operating power state to a low power state based on the priority timeslot of the superframe having elapsed. 12. The system of claim 8, wherein the priority timeslot is a timeslot of the super frame that is earlier in the superframe than any timeslot assigned to a wireless node not powered via energy harvesting. 13. The system of claim 8, wherein the energy harvesting subsystem is configured to extract energy from at least one of wind, solar, vibration, radio frequency, and thermal energy sources. 14. The system of claim 8, further comprising a wireless node that is not powered via energy harvesting. 15. The system of claim 14, wherein the controller is configured to reassign the wireless node to communicate via a first timeslot rather than a second timeslot currently used by the wireless node, and assign the second timeslot for communication by the wireless device; wherein the first timeslot is later in the superframe than the second timeslot. 16. A network coordinator, comprising:
a wireless transceiver configured to provide access to a wireless network; and a controller configured to:
determine whether a wireless device that is wirelessly communicating with the network coordinator is powered via energy harvesting; and
schedule, based on a determination that the wireless device is powered by energy harvesting, the wireless device to communicate via the wireless network using a priority timeslot of a superframe of the wireless network;
wherein the priority timeslot is a timeslot occurring in an initial portion of the superframe. 17. The network coordinator of claim 16 wherein the controller is further configured to extract, from a wireless transmission of the wireless device, information indicating whether the wireless device is powered by energy harvesting. 18. The network coordinator of claim 16 wherein the priority timeslot is a timeslot of the super frame that is earlier in the superframe than any timeslot assigned to a wireless node not powered via energy harvesting. 19. The network coordinator of claim 16 wherein the controller is configured to reassign the wireless node to communicate via a first timeslot rather than a second timeslot currently used by the wireless node, and assign the second timeslot for communication by the wireless device; wherein the first timeslot is later in the superframe than the second timeslot. 20. The network coordinator of claim 16, wherein the wireless network is a wireless sensor network. | 2,400 |
6,770 | 6,770 | 13,527,811 | 2,444 | A method begins by a dispersed storage (DS) processing module determining, for multi-media content that has not been released, access priority for a user device and selecting a pre-release data distribution protocol and a post-release data distribution protocol. The method continues with the DS processing module distributing a plurality of pre-release sub-sets of a plurality of sets of encoded data slices to the user device in accordance with the selected pre-release data distribution protocol, wherein the multi-media content is dispersed storage error encoded to produce the plurality of sets of encoded data slices. The method continues with the DS processing module distributing a plurality of second sub-sets of the plurality of sets of encoded data slices to the user device in accordance with the selected post-release data distribution protocol. | 1. A method comprises:
determining, for multi-media content that has not been released, access priority for a user device; selecting one of a plurality of pre-release data distribution protocols based on the access priority to produce a selected pre-release data distribution protocol; selecting one of a plurality of post-release data distribution protocols based on the access priority to produce a selected post-release data distribution protocol; distributing a plurality of pre-release sub-sets of a plurality of sets of encoded data slices to the user device in accordance with the selected pre-release data distribution protocol, wherein the multi-media content is dispersed storage error encoded to produce the plurality of sets of encoded data slices and wherein a first pre-release sub-set of the plurality of pre-release sub-sets includes less than a decode threshold number of encoded data slices of a set of encoded data slices of the plurality of sets of encoded data slices; and subsequent to release of the multi-media content, distributing a plurality of post-release sub-sets of the plurality of sets of encoded data slices to the user device in accordance with the selected post-release data distribution protocol, wherein a first post-release sub-set of the plurality of post-release sub-sets includes one or more encoded data slices of the set of encoded data slices such that the first pre-release sub-set and the first post-release sub-set includes at least a decode threshold number of encoded data slices of the set of encoded data slices. 2. The method of claim 1, wherein the determining the access priority comprises:
interpreting pre-order information of the user device to identify one of a plurality of priority levels of access to the multi-media content. 3. The method of claim 2, wherein the plurality of priority levels of access comprises two or more of:
a data reliability indication; a data resolution indication; an availability indicator; a distribution cost indicator; and a storage indicator. 4. The method of claim 1, wherein the determining the access priority comprises:
identifying the user device as having a maintenance program for purchased multi-media content, wherein the multi-media content is an update to the purchased multi-media content. 5. The method of claim 1 further comprises:
the access priority including a pre-release access priority and a post-release access priority;
selecting the one of the plurality of pre-release data distribution protocols based on the pre-release access priority; and
selecting the one of the plurality of post-release data distribution protocols based on the post-release access priority. 6. The method of claim 1, wherein the plurality of pre-release data distribution protocols comprises two or more of:
a number of encoded data slices to include in the first pre-release sub-set; a time frame for sending the plurality of pre-release sub-sets to the user device; a network connection preference to the user device; and an assurance level of the user device receiving the plurality of pre-release sub-sets prior to the release of the multi-media content. 7. The method of claim 1, wherein the plurality of post-release data distribution protocols comprises two or more of:
a number of encoded data slices to include in the first post-release sub-set; a time frame for sending the plurality of post-release sub-sets to the user device; a network connection preference to the user device; and an assurance level of the user device receiving the plurality of post-release sub-sets in a given time frame subsequent to the release of the multi-media content. 8. A dispersed storage (DS) module comprises:
a first module, when operable within a computing device, causes the computing device to:
determine, for multi-media content that has not been released, access priority for a user device;
a second module, when operable within the computing device, causes the computing device to:
select one of a plurality of pre-release data distribution protocols based on the access priority to produce a selected pre-release data distribution protocol; and
select one of a plurality of post-release data distribution protocols based on the access priority to produce a selected post-release data distribution protocol; and
a third module, when operable within the computing device, causes the computing device to:
distribute a plurality of pre-release sub-sets of a plurality of sets of encoded data slices to the user device in accordance with the selected pre-release data distribution protocol, wherein the multi-media content is dispersed storage error encoded to produce the plurality of sets of encoded data slices and wherein a first pre-release sub-set of the plurality of pre-release sub-sets includes less than a decode threshold number of encoded data slices of a set of encoded data slices of the plurality of sets of encoded data slices; and
subsequent to release of the multi-media content, distribute a plurality of post-release sub-sets of the plurality of sets of encoded data slices to the user device in accordance with the selected post-release data distribution protocol, wherein a first post-release sub-set of the plurality of post-release sub-sets includes one or more encoded data slices of the set of encoded data slices such that the first pre-release sub-set and the first post-release sub-set includes at least a decode threshold number of encoded data slices of the set of encoded data slices. 9. The DS module of claim 8, wherein the first module is operable to determine the access priority by:
interpreting pre-order information of the user device to identify one of a plurality of priority levels of access to the multi-media content. 10. The DS module of claim 9, wherein the plurality of priority levels of access comprises two or more of:
a data reliability indication; a data resolution indication; an availability indicator; a distribution cost indicator; and a storage indicator. 11. The DS module of claim 8, wherein the first module is operable to determine the access priority by:
identifying the user device as having a maintenance program for purchased multi-media content, wherein the multi-media content is an update to the purchased multi-media content. 12. The DS module of claim 8 further comprises:
the access priority including a pre-release access priority and a post-release access priority;
the second module is further operable to:
select the one of the plurality of pre-release data distribution protocols based on the pre-release access priority; and
select the one of the plurality of post-release data distribution protocols based on the post-release access priority. 13. The DS module of claim 8, wherein the plurality of pre-release data distribution protocols comprises two or more of:
a number of encoded data slices to include in the first pre-release sub-set; a time frame for sending the plurality of pre-release sub-sets to the user device; a network connection preference to the user device; and an assurance level of the user device receiving the plurality of pre-release sub-sets prior to the release of the multi-media content. 14. The DS module of claim 8, wherein the plurality of post-release data distribution protocols comprises two or more of:
a number of encoded data slices to include in the first post-release sub-set; a time frame for sending the plurality of post-release sub-sets to the user device; a network connection preference to the user device; and an assurance level of the user device receiving the plurality of post-release sub-sets in a given time frame subsequent to the release of the multi-media content. | A method begins by a dispersed storage (DS) processing module determining, for multi-media content that has not been released, access priority for a user device and selecting a pre-release data distribution protocol and a post-release data distribution protocol. The method continues with the DS processing module distributing a plurality of pre-release sub-sets of a plurality of sets of encoded data slices to the user device in accordance with the selected pre-release data distribution protocol, wherein the multi-media content is dispersed storage error encoded to produce the plurality of sets of encoded data slices. The method continues with the DS processing module distributing a plurality of second sub-sets of the plurality of sets of encoded data slices to the user device in accordance with the selected post-release data distribution protocol.1. A method comprises:
determining, for multi-media content that has not been released, access priority for a user device; selecting one of a plurality of pre-release data distribution protocols based on the access priority to produce a selected pre-release data distribution protocol; selecting one of a plurality of post-release data distribution protocols based on the access priority to produce a selected post-release data distribution protocol; distributing a plurality of pre-release sub-sets of a plurality of sets of encoded data slices to the user device in accordance with the selected pre-release data distribution protocol, wherein the multi-media content is dispersed storage error encoded to produce the plurality of sets of encoded data slices and wherein a first pre-release sub-set of the plurality of pre-release sub-sets includes less than a decode threshold number of encoded data slices of a set of encoded data slices of the plurality of sets of encoded data slices; and subsequent to release of the multi-media content, distributing a plurality of post-release sub-sets of the plurality of sets of encoded data slices to the user device in accordance with the selected post-release data distribution protocol, wherein a first post-release sub-set of the plurality of post-release sub-sets includes one or more encoded data slices of the set of encoded data slices such that the first pre-release sub-set and the first post-release sub-set includes at least a decode threshold number of encoded data slices of the set of encoded data slices. 2. The method of claim 1, wherein the determining the access priority comprises:
interpreting pre-order information of the user device to identify one of a plurality of priority levels of access to the multi-media content. 3. The method of claim 2, wherein the plurality of priority levels of access comprises two or more of:
a data reliability indication; a data resolution indication; an availability indicator; a distribution cost indicator; and a storage indicator. 4. The method of claim 1, wherein the determining the access priority comprises:
identifying the user device as having a maintenance program for purchased multi-media content, wherein the multi-media content is an update to the purchased multi-media content. 5. The method of claim 1 further comprises:
the access priority including a pre-release access priority and a post-release access priority;
selecting the one of the plurality of pre-release data distribution protocols based on the pre-release access priority; and
selecting the one of the plurality of post-release data distribution protocols based on the post-release access priority. 6. The method of claim 1, wherein the plurality of pre-release data distribution protocols comprises two or more of:
a number of encoded data slices to include in the first pre-release sub-set; a time frame for sending the plurality of pre-release sub-sets to the user device; a network connection preference to the user device; and an assurance level of the user device receiving the plurality of pre-release sub-sets prior to the release of the multi-media content. 7. The method of claim 1, wherein the plurality of post-release data distribution protocols comprises two or more of:
a number of encoded data slices to include in the first post-release sub-set; a time frame for sending the plurality of post-release sub-sets to the user device; a network connection preference to the user device; and an assurance level of the user device receiving the plurality of post-release sub-sets in a given time frame subsequent to the release of the multi-media content. 8. A dispersed storage (DS) module comprises:
a first module, when operable within a computing device, causes the computing device to:
determine, for multi-media content that has not been released, access priority for a user device;
a second module, when operable within the computing device, causes the computing device to:
select one of a plurality of pre-release data distribution protocols based on the access priority to produce a selected pre-release data distribution protocol; and
select one of a plurality of post-release data distribution protocols based on the access priority to produce a selected post-release data distribution protocol; and
a third module, when operable within the computing device, causes the computing device to:
distribute a plurality of pre-release sub-sets of a plurality of sets of encoded data slices to the user device in accordance with the selected pre-release data distribution protocol, wherein the multi-media content is dispersed storage error encoded to produce the plurality of sets of encoded data slices and wherein a first pre-release sub-set of the plurality of pre-release sub-sets includes less than a decode threshold number of encoded data slices of a set of encoded data slices of the plurality of sets of encoded data slices; and
subsequent to release of the multi-media content, distribute a plurality of post-release sub-sets of the plurality of sets of encoded data slices to the user device in accordance with the selected post-release data distribution protocol, wherein a first post-release sub-set of the plurality of post-release sub-sets includes one or more encoded data slices of the set of encoded data slices such that the first pre-release sub-set and the first post-release sub-set includes at least a decode threshold number of encoded data slices of the set of encoded data slices. 9. The DS module of claim 8, wherein the first module is operable to determine the access priority by:
interpreting pre-order information of the user device to identify one of a plurality of priority levels of access to the multi-media content. 10. The DS module of claim 9, wherein the plurality of priority levels of access comprises two or more of:
a data reliability indication; a data resolution indication; an availability indicator; a distribution cost indicator; and a storage indicator. 11. The DS module of claim 8, wherein the first module is operable to determine the access priority by:
identifying the user device as having a maintenance program for purchased multi-media content, wherein the multi-media content is an update to the purchased multi-media content. 12. The DS module of claim 8 further comprises:
the access priority including a pre-release access priority and a post-release access priority;
the second module is further operable to:
select the one of the plurality of pre-release data distribution protocols based on the pre-release access priority; and
select the one of the plurality of post-release data distribution protocols based on the post-release access priority. 13. The DS module of claim 8, wherein the plurality of pre-release data distribution protocols comprises two or more of:
a number of encoded data slices to include in the first pre-release sub-set; a time frame for sending the plurality of pre-release sub-sets to the user device; a network connection preference to the user device; and an assurance level of the user device receiving the plurality of pre-release sub-sets prior to the release of the multi-media content. 14. The DS module of claim 8, wherein the plurality of post-release data distribution protocols comprises two or more of:
a number of encoded data slices to include in the first post-release sub-set; a time frame for sending the plurality of post-release sub-sets to the user device; a network connection preference to the user device; and an assurance level of the user device receiving the plurality of post-release sub-sets in a given time frame subsequent to the release of the multi-media content. | 2,400 |
6,771 | 6,771 | 15,131,076 | 2,488 | A reference picture buffer may supply an asymmetric macroblock to a video encoder to improve the bandwidth between the encoder and buffer. The macroblock width may be sized to match the minimum burst width of the buffer. The size of the macroblock may be kept unchanged by reducing the macroblock height. | 1. A method comprising:
bursting only one macroblock per request from a video encoder to a buffer whose minimum burst length is greater than 16 bytes. 2. The method of claim 1 further comprising:
providing a macroblock of data from the buffer to the video encoder, said macroblock sized to match the minimum burst length of the buffer; and
only supplying from the buffer with data that can be fully utilized by the video encoder. 3. The method of claim 1 including providing a burst transfer of a 32 byte wide by eight row macroblock. 4. The method of claim 1 including using a DDR3 static dynamic random access memory as said buffer. 5. The method of claim 1 including providing an asymmetrically sized macroblock in response to a request from the video encoder to the buffer for reference picture data. 6. The method of claim 1 including storing a top field as one of even or odd rows in the buffer and storing a bottom field as the other of the even or odd rows. 7. The method of claim 2 including selectively reformatting a macroblock for picture-adaptive frame-field encoding or non-picture-adaptive frame-field encoding. 8. The method of claim 1 including using a macroblock whose width is at least equal to the number of bytes associated with the minimum burst length of the buffer. 9. An apparatus comprising:
a buffer whose minimum burst length is greater than 16 bytes; and an encoder coupled to said buffer to burst only one macroblock per request to the buffer. 10. The apparatus of claim 9 wherein said encoder provides a burst transfer of a 32 byte wide by 8 row macroblock. 11. The apparatus of claim 9, said buffer to provide a macroblock of data to said encoder, said macroblock size to match the minimum burst length of the buffer and said buffer to only supply data that can be fully utilized by the video encoder. 12. The apparatus of claim 9 wherein said buffer is a DDR3 static dynamic random access memory. 13. The apparatus of claim 9, said encoder to provide an asymmetrically sized macroblock in response to a request from the video encoder to the buffer for reference picture data. 14. The apparatus of claim 9, said buffer storing a top field as one of even or odd rows and storing a bottom field as the other of even or odd rows. 15. The apparatus of claim 11, said encoder to selectively reformat a macroblock of data for picture-adaptive frame-field encoding or non-picture-non-adaptive frame-field encoding. 16. A computer readable medium storing instructions executed by a video encoder to:
burst only one macroblock per request from the video encoder by a buffer whose minimum burst length is greater than 16 bytes. 17. The medium of claim 16 further storing instructions to provide a macroblock of data from the buffer to the video encoder, said macroblock size to match the minimum burst length of the buffer and only supplying from the buffer with data that can be fully utilized by the video encoder. 18. The medium of claim 16 further storing instructions to provide an asymmetrically sized macroblock in response to a request from the video encoder to the buffer for reference picture data. 19. The medium of claim 16 further storing instructions to store a top field as one of even or odd rows in a buffer and storing a bottom field as the other of even or odd rows. 20. The medium of claim 17 further storing instructions to selectively reformat a macroblock for picture-adaptive frame-field encoding or non-picture-adaptive frame-field encoding. | A reference picture buffer may supply an asymmetric macroblock to a video encoder to improve the bandwidth between the encoder and buffer. The macroblock width may be sized to match the minimum burst width of the buffer. The size of the macroblock may be kept unchanged by reducing the macroblock height.1. A method comprising:
bursting only one macroblock per request from a video encoder to a buffer whose minimum burst length is greater than 16 bytes. 2. The method of claim 1 further comprising:
providing a macroblock of data from the buffer to the video encoder, said macroblock sized to match the minimum burst length of the buffer; and
only supplying from the buffer with data that can be fully utilized by the video encoder. 3. The method of claim 1 including providing a burst transfer of a 32 byte wide by eight row macroblock. 4. The method of claim 1 including using a DDR3 static dynamic random access memory as said buffer. 5. The method of claim 1 including providing an asymmetrically sized macroblock in response to a request from the video encoder to the buffer for reference picture data. 6. The method of claim 1 including storing a top field as one of even or odd rows in the buffer and storing a bottom field as the other of the even or odd rows. 7. The method of claim 2 including selectively reformatting a macroblock for picture-adaptive frame-field encoding or non-picture-adaptive frame-field encoding. 8. The method of claim 1 including using a macroblock whose width is at least equal to the number of bytes associated with the minimum burst length of the buffer. 9. An apparatus comprising:
a buffer whose minimum burst length is greater than 16 bytes; and an encoder coupled to said buffer to burst only one macroblock per request to the buffer. 10. The apparatus of claim 9 wherein said encoder provides a burst transfer of a 32 byte wide by 8 row macroblock. 11. The apparatus of claim 9, said buffer to provide a macroblock of data to said encoder, said macroblock size to match the minimum burst length of the buffer and said buffer to only supply data that can be fully utilized by the video encoder. 12. The apparatus of claim 9 wherein said buffer is a DDR3 static dynamic random access memory. 13. The apparatus of claim 9, said encoder to provide an asymmetrically sized macroblock in response to a request from the video encoder to the buffer for reference picture data. 14. The apparatus of claim 9, said buffer storing a top field as one of even or odd rows and storing a bottom field as the other of even or odd rows. 15. The apparatus of claim 11, said encoder to selectively reformat a macroblock of data for picture-adaptive frame-field encoding or non-picture-non-adaptive frame-field encoding. 16. A computer readable medium storing instructions executed by a video encoder to:
burst only one macroblock per request from the video encoder by a buffer whose minimum burst length is greater than 16 bytes. 17. The medium of claim 16 further storing instructions to provide a macroblock of data from the buffer to the video encoder, said macroblock size to match the minimum burst length of the buffer and only supplying from the buffer with data that can be fully utilized by the video encoder. 18. The medium of claim 16 further storing instructions to provide an asymmetrically sized macroblock in response to a request from the video encoder to the buffer for reference picture data. 19. The medium of claim 16 further storing instructions to store a top field as one of even or odd rows in a buffer and storing a bottom field as the other of even or odd rows. 20. The medium of claim 17 further storing instructions to selectively reformat a macroblock for picture-adaptive frame-field encoding or non-picture-adaptive frame-field encoding. | 2,400 |
6,772 | 6,772 | 14,649,695 | 2,467 | The present invention relates a method for traffic steering in a communication network comprising at least two technology layers. The method comprising utilizing one or more policies for traffic steering, selecting one or more users in a first technology layer according to the selected policies and preparing a movement of one or more selected users to a second technology layer. Moreover, the present invention relates to an apparatus and computer program product. | 1. A method for traffic steering in a communication network comprising at least two technology layers, the method comprising:
utilizing one or more policies for traffic steering; selecting one or more users in a first technology layer according to the selected policies; and preparing a movement of one or more selected users to a second technology layer. 2. The method according to claim 1, wherein the policy is at least one policy of the group consisting of a subscription prioritization policy, an application mapping policy, a session characterization policy and a load distribution policy. 3. The method according to claim 1, further comprising
providing information of a user to elements in the network in order to prepare a steering of traffic. 4. The method according to claim 1, further comprising
providing a list comprising a plurality of users for traffic steering. 5. The method according to claim 1, wherein
utilizing scalable weighted merge of independently prepared user lists to prepare a final user list. 6. The method according to claim 1, further comprising
utilizing network load as a trigger to start and/or stop a user list generation. 7. The method according to claim 1, further comprising
performing the user list generation on periodic basis. 8. The method according to claim 1, further comprising
generating a list of users on a real-time, near real-time, online or offline basis. 9. The method according to claim 1, further comprising
utilizing policy thresholds in order to constrain the number of simultaneous traffic steering requests from various policies to avoid an oscillation of traffic. 10. The method according to claim 1, further comprising
applying a configurable scalable weight factor to emphasize different policies under different network conditions. 11. An apparatus, comprising:
one or more processors; and one or more memories including computer program code, the one or more memories and the computer program code configured, with the one or more processors, to cause the apparatus to perform: utilizing one or more policies for traffic steering; selecting one or more users in a first technology layer according to the selected policies; and preparing a movement of one or more selected users to a second technology layer. 12. The apparatus of claim 11, wherein the apparatus is a network element or a terminal. 13. The apparatus of claim 12, wherein the network element is a traffic steering element, a network node, a server or a policy server. 14. The apparatus of claim 12, wherein the terminal is a mobile phone or a tablet device. 15. The apparatus according to claim 11, wherein the apparatus is configured for receiving trigger information triggering a traffic steering mechanism. 16. A computer program product comprising a non-transitory computer-readable storage medium bearing computer program code embodied therein for use with an apparatus, the computer program code comprising:
code for utilizing one or more policies for traffic steering; code for selecting one or more users in a first technology layer according to the selected policies; and code for preparing a movement of one or more selected users to a second technology layer. | The present invention relates a method for traffic steering in a communication network comprising at least two technology layers. The method comprising utilizing one or more policies for traffic steering, selecting one or more users in a first technology layer according to the selected policies and preparing a movement of one or more selected users to a second technology layer. Moreover, the present invention relates to an apparatus and computer program product.1. A method for traffic steering in a communication network comprising at least two technology layers, the method comprising:
utilizing one or more policies for traffic steering; selecting one or more users in a first technology layer according to the selected policies; and preparing a movement of one or more selected users to a second technology layer. 2. The method according to claim 1, wherein the policy is at least one policy of the group consisting of a subscription prioritization policy, an application mapping policy, a session characterization policy and a load distribution policy. 3. The method according to claim 1, further comprising
providing information of a user to elements in the network in order to prepare a steering of traffic. 4. The method according to claim 1, further comprising
providing a list comprising a plurality of users for traffic steering. 5. The method according to claim 1, wherein
utilizing scalable weighted merge of independently prepared user lists to prepare a final user list. 6. The method according to claim 1, further comprising
utilizing network load as a trigger to start and/or stop a user list generation. 7. The method according to claim 1, further comprising
performing the user list generation on periodic basis. 8. The method according to claim 1, further comprising
generating a list of users on a real-time, near real-time, online or offline basis. 9. The method according to claim 1, further comprising
utilizing policy thresholds in order to constrain the number of simultaneous traffic steering requests from various policies to avoid an oscillation of traffic. 10. The method according to claim 1, further comprising
applying a configurable scalable weight factor to emphasize different policies under different network conditions. 11. An apparatus, comprising:
one or more processors; and one or more memories including computer program code, the one or more memories and the computer program code configured, with the one or more processors, to cause the apparatus to perform: utilizing one or more policies for traffic steering; selecting one or more users in a first technology layer according to the selected policies; and preparing a movement of one or more selected users to a second technology layer. 12. The apparatus of claim 11, wherein the apparatus is a network element or a terminal. 13. The apparatus of claim 12, wherein the network element is a traffic steering element, a network node, a server or a policy server. 14. The apparatus of claim 12, wherein the terminal is a mobile phone or a tablet device. 15. The apparatus according to claim 11, wherein the apparatus is configured for receiving trigger information triggering a traffic steering mechanism. 16. A computer program product comprising a non-transitory computer-readable storage medium bearing computer program code embodied therein for use with an apparatus, the computer program code comprising:
code for utilizing one or more policies for traffic steering; code for selecting one or more users in a first technology layer according to the selected policies; and code for preparing a movement of one or more selected users to a second technology layer. | 2,400 |
6,773 | 6,773 | 12,325,438 | 2,491 | A method, apparatus and computer program product for handling secure information (e.g., a password, an account number, a personal identification number (PIN), a user identifier, an encryption key, and a path where said secure information is stored) is presented. Secure information is stored in a software container. A plurality of representations of the secure information is provided, each of the plurality of representations for use under different conditions. Dependent on the particular condition, at least one of the plurality of representations of the secure information is provided by the container. The container holds the secure information during all stages of processing in a manner that prevents unauthorized parties from gaining access to the secret in clear form. | 1. A computer implemented method comprising: storing said secure information in process memory of a system, transmission of said secure information in a payload of a communications message, storing said secure information in persistent storage, showing said secure information a display, and storing said secure information in a data file. 2. The method of claim 1 wherein said plurality of representations comprise at least one of the group consisting of a clear text version of said secure information, an encrypted version of said secure information, and a character string representing said secure information wherein said secure information is not discernable from said character string. 3. The method of claim 1 wherein said different conditions comprise at least one of the group consisting of storing said secure information in process memory of a system, transmission of said secure information in a payload of a communications message, storing said secure information in persistent storage, showing said secure information a display, and storing said secure information in a data file. 4. The method of claim 1 wherein said secure information comprises at least one of the group consisting of a password, an account number, a personal identification number (PIN), a user identifier, an encryption key, and a path where said secure information is stored. 5. The method of claim 1 wherein said storing secure information comprises receiving said secure information in a clear text form by said container. 6. The method of claim 1 wherein said storing secure information, said providing a plurality of representations of said secure information, and said providing at least one of said plurality of representations of said secure information are performed by said container. 7. A computer readable medium having computer readable code thereon for handling secure information, the medium comprising:
instructions for storing secure information in a software container; instructions for providing a plurality of representations of said secure information with said container, each of said plurality of representations for use under different conditions; and instructions for providing at least one of said plurality of representations of said secure information from said container. 8. The computer readable medium of claim 7 further comprising instructions wherein said plurality of representations comprise at least one of the group consisting of a clear text version of said secure information, an encrypted version of said secure information and a character string representing said secure information wherein said secure information is not discernable from said character string. 9. The computer readable medium of claim 7 further comprising instructions wherein said different conditions comprise at least one of the group consisting of storing said secure information in process memory of a system, transmission of said secure information in a payload of a communications message, storing said secure information in persistent storage, showing said secure information a display, and storing said secure information in a data file. 10. The computer readable medium of claim 7 further comprising instructions wherein said secure information comprises at least one of the group consisting of a password, an account number, a personal identification number (PIN), a user identifier, an encryption key, and a path where said secure information is stored. 11. The computer readable medium of claim 7 further comprising instructions wherein said storing secure information comprises receiving said secure information by said container in a clear text form. 12. The computer readable medium of claim 7 further comprising instructions wherein said storing secure information, said providing a plurality of representations of said secure information, and said providing at least one of said plurality of representations of said secure information are performed by said container. 13. A computer system comprising:
a memory; a processor; a communications interface; an interconnection mechanism coupling the memory, the processor and the communications interface; and wherein the memory is encoded with an application handling secure information, that when performed on the processor, provides a process for processing information, the process causing the computer system to perform the operations of:
storing said secure information in process memory of a system, transmission of said secure information in a payload of a communications message, storing said secure information in persistent storage, showing said secure information a display, and storing said secure information in a data file. 14. The computer system of claim 13 wherein said plurality of representations comprise at least one of the group consisting of a clear text version of said secure information, an encrypted version of said secure information and a character string representing said secure information wherein said secure information is not discernable from said character string. 15. The computer system of claim 13 wherein said different conditions comprise at least one of the group consisting of storing said secure information in process memory of a system, transmission of said secure information in a payload of a communications message, storing said secure information in persistent storage, showing said secure information a display, and storing said secure information in a data file. 16. The computer system of claim 13 wherein said secure information comprises at least one of the group consisting of a password, an account number, a personal identification number (PIN), a user identifier, an encryption key, and a path where said secure information is stored. 17. The computer system of claim 13 wherein said secure information is received in a clear text form by said container. 18. The computer system of claim 13 wherein said storing secure information, said providing a plurality of representations of said secure information, and said providing at least one of said plurality of representations of said secure information are performed by said container. 19. The computer system of claim 13 wherein said secure information is provided as encrypted information by said container for use in at least one of the group consisting of a process memory of a system, a payload of a communications message, persistent storage and a data file. 20. The computer system of claim 13 wherein said secure information is provided as a character string representing said secure information by said container for use in at least one of the group consisting of a display and a data file. | A method, apparatus and computer program product for handling secure information (e.g., a password, an account number, a personal identification number (PIN), a user identifier, an encryption key, and a path where said secure information is stored) is presented. Secure information is stored in a software container. A plurality of representations of the secure information is provided, each of the plurality of representations for use under different conditions. Dependent on the particular condition, at least one of the plurality of representations of the secure information is provided by the container. The container holds the secure information during all stages of processing in a manner that prevents unauthorized parties from gaining access to the secret in clear form.1. A computer implemented method comprising: storing said secure information in process memory of a system, transmission of said secure information in a payload of a communications message, storing said secure information in persistent storage, showing said secure information a display, and storing said secure information in a data file. 2. The method of claim 1 wherein said plurality of representations comprise at least one of the group consisting of a clear text version of said secure information, an encrypted version of said secure information, and a character string representing said secure information wherein said secure information is not discernable from said character string. 3. The method of claim 1 wherein said different conditions comprise at least one of the group consisting of storing said secure information in process memory of a system, transmission of said secure information in a payload of a communications message, storing said secure information in persistent storage, showing said secure information a display, and storing said secure information in a data file. 4. The method of claim 1 wherein said secure information comprises at least one of the group consisting of a password, an account number, a personal identification number (PIN), a user identifier, an encryption key, and a path where said secure information is stored. 5. The method of claim 1 wherein said storing secure information comprises receiving said secure information in a clear text form by said container. 6. The method of claim 1 wherein said storing secure information, said providing a plurality of representations of said secure information, and said providing at least one of said plurality of representations of said secure information are performed by said container. 7. A computer readable medium having computer readable code thereon for handling secure information, the medium comprising:
instructions for storing secure information in a software container; instructions for providing a plurality of representations of said secure information with said container, each of said plurality of representations for use under different conditions; and instructions for providing at least one of said plurality of representations of said secure information from said container. 8. The computer readable medium of claim 7 further comprising instructions wherein said plurality of representations comprise at least one of the group consisting of a clear text version of said secure information, an encrypted version of said secure information and a character string representing said secure information wherein said secure information is not discernable from said character string. 9. The computer readable medium of claim 7 further comprising instructions wherein said different conditions comprise at least one of the group consisting of storing said secure information in process memory of a system, transmission of said secure information in a payload of a communications message, storing said secure information in persistent storage, showing said secure information a display, and storing said secure information in a data file. 10. The computer readable medium of claim 7 further comprising instructions wherein said secure information comprises at least one of the group consisting of a password, an account number, a personal identification number (PIN), a user identifier, an encryption key, and a path where said secure information is stored. 11. The computer readable medium of claim 7 further comprising instructions wherein said storing secure information comprises receiving said secure information by said container in a clear text form. 12. The computer readable medium of claim 7 further comprising instructions wherein said storing secure information, said providing a plurality of representations of said secure information, and said providing at least one of said plurality of representations of said secure information are performed by said container. 13. A computer system comprising:
a memory; a processor; a communications interface; an interconnection mechanism coupling the memory, the processor and the communications interface; and wherein the memory is encoded with an application handling secure information, that when performed on the processor, provides a process for processing information, the process causing the computer system to perform the operations of:
storing said secure information in process memory of a system, transmission of said secure information in a payload of a communications message, storing said secure information in persistent storage, showing said secure information a display, and storing said secure information in a data file. 14. The computer system of claim 13 wherein said plurality of representations comprise at least one of the group consisting of a clear text version of said secure information, an encrypted version of said secure information and a character string representing said secure information wherein said secure information is not discernable from said character string. 15. The computer system of claim 13 wherein said different conditions comprise at least one of the group consisting of storing said secure information in process memory of a system, transmission of said secure information in a payload of a communications message, storing said secure information in persistent storage, showing said secure information a display, and storing said secure information in a data file. 16. The computer system of claim 13 wherein said secure information comprises at least one of the group consisting of a password, an account number, a personal identification number (PIN), a user identifier, an encryption key, and a path where said secure information is stored. 17. The computer system of claim 13 wherein said secure information is received in a clear text form by said container. 18. The computer system of claim 13 wherein said storing secure information, said providing a plurality of representations of said secure information, and said providing at least one of said plurality of representations of said secure information are performed by said container. 19. The computer system of claim 13 wherein said secure information is provided as encrypted information by said container for use in at least one of the group consisting of a process memory of a system, a payload of a communications message, persistent storage and a data file. 20. The computer system of claim 13 wherein said secure information is provided as a character string representing said secure information by said container for use in at least one of the group consisting of a display and a data file. | 2,400 |
6,774 | 6,774 | 12,531,221 | 2,465 | A method for performing route optimization between two nodes in network based mobility management, wherein each of the two nodes is associated with an access network via attachment to an access router, the access routers having directly or indirectly assigned a Mobility Access Gateway (MAG) that signals the node's presence to a Mobility Anchor (MA) which maintains the current IP address information along with location information of the node, is characterized in that some specific control for setting up a route optimized path for data packet exchange between the two nodes is assigned to the Mobility Anchors (MA). | 1. Method for performing route optimization between two nodes in network based mobility management, wherein each of said two nodes is associated with an access network via attachment to an access router, said access routers having directly or indirectly assigned a Mobility Access Gateway (MAG) that signals the node's presence to a Mobility Anchor (MA) which maintains the current IP address information along with location information of said node,
Characterized in that some specific control for setting up a route optimized path for data packet exchange between said two nodes is assigned to said Mobility Anchors (MA). 2. Method according to claim 1, wherein one out of the involved Mobility Anchors (MA) is assigned as a dedicated route optimization controller. 3. Method according to claim 1, wherein one out of the involved Mobility Anchors (MA) or another node along the initial communication path between said two nodes is assigned as a route optimization detector. 4. Method according to claim 3, wherein said route optimization detector performs a check of the said two nodes' IP addresses to determine whether route optimization is possible. 5. Method according to claim 2, wherein for each pair of communicating nodes, said dedicated route optimization controller and/or said route optimization detector are selected during a setup phase. 6. Method according to claim 1, wherein said assignments are carried out statically. 7. Method according to claim 2, wherein said dedicated route optimization controller and/or said route optimization detector remain the same after once having been selected for a pair of communicating nodes. 8. Method according to claim 1, wherein said assignments are carried out dynamically. 9. Method according to claim 8, wherein for each pair of communicating nodes, said route optimization detector and/or said dedicated route optimization controller are reselected for an existing route optimization association between two nodes. 10. Method according to claim 3, wherein said route optimization detector triggers said dedicated route optimization controller to set up a route optimized communication path between said two nodes. 11. Method according to claim 10, wherein said dedicated route optimization controller, upon receipt of said trigger, instructs the receiving node's Mobility Access Gateway (MAG), to exchange information with the remote MAG for direct routing/addressing. 12. Method according to claim 1, wherein the signalling for route optimization setup is performed directly between said Mobility Access Gateways (MAG). 13. Method according to claim 1, wherein the signalling for route optimization setup is performed in a proxy modus with involvement of the Mobility Anchors (MA). 14. Method according to claim 1, wherein all signalling messages are acknowledged by means of an associated Ack message carrying a status code field. 15. Method according to claim 1, wherein a location update message generated in case of a node performing a handover from one access router—previous access router—to another access router—new access router—serves as indication to update associated route optimization states under control of the selected RO-controller. 16. Method according to claim 2, wherein one out of the involved Mobility Anchors (MA) or another node along the initial communication path between said two nodes is assigned as a route optimization detector. 17. Method according to claim 3, wherein for each pair of communicating nodes, said dedicated route optimization controller and/or said route optimization detector are selected during a setup phase. 18. Method according to claim 4, wherein for each pair of communicating nodes, said dedicated route optimization controller and/or said route optimization detector are selected during a setup phase. | A method for performing route optimization between two nodes in network based mobility management, wherein each of the two nodes is associated with an access network via attachment to an access router, the access routers having directly or indirectly assigned a Mobility Access Gateway (MAG) that signals the node's presence to a Mobility Anchor (MA) which maintains the current IP address information along with location information of the node, is characterized in that some specific control for setting up a route optimized path for data packet exchange between the two nodes is assigned to the Mobility Anchors (MA).1. Method for performing route optimization between two nodes in network based mobility management, wherein each of said two nodes is associated with an access network via attachment to an access router, said access routers having directly or indirectly assigned a Mobility Access Gateway (MAG) that signals the node's presence to a Mobility Anchor (MA) which maintains the current IP address information along with location information of said node,
Characterized in that some specific control for setting up a route optimized path for data packet exchange between said two nodes is assigned to said Mobility Anchors (MA). 2. Method according to claim 1, wherein one out of the involved Mobility Anchors (MA) is assigned as a dedicated route optimization controller. 3. Method according to claim 1, wherein one out of the involved Mobility Anchors (MA) or another node along the initial communication path between said two nodes is assigned as a route optimization detector. 4. Method according to claim 3, wherein said route optimization detector performs a check of the said two nodes' IP addresses to determine whether route optimization is possible. 5. Method according to claim 2, wherein for each pair of communicating nodes, said dedicated route optimization controller and/or said route optimization detector are selected during a setup phase. 6. Method according to claim 1, wherein said assignments are carried out statically. 7. Method according to claim 2, wherein said dedicated route optimization controller and/or said route optimization detector remain the same after once having been selected for a pair of communicating nodes. 8. Method according to claim 1, wherein said assignments are carried out dynamically. 9. Method according to claim 8, wherein for each pair of communicating nodes, said route optimization detector and/or said dedicated route optimization controller are reselected for an existing route optimization association between two nodes. 10. Method according to claim 3, wherein said route optimization detector triggers said dedicated route optimization controller to set up a route optimized communication path between said two nodes. 11. Method according to claim 10, wherein said dedicated route optimization controller, upon receipt of said trigger, instructs the receiving node's Mobility Access Gateway (MAG), to exchange information with the remote MAG for direct routing/addressing. 12. Method according to claim 1, wherein the signalling for route optimization setup is performed directly between said Mobility Access Gateways (MAG). 13. Method according to claim 1, wherein the signalling for route optimization setup is performed in a proxy modus with involvement of the Mobility Anchors (MA). 14. Method according to claim 1, wherein all signalling messages are acknowledged by means of an associated Ack message carrying a status code field. 15. Method according to claim 1, wherein a location update message generated in case of a node performing a handover from one access router—previous access router—to another access router—new access router—serves as indication to update associated route optimization states under control of the selected RO-controller. 16. Method according to claim 2, wherein one out of the involved Mobility Anchors (MA) or another node along the initial communication path between said two nodes is assigned as a route optimization detector. 17. Method according to claim 3, wherein for each pair of communicating nodes, said dedicated route optimization controller and/or said route optimization detector are selected during a setup phase. 18. Method according to claim 4, wherein for each pair of communicating nodes, said dedicated route optimization controller and/or said route optimization detector are selected during a setup phase. | 2,400 |
6,775 | 6,775 | 14,609,675 | 2,424 | Viewer demographics such as age and sex, as well as viewer emotion based on facial recognition, are sensed by a device and content automatically modified accordingly. In this way, the content essentially reacts to the types and emotions of the viewers as they watch the content. | 1. A device comprising:
at least one computer readable storage medium having instructions executable by a processor; at least one processor configured for accessing the computer readable storage medium to execute the instructions to configure the processor for: receiving an image of a person viewing a display on which content is being presented; executing image recognition on the image to establish at least first and second parameters of the person; the first parameter including a demographic parameter correlated with a less graphic degree of content, the second parameter including a facial expression and/or gesture correlated with a more graphic degree of content, the first parameter taking precedence over the second parameter; responsive to the first and second parameters, presenting the less graphic degree of content. 2. The device of claim 1, wherein the first parameter includes age. 3. The device of claim 1, wherein the first parameter includes sex. 4. The device of claim 1, wherein the second parameter includes emotion. 5. The device of claim 1, wherein the instructions are executable for substituting a less sexually and/or violently and/or or profanely graphic version of a scene of the content for a more sexually and/or violently and/or profanely graphic version of the scene. 6. The device of claim 1, wherein the instructions are executable for substituting a more sexually and/or violently and/or or profanely graphic version of a scene of the content for a less sexually and/or violently and/or profanely graphic version of the scene. 7. The device of claim 1, wherein playback of the content playback is executed using JavaScript execution and audio video decoding, and the instructions are executable for providing the image to a JavaScript executable. 8. (canceled) 9. A device comprising:
at least one computer storage that is not a transitory signal and that comprises instructions executable by at least one processor for; receiving at least one image of at least one viewer of a display presenting content; executing image recognition on the at least one image; responsive to a determination the at least one image correlates to a first breathing threshold, automatically altering the content being presented on the display. 10. The device of claim 9, wherein the automatically altering includes substituting a less sexually and/or violently and/or or profanely graphic version of a scene of the content for a more sexually and/or violently and/or profanely graphic version of the scene. 11. The device of claim 9, wherein the automatically altering includes substituting a more sexually and/or violently and/or or profanely graphic version of a scene of the content for a less sexually and/or violently and/or profanely graphic version of the scene. 12. The device of claim 9, wherein the instructions are executable for:
presenting on a display a more indicator and a less indicator respectively selectable to establish user input for a more sexually and/or violently and/or profanely graphic version of the scene and a less sexually and/or violently and/or profanely graphic version of the scene; and presenting on the display an indication that alternate content is available for upcoming scenes in the content. 13. The device of claim 9, comprising the at least one processor. 14. The device of claim 12, wherein the indication indicates an alternate level of profanity is available for at least a portion of the content. 15. The device of claim 12, wherein the indication indicates an alternate level of sexual graphic is available for at least a portion of the content. 16. The device of claim 12, wherein the indication indicates an alternate level of violence graphic is available for at least a portion of the content. 17. The device of claim 21, wherein the indication indicates an alternate level of profanity is available for at least a portion of the content. 18. The device of claim 21, wherein the indication indicates an alternate level of sexual graphic is available for at least a portion of the content. 19. The device of claim 21, wherein the indication indicates an alternate level of violence graphic is available for at least a portion of the content. 20. Method comprising:
presenting video content on a display; receiving at least one image of at least one viewer of a display presenting video content; executing image recognition on the at least one image; responsive to a determination that the at least one image correlates to speaking automatically altering the video content being presented on the display. 21. The device of claim 1, wherein the instructions are executable for:
presenting on the display an indication that alternate content is available for upcoming scenes in the content. | Viewer demographics such as age and sex, as well as viewer emotion based on facial recognition, are sensed by a device and content automatically modified accordingly. In this way, the content essentially reacts to the types and emotions of the viewers as they watch the content.1. A device comprising:
at least one computer readable storage medium having instructions executable by a processor; at least one processor configured for accessing the computer readable storage medium to execute the instructions to configure the processor for: receiving an image of a person viewing a display on which content is being presented; executing image recognition on the image to establish at least first and second parameters of the person; the first parameter including a demographic parameter correlated with a less graphic degree of content, the second parameter including a facial expression and/or gesture correlated with a more graphic degree of content, the first parameter taking precedence over the second parameter; responsive to the first and second parameters, presenting the less graphic degree of content. 2. The device of claim 1, wherein the first parameter includes age. 3. The device of claim 1, wherein the first parameter includes sex. 4. The device of claim 1, wherein the second parameter includes emotion. 5. The device of claim 1, wherein the instructions are executable for substituting a less sexually and/or violently and/or or profanely graphic version of a scene of the content for a more sexually and/or violently and/or profanely graphic version of the scene. 6. The device of claim 1, wherein the instructions are executable for substituting a more sexually and/or violently and/or or profanely graphic version of a scene of the content for a less sexually and/or violently and/or profanely graphic version of the scene. 7. The device of claim 1, wherein playback of the content playback is executed using JavaScript execution and audio video decoding, and the instructions are executable for providing the image to a JavaScript executable. 8. (canceled) 9. A device comprising:
at least one computer storage that is not a transitory signal and that comprises instructions executable by at least one processor for; receiving at least one image of at least one viewer of a display presenting content; executing image recognition on the at least one image; responsive to a determination the at least one image correlates to a first breathing threshold, automatically altering the content being presented on the display. 10. The device of claim 9, wherein the automatically altering includes substituting a less sexually and/or violently and/or or profanely graphic version of a scene of the content for a more sexually and/or violently and/or profanely graphic version of the scene. 11. The device of claim 9, wherein the automatically altering includes substituting a more sexually and/or violently and/or or profanely graphic version of a scene of the content for a less sexually and/or violently and/or profanely graphic version of the scene. 12. The device of claim 9, wherein the instructions are executable for:
presenting on a display a more indicator and a less indicator respectively selectable to establish user input for a more sexually and/or violently and/or profanely graphic version of the scene and a less sexually and/or violently and/or profanely graphic version of the scene; and presenting on the display an indication that alternate content is available for upcoming scenes in the content. 13. The device of claim 9, comprising the at least one processor. 14. The device of claim 12, wherein the indication indicates an alternate level of profanity is available for at least a portion of the content. 15. The device of claim 12, wherein the indication indicates an alternate level of sexual graphic is available for at least a portion of the content. 16. The device of claim 12, wherein the indication indicates an alternate level of violence graphic is available for at least a portion of the content. 17. The device of claim 21, wherein the indication indicates an alternate level of profanity is available for at least a portion of the content. 18. The device of claim 21, wherein the indication indicates an alternate level of sexual graphic is available for at least a portion of the content. 19. The device of claim 21, wherein the indication indicates an alternate level of violence graphic is available for at least a portion of the content. 20. Method comprising:
presenting video content on a display; receiving at least one image of at least one viewer of a display presenting video content; executing image recognition on the at least one image; responsive to a determination that the at least one image correlates to speaking automatically altering the video content being presented on the display. 21. The device of claim 1, wherein the instructions are executable for:
presenting on the display an indication that alternate content is available for upcoming scenes in the content. | 2,400 |
6,776 | 6,776 | 14,818,776 | 2,422 | An apparatus and a method for transmitting multimedia data in a hybrid network are provided. The apparatus includes a payload part including at least one of first data synchronized according to a time to be reproduced and second data other than the first data, a first header part including information on the payload part, a packet part for generating a packet, the packet part including a second header part including information on the packet, and a transceiver for generating and transmitting a signal including the payload part, the first header part, and the packet part to the hybrid network. | 1. A method for receiving media data in a multimedia system, the method comprising:
receiving, from the a transmitting entity, at least one multimedia data packet including a packet header and a payload based on a multimedia transmitting unit, wherein the at least one multimedia data packet includes:
type information including a value indicating whether data included in the payload is a data unit of a complete type,
an indicator used to distinguish the media data from another, and
a flag indicating whether aggregated data units are included in the payload. 2. The method of claim 1, wherein, if the value indicates that the data unit is not complete, the value further identifies a position for the incomplete portion of the data unit. | An apparatus and a method for transmitting multimedia data in a hybrid network are provided. The apparatus includes a payload part including at least one of first data synchronized according to a time to be reproduced and second data other than the first data, a first header part including information on the payload part, a packet part for generating a packet, the packet part including a second header part including information on the packet, and a transceiver for generating and transmitting a signal including the payload part, the first header part, and the packet part to the hybrid network.1. A method for receiving media data in a multimedia system, the method comprising:
receiving, from the a transmitting entity, at least one multimedia data packet including a packet header and a payload based on a multimedia transmitting unit, wherein the at least one multimedia data packet includes:
type information including a value indicating whether data included in the payload is a data unit of a complete type,
an indicator used to distinguish the media data from another, and
a flag indicating whether aggregated data units are included in the payload. 2. The method of claim 1, wherein, if the value indicates that the data unit is not complete, the value further identifies a position for the incomplete portion of the data unit. | 2,400 |
6,777 | 6,777 | 12,882,431 | 2,445 | A method of exchanging secret session keys in symmetric encryption communication includes storing random number tables in both the sending and receiving devices. The sending device then determines the secret session key utilizing the random number table, and transmits to the receiving device information for locating the secret session key within the random number table. Thus, the sending device shares the secret session key with the receiving device without actually transmitting the secret session key. The random number tables may be transmitted from one device to the other or be preinstalled in each device. Further, a common seed value may be used by each device to generate the random number table independently. | 1. A method of creating and exchanging secret session keys for symmetric secret key encryption between a sending device and a receiving device without transmitting the actual secret session keys between the sending and receiving devices, the method comprising:
providing the receiving device with a unique device number, a unique user keycode number, and a symmetric secret key encryption algorithm; providing the sending device with the symmetric secret key encryption algorithm, a seed value and a non-system randomizer to generate a predetermined number of pseudo-random bit data based on the seed value, the pseudo-random bit data being arranged into a random number table stored in an electronic memory of the sending device; transmitting from the receiving device to the sending device through secured communication both the unique device number and the unique user keycode number; assigning, at the sending device, the random number table to the unique device number and unique user keycode number, the assignment being stored in a secret index in the electronic memory of the sending device; selecting, at the sending device, a secret session key as a subset of the pseudo-random bit data in the random number table; assigning, at the sending device, a start pointer corresponding to a start point of the subset of pseudo-random bit data and an end pointer corresponding to an end point of the subset of pseudo-random bit data; determining selected properties identifying length and location of the subset of pseudo-random bit data in the random number table, the subset of pseudo-random bit data being the secret session key; storing the selected properties and the start and end pointers of the secret session key in a secret session key properties descriptor buffer of the sending device; copying into a secret session key buffer at the sending device the secret session key corresponding to the selected properties of the secret session key from within the predetermined number of pseudo-random bit data in the random number table stored at the sending device index, by utilizing the start and end pointers to locate the secret session key; transforming the contents of the secret session key properties descriptor buffer into mangled secret session key properties; storing the data to be transmitted to the receiving device in an input/output buffer of the sending device; encrypting, at the sending device, the data in the input/output buffer using the symmetric key encryption algorithm and the secret session key stored in the secret session key buffer to generate an encrypted content; appending, at the sending device, the unique device number and the mangled secret session key properties as a header of the encrypted content; creating a connection between the sending device and the receiving device; transmitting the encrypted content with the appended header from the sending device to the receiving device; verifying, at the receiving device, the unique device number in the header of the encrypted content with the unique device number stored in the receiving device to determine whether the receiving device is authorized to decrypt the encrypted content; extracting, at the receiving device, the mangled secret session key properties when the receiving device is authorized to decrypt the encrypted content, the mangled session key properties being stored in a copied mangled secret session key properties descriptor buffer of the receiving device; restoring the contents of the copied mangled secret session key properties descriptor buffer, the restored secret session key properties corresponding to the secret session key properties at the sending device, the restored session key properties including the selected properties, the start pointer and the end pointer of the secret session key; utilizing, at the receiving device, at least a subset of the selected properties, the starting pointer and the end pointer to extract the secret session key from a predetermined number of pseudo-random bit data previously stored in the receiving device, the predetermined number of pseudo-random bit data stored in the receiving device corresponding to the predetermined number of pseudo-random bit data stored in the sending device, the extracted secret session key being a duplicate of the secret session key stored in the sending device; decrypting the encrypted content at the receiving device using the symmetric key encryption algorithm and the extracted secret session key when the receiving device is authorized to decrypt the encrypted content, the decrypted content being stored in an input/output buffer of the receiving device; and securely using, reading or playing the contents of the input/output buffer of the receiving device, the secret session key having been successfully created and exchanged between the sending and receiving devices without exchanging or transmitting the actual secret session keys therebetween, the secure communication between the sending and receiving devices of encrypted content being maintained until termination of the communication is initiated by at least one of the sending and receiving devices. 2. The method according to claim 1, further comprising:
prior to transmitting the encrypted content, transmitting from the sending device to the receiving device through secured communication the predetermined number of pseudo-random bit data in the random number table to the receiving device having the unique device number and unique user keycode number corresponding to the random number table; and securely storing in an electronic memory of the receiving device, the predetermined number of pseudo-random bit data received from the sending device, the predetermined number of pseudo-random bit data being stored in association with the device number and the user keycode. 3. The method according to claim 1, further comprising:
providing the receiving device with non-system randomizer software identical to the non-system randomizer software used by the sending device to generate the predetermined number of pseudo-random bit data included in the random number table; prior to transmission of the encrypted content, transmitting from the sending device to the receiving device, the seed value via secure communication, the seed value corresponding to the pseudo-random bit data in the random number table associated with the unique device number and unique user keycode number of the receiving device; generating a predetermined number of pseudo-random bit data at the receiving device using the non-system randomizer software and seed value; and securely storing in an electronic memory of the receiving device, the predetermined number of pseudo-random bit data generated based on the seed value as a random number table associated with the unique device number and the unique user keycode number. 4. The method according to claim 1, further comprising:
providing the receiving device with a plurality of unique secret user keycode numbers assigned thereto; securely transmitting, from the receiving device to the sending device, the unique device number and one of the plurality of unique user keycode numbers not assigned to a random number table stored at the receiving device; associating, in the secret index of the sending device, the random number table to the unique device number and the one of the plurality of unique user keycode numbers received from the receiving device; prior to transmitting the encrypted content, transmitting from the sending device to the receiving device through secured communication the predetermined number of pseudo-random bit data in the random number table to the receiving device having the unique device number and the one of the plurality of unique user keycode numbers corresponding to the random number table; and securely storing in an electronic memory of the receiving device, the predetermined number of pseudo-random bit data received from the sending device, the predetermined number of pseudo-random bit data being stored in association with the device number and the one of the plurality of unique user keycode numbers. 5. The method according to claim 1, wherein the secret session key is selected as a subset of the predetermined number of pseudo-random bit data of the random number data by identifying the start pointer and the end pointer corresponding to the secret session key using a predetermined algorithm. 6. The method according to claim 1, wherein the secret session key is randomly selected as a subset of the predetermined number of pseudo-random bit data of the random number data by identifying the start pointer and the end pointer corresponding to the secret session key using a random method. 7. The method according to claim 1, wherein transforming the contents of the secret session key properties descriptor buffer in the sending device includes performing an exclusive-or operation between the contents of the secret session key properties descriptor buffer and the unique user keycode number corresponding to the receiving device, and
restoring the contents of the copied mangled secret session key properties descriptor buffer includes performing an exclusive-or operation between the contents of the copied mangled secret session key properties descriptor buffer and the unique user keycode number. 8. The method according to claim 1, wherein transforming the contents of the secret session key properties descriptor buffer includes encrypting the contents of the secret session key properties descriptor buffer using symmetric secret key encryption and the unique user keycode number, and
restoring the contents of the copied mangled secret session key properties descriptor buffer includes decrypting with the symmetric secret key encryption and the unique user keycode number. 9. The method of claim 1, wherein the data to be transmitted by the sending device is streaming data, and each block of the streaming data is stored in the input/output buffer upon transmission of the previously stored block of the streaming data to the receiving device. 10. The method according to claim 9, wherein transforming the contents of the secret session key properties descriptor buffer includes encrypting the contents of the secret session key properties descriptor buffer using symmetric secret key encryption and the unique user keycode number, and
restoring the contents of the copied mangled secret session key properties descriptor buffer includes decrypting with the symmetric secret key encryption and the unique user keycode number. 11. A method of creating and exchanging secret session keys used in symmetric secret key encryption between a sending device and a receiving device engaged in two way communication, the secret session key being exchanged without transmitting the actual secret session key between the sending and receiving devices, the method comprising:
providing the receiving device with a unique device number, a unique user keycode number assigned thereto, and a symmetric secret key encryption algorithm; providing the sending device with a unique device number, a unique user keycode assigned thereto, a seed value, the symmetric secret key encryption algorithm, and a non-system randomizer software; transmitting, from the receiving device to the sending device, the unique device number and unique user keycode corresponding to the receiving device; transmitting, from the sending device to the receiving device, the unique device number and unique user keycode corresponding to the sending device; generating, at the sending device, a predetermined number of pseudo-random bit data using the seed value, the predetermined number of pseudo-random bit data forming a random number table; assigning, in a secret index stored in an electronic memory of the sending device, the random number table to unique device number and the unique user keycode number corresponding to the receiving device; securely storing in the electronic memory of the receiving device, the unique device number and the unique user keycode number corresponding to the sending device; selecting, at the sending device, a secret session key as a subset of the pseudo-random bit data in the random number table corresponding to the unique device number and unique user keycode number of the receiving device; selecting, at the sending device, a start pointer and an end pointer corresponding to the subset of the pseudo-random bit data, the start and end pointers defining selected properties of the secret session key including a length and random number table location thereof; storing the selected properties of the secret session key, the start pointer and the end pointer into a secret session key properties descriptor buffer of the sending device; copying the secret session key into a secret session key buffer of the sending device using the start and end pointers to locate the secret session key within the random number table, the secret session key corresponding to the selected properties of the secret session key; encoding, at the sending device, the contents of the secret session key properties descriptor buffer into mangled secret session key properties; storing in an input/output buffer of the sending device, data to be encrypted and transmitted to the receiving device; encrypting, at the sending device, the data in the input/output buffer using the symmetric key encryption algorithm and the secret session key stored in the secret session key buffer to generate an encrypted content; appending, at the sending device, the unique device number and mangled secret session key properties as a header of the encrypted content; creating a connection between the sending device and the receiving device; transmitting the encrypted content with the appended header from the sending device to the receiving device; verifying, at the receiving device, the unique device number in the header of the encrypted content with the unique device number stored in the receiving device to determine whether the receiving device is authorized to decrypt the encrypted content; extracting, at the receiving device, the mangled secret session key properties when receiving device is authorized to decrypt the encrypted content, the mangled session key properties being stored in a copied mangled secret session key properties descriptor buffer of the receiving device; restoring the contents of the copied mangled secret session key properties descriptor buffer, the restored secret session key properties corresponding to the secret session key properties at the sending device, the restored session key properties including the selected properties, the start pointer and the end pointer of the secret session key; utilizing, at the receiving device, at least a subset of the selected properties, the starting pointer and the end pointer to extract the secret session key from a predetermined number of pseudo-random bit data previously stored in the receiving device, the predetermined number of pseudo-random bit data stored in the receiving device corresponding to the predetermined number of pseudo-random bit data stored in the sending device, the extracted secret session key being a duplicate of the secret session key stored in the sending device; decrypting the encrypted content at the receiving device using the symmetric key encryption algorithm and the extracted secret session key when receiving device is authorized to decrypt the encrypted content, the decrypted content being stored in an input/output buffer of the receiving device; securely using, reading or playing the contents of the input/output buffer of the receiving device, the secret session key having been successfully created and exchanged between the sending and receiving devices without exchanging or transmitting the actual secret session keys therebetween; determining, at the receiving device, whether additional communication with the sending device is required based on the contents of the input/output buffer; encoding, at the receiving device, restored secret session key properties into mangled secret session key properties, and storing the mangled secret session key properties into a mangled secret session key properties descriptor buffer; storing data to be encrypted and transmitted from the receiving device to the sending device in an input/output buffer of the receiving device; encrypting, at the receiving device, the data in the input/output buffer using the symmetric key encryption algorithm and the secret session key to generate an encrypted content; appending, at the receiving device, the unique device number of the sending device and the contents of the mangled secret session key properties descriptor buffer as a header of the encrypted content; creating a connection between the receiving device and the sending device; transmitting the encrypted content with the appended header from the receiving device to the sending device; verifying, at the sending device, the unique device number in the header of the encrypted content with the unique device number stored in the sending device to determine whether the sending device is authorized to decrypt the encrypted content; extracting, at the sending device, the mangled secret session key properties when the sending device is authorized to decrypt the encrypted content, the mangled session key properties being stored in a copied mangled secret session key properties descriptor buffer of the sending device; restoring the contents of the copied mangled secret session key properties descriptor buffer, the restored secret session key properties corresponding to the secret session key properties at the receiving device, the restored secret session key properties including the selected properties, the start pointer and the end pointer of the secret session key; utilizing, at the sending device, at least a subset of the selected properties, the starting pointer and the end pointer to extract the secret session key from a predetermined number of pseudo-random bit data previously stored in the sending device, the predetermined number of pseudo-random bit data stored in the sending device corresponding to the predetermined number of pseudo-random bit data stored in the receiving device, the extracted secret session key being a duplicate of the session key stored in the receiving device; decrypting the encrypted content at the sending device using the symmetric key encryption algorithm and the extracted secret session key when the sending device is authorized to decrypt the encrypted content, the decrypted content being stored in an input/output buffer of the sending device; securely using, reading or playing the contents of the input/output buffer of the receiving device, the secret session key having been successfully created and exchanged between the sending and receiving devices without exchanging or transmitting the actual secret session keys therebetween; repeating all steps above until at least one of the sending device and the receiving device ends communication therebetween. 12. The method according to claim 11, further comprising:
prior to transmitting the encrypted content from the sending device to the receiving device, transmitting from the sending device to the receiving device through secured communication the predetermined number of pseudo-random bit data in the random number table to the receiving device having the unique device number and unique user keycode number corresponding to the random number table; and securely storing in an electronic memory of the receiving device, the predetermined number of pseudo-random bit data received from the sending device, the predetermined number of pseudo-random bit data being stored in association with the device number and the user keycode. 13. The method according to claim 11, further comprising:
providing the receiving device with non-system randomizer software identical to the non-system randomizer software used by the sending device to generate the predetermined number of pseudo-random bit data included in the random number table; prior to transmission of the encrypted content, transmitting from the sending device to the receiving device, the seed value via secure communication, the seed value corresponding to the pseudo-random bit data in the random number table associated with the unique device number and unique user keycode number of the receiving device; generating a predetermined number of pseudo-random bit data at the receiving device using the non-system randomizer software and seed value; and securely storing in an electronic memory of the receiving device, the predetermined number of pseudo-random bit data generated based on the seed value as a random number table associated with the unique device number and the unique user keycode number, wherein the seed value is used to transmit encrypted contents from the sending device to the receiving device and to transmit encrypted contents from the receiving device to the sending device. 14. The method according to claim 11, further comprising:
providing the receiving device with a plurality of unique secret user keycode numbers assigned thereto; securely transmitting, from the receiving device to the sending device, the unique device number and one of the plurality of unique user keycode numbers not assigned to a random number table stored at the receiving device; associating, in the secret index of the sending device, the random number table to the unique device number and the one of the plurality of unique user keycode numbers received from the receiving device; prior to transmitting the encrypted content, transmitting from the sending device to the receiving device through secured communication the predetermined number of pseudo-random bit data in the random number table to the receiving device having the unique device number and the one of the plurality of unique user keycode numbers corresponding to the random number table; and securely storing in an electronic memory of the receiving device, the predetermined number of pseudo-random bit data received from the sending device, the predetermined number of pseudo-random bit data being stored in association with the device number and the one of the plurality of unique user keycode numbers. 15. The method according to claim 11, wherein the secret session key is selected as a subset of the predetermined number of pseudo-random bit data of the random number data by identifying the start pointer and the end pointer corresponding to the secret session key using a predetermined algorithm. 16. The method according to claim 11, wherein the secret session key is randomly selected as a subset of the predetermined number of pseudo-random bit data of the random number data by identifying the start pointer and the end pointer corresponding to the secret session key using a random method. 17. The method according to claim 11, wherein transforming the contents of the secret session key properties descriptor buffer in the sending device includes performing an exclusive-or operation between the contents of the secret session key properties descriptor buffer and the unique user keycode number corresponding to the receiving device,
restoring the contents of the copied mangled secret session key properties descriptor buffer of the receiving device includes performing an exclusive-or operation between the contents of the copied mangled secret session key properties descriptor buffer and the unique user keycode number of the receiving device, transforming the contents of the secret session key properties descriptor buffer in the receiving device includes performing an exclusive-or operation between the contents of the secret session key properties descriptor buffer and the unique user keycode number corresponding to the sending device, and restoring the contents of the copied mangled secret session key properties descriptor buffer of the sending device includes performing an exclusive-or operation between the contents of the copied mangled secret session key properties descriptor buffer and the unique user keycode number of the sending device. 18. The method according to claim 11, wherein transforming the contents of the secret session key properties descriptor buffer in the sending device includes encrypting the contents of the secret session key properties descriptor buffer using symmetric secret key encryption and the unique user keycode number of the receiving device,
restoring the contents of the copied mangled secret session key properties descriptor buffer of the receiving device includes decrypting with the symmetric secret key encryption and the unique user keycode number of the receiving device, transforming the contents of the secret session key properties descriptor buffer in the receiving device includes encrypting the contents of the secret session key properties descriptor buffer using symmetric secret key encryption and the unique user keycode number of the sending device, and restoring the contents of the copied mangled secret session key properties descriptor buffer of the sending device includes decrypting with the symmetric secret key encryption and the unique user keycode number of the sending device. 19. The method according to claim 11, wherein the data to be transmitted by the sending device is streaming data and each block of the streaming data is stored in the input/output buffer upon transmission of the previously stored block of the streaming data to the receiving device, and
the data to be transmitted by the receiving device is streaming data and each block of the streaming data is stored in the input/output buffer upon transmission of the previously stored block of the streaming data to the sending device. 20. The method according to claim 19, wherein transforming the contents of the secret session key properties descriptor buffer in the sending device includes encrypting the contents of the secret session key properties descriptor buffer using symmetric secret key encryption and the unique user keycode number of the receiving device,
restoring the contents of the copied mangled secret session key properties descriptor buffer of the receiving device includes decrypting with the symmetric secret key encryption and the unique user keycode number of the receiving device, transforming the contents of the secret session key properties descriptor buffer in the receiving device includes encrypting the contents of the secret session key properties descriptor buffer using symmetric secret key encryption and the unique user keycode number of the sending device, and restoring the contents of the copied mangled secret session key properties descriptor buffer of the sending device includes decrypting with the symmetric secret key encryption and the unique user keycode number of the sending device. 21. A computer-readable medium storing computer-readable instructions thereon, the computer-readable instructions, when executed by a processor cause the processor to perform a method comprising:
providing a receiving device with a unique device number, a unique user keycode number, and a symmetric secret key encryption algorithm; providing a sending device with a symmetric secret key encryption algorithm, a seed value and a non-system randomizer to generate a predetermined number of pseudo-random bit data based on the seed value, the pseudo-random bit data being arranged into a random number table stored in an electronic memory of the sending device; transmitting from the receiving device to the sending device through secured communication both the unique device number and the unique user keycode number; assigning, at the sending device, the random number table to the unique device number and unique user keycode number, the assignment being stored in a secret index in the electronic memory of the sending device; selecting, at the sending device, a secret session key as a subset of the pseudo-random bit data in the random number table; assigning, at the sending device, a start pointer corresponding to a start point of the subset of pseudo-random bit data and an end pointer corresponding to an end point of the subset of pseudo-random bit data; determining selected properties identifying length and location of the subset of pseudo-random bit data in the random number table, the subset of pseudo-random bit data being the secret session key; storing the selected properties and the start and end pointers of the secret session key in a secret session key properties descriptor buffer of the sending device; copying into a secret session key buffer at the sending device the secret session key corresponding to the selected properties of the secret session key from within the predetermined number of pseudo-random bit data in the random number table stored at the sending device index, by utilizing the start and end pointers to locate the secret session key; transforming the contents of the secret session key properties descriptor buffer into mangled secret session key properties; storing the data to be transmitted to the receiving device in an input/output buffer of the sending device; encrypting, at the sending device, the data in the input/output buffer using the symmetric key encryption algorithm and the secret session key stored in the secret session key buffer to generate an encrypted content; appending, at the sending device, the unique device number and the mangled secret session key properties as a header of the encrypted content; creating a connection between the sending device and the receiving device; transmitting the encrypted content with the appended header from the sending device to the receiving device; verifying, at the receiving device, the unique device number in the header of the encrypted content with the unique device number stored in the receiving device to determine whether the receiving device is authorized to decrypt the encrypted content; extracting, at the receiving device, the mangled secret session key properties when the receiving device is authorized to decrypt the encrypted content, the mangled session key properties being stored in a copied mangled secret session key properties descriptor buffer of the receiving device; restoring the contents of the copied mangled secret session key properties descriptor buffer, the restored secret session key properties corresponding to the secret session key properties at the sending device, the restored session key properties including the selected properties, the start pointer and the end pointer of the secret session key; utilizing, at the receiving device, at least a subset of the selected properties, the starting pointer and the end pointer to extract the secret session key from a predetermined number of pseudo-random bit data previously stored in the receiving device, the predetermined number of pseudo-random bit data stored in the receiving device corresponding to the predetermined number of pseudo-random bit data stored in the sending device, the extracted secret session key being a duplicate of the secret session key stored in the sending device; decrypting the encrypted content at the receiving device using the symmetric key encryption algorithm and the extracted secret session key when the receiving device is authorized to decrypt the encrypted content, the decrypted content being stored in an input/output buffer of the receiving device; and securely using, reading or playing the contents of the input/output buffer of the receiving device, the secret session key having been successfully created and exchanged between the sending and receiving devices without exchanging or transmitting the actual secret session keys therebetween, the secure communication between the sending and receiving devices of encrypted content being maintained until termination of the communication is initiated by at least one of the sending and receiving devices. 22. The computer-readable medium according to claim 21, further comprising:
prior to transmitting the encrypted content, transmitting from the sending device to the receiving device through secured communication the predetermined number of pseudo-random bit data in the random number table to the receiving device having the unique device number and unique user keycode number corresponding to the random number table; and securely storing in an electronic memory of the receiving device, the predetermined number of pseudo-random bit data received from the sending device, the predetermined number of pseudo-random bit data being stored in association with the device number and the user keycode. 23. The computer-readable medium according to claim 21, further comprising:
providing the receiving device with non-system randomizer software identical to the non-system randomizer software used by the sending device to generate the predetermined number of pseudo-random bit data included in the random number table; prior to transmission of the encrypted content, transmitting from the sending device to the receiving device, the seed value via secure communication, the seed value corresponding to the pseudo-random bit data in the random number table associated with the unique device number and unique user keycode number of the receiving device; generating a predetermined number of pseudo-random bit data at the receiving device using the non-system randomizer software and seed value; and securely storing in an electronic memory of the receiving device, the predetermined number of pseudo-random bit data generated based on the seed value as a random number table associated with the unique device number and the unique user keycode number. 24. The computer-readable medium according to claim 21, further comprising:
providing the receiving device with a plurality of unique secret user keycode numbers assigned thereto; securely transmitting, from the receiving device to the sending device, the unique device number and one of the plurality of unique user keycode numbers not assigned to a random number table stored at the receiving device; associating, in the secret index of the sending device, the random number table to the unique device number and the one of the plurality of unique user keycode numbers received from the receiving device; prior to transmitting the encrypted content, transmitting from the sending device to the receiving device through secured communication the predetermined number of pseudo-random bit data in the random number table to the receiving device having the unique device number and the one of the plurality of unique user keycode numbers corresponding to the random number table; and securely storing in an electronic memory of the receiving device, the predetermined number of pseudo-random bit data received from the sending device, the predetermined number of pseudo-random bit data being stored in association with the device number and the one of the plurality of unique user keycode numbers. 25. The computer-readable medium according to claim 21, wherein the secret session key is selected as a subset of the predetermined number of pseudo-random bit data of the random number data by identifying the start pointer and the end pointer corresponding to the secret session key using a predetermined algorithm. 26. The computer-readable medium according to claim 21, wherein the secret session key is randomly selected as a subset of the predetermined number of pseudo-random bit data of the random number data by identifying the start pointer and the end pointer corresponding to the secret session key using a random method. 27. The computer-readable medium according to claim 21, wherein transforming the contents of the secret session key properties descriptor buffer in the sending device includes performing an exclusive-or operation between the contents of the secret session key properties descriptor buffer and the unique user keycode number corresponding to the receiving device, and
restoring the contents of the copied mangled secret session key properties descriptor buffer includes performing an exclusive-or operation between the contents of the copied mangled secret session key properties descriptor buffer and the unique user keycode number. 28. The computer-readable medium according to claim 21, wherein transforming the contents of the secret session key properties descriptor buffer includes encrypting the contents of the secret session key properties descriptor buffer using symmetric secret key encryption and the unique user keycode number, and
restoring the contents of the copied mangled secret session key properties descriptor buffer includes decrypting with the symmetric secret key encryption and the unique user keycode number. 29. The computer-readable medium of claim 21, wherein the data to be transmitted by the sending device is streaming data, and each block of the streaming data is stored in the input/output buffer upon transmission of the previously stored block of the streaming data to the receiving device. 30. The computer-readable medium according to claim 29, wherein transforming the contents of the secret session key properties descriptor buffer includes encrypting the contents of the secret session key properties descriptor buffer using symmetric secret key encryption and the unique user keycode number, and
restoring the contents of the copied mangled secret session key properties descriptor buffer includes decrypting with the symmetric secret key encryption and the unique user keycode number. 31. A computer-readable medium storing computer-readable instructions thereon, the computer-readable instructions when executed by a processor, cause the processor to perform a method comprising:
providing a receiving device with a unique device number, a unique user keycode number assigned thereto, and a symmetric secret key encryption algorithm; providing a sending device with a unique device number, a unique user keycode assigned thereto, a seed value, a symmetric secret key encryption algorithm, and a non-system randomizer software; transmitting, from the receiving device to the sending device, the unique device number and unique user keycode corresponding to the receiving device; transmitting, from the sending device to the receiving device, the unique device number and unique user keycode corresponding to the sending device; generating, at the sending device, a predetermined number of pseudo-random bit data using the seed value, the predetermined number of pseudo-random bit data forming a random number table; assigning, in a secret index stored in an electronic memory of the sending device, the random number table to unique device number and the unique user keycode number corresponding to the receiving device; securely storing in the electronic memory of the receiving device, the unique device number and the unique user keycode number corresponding to the sending device; selecting, at the sending device, a secret session key as a subset of the pseudo-random bit data in the random number table corresponding to the unique device number and unique user keycode number of the receiving device; selecting, at the sending device, a start pointer and an end pointer corresponding to the subset of the pseudo-random bit data, the start and end pointers defining selected properties of the secret session key including a length and random number table location thereof; storing the selected properties of the secret session key, the start pointer and the end pointer into a secret session key properties descriptor buffer of the sending device; copying the secret session key into a secret session key buffer of the sending device using the start and end pointers to locate the secret session key within the random number table, the secret session key corresponding to the selected properties of the secret session key; encoding, at the sending device, the contents of the secret session key properties descriptor buffer into mangled secret session key properties; storing in an input/output buffer of the sending device, data to be encrypted and transmitted to the receiving device; encrypting, at the sending device, the data in the input/output buffer using the symmetric key encryption algorithm and the secret session key stored in the secret session key buffer to generate an encrypted content; appending, at the sending device, the unique device number and mangled secret session key properties as a header of the encrypted content; creating a connection between the sending device and the receiving device; transmitting the encrypted content with the appended header from the sending device to the receiving device; verifying, at the receiving device, the unique device number in the header of the encrypted content with the unique device number stored in the receiving device to determine whether the receiving device is authorized to decrypt the encrypted content; extracting, at the receiving device, the mangled secret session key properties when receiving device is authorized to decrypt the encrypted content, the mangled session key properties being stored in a copied mangled secret session key properties descriptor buffer of the receiving device; restoring the contents of the copied mangled secret session key properties descriptor buffer, the restored secret session key properties corresponding to the secret session key properties at the sending device, the restored session key properties including the selected properties, the start pointer and the end pointer of the secret session key; utilizing, at the receiving device, at least a subset of the selected properties, the starting pointer and the end pointer to extract the secret session key from a predetermined number of pseudo-random bit data previously stored in the receiving device, the predetermined number of pseudo-random bit data stored in the receiving device corresponding to the predetermined number of pseudo-random bit data stored in the sending device, the extracted secret session key being a duplicate of the secret session key stored in the sending device; decrypting the encrypted content at the receiving device using the symmetric key encryption algorithm and the extracted secret session key when receiving device is authorized to decrypt the encrypted content, the decrypted content being stored in an input/output buffer of the receiving device; securely using, reading or playing the contents of the input/output buffer of the receiving device, the secret session key having been successfully created and exchanged between the sending and receiving devices without exchanging or transmitting the actual secret session keys therebetween; determining, at the receiving device, whether additional communication with the sending device is required based on the contents of the input/output buffer; encoding, at the receiving device, restored secret session key properties into mangled secret session key properties, and storing the mangled secret session key properties into a mangled secret session key properties descriptor buffer; storing data to be encrypted and transmitted from the receiving device to the sending device in an input/output buffer of the receiving device; encrypting, at the receiving device, the data in the input/output buffer using the symmetric key encryption algorithm and the secret session key to generate an encrypted content; appending, at the receiving device, the unique device number of the sending device and the contents of the mangled secret session key properties descriptor buffer as a header of the encrypted content; creating a connection between the receiving device and the sending device; transmitting the encrypted content with the appended header from the receiving device to the sending device; verifying, at the sending device, the unique device number in the header of the encrypted content with the unique device number stored in the sending device to determine whether the sending device is authorized to decrypt the encrypted content; extracting, at the sending device, the mangled secret session key properties when the sending device is authorized to decrypt the encrypted content, the mangled session key properties being stored in a copied mangled secret session key properties descriptor buffer of the sending device; restoring the contents of the copied mangled secret session key properties descriptor buffer, the restored secret session key properties corresponding to the secret session key properties at the receiving device, the restored secret session key properties including the selected properties, the start pointer and the end pointer of the secret session key; utilizing, at the sending device, at least a subset of the selected properties, the starting pointer and the end pointer to extract the secret session key from a predetermined number of pseudo-random bit data previously stored in the sending device, the predetermined number of pseudo-random bit data stored in the sending device corresponding to the predetermined number of pseudo-random bit data stored in the receiving device, the extracted secret session key being a duplicate of the session key stored in the receiving device; decrypting the encrypted content at the sending device using the symmetric key encryption algorithm and the extracted secret session key when the sending device is authorized to decrypt the encrypted content, the decrypted content being stored in an input/output buffer of the sending device; securely using, reading or playing the contents of the input/output buffer of the receiving device, the secret session key having been successfully created and exchanged between the sending and receiving devices without exchanging or transmitting the actual secret session keys therebetween; repeating all steps above until at least one of the sending device and the receiving device ends communication therebetween. 32. The computer-readable medium according to claim 31, further comprising:
prior to transmitting the encrypted content from the sending device to the receiving device, transmitting from the sending device to the receiving device through secured communication the predetermined number of pseudo-random bit data in the random number table to the receiving device having the unique device number and unique user keycode number corresponding to the random number table; and securely storing in an electronic memory of the receiving device, the predetermined number of pseudo-random bit data received from the sending device, the predetermined number of pseudo-random bit data being stored in association with the device number and the user keycode. 33. The computer-readable medium according to claim 31, further comprising:
providing the receiving device with non-system randomizer software identical to the non-system randomizer software used by the sending device to generate the predetermined number of pseudo-random bit data included in the random number table; prior to transmission of the encrypted content, transmitting from the sending device to the receiving device, the seed value via secure communication, the seed value corresponding to the pseudo-random bit data in the random number table associated with the unique device number and unique user keycode number of the receiving device; generating a predetermined number of pseudo-random bit data at the receiving device using the non-system randomizer software and seed value; and securely storing in an electronic memory of the receiving device, the predetermined number of pseudo-random bit data generated based on the seed value as a random number table associated with the unique device number and the unique user keycode number, wherein the seed value is used to transmit encrypted contents from the sending device to the receiving device and to transmit encrypted contents from the receiving device to the sending device. 34. The computer-readable medium according to claim 31, further comprising:
providing the receiving device with a plurality of unique secret user keycode numbers assigned thereto; securely transmitting, from the receiving device to the sending device, the unique device number and one of the plurality of unique user keycode numbers not assigned to a random number table stored at the receiving device; associating, in the secret index of the sending device, the random number table to the unique device number and the one of the plurality of unique user keycode numbers received from the receiving device; prior to transmitting the encrypted content, transmitting from the sending device to the receiving device through secured communication the predetermined number of pseudo-random bit data in the random number table to the receiving device having the unique device number and the one of the plurality of unique user keycode numbers corresponding to the random number table; and securely storing in an electronic memory of the receiving device, the predetermined number of pseudo-random bit data received from the sending device, the predetermined number of pseudo-random bit data being stored in association with the device number and the one of the plurality of unique user keycode numbers. 35. The computer-readable medium according to claim 31, wherein the secret session key is selected as a subset of the predetermined number of pseudo-random bit data of the random number data by identifying the start pointer and the end pointer corresponding to the secret session key using a predetermined algorithm. 36. The computer-readable medium according to claim 31, wherein the secret session key is randomly selected as a subset of the predetermined number of pseudo-random bit data of the random number data by identifying the start pointer and the end pointer corresponding to the secret session key using a random method. 37. The computer-readable medium according to claim 31, wherein transforming the contents of the secret session key properties descriptor buffer in the sending device includes performing an exclusive-or operation between the contents of the secret session key properties descriptor buffer and the unique user keycode number corresponding to the receiving device,
restoring the contents of the copied mangled secret session key properties descriptor buffer of the receiving device includes performing an exclusive-or operation between the contents of the copied mangled secret session key properties descriptor buffer and the unique user keycode number of the receiving device, transforming the contents of the secret session key properties descriptor buffer in the receiving device includes performing an exclusive-or operation between the contents of the secret session key properties descriptor buffer and the unique user keycode number corresponding to the sending device, and restoring the contents of the copied mangled secret session key properties descriptor buffer of the sending device includes performing an exclusive-or operation between the contents of the copied mangled secret session key properties descriptor buffer and the unique user keycode number of the sending device. 38. The computer-readable medium according to claim 31, wherein transforming the contents of the secret session key properties descriptor buffer in the sending device includes encrypting the contents of the secret session key properties descriptor buffer using symmetric secret key encryption and the unique user keycode number of the receiving device,
restoring the contents of the copied mangled secret session key properties descriptor buffer of the receiving device includes decrypting with the symmetric secret key encryption and the unique user keycode number of the receiving device, transforming the contents of the secret session key properties descriptor buffer in the receiving device includes encrypting the contents of the secret session key properties descriptor buffer using symmetric secret key encryption and the unique user keycode number of the sending device, and restoring the contents of the copied mangled secret session key properties descriptor buffer of the sending device includes decrypting with the symmetric secret key encryption and the unique user keycode number of the sending device. 39. The computer-readable medium according to claim 31, wherein the data to be transmitted by the sending device is streaming data and each block of the streaming data is stored in the input/output buffer upon transmission of the previously stored block of the streaming data to the receiving device, and
the data to be transmitted by the receiving device is streaming data and each block of the streaming data is stored in the input/output buffer upon transmission of the previously stored block of the streaming data to the sending device. 40. The computer-readable medium according to claim 39, wherein transforming the contents of the secret session key properties descriptor buffer in the sending device includes encrypting the contents of the secret session key properties descriptor buffer using symmetric secret key encryption and the unique user keycode number of the receiving device,
restoring the contents of the copied mangled secret session key properties descriptor buffer of the receiving device includes decrypting with the symmetric secret key encryption and the unique user keycode number of the receiving device, transforming the contents of the secret session key properties descriptor buffer in the receiving device includes encrypting the contents of the secret session key properties descriptor buffer using symmetric secret key encryption and the unique user keycode number of the sending device, and restoring the contents of the copied mangled secret session key properties descriptor buffer of the sending device includes decrypting with the symmetric secret key encryption and the unique user keycode number of the sending device. | A method of exchanging secret session keys in symmetric encryption communication includes storing random number tables in both the sending and receiving devices. The sending device then determines the secret session key utilizing the random number table, and transmits to the receiving device information for locating the secret session key within the random number table. Thus, the sending device shares the secret session key with the receiving device without actually transmitting the secret session key. The random number tables may be transmitted from one device to the other or be preinstalled in each device. Further, a common seed value may be used by each device to generate the random number table independently.1. A method of creating and exchanging secret session keys for symmetric secret key encryption between a sending device and a receiving device without transmitting the actual secret session keys between the sending and receiving devices, the method comprising:
providing the receiving device with a unique device number, a unique user keycode number, and a symmetric secret key encryption algorithm; providing the sending device with the symmetric secret key encryption algorithm, a seed value and a non-system randomizer to generate a predetermined number of pseudo-random bit data based on the seed value, the pseudo-random bit data being arranged into a random number table stored in an electronic memory of the sending device; transmitting from the receiving device to the sending device through secured communication both the unique device number and the unique user keycode number; assigning, at the sending device, the random number table to the unique device number and unique user keycode number, the assignment being stored in a secret index in the electronic memory of the sending device; selecting, at the sending device, a secret session key as a subset of the pseudo-random bit data in the random number table; assigning, at the sending device, a start pointer corresponding to a start point of the subset of pseudo-random bit data and an end pointer corresponding to an end point of the subset of pseudo-random bit data; determining selected properties identifying length and location of the subset of pseudo-random bit data in the random number table, the subset of pseudo-random bit data being the secret session key; storing the selected properties and the start and end pointers of the secret session key in a secret session key properties descriptor buffer of the sending device; copying into a secret session key buffer at the sending device the secret session key corresponding to the selected properties of the secret session key from within the predetermined number of pseudo-random bit data in the random number table stored at the sending device index, by utilizing the start and end pointers to locate the secret session key; transforming the contents of the secret session key properties descriptor buffer into mangled secret session key properties; storing the data to be transmitted to the receiving device in an input/output buffer of the sending device; encrypting, at the sending device, the data in the input/output buffer using the symmetric key encryption algorithm and the secret session key stored in the secret session key buffer to generate an encrypted content; appending, at the sending device, the unique device number and the mangled secret session key properties as a header of the encrypted content; creating a connection between the sending device and the receiving device; transmitting the encrypted content with the appended header from the sending device to the receiving device; verifying, at the receiving device, the unique device number in the header of the encrypted content with the unique device number stored in the receiving device to determine whether the receiving device is authorized to decrypt the encrypted content; extracting, at the receiving device, the mangled secret session key properties when the receiving device is authorized to decrypt the encrypted content, the mangled session key properties being stored in a copied mangled secret session key properties descriptor buffer of the receiving device; restoring the contents of the copied mangled secret session key properties descriptor buffer, the restored secret session key properties corresponding to the secret session key properties at the sending device, the restored session key properties including the selected properties, the start pointer and the end pointer of the secret session key; utilizing, at the receiving device, at least a subset of the selected properties, the starting pointer and the end pointer to extract the secret session key from a predetermined number of pseudo-random bit data previously stored in the receiving device, the predetermined number of pseudo-random bit data stored in the receiving device corresponding to the predetermined number of pseudo-random bit data stored in the sending device, the extracted secret session key being a duplicate of the secret session key stored in the sending device; decrypting the encrypted content at the receiving device using the symmetric key encryption algorithm and the extracted secret session key when the receiving device is authorized to decrypt the encrypted content, the decrypted content being stored in an input/output buffer of the receiving device; and securely using, reading or playing the contents of the input/output buffer of the receiving device, the secret session key having been successfully created and exchanged between the sending and receiving devices without exchanging or transmitting the actual secret session keys therebetween, the secure communication between the sending and receiving devices of encrypted content being maintained until termination of the communication is initiated by at least one of the sending and receiving devices. 2. The method according to claim 1, further comprising:
prior to transmitting the encrypted content, transmitting from the sending device to the receiving device through secured communication the predetermined number of pseudo-random bit data in the random number table to the receiving device having the unique device number and unique user keycode number corresponding to the random number table; and securely storing in an electronic memory of the receiving device, the predetermined number of pseudo-random bit data received from the sending device, the predetermined number of pseudo-random bit data being stored in association with the device number and the user keycode. 3. The method according to claim 1, further comprising:
providing the receiving device with non-system randomizer software identical to the non-system randomizer software used by the sending device to generate the predetermined number of pseudo-random bit data included in the random number table; prior to transmission of the encrypted content, transmitting from the sending device to the receiving device, the seed value via secure communication, the seed value corresponding to the pseudo-random bit data in the random number table associated with the unique device number and unique user keycode number of the receiving device; generating a predetermined number of pseudo-random bit data at the receiving device using the non-system randomizer software and seed value; and securely storing in an electronic memory of the receiving device, the predetermined number of pseudo-random bit data generated based on the seed value as a random number table associated with the unique device number and the unique user keycode number. 4. The method according to claim 1, further comprising:
providing the receiving device with a plurality of unique secret user keycode numbers assigned thereto; securely transmitting, from the receiving device to the sending device, the unique device number and one of the plurality of unique user keycode numbers not assigned to a random number table stored at the receiving device; associating, in the secret index of the sending device, the random number table to the unique device number and the one of the plurality of unique user keycode numbers received from the receiving device; prior to transmitting the encrypted content, transmitting from the sending device to the receiving device through secured communication the predetermined number of pseudo-random bit data in the random number table to the receiving device having the unique device number and the one of the plurality of unique user keycode numbers corresponding to the random number table; and securely storing in an electronic memory of the receiving device, the predetermined number of pseudo-random bit data received from the sending device, the predetermined number of pseudo-random bit data being stored in association with the device number and the one of the plurality of unique user keycode numbers. 5. The method according to claim 1, wherein the secret session key is selected as a subset of the predetermined number of pseudo-random bit data of the random number data by identifying the start pointer and the end pointer corresponding to the secret session key using a predetermined algorithm. 6. The method according to claim 1, wherein the secret session key is randomly selected as a subset of the predetermined number of pseudo-random bit data of the random number data by identifying the start pointer and the end pointer corresponding to the secret session key using a random method. 7. The method according to claim 1, wherein transforming the contents of the secret session key properties descriptor buffer in the sending device includes performing an exclusive-or operation between the contents of the secret session key properties descriptor buffer and the unique user keycode number corresponding to the receiving device, and
restoring the contents of the copied mangled secret session key properties descriptor buffer includes performing an exclusive-or operation between the contents of the copied mangled secret session key properties descriptor buffer and the unique user keycode number. 8. The method according to claim 1, wherein transforming the contents of the secret session key properties descriptor buffer includes encrypting the contents of the secret session key properties descriptor buffer using symmetric secret key encryption and the unique user keycode number, and
restoring the contents of the copied mangled secret session key properties descriptor buffer includes decrypting with the symmetric secret key encryption and the unique user keycode number. 9. The method of claim 1, wherein the data to be transmitted by the sending device is streaming data, and each block of the streaming data is stored in the input/output buffer upon transmission of the previously stored block of the streaming data to the receiving device. 10. The method according to claim 9, wherein transforming the contents of the secret session key properties descriptor buffer includes encrypting the contents of the secret session key properties descriptor buffer using symmetric secret key encryption and the unique user keycode number, and
restoring the contents of the copied mangled secret session key properties descriptor buffer includes decrypting with the symmetric secret key encryption and the unique user keycode number. 11. A method of creating and exchanging secret session keys used in symmetric secret key encryption between a sending device and a receiving device engaged in two way communication, the secret session key being exchanged without transmitting the actual secret session key between the sending and receiving devices, the method comprising:
providing the receiving device with a unique device number, a unique user keycode number assigned thereto, and a symmetric secret key encryption algorithm; providing the sending device with a unique device number, a unique user keycode assigned thereto, a seed value, the symmetric secret key encryption algorithm, and a non-system randomizer software; transmitting, from the receiving device to the sending device, the unique device number and unique user keycode corresponding to the receiving device; transmitting, from the sending device to the receiving device, the unique device number and unique user keycode corresponding to the sending device; generating, at the sending device, a predetermined number of pseudo-random bit data using the seed value, the predetermined number of pseudo-random bit data forming a random number table; assigning, in a secret index stored in an electronic memory of the sending device, the random number table to unique device number and the unique user keycode number corresponding to the receiving device; securely storing in the electronic memory of the receiving device, the unique device number and the unique user keycode number corresponding to the sending device; selecting, at the sending device, a secret session key as a subset of the pseudo-random bit data in the random number table corresponding to the unique device number and unique user keycode number of the receiving device; selecting, at the sending device, a start pointer and an end pointer corresponding to the subset of the pseudo-random bit data, the start and end pointers defining selected properties of the secret session key including a length and random number table location thereof; storing the selected properties of the secret session key, the start pointer and the end pointer into a secret session key properties descriptor buffer of the sending device; copying the secret session key into a secret session key buffer of the sending device using the start and end pointers to locate the secret session key within the random number table, the secret session key corresponding to the selected properties of the secret session key; encoding, at the sending device, the contents of the secret session key properties descriptor buffer into mangled secret session key properties; storing in an input/output buffer of the sending device, data to be encrypted and transmitted to the receiving device; encrypting, at the sending device, the data in the input/output buffer using the symmetric key encryption algorithm and the secret session key stored in the secret session key buffer to generate an encrypted content; appending, at the sending device, the unique device number and mangled secret session key properties as a header of the encrypted content; creating a connection between the sending device and the receiving device; transmitting the encrypted content with the appended header from the sending device to the receiving device; verifying, at the receiving device, the unique device number in the header of the encrypted content with the unique device number stored in the receiving device to determine whether the receiving device is authorized to decrypt the encrypted content; extracting, at the receiving device, the mangled secret session key properties when receiving device is authorized to decrypt the encrypted content, the mangled session key properties being stored in a copied mangled secret session key properties descriptor buffer of the receiving device; restoring the contents of the copied mangled secret session key properties descriptor buffer, the restored secret session key properties corresponding to the secret session key properties at the sending device, the restored session key properties including the selected properties, the start pointer and the end pointer of the secret session key; utilizing, at the receiving device, at least a subset of the selected properties, the starting pointer and the end pointer to extract the secret session key from a predetermined number of pseudo-random bit data previously stored in the receiving device, the predetermined number of pseudo-random bit data stored in the receiving device corresponding to the predetermined number of pseudo-random bit data stored in the sending device, the extracted secret session key being a duplicate of the secret session key stored in the sending device; decrypting the encrypted content at the receiving device using the symmetric key encryption algorithm and the extracted secret session key when receiving device is authorized to decrypt the encrypted content, the decrypted content being stored in an input/output buffer of the receiving device; securely using, reading or playing the contents of the input/output buffer of the receiving device, the secret session key having been successfully created and exchanged between the sending and receiving devices without exchanging or transmitting the actual secret session keys therebetween; determining, at the receiving device, whether additional communication with the sending device is required based on the contents of the input/output buffer; encoding, at the receiving device, restored secret session key properties into mangled secret session key properties, and storing the mangled secret session key properties into a mangled secret session key properties descriptor buffer; storing data to be encrypted and transmitted from the receiving device to the sending device in an input/output buffer of the receiving device; encrypting, at the receiving device, the data in the input/output buffer using the symmetric key encryption algorithm and the secret session key to generate an encrypted content; appending, at the receiving device, the unique device number of the sending device and the contents of the mangled secret session key properties descriptor buffer as a header of the encrypted content; creating a connection between the receiving device and the sending device; transmitting the encrypted content with the appended header from the receiving device to the sending device; verifying, at the sending device, the unique device number in the header of the encrypted content with the unique device number stored in the sending device to determine whether the sending device is authorized to decrypt the encrypted content; extracting, at the sending device, the mangled secret session key properties when the sending device is authorized to decrypt the encrypted content, the mangled session key properties being stored in a copied mangled secret session key properties descriptor buffer of the sending device; restoring the contents of the copied mangled secret session key properties descriptor buffer, the restored secret session key properties corresponding to the secret session key properties at the receiving device, the restored secret session key properties including the selected properties, the start pointer and the end pointer of the secret session key; utilizing, at the sending device, at least a subset of the selected properties, the starting pointer and the end pointer to extract the secret session key from a predetermined number of pseudo-random bit data previously stored in the sending device, the predetermined number of pseudo-random bit data stored in the sending device corresponding to the predetermined number of pseudo-random bit data stored in the receiving device, the extracted secret session key being a duplicate of the session key stored in the receiving device; decrypting the encrypted content at the sending device using the symmetric key encryption algorithm and the extracted secret session key when the sending device is authorized to decrypt the encrypted content, the decrypted content being stored in an input/output buffer of the sending device; securely using, reading or playing the contents of the input/output buffer of the receiving device, the secret session key having been successfully created and exchanged between the sending and receiving devices without exchanging or transmitting the actual secret session keys therebetween; repeating all steps above until at least one of the sending device and the receiving device ends communication therebetween. 12. The method according to claim 11, further comprising:
prior to transmitting the encrypted content from the sending device to the receiving device, transmitting from the sending device to the receiving device through secured communication the predetermined number of pseudo-random bit data in the random number table to the receiving device having the unique device number and unique user keycode number corresponding to the random number table; and securely storing in an electronic memory of the receiving device, the predetermined number of pseudo-random bit data received from the sending device, the predetermined number of pseudo-random bit data being stored in association with the device number and the user keycode. 13. The method according to claim 11, further comprising:
providing the receiving device with non-system randomizer software identical to the non-system randomizer software used by the sending device to generate the predetermined number of pseudo-random bit data included in the random number table; prior to transmission of the encrypted content, transmitting from the sending device to the receiving device, the seed value via secure communication, the seed value corresponding to the pseudo-random bit data in the random number table associated with the unique device number and unique user keycode number of the receiving device; generating a predetermined number of pseudo-random bit data at the receiving device using the non-system randomizer software and seed value; and securely storing in an electronic memory of the receiving device, the predetermined number of pseudo-random bit data generated based on the seed value as a random number table associated with the unique device number and the unique user keycode number, wherein the seed value is used to transmit encrypted contents from the sending device to the receiving device and to transmit encrypted contents from the receiving device to the sending device. 14. The method according to claim 11, further comprising:
providing the receiving device with a plurality of unique secret user keycode numbers assigned thereto; securely transmitting, from the receiving device to the sending device, the unique device number and one of the plurality of unique user keycode numbers not assigned to a random number table stored at the receiving device; associating, in the secret index of the sending device, the random number table to the unique device number and the one of the plurality of unique user keycode numbers received from the receiving device; prior to transmitting the encrypted content, transmitting from the sending device to the receiving device through secured communication the predetermined number of pseudo-random bit data in the random number table to the receiving device having the unique device number and the one of the plurality of unique user keycode numbers corresponding to the random number table; and securely storing in an electronic memory of the receiving device, the predetermined number of pseudo-random bit data received from the sending device, the predetermined number of pseudo-random bit data being stored in association with the device number and the one of the plurality of unique user keycode numbers. 15. The method according to claim 11, wherein the secret session key is selected as a subset of the predetermined number of pseudo-random bit data of the random number data by identifying the start pointer and the end pointer corresponding to the secret session key using a predetermined algorithm. 16. The method according to claim 11, wherein the secret session key is randomly selected as a subset of the predetermined number of pseudo-random bit data of the random number data by identifying the start pointer and the end pointer corresponding to the secret session key using a random method. 17. The method according to claim 11, wherein transforming the contents of the secret session key properties descriptor buffer in the sending device includes performing an exclusive-or operation between the contents of the secret session key properties descriptor buffer and the unique user keycode number corresponding to the receiving device,
restoring the contents of the copied mangled secret session key properties descriptor buffer of the receiving device includes performing an exclusive-or operation between the contents of the copied mangled secret session key properties descriptor buffer and the unique user keycode number of the receiving device, transforming the contents of the secret session key properties descriptor buffer in the receiving device includes performing an exclusive-or operation between the contents of the secret session key properties descriptor buffer and the unique user keycode number corresponding to the sending device, and restoring the contents of the copied mangled secret session key properties descriptor buffer of the sending device includes performing an exclusive-or operation between the contents of the copied mangled secret session key properties descriptor buffer and the unique user keycode number of the sending device. 18. The method according to claim 11, wherein transforming the contents of the secret session key properties descriptor buffer in the sending device includes encrypting the contents of the secret session key properties descriptor buffer using symmetric secret key encryption and the unique user keycode number of the receiving device,
restoring the contents of the copied mangled secret session key properties descriptor buffer of the receiving device includes decrypting with the symmetric secret key encryption and the unique user keycode number of the receiving device, transforming the contents of the secret session key properties descriptor buffer in the receiving device includes encrypting the contents of the secret session key properties descriptor buffer using symmetric secret key encryption and the unique user keycode number of the sending device, and restoring the contents of the copied mangled secret session key properties descriptor buffer of the sending device includes decrypting with the symmetric secret key encryption and the unique user keycode number of the sending device. 19. The method according to claim 11, wherein the data to be transmitted by the sending device is streaming data and each block of the streaming data is stored in the input/output buffer upon transmission of the previously stored block of the streaming data to the receiving device, and
the data to be transmitted by the receiving device is streaming data and each block of the streaming data is stored in the input/output buffer upon transmission of the previously stored block of the streaming data to the sending device. 20. The method according to claim 19, wherein transforming the contents of the secret session key properties descriptor buffer in the sending device includes encrypting the contents of the secret session key properties descriptor buffer using symmetric secret key encryption and the unique user keycode number of the receiving device,
restoring the contents of the copied mangled secret session key properties descriptor buffer of the receiving device includes decrypting with the symmetric secret key encryption and the unique user keycode number of the receiving device, transforming the contents of the secret session key properties descriptor buffer in the receiving device includes encrypting the contents of the secret session key properties descriptor buffer using symmetric secret key encryption and the unique user keycode number of the sending device, and restoring the contents of the copied mangled secret session key properties descriptor buffer of the sending device includes decrypting with the symmetric secret key encryption and the unique user keycode number of the sending device. 21. A computer-readable medium storing computer-readable instructions thereon, the computer-readable instructions, when executed by a processor cause the processor to perform a method comprising:
providing a receiving device with a unique device number, a unique user keycode number, and a symmetric secret key encryption algorithm; providing a sending device with a symmetric secret key encryption algorithm, a seed value and a non-system randomizer to generate a predetermined number of pseudo-random bit data based on the seed value, the pseudo-random bit data being arranged into a random number table stored in an electronic memory of the sending device; transmitting from the receiving device to the sending device through secured communication both the unique device number and the unique user keycode number; assigning, at the sending device, the random number table to the unique device number and unique user keycode number, the assignment being stored in a secret index in the electronic memory of the sending device; selecting, at the sending device, a secret session key as a subset of the pseudo-random bit data in the random number table; assigning, at the sending device, a start pointer corresponding to a start point of the subset of pseudo-random bit data and an end pointer corresponding to an end point of the subset of pseudo-random bit data; determining selected properties identifying length and location of the subset of pseudo-random bit data in the random number table, the subset of pseudo-random bit data being the secret session key; storing the selected properties and the start and end pointers of the secret session key in a secret session key properties descriptor buffer of the sending device; copying into a secret session key buffer at the sending device the secret session key corresponding to the selected properties of the secret session key from within the predetermined number of pseudo-random bit data in the random number table stored at the sending device index, by utilizing the start and end pointers to locate the secret session key; transforming the contents of the secret session key properties descriptor buffer into mangled secret session key properties; storing the data to be transmitted to the receiving device in an input/output buffer of the sending device; encrypting, at the sending device, the data in the input/output buffer using the symmetric key encryption algorithm and the secret session key stored in the secret session key buffer to generate an encrypted content; appending, at the sending device, the unique device number and the mangled secret session key properties as a header of the encrypted content; creating a connection between the sending device and the receiving device; transmitting the encrypted content with the appended header from the sending device to the receiving device; verifying, at the receiving device, the unique device number in the header of the encrypted content with the unique device number stored in the receiving device to determine whether the receiving device is authorized to decrypt the encrypted content; extracting, at the receiving device, the mangled secret session key properties when the receiving device is authorized to decrypt the encrypted content, the mangled session key properties being stored in a copied mangled secret session key properties descriptor buffer of the receiving device; restoring the contents of the copied mangled secret session key properties descriptor buffer, the restored secret session key properties corresponding to the secret session key properties at the sending device, the restored session key properties including the selected properties, the start pointer and the end pointer of the secret session key; utilizing, at the receiving device, at least a subset of the selected properties, the starting pointer and the end pointer to extract the secret session key from a predetermined number of pseudo-random bit data previously stored in the receiving device, the predetermined number of pseudo-random bit data stored in the receiving device corresponding to the predetermined number of pseudo-random bit data stored in the sending device, the extracted secret session key being a duplicate of the secret session key stored in the sending device; decrypting the encrypted content at the receiving device using the symmetric key encryption algorithm and the extracted secret session key when the receiving device is authorized to decrypt the encrypted content, the decrypted content being stored in an input/output buffer of the receiving device; and securely using, reading or playing the contents of the input/output buffer of the receiving device, the secret session key having been successfully created and exchanged between the sending and receiving devices without exchanging or transmitting the actual secret session keys therebetween, the secure communication between the sending and receiving devices of encrypted content being maintained until termination of the communication is initiated by at least one of the sending and receiving devices. 22. The computer-readable medium according to claim 21, further comprising:
prior to transmitting the encrypted content, transmitting from the sending device to the receiving device through secured communication the predetermined number of pseudo-random bit data in the random number table to the receiving device having the unique device number and unique user keycode number corresponding to the random number table; and securely storing in an electronic memory of the receiving device, the predetermined number of pseudo-random bit data received from the sending device, the predetermined number of pseudo-random bit data being stored in association with the device number and the user keycode. 23. The computer-readable medium according to claim 21, further comprising:
providing the receiving device with non-system randomizer software identical to the non-system randomizer software used by the sending device to generate the predetermined number of pseudo-random bit data included in the random number table; prior to transmission of the encrypted content, transmitting from the sending device to the receiving device, the seed value via secure communication, the seed value corresponding to the pseudo-random bit data in the random number table associated with the unique device number and unique user keycode number of the receiving device; generating a predetermined number of pseudo-random bit data at the receiving device using the non-system randomizer software and seed value; and securely storing in an electronic memory of the receiving device, the predetermined number of pseudo-random bit data generated based on the seed value as a random number table associated with the unique device number and the unique user keycode number. 24. The computer-readable medium according to claim 21, further comprising:
providing the receiving device with a plurality of unique secret user keycode numbers assigned thereto; securely transmitting, from the receiving device to the sending device, the unique device number and one of the plurality of unique user keycode numbers not assigned to a random number table stored at the receiving device; associating, in the secret index of the sending device, the random number table to the unique device number and the one of the plurality of unique user keycode numbers received from the receiving device; prior to transmitting the encrypted content, transmitting from the sending device to the receiving device through secured communication the predetermined number of pseudo-random bit data in the random number table to the receiving device having the unique device number and the one of the plurality of unique user keycode numbers corresponding to the random number table; and securely storing in an electronic memory of the receiving device, the predetermined number of pseudo-random bit data received from the sending device, the predetermined number of pseudo-random bit data being stored in association with the device number and the one of the plurality of unique user keycode numbers. 25. The computer-readable medium according to claim 21, wherein the secret session key is selected as a subset of the predetermined number of pseudo-random bit data of the random number data by identifying the start pointer and the end pointer corresponding to the secret session key using a predetermined algorithm. 26. The computer-readable medium according to claim 21, wherein the secret session key is randomly selected as a subset of the predetermined number of pseudo-random bit data of the random number data by identifying the start pointer and the end pointer corresponding to the secret session key using a random method. 27. The computer-readable medium according to claim 21, wherein transforming the contents of the secret session key properties descriptor buffer in the sending device includes performing an exclusive-or operation between the contents of the secret session key properties descriptor buffer and the unique user keycode number corresponding to the receiving device, and
restoring the contents of the copied mangled secret session key properties descriptor buffer includes performing an exclusive-or operation between the contents of the copied mangled secret session key properties descriptor buffer and the unique user keycode number. 28. The computer-readable medium according to claim 21, wherein transforming the contents of the secret session key properties descriptor buffer includes encrypting the contents of the secret session key properties descriptor buffer using symmetric secret key encryption and the unique user keycode number, and
restoring the contents of the copied mangled secret session key properties descriptor buffer includes decrypting with the symmetric secret key encryption and the unique user keycode number. 29. The computer-readable medium of claim 21, wherein the data to be transmitted by the sending device is streaming data, and each block of the streaming data is stored in the input/output buffer upon transmission of the previously stored block of the streaming data to the receiving device. 30. The computer-readable medium according to claim 29, wherein transforming the contents of the secret session key properties descriptor buffer includes encrypting the contents of the secret session key properties descriptor buffer using symmetric secret key encryption and the unique user keycode number, and
restoring the contents of the copied mangled secret session key properties descriptor buffer includes decrypting with the symmetric secret key encryption and the unique user keycode number. 31. A computer-readable medium storing computer-readable instructions thereon, the computer-readable instructions when executed by a processor, cause the processor to perform a method comprising:
providing a receiving device with a unique device number, a unique user keycode number assigned thereto, and a symmetric secret key encryption algorithm; providing a sending device with a unique device number, a unique user keycode assigned thereto, a seed value, a symmetric secret key encryption algorithm, and a non-system randomizer software; transmitting, from the receiving device to the sending device, the unique device number and unique user keycode corresponding to the receiving device; transmitting, from the sending device to the receiving device, the unique device number and unique user keycode corresponding to the sending device; generating, at the sending device, a predetermined number of pseudo-random bit data using the seed value, the predetermined number of pseudo-random bit data forming a random number table; assigning, in a secret index stored in an electronic memory of the sending device, the random number table to unique device number and the unique user keycode number corresponding to the receiving device; securely storing in the electronic memory of the receiving device, the unique device number and the unique user keycode number corresponding to the sending device; selecting, at the sending device, a secret session key as a subset of the pseudo-random bit data in the random number table corresponding to the unique device number and unique user keycode number of the receiving device; selecting, at the sending device, a start pointer and an end pointer corresponding to the subset of the pseudo-random bit data, the start and end pointers defining selected properties of the secret session key including a length and random number table location thereof; storing the selected properties of the secret session key, the start pointer and the end pointer into a secret session key properties descriptor buffer of the sending device; copying the secret session key into a secret session key buffer of the sending device using the start and end pointers to locate the secret session key within the random number table, the secret session key corresponding to the selected properties of the secret session key; encoding, at the sending device, the contents of the secret session key properties descriptor buffer into mangled secret session key properties; storing in an input/output buffer of the sending device, data to be encrypted and transmitted to the receiving device; encrypting, at the sending device, the data in the input/output buffer using the symmetric key encryption algorithm and the secret session key stored in the secret session key buffer to generate an encrypted content; appending, at the sending device, the unique device number and mangled secret session key properties as a header of the encrypted content; creating a connection between the sending device and the receiving device; transmitting the encrypted content with the appended header from the sending device to the receiving device; verifying, at the receiving device, the unique device number in the header of the encrypted content with the unique device number stored in the receiving device to determine whether the receiving device is authorized to decrypt the encrypted content; extracting, at the receiving device, the mangled secret session key properties when receiving device is authorized to decrypt the encrypted content, the mangled session key properties being stored in a copied mangled secret session key properties descriptor buffer of the receiving device; restoring the contents of the copied mangled secret session key properties descriptor buffer, the restored secret session key properties corresponding to the secret session key properties at the sending device, the restored session key properties including the selected properties, the start pointer and the end pointer of the secret session key; utilizing, at the receiving device, at least a subset of the selected properties, the starting pointer and the end pointer to extract the secret session key from a predetermined number of pseudo-random bit data previously stored in the receiving device, the predetermined number of pseudo-random bit data stored in the receiving device corresponding to the predetermined number of pseudo-random bit data stored in the sending device, the extracted secret session key being a duplicate of the secret session key stored in the sending device; decrypting the encrypted content at the receiving device using the symmetric key encryption algorithm and the extracted secret session key when receiving device is authorized to decrypt the encrypted content, the decrypted content being stored in an input/output buffer of the receiving device; securely using, reading or playing the contents of the input/output buffer of the receiving device, the secret session key having been successfully created and exchanged between the sending and receiving devices without exchanging or transmitting the actual secret session keys therebetween; determining, at the receiving device, whether additional communication with the sending device is required based on the contents of the input/output buffer; encoding, at the receiving device, restored secret session key properties into mangled secret session key properties, and storing the mangled secret session key properties into a mangled secret session key properties descriptor buffer; storing data to be encrypted and transmitted from the receiving device to the sending device in an input/output buffer of the receiving device; encrypting, at the receiving device, the data in the input/output buffer using the symmetric key encryption algorithm and the secret session key to generate an encrypted content; appending, at the receiving device, the unique device number of the sending device and the contents of the mangled secret session key properties descriptor buffer as a header of the encrypted content; creating a connection between the receiving device and the sending device; transmitting the encrypted content with the appended header from the receiving device to the sending device; verifying, at the sending device, the unique device number in the header of the encrypted content with the unique device number stored in the sending device to determine whether the sending device is authorized to decrypt the encrypted content; extracting, at the sending device, the mangled secret session key properties when the sending device is authorized to decrypt the encrypted content, the mangled session key properties being stored in a copied mangled secret session key properties descriptor buffer of the sending device; restoring the contents of the copied mangled secret session key properties descriptor buffer, the restored secret session key properties corresponding to the secret session key properties at the receiving device, the restored secret session key properties including the selected properties, the start pointer and the end pointer of the secret session key; utilizing, at the sending device, at least a subset of the selected properties, the starting pointer and the end pointer to extract the secret session key from a predetermined number of pseudo-random bit data previously stored in the sending device, the predetermined number of pseudo-random bit data stored in the sending device corresponding to the predetermined number of pseudo-random bit data stored in the receiving device, the extracted secret session key being a duplicate of the session key stored in the receiving device; decrypting the encrypted content at the sending device using the symmetric key encryption algorithm and the extracted secret session key when the sending device is authorized to decrypt the encrypted content, the decrypted content being stored in an input/output buffer of the sending device; securely using, reading or playing the contents of the input/output buffer of the receiving device, the secret session key having been successfully created and exchanged between the sending and receiving devices without exchanging or transmitting the actual secret session keys therebetween; repeating all steps above until at least one of the sending device and the receiving device ends communication therebetween. 32. The computer-readable medium according to claim 31, further comprising:
prior to transmitting the encrypted content from the sending device to the receiving device, transmitting from the sending device to the receiving device through secured communication the predetermined number of pseudo-random bit data in the random number table to the receiving device having the unique device number and unique user keycode number corresponding to the random number table; and securely storing in an electronic memory of the receiving device, the predetermined number of pseudo-random bit data received from the sending device, the predetermined number of pseudo-random bit data being stored in association with the device number and the user keycode. 33. The computer-readable medium according to claim 31, further comprising:
providing the receiving device with non-system randomizer software identical to the non-system randomizer software used by the sending device to generate the predetermined number of pseudo-random bit data included in the random number table; prior to transmission of the encrypted content, transmitting from the sending device to the receiving device, the seed value via secure communication, the seed value corresponding to the pseudo-random bit data in the random number table associated with the unique device number and unique user keycode number of the receiving device; generating a predetermined number of pseudo-random bit data at the receiving device using the non-system randomizer software and seed value; and securely storing in an electronic memory of the receiving device, the predetermined number of pseudo-random bit data generated based on the seed value as a random number table associated with the unique device number and the unique user keycode number, wherein the seed value is used to transmit encrypted contents from the sending device to the receiving device and to transmit encrypted contents from the receiving device to the sending device. 34. The computer-readable medium according to claim 31, further comprising:
providing the receiving device with a plurality of unique secret user keycode numbers assigned thereto; securely transmitting, from the receiving device to the sending device, the unique device number and one of the plurality of unique user keycode numbers not assigned to a random number table stored at the receiving device; associating, in the secret index of the sending device, the random number table to the unique device number and the one of the plurality of unique user keycode numbers received from the receiving device; prior to transmitting the encrypted content, transmitting from the sending device to the receiving device through secured communication the predetermined number of pseudo-random bit data in the random number table to the receiving device having the unique device number and the one of the plurality of unique user keycode numbers corresponding to the random number table; and securely storing in an electronic memory of the receiving device, the predetermined number of pseudo-random bit data received from the sending device, the predetermined number of pseudo-random bit data being stored in association with the device number and the one of the plurality of unique user keycode numbers. 35. The computer-readable medium according to claim 31, wherein the secret session key is selected as a subset of the predetermined number of pseudo-random bit data of the random number data by identifying the start pointer and the end pointer corresponding to the secret session key using a predetermined algorithm. 36. The computer-readable medium according to claim 31, wherein the secret session key is randomly selected as a subset of the predetermined number of pseudo-random bit data of the random number data by identifying the start pointer and the end pointer corresponding to the secret session key using a random method. 37. The computer-readable medium according to claim 31, wherein transforming the contents of the secret session key properties descriptor buffer in the sending device includes performing an exclusive-or operation between the contents of the secret session key properties descriptor buffer and the unique user keycode number corresponding to the receiving device,
restoring the contents of the copied mangled secret session key properties descriptor buffer of the receiving device includes performing an exclusive-or operation between the contents of the copied mangled secret session key properties descriptor buffer and the unique user keycode number of the receiving device, transforming the contents of the secret session key properties descriptor buffer in the receiving device includes performing an exclusive-or operation between the contents of the secret session key properties descriptor buffer and the unique user keycode number corresponding to the sending device, and restoring the contents of the copied mangled secret session key properties descriptor buffer of the sending device includes performing an exclusive-or operation between the contents of the copied mangled secret session key properties descriptor buffer and the unique user keycode number of the sending device. 38. The computer-readable medium according to claim 31, wherein transforming the contents of the secret session key properties descriptor buffer in the sending device includes encrypting the contents of the secret session key properties descriptor buffer using symmetric secret key encryption and the unique user keycode number of the receiving device,
restoring the contents of the copied mangled secret session key properties descriptor buffer of the receiving device includes decrypting with the symmetric secret key encryption and the unique user keycode number of the receiving device, transforming the contents of the secret session key properties descriptor buffer in the receiving device includes encrypting the contents of the secret session key properties descriptor buffer using symmetric secret key encryption and the unique user keycode number of the sending device, and restoring the contents of the copied mangled secret session key properties descriptor buffer of the sending device includes decrypting with the symmetric secret key encryption and the unique user keycode number of the sending device. 39. The computer-readable medium according to claim 31, wherein the data to be transmitted by the sending device is streaming data and each block of the streaming data is stored in the input/output buffer upon transmission of the previously stored block of the streaming data to the receiving device, and
the data to be transmitted by the receiving device is streaming data and each block of the streaming data is stored in the input/output buffer upon transmission of the previously stored block of the streaming data to the sending device. 40. The computer-readable medium according to claim 39, wherein transforming the contents of the secret session key properties descriptor buffer in the sending device includes encrypting the contents of the secret session key properties descriptor buffer using symmetric secret key encryption and the unique user keycode number of the receiving device,
restoring the contents of the copied mangled secret session key properties descriptor buffer of the receiving device includes decrypting with the symmetric secret key encryption and the unique user keycode number of the receiving device, transforming the contents of the secret session key properties descriptor buffer in the receiving device includes encrypting the contents of the secret session key properties descriptor buffer using symmetric secret key encryption and the unique user keycode number of the sending device, and restoring the contents of the copied mangled secret session key properties descriptor buffer of the sending device includes decrypting with the symmetric secret key encryption and the unique user keycode number of the sending device. | 2,400 |
6,778 | 6,778 | 13,925,168 | 2,482 | A computer-implemented system and method for providing additional information associated with an object visually present in media content in response to selection of the object in the media content by a user is provided. Object parameters are established in association with the object. The object parameters are stored in a database. The additional information is linked to the object parameters. Selection event parameters are received in response to a selection event by the user selecting the object in the media content during playback of the media content. The selection event parameters are compared to the object parameters in the database. The method determines whether the selection event parameters are within the object parameters. The additional information is retrieved if the selection event parameters are within the object parameters such that the additional information is displayable to the user without interfering with playback of the media content. | 1. A computer-implemented method for providing additional information associated with an object visually present in media content in response to selection of the object in the media content by a user, said method comprising the steps of:
establishing object parameters comprising user-defined time and user-defined positional data associated with the object; storing the object parameters in a database; linking the object parameters with the additional information; receiving selection event parameters in response to a selection event by the user selecting the object in the media content during playback of the media content, the selection event parameters comprising selection time and selection positional data corresponding to the selection event; comparing the selection event parameters to the object parameters in the database; determining whether the selection event parameters are within the object parameters; and retrieving the additional information if the selection event parameters are within the object parameters such that the additional information is displayable to the user without interfering with playback of the media content. 2. A computer-implemented method as set forth in claim 1 further including the step of defining a region in relation to the object. 3. A computer-implemented method as set forth in claim 2 wherein the step of establishing object parameters is further defined as establishing object parameters associated with the region defined in relation to the object. 4. A computer-implemented method as set forth in claim 2 wherein the step of storing the object parameters in the database occurs such that the region defined in relation to the object is not displayed over the object during playback of the media content. 5. A computer-implemented method as set forth in claim 2 wherein the object includes attributes comprising media-defined time and media-defined positional data corresponding to the object, wherein the step of defining the region occurs in relation to the attributes of the object. 6. A computer-implemented method as set forth in claim 2 further including the step of re-defining the region in response to changes to the attributes of the object in the media content. 7. A computer-implemented method as set forth in claim 6 further including the step of storing the object parameters associated with the re-defined region in the database. 8. A computer-implemented method as set forth in claim 2 further including the step of defining a plurality of regions in relation to the object. 9. A computer-implemented method as set forth in claim 8 further including the step of storing the object parameters associated with the plurality of regions in the database. 10. A computer-implemented method as set forth in claim 2 wherein the step of defining the region occurs without accessing individual frames of the media content. 11. A computer-implemented method as set forth in claim 2 wherein the step of determining whether the selection event parameters are within the object parameters is further defined as determining whether the selection event parameters are within the object parameters associated with the region. 12. A computer-implemented method as set forth in claim 2 wherein the step of retrieving the additional information is further defined as retrieving the additional information if the selection event parameters are within the object parameters associated with the region. 13. A computer-implemented method as set forth in claim 1 further including the step of re-establishing object parameters in response to changes to the object in the media content. 14. A computer-implemented method as set forth in claim 1 wherein the step of establishing object parameters occurs without accessing individual frames of the media content. 15. A computer-implemented method as set forth in claim 1 further including the step of storing the additional information linked with the object parameters to the database. 16. A computer-implemented method as set forth in claim 1 further including the step of accessing the object parameters from the database in response to the selection event. 17. A computer-implemented method as set forth in claim 1 wherein the step of receiving selection event parameters in response to a selection event occurs by the user directly selecting the object in the media content without utilizing a layer that is separate from the media content. 18. A computer-implemented method as set forth in claim 1 wherein the step of determining whether the selection event parameters are within the object parameters is further defined as determining whether any part of the positional data corresponding to the selection event is within the positional data associated with the object at a given time. 19. A computer-implemented method as set forth in claim 1 wherein the additional information includes advertising information related to the object, wherein the step of retrieving the additional information is further defined as displaying the advertising information to the user. 20. A computer-implemented method as set forth in claim 1 wherein the step of retrieving the additional information is further defined as displaying the additional information in at least one of a player of the media content and a window separate from the player. 21. A computer-implemented method as set forth in claim 1 further including the step of collecting data related to the object selected by the user in the media content. 22. A computer-implemented method as set forth in claim 21 further including the step of tracking user preferences based upon the collected data. 23. A computer-implemented method for providing additional information associated with an object visually present in media content in response to selection of the object in the media content by a user, said method comprising the steps of:
defining a region in relation to the object; establishing object parameters comprising user-defined time and user-defined positional data corresponding to the region; storing the object parameters in a database such that the region defined in relation to the object is not displayed over the object during playback of the media content; linking the object parameters with the additional information; receiving selection event parameters in response to a selection event by the user directly selecting the object in the media content during playback of the media content without utilizing a layer that is separate from the media content, the selection event parameters comprising selection time and selection positional data corresponding to the selection event; accessing the object parameters from the database in response to the selection event; comparing the selection event parameters to the object parameters in the database; determining whether the selection event parameters are within the object parameters corresponding to the region; and retrieving the additional information if the selection event parameters are within the object parameters such that the additional information is displayable to the user without interfering with playback of the media content. | A computer-implemented system and method for providing additional information associated with an object visually present in media content in response to selection of the object in the media content by a user is provided. Object parameters are established in association with the object. The object parameters are stored in a database. The additional information is linked to the object parameters. Selection event parameters are received in response to a selection event by the user selecting the object in the media content during playback of the media content. The selection event parameters are compared to the object parameters in the database. The method determines whether the selection event parameters are within the object parameters. The additional information is retrieved if the selection event parameters are within the object parameters such that the additional information is displayable to the user without interfering with playback of the media content.1. A computer-implemented method for providing additional information associated with an object visually present in media content in response to selection of the object in the media content by a user, said method comprising the steps of:
establishing object parameters comprising user-defined time and user-defined positional data associated with the object; storing the object parameters in a database; linking the object parameters with the additional information; receiving selection event parameters in response to a selection event by the user selecting the object in the media content during playback of the media content, the selection event parameters comprising selection time and selection positional data corresponding to the selection event; comparing the selection event parameters to the object parameters in the database; determining whether the selection event parameters are within the object parameters; and retrieving the additional information if the selection event parameters are within the object parameters such that the additional information is displayable to the user without interfering with playback of the media content. 2. A computer-implemented method as set forth in claim 1 further including the step of defining a region in relation to the object. 3. A computer-implemented method as set forth in claim 2 wherein the step of establishing object parameters is further defined as establishing object parameters associated with the region defined in relation to the object. 4. A computer-implemented method as set forth in claim 2 wherein the step of storing the object parameters in the database occurs such that the region defined in relation to the object is not displayed over the object during playback of the media content. 5. A computer-implemented method as set forth in claim 2 wherein the object includes attributes comprising media-defined time and media-defined positional data corresponding to the object, wherein the step of defining the region occurs in relation to the attributes of the object. 6. A computer-implemented method as set forth in claim 2 further including the step of re-defining the region in response to changes to the attributes of the object in the media content. 7. A computer-implemented method as set forth in claim 6 further including the step of storing the object parameters associated with the re-defined region in the database. 8. A computer-implemented method as set forth in claim 2 further including the step of defining a plurality of regions in relation to the object. 9. A computer-implemented method as set forth in claim 8 further including the step of storing the object parameters associated with the plurality of regions in the database. 10. A computer-implemented method as set forth in claim 2 wherein the step of defining the region occurs without accessing individual frames of the media content. 11. A computer-implemented method as set forth in claim 2 wherein the step of determining whether the selection event parameters are within the object parameters is further defined as determining whether the selection event parameters are within the object parameters associated with the region. 12. A computer-implemented method as set forth in claim 2 wherein the step of retrieving the additional information is further defined as retrieving the additional information if the selection event parameters are within the object parameters associated with the region. 13. A computer-implemented method as set forth in claim 1 further including the step of re-establishing object parameters in response to changes to the object in the media content. 14. A computer-implemented method as set forth in claim 1 wherein the step of establishing object parameters occurs without accessing individual frames of the media content. 15. A computer-implemented method as set forth in claim 1 further including the step of storing the additional information linked with the object parameters to the database. 16. A computer-implemented method as set forth in claim 1 further including the step of accessing the object parameters from the database in response to the selection event. 17. A computer-implemented method as set forth in claim 1 wherein the step of receiving selection event parameters in response to a selection event occurs by the user directly selecting the object in the media content without utilizing a layer that is separate from the media content. 18. A computer-implemented method as set forth in claim 1 wherein the step of determining whether the selection event parameters are within the object parameters is further defined as determining whether any part of the positional data corresponding to the selection event is within the positional data associated with the object at a given time. 19. A computer-implemented method as set forth in claim 1 wherein the additional information includes advertising information related to the object, wherein the step of retrieving the additional information is further defined as displaying the advertising information to the user. 20. A computer-implemented method as set forth in claim 1 wherein the step of retrieving the additional information is further defined as displaying the additional information in at least one of a player of the media content and a window separate from the player. 21. A computer-implemented method as set forth in claim 1 further including the step of collecting data related to the object selected by the user in the media content. 22. A computer-implemented method as set forth in claim 21 further including the step of tracking user preferences based upon the collected data. 23. A computer-implemented method for providing additional information associated with an object visually present in media content in response to selection of the object in the media content by a user, said method comprising the steps of:
defining a region in relation to the object; establishing object parameters comprising user-defined time and user-defined positional data corresponding to the region; storing the object parameters in a database such that the region defined in relation to the object is not displayed over the object during playback of the media content; linking the object parameters with the additional information; receiving selection event parameters in response to a selection event by the user directly selecting the object in the media content during playback of the media content without utilizing a layer that is separate from the media content, the selection event parameters comprising selection time and selection positional data corresponding to the selection event; accessing the object parameters from the database in response to the selection event; comparing the selection event parameters to the object parameters in the database; determining whether the selection event parameters are within the object parameters corresponding to the region; and retrieving the additional information if the selection event parameters are within the object parameters such that the additional information is displayable to the user without interfering with playback of the media content. | 2,400 |
6,779 | 6,779 | 13,422,085 | 2,449 | A system for monitoring a location may include a local agent device at the location, and at least one sub-system at the location. The sub-system(s) is in communication with the local agent device. The local agent device is configured to detect and automatically respond to a first event occurring at or within the sub-system(s) according to a first procedure. The local agent device is configured to contact a monitoring center that is remotely located from the location when the local agent device detects a second event occurring at or within the sub-system(s) according to a second procedure. | 1. A system for monitoring a location, the system comprising:
a local agent device at the location; and at least one sub-system at the location, wherein the at least one sub-system is in communication with the local agent device, wherein the local agent device is configured to detect and automatically respond to a first event occurring at or within the at least one sub-system according to a first procedure, and wherein the local agent device is configured to contact a monitoring center that is remotely located from the location when the local agent device detects a second event occurring at or within the at least one sub-system according to a second procedure. 2. The system of claim 1, wherein the local agent device comprises a server, wherein the server comprises a housing configured to be positioned on or underneath a desk at the location. 3. The system of claim 1, wherein the at least one sub-system comprises one or more of a business sub-system, a home sub-system, a video monitoring sub-system, a card access sub-system, or a security sub-system. 4. The system of claim 1, wherein the first event comprises an alarm event that is pre-defined and stored within the local agent device. 5. The system of claim 1, wherein the second event comprises an emergency event that is pre-defined and stored within the local agent device. 6. The system of claim 1, wherein the first procedure comprises the local agent device sending an email to an individual associated with the location. 7. The system of claim 1, wherein the second procedure comprises the local agent device sending an alert to the monitoring center, wherein the alert prompts personnel at the monitoring center to take further action. 8. The system of claim 1, wherein one or both of the local agent device and the monitoring center generates an incident report of the first or second event, and wherein one or both of the local agent device or the monitoring center sends the incident report to an individual associated with the location. 9. The system of claim 1, wherein the local agent comprises a control block having a processor in communication with a memory and a database, wherein the first and second procedures are stored in the memory, and wherein the processor is configured to store incident reports in the database. 10. A system for monitoring a location, the system comprising:
a plurality of sub-systems at a first location; a local agent device at the first location, wherein the local agent device is in communication with each of the plurality of sub-systems, wherein the local agent device is configured to detect and automatically respond to one or more first events occurring at or within the plurality of sub-systems according to first procedures; and a monitoring center at a second location that is separate, distinct, and remote from the first location, wherein the local agent device is configured to contact the monitoring center when the local agent device detects one or more second events occurring at or within the plurality of sub-systems and act according to second procedures associated with the one or more second events. 11. The system of claim 10, wherein the local agent device comprises a server, wherein the server comprises a housing configured to be positioned on or underneath a desk at the first location. 12. The system of claim 10, wherein the plurality of sub-systems comprise one or more of a business sub-system, a home sub-system, a video monitoring sub-system, a card access sub-system, or a security sub-system. 13. The system of claim 10, wherein the first events comprise alarm events that are pre-defined and stored within the local agent device. 14. The system of claim 10, wherein the second events comprise emergency events that are pre-defined and stored within the local agent device. 15. The system of claim 10, wherein the first procedures comprise the local agent device sending an email to an individual associated with the first location. 16. The system of claim 10, wherein the second procedures comprise the local agent device sending an alert to the monitoring center, wherein the alert prompts personnel at the monitoring center to take further action. 17. The system of claim 10, wherein one or both of the local agent device and the monitoring center generate incident reports of the first or second events, and wherein one or both of the local agent device or the monitoring center send the incident reports to an individual associated with the first location. 18. The system of claim 10, wherein the local agent comprises a control block having a processor in communication with a memory and a database, wherein the first and second procedures are stored in the memory, and wherein the processor is configured to store incident reports in the database. 19. A method of monitoring a location, the method comprising:
communicatively connecting a plurality of sub-systems at a first location to a local agent device at the first location; monitoring the plurality of sub-systems with the local agent device; detecting a first event at or within one of the plurality of sub-systems with the local agent device at the first location; automatically responding, with the local agent device at the first location, to the first event at or within one of the plurality of subsystems according to a first procedure; detecting a second event at or within one of the plurality of sub-systems with the local agent device at the first location; sending, from the local agent device, an alert regarding the second event to a monitoring center at a second location that is separate, distinct and remote from the first location of the second events; responding, by the monitoring center at the second location, to the second event according to a second procedure. 20. The method of claim 19, wherein the plurality of sub-systems comprise one or more of a business sub-system, a home sub-system, a video monitoring sub-system, a card access sub-system, or a security sub-system. 21. The method of claim 19, wherein the first event comprises an alarm event that is pre-defined and stored within the local agent device, and wherein the second event comprises an emergency event that is pre-defined and stored within the local agent device. 22. The method of claim 19, wherein the first procedure comprises the local agent device sending an email to an individual associated with the first location, and wherein the second procedure comprises the local agent device sending an alert to the monitoring center, wherein the alert prompts personnel at the monitoring center to take further action. 23. The method of claim 19, further comprising:
generating an incident report of the second event, and sending the incident report to an individual associated with the first location. | A system for monitoring a location may include a local agent device at the location, and at least one sub-system at the location. The sub-system(s) is in communication with the local agent device. The local agent device is configured to detect and automatically respond to a first event occurring at or within the sub-system(s) according to a first procedure. The local agent device is configured to contact a monitoring center that is remotely located from the location when the local agent device detects a second event occurring at or within the sub-system(s) according to a second procedure.1. A system for monitoring a location, the system comprising:
a local agent device at the location; and at least one sub-system at the location, wherein the at least one sub-system is in communication with the local agent device, wherein the local agent device is configured to detect and automatically respond to a first event occurring at or within the at least one sub-system according to a first procedure, and wherein the local agent device is configured to contact a monitoring center that is remotely located from the location when the local agent device detects a second event occurring at or within the at least one sub-system according to a second procedure. 2. The system of claim 1, wherein the local agent device comprises a server, wherein the server comprises a housing configured to be positioned on or underneath a desk at the location. 3. The system of claim 1, wherein the at least one sub-system comprises one or more of a business sub-system, a home sub-system, a video monitoring sub-system, a card access sub-system, or a security sub-system. 4. The system of claim 1, wherein the first event comprises an alarm event that is pre-defined and stored within the local agent device. 5. The system of claim 1, wherein the second event comprises an emergency event that is pre-defined and stored within the local agent device. 6. The system of claim 1, wherein the first procedure comprises the local agent device sending an email to an individual associated with the location. 7. The system of claim 1, wherein the second procedure comprises the local agent device sending an alert to the monitoring center, wherein the alert prompts personnel at the monitoring center to take further action. 8. The system of claim 1, wherein one or both of the local agent device and the monitoring center generates an incident report of the first or second event, and wherein one or both of the local agent device or the monitoring center sends the incident report to an individual associated with the location. 9. The system of claim 1, wherein the local agent comprises a control block having a processor in communication with a memory and a database, wherein the first and second procedures are stored in the memory, and wherein the processor is configured to store incident reports in the database. 10. A system for monitoring a location, the system comprising:
a plurality of sub-systems at a first location; a local agent device at the first location, wherein the local agent device is in communication with each of the plurality of sub-systems, wherein the local agent device is configured to detect and automatically respond to one or more first events occurring at or within the plurality of sub-systems according to first procedures; and a monitoring center at a second location that is separate, distinct, and remote from the first location, wherein the local agent device is configured to contact the monitoring center when the local agent device detects one or more second events occurring at or within the plurality of sub-systems and act according to second procedures associated with the one or more second events. 11. The system of claim 10, wherein the local agent device comprises a server, wherein the server comprises a housing configured to be positioned on or underneath a desk at the first location. 12. The system of claim 10, wherein the plurality of sub-systems comprise one or more of a business sub-system, a home sub-system, a video monitoring sub-system, a card access sub-system, or a security sub-system. 13. The system of claim 10, wherein the first events comprise alarm events that are pre-defined and stored within the local agent device. 14. The system of claim 10, wherein the second events comprise emergency events that are pre-defined and stored within the local agent device. 15. The system of claim 10, wherein the first procedures comprise the local agent device sending an email to an individual associated with the first location. 16. The system of claim 10, wherein the second procedures comprise the local agent device sending an alert to the monitoring center, wherein the alert prompts personnel at the monitoring center to take further action. 17. The system of claim 10, wherein one or both of the local agent device and the monitoring center generate incident reports of the first or second events, and wherein one or both of the local agent device or the monitoring center send the incident reports to an individual associated with the first location. 18. The system of claim 10, wherein the local agent comprises a control block having a processor in communication with a memory and a database, wherein the first and second procedures are stored in the memory, and wherein the processor is configured to store incident reports in the database. 19. A method of monitoring a location, the method comprising:
communicatively connecting a plurality of sub-systems at a first location to a local agent device at the first location; monitoring the plurality of sub-systems with the local agent device; detecting a first event at or within one of the plurality of sub-systems with the local agent device at the first location; automatically responding, with the local agent device at the first location, to the first event at or within one of the plurality of subsystems according to a first procedure; detecting a second event at or within one of the plurality of sub-systems with the local agent device at the first location; sending, from the local agent device, an alert regarding the second event to a monitoring center at a second location that is separate, distinct and remote from the first location of the second events; responding, by the monitoring center at the second location, to the second event according to a second procedure. 20. The method of claim 19, wherein the plurality of sub-systems comprise one or more of a business sub-system, a home sub-system, a video monitoring sub-system, a card access sub-system, or a security sub-system. 21. The method of claim 19, wherein the first event comprises an alarm event that is pre-defined and stored within the local agent device, and wherein the second event comprises an emergency event that is pre-defined and stored within the local agent device. 22. The method of claim 19, wherein the first procedure comprises the local agent device sending an email to an individual associated with the first location, and wherein the second procedure comprises the local agent device sending an alert to the monitoring center, wherein the alert prompts personnel at the monitoring center to take further action. 23. The method of claim 19, further comprising:
generating an incident report of the second event, and sending the incident report to an individual associated with the first location. | 2,400 |
6,780 | 6,780 | 14,571,177 | 2,466 | Coordinate multi-point (CoMP) transmission is facilitated by resolving collisions between feedback reporting. Based upon the conditions within the network, collision resolution may be by dropping a channel report during a subframe, multiplexing channel reports from a plurality of user equipment, compressing channel reports from a plurality of user equipment, and combined reporting, either through joint reports or by using carrier aggregation, for conditions between a user equipment and a plurality of transmission points. New signaling and reporting formats facilitate selection of a collision resolution suitable for current network conditions. | 1-38. (canceled) 39. A method for reporting Channel State Information (CSI) in a mobile station, the method comprising:
obtaining a CSI configuration associated with a CSI-reference signal (CSI-RS) information, a CSI-interference measurement information and a reference Rank Indicator (RI) CSI configuration information; obtaining CSI value for the CSI configuration based on the CSI-RS information, the CSI-interference measurement information and the reference RI CSI configuration information; and reporting the obtained CSI value to a base station, wherein the obtained CSI value comprises at least one of CQI, PMI and RI, and the RI for the obtained CSI value is same as a RI for the reference RI CSI configuration. 40. The method according to claim 39, wherein the basis CSI configuration for a RI is configured by a higher layer. 41. The method according to claim 39, wherein the CSI configuration is for a periodic CSI report and an aperiodic CSI report. 42. The method according to claim 39, wherein the CSI configuration is further associated with a CSI-process ID. 43. The method according to claim 39, wherein the basis CSI configuration information for a RI is a CSI-process ID being a RI reference. 44. The method according to claim 39, wherein the CSI configuration is further associated with a codebook subset restriction information. 45. A user equipment for reporting Channel State Information, CSI, feedback, the user equipment comprising:
a controller configured to obtain a CSI configuration associated with a CSI-reference signal (CSI-RS) information, a CSI-interference measurement information and a reference Rank Indicator (RI) CSI configuration information, and to obtain CSI value for the CSI configuration based on the CSI-RS information, the CSI-interference measurement information and the reference RI CSI configuration information; and a transceiver configured to report the obtained CSI value to a base station, wherein the obtained CSI value comprises at least one of CQI, PMI and RI, and the RI for the obtained CSI value is same as a RI for the reference RI CSI configuration. 46. The user equipment according to claim 45 wherein the basis CSI configuration for a RI is configured by a higher layer. 47. The user equipment according to claim 45, wherein the CSI configuration is for a periodic CSI report and an aperiodic CSI report. 48. The user equipment according to claim 45, wherein the CSI configuration is further associated with a CSI-process ID. 49. The user equipment according to claim 45, wherein the basis CSI configuration information for a RI is a CSI-process ID being a RI reference. 50. The user equipment according to claim 45, wherein the CSI configuration is further associated with a codebook subset restriction information. 51. A method for receiving Channel State Information, CSI, feedback in a base station, the method comprising:
receiving CSI reports and Rank Indicators, RIs, from a user equipment; and scheduling at least one transmission for the user equipment based on the CSI reports and the RIs, wherein the CSI reports correspond to CSI configurations each being associated with a CSI-reference signal, CSI-RS, resource and a CSI-interference measurement resource, and wherein a first RI for a first CSI configuration is selected based on a second RI for a second CSI configuration by the user equipment. 52. The method according to claim 51, wherein the first RI for the first CSI configuration is selected as the same as the second RI for the second CSI configuration. 53. The method according to claim 51, wherein the second CSI configuration is configured in the user equipment by higher layers. 54. The method according to claim 51, wherein each of the CSI reports comprises CSI reference signal (CSI-RS) information. 55. The method according to claim 51, wherein one of the RIs is employed for CSI reporting by the user equipment to two or more of a plurality of transmission points which the user equipment is receiving signals. 56. The method according to claim 51, wherein one of the CSI reports comprises a periodic CSI report. 57. The method according to claim 51, wherein one of the CSI reports comprises an aperiodic CSI report. 58. A base station for receiving Channel State Information, CSI, feedback, the base station comprising:
a transceiver controller configured to receive CSI reports and Rank Indicators, RIs, from a user equipment; and a scheduler configured to schedule at least one transmission for the user equipment based on the CSI reports and the RIs, wherein the CSI reports correspond to CSI configurations each being associated with a CSI-reference signal, CSI-RS, resource and a CSI-interference measurement resource, and wherein a first RI for a first CSI configuration is selected based on a second RI for a second CSI configuration by the user equipment. 59. The base station according to claim 58, wherein the first RI for the first CSI configuration is selected as the same as the second RI for the second CSI configuration. 60. The base station according to claim 58, wherein the second CSI configuration is configured in the user equipment by higher layers. 61. The base station according to claims 58, wherein each of the CSI reports comprises CSI reference signal (CSI-RS) information. 62. The base station according to claim 58, wherein one of the RIs is employed for CSI reporting by the user equipment to two or more of a plurality of transmission points which the user equipment is receiving signals. 63. The base station according to claim 58, wherein one of the CSI reports comprises a periodic CSI report. 64. The base station according to claim 58, wherein one of the CSI reports comprises an aperiodic CSI report. | Coordinate multi-point (CoMP) transmission is facilitated by resolving collisions between feedback reporting. Based upon the conditions within the network, collision resolution may be by dropping a channel report during a subframe, multiplexing channel reports from a plurality of user equipment, compressing channel reports from a plurality of user equipment, and combined reporting, either through joint reports or by using carrier aggregation, for conditions between a user equipment and a plurality of transmission points. New signaling and reporting formats facilitate selection of a collision resolution suitable for current network conditions.1-38. (canceled) 39. A method for reporting Channel State Information (CSI) in a mobile station, the method comprising:
obtaining a CSI configuration associated with a CSI-reference signal (CSI-RS) information, a CSI-interference measurement information and a reference Rank Indicator (RI) CSI configuration information; obtaining CSI value for the CSI configuration based on the CSI-RS information, the CSI-interference measurement information and the reference RI CSI configuration information; and reporting the obtained CSI value to a base station, wherein the obtained CSI value comprises at least one of CQI, PMI and RI, and the RI for the obtained CSI value is same as a RI for the reference RI CSI configuration. 40. The method according to claim 39, wherein the basis CSI configuration for a RI is configured by a higher layer. 41. The method according to claim 39, wherein the CSI configuration is for a periodic CSI report and an aperiodic CSI report. 42. The method according to claim 39, wherein the CSI configuration is further associated with a CSI-process ID. 43. The method according to claim 39, wherein the basis CSI configuration information for a RI is a CSI-process ID being a RI reference. 44. The method according to claim 39, wherein the CSI configuration is further associated with a codebook subset restriction information. 45. A user equipment for reporting Channel State Information, CSI, feedback, the user equipment comprising:
a controller configured to obtain a CSI configuration associated with a CSI-reference signal (CSI-RS) information, a CSI-interference measurement information and a reference Rank Indicator (RI) CSI configuration information, and to obtain CSI value for the CSI configuration based on the CSI-RS information, the CSI-interference measurement information and the reference RI CSI configuration information; and a transceiver configured to report the obtained CSI value to a base station, wherein the obtained CSI value comprises at least one of CQI, PMI and RI, and the RI for the obtained CSI value is same as a RI for the reference RI CSI configuration. 46. The user equipment according to claim 45 wherein the basis CSI configuration for a RI is configured by a higher layer. 47. The user equipment according to claim 45, wherein the CSI configuration is for a periodic CSI report and an aperiodic CSI report. 48. The user equipment according to claim 45, wherein the CSI configuration is further associated with a CSI-process ID. 49. The user equipment according to claim 45, wherein the basis CSI configuration information for a RI is a CSI-process ID being a RI reference. 50. The user equipment according to claim 45, wherein the CSI configuration is further associated with a codebook subset restriction information. 51. A method for receiving Channel State Information, CSI, feedback in a base station, the method comprising:
receiving CSI reports and Rank Indicators, RIs, from a user equipment; and scheduling at least one transmission for the user equipment based on the CSI reports and the RIs, wherein the CSI reports correspond to CSI configurations each being associated with a CSI-reference signal, CSI-RS, resource and a CSI-interference measurement resource, and wherein a first RI for a first CSI configuration is selected based on a second RI for a second CSI configuration by the user equipment. 52. The method according to claim 51, wherein the first RI for the first CSI configuration is selected as the same as the second RI for the second CSI configuration. 53. The method according to claim 51, wherein the second CSI configuration is configured in the user equipment by higher layers. 54. The method according to claim 51, wherein each of the CSI reports comprises CSI reference signal (CSI-RS) information. 55. The method according to claim 51, wherein one of the RIs is employed for CSI reporting by the user equipment to two or more of a plurality of transmission points which the user equipment is receiving signals. 56. The method according to claim 51, wherein one of the CSI reports comprises a periodic CSI report. 57. The method according to claim 51, wherein one of the CSI reports comprises an aperiodic CSI report. 58. A base station for receiving Channel State Information, CSI, feedback, the base station comprising:
a transceiver controller configured to receive CSI reports and Rank Indicators, RIs, from a user equipment; and a scheduler configured to schedule at least one transmission for the user equipment based on the CSI reports and the RIs, wherein the CSI reports correspond to CSI configurations each being associated with a CSI-reference signal, CSI-RS, resource and a CSI-interference measurement resource, and wherein a first RI for a first CSI configuration is selected based on a second RI for a second CSI configuration by the user equipment. 59. The base station according to claim 58, wherein the first RI for the first CSI configuration is selected as the same as the second RI for the second CSI configuration. 60. The base station according to claim 58, wherein the second CSI configuration is configured in the user equipment by higher layers. 61. The base station according to claims 58, wherein each of the CSI reports comprises CSI reference signal (CSI-RS) information. 62. The base station according to claim 58, wherein one of the RIs is employed for CSI reporting by the user equipment to two or more of a plurality of transmission points which the user equipment is receiving signals. 63. The base station according to claim 58, wherein one of the CSI reports comprises a periodic CSI report. 64. The base station according to claim 58, wherein one of the CSI reports comprises an aperiodic CSI report. | 2,400 |
6,781 | 6,781 | 13,292,028 | 2,443 | A control device transmits a first type of signal and a second type of signal as part of transmitting an instruction. An electronic device receives the first signal and determines the control device is paired with another device. The electronic device displays a notification indicating such as well as a prompt requesting confirmation to pair the control device. Upon receiving an affirmative response, the electronic device notifies the other device, which transmits unpairing information to the control device. The control device then unpairs from the other device. The other device also transmits pairing information to the control device via the electronic device and the control device utilizes the information to pair with the electronic device. In some implementations, the other device may receive a request to locate the control device. In response, the other device displays that the control device has been paired with the electronic device. | 1. A method for reconfiguring remote control devices for different electronic devices in a network, the method comprising:
receiving a first signal of a first type at a first electronic device of a network of a plurality of electronic devices wherein the first signal is transmitted by a control device as part of transmitting a first plurality of signals, including the first signal and a second signal of a second type, to a second electronic device of the network of the plurality of electronic devices that is paired with the control device that instructs the second electronic device to perform at least one operation; determining, utilizing the first electronic device, that the control device is paired with the second electronic device; transmitting at least one prompt from the first electronic device to at least one display device requesting confirmation to pair the control device with the first electronic device; upon receipt of the confirmation from the control device, transmitting a notification from the first electronic device to the second electronic device that the control device will be paired with the first electronic device; and pairing the control device with the first electronic device. 2. The method of claim 1, further comprising receiving a third signal of the first type and a fourth signal of the second type at the first electronic device from the control device wherein the third signal and the fourth signal are transmitted by the control device, after the control device is paired with the second electronic device, as part of transmitting a second plurality of signals to the first electronic device that instructs the first electronic device to perform at least one additional operation. 3. The method of claim 1, wherein said operation of determining, utilizing the first electronic device, that the control device is paired with the second electronic device further comprises at least one of:
determining that an electronic device of the network of the plurality of electronic devices other than the first electronic device received the second signal of the second type; or looking up at least one identifier included in the first signal of the first type in at least one database shared by at least the first electronic device and the second electronic device. 4. The method of claim 1, wherein said operation of pairing the control device with the first electronic device further comprises transmitting information to pair the control device with the first electronic device to the control device after the control device has received a message to unpair from the second electronic device. 5. The method of claim 4, wherein said operation of transmitting information to pair the control device with the first electronic device to the control device after the control device has received a message to unpair from the second electronic device further comprises:
receiving at least a portion of the information at the first electronic device from the second electronic device; and transmitting the information from the first electronic device to the control device. 6. The method of claim 5, wherein said operation of transmitting the information from the first electronic device to the control device further comprises transmitting at least one command code for controlling at least one component associated with the first electronic device from the first electronic device to the control device. 7. A method for reconfiguring remote control devices for different electronic devices in a network, the method comprising:
receiving a first signal of a first type at a first electronic device of a network of a plurality of electronic devices wherein the first signal is transmitted by a control device as part of transmitting a first plurality of signals, including the first signal and a second signal of a second type, to the first electronic device of the network of the plurality of electronic devices that is paired with the control device that instructs the first electronic device to perform at least one operation; receiving a notification at the first electronic device from a second electronic device of the network of the plurality of electronic device that the control device will be paired with the second electronic device wherein the second electronic device received the second signal of the second type and a confirmation in response to a prompt to pair the control device with the second electronic device; in response to the notification, transmitting at least one message from the first electronic device to the control device instructing the control device to unpair from the first electronic device; and transmitting information to pair the control device with the second electronic device from the first electronic device to the control device. 8. The method of claim 7, wherein said operation of transmitting information to pair the control device with the second electronic device from the first electronic device to the control device further comprises transmitting the information from the first electronic device to the control device via the second electronic device. 9. The method of claim 7, further comprising:
receiving a request at the first electronic device to locate the control device; determining that the first electronic device last communicated regarding the control device when transmitting the information to pair the control device with the second electronic device; and transmitting at least one message from the first electronic device to at least one display device indicating that the control device was paired with the second electronic device. 10. A system for reconfiguring remote control devices for different electronic devices in a network, comprising:
a first electronic device of a network of a plurality of electronic devices, comprising:
at least one communication component comprising at least one transmitting component of a first type and at least one transmitting component of a second type; and
at least one processing unit;
wherein the at least one processing unit:
receives a first signal of a first type via the at least one communication component wherein the first signal is transmitted by a control device as part of transmitting a first plurality of signals, including the first signal and a second signal of a second type, to a second electronic device of the network of the plurality of electronic devices that is paired with the control device that instructs the second electronic device to perform at least one operation;
determines that the control device is paired with the second electronic device;
transmits at least one prompt via the at least one communication component to at least one display device requesting confirmation to pair the control device with the first electronic device;
upon receipt of the confirmation from the control device, transmits a notification via the at least one communication component to the second electronic device that the control device will be paired with the first electronic device; and
pairs the control device with the first electronic device. 11. The system of claim 10, further comprising the second electronic device comprising at least one second device communication component and at least one second device processing unit wherein the at least one second device processing unit:
receives the second signal of the second type and the notification via the at least one second device communication component, transmits at least one message to the control device instructing the control device to unpair from the second electronic device, and transmits information to pair the control device with the first electronic device to the control device. 12. The system of claim 11, wherein the at least one second device processing unit transmits the information to the control device via the first electronic device. 13. The system of claim 12, wherein the at least one processing unit pairs the control device with the first electronic device by transmitting the information received from the second electronic device to the control device via the at least one communication component along with at least one command code for at least one component associated with the first electronic device. 14. The system of claim 11, wherein the at least one second device processing unit receives a request, via the at least one second device communication component, to locate the control device and transmits at least one message to at least one presentation device indicating that the control device was paired with the first electronic device. 15. The system of claim 10, wherein the at least one prompt includes at least one indicator indicating that the control device is paired with the second electronic device. 16. The system of claim 10, wherein the at least one processing unit receives a second plurality of signals, including a third signal of the first type and a fourth signal of the second type, from the control device via the at least one communication component wherein the second plurality of signals instructs the first electronic device to perform at least one operation. 17. The system of claim 10, wherein the at least one processing unit determines that the control device is paired with the second electronic device by at least one of determining that an electronic device of the network of the plurality of electronic devices other than the first electronic device received the second signal of the second type or looking up at least one identifier included in the first signal of the first type in at least one database shared by at least the first electronic device and the second electronic device. 18. A control device, comprising:
at least one communication component comprising at least one transmitting component of a first type and at least one transmitting component of a second type; and at least one processing unit that is communicably coupled to the at least one communication component; wherein the processing unit: transmits a plurality of signals including at least a first signal of a first type and a second signal of a second type via the at least one communication component to a first electronic device of a network of a plurality of electronic devices to instruct the first electronic device to perform at least one operation wherein the first signal of the first type is received by a second electronic device of the network of the plurality of electronic devices instead of the first electronic device, sends a confirmation via the at least one communication component in response to a prompt presented by the second electronic device confirming to pair the control device with the second electronic device, receives at least one message via the at least one communication component to unpair from the first electronic device, receives information via the at least one communication component to pair with the second electronic device, and utilizes the information to pair with the second electronic device. 19. The control device of claim 18, wherein the first signal of the first type comprises at least one infrared signal and the second signal of the second type comprises at least one radio frequency signal. 20. The control device of claim 18, wherein the processing unit transmits an additional plurality of signals including at least a third signal of the first type and a fourth signal of the second type via the at least one communication component to the second electronic device to instruct the second electronic device to perform at least one additional operation. | A control device transmits a first type of signal and a second type of signal as part of transmitting an instruction. An electronic device receives the first signal and determines the control device is paired with another device. The electronic device displays a notification indicating such as well as a prompt requesting confirmation to pair the control device. Upon receiving an affirmative response, the electronic device notifies the other device, which transmits unpairing information to the control device. The control device then unpairs from the other device. The other device also transmits pairing information to the control device via the electronic device and the control device utilizes the information to pair with the electronic device. In some implementations, the other device may receive a request to locate the control device. In response, the other device displays that the control device has been paired with the electronic device.1. A method for reconfiguring remote control devices for different electronic devices in a network, the method comprising:
receiving a first signal of a first type at a first electronic device of a network of a plurality of electronic devices wherein the first signal is transmitted by a control device as part of transmitting a first plurality of signals, including the first signal and a second signal of a second type, to a second electronic device of the network of the plurality of electronic devices that is paired with the control device that instructs the second electronic device to perform at least one operation; determining, utilizing the first electronic device, that the control device is paired with the second electronic device; transmitting at least one prompt from the first electronic device to at least one display device requesting confirmation to pair the control device with the first electronic device; upon receipt of the confirmation from the control device, transmitting a notification from the first electronic device to the second electronic device that the control device will be paired with the first electronic device; and pairing the control device with the first electronic device. 2. The method of claim 1, further comprising receiving a third signal of the first type and a fourth signal of the second type at the first electronic device from the control device wherein the third signal and the fourth signal are transmitted by the control device, after the control device is paired with the second electronic device, as part of transmitting a second plurality of signals to the first electronic device that instructs the first electronic device to perform at least one additional operation. 3. The method of claim 1, wherein said operation of determining, utilizing the first electronic device, that the control device is paired with the second electronic device further comprises at least one of:
determining that an electronic device of the network of the plurality of electronic devices other than the first electronic device received the second signal of the second type; or looking up at least one identifier included in the first signal of the first type in at least one database shared by at least the first electronic device and the second electronic device. 4. The method of claim 1, wherein said operation of pairing the control device with the first electronic device further comprises transmitting information to pair the control device with the first electronic device to the control device after the control device has received a message to unpair from the second electronic device. 5. The method of claim 4, wherein said operation of transmitting information to pair the control device with the first electronic device to the control device after the control device has received a message to unpair from the second electronic device further comprises:
receiving at least a portion of the information at the first electronic device from the second electronic device; and transmitting the information from the first electronic device to the control device. 6. The method of claim 5, wherein said operation of transmitting the information from the first electronic device to the control device further comprises transmitting at least one command code for controlling at least one component associated with the first electronic device from the first electronic device to the control device. 7. A method for reconfiguring remote control devices for different electronic devices in a network, the method comprising:
receiving a first signal of a first type at a first electronic device of a network of a plurality of electronic devices wherein the first signal is transmitted by a control device as part of transmitting a first plurality of signals, including the first signal and a second signal of a second type, to the first electronic device of the network of the plurality of electronic devices that is paired with the control device that instructs the first electronic device to perform at least one operation; receiving a notification at the first electronic device from a second electronic device of the network of the plurality of electronic device that the control device will be paired with the second electronic device wherein the second electronic device received the second signal of the second type and a confirmation in response to a prompt to pair the control device with the second electronic device; in response to the notification, transmitting at least one message from the first electronic device to the control device instructing the control device to unpair from the first electronic device; and transmitting information to pair the control device with the second electronic device from the first electronic device to the control device. 8. The method of claim 7, wherein said operation of transmitting information to pair the control device with the second electronic device from the first electronic device to the control device further comprises transmitting the information from the first electronic device to the control device via the second electronic device. 9. The method of claim 7, further comprising:
receiving a request at the first electronic device to locate the control device; determining that the first electronic device last communicated regarding the control device when transmitting the information to pair the control device with the second electronic device; and transmitting at least one message from the first electronic device to at least one display device indicating that the control device was paired with the second electronic device. 10. A system for reconfiguring remote control devices for different electronic devices in a network, comprising:
a first electronic device of a network of a plurality of electronic devices, comprising:
at least one communication component comprising at least one transmitting component of a first type and at least one transmitting component of a second type; and
at least one processing unit;
wherein the at least one processing unit:
receives a first signal of a first type via the at least one communication component wherein the first signal is transmitted by a control device as part of transmitting a first plurality of signals, including the first signal and a second signal of a second type, to a second electronic device of the network of the plurality of electronic devices that is paired with the control device that instructs the second electronic device to perform at least one operation;
determines that the control device is paired with the second electronic device;
transmits at least one prompt via the at least one communication component to at least one display device requesting confirmation to pair the control device with the first electronic device;
upon receipt of the confirmation from the control device, transmits a notification via the at least one communication component to the second electronic device that the control device will be paired with the first electronic device; and
pairs the control device with the first electronic device. 11. The system of claim 10, further comprising the second electronic device comprising at least one second device communication component and at least one second device processing unit wherein the at least one second device processing unit:
receives the second signal of the second type and the notification via the at least one second device communication component, transmits at least one message to the control device instructing the control device to unpair from the second electronic device, and transmits information to pair the control device with the first electronic device to the control device. 12. The system of claim 11, wherein the at least one second device processing unit transmits the information to the control device via the first electronic device. 13. The system of claim 12, wherein the at least one processing unit pairs the control device with the first electronic device by transmitting the information received from the second electronic device to the control device via the at least one communication component along with at least one command code for at least one component associated with the first electronic device. 14. The system of claim 11, wherein the at least one second device processing unit receives a request, via the at least one second device communication component, to locate the control device and transmits at least one message to at least one presentation device indicating that the control device was paired with the first electronic device. 15. The system of claim 10, wherein the at least one prompt includes at least one indicator indicating that the control device is paired with the second electronic device. 16. The system of claim 10, wherein the at least one processing unit receives a second plurality of signals, including a third signal of the first type and a fourth signal of the second type, from the control device via the at least one communication component wherein the second plurality of signals instructs the first electronic device to perform at least one operation. 17. The system of claim 10, wherein the at least one processing unit determines that the control device is paired with the second electronic device by at least one of determining that an electronic device of the network of the plurality of electronic devices other than the first electronic device received the second signal of the second type or looking up at least one identifier included in the first signal of the first type in at least one database shared by at least the first electronic device and the second electronic device. 18. A control device, comprising:
at least one communication component comprising at least one transmitting component of a first type and at least one transmitting component of a second type; and at least one processing unit that is communicably coupled to the at least one communication component; wherein the processing unit: transmits a plurality of signals including at least a first signal of a first type and a second signal of a second type via the at least one communication component to a first electronic device of a network of a plurality of electronic devices to instruct the first electronic device to perform at least one operation wherein the first signal of the first type is received by a second electronic device of the network of the plurality of electronic devices instead of the first electronic device, sends a confirmation via the at least one communication component in response to a prompt presented by the second electronic device confirming to pair the control device with the second electronic device, receives at least one message via the at least one communication component to unpair from the first electronic device, receives information via the at least one communication component to pair with the second electronic device, and utilizes the information to pair with the second electronic device. 19. The control device of claim 18, wherein the first signal of the first type comprises at least one infrared signal and the second signal of the second type comprises at least one radio frequency signal. 20. The control device of claim 18, wherein the processing unit transmits an additional plurality of signals including at least a third signal of the first type and a fourth signal of the second type via the at least one communication component to the second electronic device to instruct the second electronic device to perform at least one additional operation. | 2,400 |
6,782 | 6,782 | 13,682,561 | 2,448 | A system and method for transmitting state based input over a network are presented. Embodiments of the present invention are operable to generate vector data comprising a composite of all state data associated with the state of all user input claims of a client system and transmit the vector data from the client device to a host device over a network. Embodiments of the present invention are further operable at the host device to determine a simulated input state at the client side by performing a comparison of the vector data currently received to a last known vector data and rendering output in response to the comparison. | 1. A method of remote network communication, said method comprising:
receiving a current vector data from a remote device over a communication network, said current vector data comprising a composite state representation of state for all user input devices of said remote device; determining simulated user input by performing a comparison of said current vector data to a previously known and stored vector data; and using an application, rendering a display output responsive to said simulated user input. 2. The method of remote network communication described in claim 1, wherein said determining simulated user input further comprises:
determining differences between said current vector data and said previously known vector data; replacing said previously known vector data with said current vector data if said current vector data is different from said previously known vector data; and maintaining said previously known vector data if said current vector data is the same as said previously known vector data. 3. The method of remote network communication described in claim 1, wherein said receiving occurs at fixed time intervals. 4. The method of remote network communication described in claim 1, wherein said receiving occurs at varying time intervals. 5. The method of remote network communication described in claim 1, wherein said user input devices comprise: a keyboard; a mouse; and a gamepad. 6. The method of remote network communication described in claim 1, wherein said communication network utilizes User Datagram Protocol (UDP) technology. 7. The method of remote network communication described in claim 1, wherein said communication network utilizes Transmission Control Protocol (TCP) technology. 8. A method of remote network communication, comprising:
a) sampling user input states of a plurality of user input devices of a remote client device at a current time; b) computing a current vector data representation of said user input states; c) transmitting said current vector data representation to a remote device over a communication network; and d) repeating said (a) sampling, said (b) computing and said (c) transmitting. 9. The method of remote network communication described in claim 8, wherein said user input states comprise a composite state representation of state for all said plurality of user input devices coupled to said remote client device. 10. The method of remote network communication described in claim 8, wherein said plurality of user input devices comprise: a keyboard; a cursor directing device; and a gamepad. 11. The method of remote network communication described in claim 8, wherein said transmitting further comprises:
encoding said current vector data representation; and compressing said current vector data representation. 12. The method of remote network communication described in claim 8, wherein said transmitting occurs at fixed time intervals. 13. The method of remote network communication described in claim 8, wherein said transmitting occurs at varying time intervals. 14. The method of remote network communication described in claim 8, wherein said communication network utilizes User Datagram Protocol (UDP) technology. 15. The method of remote network communication described in claim 8, wherein said communication network utilizes Transmission Control Protocol (TCP) technology. 16. An apparatus for communicating with a client device over a communication network, said apparatus comprising:
a communication module operable to receive a current vector data from said client device over said communication network, wherein said current vector data represents a composite of user input state data across a plurality of user input devices of said client device; a comparison module operable to determine simulated user input by performing a comparison of said current vector data to a previously known vector data; a rendering module operable to render a display output responsive to a determination made by said comparison module; and a transmission module operable to transmit said display output to said client device. 17. The apparatus described in claim 16, wherein said comparison module is further operable to determine differences between said current vector data and said previously known vector data, wherein further said comparison module is operable to replace said previously known vector data with said current vector data if said current vector data is different from said previously known vector data, and wherein said comparison module is further operable to maintain said previously known vector data if said current vector data is the same as said previously known vector data. 18. The apparatus described in claim 16, wherein said communication module is further operable to receive said current vector data at fixed time intervals. 19. The apparatus described in claim 16, wherein said communication module is further operable to receive said current vector data at varying time intervals. 20. The apparatus described in claim 16, wherein said plurality of user input devices comprise: a keyboard; a cursor directing device; and a gamepad. 21. The apparatus described in claim 16, wherein said communication network utilizes User Datagram Protocol (UDP) technology. 22. The apparatus described in claim 16, wherein said communication network utilizes Transmission Control Protocol (TCP) technology. | A system and method for transmitting state based input over a network are presented. Embodiments of the present invention are operable to generate vector data comprising a composite of all state data associated with the state of all user input claims of a client system and transmit the vector data from the client device to a host device over a network. Embodiments of the present invention are further operable at the host device to determine a simulated input state at the client side by performing a comparison of the vector data currently received to a last known vector data and rendering output in response to the comparison.1. A method of remote network communication, said method comprising:
receiving a current vector data from a remote device over a communication network, said current vector data comprising a composite state representation of state for all user input devices of said remote device; determining simulated user input by performing a comparison of said current vector data to a previously known and stored vector data; and using an application, rendering a display output responsive to said simulated user input. 2. The method of remote network communication described in claim 1, wherein said determining simulated user input further comprises:
determining differences between said current vector data and said previously known vector data; replacing said previously known vector data with said current vector data if said current vector data is different from said previously known vector data; and maintaining said previously known vector data if said current vector data is the same as said previously known vector data. 3. The method of remote network communication described in claim 1, wherein said receiving occurs at fixed time intervals. 4. The method of remote network communication described in claim 1, wherein said receiving occurs at varying time intervals. 5. The method of remote network communication described in claim 1, wherein said user input devices comprise: a keyboard; a mouse; and a gamepad. 6. The method of remote network communication described in claim 1, wherein said communication network utilizes User Datagram Protocol (UDP) technology. 7. The method of remote network communication described in claim 1, wherein said communication network utilizes Transmission Control Protocol (TCP) technology. 8. A method of remote network communication, comprising:
a) sampling user input states of a plurality of user input devices of a remote client device at a current time; b) computing a current vector data representation of said user input states; c) transmitting said current vector data representation to a remote device over a communication network; and d) repeating said (a) sampling, said (b) computing and said (c) transmitting. 9. The method of remote network communication described in claim 8, wherein said user input states comprise a composite state representation of state for all said plurality of user input devices coupled to said remote client device. 10. The method of remote network communication described in claim 8, wherein said plurality of user input devices comprise: a keyboard; a cursor directing device; and a gamepad. 11. The method of remote network communication described in claim 8, wherein said transmitting further comprises:
encoding said current vector data representation; and compressing said current vector data representation. 12. The method of remote network communication described in claim 8, wherein said transmitting occurs at fixed time intervals. 13. The method of remote network communication described in claim 8, wherein said transmitting occurs at varying time intervals. 14. The method of remote network communication described in claim 8, wherein said communication network utilizes User Datagram Protocol (UDP) technology. 15. The method of remote network communication described in claim 8, wherein said communication network utilizes Transmission Control Protocol (TCP) technology. 16. An apparatus for communicating with a client device over a communication network, said apparatus comprising:
a communication module operable to receive a current vector data from said client device over said communication network, wherein said current vector data represents a composite of user input state data across a plurality of user input devices of said client device; a comparison module operable to determine simulated user input by performing a comparison of said current vector data to a previously known vector data; a rendering module operable to render a display output responsive to a determination made by said comparison module; and a transmission module operable to transmit said display output to said client device. 17. The apparatus described in claim 16, wherein said comparison module is further operable to determine differences between said current vector data and said previously known vector data, wherein further said comparison module is operable to replace said previously known vector data with said current vector data if said current vector data is different from said previously known vector data, and wherein said comparison module is further operable to maintain said previously known vector data if said current vector data is the same as said previously known vector data. 18. The apparatus described in claim 16, wherein said communication module is further operable to receive said current vector data at fixed time intervals. 19. The apparatus described in claim 16, wherein said communication module is further operable to receive said current vector data at varying time intervals. 20. The apparatus described in claim 16, wherein said plurality of user input devices comprise: a keyboard; a cursor directing device; and a gamepad. 21. The apparatus described in claim 16, wherein said communication network utilizes User Datagram Protocol (UDP) technology. 22. The apparatus described in claim 16, wherein said communication network utilizes Transmission Control Protocol (TCP) technology. | 2,400 |
6,783 | 6,783 | 14,663,156 | 2,439 | An apparatus for testing, inspecting or screening an electrically powered device for modified or unmodified hardware, firmware or software modifications including Malware, Trojans, adware, improper versioning, worms, or virus and the like, includes an antenna positioned at a distance from the electrically powered device and a signal receiver or sensor for examining a signal from the electrically powered device. The receiver or sensor collects unintended RF energy components emitted by the electrically powered device and includes one or more processors and executable instructions that perform analysis in a response to the acquired signal input while the electrically powered device is active or powered. The characteristics of the collected RF energy may be compared with RF energy characteristics of an unmodified device. The comparison determines one of a modified, unmodified or score of certainty of modified condition of the electrically powered device. | 1. An apparatus comprising:
a sensor comprising one or more antennas, low noise amplifier(s) coupled to said one or more antennas, RF tuner(s) and analog to digital converter(s) said sensor configured, to capture unintended emitted electromagnetic energy and/or unintended conducted energy from one or more electrical devices; one or more processors or logic devices; and a computational medium comprising executable instructions that, when executed by said one or more processors or logic devices, cause said one or more processors or logic devices to perform the following steps on said captured unintended emitted electromagnetic energy and/or said unintended conducted energy: measuring a feature value in at least one spectral frequency region of said captured unintended emitted electromagnetic energy and/or unintended conducted energy from said one or more electrical devices, calculating a difference value between said measured feature value and a baseline feature value, verifying, based on said calculated difference value, whether at least one of sub-threshold and super-threshold values have been exceeded in one or more of amplitude, frequency, phase and time domains of signature(s) elements of said captured unintended emitted electromagnetic energy and/or unintended conducted energy, and determining, based on said calculated difference value, a presence or an absence of at least one of malicious software, anomalous software, modified software, malicious firmware, anomalous firmware, modified firmware, malicious circuitry, anomalous circuitry and modified circuitry within the one or more electrical devices. 2. The apparatus of claim 1, further comprising an antenna coupled to said sensor and collecting said unintended emitted electromagnetic energy. 3. The apparatus of claim 2, further comprising fixture(s) positionable within an enclosure, said fixture(s) being sized and shaped to receive the one or more electrical devices and configured to stimulate the one or more electrical devices being tested into an operating state wherein unintended emissions are generated. 4. The apparatus of claim 3, wherein at least one of a stimuli used to stimulate the one or more electrical devices is configured to sweep across at least one of a frequency span, a voltage range, a duty cycle, a pulse duration, a time interval, a power amplitude and an electromagnetic illumination range. 5. The apparatus of claim 1, wherein said baseline feature value is obtained from captured unintended emissions being given off by a baseline electrical device and wherein said one or more electrical devices are determined and/or validated to be at least one of constructed, coded, programmed, loaded, burned-in and functioning identically to said baseline electrical device. 6. The apparatus of claim 5, wherein said baseline electrical device is located, during said operation of said apparatus, within said hollow enclosure having said antenna being integrated there within. 7. The apparatus of claim 1, wherein said one or more electrical devices is at least one of a wafer, a die, an electronic part, a circuit board, system, sub-system, and a circuit board assembly and wherein two are serially, concurrently or simultaneously tested using apparatus. 8. The apparatus of claim 1, wherein said one or more electrical devices is a circuit board or a circuit assembly, each including plurality of electronic components and wherein said plurality of electronic components are being simultaneously determined to have said presence or said absence of said at least one of malicious software, anomalous software, modified software, unmodified software, malicious firmware, anomalous firmware, modified firmware, unmodified firmware, malicious circuitry, anomalous circuitry and modified circuitry, unmodified circuitry during operation of said apparatus. 9. The apparatus of claim 1, wherein said step of measuring said feature value is performed serially or concurrently with a step of measuring said baseline feature value. 10. The apparatus of claim 1, wherein said executable instructions, when executed by said one or more processors or logic devices, cause said one or more processors or logic devices to perform an additional step of electromagnetic emissions analysis including at least one of a spectrographic analysis, a time-frequency analysis, an electromagnetic emission radiation response analysis related to input signal variations, a phase analysis, an informatics analysis, and a statistical analysis. 11. The apparatus of claim 1, wherein said one or more electrical devices is at least one of a wafer, a die, an electronic part, a circuit board, circuit board assembly, a subsystem, a system and a network and wherein said executable instructions, when executed by said one or more processors or logic devices, further cause said one or more processors or logic devices to determine an authenticity or an unmodified state of at least one of a software, a firmware and a circuitry present in said at least one of wafer, die, electronic part, circuit board, circuit board assembly, subsystem, system and network. 12. The apparatus of claim 1, wherein said one or more electrical devices is at least one of a wafer, a die, an electronic part, a circuit board, a circuit board assembly, a sub-system and a system, wherein said apparatus further comprising a probe and an antenna located on a tip of said probe and wherein said probe is movable across said at least one of wafer, die, electronic part, circuit board, circuit board assembly, sub-system and system being in an electrically excited state. 13. The apparatus of claim 1, wherein at least one of said at least one of malicious software, anomalous software, modified software, malicious firmware, anomalous firmware, modified firmware, malicious circuitry, anomalous circuitry and modified circuitry includes at least one of tainted, bug, malware, tampered, subversively altered, worm, zombie, Trojan, Trojan horse, Rootkit, virus, spyware, adware, checksum exploit, scareware, incorrect software, exploit, SQL injection attack, privacy-invasive software, backdoor, Rowhammer exploit, update, tainted part, tampered with, counterfeit, and denial of service. 14. An apparatus for analyzing at least one electrical device being at least one of a wafer, a die, an electronic part, a circuit board, system or sub-system or a circuit board assembly, said apparatus comprising:
an integrated antenna enclosure including a hollow enclosure and one or more antennas being at least one of integrated into, inserted into or configured in an array within said enclosure, said one or more antennas receiving unintended emissions of electromagnetic energy given off by one or more electrical devices; an electromagnetic pattern sensor, configured, in a combination with said integrated antenna enclosure, to capture said unintended emissions of electromagnetic energy being given off by the at least one electrical device placed within said integrated antenna enclosure through an access thereinto; one or more processors or logic devices; and a computational medium comprising executable instructions that, when executed by said one or more processors or logic devices, cause said one or more processors or logic devices to perform the following steps on said captured unintended emissions of said electromagnetic energy: quantifying a feature value in at least one spectral frequency region of said unintended emissions for at least two different physical electrical devices that are determined and/or validated to be at least one of constructed, coded, programmed, loaded, burned-in and functioning identically to each other, wherein said at least two different physical electrical devices are serially or concurrently emplaced and measured in said integrated antenna enclosure, identifying differences between at least one corresponding quantified feature of said spectral frequency region in said unintended emission for each of said at least two different physical electrical devices, calculating a value based on a comparison of said two corresponding quantified features forming at least one parameter of said spectral frequency region in said unintended emission, and determining, based on said calculated difference value, a presence or an absence of at least one of malicious software, anomalous software, modified software, malicious firmware, anomalous firmware, modified firmware, malicious circuitry, anomalous circuitry and modified circuitry within the one or more electrical devices. 15. The apparatus of claim 14, wherein said at least two different physical electrical devices includes at least one of a baseline electrical device and an unexamined device, at least two different baseline electrical devices of a different type, at least two unexamined devices of the same type, at least two different baseline electrical devices of the same type, and at least two unexamined devices of a different type. 16. An apparatus comprising:
a hollow enclosure; an antenna integrated into said hollow enclosure; an emissions acquisition assembly, configured, to receive, from said antenna, in an analog form, unintended emissions of electromagnetic energy being given off by an electrical device located, during operation of said apparatus, into said hollow enclosure through an access thereinto, amplify said unintended emissions and to convert said amplified unintended emissions into a digitized data; one or more processors; and a computational medium comprising executable instructions that, when executed by said one or more processors, cause said one or more processors to perform the steps of: identifying a spectral frequency region within a sample unintended emission, measuring a value of a parameter of said spectral frequency region in said sample unintended emission, measuring value(s) of said parameter in one or more of subsequent unintended emissions, and determining, based on distinct changes in said values of said parameter, at least one of anomalous software, anomalous firmware and anomalous circuitry of the electrical device. 17. The apparatus of claim 16, wherein said value of said parameter changes over time. 18. The apparatus of claim 16, wherein said value of said parameter differs across frequency ranges. 19. The apparatus of claim 16, wherein said executable instructions, when executed by said one or more processors, further cause said one or more processors to at least one of locate or geolocate said electrical device. 20. The apparatus of claim 16, wherein said executable instructions, when executed by said one or more processors, further cause said one or more processors to determine location(s) of said unintended emissions within said electrical device and/or associate said emissions to a distinct electronic component within said electronic device 21. The apparatus of claim 16, wherein the emissions of distinct electronic components on a circuit board are associated with the corresponding distinct physical electronic components on the circuit board. 22. The apparatus of claim 16, wherein said executable instructions, when executed by said one or more processors, further cause said one or more processors to determine a type of and/or classify said electrical device. 23. The apparatus of claim 16, wherein digital representations of electromagnetic emissions are compared and contrasted with a specific focus on at least one of emission homogeneity, consistency, and uniformity. 24. A computer-implemented method for analyzing plurality of wafers, dies, electronic parts, circuit boards, circuit board assemblies, sub-systems and systems for presence or absence of at least one of anomalous circuitry, anomalous firmware or anomalous software, said method comprising the steps of:
capturing emissions of electromagnetic energy radiating from said at least one of wafers, dies, electronic parts, circuit boards, circuit board assemblies, sub-systems and systems; analyzing signature(s) of said captured emissions by at least one of a spectrographic analysis, an amplitude analysis, a time-frequency analysis, a frequency analysis, an electromagnetic emission radiation response analysis, input signal variations, a phase analysis, an informatics analysis, and a statistical analysis; and verifying whether at least one of sub-threshold and super-threshold values have been exceeded in one or more of amplitude, frequency, phase and time domains of signature(s) elements of said captured emissions. 25. The method of claim 24, further comprising the step of providing a calibration specimen, the step of capturing emissions radiating from said calibration specimen and the step of defining a calibrating emission signature. 26. The method of claim 25, further comprising the step of analyzing at least one of said captured emissions radiating from said calibration specimen and said calibrated emission signature using at least one of manual or automatic means to define, select or enhance the at least one calibrating emission signature to find more discriminating comparison characteristics of said calibration specimen. 27. The method of claim 24, further comprising the step of assuring by way of comparing signature of said captured emissions with said calibrating emission signature, a proper operation of said at least one of wafers, dies, electronic parts, circuit boards, circuit board assemblies, sub-systems and systems. 28. The method of claim 24, further comprising the step of analyzing operation of said calibration specimen at different time instances during analysis of said wafers, dies, electronic parts, circuit boards, circuit board assemblies, sub-systems and systems. 29. The method of claim 24, further comprising the step of comparing a signature of captured emissions from baseline wafers, dies, electronic parts, circuit boards, circuit board assemblies, sub-systems and systems at different time instances to wafers, dies, electronic parts, circuit boards, circuit board assemblies, sub-systems and systems under test, inspection and/or examination. 30. The method of claim 24, further comprising the step of combining results of at least one of spectrographic analysis, frequency analysis, time-frequency analysis, electromagnetic emission radiation response analysis, input signal variations, phase analysis, informatics analysis, and statistical analysis for at least one of said feature values with results of at least one of spectrographic analysis, frequency analysis, time-frequency analysis, electromagnetic emission radiation response analysis, input signal variations, phase analysis, informatics analysis, and statistical analysis for at least one of another feature value in at least one frequency region from at least one time interval. | An apparatus for testing, inspecting or screening an electrically powered device for modified or unmodified hardware, firmware or software modifications including Malware, Trojans, adware, improper versioning, worms, or virus and the like, includes an antenna positioned at a distance from the electrically powered device and a signal receiver or sensor for examining a signal from the electrically powered device. The receiver or sensor collects unintended RF energy components emitted by the electrically powered device and includes one or more processors and executable instructions that perform analysis in a response to the acquired signal input while the electrically powered device is active or powered. The characteristics of the collected RF energy may be compared with RF energy characteristics of an unmodified device. The comparison determines one of a modified, unmodified or score of certainty of modified condition of the electrically powered device.1. An apparatus comprising:
a sensor comprising one or more antennas, low noise amplifier(s) coupled to said one or more antennas, RF tuner(s) and analog to digital converter(s) said sensor configured, to capture unintended emitted electromagnetic energy and/or unintended conducted energy from one or more electrical devices; one or more processors or logic devices; and a computational medium comprising executable instructions that, when executed by said one or more processors or logic devices, cause said one or more processors or logic devices to perform the following steps on said captured unintended emitted electromagnetic energy and/or said unintended conducted energy: measuring a feature value in at least one spectral frequency region of said captured unintended emitted electromagnetic energy and/or unintended conducted energy from said one or more electrical devices, calculating a difference value between said measured feature value and a baseline feature value, verifying, based on said calculated difference value, whether at least one of sub-threshold and super-threshold values have been exceeded in one or more of amplitude, frequency, phase and time domains of signature(s) elements of said captured unintended emitted electromagnetic energy and/or unintended conducted energy, and determining, based on said calculated difference value, a presence or an absence of at least one of malicious software, anomalous software, modified software, malicious firmware, anomalous firmware, modified firmware, malicious circuitry, anomalous circuitry and modified circuitry within the one or more electrical devices. 2. The apparatus of claim 1, further comprising an antenna coupled to said sensor and collecting said unintended emitted electromagnetic energy. 3. The apparatus of claim 2, further comprising fixture(s) positionable within an enclosure, said fixture(s) being sized and shaped to receive the one or more electrical devices and configured to stimulate the one or more electrical devices being tested into an operating state wherein unintended emissions are generated. 4. The apparatus of claim 3, wherein at least one of a stimuli used to stimulate the one or more electrical devices is configured to sweep across at least one of a frequency span, a voltage range, a duty cycle, a pulse duration, a time interval, a power amplitude and an electromagnetic illumination range. 5. The apparatus of claim 1, wherein said baseline feature value is obtained from captured unintended emissions being given off by a baseline electrical device and wherein said one or more electrical devices are determined and/or validated to be at least one of constructed, coded, programmed, loaded, burned-in and functioning identically to said baseline electrical device. 6. The apparatus of claim 5, wherein said baseline electrical device is located, during said operation of said apparatus, within said hollow enclosure having said antenna being integrated there within. 7. The apparatus of claim 1, wherein said one or more electrical devices is at least one of a wafer, a die, an electronic part, a circuit board, system, sub-system, and a circuit board assembly and wherein two are serially, concurrently or simultaneously tested using apparatus. 8. The apparatus of claim 1, wherein said one or more electrical devices is a circuit board or a circuit assembly, each including plurality of electronic components and wherein said plurality of electronic components are being simultaneously determined to have said presence or said absence of said at least one of malicious software, anomalous software, modified software, unmodified software, malicious firmware, anomalous firmware, modified firmware, unmodified firmware, malicious circuitry, anomalous circuitry and modified circuitry, unmodified circuitry during operation of said apparatus. 9. The apparatus of claim 1, wherein said step of measuring said feature value is performed serially or concurrently with a step of measuring said baseline feature value. 10. The apparatus of claim 1, wherein said executable instructions, when executed by said one or more processors or logic devices, cause said one or more processors or logic devices to perform an additional step of electromagnetic emissions analysis including at least one of a spectrographic analysis, a time-frequency analysis, an electromagnetic emission radiation response analysis related to input signal variations, a phase analysis, an informatics analysis, and a statistical analysis. 11. The apparatus of claim 1, wherein said one or more electrical devices is at least one of a wafer, a die, an electronic part, a circuit board, circuit board assembly, a subsystem, a system and a network and wherein said executable instructions, when executed by said one or more processors or logic devices, further cause said one or more processors or logic devices to determine an authenticity or an unmodified state of at least one of a software, a firmware and a circuitry present in said at least one of wafer, die, electronic part, circuit board, circuit board assembly, subsystem, system and network. 12. The apparatus of claim 1, wherein said one or more electrical devices is at least one of a wafer, a die, an electronic part, a circuit board, a circuit board assembly, a sub-system and a system, wherein said apparatus further comprising a probe and an antenna located on a tip of said probe and wherein said probe is movable across said at least one of wafer, die, electronic part, circuit board, circuit board assembly, sub-system and system being in an electrically excited state. 13. The apparatus of claim 1, wherein at least one of said at least one of malicious software, anomalous software, modified software, malicious firmware, anomalous firmware, modified firmware, malicious circuitry, anomalous circuitry and modified circuitry includes at least one of tainted, bug, malware, tampered, subversively altered, worm, zombie, Trojan, Trojan horse, Rootkit, virus, spyware, adware, checksum exploit, scareware, incorrect software, exploit, SQL injection attack, privacy-invasive software, backdoor, Rowhammer exploit, update, tainted part, tampered with, counterfeit, and denial of service. 14. An apparatus for analyzing at least one electrical device being at least one of a wafer, a die, an electronic part, a circuit board, system or sub-system or a circuit board assembly, said apparatus comprising:
an integrated antenna enclosure including a hollow enclosure and one or more antennas being at least one of integrated into, inserted into or configured in an array within said enclosure, said one or more antennas receiving unintended emissions of electromagnetic energy given off by one or more electrical devices; an electromagnetic pattern sensor, configured, in a combination with said integrated antenna enclosure, to capture said unintended emissions of electromagnetic energy being given off by the at least one electrical device placed within said integrated antenna enclosure through an access thereinto; one or more processors or logic devices; and a computational medium comprising executable instructions that, when executed by said one or more processors or logic devices, cause said one or more processors or logic devices to perform the following steps on said captured unintended emissions of said electromagnetic energy: quantifying a feature value in at least one spectral frequency region of said unintended emissions for at least two different physical electrical devices that are determined and/or validated to be at least one of constructed, coded, programmed, loaded, burned-in and functioning identically to each other, wherein said at least two different physical electrical devices are serially or concurrently emplaced and measured in said integrated antenna enclosure, identifying differences between at least one corresponding quantified feature of said spectral frequency region in said unintended emission for each of said at least two different physical electrical devices, calculating a value based on a comparison of said two corresponding quantified features forming at least one parameter of said spectral frequency region in said unintended emission, and determining, based on said calculated difference value, a presence or an absence of at least one of malicious software, anomalous software, modified software, malicious firmware, anomalous firmware, modified firmware, malicious circuitry, anomalous circuitry and modified circuitry within the one or more electrical devices. 15. The apparatus of claim 14, wherein said at least two different physical electrical devices includes at least one of a baseline electrical device and an unexamined device, at least two different baseline electrical devices of a different type, at least two unexamined devices of the same type, at least two different baseline electrical devices of the same type, and at least two unexamined devices of a different type. 16. An apparatus comprising:
a hollow enclosure; an antenna integrated into said hollow enclosure; an emissions acquisition assembly, configured, to receive, from said antenna, in an analog form, unintended emissions of electromagnetic energy being given off by an electrical device located, during operation of said apparatus, into said hollow enclosure through an access thereinto, amplify said unintended emissions and to convert said amplified unintended emissions into a digitized data; one or more processors; and a computational medium comprising executable instructions that, when executed by said one or more processors, cause said one or more processors to perform the steps of: identifying a spectral frequency region within a sample unintended emission, measuring a value of a parameter of said spectral frequency region in said sample unintended emission, measuring value(s) of said parameter in one or more of subsequent unintended emissions, and determining, based on distinct changes in said values of said parameter, at least one of anomalous software, anomalous firmware and anomalous circuitry of the electrical device. 17. The apparatus of claim 16, wherein said value of said parameter changes over time. 18. The apparatus of claim 16, wherein said value of said parameter differs across frequency ranges. 19. The apparatus of claim 16, wherein said executable instructions, when executed by said one or more processors, further cause said one or more processors to at least one of locate or geolocate said electrical device. 20. The apparatus of claim 16, wherein said executable instructions, when executed by said one or more processors, further cause said one or more processors to determine location(s) of said unintended emissions within said electrical device and/or associate said emissions to a distinct electronic component within said electronic device 21. The apparatus of claim 16, wherein the emissions of distinct electronic components on a circuit board are associated with the corresponding distinct physical electronic components on the circuit board. 22. The apparatus of claim 16, wherein said executable instructions, when executed by said one or more processors, further cause said one or more processors to determine a type of and/or classify said electrical device. 23. The apparatus of claim 16, wherein digital representations of electromagnetic emissions are compared and contrasted with a specific focus on at least one of emission homogeneity, consistency, and uniformity. 24. A computer-implemented method for analyzing plurality of wafers, dies, electronic parts, circuit boards, circuit board assemblies, sub-systems and systems for presence or absence of at least one of anomalous circuitry, anomalous firmware or anomalous software, said method comprising the steps of:
capturing emissions of electromagnetic energy radiating from said at least one of wafers, dies, electronic parts, circuit boards, circuit board assemblies, sub-systems and systems; analyzing signature(s) of said captured emissions by at least one of a spectrographic analysis, an amplitude analysis, a time-frequency analysis, a frequency analysis, an electromagnetic emission radiation response analysis, input signal variations, a phase analysis, an informatics analysis, and a statistical analysis; and verifying whether at least one of sub-threshold and super-threshold values have been exceeded in one or more of amplitude, frequency, phase and time domains of signature(s) elements of said captured emissions. 25. The method of claim 24, further comprising the step of providing a calibration specimen, the step of capturing emissions radiating from said calibration specimen and the step of defining a calibrating emission signature. 26. The method of claim 25, further comprising the step of analyzing at least one of said captured emissions radiating from said calibration specimen and said calibrated emission signature using at least one of manual or automatic means to define, select or enhance the at least one calibrating emission signature to find more discriminating comparison characteristics of said calibration specimen. 27. The method of claim 24, further comprising the step of assuring by way of comparing signature of said captured emissions with said calibrating emission signature, a proper operation of said at least one of wafers, dies, electronic parts, circuit boards, circuit board assemblies, sub-systems and systems. 28. The method of claim 24, further comprising the step of analyzing operation of said calibration specimen at different time instances during analysis of said wafers, dies, electronic parts, circuit boards, circuit board assemblies, sub-systems and systems. 29. The method of claim 24, further comprising the step of comparing a signature of captured emissions from baseline wafers, dies, electronic parts, circuit boards, circuit board assemblies, sub-systems and systems at different time instances to wafers, dies, electronic parts, circuit boards, circuit board assemblies, sub-systems and systems under test, inspection and/or examination. 30. The method of claim 24, further comprising the step of combining results of at least one of spectrographic analysis, frequency analysis, time-frequency analysis, electromagnetic emission radiation response analysis, input signal variations, phase analysis, informatics analysis, and statistical analysis for at least one of said feature values with results of at least one of spectrographic analysis, frequency analysis, time-frequency analysis, electromagnetic emission radiation response analysis, input signal variations, phase analysis, informatics analysis, and statistical analysis for at least one of another feature value in at least one frequency region from at least one time interval. | 2,400 |
6,784 | 6,784 | 12,700,430 | 2,426 | One embodiment may take the form of method for providing highlights of multimedia content that may be of interest to a user of a television system. The interest of a particular user of the television system may be obtained from a viewing history gathered about the user. From this information, one or more available multimedia programs may be identified as being of interest to the user. Highlights of such content, such as pay-per-view or other premium content, may be gathered and sent to or recorded on the receiver associated with the user such that the highlights may be presented to the user during use of the television system. The highlights may be viewed by the user through the television system and, if the user is interested in the content, may also purchase or otherwise access the highlighted programs. | 1. A method for providing a highlight of a premium multimedia program to a user of a television system, the method comprising:
obtaining at least one user preference for multimedia content; identifying a premium multimedia program that correlates to the at least one user preference; obtaining a highlight for the identified premium multimedia program; and presenting the highlight to the user through the television system. 2. The method of claim 1 further comprising:
monitoring a viewing history of the user, the viewing history including at least one indicator of a viewed multimedia program viewed by the user. 3. The method of claim 2 further comprising:
comparing the at least one indicator to a database of premium multimedia programs to identify the identified premium multimedia program. 4. The method of claim 1 wherein the obtaining operation comprises:
recording a segment of the identified premium multimedia content. 5. The method of claim 1 wherein the obtaining operation comprises:
receiving the highlight from a remote source. 6. The method of claim 1 wherein the presenting operation comprises
inserting the highlight into a television signal provided by the television system. 7. The method of claim 1 wherein the presenting operation comprises
storing the highlights in a computer-readable medium accessible by the user. 8. The method of claim 4 wherein the recording operation comprises:
setting a recording timer to record the segment, the recording timer configured to begin recording at a specified time. 9. The method of claim 4 wherein the recording operation comprises:
analyzing a television signal provided by the television system for a begin highlight recording flag. 10. The method of claim 1 wherein the presenting operation comprises:
executing an interactive application configured to provide ability to purchase the multimedia content. 11. The method of claim 10 further comprising:
receiving an input from the user indicating a request to purchase the premium multimedia content. 12. The method of claim 11 further comprising:
transmitting the request to purchase the premium multimedia content to the television system; and
providing access to the premium multimedia content. 13. A television receiver for providing a highlight of a multimedia program to a user comprising:
a microprocessor; and a computer-readable storage medium, the computer readable storage medium storing a computer-executable code that, when executed by the microprocessor, causes the television receiver to perform the operations of:
obtaining a user preference;
identifying one or more multimedia programs that correlate to the user preference; and
storing a segment of the one or more multimedia programs in the computer readable medium for presentation to the user. 14. The television receiver of claim 13 wherein the computer-executable code further causes the television receiver to perform the operations of:
storing a viewing history of the user in computer-readable medium, the viewing history including at least one indicator of a multimedia program viewed by the user. 15. The television receiver of claim 14 wherein the computer-executable code further causes the television receiver to perform the operations of:
accessing an electronic program guide stored in the computer-readable medium to obtain information about the viewing history and a list of premium multimedia programs. 16. The television receiver of claim 14 wherein the computer-executable code further causes the television receiver to perform the operations of:
comparing the at least one indicator to a list of premium multimedia programs to identify one or more multimedia programs that correlate. 17. The television receiver of claim 14 wherein the computer-executable code further causes the television receiver to perform the operations of:
transmitting the stored segment to a display device for displaying to the user. 18. The television receiver of claim 13 wherein the computer-executable code further causes the television receiver to perform the operations of:
recording the segment from a television signal received by the television receiver from a communication network. 19. A television system for providing a highlight of a multimedia program to a user comprising:
a headend; a communication network coupled to the headend and configured to provide a communication path; and a television receiver, the television receiver comprising:
a microprocessor; and
a computer-readable storage medium, the computer readable storage medium storing a computer-executable code that, when executed by the microprocessor, causes the television receiver to perform the operations of:
obtaining a user preference;
identifying one or more multimedia programs that correlate to the user preference; and
storing a segment of the one or more multimedia programs in the computer readable medium for presentation to the user. 20. The television system of claim 19 wherein the segment is provided by the headend. | One embodiment may take the form of method for providing highlights of multimedia content that may be of interest to a user of a television system. The interest of a particular user of the television system may be obtained from a viewing history gathered about the user. From this information, one or more available multimedia programs may be identified as being of interest to the user. Highlights of such content, such as pay-per-view or other premium content, may be gathered and sent to or recorded on the receiver associated with the user such that the highlights may be presented to the user during use of the television system. The highlights may be viewed by the user through the television system and, if the user is interested in the content, may also purchase or otherwise access the highlighted programs.1. A method for providing a highlight of a premium multimedia program to a user of a television system, the method comprising:
obtaining at least one user preference for multimedia content; identifying a premium multimedia program that correlates to the at least one user preference; obtaining a highlight for the identified premium multimedia program; and presenting the highlight to the user through the television system. 2. The method of claim 1 further comprising:
monitoring a viewing history of the user, the viewing history including at least one indicator of a viewed multimedia program viewed by the user. 3. The method of claim 2 further comprising:
comparing the at least one indicator to a database of premium multimedia programs to identify the identified premium multimedia program. 4. The method of claim 1 wherein the obtaining operation comprises:
recording a segment of the identified premium multimedia content. 5. The method of claim 1 wherein the obtaining operation comprises:
receiving the highlight from a remote source. 6. The method of claim 1 wherein the presenting operation comprises
inserting the highlight into a television signal provided by the television system. 7. The method of claim 1 wherein the presenting operation comprises
storing the highlights in a computer-readable medium accessible by the user. 8. The method of claim 4 wherein the recording operation comprises:
setting a recording timer to record the segment, the recording timer configured to begin recording at a specified time. 9. The method of claim 4 wherein the recording operation comprises:
analyzing a television signal provided by the television system for a begin highlight recording flag. 10. The method of claim 1 wherein the presenting operation comprises:
executing an interactive application configured to provide ability to purchase the multimedia content. 11. The method of claim 10 further comprising:
receiving an input from the user indicating a request to purchase the premium multimedia content. 12. The method of claim 11 further comprising:
transmitting the request to purchase the premium multimedia content to the television system; and
providing access to the premium multimedia content. 13. A television receiver for providing a highlight of a multimedia program to a user comprising:
a microprocessor; and a computer-readable storage medium, the computer readable storage medium storing a computer-executable code that, when executed by the microprocessor, causes the television receiver to perform the operations of:
obtaining a user preference;
identifying one or more multimedia programs that correlate to the user preference; and
storing a segment of the one or more multimedia programs in the computer readable medium for presentation to the user. 14. The television receiver of claim 13 wherein the computer-executable code further causes the television receiver to perform the operations of:
storing a viewing history of the user in computer-readable medium, the viewing history including at least one indicator of a multimedia program viewed by the user. 15. The television receiver of claim 14 wherein the computer-executable code further causes the television receiver to perform the operations of:
accessing an electronic program guide stored in the computer-readable medium to obtain information about the viewing history and a list of premium multimedia programs. 16. The television receiver of claim 14 wherein the computer-executable code further causes the television receiver to perform the operations of:
comparing the at least one indicator to a list of premium multimedia programs to identify one or more multimedia programs that correlate. 17. The television receiver of claim 14 wherein the computer-executable code further causes the television receiver to perform the operations of:
transmitting the stored segment to a display device for displaying to the user. 18. The television receiver of claim 13 wherein the computer-executable code further causes the television receiver to perform the operations of:
recording the segment from a television signal received by the television receiver from a communication network. 19. A television system for providing a highlight of a multimedia program to a user comprising:
a headend; a communication network coupled to the headend and configured to provide a communication path; and a television receiver, the television receiver comprising:
a microprocessor; and
a computer-readable storage medium, the computer readable storage medium storing a computer-executable code that, when executed by the microprocessor, causes the television receiver to perform the operations of:
obtaining a user preference;
identifying one or more multimedia programs that correlate to the user preference; and
storing a segment of the one or more multimedia programs in the computer readable medium for presentation to the user. 20. The television system of claim 19 wherein the segment is provided by the headend. | 2,400 |
6,785 | 6,785 | 14,899,137 | 2,466 | Interfacing between radio units in a base station in a mobile communication system uses a common public radio interface CPRI for streaming IQ data samples and control data arranged in lanes. A separate serial interface sRIO is now additionally used for transferring selected control data arranged in packets to a controller, the selected control data being streamed between other radio units via the common public radio interface. In the radio unit, the selected control data are arranged in packets to be transmitted via the serial interface, and, vice versa, the selected control data arranged in packets received via the serial interface are arranged in lanes to be streamed. Advantageously the control data of the streaming CPRI interface is seamlessly transferred to the controller via the packet based serial interface. | 1. A method of interfacing in a base station in a mobile communication system, the base station comprising radio units and at least one controller unit for controlling the radio units, different types of the radio units including at least one radio equipment unit coupled to at least one antenna and at least one radio equipment controller unit for controlling the radio equipment unit, the radio units having a common public radio interface according to a common public radio interface standard for streaming data samples and control data arranged in lanes corresponding to antenna signals and a serial interface for transferring packets separate from the common public radio interface, the method comprising:
transferring, between a first radio unit and a further unit, selected control data arranged in packets via the serial interface, the selected control data corresponding to control data streamed between the first radio unit and a preceding radio unit via the common public radio interface; in the first radio unit, arranging in packets the selected control data to be transmitted via the serial interface, and, vice versa, arranging in lanes the selected control data arranged in packets received via the serial interface; and in the further unit, processing the selected control data arranged in packets received via the serial interface, and, vice versa, arranging in packets the selected control data to be transmitted via the serial interface. 2. Method as claimed in claim 1, wherein said arranging in packets comprises
retrieving a target address from the control data formatted on the common public radio interface according to a predetermined protocol; matching the target address to a target destination on the serial interface for selecting the control data, and, if selected, transmitting the packet having the selected control data via the serial interface, the packet comprising the target address. 3. Device for use in a radio unit, the radio unit including at least one radio equipment unit coupled to at least one antenna and at least one radio equipment controller unit for controlling the radio equipment unit, the device comprising: a common public radio interface according to a common public radio interface standard for streaming data samples; and control data arranged in lanes corresponding to antenna signals and a serial interface for transferring packets separate from the common public radio interface,
the device being configured for transferring, between the device and a further unit, selected control data arranged in packets via the serial interface, the selected control data corresponding to control data streamed between the device and a preceding radio unit via the common public radio interface, the device comprising a data handler arranged for arranging in packets the selected control data to be transmitted via the serial interface, and, vice versa, arranging in lanes the selected control data received via the serial interface. 4. Device as claimed in claim 3, wherein the data handler is configured for said arranging in packets by
retrieving a target address from the control data formatted on the common public radio interface according to a predetermined protocol, matching the target address to a target destination on the serial interface for selecting the control data, and, if selected, transmitting the packet having the selected control data via the serial interface, the packet comprising the target address. 5. Device as claimed in claim 3, wherein the data handler is configured for said arranging in packets by storing the selected control data in the memory according to a buffer descriptor and for retrieving the selected control data from the memory to the serial interface according to the buffer descriptor. 6. Device as claimed in claim 3, wherein the data handler is configured for maintaining a ring memory for storing buffer descriptors for respective data buffers, the sequence of stored buffer descriptors in the ring memory corresponding to sets of control data to be transferred as packets. 7. Device as claimed claims 6, wherein the device is arranged for preparing the ring memory by creating a number of empty buffer descriptors for receiving the selected control data from the common public radio interface. 8. Device as claimed in claim 3, wherein
the device comprises a direct memory access unit for directly accessing data a memory, the data handler is configured for storing selected control data in the memory according to a buffer descriptor and providing the buffer descriptor to the direct memory access unit, and the direct memory access unit is configured for transferring the selected control data from the memory to the serial interface according to the buffer descriptor or, vice versa, transferring the selected control data from the serial interface to the memory. 9. Device as claimed in claim 3, wherein the data handler is configured for said arranging in lanes by
retrieving from the packets received via the serial interface a target address, matching the target address to a target destination on the common public radio interface for selecting the control data, and, if selected, transmitting the selected control data via a respective lane determined according to the target address and formatted on the common public radio interface according to a predetermined protocol, or maintaining a local unit address as the target destination address and, if the target address matches the local unit address, locally processing the selected control data. 10. Device as claimed in claim 4, wherein the target address is a Media Access Control (MAC) address. 11. Device as claimed in claim 3, wherein the data handler is arranged for transferring a predetermined amount of the selected control data arranged in packets via the serial interface, and for generating and transferring via the serial interface an interrupt packet after transferring said predetermined amount. 12. Device as claimed in claim 3, wherein the device is arranged for receiving an interrupt packet indicative of transferring, by a preceding radio unit, a predetermined amount of the selected control data arranged in packets via the serial interface, and comprises an interrupt unit for, upon receiving the interrupt packet, triggering further processing of the selected control data. 13. Device as claimed in claim 3, wherein the device is configured for transferring data samples of N lanes to the preceding radio unit via the common public radio interface, and the device is arranged for receiving an interrupt packet indicative of transferring, by the preceding radio unit, the selected control data corresponding to a predetermined amount of the data samples of the N lanes, and comprises an interrupt unit for, upon receiving the interrupt packet triggering further processing of the selected control data. 14. Device as claimed in claim 3, wherein the serial interface comprises a serial interface controller arranged for formatting control data in packets to be transmitted, and for retrieving control data from packets as received. 15. Device as claimed in claim 14, wherein the serial interface is according to the Serial Rapid Input Output standard, or the Peripheral Component Interconnect Express standard. 16. Radio equipment controller unit for a base station in a mobile communication system, the radio equipment controller unit comprising the device according to claim 3. 17. Radio equipment unit for a base station in a mobile communication system, the radio equipment unit comprising the device according to claim 3. 18. Integrated circuit comprising the device according to claim 3. 19. (canceled) | Interfacing between radio units in a base station in a mobile communication system uses a common public radio interface CPRI for streaming IQ data samples and control data arranged in lanes. A separate serial interface sRIO is now additionally used for transferring selected control data arranged in packets to a controller, the selected control data being streamed between other radio units via the common public radio interface. In the radio unit, the selected control data are arranged in packets to be transmitted via the serial interface, and, vice versa, the selected control data arranged in packets received via the serial interface are arranged in lanes to be streamed. Advantageously the control data of the streaming CPRI interface is seamlessly transferred to the controller via the packet based serial interface.1. A method of interfacing in a base station in a mobile communication system, the base station comprising radio units and at least one controller unit for controlling the radio units, different types of the radio units including at least one radio equipment unit coupled to at least one antenna and at least one radio equipment controller unit for controlling the radio equipment unit, the radio units having a common public radio interface according to a common public radio interface standard for streaming data samples and control data arranged in lanes corresponding to antenna signals and a serial interface for transferring packets separate from the common public radio interface, the method comprising:
transferring, between a first radio unit and a further unit, selected control data arranged in packets via the serial interface, the selected control data corresponding to control data streamed between the first radio unit and a preceding radio unit via the common public radio interface; in the first radio unit, arranging in packets the selected control data to be transmitted via the serial interface, and, vice versa, arranging in lanes the selected control data arranged in packets received via the serial interface; and in the further unit, processing the selected control data arranged in packets received via the serial interface, and, vice versa, arranging in packets the selected control data to be transmitted via the serial interface. 2. Method as claimed in claim 1, wherein said arranging in packets comprises
retrieving a target address from the control data formatted on the common public radio interface according to a predetermined protocol; matching the target address to a target destination on the serial interface for selecting the control data, and, if selected, transmitting the packet having the selected control data via the serial interface, the packet comprising the target address. 3. Device for use in a radio unit, the radio unit including at least one radio equipment unit coupled to at least one antenna and at least one radio equipment controller unit for controlling the radio equipment unit, the device comprising: a common public radio interface according to a common public radio interface standard for streaming data samples; and control data arranged in lanes corresponding to antenna signals and a serial interface for transferring packets separate from the common public radio interface,
the device being configured for transferring, between the device and a further unit, selected control data arranged in packets via the serial interface, the selected control data corresponding to control data streamed between the device and a preceding radio unit via the common public radio interface, the device comprising a data handler arranged for arranging in packets the selected control data to be transmitted via the serial interface, and, vice versa, arranging in lanes the selected control data received via the serial interface. 4. Device as claimed in claim 3, wherein the data handler is configured for said arranging in packets by
retrieving a target address from the control data formatted on the common public radio interface according to a predetermined protocol, matching the target address to a target destination on the serial interface for selecting the control data, and, if selected, transmitting the packet having the selected control data via the serial interface, the packet comprising the target address. 5. Device as claimed in claim 3, wherein the data handler is configured for said arranging in packets by storing the selected control data in the memory according to a buffer descriptor and for retrieving the selected control data from the memory to the serial interface according to the buffer descriptor. 6. Device as claimed in claim 3, wherein the data handler is configured for maintaining a ring memory for storing buffer descriptors for respective data buffers, the sequence of stored buffer descriptors in the ring memory corresponding to sets of control data to be transferred as packets. 7. Device as claimed claims 6, wherein the device is arranged for preparing the ring memory by creating a number of empty buffer descriptors for receiving the selected control data from the common public radio interface. 8. Device as claimed in claim 3, wherein
the device comprises a direct memory access unit for directly accessing data a memory, the data handler is configured for storing selected control data in the memory according to a buffer descriptor and providing the buffer descriptor to the direct memory access unit, and the direct memory access unit is configured for transferring the selected control data from the memory to the serial interface according to the buffer descriptor or, vice versa, transferring the selected control data from the serial interface to the memory. 9. Device as claimed in claim 3, wherein the data handler is configured for said arranging in lanes by
retrieving from the packets received via the serial interface a target address, matching the target address to a target destination on the common public radio interface for selecting the control data, and, if selected, transmitting the selected control data via a respective lane determined according to the target address and formatted on the common public radio interface according to a predetermined protocol, or maintaining a local unit address as the target destination address and, if the target address matches the local unit address, locally processing the selected control data. 10. Device as claimed in claim 4, wherein the target address is a Media Access Control (MAC) address. 11. Device as claimed in claim 3, wherein the data handler is arranged for transferring a predetermined amount of the selected control data arranged in packets via the serial interface, and for generating and transferring via the serial interface an interrupt packet after transferring said predetermined amount. 12. Device as claimed in claim 3, wherein the device is arranged for receiving an interrupt packet indicative of transferring, by a preceding radio unit, a predetermined amount of the selected control data arranged in packets via the serial interface, and comprises an interrupt unit for, upon receiving the interrupt packet, triggering further processing of the selected control data. 13. Device as claimed in claim 3, wherein the device is configured for transferring data samples of N lanes to the preceding radio unit via the common public radio interface, and the device is arranged for receiving an interrupt packet indicative of transferring, by the preceding radio unit, the selected control data corresponding to a predetermined amount of the data samples of the N lanes, and comprises an interrupt unit for, upon receiving the interrupt packet triggering further processing of the selected control data. 14. Device as claimed in claim 3, wherein the serial interface comprises a serial interface controller arranged for formatting control data in packets to be transmitted, and for retrieving control data from packets as received. 15. Device as claimed in claim 14, wherein the serial interface is according to the Serial Rapid Input Output standard, or the Peripheral Component Interconnect Express standard. 16. Radio equipment controller unit for a base station in a mobile communication system, the radio equipment controller unit comprising the device according to claim 3. 17. Radio equipment unit for a base station in a mobile communication system, the radio equipment unit comprising the device according to claim 3. 18. Integrated circuit comprising the device according to claim 3. 19. (canceled) | 2,400 |
6,786 | 6,786 | 14,546,018 | 2,491 | A permissions provisioning module includes a data adapter and a permissions calculator associated with a policy evaluator operable to evaluate an ABAC policy. The module is adapted to interact with a computer system including resources, metadata and an access control mechanism enforcing, in respect of each resource, an access control list associated with the resource. In operation, the data adapter receives metadata for said computer system and assigns values to attributes in the policy based on the metadata. The permissions calculator queries the policy evaluator on combinations of resources and principals of the system using the attribute values thus assigned, and returns permission data. The data adapter formats said permission data into ACLs, for deployment in the computer system. | 1. A permissions provisioning module adapted to interact with a computer system, which comprises:
a plurality of resources, each resource being associated with an access control list (ACL) indicating permissions in respect of the resource; memory storing system metadata including metadata associated with the resources or metadata associated with principals of the system or both; an access control mechanism configured to selectively restrict principals' access to a resource in accordance with its associated ACL, wherein the access control mechanism of the computer system operates outside direct influence of the ABAC policy; and a processor configured to perform the functions of: a policy evaluator configured to evaluate an access query against an attribute-based access control (ABAC) policy based on a collection of attribute values at least sufficient to evaluate against the ABAC policy, which is retrievable by the policy evaluator and includes access rules expressed in terms of attributes; a data adapter configured to receive the system metadata and assign values to said attributes in the ABAC policy in accordance with the metadata, the attribute values being arranged resource-wise and principal-wise; and a permissions calculator configured to query the policy evaluator on combinations of resources and principals using the attribute values assigned by the data adapter, and to supply resulting permission data to the data adapter, wherein the data adapter is configured to arrange said permission data resource-wise, generate system-readable ACLs based thereon and supply the generated ACLs for deployment in the system. 2. The permissions provisioning module of claim 1, further comprising a scheduler, wherein the data adapter or the permissions calculator or both are controllable by the scheduler, said scheduler being operable to initiate a complete or partial provisioning of ACLs for all system resources. 3. The permissions provisioning module of claim 2, wherein the scheduler is event-driven. 4. The permissions provisioning module of claim 2, wherein the scheduler is calendar-driven. 5. The permissions provisioning module of claim 2, wherein the scheduler is operable to initiate incremental provisioning, which is restricted to such ACLs that are affected by a change in the system metadata or a change in the ABAC policy or both. 6. The permissions provisioning module of claim 1, wherein the data adapter is further configured to deploy the generated ACLs in the system. 7. The permissions provisioning module of claim 6, wherein the data adapter is further configured to:
receive current ACLs; compare, for a given resource, a current ACL and a generated ACL; and omit deployment of the generated ACL if it is equivalent to the current ACL. 8. The permissions provisioning module of claim 1, wherein the data adapter accepts configuration data and assigns said attribute values in accordance with this, the configuration data being at least one of:
a mapping table relating resource metadata to resource attributes in the ABAC policy; a mapping table relating principal metadata to subject attributes in the ABAC policy; a mapping table relating such resource metadata that express functionalities of the resources to action attributes in the ABAC policy. 9. The permissions provisioning module of claim 1, wherein the permissions calculator is configured to query the policy evaluator on combinations of resources, principals and values of environment attributes. 10. The permissions provisioning module of claim 9, wherein the data adapter is configured to receive environment data relating to a current state of the computer system and assign values of environment attributes in the ABAC policy which it supplies to the permissions calculator. 11. The permissions provisioning module of claim 1, adapted to interact with a plurality of computer systems, each comprising:
a plurality of resources, each resource being associated with an access control list (ACL) indicating permissions in respect of the resource; memory storing system metadata including metadata associated with the resources or metadata or both associated with principals of the system; and an access control mechanism configured to selectively restrict principals' access to a resource in accordance with its associated ACL, the permissions provisioning module comprising: the policy evaluator; a plurality of data adapters, each configured to receive the system metadata from a system out of said plurality of computer systems and assign values to the attributes in the ABAC policy in accordance with the metadata, the attribute values being arranged resource-wise and principal-wise; and the permissions calculator, which is communicatively connected to the policy evaluator and each data adapter, and configured to query the policy evaluator on combinations of resources and principals within each system out of said plurality of computer systems, and supply resulting permission data to the corresponding data adapter, wherein a data adapter is configured, upon receipt of said permission data, to arrange the permission data resource-wise, generate system-readable ACLs based thereon and supply the generated ACLs for deployment in the corresponding system. 12. The permissions provisioning module of claim 1, configured to retrieve the ABAC policy from a site to which the computer system lacks direct access rights. 13. The permissions provisioning module of claim 1, wherein the resources in the computer system are one or more of the following:
devices, files, records, tables, processes, programs, networks, domains containing or receiving information. 14. A computer system, comprising:
a plurality of resources, each resource being associated with an ACL indicating permissions in respect of the resource; memory storing system metadata including metadata associated with the resources or metadata associated with principals of the system or both; and an access control mechanism configured to selectively restrict principals' access to a resource in accordance with its associated ACL, the computer system further comprising the permissions provisioning module of claim 1. 15. The computer system of claim 14, adapted to serve as one or more of the following:
a general-purpose file management system; a content management system, a financial system; a communications system; an industrial control system; an administrative system; an enterprise system; a simulations system; a computational system; an entertainment system, an educational system; a defence system. 16. A method of provisioning permissions in a computer system in accordance with an attribute-based access control (ABAC) policy, which includes access rules expressed in terms of attributes,
the computer system comprising: a plurality of resources, each resource being associated with an access control list (ACL) indicating permissions held by principals of the system in respect of the resource; and an access control mechanism configured to selectively restrict principals' access to a resource in accordance with its associated ACL, wherein the access control mechanism of the computer system operates outside direct influence of the ABAC policy, wherein the system is operable to supply system metadata including metadata associated with the resources or metadata or both associated with principals of the system, the method comprising: receiving the system metadata; assigning values to said attributes in the ABAC policy in accordance with the metadata, the attribute values being arranged resource-wise and principal-wise; querying the ABAC policy on combinations of resources and principals using the attribute values assigned by the data adapter, whereby permission data result; arranging said permission data resource-wise and generating system-readable ACLs based thereon; and supplying the generated ACLs for deployment in the system. 17. A computer program product comprising a non-transitory computer-readable medium with computer-readable instructions to be executed by a permissions provisioning module adapted to interact with a computer system in accordance with an attribute-based access control (ABAC) policy, which includes access rules expressed in terms of attributes,
the computer system comprising: a plurality of resources, each resource being associated with an access control list (ACL) indicating permissions held by principals of the system in respect of the resource; and an access control mechanism configured to selectively restrict principals' access to a resource in accordance with its associated ACL, wherein the access control mechanism of the computer system operates outside direct influence of the ABAC policy, wherein the system is operable to supply system metadata including metadata associated with the resources or metadata associated with principals of the system or both, the computer program product comprising instructions for: receiving the system metadata; assigning values to said attributes in the ABAC policy in accordance with the metadata, the attribute values being arranged resource-wise and principal-wise; querying the ABAC policy on combinations of resources and principals using the attribute values assigned by the data adapter, whereby permission data result; arranging said permission data resource-wise and generating system-readable ACLs based thereon; and supplying the generated ACLs for deployment in the system. | A permissions provisioning module includes a data adapter and a permissions calculator associated with a policy evaluator operable to evaluate an ABAC policy. The module is adapted to interact with a computer system including resources, metadata and an access control mechanism enforcing, in respect of each resource, an access control list associated with the resource. In operation, the data adapter receives metadata for said computer system and assigns values to attributes in the policy based on the metadata. The permissions calculator queries the policy evaluator on combinations of resources and principals of the system using the attribute values thus assigned, and returns permission data. The data adapter formats said permission data into ACLs, for deployment in the computer system.1. A permissions provisioning module adapted to interact with a computer system, which comprises:
a plurality of resources, each resource being associated with an access control list (ACL) indicating permissions in respect of the resource; memory storing system metadata including metadata associated with the resources or metadata associated with principals of the system or both; an access control mechanism configured to selectively restrict principals' access to a resource in accordance with its associated ACL, wherein the access control mechanism of the computer system operates outside direct influence of the ABAC policy; and a processor configured to perform the functions of: a policy evaluator configured to evaluate an access query against an attribute-based access control (ABAC) policy based on a collection of attribute values at least sufficient to evaluate against the ABAC policy, which is retrievable by the policy evaluator and includes access rules expressed in terms of attributes; a data adapter configured to receive the system metadata and assign values to said attributes in the ABAC policy in accordance with the metadata, the attribute values being arranged resource-wise and principal-wise; and a permissions calculator configured to query the policy evaluator on combinations of resources and principals using the attribute values assigned by the data adapter, and to supply resulting permission data to the data adapter, wherein the data adapter is configured to arrange said permission data resource-wise, generate system-readable ACLs based thereon and supply the generated ACLs for deployment in the system. 2. The permissions provisioning module of claim 1, further comprising a scheduler, wherein the data adapter or the permissions calculator or both are controllable by the scheduler, said scheduler being operable to initiate a complete or partial provisioning of ACLs for all system resources. 3. The permissions provisioning module of claim 2, wherein the scheduler is event-driven. 4. The permissions provisioning module of claim 2, wherein the scheduler is calendar-driven. 5. The permissions provisioning module of claim 2, wherein the scheduler is operable to initiate incremental provisioning, which is restricted to such ACLs that are affected by a change in the system metadata or a change in the ABAC policy or both. 6. The permissions provisioning module of claim 1, wherein the data adapter is further configured to deploy the generated ACLs in the system. 7. The permissions provisioning module of claim 6, wherein the data adapter is further configured to:
receive current ACLs; compare, for a given resource, a current ACL and a generated ACL; and omit deployment of the generated ACL if it is equivalent to the current ACL. 8. The permissions provisioning module of claim 1, wherein the data adapter accepts configuration data and assigns said attribute values in accordance with this, the configuration data being at least one of:
a mapping table relating resource metadata to resource attributes in the ABAC policy; a mapping table relating principal metadata to subject attributes in the ABAC policy; a mapping table relating such resource metadata that express functionalities of the resources to action attributes in the ABAC policy. 9. The permissions provisioning module of claim 1, wherein the permissions calculator is configured to query the policy evaluator on combinations of resources, principals and values of environment attributes. 10. The permissions provisioning module of claim 9, wherein the data adapter is configured to receive environment data relating to a current state of the computer system and assign values of environment attributes in the ABAC policy which it supplies to the permissions calculator. 11. The permissions provisioning module of claim 1, adapted to interact with a plurality of computer systems, each comprising:
a plurality of resources, each resource being associated with an access control list (ACL) indicating permissions in respect of the resource; memory storing system metadata including metadata associated with the resources or metadata or both associated with principals of the system; and an access control mechanism configured to selectively restrict principals' access to a resource in accordance with its associated ACL, the permissions provisioning module comprising: the policy evaluator; a plurality of data adapters, each configured to receive the system metadata from a system out of said plurality of computer systems and assign values to the attributes in the ABAC policy in accordance with the metadata, the attribute values being arranged resource-wise and principal-wise; and the permissions calculator, which is communicatively connected to the policy evaluator and each data adapter, and configured to query the policy evaluator on combinations of resources and principals within each system out of said plurality of computer systems, and supply resulting permission data to the corresponding data adapter, wherein a data adapter is configured, upon receipt of said permission data, to arrange the permission data resource-wise, generate system-readable ACLs based thereon and supply the generated ACLs for deployment in the corresponding system. 12. The permissions provisioning module of claim 1, configured to retrieve the ABAC policy from a site to which the computer system lacks direct access rights. 13. The permissions provisioning module of claim 1, wherein the resources in the computer system are one or more of the following:
devices, files, records, tables, processes, programs, networks, domains containing or receiving information. 14. A computer system, comprising:
a plurality of resources, each resource being associated with an ACL indicating permissions in respect of the resource; memory storing system metadata including metadata associated with the resources or metadata associated with principals of the system or both; and an access control mechanism configured to selectively restrict principals' access to a resource in accordance with its associated ACL, the computer system further comprising the permissions provisioning module of claim 1. 15. The computer system of claim 14, adapted to serve as one or more of the following:
a general-purpose file management system; a content management system, a financial system; a communications system; an industrial control system; an administrative system; an enterprise system; a simulations system; a computational system; an entertainment system, an educational system; a defence system. 16. A method of provisioning permissions in a computer system in accordance with an attribute-based access control (ABAC) policy, which includes access rules expressed in terms of attributes,
the computer system comprising: a plurality of resources, each resource being associated with an access control list (ACL) indicating permissions held by principals of the system in respect of the resource; and an access control mechanism configured to selectively restrict principals' access to a resource in accordance with its associated ACL, wherein the access control mechanism of the computer system operates outside direct influence of the ABAC policy, wherein the system is operable to supply system metadata including metadata associated with the resources or metadata or both associated with principals of the system, the method comprising: receiving the system metadata; assigning values to said attributes in the ABAC policy in accordance with the metadata, the attribute values being arranged resource-wise and principal-wise; querying the ABAC policy on combinations of resources and principals using the attribute values assigned by the data adapter, whereby permission data result; arranging said permission data resource-wise and generating system-readable ACLs based thereon; and supplying the generated ACLs for deployment in the system. 17. A computer program product comprising a non-transitory computer-readable medium with computer-readable instructions to be executed by a permissions provisioning module adapted to interact with a computer system in accordance with an attribute-based access control (ABAC) policy, which includes access rules expressed in terms of attributes,
the computer system comprising: a plurality of resources, each resource being associated with an access control list (ACL) indicating permissions held by principals of the system in respect of the resource; and an access control mechanism configured to selectively restrict principals' access to a resource in accordance with its associated ACL, wherein the access control mechanism of the computer system operates outside direct influence of the ABAC policy, wherein the system is operable to supply system metadata including metadata associated with the resources or metadata associated with principals of the system or both, the computer program product comprising instructions for: receiving the system metadata; assigning values to said attributes in the ABAC policy in accordance with the metadata, the attribute values being arranged resource-wise and principal-wise; querying the ABAC policy on combinations of resources and principals using the attribute values assigned by the data adapter, whereby permission data result; arranging said permission data resource-wise and generating system-readable ACLs based thereon; and supplying the generated ACLs for deployment in the system. | 2,400 |
6,787 | 6,787 | 14,533,901 | 2,433 | The present invention includes entity tracking, privacy assurance, and zone policy administration technologies allowing for the creation of zone policies, including the definition of zones and managed entities, the zone policies including rules that apply to the managed entities within or in relation to the zones, and privacy policies assuring privacy of sensitive data. The technologies also provide for the definition of sensors, rule event objects, and default event objects, and for the establishment of associations between rules and managed entities, sensors, and rule event objects so as to create zone policies. Event objects may generate zone policy events or actions upon compliance with or violation of various rules of zone policy. Managed entities are defined as entities associated with mobile devices capable of location tracking and communication with zone policy servers. Entities may be persons, vehicles, animals, or any other object for which tracking and zone policy administration is of value. Zone policy may include privacy policy that may restrict access to or set access conditions for data or information. Privacy policies may be used to ensure individual managed entities and their data remain anonymous to a desired degree and that sensitive data is appropriately protected. | 1. A method performed on a computing device that includes at least one processor and memory, the method comprising: monitoring a managed entity according to a zone policy, where an entity and a mobile device are together considered the managed entity, and where the zone policy indicates a mobile zone, a relationship between the mobile zone and the managed entity, and physical boundaries of the mobile zone. 2. The method of claim 1 further comprising verifying that the mobile device is in the possession of the entity. 3. The method of claim 1 further comprising generating an event in response to the managed entity entering a particular zone. 4. The method of claim 1 further comprising generating an event in response to the managed is within a particular proximity of another managed entity. 5. The method of claim 1 where the mobile device s an electronic badge, a cell phone, or a mobile computing device. 6. The method of claim 1 where the entity is a person, animal, vehicle, or other physical object. 7. The method of claim 1 where the managed entity is coupled to a network. 8. A system comprising a computing device and at least one program module that are together configured for performing actions, the computing device comprising at least one processor and memory, the actions comprising: monitoring a managed entity according to a zone policy, where an entity and a mobile device are together considered the managed entity, and where the zone policy indicates a mobile zone, a relationship between the mobile zone and the managed entity, and physical boundaries of the mobile zone. 9. The system of claim 8, the actions further comprising verifying that the mobile device is in the possession of the entity. 10. The system of claim 8, the actions further comprising generating an event in response to the managed entity entering a particular zone. 11. The system of claim 8, the actions further comprising generating an event in response to the managed is within a particular proximity of another managed entity. 12. The system of claim 8 where the mobile device is an electronic badge, a cell phone, or a mobile computing device. 13. The system of claim 8 where the entity is a person, animal, vehicle, or other physical object. 14. The system of claim 8 where the managed entity is coupled to a network. 15. At least one computer-readable device storing computer-executable instructions that, when executed by at least one processor of a computing device comprising memory, cause the computing device to perform actions comprising: monitoring a managed entity according to a zone policy, where an entity and a mobile device are together considered the managed entity, and where the zone policy indicates a mobile zone, a relationship between the mobile zone and the managed entity, and physical boundaries of the mobile zone. 16. The at least one computer-readable device of claim 15, the actions further comprising verifying that the mobile device is in the possession of the entity. 17. The at least one computer-readable device of claim 15, the actions further comprising generating an event in response to the managed entity entering a particular zone. 18. The at least one computer-readable device of claim 15, the actions further comprising generating an event in response to the managed is within a particular proximity of another managed entity. 19. The at least one computer-readable device of claim 15 where the mobile device is an electronic badge, a cell phone, or a mobile computing device, or where the managed entity is coupled to a network. 20. The at least one computer-readable device of claim 15 where the entity is a person, animal, vehicle, or other physical object. | The present invention includes entity tracking, privacy assurance, and zone policy administration technologies allowing for the creation of zone policies, including the definition of zones and managed entities, the zone policies including rules that apply to the managed entities within or in relation to the zones, and privacy policies assuring privacy of sensitive data. The technologies also provide for the definition of sensors, rule event objects, and default event objects, and for the establishment of associations between rules and managed entities, sensors, and rule event objects so as to create zone policies. Event objects may generate zone policy events or actions upon compliance with or violation of various rules of zone policy. Managed entities are defined as entities associated with mobile devices capable of location tracking and communication with zone policy servers. Entities may be persons, vehicles, animals, or any other object for which tracking and zone policy administration is of value. Zone policy may include privacy policy that may restrict access to or set access conditions for data or information. Privacy policies may be used to ensure individual managed entities and their data remain anonymous to a desired degree and that sensitive data is appropriately protected.1. A method performed on a computing device that includes at least one processor and memory, the method comprising: monitoring a managed entity according to a zone policy, where an entity and a mobile device are together considered the managed entity, and where the zone policy indicates a mobile zone, a relationship between the mobile zone and the managed entity, and physical boundaries of the mobile zone. 2. The method of claim 1 further comprising verifying that the mobile device is in the possession of the entity. 3. The method of claim 1 further comprising generating an event in response to the managed entity entering a particular zone. 4. The method of claim 1 further comprising generating an event in response to the managed is within a particular proximity of another managed entity. 5. The method of claim 1 where the mobile device s an electronic badge, a cell phone, or a mobile computing device. 6. The method of claim 1 where the entity is a person, animal, vehicle, or other physical object. 7. The method of claim 1 where the managed entity is coupled to a network. 8. A system comprising a computing device and at least one program module that are together configured for performing actions, the computing device comprising at least one processor and memory, the actions comprising: monitoring a managed entity according to a zone policy, where an entity and a mobile device are together considered the managed entity, and where the zone policy indicates a mobile zone, a relationship between the mobile zone and the managed entity, and physical boundaries of the mobile zone. 9. The system of claim 8, the actions further comprising verifying that the mobile device is in the possession of the entity. 10. The system of claim 8, the actions further comprising generating an event in response to the managed entity entering a particular zone. 11. The system of claim 8, the actions further comprising generating an event in response to the managed is within a particular proximity of another managed entity. 12. The system of claim 8 where the mobile device is an electronic badge, a cell phone, or a mobile computing device. 13. The system of claim 8 where the entity is a person, animal, vehicle, or other physical object. 14. The system of claim 8 where the managed entity is coupled to a network. 15. At least one computer-readable device storing computer-executable instructions that, when executed by at least one processor of a computing device comprising memory, cause the computing device to perform actions comprising: monitoring a managed entity according to a zone policy, where an entity and a mobile device are together considered the managed entity, and where the zone policy indicates a mobile zone, a relationship between the mobile zone and the managed entity, and physical boundaries of the mobile zone. 16. The at least one computer-readable device of claim 15, the actions further comprising verifying that the mobile device is in the possession of the entity. 17. The at least one computer-readable device of claim 15, the actions further comprising generating an event in response to the managed entity entering a particular zone. 18. The at least one computer-readable device of claim 15, the actions further comprising generating an event in response to the managed is within a particular proximity of another managed entity. 19. The at least one computer-readable device of claim 15 where the mobile device is an electronic badge, a cell phone, or a mobile computing device, or where the managed entity is coupled to a network. 20. The at least one computer-readable device of claim 15 where the entity is a person, animal, vehicle, or other physical object. | 2,400 |
6,788 | 6,788 | 14,131,161 | 2,422 | A system is described for determining an imaging deviation of a camera having: the camera, which is focused on a first distance, having a target pattern unit, which is situated at a second distance from the camera in a field of view of the camera and which has a three-dimensional surface texture having calibration markings, having a lens unit which is situated at a third distance from the camera and between the target pattern unit and the camera and is developed so that the three-dimensional surface texture is able to be imaged by the camera, and having a control unit that is connected to the camera and which is developed so that the imaging deviation of the camera is determinable by evaluating an image taken of the calibration markings of the three-dimensional surface texture. Also described is a method for determining an imaging deviation of a camera. | 1-14. (canceled) 15. A system for determining an imaging deviation of a camera, comprising:
the camera focused on a first distance; a target pattern unit situated at a second distance from the camera in a field of view of the camera having a three-dimensional surface texture including calibration markings; a lens unit situated at a third distance from the camera and between the target pattern unit and the camera, the lens unit being developed so that the three-dimensional surface texture is able to be imaged by the camera; and a control unit connected to the camera and developed so that the imaging deviation of the camera is determinable by evaluating an image taken of the calibration markings of the three-dimensional surface texture. 16. The system as recited in claim 15, wherein a deviation of at least one of a depth of field and a focal position of the camera is determinable as the imaging deviation of the camera. 17. The system as recited in claim 15, wherein at least one of a pitch deviation, a yaw deviation, and a roll deviation is determinable as the imaging deviation of the camera. 18. The system as recited in claim 15, wherein at least one of an imaging error, a spherical aberration, an astigmatism, and a field curvature is determinable as the imaging deviation of the camera. 19. The system as recited in claim 15, further comprising:
a light source developed so that the calibration markings are able to be illuminated one of reflectively, transflectively, and transmissively. 20. The system as recited in claim 19, wherein the light source is tunable in a wavelength. 21. The system as recited in claim 15, wherein the image of the calibration markings is able to be taken by light having different wavelengths, and the imaging deviation of the camera is determinable as a function of a wavelength. 22. The system as recited in claim 15, wherein the lens unit includes an optical component having a variable focal length controllable by the control unit. 23. The system as recited in claim 15, wherein the calibration markings are developed at least one of (1) as stripe patterns having different strip widths, (2) as squares having a different orientations, and (3) as alphanumeric symbols. 24. A method for determining an imaging deviation of a camera, comprising:
focusing a camera on a first distance; arranging a target pattern unit having a three-dimensional surface texture having calibration markings at a second distance from the camera; inserting a lens unit situated at a third distance from the camera for imaging the three-dimensional surface texture by the camera; taking an image of the calibration markings of the three-dimensional surface texture by the camera; and determining the imaging deviation of the camera by a control unit by evaluating the image taken. 25. The method as recited in claim 24, wherein at least one of a deviation of at least one of a depth of field and a focal position of the camera is determined as the imaging deviation of the camera. 26. The method as recited in claim 24, wherein at least one of a pitch deviation, a yaw deviation, and a roll deviation of the camera is determined as the imaging deviation of the camera. 27. The method as recited in claim 24, wherein at least one of an imaging error, a spherical aberration, an astigmatism, and a field curvature is determinable as the imaging deviation of the camera. 28. The method as recited in claim 24, wherein the image of the calibration markings is taken by light having different wavelengths, and the imaging deviation of the camera is determined as a function of a wavelength. | A system is described for determining an imaging deviation of a camera having: the camera, which is focused on a first distance, having a target pattern unit, which is situated at a second distance from the camera in a field of view of the camera and which has a three-dimensional surface texture having calibration markings, having a lens unit which is situated at a third distance from the camera and between the target pattern unit and the camera and is developed so that the three-dimensional surface texture is able to be imaged by the camera, and having a control unit that is connected to the camera and which is developed so that the imaging deviation of the camera is determinable by evaluating an image taken of the calibration markings of the three-dimensional surface texture. Also described is a method for determining an imaging deviation of a camera.1-14. (canceled) 15. A system for determining an imaging deviation of a camera, comprising:
the camera focused on a first distance; a target pattern unit situated at a second distance from the camera in a field of view of the camera having a three-dimensional surface texture including calibration markings; a lens unit situated at a third distance from the camera and between the target pattern unit and the camera, the lens unit being developed so that the three-dimensional surface texture is able to be imaged by the camera; and a control unit connected to the camera and developed so that the imaging deviation of the camera is determinable by evaluating an image taken of the calibration markings of the three-dimensional surface texture. 16. The system as recited in claim 15, wherein a deviation of at least one of a depth of field and a focal position of the camera is determinable as the imaging deviation of the camera. 17. The system as recited in claim 15, wherein at least one of a pitch deviation, a yaw deviation, and a roll deviation is determinable as the imaging deviation of the camera. 18. The system as recited in claim 15, wherein at least one of an imaging error, a spherical aberration, an astigmatism, and a field curvature is determinable as the imaging deviation of the camera. 19. The system as recited in claim 15, further comprising:
a light source developed so that the calibration markings are able to be illuminated one of reflectively, transflectively, and transmissively. 20. The system as recited in claim 19, wherein the light source is tunable in a wavelength. 21. The system as recited in claim 15, wherein the image of the calibration markings is able to be taken by light having different wavelengths, and the imaging deviation of the camera is determinable as a function of a wavelength. 22. The system as recited in claim 15, wherein the lens unit includes an optical component having a variable focal length controllable by the control unit. 23. The system as recited in claim 15, wherein the calibration markings are developed at least one of (1) as stripe patterns having different strip widths, (2) as squares having a different orientations, and (3) as alphanumeric symbols. 24. A method for determining an imaging deviation of a camera, comprising:
focusing a camera on a first distance; arranging a target pattern unit having a three-dimensional surface texture having calibration markings at a second distance from the camera; inserting a lens unit situated at a third distance from the camera for imaging the three-dimensional surface texture by the camera; taking an image of the calibration markings of the three-dimensional surface texture by the camera; and determining the imaging deviation of the camera by a control unit by evaluating the image taken. 25. The method as recited in claim 24, wherein at least one of a deviation of at least one of a depth of field and a focal position of the camera is determined as the imaging deviation of the camera. 26. The method as recited in claim 24, wherein at least one of a pitch deviation, a yaw deviation, and a roll deviation of the camera is determined as the imaging deviation of the camera. 27. The method as recited in claim 24, wherein at least one of an imaging error, a spherical aberration, an astigmatism, and a field curvature is determinable as the imaging deviation of the camera. 28. The method as recited in claim 24, wherein the image of the calibration markings is taken by light having different wavelengths, and the imaging deviation of the camera is determined as a function of a wavelength. | 2,400 |
6,789 | 6,789 | 14,192,839 | 2,421 | Networks, systems and displays for providing derived data and predictive information for use in multivariable component systems and activities; and in particular for use in motor racing such as in NASCAR®, Indy Car, Grand-Am (sports car racing), and/or Formula 1® racing. More particularly, there are systems equipment and networks for the monitoring and collecting of raw data regarding races, both real time and historic. This raw data is then analyzed to provide derived data, predictive data, virtual data, and combinations and variations of this data, which depending upon the nature of this data may be packaged, distributed, displayed and used in various setting and applications. | 1. A determinative system for obtaining, evaluating and displaying in a predictive manner, information and data regarding the activities of units in a multivariable component system, the determinative system comprising:
a. a source of raw data regarding activities of a first plurality of units of a multivariable component system; b. a source of derived data regarding activities of a second plurality of units of the multivariable component system; c. wherein, at least one unit of the first plurality of units is the same as a unit of the second plurality of units; d. a processor in communication with the source of derived data and the source of raw data; e. the processor capable of performing a first predictive computation to determine a change of state event in the multivariable component system from the raw data and the derived data; and, f. whereby the processor determines predictive information comprising a probability for the change of state event, and wherein the processer communicates the predictive information to a display. 2. The system of claim 1, wherein the multivariable component system comprises a NASCAR sanctioned event. 3. The system of claim 2, wherein at least one unit of the first plurality of units is a race car driven by at least one of the drivers selected from the group consisting of Jimmie Johnson, Dale Earnhardt Jr., Mark Martin, Brad Keselowski, Ryan Newman, Greg Biffle, Danica Patrick, Michael McDowell, Jeff Gordon, and Paul Menard. 4. The system of claim 1, wherein the processor is capable of performing a second predictive computation to determine the change of state event in the multivariable component system from the raw data and the derived data; whereby the processor determines predictive information comprising a probability for the change of state event based in part on the first and second predictive computation, and wherein, the processer transmits the predictive information to a display. 5. The system of claim 1, wherein at least 5 of the units in the first plurality units are the same as the units in the second plurality of units. 6. The system of claim 1, wherein the display is a Second Screen. 7. The system of system claim 1, wherein the display is a commercial media broadcast. 8. The system of claim 1, where wherein the display is a hand held device. 9. The system of claim 1, wherein the display has an imagine comprising an image of a race car with the predictive information displayed in association with the race care image. 10. The system of claim 1, wherein the display has an imagine comprising a image of a race car with the predictive information displayed in association with the race care image, wherein the predictive information is displayed in a Second Screen. 11. The system of claim 2, wherein the processor is capable of performing a second predictive computation to determine the change of state event in the multivariable component system from the raw data and the derived data; whereby the processor determines predictive information comprising a probability for the change of state event based in part on the first and second predictive computation, and wherein, the processer transmits the predictive information to a display. 12. The system of claim 2, wherein at least 5 of the units in the first plurality units are the same as the units in the second plurality of units. 13. The system of claim 2, wherein the display is a Second Screen. 14. The system of system claim 2, wherein the display is a commercial media broadcast. 15. The system of claim 2, where wherein the display is a hand held device. 16. The system of claim 2, wherein the display has an imagine comprising an image of a race car with the predictive information displayed in association with the race care image. 17. The system of claim 2, wherein the display has an imagine comprising an image of a race car with the predictive information displayed in association with the race care image, wherein the predictive information is displayed in a Second Screen. 18. The system of claim 4, wherein at laser 5 of the units in the first plurality units are the same as the units in the second plurality of units. 19. The system of claim 4, wherein the display is a Second Screen. 20. The system of system claim 4, wherein the display is a commercial media broadcast. 21. The system of claim 4, where wherein the display is a hand held device. 22. The system of claim 4, wherein the display has an imagine comprising an image of a race car with the predictive information displayed in association with the race care image. 23. The system of claim 4, wherein the display has an imagine comprising an image of a race car with the predictive information displayed in association with the race care image, wherein the predictive information is displayed in a Second Screen. 24. The system of claim 1, wherein the multivariable component system comprises a Formula 1 event. 25. The system of claim 1, wherein the multivariable component system comprises a Indy Car event. 26. The system of claim 1, wherein the multivariable component system comprises a motorized vehicle race. 27. The system of claim 1, wherein the multivariable component system comprises a race. 28. The system of claim 1, wherein the multivariable component system comprises a stock car race. 29. The system of claim 1, comprising a second processors and a local data entry device for providing observed data, wherein the second processor is in communication with the local data entry device and in communication with the processor, whereby the second processor is capable of performing a first predictive computation to determine a change of state event in the multivariable component system from the observed data; and, the second processor is capable of determining predictive information comprising a probability for the change of state event, and wherein the processer communicates the predictive information to a device, selected from the group consisting of the server, a GUI, the processor, a third processor, a pit administration device, and an HMI. 30. The system of claim 29, comprising a pit data administration device located between the pit data entry device and the second server, whereby the pit data administration device is capable of controlling the transmission of observed data to the second processor. 31. The system of claim 29, comprising a communication link to the second server providing to the second processor a timing and scoring feed data; whereby the second processor is capable of performing a first predictive computation to determine a change of state event in the multivariable component system from the observed data and the timing and scoring data. 32. The system of claim 4, comprising a second processors and a local data entry device for providing observed data, wherein the second processor is in communication with the local data entry device and in communication with the processor, whereby the second processor is capable of performing a first predictive computation to determine a change of state event in the multivariable component system from the observed data; and, the second processor is capable of determining predictive information comprising a probability for the change of state event, and wherein the processer communicates the predictive information to a device, selected from the group consisting of the server, a GUI, the processor, a third processor, a pit administration device, and an HMI. 33. The system of claim 32, comprising a pit data administration device located between the pit data entry device and the second server, whereby the pit data administration device is capable of controlling the transmission of observed data to the second processor. 34. The system of claim 32, comprising a communication link to the second server providing to the second processor a timing and scoring feed data; whereby the second processor is capable of performing a first predictive computation to determine a change of state event in the multivariable component system from the observed data and the timing and scoring data. 35. The system of claim 28, comprising a second processors and a local data entry device for providing observed data, wherein the second processor is in communication with the local data entry device and in communication with the processor, whereby the second processor is capable of performing a first predictive computation to determine a change of state event in the multivariable component system from the observed data; and, the second processor is capable of determining predictive information comprising a probability for the change of state event, and wherein the processer communicates the predictive information to a device, selected from the group consisting of the server, a GUI, the processor, a third processor, a pit administration device, and an HMI. 36. The system of claim 35, comprising a pit data administration device located between the pit data entry device and the second server, whereby the pit data administration device is capable of controlling the transmission of observed data to the second processor. 37. The system of claim 35, comprising a communication link to the second server providing to the second processor a timing and scoring feed data; whereby the second processor is capable of performing a first predictive computation to determine a change of state event in the multivariable component system from the observed data and the timing and scoring data. 38. A determinative system for obtaining, evaluating and displaying in a predictive manner, information and data regarding the activities of units in a virtual multivariable component system, the determinative system comprising:
a. a source of virtual raw data regarding activities of a first plurality of units of a multivariable component system; b. a source of virtual derived data regarding activities of a second plurality of units of the multivariable component system; c. wherein, at least one unit of the first plurality of units is the same as a unit of the second plurality of units; d. a processor in communication with the source of virtual derived data and the source of virtual raw data; e. the processor capable of performing a first predictive computation to determine a change of state event in the virtual multivariable component system from the virtual raw data and the virtual derived data; and, f. whereby the processor determines predictive information comprising a probability for the change of state event, and wherein the processer communicates the predictive information to a display. 39. The system of claim 28, wherein the processor is capable of performing a second predictive computation to determine the change of state event in the multivariable component system from the raw data and the derived data; whereby the processor determines predictive information comprising a probability for the change of state event based in part on the first and second predictive computation, and wherein, the processer transmits the predictive information to a display. 40. The system of claim 28, wherein at laser 5 of the units in the first plurality units are the same as the units in the second plurality of units. 41. The system of claim 28, wherein the display is a Second Screen. 42. The system of system claim 1, wherein the display is a commercial media broadcast. 43. The system of claim 28, where wherein the display is a hand held device. 44. The system of claim 28, wherein the display has an imagine comprising an image of a race car with the predictive information displayed in association with the race care image. 45. The system of claim 28, wherein the display has an imagine comprising an image of a race car with the predictive information displayed in association with the race care image, wherein the predictive information is displayed in a Second Screen. 46. A method of providing a display of a race to a viewer, the method comprising:
a. providing actual race data, historic race data to a network; b. processing the actual and historic race data and thereby generating derived and predictive race data from the received actual race data and historic race data; c. transmitting the derived and predictive race data along the network; d. a mobile device on the network receiving the predictive race data; and, e. the mobile device displaying the predictive race data in a GUI. 47. The method of claim 46, wherein the race is a stock car race. 48. The method of claim 46, wherein the race is a formula 1 race. 49. The method of claim 47, wherein the mobile device displays the predictive data in preconfigured windows on the GUI, the windows being menu driven to provide predetermined displays of the predictive data. 50. The method of claim 47, wherein the mobile device displays, predictive data, derived data and actual data, in preconfigured windows on the GUI, the windows being menu driven to provide predetermined displays of the data. 51. The method of claim 47, comprising a data processing assembly, residing in the cloud, whereby the data processing assembly performs the processing of the actual and historic data. 52. The method of claim 47, wherein the derived data is processed with a second actual data to provide a second predictive data. 53. The method of claim 47, wherein the network is a distributed net work comprising a plurality of data processing assemblies, each receiving actual data and providing to the network derived and predictive data. 54. The method of claim 47, wherein the GUI displays images of the race. 55. The method of claim 49, wherein the GUI displays images of the race. 56. A method of combining information about a race for later viewing, the method comprising: storing data containing a video image of the race; associating in a time synchronized manner with the video image actual, predictive and derived data; storing the associated video and data; and making the associated video and data available for viewing. 57. A method of viewing a race, the method comprising: accessing data comprising a video image of the race associated in a time synchronized manner with actual, predictive and derived data; viewing the video of the race and at least the predictive data; having the capability to skip forward in the viewing of the race, based at least in part upon the predictive data, whereby the viewer has the ability to create and view high lights of the race without knowing the actual outcome of the race. | Networks, systems and displays for providing derived data and predictive information for use in multivariable component systems and activities; and in particular for use in motor racing such as in NASCAR®, Indy Car, Grand-Am (sports car racing), and/or Formula 1® racing. More particularly, there are systems equipment and networks for the monitoring and collecting of raw data regarding races, both real time and historic. This raw data is then analyzed to provide derived data, predictive data, virtual data, and combinations and variations of this data, which depending upon the nature of this data may be packaged, distributed, displayed and used in various setting and applications.1. A determinative system for obtaining, evaluating and displaying in a predictive manner, information and data regarding the activities of units in a multivariable component system, the determinative system comprising:
a. a source of raw data regarding activities of a first plurality of units of a multivariable component system; b. a source of derived data regarding activities of a second plurality of units of the multivariable component system; c. wherein, at least one unit of the first plurality of units is the same as a unit of the second plurality of units; d. a processor in communication with the source of derived data and the source of raw data; e. the processor capable of performing a first predictive computation to determine a change of state event in the multivariable component system from the raw data and the derived data; and, f. whereby the processor determines predictive information comprising a probability for the change of state event, and wherein the processer communicates the predictive information to a display. 2. The system of claim 1, wherein the multivariable component system comprises a NASCAR sanctioned event. 3. The system of claim 2, wherein at least one unit of the first plurality of units is a race car driven by at least one of the drivers selected from the group consisting of Jimmie Johnson, Dale Earnhardt Jr., Mark Martin, Brad Keselowski, Ryan Newman, Greg Biffle, Danica Patrick, Michael McDowell, Jeff Gordon, and Paul Menard. 4. The system of claim 1, wherein the processor is capable of performing a second predictive computation to determine the change of state event in the multivariable component system from the raw data and the derived data; whereby the processor determines predictive information comprising a probability for the change of state event based in part on the first and second predictive computation, and wherein, the processer transmits the predictive information to a display. 5. The system of claim 1, wherein at least 5 of the units in the first plurality units are the same as the units in the second plurality of units. 6. The system of claim 1, wherein the display is a Second Screen. 7. The system of system claim 1, wherein the display is a commercial media broadcast. 8. The system of claim 1, where wherein the display is a hand held device. 9. The system of claim 1, wherein the display has an imagine comprising an image of a race car with the predictive information displayed in association with the race care image. 10. The system of claim 1, wherein the display has an imagine comprising a image of a race car with the predictive information displayed in association with the race care image, wherein the predictive information is displayed in a Second Screen. 11. The system of claim 2, wherein the processor is capable of performing a second predictive computation to determine the change of state event in the multivariable component system from the raw data and the derived data; whereby the processor determines predictive information comprising a probability for the change of state event based in part on the first and second predictive computation, and wherein, the processer transmits the predictive information to a display. 12. The system of claim 2, wherein at least 5 of the units in the first plurality units are the same as the units in the second plurality of units. 13. The system of claim 2, wherein the display is a Second Screen. 14. The system of system claim 2, wherein the display is a commercial media broadcast. 15. The system of claim 2, where wherein the display is a hand held device. 16. The system of claim 2, wherein the display has an imagine comprising an image of a race car with the predictive information displayed in association with the race care image. 17. The system of claim 2, wherein the display has an imagine comprising an image of a race car with the predictive information displayed in association with the race care image, wherein the predictive information is displayed in a Second Screen. 18. The system of claim 4, wherein at laser 5 of the units in the first plurality units are the same as the units in the second plurality of units. 19. The system of claim 4, wherein the display is a Second Screen. 20. The system of system claim 4, wherein the display is a commercial media broadcast. 21. The system of claim 4, where wherein the display is a hand held device. 22. The system of claim 4, wherein the display has an imagine comprising an image of a race car with the predictive information displayed in association with the race care image. 23. The system of claim 4, wherein the display has an imagine comprising an image of a race car with the predictive information displayed in association with the race care image, wherein the predictive information is displayed in a Second Screen. 24. The system of claim 1, wherein the multivariable component system comprises a Formula 1 event. 25. The system of claim 1, wherein the multivariable component system comprises a Indy Car event. 26. The system of claim 1, wherein the multivariable component system comprises a motorized vehicle race. 27. The system of claim 1, wherein the multivariable component system comprises a race. 28. The system of claim 1, wherein the multivariable component system comprises a stock car race. 29. The system of claim 1, comprising a second processors and a local data entry device for providing observed data, wherein the second processor is in communication with the local data entry device and in communication with the processor, whereby the second processor is capable of performing a first predictive computation to determine a change of state event in the multivariable component system from the observed data; and, the second processor is capable of determining predictive information comprising a probability for the change of state event, and wherein the processer communicates the predictive information to a device, selected from the group consisting of the server, a GUI, the processor, a third processor, a pit administration device, and an HMI. 30. The system of claim 29, comprising a pit data administration device located between the pit data entry device and the second server, whereby the pit data administration device is capable of controlling the transmission of observed data to the second processor. 31. The system of claim 29, comprising a communication link to the second server providing to the second processor a timing and scoring feed data; whereby the second processor is capable of performing a first predictive computation to determine a change of state event in the multivariable component system from the observed data and the timing and scoring data. 32. The system of claim 4, comprising a second processors and a local data entry device for providing observed data, wherein the second processor is in communication with the local data entry device and in communication with the processor, whereby the second processor is capable of performing a first predictive computation to determine a change of state event in the multivariable component system from the observed data; and, the second processor is capable of determining predictive information comprising a probability for the change of state event, and wherein the processer communicates the predictive information to a device, selected from the group consisting of the server, a GUI, the processor, a third processor, a pit administration device, and an HMI. 33. The system of claim 32, comprising a pit data administration device located between the pit data entry device and the second server, whereby the pit data administration device is capable of controlling the transmission of observed data to the second processor. 34. The system of claim 32, comprising a communication link to the second server providing to the second processor a timing and scoring feed data; whereby the second processor is capable of performing a first predictive computation to determine a change of state event in the multivariable component system from the observed data and the timing and scoring data. 35. The system of claim 28, comprising a second processors and a local data entry device for providing observed data, wherein the second processor is in communication with the local data entry device and in communication with the processor, whereby the second processor is capable of performing a first predictive computation to determine a change of state event in the multivariable component system from the observed data; and, the second processor is capable of determining predictive information comprising a probability for the change of state event, and wherein the processer communicates the predictive information to a device, selected from the group consisting of the server, a GUI, the processor, a third processor, a pit administration device, and an HMI. 36. The system of claim 35, comprising a pit data administration device located between the pit data entry device and the second server, whereby the pit data administration device is capable of controlling the transmission of observed data to the second processor. 37. The system of claim 35, comprising a communication link to the second server providing to the second processor a timing and scoring feed data; whereby the second processor is capable of performing a first predictive computation to determine a change of state event in the multivariable component system from the observed data and the timing and scoring data. 38. A determinative system for obtaining, evaluating and displaying in a predictive manner, information and data regarding the activities of units in a virtual multivariable component system, the determinative system comprising:
a. a source of virtual raw data regarding activities of a first plurality of units of a multivariable component system; b. a source of virtual derived data regarding activities of a second plurality of units of the multivariable component system; c. wherein, at least one unit of the first plurality of units is the same as a unit of the second plurality of units; d. a processor in communication with the source of virtual derived data and the source of virtual raw data; e. the processor capable of performing a first predictive computation to determine a change of state event in the virtual multivariable component system from the virtual raw data and the virtual derived data; and, f. whereby the processor determines predictive information comprising a probability for the change of state event, and wherein the processer communicates the predictive information to a display. 39. The system of claim 28, wherein the processor is capable of performing a second predictive computation to determine the change of state event in the multivariable component system from the raw data and the derived data; whereby the processor determines predictive information comprising a probability for the change of state event based in part on the first and second predictive computation, and wherein, the processer transmits the predictive information to a display. 40. The system of claim 28, wherein at laser 5 of the units in the first plurality units are the same as the units in the second plurality of units. 41. The system of claim 28, wherein the display is a Second Screen. 42. The system of system claim 1, wherein the display is a commercial media broadcast. 43. The system of claim 28, where wherein the display is a hand held device. 44. The system of claim 28, wherein the display has an imagine comprising an image of a race car with the predictive information displayed in association with the race care image. 45. The system of claim 28, wherein the display has an imagine comprising an image of a race car with the predictive information displayed in association with the race care image, wherein the predictive information is displayed in a Second Screen. 46. A method of providing a display of a race to a viewer, the method comprising:
a. providing actual race data, historic race data to a network; b. processing the actual and historic race data and thereby generating derived and predictive race data from the received actual race data and historic race data; c. transmitting the derived and predictive race data along the network; d. a mobile device on the network receiving the predictive race data; and, e. the mobile device displaying the predictive race data in a GUI. 47. The method of claim 46, wherein the race is a stock car race. 48. The method of claim 46, wherein the race is a formula 1 race. 49. The method of claim 47, wherein the mobile device displays the predictive data in preconfigured windows on the GUI, the windows being menu driven to provide predetermined displays of the predictive data. 50. The method of claim 47, wherein the mobile device displays, predictive data, derived data and actual data, in preconfigured windows on the GUI, the windows being menu driven to provide predetermined displays of the data. 51. The method of claim 47, comprising a data processing assembly, residing in the cloud, whereby the data processing assembly performs the processing of the actual and historic data. 52. The method of claim 47, wherein the derived data is processed with a second actual data to provide a second predictive data. 53. The method of claim 47, wherein the network is a distributed net work comprising a plurality of data processing assemblies, each receiving actual data and providing to the network derived and predictive data. 54. The method of claim 47, wherein the GUI displays images of the race. 55. The method of claim 49, wherein the GUI displays images of the race. 56. A method of combining information about a race for later viewing, the method comprising: storing data containing a video image of the race; associating in a time synchronized manner with the video image actual, predictive and derived data; storing the associated video and data; and making the associated video and data available for viewing. 57. A method of viewing a race, the method comprising: accessing data comprising a video image of the race associated in a time synchronized manner with actual, predictive and derived data; viewing the video of the race and at least the predictive data; having the capability to skip forward in the viewing of the race, based at least in part upon the predictive data, whereby the viewer has the ability to create and view high lights of the race without knowing the actual outcome of the race. | 2,400 |
6,790 | 6,790 | 14,580,671 | 2,415 | Systems and methods provide load balancing on time division multiple access (TDMA) inroute channels of a satellite network. A bandwidth allocation manager or module can employ smart admission techniques to admit new terminals based upon the available bandwidth capacities of TDMA inroute channels including committed information rate (CIR) bandwidth requirements of already admitted terminals and current and CIR bandwidth requirements of the new terminals. Attempts are made to fully load a first TDMA inroute channel before providing admission to a second TDMA inroute channel. Additionally, an already admitted terminal requesting increased bandwidth or one or more other already admitted terminals may be reassigned to one or more alternative TDMA inroute channels to accommodate the requested increase in bandwidth. | 1. A method, comprising:
determining available bandwidth capacity of each channel in a network; determining bandwidth requirements of a terminal seeking admission to the network; determining all channels in the network that are capable of admitting the terminal based on their respective bandwidth capacity and the bandwidth requirements of the terminal; selecting the channel capable of admitting the terminal and having the least available bandwidth capacity; and admitting the terminal to the selected channel. 2. The method of claim 1, wherein the network is a satellite network. 3. The method of claim 1, wherein the channels in the network are time division multiple access (TDMA) inroute channels. 4. The method of claim 1, wherein determining the bandwidth capacity of each channel in the network comprises calculating the number of slots on each of the channels that are being utilized to serve current bandwidth demands of already admitted terminals and the number of slots on each of the channels that are reserved to accommodate committed information rate (CIR) bandwidth requirements of the already admitted terminals. 5. The method of claim 4, wherein determining the bandwidth capacity of each channel in the network further comprises subtracting the number of slots on each of the channels that are being utilized to serve current bandwidth demands of the already admitted terminals and the number of slots on each of the channels that are reserved to accommodate CIR bandwidth requirements of the already admitted terminals from a total number of slots on each of the channels. 6. The method of claim 1, wherein the bandwidth requirements of the terminal comprise a minimum bandwidth requirement and a CIR bandwidth requirement. 7. The method of claim 6, wherein the selected channel comprises an alternative channel capable of supporting at least the minimum bandwidth requirement of the terminal and that has the greatest amount of available bandwidth capacity to maximize partial satisfaction of the CIR bandwidth requirement of the terminal if no channel in the network can fully satisfy the minimum bandwidth requirement, the current bandwidth requirement to satisfy a current session, and the CIR bandwidth requirement of the terminal. 8. The method of claim 7, wherein the minimum bandwidth requirement includes a current bandwidth requirement to satisfy a current session. 9. The method of claim 6, wherein the bandwidth requirements further comprises a maximum information rate (MIR) bandwidth requirement. 10. The method of claim 1, wherein admitting the terminal to the selected channel is performed pursuant to reassignment of one or more terminals already admitted to the selected channel to one or more alternative channels. 11. The method of claim 10, wherein the one or more alternative channels to which the one or more terminals are reassigned have bandwidth capacity to satisfy minimum bandwidth requirements, current bandwidth requirements, and CIR bandwidth requirements of the one or more terminals. 12. A method, comprising:
receiving a request for increased bandwidth demand from a terminal admitted to a first channel in a network; determining bandwidth capacity of each channel in the network; determining all channels in the network that are capable of accommodating the increased bandwidth demand from the terminal based on their respective bandwidth capacity and the bandwidth requirements of the terminal including the increased bandwidth demand; selecting a second channel in the network having the least available bandwidth capacity out of the channels determined to be capable of accommodating the increased bandwidth demand from the terminal; and reassigning the terminal to the second channel. 13. The method of claim 12, wherein the network is a satellite network. 14. The method of claim 12, wherein the channels in the network are time division multiple access (TDMA) inroute channels. 15. The method of claim 12, wherein determining the bandwidth capacity of each channel in the network comprises calculating the number of slots on each of the channels that are being utilized to serve current bandwidth demands of already admitted terminals and the number of slots on each of the channels that are reserved to accommodate committed information rate (CIR) bandwidth requirements of the already admitted terminals. 16. The method of claim 15, wherein determining the bandwidth capacity of each channel in the network further comprises subtracting the number of slots on each of the channels that are being utilized to serve current bandwidth demands of the already admitted terminals and the number of slots on each of the channels that are reserved to accommodate CIR bandwidth requirements of the already admitted terminals from a total number of slots on each of the channels. 17. The method of claim 12, wherein the bandwidth requirements of the terminal further comprise a current bandwidth requirement to satisfy a current session and a CIR bandwidth requirement. 18. The method of claim 17, further comprising selecting a third channel upon a determination that a channel capable of fully satisfying the current bandwidth requirement, the increased bandwidth demand, and the CIR bandwidth requirement of the terminal is non-existent and that reassignment of the terminal to the second channel cannot be performed, the third channel being capable of supporting the current bandwidth requirement of the terminal, the increased bandwidth demand and that has the greatest amount of available bandwidth capacity to maximize partial satisfaction of the CIR bandwidth requirement of the terminal. 19. The method of claim 18, further comprising selecting one or more alternative terminals to reassign to one or more alternative channels upon a determination that a channel capable of supporting the current bandwidth requirement of the terminal and the increased bandwidth demand of the terminal is non-existent. 20. The method of claim 19, further comprising denying the increased bandwidth demand upon a determination that the one or more alternative terminals cannot be reassigned to the one or more alternative channels due to the one or more alternative channels being incapable of supporting the bandwidth requirements of the one or more alternative terminals. 21. A system, comprising:
a shared access network; and a bandwidth allocation module configured to balance load across time division multiple access (TDMA) inroute channels in the shared access network by performing the following:
determine available bandwidth capacity of each TDMA inroute channel in the shared access network;
determine bandwidth requirements of a terminal;
determine all TDMA inroute channels in the shared access network that are capable of admitting the terminal based on their respective bandwidth capacity and the bandwidth requirements of the terminal;
select one of the TDMA inroute channels to admit the terminal based upon a sequence of determinations comprising:
a determination that a TDMA inroute channel exists that is capable of supporting the bandwidth requirements of the terminal and has the least available bandwidth capacity;
upon determining that no TDMA inroute channel exists that is capable of supporting the entirety of the bandwidth requirements of the terminal, a determination that a TDMA inroute channel exists that is capable of supporting a guaranteed minimum aspect of the bandwidth requirements of the terminal and has the most available bandwidth capacity to support growth towards the greatest portion of a guaranteed committed information rate (CIR) aspect of the bandwidth requirements of the terminal. 22. The system of claim 21, wherein the terminal comprises a to-be-admitted terminal seeking admission to the shared access network. 23. The system of claim 21, wherein the terminal comprises an already-admitted terminal seeking increased bandwidth allocation to support a committed information service session commensurate with the guaranteed CIR aspect of the bandwidth requirements of the terminal. 24. The system of claim 21, wherein the terminal comprises an already-admitted terminal to be reassigned to accommodate admission of a to-be-admitted terminal seeking admission to the shared access network. 25. The system of claim 21, wherein the terminal comprises an already-admitted terminal to be reassigned to accommodate admission of an already-admitted terminal seeking increased bandwidth allocation to support a committed information service session commensurate with the guaranteed CIR aspect of the bandwidth requirements of the terminal. | Systems and methods provide load balancing on time division multiple access (TDMA) inroute channels of a satellite network. A bandwidth allocation manager or module can employ smart admission techniques to admit new terminals based upon the available bandwidth capacities of TDMA inroute channels including committed information rate (CIR) bandwidth requirements of already admitted terminals and current and CIR bandwidth requirements of the new terminals. Attempts are made to fully load a first TDMA inroute channel before providing admission to a second TDMA inroute channel. Additionally, an already admitted terminal requesting increased bandwidth or one or more other already admitted terminals may be reassigned to one or more alternative TDMA inroute channels to accommodate the requested increase in bandwidth.1. A method, comprising:
determining available bandwidth capacity of each channel in a network; determining bandwidth requirements of a terminal seeking admission to the network; determining all channels in the network that are capable of admitting the terminal based on their respective bandwidth capacity and the bandwidth requirements of the terminal; selecting the channel capable of admitting the terminal and having the least available bandwidth capacity; and admitting the terminal to the selected channel. 2. The method of claim 1, wherein the network is a satellite network. 3. The method of claim 1, wherein the channels in the network are time division multiple access (TDMA) inroute channels. 4. The method of claim 1, wherein determining the bandwidth capacity of each channel in the network comprises calculating the number of slots on each of the channels that are being utilized to serve current bandwidth demands of already admitted terminals and the number of slots on each of the channels that are reserved to accommodate committed information rate (CIR) bandwidth requirements of the already admitted terminals. 5. The method of claim 4, wherein determining the bandwidth capacity of each channel in the network further comprises subtracting the number of slots on each of the channels that are being utilized to serve current bandwidth demands of the already admitted terminals and the number of slots on each of the channels that are reserved to accommodate CIR bandwidth requirements of the already admitted terminals from a total number of slots on each of the channels. 6. The method of claim 1, wherein the bandwidth requirements of the terminal comprise a minimum bandwidth requirement and a CIR bandwidth requirement. 7. The method of claim 6, wherein the selected channel comprises an alternative channel capable of supporting at least the minimum bandwidth requirement of the terminal and that has the greatest amount of available bandwidth capacity to maximize partial satisfaction of the CIR bandwidth requirement of the terminal if no channel in the network can fully satisfy the minimum bandwidth requirement, the current bandwidth requirement to satisfy a current session, and the CIR bandwidth requirement of the terminal. 8. The method of claim 7, wherein the minimum bandwidth requirement includes a current bandwidth requirement to satisfy a current session. 9. The method of claim 6, wherein the bandwidth requirements further comprises a maximum information rate (MIR) bandwidth requirement. 10. The method of claim 1, wherein admitting the terminal to the selected channel is performed pursuant to reassignment of one or more terminals already admitted to the selected channel to one or more alternative channels. 11. The method of claim 10, wherein the one or more alternative channels to which the one or more terminals are reassigned have bandwidth capacity to satisfy minimum bandwidth requirements, current bandwidth requirements, and CIR bandwidth requirements of the one or more terminals. 12. A method, comprising:
receiving a request for increased bandwidth demand from a terminal admitted to a first channel in a network; determining bandwidth capacity of each channel in the network; determining all channels in the network that are capable of accommodating the increased bandwidth demand from the terminal based on their respective bandwidth capacity and the bandwidth requirements of the terminal including the increased bandwidth demand; selecting a second channel in the network having the least available bandwidth capacity out of the channels determined to be capable of accommodating the increased bandwidth demand from the terminal; and reassigning the terminal to the second channel. 13. The method of claim 12, wherein the network is a satellite network. 14. The method of claim 12, wherein the channels in the network are time division multiple access (TDMA) inroute channels. 15. The method of claim 12, wherein determining the bandwidth capacity of each channel in the network comprises calculating the number of slots on each of the channels that are being utilized to serve current bandwidth demands of already admitted terminals and the number of slots on each of the channels that are reserved to accommodate committed information rate (CIR) bandwidth requirements of the already admitted terminals. 16. The method of claim 15, wherein determining the bandwidth capacity of each channel in the network further comprises subtracting the number of slots on each of the channels that are being utilized to serve current bandwidth demands of the already admitted terminals and the number of slots on each of the channels that are reserved to accommodate CIR bandwidth requirements of the already admitted terminals from a total number of slots on each of the channels. 17. The method of claim 12, wherein the bandwidth requirements of the terminal further comprise a current bandwidth requirement to satisfy a current session and a CIR bandwidth requirement. 18. The method of claim 17, further comprising selecting a third channel upon a determination that a channel capable of fully satisfying the current bandwidth requirement, the increased bandwidth demand, and the CIR bandwidth requirement of the terminal is non-existent and that reassignment of the terminal to the second channel cannot be performed, the third channel being capable of supporting the current bandwidth requirement of the terminal, the increased bandwidth demand and that has the greatest amount of available bandwidth capacity to maximize partial satisfaction of the CIR bandwidth requirement of the terminal. 19. The method of claim 18, further comprising selecting one or more alternative terminals to reassign to one or more alternative channels upon a determination that a channel capable of supporting the current bandwidth requirement of the terminal and the increased bandwidth demand of the terminal is non-existent. 20. The method of claim 19, further comprising denying the increased bandwidth demand upon a determination that the one or more alternative terminals cannot be reassigned to the one or more alternative channels due to the one or more alternative channels being incapable of supporting the bandwidth requirements of the one or more alternative terminals. 21. A system, comprising:
a shared access network; and a bandwidth allocation module configured to balance load across time division multiple access (TDMA) inroute channels in the shared access network by performing the following:
determine available bandwidth capacity of each TDMA inroute channel in the shared access network;
determine bandwidth requirements of a terminal;
determine all TDMA inroute channels in the shared access network that are capable of admitting the terminal based on their respective bandwidth capacity and the bandwidth requirements of the terminal;
select one of the TDMA inroute channels to admit the terminal based upon a sequence of determinations comprising:
a determination that a TDMA inroute channel exists that is capable of supporting the bandwidth requirements of the terminal and has the least available bandwidth capacity;
upon determining that no TDMA inroute channel exists that is capable of supporting the entirety of the bandwidth requirements of the terminal, a determination that a TDMA inroute channel exists that is capable of supporting a guaranteed minimum aspect of the bandwidth requirements of the terminal and has the most available bandwidth capacity to support growth towards the greatest portion of a guaranteed committed information rate (CIR) aspect of the bandwidth requirements of the terminal. 22. The system of claim 21, wherein the terminal comprises a to-be-admitted terminal seeking admission to the shared access network. 23. The system of claim 21, wherein the terminal comprises an already-admitted terminal seeking increased bandwidth allocation to support a committed information service session commensurate with the guaranteed CIR aspect of the bandwidth requirements of the terminal. 24. The system of claim 21, wherein the terminal comprises an already-admitted terminal to be reassigned to accommodate admission of a to-be-admitted terminal seeking admission to the shared access network. 25. The system of claim 21, wherein the terminal comprises an already-admitted terminal to be reassigned to accommodate admission of an already-admitted terminal seeking increased bandwidth allocation to support a committed information service session commensurate with the guaranteed CIR aspect of the bandwidth requirements of the terminal. | 2,400 |
6,791 | 6,791 | 13,301,219 | 2,434 | Systems and methods for data authentication can comprise processing a first secret element to generate a first encrypted secret element, processing a second secret element to generate a non-secret element, and processing the first encrypted secret element and the non-secret element to generate an encrypted data block. | 1. A method for generating authentication data comprising:
processing a first secret element to generate a first encrypted secret element; processing a second secret element to generate a non-secret element; and processing the first encrypted secret element and the non-secret element to generate an encrypted data block. 2. The method of claim 1, wherein the first secret element is a shared key. 3. The method of claim 1, wherein processing the first secret element comprises encrypting the first secret element using a protection key. 4. The method of claim 1, wherein the second secret element is a shared key. 5. The method of claim 1, wherein processing the second secret element comprises processing a first authentication key generator using the second secret element to generate a first authentication key, wherein the non-secret element is a function of the first authentication key. 6. The method of claim 1, wherein processing the second secret element comprises processing a first authentication key and a second authentication key to generate a cipher-based message authentication code, wherein the non-secret element is based upon the cipher-based message authentication code. 7. The method of claim 1, wherein the non-secret element is a shared key nonce. 8. The method of claim 1, wherein processing the first encrypted secret element and the non-secret element comprises encrypting the first encrypted secret element and the non-secret element using an authentication key. 9. A method for generating authentication data comprising:
encrypting a first shared key to generate an encrypted first shared key; encrypting a second shared key to generate an encrypted second shared key; processing the second shared key to generate a non-secret element; and processing the first encrypted shared key, the second encrypted shared key, and the non-secret element to generate an encrypted data block. 10. The method of claim 9, wherein the first shared key is encrypted using a protection key based upon a particular recipient device. 11. The method of claim 9, wherein the second shared key is encrypted using a protection key based upon a particular recipient device. 12. The method of claim 9, wherein processing the second shared key comprises processing a first authentication key generator using the second shared key to generate a first authentication key, wherein the non-secret element is a shared key nonce and is a function of the modulus of the first authentication key. 13. The method of claim 12, wherein processing the second shared key comprises processing the first authentication key and a second authentication key to generate a cipher-based message authentication code, wherein the non-secret element is a shared key nonce and is based upon the cipher-based message authentication code. 14. The method of claim 9, wherein the first shared key is associated with a first class of recipient devices. 15. The method of claim 14, wherein the second shared key is associated with a second class of recipient device, different from the first class of recipient devices. 16. The method of claim 9, wherein processing the encrypted first shared key, the encrypted second shared key, and the non-secret element comprises encrypting the encrypted first shared key, the encrypted second shared key, and the non-secret element using an authentication key, and wherein the non-secret element is generated as a function of the authentication key. 17. A method for authentication comprising:
processing a data block to determine a shared key nonce; processing the data block to determine a shared key associated with a first identifier, wherein the data block comprises a plurality of encrypted shared keys; generating a first authentication key based upon the shared key; generating an authentication nonce using the first authentication key; and comparing the authentication nonce to the shared key nonce to determine authentication. 18. The method of claim 17, wherein processing the shared key nonce comprises decrypting the shared key nonce using an RSA level 2 authentication key. 19. The method of claim 17, wherein the shared key nonce is a function of the shared key and an RSA level 2 authentication key. 20. The method of claim 17, wherein the first identifier is a type identifier associated with a recipient of the data block. | Systems and methods for data authentication can comprise processing a first secret element to generate a first encrypted secret element, processing a second secret element to generate a non-secret element, and processing the first encrypted secret element and the non-secret element to generate an encrypted data block.1. A method for generating authentication data comprising:
processing a first secret element to generate a first encrypted secret element; processing a second secret element to generate a non-secret element; and processing the first encrypted secret element and the non-secret element to generate an encrypted data block. 2. The method of claim 1, wherein the first secret element is a shared key. 3. The method of claim 1, wherein processing the first secret element comprises encrypting the first secret element using a protection key. 4. The method of claim 1, wherein the second secret element is a shared key. 5. The method of claim 1, wherein processing the second secret element comprises processing a first authentication key generator using the second secret element to generate a first authentication key, wherein the non-secret element is a function of the first authentication key. 6. The method of claim 1, wherein processing the second secret element comprises processing a first authentication key and a second authentication key to generate a cipher-based message authentication code, wherein the non-secret element is based upon the cipher-based message authentication code. 7. The method of claim 1, wherein the non-secret element is a shared key nonce. 8. The method of claim 1, wherein processing the first encrypted secret element and the non-secret element comprises encrypting the first encrypted secret element and the non-secret element using an authentication key. 9. A method for generating authentication data comprising:
encrypting a first shared key to generate an encrypted first shared key; encrypting a second shared key to generate an encrypted second shared key; processing the second shared key to generate a non-secret element; and processing the first encrypted shared key, the second encrypted shared key, and the non-secret element to generate an encrypted data block. 10. The method of claim 9, wherein the first shared key is encrypted using a protection key based upon a particular recipient device. 11. The method of claim 9, wherein the second shared key is encrypted using a protection key based upon a particular recipient device. 12. The method of claim 9, wherein processing the second shared key comprises processing a first authentication key generator using the second shared key to generate a first authentication key, wherein the non-secret element is a shared key nonce and is a function of the modulus of the first authentication key. 13. The method of claim 12, wherein processing the second shared key comprises processing the first authentication key and a second authentication key to generate a cipher-based message authentication code, wherein the non-secret element is a shared key nonce and is based upon the cipher-based message authentication code. 14. The method of claim 9, wherein the first shared key is associated with a first class of recipient devices. 15. The method of claim 14, wherein the second shared key is associated with a second class of recipient device, different from the first class of recipient devices. 16. The method of claim 9, wherein processing the encrypted first shared key, the encrypted second shared key, and the non-secret element comprises encrypting the encrypted first shared key, the encrypted second shared key, and the non-secret element using an authentication key, and wherein the non-secret element is generated as a function of the authentication key. 17. A method for authentication comprising:
processing a data block to determine a shared key nonce; processing the data block to determine a shared key associated with a first identifier, wherein the data block comprises a plurality of encrypted shared keys; generating a first authentication key based upon the shared key; generating an authentication nonce using the first authentication key; and comparing the authentication nonce to the shared key nonce to determine authentication. 18. The method of claim 17, wherein processing the shared key nonce comprises decrypting the shared key nonce using an RSA level 2 authentication key. 19. The method of claim 17, wherein the shared key nonce is a function of the shared key and an RSA level 2 authentication key. 20. The method of claim 17, wherein the first identifier is a type identifier associated with a recipient of the data block. | 2,400 |
6,792 | 6,792 | 14,116,030 | 2,413 | The present invention relates to a method for selecting a set of uplink transmission parameters. The method is performed in a wireless device of a radio communications system. The method comprises obtaining information mapping resources of a physical downlink control channel region to at least two sets of uplink transmission parameters. The method also comprises receiving a downlink control message on a resource of the physical downlink control channel region, and selecting a set among the at least two sets of uplink transmission parameters. The selection of set is based on the resource of the physical downlink control channel region on which the downlink control message is received, and on the obtained information mapping resources of the physical downlink control channel region to the at least two sets of uplink transmission parameters. | 1-29. (canceled) 30. A method for selecting a set of uplink transmission parameters, performed in a wireless device of a radio communications system, the method comprising:
obtaining information mapping resources of a physical downlink control channel region to at least two sets of uplink transmission parameters, receiving a downlink control message on a resource of the physical downlink control channel region, and selecting a set among the at least two sets of uplink transmission parameters based on: the resource of the physical downlink control channel region on which the downlink control message is received, and the obtained information mapping resources of the physical downlink control channel region to the at least two sets of uplink transmission parameters. 31. The method according to claim 30, further comprising:
applying the selected set of uplink transmission parameters when transmitting an uplink message in response to the received downlink control message. 32. The method according to claim 31, wherein applying the selected set comprises at least one of the following:
determining a physical layer characteristic of the transmission of the uplink message based on at least one parameter in the selected set; and determining a content of the uplink message based on at least one parameter in the selected set. 33. The method according to claim 30, wherein a value of a parameter in the selected set of uplink transmission parameters is set based on a content of the received downlink control message. 34. The method according to claim 30, wherein the obtained information maps a first resource of the physical downlink control channel region to a first set of uplink transmission parameters, and a second resource of the physical downlink control channel region to a second set of uplink transmission parameters, and wherein the selecting comprises:
selecting the first set of transmission parameters when the downlink control message is received on the first resource of the physical downlink control channel region, and selecting the second set of transmission parameters when the downlink control message is received on the second resource of the physical downlink control channel region. 35. The method according to claim 30, wherein the resources of the physical downlink control channel region are physical resource block sets of an enhanced physical downlink control channel, ePDCCH, in an evolved universal terrestrial radio access network, E-UTRAN, and the at least two sets of uplink transmission parameters are sets of transmission parameters for at least one of Physical Uplink Control Channel transmissions, Physical uplink Shared Channel transmissions, and Sounding Reference Signal transmissions. 36. The method according to claim 30, wherein obtaining the information mapping resources of a physical downlink control channel region to at least two sets of uplink transmission parameters comprises receiving the information from a radio network node in a configuration message, or retrieving the information pre-configured in the wireless device. 37. The method according to claim 30, wherein a configuration of the at least two sets of uplink transmission parameters is received from a radio network node in at least one configuration message, or is pre-configured in the wireless device. 38. The method according to claim 30, wherein the at least two sets of uplink transmission parameters respectively comprise at least one of:
different types of parameters; and different values of a same type of parameter. 39. A method performed in a radio network node of a radio communications system, for controlling a selection of a set of uplink transmission parameters by a wireless device, the method comprising:
obtaining information mapping resources of a physical downlink control channel region to at least two sets of uplink transmission parameters, wherein the information is also available to the wireless device, obtaining a set among the at least two sets of uplink transmission parameters to be used by the wireless device, determining a resource of the physical downlink control channel region which maps to the obtained set of uplink transmission parameters, based on the obtained information, and transmitting a downlink control message to the wireless device on the determined resource, to control the selection of the set of uplink transmission parameters by the wireless device. 40. The method according to claim 39, wherein obtaining the set of uplink transmission parameters comprises receiving the set from another network node. 41. The method according to claim 39, wherein obtaining the set of uplink transmission parameters comprises determining the set. 42. The method according to claim 39, wherein the obtained set of uplink transmission parameters comprises parameters used by the wireless device to determine at least one of the following:
a physical layer characteristic of the transmission of an uplink message; and a content of the uplink message. 43. The method according to claim 39, wherein the resources of the physical downlink control channel region are physical resource block sets of an enhanced physical downlink control channel, ePDCCH, in an evolved universal terrestrial radio access network, E-UTRAN, and the at least two sets of uplink transmission parameters are sets of transmission parameters for at least one of Physical Uplink Control Channel transmissions, Physical uplink Shared Channel transmissions, and Sounding Reference Signal transmissions. 44. The method according to claim 39, further comprising transmitting the information mapping the resources of the physical downlink control channel region to the at least two sets of uplink transmission parameters to the wireless device in a configuration message. 45. The method according to claim 39, wherein the at least two sets of uplink transmission parameters respectively comprise at least one of: different types of transmission parameters; and different values of a same type of transmission parameters. 46. The method according to claim 39, wherein obtaining the information mapping resources of the physical downlink control channel region to the at least two sets of uplink transmission parameters comprises receiving the information from another network node in a configuration message, or retrieving the information pre-configured in the radio network node. 47. A wireless device configured to select a set of uplink transmission parameters comprising a processing circuit and a receiver, wherein the processing circuit is configured to obtain information mapping resources of a physical downlink control channel region to at least two sets of uplink transmission parameters, the receiver is configured to receive a downlink control message on a resource of the physical downlink control channel region, and the processing circuit is further configured to select a set among the at least two sets of uplink transmission parameters based on:
the resource of the physical downlink control channel region on which the downlink control message is received, and the obtained information mapping resources of the physical downlink control channel region to the at least two sets of uplink transmission parameters. 48. The wireless device according to claim 47, further comprising a transmitter, and wherein the processing circuit is further configured to apply the selected set of uplink transmission parameters when transmitting an uplink message via the transmitter in response to the received downlink control message. 49. The wireless device according to claim 48, wherein the processing circuit is configured to apply the selected set by at least one of the following:
determining a physical layer characteristic of the transmission of the uplink message based on at least one parameter in the selected set; and determining a content of the uplink message based on at least one parameter in the selected set. 50. The wireless device according to claim 47, wherein the processing circuit is configured to set a value of a parameter in the selected set of uplink transmission parameters based on a content of the received downlink control message. 51. The wireless device according to claim 47, wherein the obtained information maps a first resource of the physical downlink control channel region to a first set of uplink transmission parameters, and a second resource of the physical downlink control channel region to a second set of uplink transmission parameters, and wherein the processing circuit is configured to select the set by:
selecting the first set of transmission parameters when the downlink control message is received on the first resource of the physical downlink control channel region, and selecting the second set of transmission parameters when the downlink control message is received on the second resource of the physical downlink control channel region. 52. The wireless device according to claim 47, wherein the processing circuit is configured to obtain the information mapping resources of a physical downlink control channel region to at least two sets of uplink transmission parameters by receiving the information via the receiver from a radio network node in a configuration message, or retrieving the pre-configured information from a memory of the wireless device. 53. The wireless device according to claim 47, wherein a configuration of the at least two sets of uplink transmission parameters is received via the receiver from a radio network node in at least one configuration message, or is pre-configured in a memory of the wireless device. 54. A radio network node of a radio communications system, configured to control a selection of a set of uplink transmission parameters by a wireless device, the radio network node comprising a processing circuit configured to:
obtain information mapping resources of a physical downlink control channel region to at least two sets of uplink transmission parameters, wherein the information is also available to the wireless device, obtain a set among the at least two sets of uplink transmission parameters to be used by the wireless device, and determine a resource of the physical downlink control channel region which maps to the obtained set of uplink transmission parameters, based on the obtained information, and wherein the radio network node further comprises a transmitter configured to transmit a downlink control message to the wireless device on the determined resource, to control the selection of the set of uplink transmission parameters by the wireless device. 55. The radio network node according to claim 54, further comprising a communication unit and wherein the processing circuit is configured to obtain the set of uplink transmission parameters by receiving the set from another network node via the communication unit. 56. The radio network node according to claim 54, wherein the processing circuit is configured to obtain the set of uplink transmission parameters by determining the set. 57. The radio network node according to claim 54, wherein the transmitter is configured to transmit the information mapping the resources of the physical downlink control channel region to the at least two sets of uplink transmission parameters to the wireless device in a configuration message. 58. The radio network node according to claim 54, wherein the processing circuit is configured to obtain the information mapping resources of the physical downlink control channel region to the at least two sets of uplink transmission parameters by receiving the information from another network node in a configuration message via a communication unit, or retrieving the information pre-configured in the radio network node. | The present invention relates to a method for selecting a set of uplink transmission parameters. The method is performed in a wireless device of a radio communications system. The method comprises obtaining information mapping resources of a physical downlink control channel region to at least two sets of uplink transmission parameters. The method also comprises receiving a downlink control message on a resource of the physical downlink control channel region, and selecting a set among the at least two sets of uplink transmission parameters. The selection of set is based on the resource of the physical downlink control channel region on which the downlink control message is received, and on the obtained information mapping resources of the physical downlink control channel region to the at least two sets of uplink transmission parameters.1-29. (canceled) 30. A method for selecting a set of uplink transmission parameters, performed in a wireless device of a radio communications system, the method comprising:
obtaining information mapping resources of a physical downlink control channel region to at least two sets of uplink transmission parameters, receiving a downlink control message on a resource of the physical downlink control channel region, and selecting a set among the at least two sets of uplink transmission parameters based on: the resource of the physical downlink control channel region on which the downlink control message is received, and the obtained information mapping resources of the physical downlink control channel region to the at least two sets of uplink transmission parameters. 31. The method according to claim 30, further comprising:
applying the selected set of uplink transmission parameters when transmitting an uplink message in response to the received downlink control message. 32. The method according to claim 31, wherein applying the selected set comprises at least one of the following:
determining a physical layer characteristic of the transmission of the uplink message based on at least one parameter in the selected set; and determining a content of the uplink message based on at least one parameter in the selected set. 33. The method according to claim 30, wherein a value of a parameter in the selected set of uplink transmission parameters is set based on a content of the received downlink control message. 34. The method according to claim 30, wherein the obtained information maps a first resource of the physical downlink control channel region to a first set of uplink transmission parameters, and a second resource of the physical downlink control channel region to a second set of uplink transmission parameters, and wherein the selecting comprises:
selecting the first set of transmission parameters when the downlink control message is received on the first resource of the physical downlink control channel region, and selecting the second set of transmission parameters when the downlink control message is received on the second resource of the physical downlink control channel region. 35. The method according to claim 30, wherein the resources of the physical downlink control channel region are physical resource block sets of an enhanced physical downlink control channel, ePDCCH, in an evolved universal terrestrial radio access network, E-UTRAN, and the at least two sets of uplink transmission parameters are sets of transmission parameters for at least one of Physical Uplink Control Channel transmissions, Physical uplink Shared Channel transmissions, and Sounding Reference Signal transmissions. 36. The method according to claim 30, wherein obtaining the information mapping resources of a physical downlink control channel region to at least two sets of uplink transmission parameters comprises receiving the information from a radio network node in a configuration message, or retrieving the information pre-configured in the wireless device. 37. The method according to claim 30, wherein a configuration of the at least two sets of uplink transmission parameters is received from a radio network node in at least one configuration message, or is pre-configured in the wireless device. 38. The method according to claim 30, wherein the at least two sets of uplink transmission parameters respectively comprise at least one of:
different types of parameters; and different values of a same type of parameter. 39. A method performed in a radio network node of a radio communications system, for controlling a selection of a set of uplink transmission parameters by a wireless device, the method comprising:
obtaining information mapping resources of a physical downlink control channel region to at least two sets of uplink transmission parameters, wherein the information is also available to the wireless device, obtaining a set among the at least two sets of uplink transmission parameters to be used by the wireless device, determining a resource of the physical downlink control channel region which maps to the obtained set of uplink transmission parameters, based on the obtained information, and transmitting a downlink control message to the wireless device on the determined resource, to control the selection of the set of uplink transmission parameters by the wireless device. 40. The method according to claim 39, wherein obtaining the set of uplink transmission parameters comprises receiving the set from another network node. 41. The method according to claim 39, wherein obtaining the set of uplink transmission parameters comprises determining the set. 42. The method according to claim 39, wherein the obtained set of uplink transmission parameters comprises parameters used by the wireless device to determine at least one of the following:
a physical layer characteristic of the transmission of an uplink message; and a content of the uplink message. 43. The method according to claim 39, wherein the resources of the physical downlink control channel region are physical resource block sets of an enhanced physical downlink control channel, ePDCCH, in an evolved universal terrestrial radio access network, E-UTRAN, and the at least two sets of uplink transmission parameters are sets of transmission parameters for at least one of Physical Uplink Control Channel transmissions, Physical uplink Shared Channel transmissions, and Sounding Reference Signal transmissions. 44. The method according to claim 39, further comprising transmitting the information mapping the resources of the physical downlink control channel region to the at least two sets of uplink transmission parameters to the wireless device in a configuration message. 45. The method according to claim 39, wherein the at least two sets of uplink transmission parameters respectively comprise at least one of: different types of transmission parameters; and different values of a same type of transmission parameters. 46. The method according to claim 39, wherein obtaining the information mapping resources of the physical downlink control channel region to the at least two sets of uplink transmission parameters comprises receiving the information from another network node in a configuration message, or retrieving the information pre-configured in the radio network node. 47. A wireless device configured to select a set of uplink transmission parameters comprising a processing circuit and a receiver, wherein the processing circuit is configured to obtain information mapping resources of a physical downlink control channel region to at least two sets of uplink transmission parameters, the receiver is configured to receive a downlink control message on a resource of the physical downlink control channel region, and the processing circuit is further configured to select a set among the at least two sets of uplink transmission parameters based on:
the resource of the physical downlink control channel region on which the downlink control message is received, and the obtained information mapping resources of the physical downlink control channel region to the at least two sets of uplink transmission parameters. 48. The wireless device according to claim 47, further comprising a transmitter, and wherein the processing circuit is further configured to apply the selected set of uplink transmission parameters when transmitting an uplink message via the transmitter in response to the received downlink control message. 49. The wireless device according to claim 48, wherein the processing circuit is configured to apply the selected set by at least one of the following:
determining a physical layer characteristic of the transmission of the uplink message based on at least one parameter in the selected set; and determining a content of the uplink message based on at least one parameter in the selected set. 50. The wireless device according to claim 47, wherein the processing circuit is configured to set a value of a parameter in the selected set of uplink transmission parameters based on a content of the received downlink control message. 51. The wireless device according to claim 47, wherein the obtained information maps a first resource of the physical downlink control channel region to a first set of uplink transmission parameters, and a second resource of the physical downlink control channel region to a second set of uplink transmission parameters, and wherein the processing circuit is configured to select the set by:
selecting the first set of transmission parameters when the downlink control message is received on the first resource of the physical downlink control channel region, and selecting the second set of transmission parameters when the downlink control message is received on the second resource of the physical downlink control channel region. 52. The wireless device according to claim 47, wherein the processing circuit is configured to obtain the information mapping resources of a physical downlink control channel region to at least two sets of uplink transmission parameters by receiving the information via the receiver from a radio network node in a configuration message, or retrieving the pre-configured information from a memory of the wireless device. 53. The wireless device according to claim 47, wherein a configuration of the at least two sets of uplink transmission parameters is received via the receiver from a radio network node in at least one configuration message, or is pre-configured in a memory of the wireless device. 54. A radio network node of a radio communications system, configured to control a selection of a set of uplink transmission parameters by a wireless device, the radio network node comprising a processing circuit configured to:
obtain information mapping resources of a physical downlink control channel region to at least two sets of uplink transmission parameters, wherein the information is also available to the wireless device, obtain a set among the at least two sets of uplink transmission parameters to be used by the wireless device, and determine a resource of the physical downlink control channel region which maps to the obtained set of uplink transmission parameters, based on the obtained information, and wherein the radio network node further comprises a transmitter configured to transmit a downlink control message to the wireless device on the determined resource, to control the selection of the set of uplink transmission parameters by the wireless device. 55. The radio network node according to claim 54, further comprising a communication unit and wherein the processing circuit is configured to obtain the set of uplink transmission parameters by receiving the set from another network node via the communication unit. 56. The radio network node according to claim 54, wherein the processing circuit is configured to obtain the set of uplink transmission parameters by determining the set. 57. The radio network node according to claim 54, wherein the transmitter is configured to transmit the information mapping the resources of the physical downlink control channel region to the at least two sets of uplink transmission parameters to the wireless device in a configuration message. 58. The radio network node according to claim 54, wherein the processing circuit is configured to obtain the information mapping resources of the physical downlink control channel region to the at least two sets of uplink transmission parameters by receiving the information from another network node in a configuration message via a communication unit, or retrieving the information pre-configured in the radio network node. | 2,400 |
6,793 | 6,793 | 14,824,119 | 2,468 | A system and method are provided for non-transmission specification fair air-time, NT-AirFair, allocation control by tracking the transmission time consumed by each link to detect any increase and enforcing air-time allocation based on the pattern of usage derived therefrom. | 1. An apparatus, comprising:
a memory configured to comprise more than one weighted queue; a scheduler configured to receive a flow and distribute at least one packet of the received flow to at least one weighted queue of the more than one weighted queues, the scheduler configured to distribute the at least one packet of the received flow to the at least one weighted queue based on a delay sensitivity of the received flow; and a monitor configured to track at least a per-byte transmission time of at least one of the more than one weighted queues and adjust a weight of at least one weighted queue if per-byte transmission time of the at least one weighted queue exceeds a threshold. 2. The apparatus of claim 1, wherein the scheduler is further configured to:
receive one or more flows; determine a delay sensitivity of a received flow; and assign a weighted queue to each received delay sensitive flow. 3. The apparatus of claim 1, wherein the scheduler is further configured to:
receive one or more flows; determine a delay sensitivity of the received flow; and bundle one or more non-delay sensitive flows into a weighted queue, wherein received delay sensitive flows are each assigned a predetermined weighted queue and received non-delay sensitive flows are bundled into another predetermined weighted queue. 4. The apparatus of claim 1, wherein the scheduler is further configured to:
transmit least one packet of a received flow from at least one weighted queue, the at least one packet transmitted based on a predetermined weight of the at least one weighted queue from which the at least one packet was transmitted, wherein the scheduler comprises a selected one of a queuing module, an operating system kernel, and a device driver. 5. The apparatus of claim 1, wherein the monitor is further configured to:
monitor at least per-byte transmission time of more than one transmitted packet of a received flow from at least one weighted queue; compute an average per-byte transmission time of the more than one transmitted packet; determine if the averaged per-byte transmission time is increased; adjust at least one of a weight of at least one weighted queue and a per-byte retry limit if the averaged per-byte transmission time exceeds a threshold; and adjust a predetermined weight of at least one weighted queue and a per-byte retry limit if the average per-byte transmission time exceeds a threshold. | A system and method are provided for non-transmission specification fair air-time, NT-AirFair, allocation control by tracking the transmission time consumed by each link to detect any increase and enforcing air-time allocation based on the pattern of usage derived therefrom.1. An apparatus, comprising:
a memory configured to comprise more than one weighted queue; a scheduler configured to receive a flow and distribute at least one packet of the received flow to at least one weighted queue of the more than one weighted queues, the scheduler configured to distribute the at least one packet of the received flow to the at least one weighted queue based on a delay sensitivity of the received flow; and a monitor configured to track at least a per-byte transmission time of at least one of the more than one weighted queues and adjust a weight of at least one weighted queue if per-byte transmission time of the at least one weighted queue exceeds a threshold. 2. The apparatus of claim 1, wherein the scheduler is further configured to:
receive one or more flows; determine a delay sensitivity of a received flow; and assign a weighted queue to each received delay sensitive flow. 3. The apparatus of claim 1, wherein the scheduler is further configured to:
receive one or more flows; determine a delay sensitivity of the received flow; and bundle one or more non-delay sensitive flows into a weighted queue, wherein received delay sensitive flows are each assigned a predetermined weighted queue and received non-delay sensitive flows are bundled into another predetermined weighted queue. 4. The apparatus of claim 1, wherein the scheduler is further configured to:
transmit least one packet of a received flow from at least one weighted queue, the at least one packet transmitted based on a predetermined weight of the at least one weighted queue from which the at least one packet was transmitted, wherein the scheduler comprises a selected one of a queuing module, an operating system kernel, and a device driver. 5. The apparatus of claim 1, wherein the monitor is further configured to:
monitor at least per-byte transmission time of more than one transmitted packet of a received flow from at least one weighted queue; compute an average per-byte transmission time of the more than one transmitted packet; determine if the averaged per-byte transmission time is increased; adjust at least one of a weight of at least one weighted queue and a per-byte retry limit if the averaged per-byte transmission time exceeds a threshold; and adjust a predetermined weight of at least one weighted queue and a per-byte retry limit if the average per-byte transmission time exceeds a threshold. | 2,400 |
6,794 | 6,794 | 11,598,870 | 2,422 | Method, system, and program product for measuring audio video synchronization. This is done by first acquiring audio video information into an audio video synchronization system. The step of data acquisition is followed by analyzing the audio information, and analyzing the video information. Next, the audio information is analyzed to locate the presence of sounds therein related to a speaker's personal voice characteristics. In Analysis Phase Audio and Video MuEv-s are calculated from the audio and video information, and the audio and video information is classified into vowel sounds including AA, EE, OO, B, V, TH, F, silence, other sounds, and unclassified phonemes. The inner space between the lips are also identified and determined. This information is used to determine and associate a dominant audio class in a video frame. Matching locations are determined, and the offset of video and audio is determined. | 1. A method for measuring audio video synchronization, said method comprising the steps of:
receiving a video portion and an associated audio portion of a combined audio and visual presentation; analyzing the audio portion to identify and filter audio data to reduce audio data related to a speaker's personal voice characteristics to produce a filtered audio signal; analyzing the filtered audio signal to locate the presence of particular phonemes therein; analyzing the video portion to locate therein the presence of particular visemes therein by analyzing the mouth areas; and analyzing the phonemes and the visemes to determine the relative timing of related phonemes and visemes thereof. 2. A method for measuring audio video synchronization, comprising:
receiving video and associated audio information; analyzing the audio information to locate the presence of sounds therein related to a speaker's personal voice characteristics; removing data related to a speakers personal voice characteristics to produce a filtered audio representation; analyzing the filtered audio representation to identify particular sounds; analyzing the video information related to the mouth shapes corresponding to the formation of particular sounds, and comparing the location of particular sounds located with the location of corresponding lip shapes to determine the relative timing thereof. 3. A method for measuring audio video synchronization, comprising:
a) receiving a video portion and an associated audio portion of a television program; b) analyzing the audio information to locate the presence of sounds therein related to a speaker's personal voice characteristics; c) removing data related to a speakers personal voice characteristics to produce a filtered audio representation; d) analyzing the filtered audio portion to locate the presence of particular vowel sounds therein; e) analyzing the video portion to locate mouth shapes therein corresponding to uttering particular speach sounds. f) analyzing the presence and location of vowel sounds located in step d) with the location of corresponding lip shapes and the presence of teeth of step e) to determine the relative timing thereof. 4. A method of measuring audio video synchronization, comprising:
acquiring input audio video information into an audio video synchronization system; analyzing the audio information to locate the presence of sounds therein related to a speaker's personal voice characteristics; removing data related to a speakers personal voice characteristics to produce a filtered audio representation; analyzing the filtered audio information; analyzing the video information including mouth shapes and the position of the mouth shapes; calculating a an Audio MuEv and a Video MuEv from the audio and video information; and determining and associating a dominant audio class in a video frame, locating matching locations, and estimating offset of audio and video. 5. The method of claim 4 wherein the step of acquiring input audio video information into an audio video synchronization system with input audio video information comprises the steps of:
receiving audio video information; separately extracting the audio information and the video information; analyzing the audio information and the video information, and recovering audio and video analysis data there from; and storing the audio and video analysis data and recycling the audio and video analysis data. 6. The method of claim 5 comprising providing scatter diagrams of audio moments from the audio data. 7. The method of claim 6 comprising providing an audio decision boundary and storing the resulting audio decision data. 8. The method of claim 5 comprising providing scatter diagrams of video moments from the video data. 9. The method of claim 8 comprising providing a video decision boundary and storing the resulting video decision data. 10. The method of claim 7 comprising analyzing the audio information by a method comprising the steps of:
receiving an audio stream until the fraction of captured audio samples attains a threshold; finding a glottal pulse of the captured audio samples; calculating a Fast Fourier Transform (or DCT) for sets of successive audio data of the size of the glottal pulse within a shift; calculating an average spectrum of the Fast Fourier Transforms (or DCTs); calculating audio statistics of the spectrum of the Fast Fourier Transforms (or DCTs) of the glottal pulses; and returning the audio statistics. 11. The method of claim 10 wherein the audio statistics include one or more of the centralized and normalized Moments of the Fourier Transform (or DCT). 12. The method of claim 11, wherein the audio statistics include one or more of the centralized and normalized Moments of the Fourier Transform (or DCT) including one of M1 (mean), M2BAR (2nd Moment) and M3BAR (3rd Moment). 13. The method of claim 10 comprising calculating a glottal pulse from the audio and video information to find a glottal pulse of the captured audio samples by a method comprising the steps of:
receiving 3N audio samples; for i=0 to N samples
i) determine the Fast Fourier Transform (or DCT) of N+1 audio samples;
ii) calculating a sum of the first four odd harmonics, S(I);
iii) finding a local minima of S(I) with a maximum rate of change, S(K); and
iv) calculating the glottal pulse, GP=(N+K)/2. 14. The method of claim 4 comprising analyzing the video information by a method comprising the steps of:
receiving a video stream and obtaining a video frame there from; finding a lip region of a face in the video frame; if the video frame is a silence frame, identifying the frame as silence, then resuming receiving a subsequent video frame; and if the video frame is not a silence frame,
defining inner and outer lip regions of the face;
calculating mean and variance of the inner and outer lip regions of the face;
calculating the width and height of the lips;
determine the inner space between the lips; and
returning video features and receiving the next frame. 15. The method of claim 4 comprising determining and associating a dominant audio class in a video frame, locating matching locations, and estimating offset of audio and video by a method comprising the steps of:
receiving a stream of audio and video information; retrieving individual audio and video information there from; analyzing the audio and video information including the inner lip region, whether the lips are open or closed, and classifying the audio and video information; filtering the audio and video information to remove randomly occurring classes; associating most dominant audio classes to corresponding video frames; finding matching locations; and estimating an asynchronous offset. 16. The method of claim 15 comprising classifying the audio and video information into vowel sounds including AA, EE, OO, silence, and unclassified phonemes. 17. A system for measuring audio video synchronization by a method comprising the steps of:
acquiring input audio video information into an audio video synchronization system; analyzing the audio information to locate the presence of sounds therein related to a speaker's personal voice characteristics; removing data related to a speakers personal voice characteristics to produce a filtered audio representation; analyzing the filtered audio representation to identify particular sounds and silence; analyzing the video information including mouth shapes corresponding to classified sounds; calculating an Audio MuEv and a Video MuEv from the filtered audio and video information; and determining and associating a dominant audio class in a video frame, locating matching locations, and estimating offset of audio and video. 18. The system of claim 17 wherein the step of acquiring input audio video information into an audio video synchronization system comprises the steps of:
receiving audio video information; separately extracting the audio information and the video information; analyzing the audio information and the video information, and recovering audio and video analysis data there from; and storing the audio and video analysis data and recycling the audio and video analysis data. 19. The system of claim 18 wherein said system draws scatter diagrams of audio moments from the audio data. 20. The system of claim 19 wherein the system draws an audio decision boundary and storing the resulting audio decision data. 21. The system of claim 18 wherein the system draws scatter diagrams of video moments from the video data; 22. The system of claim 21 wherein the system draws a video decision boundary and storing the resulting video decision data. 23. The system of claim 20 wherein the system analyzes the audio information by a method comprising the steps of:
receiving an audio stream until the fraction of captured audio samples attains a threshold; finding a glottal pulse of the captured audio samples; calculating a Fast Fourier Transform (or DCT) for sets of successive audio data of the size of the glottal pulse within a shift; calculating an average spectrum of the Fast Fourier Transforms (or DCTs); calculating audio statistics of the spectrum of the Fast Fourier Transforms (or DCTs) of the glottal pulses; and returning the audio statistics. 24. The system of claim 23 wherein the audio statistics include one or more of the centralized and normalized Moments of the Fourier Transform (or DCT). 25. The system of claim 23 wherein the system calculates a glottal pulse from the audio and video information to find a glottal pulse of the captured audio samples by a method comprising the steps of:
receiving 3N audio samples; for i=0 to N samples
determine the Fast Fourier Transform (or DCT) of N+1 audio samples;
calculating a sum of the first four odd harmonics, S(I); finding a local minima of S(I) with a maximum rate of change, S(K); and calculating the glottal pulse, GP=(N+K)/2. 26. The system of claim 20 wherein the system analyzes the video information by a method comprising the steps of:
receiving a video stream and obtaining a video frame there from; finding a lip region of a face in the video frame; if the video frame is a silence frame, identifying it as silence, then resuming receiving a subsequent video frame; and if the video frame is not a silence frame,
defining inner and outer lip regions of the face;
calculating mean and variance of the inner and outer lip regions of the face;
calculating the width and height of the lips;
calculating the inner space between the lips; and
returning video features and receiving the next frame. 27. The system of claim 20 wherein the system determines and associates a dominant audio class in a video frame, locates matching locations, and estimates offset of audio and video by a method comprising the steps of:
receiving a stream of audio and video information; retrieving individual audio and video information there from; analyzing the audio and video information and classifying the audio and video information including analyzing whether the inner lip region indicates an open mouth; filtering the audio and video information to remove randomly occurring classes; associating most dominant audio classes to corresponding video frames; finding matching locations; and estimating an asynchronous offset. 28. The system of claim 27 wherein the system classifies the audio and video information into vowel sounds including AA, EE, OO, silence, and unclassified phonemes. 29. A program product comprising computer readable code for measuring audio video synchronization by a method comprising the steps of:
a) receiving video and associated audio information; b) analyzing the audio information to locate the presence of sounds therein related to a speaker's personal voice characteristics; c) removing data related to a speakers personal voice characteristics to produce a filtered audio representation; d) analyzing the audio information to locate the presence of glottal events therein; e) analyzing the video information to determine mouth shapes corresponding to audio glottal events therein; and f) analyzing the location and/or presence of glottal events located in step d) and corresponding video information of step e) to determine the relative timing thereof. 30. A method of analyzing video information from a video signal by a method comprising the steps of:
receiving a video stream and obtaining a video frame there from; finding a lip region of a face in the video frame; if the video frame is a silence frame, identifying the frame as silence, then resuming receiving a subsequent video frame; and if the video frame is not a silence frame,
defining inner and outer lip regions of the face;
calculating mean and variance of the mouth shapes;
calculating the width and height of the lips;
returning video features and receiving the next frame. 31. The method of claim 31 comprising classifying the audio and video information into vowel sounds including AA, EE, OO, F, V, B, silence, and unclassified phonemes. 32. The method of claim 31 comprising classifying the audio and video information into vowel sounds including AA, EE, OO, silence, and unclassified phonemes, and, if the mouth is open, classifying the audio and video information into vowel sounds including AA, EE, OO, and if the lips are closed, classifying the audio and video information into sounds including pronunciation of the letters M, P,B, V and, when teeth are present, classifying the audio and video sounds as EE and the pronunciation of the letter S. 33. A method of determining the relative timing of an audio program and a video program, comprising:
receiving said video program and identifying therein an image of a face; identifying the shape of the mouth on the face; receiving said audio program and identifying corresponding sounds therein that correspond to said shape of the mouth; and using the occurrence in time of the identified shape of the mouth and corresponding sounds to determine if the timing of the two are the same. 34. A method according to claim 33, wherein the magnitude of timing between said occurrence of the identified shape and said occurrence of the corresponding sound is determined. 35. A method of obtaining information relating to an audio program and a video program, comprising:
receiving said video program and identifying therein an image of a face, identifying the shape of the lips on the face; receiving said audio program and identifying corresponding sounds therein that correspond to said shape of the mouth; using the identified shape of the lips and corresponding sounds to obtain said information. 36. A method according to claim 35, wherein the information obtained is the relative timing of said audio program relative to said video program. 37. A method according to claim 35, wherein the information obtained is verification of said audio program corresponding to said video program. | Method, system, and program product for measuring audio video synchronization. This is done by first acquiring audio video information into an audio video synchronization system. The step of data acquisition is followed by analyzing the audio information, and analyzing the video information. Next, the audio information is analyzed to locate the presence of sounds therein related to a speaker's personal voice characteristics. In Analysis Phase Audio and Video MuEv-s are calculated from the audio and video information, and the audio and video information is classified into vowel sounds including AA, EE, OO, B, V, TH, F, silence, other sounds, and unclassified phonemes. The inner space between the lips are also identified and determined. This information is used to determine and associate a dominant audio class in a video frame. Matching locations are determined, and the offset of video and audio is determined.1. A method for measuring audio video synchronization, said method comprising the steps of:
receiving a video portion and an associated audio portion of a combined audio and visual presentation; analyzing the audio portion to identify and filter audio data to reduce audio data related to a speaker's personal voice characteristics to produce a filtered audio signal; analyzing the filtered audio signal to locate the presence of particular phonemes therein; analyzing the video portion to locate therein the presence of particular visemes therein by analyzing the mouth areas; and analyzing the phonemes and the visemes to determine the relative timing of related phonemes and visemes thereof. 2. A method for measuring audio video synchronization, comprising:
receiving video and associated audio information; analyzing the audio information to locate the presence of sounds therein related to a speaker's personal voice characteristics; removing data related to a speakers personal voice characteristics to produce a filtered audio representation; analyzing the filtered audio representation to identify particular sounds; analyzing the video information related to the mouth shapes corresponding to the formation of particular sounds, and comparing the location of particular sounds located with the location of corresponding lip shapes to determine the relative timing thereof. 3. A method for measuring audio video synchronization, comprising:
a) receiving a video portion and an associated audio portion of a television program; b) analyzing the audio information to locate the presence of sounds therein related to a speaker's personal voice characteristics; c) removing data related to a speakers personal voice characteristics to produce a filtered audio representation; d) analyzing the filtered audio portion to locate the presence of particular vowel sounds therein; e) analyzing the video portion to locate mouth shapes therein corresponding to uttering particular speach sounds. f) analyzing the presence and location of vowel sounds located in step d) with the location of corresponding lip shapes and the presence of teeth of step e) to determine the relative timing thereof. 4. A method of measuring audio video synchronization, comprising:
acquiring input audio video information into an audio video synchronization system; analyzing the audio information to locate the presence of sounds therein related to a speaker's personal voice characteristics; removing data related to a speakers personal voice characteristics to produce a filtered audio representation; analyzing the filtered audio information; analyzing the video information including mouth shapes and the position of the mouth shapes; calculating a an Audio MuEv and a Video MuEv from the audio and video information; and determining and associating a dominant audio class in a video frame, locating matching locations, and estimating offset of audio and video. 5. The method of claim 4 wherein the step of acquiring input audio video information into an audio video synchronization system with input audio video information comprises the steps of:
receiving audio video information; separately extracting the audio information and the video information; analyzing the audio information and the video information, and recovering audio and video analysis data there from; and storing the audio and video analysis data and recycling the audio and video analysis data. 6. The method of claim 5 comprising providing scatter diagrams of audio moments from the audio data. 7. The method of claim 6 comprising providing an audio decision boundary and storing the resulting audio decision data. 8. The method of claim 5 comprising providing scatter diagrams of video moments from the video data. 9. The method of claim 8 comprising providing a video decision boundary and storing the resulting video decision data. 10. The method of claim 7 comprising analyzing the audio information by a method comprising the steps of:
receiving an audio stream until the fraction of captured audio samples attains a threshold; finding a glottal pulse of the captured audio samples; calculating a Fast Fourier Transform (or DCT) for sets of successive audio data of the size of the glottal pulse within a shift; calculating an average spectrum of the Fast Fourier Transforms (or DCTs); calculating audio statistics of the spectrum of the Fast Fourier Transforms (or DCTs) of the glottal pulses; and returning the audio statistics. 11. The method of claim 10 wherein the audio statistics include one or more of the centralized and normalized Moments of the Fourier Transform (or DCT). 12. The method of claim 11, wherein the audio statistics include one or more of the centralized and normalized Moments of the Fourier Transform (or DCT) including one of M1 (mean), M2BAR (2nd Moment) and M3BAR (3rd Moment). 13. The method of claim 10 comprising calculating a glottal pulse from the audio and video information to find a glottal pulse of the captured audio samples by a method comprising the steps of:
receiving 3N audio samples; for i=0 to N samples
i) determine the Fast Fourier Transform (or DCT) of N+1 audio samples;
ii) calculating a sum of the first four odd harmonics, S(I);
iii) finding a local minima of S(I) with a maximum rate of change, S(K); and
iv) calculating the glottal pulse, GP=(N+K)/2. 14. The method of claim 4 comprising analyzing the video information by a method comprising the steps of:
receiving a video stream and obtaining a video frame there from; finding a lip region of a face in the video frame; if the video frame is a silence frame, identifying the frame as silence, then resuming receiving a subsequent video frame; and if the video frame is not a silence frame,
defining inner and outer lip regions of the face;
calculating mean and variance of the inner and outer lip regions of the face;
calculating the width and height of the lips;
determine the inner space between the lips; and
returning video features and receiving the next frame. 15. The method of claim 4 comprising determining and associating a dominant audio class in a video frame, locating matching locations, and estimating offset of audio and video by a method comprising the steps of:
receiving a stream of audio and video information; retrieving individual audio and video information there from; analyzing the audio and video information including the inner lip region, whether the lips are open or closed, and classifying the audio and video information; filtering the audio and video information to remove randomly occurring classes; associating most dominant audio classes to corresponding video frames; finding matching locations; and estimating an asynchronous offset. 16. The method of claim 15 comprising classifying the audio and video information into vowel sounds including AA, EE, OO, silence, and unclassified phonemes. 17. A system for measuring audio video synchronization by a method comprising the steps of:
acquiring input audio video information into an audio video synchronization system; analyzing the audio information to locate the presence of sounds therein related to a speaker's personal voice characteristics; removing data related to a speakers personal voice characteristics to produce a filtered audio representation; analyzing the filtered audio representation to identify particular sounds and silence; analyzing the video information including mouth shapes corresponding to classified sounds; calculating an Audio MuEv and a Video MuEv from the filtered audio and video information; and determining and associating a dominant audio class in a video frame, locating matching locations, and estimating offset of audio and video. 18. The system of claim 17 wherein the step of acquiring input audio video information into an audio video synchronization system comprises the steps of:
receiving audio video information; separately extracting the audio information and the video information; analyzing the audio information and the video information, and recovering audio and video analysis data there from; and storing the audio and video analysis data and recycling the audio and video analysis data. 19. The system of claim 18 wherein said system draws scatter diagrams of audio moments from the audio data. 20. The system of claim 19 wherein the system draws an audio decision boundary and storing the resulting audio decision data. 21. The system of claim 18 wherein the system draws scatter diagrams of video moments from the video data; 22. The system of claim 21 wherein the system draws a video decision boundary and storing the resulting video decision data. 23. The system of claim 20 wherein the system analyzes the audio information by a method comprising the steps of:
receiving an audio stream until the fraction of captured audio samples attains a threshold; finding a glottal pulse of the captured audio samples; calculating a Fast Fourier Transform (or DCT) for sets of successive audio data of the size of the glottal pulse within a shift; calculating an average spectrum of the Fast Fourier Transforms (or DCTs); calculating audio statistics of the spectrum of the Fast Fourier Transforms (or DCTs) of the glottal pulses; and returning the audio statistics. 24. The system of claim 23 wherein the audio statistics include one or more of the centralized and normalized Moments of the Fourier Transform (or DCT). 25. The system of claim 23 wherein the system calculates a glottal pulse from the audio and video information to find a glottal pulse of the captured audio samples by a method comprising the steps of:
receiving 3N audio samples; for i=0 to N samples
determine the Fast Fourier Transform (or DCT) of N+1 audio samples;
calculating a sum of the first four odd harmonics, S(I); finding a local minima of S(I) with a maximum rate of change, S(K); and calculating the glottal pulse, GP=(N+K)/2. 26. The system of claim 20 wherein the system analyzes the video information by a method comprising the steps of:
receiving a video stream and obtaining a video frame there from; finding a lip region of a face in the video frame; if the video frame is a silence frame, identifying it as silence, then resuming receiving a subsequent video frame; and if the video frame is not a silence frame,
defining inner and outer lip regions of the face;
calculating mean and variance of the inner and outer lip regions of the face;
calculating the width and height of the lips;
calculating the inner space between the lips; and
returning video features and receiving the next frame. 27. The system of claim 20 wherein the system determines and associates a dominant audio class in a video frame, locates matching locations, and estimates offset of audio and video by a method comprising the steps of:
receiving a stream of audio and video information; retrieving individual audio and video information there from; analyzing the audio and video information and classifying the audio and video information including analyzing whether the inner lip region indicates an open mouth; filtering the audio and video information to remove randomly occurring classes; associating most dominant audio classes to corresponding video frames; finding matching locations; and estimating an asynchronous offset. 28. The system of claim 27 wherein the system classifies the audio and video information into vowel sounds including AA, EE, OO, silence, and unclassified phonemes. 29. A program product comprising computer readable code for measuring audio video synchronization by a method comprising the steps of:
a) receiving video and associated audio information; b) analyzing the audio information to locate the presence of sounds therein related to a speaker's personal voice characteristics; c) removing data related to a speakers personal voice characteristics to produce a filtered audio representation; d) analyzing the audio information to locate the presence of glottal events therein; e) analyzing the video information to determine mouth shapes corresponding to audio glottal events therein; and f) analyzing the location and/or presence of glottal events located in step d) and corresponding video information of step e) to determine the relative timing thereof. 30. A method of analyzing video information from a video signal by a method comprising the steps of:
receiving a video stream and obtaining a video frame there from; finding a lip region of a face in the video frame; if the video frame is a silence frame, identifying the frame as silence, then resuming receiving a subsequent video frame; and if the video frame is not a silence frame,
defining inner and outer lip regions of the face;
calculating mean and variance of the mouth shapes;
calculating the width and height of the lips;
returning video features and receiving the next frame. 31. The method of claim 31 comprising classifying the audio and video information into vowel sounds including AA, EE, OO, F, V, B, silence, and unclassified phonemes. 32. The method of claim 31 comprising classifying the audio and video information into vowel sounds including AA, EE, OO, silence, and unclassified phonemes, and, if the mouth is open, classifying the audio and video information into vowel sounds including AA, EE, OO, and if the lips are closed, classifying the audio and video information into sounds including pronunciation of the letters M, P,B, V and, when teeth are present, classifying the audio and video sounds as EE and the pronunciation of the letter S. 33. A method of determining the relative timing of an audio program and a video program, comprising:
receiving said video program and identifying therein an image of a face; identifying the shape of the mouth on the face; receiving said audio program and identifying corresponding sounds therein that correspond to said shape of the mouth; and using the occurrence in time of the identified shape of the mouth and corresponding sounds to determine if the timing of the two are the same. 34. A method according to claim 33, wherein the magnitude of timing between said occurrence of the identified shape and said occurrence of the corresponding sound is determined. 35. A method of obtaining information relating to an audio program and a video program, comprising:
receiving said video program and identifying therein an image of a face, identifying the shape of the lips on the face; receiving said audio program and identifying corresponding sounds therein that correspond to said shape of the mouth; using the identified shape of the lips and corresponding sounds to obtain said information. 36. A method according to claim 35, wherein the information obtained is the relative timing of said audio program relative to said video program. 37. A method according to claim 35, wherein the information obtained is verification of said audio program corresponding to said video program. | 2,400 |
6,795 | 6,795 | 14,708,476 | 2,463 | Transmission capacity for a control channel sent to multiple mobile wireless devices in a wireless network is increased by transmitting the control channel using multi user multiple input multiple output transmissions (MU MIMO). Received signal quality measured at mobile wireless devices in a radio sector are communicated to a radio node and used to determine one or more sets of mobile wireless devices to share transmission of control channel elements on the same time and frequency resource element. The radio node indicates the use of MU MIMO and the selection of precoding matrices to each of the mobile wireless devices in the each set of mobile wireless devices. | 1-23. (canceled) 24. A method, comprising:
at a base station:
estimating a received downlink signal quality for each mobile wireless device of a plurality of mobile wireless devices connected to the base station;
determining a number of control channel elements to be transmitted to each mobile wireless device based on the received downlink signal quality of each mobile wireless device;
grouping a portion of the plurality of mobile wireless devices into a first group based on the received downlink signal quality of each mobile wireless device and a number of receive antennas for each mobile wireless device; and
transmitting control channel information comprising the number of control channel elements to each of the first group of mobile wireless devices, wherein the control channel information is simultaneously transmitted to each of the first group of mobile wireless devices using the same frequency and time resource elements based on multi-user multiple-input multiple-output (MU-MIMO) transmissions. 25. The method of claim 24, wherein the base station is an LTE or LTE-Advanced compliant base station. 26. The method of claim 24, further comprising:
grouping a portion of the plurality of mobile wireless devices into a second group based on the received downlink signal quality of each mobile wireless device and the number of receive antennas for each mobile wireless device; and transmitting control channel information comprising the number of control channel elements to each of the second group of mobile wireless devices, wherein the control channel information is simultaneously transmitted to each of the second group of mobile wireless devices using the same frequency and time resource elements based on multi-user multiple-input multiple-output (MU-MIMO) transmissions. 27. The method of claim 26, wherein the base station transmits one of a same number of control channel elements to the first group and second group of mobile wireless devices or a different number of control channel elements to the first group and second group of mobile wireless devices. 28. The method of claim 26, wherein the first group of mobile wireless devices has one of a same number of receive antennas as the second group of wireless devices or a different number of receive antennas as the second group of wireless devices. 29. The method of claim 26, wherein the received downlink signal quality of the first group of mobile wireless devices exceeds a first predetermined threshold and the received downlink signal quality of the second group of mobile wireless devices exceeds a second predetermined threshold, wherein the first and second predetermined thresholds are one of a same value and a different value. 30. The method of claim 24, wherein the number of control channel elements is one of 1, 2, 4 or 8. 31. The method of claim 24, wherein the number of receive antennas is one of 2, 4, 6 or 8. 32. The method of claim 24, wherein the number of receive antennas for each of the first group of mobile wireless devices is the same. 33. A base station, comprising:
a processor; a transceiver; a plurality of antennas; and a non-transitory computer readable storage medium comprising a set of instructions that are executable by the processor, wherein the instructions causes the processor to:
estimate a received downlink signal quality for each mobile wireless device of a plurality of mobile wireless devices connected to the base station;
determine a number of control channel elements to be transmitted to each mobile wireless device based on the received downlink signal quality of each mobile wireless device;
group a portion of the plurality of mobile wireless devices into a first group based on the received downlink signal quality of each mobile wireless device and a number of receive antennas for each mobile wireless device; and
transmit, via the transceiver and one or more of the plurality of antennas, control channel information comprising the number of control channel elements to each of the first group of mobile wireless devices, wherein the control channel information is simultaneously transmitted to each of the first group of mobile wireless devices using the same frequency and time resource elements based on multi-user multiple-input multiple-output (MU-MIMO) transmissions. 34. The base station of claim 33, wherein the base station is an LTE or LTE-Advanced compliant base station. 35. The base station of claim 33, wherein the instructions further cause the processor to:
group a portion of the plurality of mobile wireless devices into a second group based on the received downlink signal quality of each mobile wireless device and the number of receive antennas for each mobile wireless device; and transmit, via the transceiver and one or more of the plurality of antennas, control channel information comprising the number of control channel elements to each of the second group of mobile wireless devices, wherein the control channel information is simultaneously transmitted to each of the second group of mobile wireless devices using the same frequency and time resource elements based on multi-user multiple-input multiple-output (MU-MIMO) transmissions. 36. The base station of claim 33, wherein the number of receive antennas is one of 2, 4, 6 or 8. 37. The base station of claim 33, wherein the base station transmits the control channel information on a number of the plurality of antennas that corresponds to the number of receive antennas of the first group of mobile wireless devices. 38. The base station of claim 33, wherein the transceiver comprises a plurality of transceivers, wherein a first of the plurality of transceivers has one corresponding antenna and a second of the plurality of transceivers has more than one corresponding antenna. 39. The base station of claim 33, wherein the control channel information is transmitted via a physical downlink control channel (PDCCH). 40. The base station of claim 33, wherein the base station estimates the received downlink signal quality for each mobile wireless device based on a channel quality indicator (CQI) received from each mobile wireless device. 41. A mobile wireless device, comprising:
a processor; a transceiver; a plurality of antennas; and a non-transitory computer readable storage medium comprising a set of instructions that are executable by the processor, wherein the instructions causes the processor to:
receive an indicator that indicates transmissions on a control channel are encoded using MU MIMO transmission;
receive and decode signals transmitted on a the control channel, wherein the signals on the control channel comprise a number of control channel elements corresponding to a received downlink signal quality for the mobile wireless device and wherein the number of control channel elements are simultaneously transmitted to at least one other mobile wireless device using the same frequency and time resource elements. 42. The mobile wireless device of claim 41, wherein the instructions further cause the processor to:
receive a further indicator that indicates transmissions on the control channel are encoded using a transmission scheme that is different from MU MIMO transmission; and switch decoding of signals received on the control channel to the transmission scheme. 43. The mobile wireless device of claim 41, wherein the instructions further cause the processor to:
calculate a downlink signal quality for transmissions received from a base station of a wireless network; and transmit, via the transceiver and one or more of the plurality of antennas, the downlink signal quality using channel quality indicators to the base station of the wireless network. | Transmission capacity for a control channel sent to multiple mobile wireless devices in a wireless network is increased by transmitting the control channel using multi user multiple input multiple output transmissions (MU MIMO). Received signal quality measured at mobile wireless devices in a radio sector are communicated to a radio node and used to determine one or more sets of mobile wireless devices to share transmission of control channel elements on the same time and frequency resource element. The radio node indicates the use of MU MIMO and the selection of precoding matrices to each of the mobile wireless devices in the each set of mobile wireless devices.1-23. (canceled) 24. A method, comprising:
at a base station:
estimating a received downlink signal quality for each mobile wireless device of a plurality of mobile wireless devices connected to the base station;
determining a number of control channel elements to be transmitted to each mobile wireless device based on the received downlink signal quality of each mobile wireless device;
grouping a portion of the plurality of mobile wireless devices into a first group based on the received downlink signal quality of each mobile wireless device and a number of receive antennas for each mobile wireless device; and
transmitting control channel information comprising the number of control channel elements to each of the first group of mobile wireless devices, wherein the control channel information is simultaneously transmitted to each of the first group of mobile wireless devices using the same frequency and time resource elements based on multi-user multiple-input multiple-output (MU-MIMO) transmissions. 25. The method of claim 24, wherein the base station is an LTE or LTE-Advanced compliant base station. 26. The method of claim 24, further comprising:
grouping a portion of the plurality of mobile wireless devices into a second group based on the received downlink signal quality of each mobile wireless device and the number of receive antennas for each mobile wireless device; and transmitting control channel information comprising the number of control channel elements to each of the second group of mobile wireless devices, wherein the control channel information is simultaneously transmitted to each of the second group of mobile wireless devices using the same frequency and time resource elements based on multi-user multiple-input multiple-output (MU-MIMO) transmissions. 27. The method of claim 26, wherein the base station transmits one of a same number of control channel elements to the first group and second group of mobile wireless devices or a different number of control channel elements to the first group and second group of mobile wireless devices. 28. The method of claim 26, wherein the first group of mobile wireless devices has one of a same number of receive antennas as the second group of wireless devices or a different number of receive antennas as the second group of wireless devices. 29. The method of claim 26, wherein the received downlink signal quality of the first group of mobile wireless devices exceeds a first predetermined threshold and the received downlink signal quality of the second group of mobile wireless devices exceeds a second predetermined threshold, wherein the first and second predetermined thresholds are one of a same value and a different value. 30. The method of claim 24, wherein the number of control channel elements is one of 1, 2, 4 or 8. 31. The method of claim 24, wherein the number of receive antennas is one of 2, 4, 6 or 8. 32. The method of claim 24, wherein the number of receive antennas for each of the first group of mobile wireless devices is the same. 33. A base station, comprising:
a processor; a transceiver; a plurality of antennas; and a non-transitory computer readable storage medium comprising a set of instructions that are executable by the processor, wherein the instructions causes the processor to:
estimate a received downlink signal quality for each mobile wireless device of a plurality of mobile wireless devices connected to the base station;
determine a number of control channel elements to be transmitted to each mobile wireless device based on the received downlink signal quality of each mobile wireless device;
group a portion of the plurality of mobile wireless devices into a first group based on the received downlink signal quality of each mobile wireless device and a number of receive antennas for each mobile wireless device; and
transmit, via the transceiver and one or more of the plurality of antennas, control channel information comprising the number of control channel elements to each of the first group of mobile wireless devices, wherein the control channel information is simultaneously transmitted to each of the first group of mobile wireless devices using the same frequency and time resource elements based on multi-user multiple-input multiple-output (MU-MIMO) transmissions. 34. The base station of claim 33, wherein the base station is an LTE or LTE-Advanced compliant base station. 35. The base station of claim 33, wherein the instructions further cause the processor to:
group a portion of the plurality of mobile wireless devices into a second group based on the received downlink signal quality of each mobile wireless device and the number of receive antennas for each mobile wireless device; and transmit, via the transceiver and one or more of the plurality of antennas, control channel information comprising the number of control channel elements to each of the second group of mobile wireless devices, wherein the control channel information is simultaneously transmitted to each of the second group of mobile wireless devices using the same frequency and time resource elements based on multi-user multiple-input multiple-output (MU-MIMO) transmissions. 36. The base station of claim 33, wherein the number of receive antennas is one of 2, 4, 6 or 8. 37. The base station of claim 33, wherein the base station transmits the control channel information on a number of the plurality of antennas that corresponds to the number of receive antennas of the first group of mobile wireless devices. 38. The base station of claim 33, wherein the transceiver comprises a plurality of transceivers, wherein a first of the plurality of transceivers has one corresponding antenna and a second of the plurality of transceivers has more than one corresponding antenna. 39. The base station of claim 33, wherein the control channel information is transmitted via a physical downlink control channel (PDCCH). 40. The base station of claim 33, wherein the base station estimates the received downlink signal quality for each mobile wireless device based on a channel quality indicator (CQI) received from each mobile wireless device. 41. A mobile wireless device, comprising:
a processor; a transceiver; a plurality of antennas; and a non-transitory computer readable storage medium comprising a set of instructions that are executable by the processor, wherein the instructions causes the processor to:
receive an indicator that indicates transmissions on a control channel are encoded using MU MIMO transmission;
receive and decode signals transmitted on a the control channel, wherein the signals on the control channel comprise a number of control channel elements corresponding to a received downlink signal quality for the mobile wireless device and wherein the number of control channel elements are simultaneously transmitted to at least one other mobile wireless device using the same frequency and time resource elements. 42. The mobile wireless device of claim 41, wherein the instructions further cause the processor to:
receive a further indicator that indicates transmissions on the control channel are encoded using a transmission scheme that is different from MU MIMO transmission; and switch decoding of signals received on the control channel to the transmission scheme. 43. The mobile wireless device of claim 41, wherein the instructions further cause the processor to:
calculate a downlink signal quality for transmissions received from a base station of a wireless network; and transmit, via the transceiver and one or more of the plurality of antennas, the downlink signal quality using channel quality indicators to the base station of the wireless network. | 2,400 |
6,796 | 6,796 | 14,592,402 | 2,463 | A single infrastructure arrangement resulting from merging two or more sets of infrastructure. For example, an arrangement may incorporate an infrastructure or a set of infrastructure incorporating components with wireless access points and one or more sets of infrastructure with components having functional purposes, for example, such as those of heating, ventilation and air conditioning systems, smoke detection, security, and so on. An integrated infrastructure may encompass components having the functional purposes and the wireless access points. | 1. A wall module arrangement with integrated infrastructure level radio frequency (RF) access points, comprising:
a local area network; one or more components for a heating, ventilation and air conditioning system, connected to the local area network; and one or more RF access points connected to the local area network; and wherein: one or more RF access points are integrated in the one or more components for a heating, ventilation and air conditioning system, respectively; the local area network, the one or more components, and the one or more RF access points receive power from one or more items selected from a group consisting of power over the network, power provided by a wired connection to a remote source, and power provided by a local source; and the one or more RF access points provide access to an internet via the local area network. 2. The arrangement of claim 1, wherein the one or more RF access points are selected from a group consisting of Wi-Fi, ZigBee, Bluetooth, WiMax and NFC access points. 3. The arrangement of claim 1, wherein the local area network comprises one or more virtual local area networks. 4. The arrangement of claim 1, wherein:
the one or more components for a heating, ventilation and air conditioning system receive information from sensors; and the one or more components for a heating, ventilation and air conditioning system send out signals to control actuators. 5. The arrangement of claim 1, wherein the local area network comprises an Ethernet. 6. The arrangement of claim 1, wherein the one or more components for a heating, ventilation and air conditioning system are selected from a group consisting of wall modules, thermostats, temperature sensors, controllers, air handlers, humidifiers, boilers, sensors, dehumidifiers, air conditioners, chillers, and user interfaces. 7. A method for integrating two or more sets of infrastructure, comprising:
selecting a first set of infrastructure comprising one or more information technology components having one or more wireless access points, respectively, connected to a first local area network; selecting a second set of infrastructure comprising one or more heating, ventilation and air conditioning components connected to a second local area network; and integrating the first set of infrastructure and the second infrastructure into a third set of infrastructure comprising one or more heating, ventilation and air conditioning components having wireless access points of the one or more information technology components, respectively; and wherein the third infrastructure is connected to a third local area network selected from a group consisting of the first local area network, the second local area network and another local area network. 8. The method of claim 7, wherein the wireless access points are selected from a group consisting of Wi-Fi, ZigBee, Bluetooth, WiMax and NFC access points. 9. The method of claim 7, wherein the one or more heating, ventilation and air conditioning components are selected from a group consisting of wall modules, thermostats, temperature sensors, controllers, air handlers, humidifiers, boilers, sensors, dehumidifiers, air conditioners, chillers, and user interfaces. 10. The method of claim 7, wherein the one or more information technology components are selected from a group consisting of routers, switches, servers, wireless access point electronics, and interfaces. 11. The method of claim 7, wherein the third local area network comprises power over network cabling to provide power to the third infrastructure. 12. The method of claim 7, wherein the third local area network comprises one or more virtual local area networks. 13. The method of claim 7, wherein the third local area network comprises an Ethernet. 14. The method of claim 13, wherein the Ethernet comprises a power over the Ethernet cabling to provide power to the third infrastructure. 15. An integrated infrastructure system comprising:
a local area network; and one or more components connected to the local area network; and wherein the one or more components comprise one or more RF access points, respectively, connected to the local area network. 16. The system of claim 15, wherein the one or more components are selected from a group consisting of wall modules, thermostats, temperature sensors, controllers, air handlers, humidifiers, boilers, sensors, dehumidifiers, air conditioners, chillers, and user interfaces. 17. The system of claim 15, wherein:
the one or more RF access points are supported with one or more information technology components, respectfully; and the one or more information technology components are selected from a group consisting of routers, switches, servers, and interfaces. 18. The system of claim 15, wherein:
the one or more components provide processing to enable signals to and from the one or more RF access points and signals to and from the one or more components on the same local area network; and the one or more components are selected from a group consisting of components that are integral to security systems, retail systems, lighting systems, HVAC systems, smoke detection systems, and human resource management systems. 19. The system of claim 15, wherein:
the local area network incorporates one or more virtual local area networks; and the one or more virtual local networks convey signals for one or more systems, respectively, selected from a group consisting of security systems, retail systems, lighting systems, HVAC systems, smoke detection systems, and human resource management systems. 20. The system of claim 15, wherein the local area network comprises power over cabling of the local area network. | A single infrastructure arrangement resulting from merging two or more sets of infrastructure. For example, an arrangement may incorporate an infrastructure or a set of infrastructure incorporating components with wireless access points and one or more sets of infrastructure with components having functional purposes, for example, such as those of heating, ventilation and air conditioning systems, smoke detection, security, and so on. An integrated infrastructure may encompass components having the functional purposes and the wireless access points.1. A wall module arrangement with integrated infrastructure level radio frequency (RF) access points, comprising:
a local area network; one or more components for a heating, ventilation and air conditioning system, connected to the local area network; and one or more RF access points connected to the local area network; and wherein: one or more RF access points are integrated in the one or more components for a heating, ventilation and air conditioning system, respectively; the local area network, the one or more components, and the one or more RF access points receive power from one or more items selected from a group consisting of power over the network, power provided by a wired connection to a remote source, and power provided by a local source; and the one or more RF access points provide access to an internet via the local area network. 2. The arrangement of claim 1, wherein the one or more RF access points are selected from a group consisting of Wi-Fi, ZigBee, Bluetooth, WiMax and NFC access points. 3. The arrangement of claim 1, wherein the local area network comprises one or more virtual local area networks. 4. The arrangement of claim 1, wherein:
the one or more components for a heating, ventilation and air conditioning system receive information from sensors; and the one or more components for a heating, ventilation and air conditioning system send out signals to control actuators. 5. The arrangement of claim 1, wherein the local area network comprises an Ethernet. 6. The arrangement of claim 1, wherein the one or more components for a heating, ventilation and air conditioning system are selected from a group consisting of wall modules, thermostats, temperature sensors, controllers, air handlers, humidifiers, boilers, sensors, dehumidifiers, air conditioners, chillers, and user interfaces. 7. A method for integrating two or more sets of infrastructure, comprising:
selecting a first set of infrastructure comprising one or more information technology components having one or more wireless access points, respectively, connected to a first local area network; selecting a second set of infrastructure comprising one or more heating, ventilation and air conditioning components connected to a second local area network; and integrating the first set of infrastructure and the second infrastructure into a third set of infrastructure comprising one or more heating, ventilation and air conditioning components having wireless access points of the one or more information technology components, respectively; and wherein the third infrastructure is connected to a third local area network selected from a group consisting of the first local area network, the second local area network and another local area network. 8. The method of claim 7, wherein the wireless access points are selected from a group consisting of Wi-Fi, ZigBee, Bluetooth, WiMax and NFC access points. 9. The method of claim 7, wherein the one or more heating, ventilation and air conditioning components are selected from a group consisting of wall modules, thermostats, temperature sensors, controllers, air handlers, humidifiers, boilers, sensors, dehumidifiers, air conditioners, chillers, and user interfaces. 10. The method of claim 7, wherein the one or more information technology components are selected from a group consisting of routers, switches, servers, wireless access point electronics, and interfaces. 11. The method of claim 7, wherein the third local area network comprises power over network cabling to provide power to the third infrastructure. 12. The method of claim 7, wherein the third local area network comprises one or more virtual local area networks. 13. The method of claim 7, wherein the third local area network comprises an Ethernet. 14. The method of claim 13, wherein the Ethernet comprises a power over the Ethernet cabling to provide power to the third infrastructure. 15. An integrated infrastructure system comprising:
a local area network; and one or more components connected to the local area network; and wherein the one or more components comprise one or more RF access points, respectively, connected to the local area network. 16. The system of claim 15, wherein the one or more components are selected from a group consisting of wall modules, thermostats, temperature sensors, controllers, air handlers, humidifiers, boilers, sensors, dehumidifiers, air conditioners, chillers, and user interfaces. 17. The system of claim 15, wherein:
the one or more RF access points are supported with one or more information technology components, respectfully; and the one or more information technology components are selected from a group consisting of routers, switches, servers, and interfaces. 18. The system of claim 15, wherein:
the one or more components provide processing to enable signals to and from the one or more RF access points and signals to and from the one or more components on the same local area network; and the one or more components are selected from a group consisting of components that are integral to security systems, retail systems, lighting systems, HVAC systems, smoke detection systems, and human resource management systems. 19. The system of claim 15, wherein:
the local area network incorporates one or more virtual local area networks; and the one or more virtual local networks convey signals for one or more systems, respectively, selected from a group consisting of security systems, retail systems, lighting systems, HVAC systems, smoke detection systems, and human resource management systems. 20. The system of claim 15, wherein the local area network comprises power over cabling of the local area network. | 2,400 |
6,797 | 6,797 | 13,491,681 | 2,477 | An integrative radio base station holds station data required for operation including information on the cell managed by itself and the information on the cells managed by an adjacent integrative radio base stations. If information on the cells of the destination of a mobile terminal is not held at the time of the handover of the mobile terminal, the information is acquired from a station data management device. The station data management device manages station data for each integrative radio base station and transmits information on the cell requested from the integrative radio base station to a source that made the request. | 1. A mobile communication system comprising:
a mobile station; a radio access network that couples the mobile station with a core network; a radio base station; a node that manages the radio base station; wherein the radio base station comprises a table that holds an adjacent cell information, and a unit that notifies the node of the adjacent cell information after the radio base station connects the radio access network and an authentication of the base station is performed, wherein the node comprises a receiver that receives the adjacent cell information after the authentication of the base station is performed, and a transmitter that transmits information for updating the table of the base station. 2. The system further comprising according to claim 1, further comprises
a receiver included in the base station that receives a measurement result of reception quality from the mobile station, wherein the base station check a new adjacent cell information that is not included in the table based on the measurement result of reception quality from the mobile station, and registers the new adjacent cell information to the table. 3. A radio base station comprising:
a table that holds an adjacent cell information, and a unit that notifies a node managing the radio base station of the adjacent cell information after the radio base station connects a radio access network that couples a mobile station with a core network, and an authentication of the base station is performed. 4. The radio base station according to claim 3, further comprises
a receiver that receives a measurement result of reception quality from a mobile station, wherein the base station check a new adjacent cell information that is not included in the table based on the measurement result of reception quality from the mobile station, and registers the new adjacent cell information to the table. 5. A node for a mobile communication system comprising a mobile station, a radio access network, a radio base station, the node comprising:
a receiver that receives an adjacent cell information after the radio base station connects the radio access network and an authentication of the base station is performed, wherein the adjacent cell information is held in a table of the radio base station, and a transmitter that transmits information for updating the table of the base station. | An integrative radio base station holds station data required for operation including information on the cell managed by itself and the information on the cells managed by an adjacent integrative radio base stations. If information on the cells of the destination of a mobile terminal is not held at the time of the handover of the mobile terminal, the information is acquired from a station data management device. The station data management device manages station data for each integrative radio base station and transmits information on the cell requested from the integrative radio base station to a source that made the request.1. A mobile communication system comprising:
a mobile station; a radio access network that couples the mobile station with a core network; a radio base station; a node that manages the radio base station; wherein the radio base station comprises a table that holds an adjacent cell information, and a unit that notifies the node of the adjacent cell information after the radio base station connects the radio access network and an authentication of the base station is performed, wherein the node comprises a receiver that receives the adjacent cell information after the authentication of the base station is performed, and a transmitter that transmits information for updating the table of the base station. 2. The system further comprising according to claim 1, further comprises
a receiver included in the base station that receives a measurement result of reception quality from the mobile station, wherein the base station check a new adjacent cell information that is not included in the table based on the measurement result of reception quality from the mobile station, and registers the new adjacent cell information to the table. 3. A radio base station comprising:
a table that holds an adjacent cell information, and a unit that notifies a node managing the radio base station of the adjacent cell information after the radio base station connects a radio access network that couples a mobile station with a core network, and an authentication of the base station is performed. 4. The radio base station according to claim 3, further comprises
a receiver that receives a measurement result of reception quality from a mobile station, wherein the base station check a new adjacent cell information that is not included in the table based on the measurement result of reception quality from the mobile station, and registers the new adjacent cell information to the table. 5. A node for a mobile communication system comprising a mobile station, a radio access network, a radio base station, the node comprising:
a receiver that receives an adjacent cell information after the radio base station connects the radio access network and an authentication of the base station is performed, wherein the adjacent cell information is held in a table of the radio base station, and a transmitter that transmits information for updating the table of the base station. | 2,400 |
6,798 | 6,798 | 14,525,969 | 2,482 | A method for defining a programming schedule for constrained bandwidth network subscribers in response to time-bounded program recording statistics associated with high bandwidth network subscribers. | 1. A method, comprising:
obtaining, from a plurality of high bandwidth programming subscribers, cumulative statistics of recordings initiated by said subscribers for programming delivered during a period of time; determining a programming schedule in response to the obtained statistics; and broadcasting programming to constrained bandwidth programming subscribers according to the programming schedule. 2. The method of claim 1, further comprising providing the determined programming schedule to the constrained bandwidth programming subscribers as an electronic programming guide. 3. The method of claim 2, wherein programming delivered by a provider comprises a television broadcast. 4. The method of claim 3, wherein the television broadcast comprises a first plurality of programs, and the contents derived from the statistics comprises a second plurality of programs comprising a subset of the first plurality of programs. 5. The method of claim 4, wherein determining a programming schedule takes place periodically prepared at a frequency having a period ‘T’. 6. The method of claim 5, wherein ‘T’ is adjustable. 7. The method of claim 6, wherein the cumulative statistics are analyzed and a successive order of most through least recorded programs determined. 8. The method of claim 7, wherein the constrained bandwidth network comprises ‘n’ channels, where n is an integer. 9. The method of claim 8, wherein determining a programming schedule comprises:
beginning with the most recorded program, populating as many programs from the successive order of most through least recorded programs that will temporally fit within the period ‘T’ on a first of the ‘n’ channels; and respectively continuing the successive order of most through least recorded programs on a next channel after the first of the ‘n’ channels, continuing through all ‘n’ channels; wherein each respective channel is populated with as many programs from the respectively continuing successive order of most through least recorded programs that will temporally fit within the period ‘T’ on each channel. 10. The method of claim 9, wherein the channels comprise respective spectral portions of a frequency division multiple access network. 11. The method of claim 9, wherein the channels comprise respective timeslots of a time division multiple access network. 12. The method of claim 9, wherein the channels comprise respective codewords a code division multiple access network. 13. The method of claim 1, wherein the constrained bandwidth network is a cellular network. 14. The method of claim 1, wherein the constrained bandwidth network is a television provider network. 15. The method of claim 1, wherein the constrained bandwidth network is an internet service provider network 16. The method of claim 15, wherein broadcasting programming to constrained bandwidth programming subscribers takes place at the same time the electronic programming guide is transmitted. 17. A method for dynamically developing a programming schedule, comprising:
obtaining, from a plurality of programming subscribers, cumulative statistics of recordings initiated by said subscribers for programming delivered by a provider during a period of time; and determining a programming schedule in response to the obtained statistics. 18. A computer readable medium having written upon it a program capable of performing a method, comprising:
obtaining, from a plurality of high bandwidth programming subscribers, cumulative statistics of recordings initiated by said subscribers for programming delivered by a provider during a period of time; determining a programming schedule in response to the obtained statistics; and broadcasting programming to constrained bandwidth programming subscribers according to the programming schedule. 19. A system for determining a broadcast schedule, comprising:
a statistics processor; wherein the statistics processor comprises: means for obtaining, from a plurality of programming subscribers, cumulative statistics of recordings initiated by said subscribers for programming delivered by a provider during a period of time; and means for determining a programming schedule in response to the obtained statistics. 20. A multi-media recording apparatus, comprising:
means of providing data detailing cumulative statistics of recordings initiated by subscribers for programming delivered by a provider during a period of time to a statistics processor, wherein the statistics processor comprises: means for obtaining, from a plurality of programming subscribers, cumulative statistics of recordings initiated by said subscribers for programming delivered by a provider during a period of time; and means for determining a programming schedule in response to the obtained statistics. | A method for defining a programming schedule for constrained bandwidth network subscribers in response to time-bounded program recording statistics associated with high bandwidth network subscribers.1. A method, comprising:
obtaining, from a plurality of high bandwidth programming subscribers, cumulative statistics of recordings initiated by said subscribers for programming delivered during a period of time; determining a programming schedule in response to the obtained statistics; and broadcasting programming to constrained bandwidth programming subscribers according to the programming schedule. 2. The method of claim 1, further comprising providing the determined programming schedule to the constrained bandwidth programming subscribers as an electronic programming guide. 3. The method of claim 2, wherein programming delivered by a provider comprises a television broadcast. 4. The method of claim 3, wherein the television broadcast comprises a first plurality of programs, and the contents derived from the statistics comprises a second plurality of programs comprising a subset of the first plurality of programs. 5. The method of claim 4, wherein determining a programming schedule takes place periodically prepared at a frequency having a period ‘T’. 6. The method of claim 5, wherein ‘T’ is adjustable. 7. The method of claim 6, wherein the cumulative statistics are analyzed and a successive order of most through least recorded programs determined. 8. The method of claim 7, wherein the constrained bandwidth network comprises ‘n’ channels, where n is an integer. 9. The method of claim 8, wherein determining a programming schedule comprises:
beginning with the most recorded program, populating as many programs from the successive order of most through least recorded programs that will temporally fit within the period ‘T’ on a first of the ‘n’ channels; and respectively continuing the successive order of most through least recorded programs on a next channel after the first of the ‘n’ channels, continuing through all ‘n’ channels; wherein each respective channel is populated with as many programs from the respectively continuing successive order of most through least recorded programs that will temporally fit within the period ‘T’ on each channel. 10. The method of claim 9, wherein the channels comprise respective spectral portions of a frequency division multiple access network. 11. The method of claim 9, wherein the channels comprise respective timeslots of a time division multiple access network. 12. The method of claim 9, wherein the channels comprise respective codewords a code division multiple access network. 13. The method of claim 1, wherein the constrained bandwidth network is a cellular network. 14. The method of claim 1, wherein the constrained bandwidth network is a television provider network. 15. The method of claim 1, wherein the constrained bandwidth network is an internet service provider network 16. The method of claim 15, wherein broadcasting programming to constrained bandwidth programming subscribers takes place at the same time the electronic programming guide is transmitted. 17. A method for dynamically developing a programming schedule, comprising:
obtaining, from a plurality of programming subscribers, cumulative statistics of recordings initiated by said subscribers for programming delivered by a provider during a period of time; and determining a programming schedule in response to the obtained statistics. 18. A computer readable medium having written upon it a program capable of performing a method, comprising:
obtaining, from a plurality of high bandwidth programming subscribers, cumulative statistics of recordings initiated by said subscribers for programming delivered by a provider during a period of time; determining a programming schedule in response to the obtained statistics; and broadcasting programming to constrained bandwidth programming subscribers according to the programming schedule. 19. A system for determining a broadcast schedule, comprising:
a statistics processor; wherein the statistics processor comprises: means for obtaining, from a plurality of programming subscribers, cumulative statistics of recordings initiated by said subscribers for programming delivered by a provider during a period of time; and means for determining a programming schedule in response to the obtained statistics. 20. A multi-media recording apparatus, comprising:
means of providing data detailing cumulative statistics of recordings initiated by subscribers for programming delivered by a provider during a period of time to a statistics processor, wherein the statistics processor comprises: means for obtaining, from a plurality of programming subscribers, cumulative statistics of recordings initiated by said subscribers for programming delivered by a provider during a period of time; and means for determining a programming schedule in response to the obtained statistics. | 2,400 |
6,799 | 6,799 | 14,688,802 | 2,477 | A method for withdrawing programmed routes in network devices. The method includes receiving instructions to withdraw at least one route of a set of programmed routes, where the set of programmed routes is stored in a forwarding information base (FIB), removing the at least one route from a set of routes stored in a routing information base (RIB), notifying at least one peer network device of a set of peer network devices about the at least one route to be withdrawn, initializing a timer with a timeout value and starting the timer, before the time expires, processing a packet that uses the at least one route to be withdrawn, and after the timer expires, removing the at least one route from the FIB. | 1. A method for withdrawing programmed routes in network devices, comprising:
receiving instructions to withdraw at least one route of a plurality of programmed routes,
wherein the plurality of programmed routes is stored in a forwarding information base (FIB);
removing the at least one route from a plurality of routes stored in a routing information base (RIB); notifying at least one peer network device of a plurality of peer network devices about the at least one route to be withdrawn; initializing a timer with a timeout value and starting the timer; before the time expires, processing a packet that uses the at least one route to be withdrawn; and after the timer expires, removing the at least one route from the FIB. 2. The method of claim 1, wherein notifying the at least one peer network device about the at least one route to be withdrawn comprises sending a border gateway protocol (BGP) UPDATE message comprising the at least one route to be withdrawn. 3. The method of claim 1, wherein removing the at least one route from the FIB comprises updating the plurality of routes stored in the FIB based on the plurality of routes stored in the RIB. 4. The method of claim 1, wherein the timeout value is determined using a peer network device notification time and a buffer time. 5. The method of claim 4, wherein a magnitude of the timeout value is related to the cardinality of the plurality of peer network devices. 6. The method of claim 1 further comprising:
receiving instructions to add at least one new route to the FIB;
adding the at least one new route to the RIB; and
adding, without delay, the at least one new route to the FIB. 7. The method of claim 1, wherein processing the packet that uses the at least one route to be withdrawn comprises:
receiving the packet from a peer network device; determining the destination of the packet, based on a header information of the packet; determining, by searching the plurality of programmed routes stored in the FIB for a suitable route for the destination of the packet, that the at least one route to be withdrawn is the route to be used for the packet; and sending the packet to a next hop network device specified by the at least one route to be withdrawn. 8. A network device comprising a network device operating system (OS),
wherein the network device receives instructions to withdraw at least one route of a plurality of programmed routes,
wherein the plurality of programmed routes is stored in a forwarding information base (FIB);
wherein the network device removes the at least one route from a plurality of routes stored in a routing information base (RIB); wherein the network device notifies at least one peer network device of a plurality of peer network devices about the at least one route to be withdrawn; wherein the network device initializes a timer with a timeout value and starts the timer; wherein, before the time expires, the network device processes a packet that uses the at least one route to be withdrawn; and wherein, after the timer expires, the network device removes the at least one route from the FIB. 9. The network device of claim 8, wherein the network device notifies the at least one peer network device about the at least one route to be withdrawn comprises by sending a border gateway protocol (BGP) UPDATE message comprising the at least one route to be withdrawn. 10. The network device of claim 8, wherein the network device removes the at least one route from the FIB by updating the plurality of routes stored in the FIB based on the plurality of routes stored in the RIB. 11. The network device of claim 8, wherein the timeout value is determined using a peer network device notification time and a buffer time. 12. The network device of claim 11, wherein a magnitude of the timeout value is related to the cardinality of the plurality of peer network devices. 13. The network device of claim 8, wherein the network device processes the packet that uses the at least one route to be withdrawn by:
receiving the packet from a peer network device; determining the destination of the packet, based on a header information of the packet; determining, by searching the plurality of programmed routes stored in the FIB for a suitable route for the destination of the packet, that the at least one route to be withdrawn is the route to be used for the packet; and sending the packet to a next hop network device specified by the at least one route to be withdrawn. 14. The network device of claim 8, wherein the network device is one selected from the group consisting of a router and a multilayer switch. 15. A non-transitory computer readable medium comprising instructions that enable a network device to:
receive instructions to withdraw at least one route of a plurality of programmed routes,
wherein the plurality of programmed routes is stored in a forwarding information base (FIB);
remove the at least one route from a plurality of routes stored in a routing information base (RIB); notify at least one peer network device of a plurality of peer network devices about the at least one route to be withdrawn; initialize a timer with a timeout value and start the timer; before the time expires, process a packet that uses the at least one route to be withdrawn; and after the timer expires, remove the at least one route from the FIB. 16. The non-transitory computer readable medium of claim 15, wherein the instructions that enable the network device to notify the at least one peer network device about the at least one route to be withdrawn comprise instructions to send a border gateway protocol (BGP) UPDATE message comprising the at least one route to be withdrawn. 17. The non-transitory computer readable medium of claim 15, wherein the instructions that enable the network device to remove the at least one route from the FIB comprise instructions to update the plurality of routes stored in the FIB based on the plurality of routes stored in the RIB. 18. The non-transitory computer readable medium of claim 15, wherein the timeout value is determined using a peer network device notification time and a buffer time. 19. The non-transitory computer readable medium of claim 18, wherein a magnitude of the timeout value is related to the cardinality of the plurality of peer network devices. 20. The non-transitory computer readable medium of claim 15, wherein the instructions that enable the network device to process the packet that uses the at least one route to be withdrawn comprise instructions to:
receive the packet from a peer network device; determine the destination of the packet, based on a header information of the packet; determine, by searching the plurality of programmed routes stored in the FIB for a suitable route for the destination of the packet, that the at least one route to be withdrawn is the route to be used for the packet; and send the packet to a next hop network device specified by the at least one route to be withdrawn. | A method for withdrawing programmed routes in network devices. The method includes receiving instructions to withdraw at least one route of a set of programmed routes, where the set of programmed routes is stored in a forwarding information base (FIB), removing the at least one route from a set of routes stored in a routing information base (RIB), notifying at least one peer network device of a set of peer network devices about the at least one route to be withdrawn, initializing a timer with a timeout value and starting the timer, before the time expires, processing a packet that uses the at least one route to be withdrawn, and after the timer expires, removing the at least one route from the FIB.1. A method for withdrawing programmed routes in network devices, comprising:
receiving instructions to withdraw at least one route of a plurality of programmed routes,
wherein the plurality of programmed routes is stored in a forwarding information base (FIB);
removing the at least one route from a plurality of routes stored in a routing information base (RIB); notifying at least one peer network device of a plurality of peer network devices about the at least one route to be withdrawn; initializing a timer with a timeout value and starting the timer; before the time expires, processing a packet that uses the at least one route to be withdrawn; and after the timer expires, removing the at least one route from the FIB. 2. The method of claim 1, wherein notifying the at least one peer network device about the at least one route to be withdrawn comprises sending a border gateway protocol (BGP) UPDATE message comprising the at least one route to be withdrawn. 3. The method of claim 1, wherein removing the at least one route from the FIB comprises updating the plurality of routes stored in the FIB based on the plurality of routes stored in the RIB. 4. The method of claim 1, wherein the timeout value is determined using a peer network device notification time and a buffer time. 5. The method of claim 4, wherein a magnitude of the timeout value is related to the cardinality of the plurality of peer network devices. 6. The method of claim 1 further comprising:
receiving instructions to add at least one new route to the FIB;
adding the at least one new route to the RIB; and
adding, without delay, the at least one new route to the FIB. 7. The method of claim 1, wherein processing the packet that uses the at least one route to be withdrawn comprises:
receiving the packet from a peer network device; determining the destination of the packet, based on a header information of the packet; determining, by searching the plurality of programmed routes stored in the FIB for a suitable route for the destination of the packet, that the at least one route to be withdrawn is the route to be used for the packet; and sending the packet to a next hop network device specified by the at least one route to be withdrawn. 8. A network device comprising a network device operating system (OS),
wherein the network device receives instructions to withdraw at least one route of a plurality of programmed routes,
wherein the plurality of programmed routes is stored in a forwarding information base (FIB);
wherein the network device removes the at least one route from a plurality of routes stored in a routing information base (RIB); wherein the network device notifies at least one peer network device of a plurality of peer network devices about the at least one route to be withdrawn; wherein the network device initializes a timer with a timeout value and starts the timer; wherein, before the time expires, the network device processes a packet that uses the at least one route to be withdrawn; and wherein, after the timer expires, the network device removes the at least one route from the FIB. 9. The network device of claim 8, wherein the network device notifies the at least one peer network device about the at least one route to be withdrawn comprises by sending a border gateway protocol (BGP) UPDATE message comprising the at least one route to be withdrawn. 10. The network device of claim 8, wherein the network device removes the at least one route from the FIB by updating the plurality of routes stored in the FIB based on the plurality of routes stored in the RIB. 11. The network device of claim 8, wherein the timeout value is determined using a peer network device notification time and a buffer time. 12. The network device of claim 11, wherein a magnitude of the timeout value is related to the cardinality of the plurality of peer network devices. 13. The network device of claim 8, wherein the network device processes the packet that uses the at least one route to be withdrawn by:
receiving the packet from a peer network device; determining the destination of the packet, based on a header information of the packet; determining, by searching the plurality of programmed routes stored in the FIB for a suitable route for the destination of the packet, that the at least one route to be withdrawn is the route to be used for the packet; and sending the packet to a next hop network device specified by the at least one route to be withdrawn. 14. The network device of claim 8, wherein the network device is one selected from the group consisting of a router and a multilayer switch. 15. A non-transitory computer readable medium comprising instructions that enable a network device to:
receive instructions to withdraw at least one route of a plurality of programmed routes,
wherein the plurality of programmed routes is stored in a forwarding information base (FIB);
remove the at least one route from a plurality of routes stored in a routing information base (RIB); notify at least one peer network device of a plurality of peer network devices about the at least one route to be withdrawn; initialize a timer with a timeout value and start the timer; before the time expires, process a packet that uses the at least one route to be withdrawn; and after the timer expires, remove the at least one route from the FIB. 16. The non-transitory computer readable medium of claim 15, wherein the instructions that enable the network device to notify the at least one peer network device about the at least one route to be withdrawn comprise instructions to send a border gateway protocol (BGP) UPDATE message comprising the at least one route to be withdrawn. 17. The non-transitory computer readable medium of claim 15, wherein the instructions that enable the network device to remove the at least one route from the FIB comprise instructions to update the plurality of routes stored in the FIB based on the plurality of routes stored in the RIB. 18. The non-transitory computer readable medium of claim 15, wherein the timeout value is determined using a peer network device notification time and a buffer time. 19. The non-transitory computer readable medium of claim 18, wherein a magnitude of the timeout value is related to the cardinality of the plurality of peer network devices. 20. The non-transitory computer readable medium of claim 15, wherein the instructions that enable the network device to process the packet that uses the at least one route to be withdrawn comprise instructions to:
receive the packet from a peer network device; determine the destination of the packet, based on a header information of the packet; determine, by searching the plurality of programmed routes stored in the FIB for a suitable route for the destination of the packet, that the at least one route to be withdrawn is the route to be used for the packet; and send the packet to a next hop network device specified by the at least one route to be withdrawn. | 2,400 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.