Unnamed: 0
int64
0
350k
level_0
int64
0
351k
ApplicationNumber
int64
9.75M
96.1M
ArtUnit
int64
1.6k
3.99k
Abstract
stringlengths
1
8.37k
Claims
stringlengths
3
292k
abstract-claims
stringlengths
68
293k
TechCenter
int64
1.6k
3.9k
6,900
6,900
14,623,182
2,473
According to the invention a core network management device ( 32 ) in a core network section (CN) of the wireless network (WN) receives a request for a tracing regarding a wireless terminal ( 16 ). The request includes an address of a destination device ( 26 ) that is to receive trace log data or data enabling the locating of the address. The core network management device ( 32 ) then automatically orders, based on the request, network elements ( 10, 12, 14, 20, 22, 24 ) of an access network section (AN) of the wireless network (WN) to perform tracing regarding the wireless terminal ( 16 ) and ensures that the trace log data is sent to the destination trace log data handling device ( 26 ). The request with the address may be sent from an access network management device ( 26 ) in the access network section (AN).
1. Method for tracing activities of a wireless terminal in a wireless network, comprising: receiving, in a core network management device, a first request for tracing activities of a first wireless terminal; ordering, based on said request, wireless access point handling devices to perform tracing of activities of said first wireless terminal; and ensuring that trace log data associated with said first request is sent to a destination trace log data handling device. 2. The method of claim 1, wherein ensuring that trace log data associated with said first request is sent to the destination trace log data handling device comprises ordering the wireless access point handling devices to send trace log data associated with said first request regarding the wireless terminal to a destination trace log data handling device address included in the first request. 3. The method of claim 1, wherein ensuring that trace log data associated with said first request is sent to the destination trace log data handling device comprises ensuring that information is sent to the destination trace log data handling device regarding identities of one or more nodes that keep said trace log data associated with said first request. 4. The method of claim 1, wherein the core network management device is provided in a core network section of the wireless network. 5. The method of claim 1, wherein the wireless access point handling devices are provided in an access network section of the wireless network. 6. The method of claim 1, wherein said first request includes one of an address of a destination trace log data handling device that is to receive trace log data associated with said first request, and data enabling the locating of the address. 7. A core network management device configured to order a tracing of the activities of a wireless terminal in a wireless network, provided in relation to a core network section of the wireless network, comprising: at least one interface configured to communicate with other devices and entities and further configured to receive a request for tracing activities of a first wireless terminal; and a network trace management unit configured to receive said request from the interface, order, based on said request, wireless access point handling devices to perform tracing of activities of said first wireless terminal; and ensure that trace log data associated with said request is sent to a destination trace log data handling device. 8. The core network management device of claim 7 wherein the network trace management unit, when being configured to ensure that trace log data is sent to the destination trace log data handling device, is configured to ensure that information is sent to the destination trace log data handling device for identifying one or more nodes that keep said trace log data associated with said first request. 9. Method for tracing of activities of a wireless terminal in a wireless network, comprising: receiving, in a wireless access point handling device, a request to perform tracing of activities of a first wireless device from a core network management device; tracing the activities of a first wireless device; and sending the traced activities to a trace log data handling device. 10. The method of claim 9 wherein the wireless access point handling device is provided in an access network section of the wireless network. 11. The method of claim 9 wherein the core network management device is provided in a core network section of the wireless network. 12. A wireless access point handling device configured to receive a request to perform tracing of activities of a first wireless device from a core network management device; trace the activities of the first wireless device; and send the traced activities to a trace log data handling device.
According to the invention a core network management device ( 32 ) in a core network section (CN) of the wireless network (WN) receives a request for a tracing regarding a wireless terminal ( 16 ). The request includes an address of a destination device ( 26 ) that is to receive trace log data or data enabling the locating of the address. The core network management device ( 32 ) then automatically orders, based on the request, network elements ( 10, 12, 14, 20, 22, 24 ) of an access network section (AN) of the wireless network (WN) to perform tracing regarding the wireless terminal ( 16 ) and ensures that the trace log data is sent to the destination trace log data handling device ( 26 ). The request with the address may be sent from an access network management device ( 26 ) in the access network section (AN).1. Method for tracing activities of a wireless terminal in a wireless network, comprising: receiving, in a core network management device, a first request for tracing activities of a first wireless terminal; ordering, based on said request, wireless access point handling devices to perform tracing of activities of said first wireless terminal; and ensuring that trace log data associated with said first request is sent to a destination trace log data handling device. 2. The method of claim 1, wherein ensuring that trace log data associated with said first request is sent to the destination trace log data handling device comprises ordering the wireless access point handling devices to send trace log data associated with said first request regarding the wireless terminal to a destination trace log data handling device address included in the first request. 3. The method of claim 1, wherein ensuring that trace log data associated with said first request is sent to the destination trace log data handling device comprises ensuring that information is sent to the destination trace log data handling device regarding identities of one or more nodes that keep said trace log data associated with said first request. 4. The method of claim 1, wherein the core network management device is provided in a core network section of the wireless network. 5. The method of claim 1, wherein the wireless access point handling devices are provided in an access network section of the wireless network. 6. The method of claim 1, wherein said first request includes one of an address of a destination trace log data handling device that is to receive trace log data associated with said first request, and data enabling the locating of the address. 7. A core network management device configured to order a tracing of the activities of a wireless terminal in a wireless network, provided in relation to a core network section of the wireless network, comprising: at least one interface configured to communicate with other devices and entities and further configured to receive a request for tracing activities of a first wireless terminal; and a network trace management unit configured to receive said request from the interface, order, based on said request, wireless access point handling devices to perform tracing of activities of said first wireless terminal; and ensure that trace log data associated with said request is sent to a destination trace log data handling device. 8. The core network management device of claim 7 wherein the network trace management unit, when being configured to ensure that trace log data is sent to the destination trace log data handling device, is configured to ensure that information is sent to the destination trace log data handling device for identifying one or more nodes that keep said trace log data associated with said first request. 9. Method for tracing of activities of a wireless terminal in a wireless network, comprising: receiving, in a wireless access point handling device, a request to perform tracing of activities of a first wireless device from a core network management device; tracing the activities of a first wireless device; and sending the traced activities to a trace log data handling device. 10. The method of claim 9 wherein the wireless access point handling device is provided in an access network section of the wireless network. 11. The method of claim 9 wherein the core network management device is provided in a core network section of the wireless network. 12. A wireless access point handling device configured to receive a request to perform tracing of activities of a first wireless device from a core network management device; trace the activities of the first wireless device; and send the traced activities to a trace log data handling device.
2,400
6,901
6,901
14,844,165
2,422
The present disclosure is generally related to a method for intensity correction for multiple projector systems. In one method, the intensity blending maps are created. The method includes generating a plurality of pixel maps for a plurality of projectors based on at least one of an orientation of the plurality of projectors and a projection surface and adjusting an intensity of at least one pixel of at least one of the plurality of projectors based, at least in part, on the plurality of pixel maps.
1. A method of blending pixel intensity comprising: generating, by a processor, a plurality of pixel maps for a plurality of projectors based on at least one of an orientation of the plurality of projectors and a projection surface; and adjusting, by the processor, an intensity of at least one pixel of at least one of the plurality of projectors based, at least in part, on the plurality of pixel maps. 2. The method of claim 1, wherein the projection surface has a three-dimensional geometry. 3. The method of claim 1, further comprising: determining, by the processor, one or more overlapping projection regions based, at least in part, on the plurality of pixel maps. 4. The method of claim 3, further comprising: determining, by the processor, a pixel intensity blending function for the overlapping projection regions; wherein adjusting the intensity of at least one pixel is based, at least in part, on the pixel intensity blending function. 5. The method of claim 4, wherein adjusting the intensity of at least one pixel comprises decreasing a projected light intensity for one or more projectors of the plurality of projectors. 6. The method of claim 4, wherein adjusting the intensity of at least one pixel comprises increasing a projected light intensity for one or more projectors of the plurality of projectors. 7. The method of claim 1, further comprising: determining, by the processor, one or more overlapping projection regions and one or more non-overlapping projection regions; and determining, by a processor, a maximum overlapping projection region having a maximum pixel intensity; wherein adjusting the intensity of at least one pixel comprises increasing an intensity in the non-overlapping regions to match an intensity of the maximum overlapping projection region. 8. The method of claim 1, wherein generating the plurality of pixel maps comprises: receiving, by the processor, data corresponding to an image of a structured light pattern projected by the plurality of projectors onto the projection surface; mapping, by the processor, each pixel of the camera to each pixel of each projector to generate a plurality of projector-to-camera look up tables; and mapping, by the processor, each pixel of each projector to each pixel of other projectors in the plurality of projectors to generate a plurality of projector-to-projector look up tables. 9. The method of claim 1, further comprising further adjusting by the processor, the intensity of the at least one pixel based on at least one of physical characteristics of at least one of the projector, geometry of the projector relative to the projection surface, or the projection surface. 10. The method of claim 9, wherein the at least one physical characteristic includes a light distance between the projector and the projection surface, a diffusion characteristic of the projection surface, a projection angle, a surface reflection from the projection surface, or an internal color response of the projector. 11. A method of generating a substantially seamless image with a plurality of overlapping projection images, comprising: projecting, with a first projector, a first structured light pattern on a projection surface; receiving, by a processor, a first image corresponding to the first structured light pattern; projecting, with a second projector, a second structured light pattern on the projection surface, wherein the second structured light pattern at least partially overlaps the first structured light pattern on the projection surface; receiving, by the processor, a second image corresponding to the second structured light pattern; generating, by the processor, a set of pixel correspondences between the first projector and second projector, based on the first image and the second image; and modifying a brightness of one or more pixels of at least one of the first and second projector based, at least in part, on the set of pixel correspondences. 12. The method of claim 11, further comprising: identifying, by the processor, one or more projection regions where the first projector and the second projector overlap; and determine a blending function for the one or more projection regions. 13. The method of claim 11, wherein the brightness of the one or more pixels is modified based on a distance between the pixel and an edge of the one or more projection regions. 14. The method of claim 11, further comprising: identifying, by the processor, an overlapping projection region and a non-overlapping projection region on the projection surface; and determining, by a processor, a maximum pixel intensity in the overlapping region; wherein modifying the brightness of one or more pixels comprises selectively increasing a brightness of one or more pixels in the non-overlapping regions. 15. The method of claim 11, further comprising: storing, by the processor, the set of pixel correspondences as a plurality of look up tables. 16. The method of claim 15, further comprising: generating, by the processor, a plurality of overlap maps based on the plurality of look up tables. 17. The method of claim 16 further comprising: determining, by the processor, a distance estimation for a plurality of pixels in an overlapping region on the projection surface; wherein modifying the brightness of the one or more pixels is based, at least in part, on the distance estimation. 18. A system for generating pixel intensity blending maps comprising a plurality of projectors for projecting at least partially overlapping projection regions on a projection surface; a processor; and a computer readable storage device having program instructions stored thereon for execution by the processor, the program instructions comprising: program instructions to project, by the plurality of projectors, structured light patterns on the projection surface; program instructions to receive data corresponding to images of the structured light patterns; program instructions to generate a plurality of pixel maps for each of the plurality of the projectors, the pixel maps including overlapping projection region information; and program instructions to adjust an intensity of one or more pixels based on the pixel maps to generate a composite image having a perceptibly smooth intensity. 19. The system of claim 18, wherein the program instructions further comprise: program instructions to reconstruct a surface geometry of the projection surface based on the images of the structured light patterns. 20. The system of claim 19, wherein the program instructions further comprise: program instructions to convert the captured images to an image plane of the each of the plurality of projectors based on the surface geometry of the projection surface. 21. The system of claim 18, wherein the overlapping projection region information includes pixel identification for at least one overlapping projection region and at least one non-overlapping projection region. 22. The system of claim 21, wherein the program instructions to adjust the intensity of one or more pixels comprise: program instructions to decrease a light intensity of at least one projector that projects onto the overlapping projection region. 23. The system of claim 21, wherein the program instructions to adjust the intensity of one or more pixels comprise: program instructions to increase a light intensity of at a projector of the plurality of projectors that projects onto the non-overlapping region.
The present disclosure is generally related to a method for intensity correction for multiple projector systems. In one method, the intensity blending maps are created. The method includes generating a plurality of pixel maps for a plurality of projectors based on at least one of an orientation of the plurality of projectors and a projection surface and adjusting an intensity of at least one pixel of at least one of the plurality of projectors based, at least in part, on the plurality of pixel maps.1. A method of blending pixel intensity comprising: generating, by a processor, a plurality of pixel maps for a plurality of projectors based on at least one of an orientation of the plurality of projectors and a projection surface; and adjusting, by the processor, an intensity of at least one pixel of at least one of the plurality of projectors based, at least in part, on the plurality of pixel maps. 2. The method of claim 1, wherein the projection surface has a three-dimensional geometry. 3. The method of claim 1, further comprising: determining, by the processor, one or more overlapping projection regions based, at least in part, on the plurality of pixel maps. 4. The method of claim 3, further comprising: determining, by the processor, a pixel intensity blending function for the overlapping projection regions; wherein adjusting the intensity of at least one pixel is based, at least in part, on the pixel intensity blending function. 5. The method of claim 4, wherein adjusting the intensity of at least one pixel comprises decreasing a projected light intensity for one or more projectors of the plurality of projectors. 6. The method of claim 4, wherein adjusting the intensity of at least one pixel comprises increasing a projected light intensity for one or more projectors of the plurality of projectors. 7. The method of claim 1, further comprising: determining, by the processor, one or more overlapping projection regions and one or more non-overlapping projection regions; and determining, by a processor, a maximum overlapping projection region having a maximum pixel intensity; wherein adjusting the intensity of at least one pixel comprises increasing an intensity in the non-overlapping regions to match an intensity of the maximum overlapping projection region. 8. The method of claim 1, wherein generating the plurality of pixel maps comprises: receiving, by the processor, data corresponding to an image of a structured light pattern projected by the plurality of projectors onto the projection surface; mapping, by the processor, each pixel of the camera to each pixel of each projector to generate a plurality of projector-to-camera look up tables; and mapping, by the processor, each pixel of each projector to each pixel of other projectors in the plurality of projectors to generate a plurality of projector-to-projector look up tables. 9. The method of claim 1, further comprising further adjusting by the processor, the intensity of the at least one pixel based on at least one of physical characteristics of at least one of the projector, geometry of the projector relative to the projection surface, or the projection surface. 10. The method of claim 9, wherein the at least one physical characteristic includes a light distance between the projector and the projection surface, a diffusion characteristic of the projection surface, a projection angle, a surface reflection from the projection surface, or an internal color response of the projector. 11. A method of generating a substantially seamless image with a plurality of overlapping projection images, comprising: projecting, with a first projector, a first structured light pattern on a projection surface; receiving, by a processor, a first image corresponding to the first structured light pattern; projecting, with a second projector, a second structured light pattern on the projection surface, wherein the second structured light pattern at least partially overlaps the first structured light pattern on the projection surface; receiving, by the processor, a second image corresponding to the second structured light pattern; generating, by the processor, a set of pixel correspondences between the first projector and second projector, based on the first image and the second image; and modifying a brightness of one or more pixels of at least one of the first and second projector based, at least in part, on the set of pixel correspondences. 12. The method of claim 11, further comprising: identifying, by the processor, one or more projection regions where the first projector and the second projector overlap; and determine a blending function for the one or more projection regions. 13. The method of claim 11, wherein the brightness of the one or more pixels is modified based on a distance between the pixel and an edge of the one or more projection regions. 14. The method of claim 11, further comprising: identifying, by the processor, an overlapping projection region and a non-overlapping projection region on the projection surface; and determining, by a processor, a maximum pixel intensity in the overlapping region; wherein modifying the brightness of one or more pixels comprises selectively increasing a brightness of one or more pixels in the non-overlapping regions. 15. The method of claim 11, further comprising: storing, by the processor, the set of pixel correspondences as a plurality of look up tables. 16. The method of claim 15, further comprising: generating, by the processor, a plurality of overlap maps based on the plurality of look up tables. 17. The method of claim 16 further comprising: determining, by the processor, a distance estimation for a plurality of pixels in an overlapping region on the projection surface; wherein modifying the brightness of the one or more pixels is based, at least in part, on the distance estimation. 18. A system for generating pixel intensity blending maps comprising a plurality of projectors for projecting at least partially overlapping projection regions on a projection surface; a processor; and a computer readable storage device having program instructions stored thereon for execution by the processor, the program instructions comprising: program instructions to project, by the plurality of projectors, structured light patterns on the projection surface; program instructions to receive data corresponding to images of the structured light patterns; program instructions to generate a plurality of pixel maps for each of the plurality of the projectors, the pixel maps including overlapping projection region information; and program instructions to adjust an intensity of one or more pixels based on the pixel maps to generate a composite image having a perceptibly smooth intensity. 19. The system of claim 18, wherein the program instructions further comprise: program instructions to reconstruct a surface geometry of the projection surface based on the images of the structured light patterns. 20. The system of claim 19, wherein the program instructions further comprise: program instructions to convert the captured images to an image plane of the each of the plurality of projectors based on the surface geometry of the projection surface. 21. The system of claim 18, wherein the overlapping projection region information includes pixel identification for at least one overlapping projection region and at least one non-overlapping projection region. 22. The system of claim 21, wherein the program instructions to adjust the intensity of one or more pixels comprise: program instructions to decrease a light intensity of at least one projector that projects onto the overlapping projection region. 23. The system of claim 21, wherein the program instructions to adjust the intensity of one or more pixels comprise: program instructions to increase a light intensity of at a projector of the plurality of projectors that projects onto the non-overlapping region.
2,400
6,902
6,902
13,076,937
2,426
Systems and methods are disclosed for publishing data to one or more social networking services in which data pertaining to the user's behavior in browsing, selecting, and playing media, from particular sources on a particular IPTV platform, is tracked so that a feed representative of such behavior may be transmitted to the social networking services for publication. Accordingly in response to the feed, information pertaining to the user, the platform, the selected media, and the service providing the media may be presented on one or more pages provided by the social networking service. By embedding special tags in the feed that are compliant with protocols and methods that are supported by an API exposed by a server in the social networking service, the data from the feed can be displayed on the pages with the same look and feel and user experience as native social networking content.
1. A method of playing a content item on a content playback device using a second display, comprising: i. instantiating an application on the second display; ii. establishing a browsing session between a second display and a source of content using the application, the application facilitating browsing and selection of a content item by a user; iii. loading an identifier of the content item in the application; iv. causing the content item to play back in a content playback device; v. tracking data associated with the browsing and playback; vi. populating a feed with the tracked data; and vii. transmitting the feed to at least one social networking service. 2. The method of claim 1, wherein the feed includes tags compliant with an API exposed by a server operated by the social networking service. 3. The method of claim 1, wherein the feed further includes data pertaining to the user. 4. The method of claim 1, wherein the feed further includes data pertaining to the source of the content item. 5. The method of claim 1, wherein the feed further includes data pertaining to the content playback device. 6. The method of claim 1, wherein a connection between the content playback platform and second display is wireless, and wherein a wireless transmission scheme includes a scheme selected from the group consisting of: WiFi, 802.11, 802.15, or 802.16. 7. The method of claim 1, wherein the feed is personalized on a per-user basis and is adapted for publication in substantially real time or wherein the feed is configured to be representative of a plurality of users and is further adapted for publication in bulk in substantially non-real time. 8. The method of claim 1, wherein the browsing session is associated with a user account. 9. The method of claim 7, including a further step of providing the user with a choice of opting in or opting out of the tracking. 10. The method of claim 7, further comprising: i. transmitting to the second display a list of available service providers; ii. receiving from the second display a selection of a first content item from one of the service providers; iii. placing the first content item in a queue; iv. receiving from the second display a selection of a second content item from another of the service providers; and v. placing the second content item in a queue. 11. The method of claim 1, wherein the causing includes causing the content playback device to request the content item. 12. A non-transitory computer-readable medium, comprising instructions for causing a computing device to implement the method of claim 1. 13. A second display, comprising: i. a display module, the display module providing a user interface and configured to display a content item or to receive a content item URL/URI; ii. an asset browsing and selection tracking module for tracking displayed content items and content items that are selected for playback on the content playback device; and iii. a network communications module, the network communications module for coupling the second display to a local network or to a content playback device and for passing information tracked by the asset browsing and selection tracking module to be used in a feed to a social networking service. 14. The second display of claim 13, further comprising a browsing module for browsing content items. 15. The second display of claim 14, wherein the browsing module is implemented in HTML, Javascript, or a native code using at least one of local execution, cloud-computing paradigm, or combination thereof. 16. The second display of claim 15, wherein the browsing module is a web-browsing module. 17. The second display of claim 13, wherein the passing is via a wireless communication scheme. 18. A system for publishing information on a social network, comprising: i. a processor; ii. memory bearing computer readable instructions capable of loading an application into a browser, the application being configured for browsing one or more content items from various ones of a plurality of content providers; iii. memory bearing computer readable instructions capable of receiving information about a content item; iv. memory bearing computer readable instructions capable of causing a content item, chosen on a second display, to be played back on a content playback device; and v. memory bearing computer readable instructions capable of tracking the browsing and playing back, the tracking generating data for populating a feed usable by a social networking service to publish the data. 19. The system of claim 18, wherein the feed includes at least one of asset object, service object, platform object, or user object, each of the objects being configured for linking to an additional resource when invoked from the social networking service. 20. The system of claim 19, wherein the additional resource is provided by one or more pages supported by the social networking service. 21. The system of claim 19 in which the additional resource is supported by one or more pages that are external to the social networking service. 22. The system of claim 18, wherein the feed is populated in an IPTV domain. 23. The system of claim 18, wherein the feed comprises at least one asset and associated metadata, the metadata incorporating tags that comply with an API exposed by the social networking service. 24. The system of claim 23, wherein the asset is selectable and is instantiated on an IPTV associated with a viewer of the social networking service when so selected. 25. The system of claim 18, wherein the feed includes advertising that is responsive to a user profile of a social networking service viewer. 26. A method for providing a feed from an IPTV domain to a social networking site, the IPTV domain including a content playback platform, second display operable by a user and management server infrastructure, comprising: i. tracking the user's behaviors at the second display when browsing and selecting an asset for playback on the content playback device, the asset being provided from a service to which the IPTV domain is coupled over a network; ii. populating the feed with a data object, the data object representing at least one of the asset, the service, the platform, or the user; iii. configuring the feed for interoperability with one or more pages supported by the social networking site so that the data object is selectable by a viewer of the site; and iv. publishing the feed to the social networking site from the management server infrastructure. 27. The method of claim 26, wherein the publishing is performed via interaction with an API exposed by the social networking site so that the feed is incorporated into the one or more pages as native social networking content. 28. The method of claim 26, wherein the selecting of the data object by the viewer triggers provision of additional information from the feed. 29. The method of claim 26, wherein the data object represents a second display associated with the viewer and wherein selecting the data object enables an application to execute on the second display to thereby display information about the asset. 30. The method of claim 26 further comprising configuring the one or more pages to implement one or more native social networking features. 31. The method of claim 30, wherein the one or more native social networking features include one of posting a comment, link, or content item. 32. The method of claim 26, further comprising exposing an interface to enable the user to consent to the publishing of the feed to the social networking site.
Systems and methods are disclosed for publishing data to one or more social networking services in which data pertaining to the user's behavior in browsing, selecting, and playing media, from particular sources on a particular IPTV platform, is tracked so that a feed representative of such behavior may be transmitted to the social networking services for publication. Accordingly in response to the feed, information pertaining to the user, the platform, the selected media, and the service providing the media may be presented on one or more pages provided by the social networking service. By embedding special tags in the feed that are compliant with protocols and methods that are supported by an API exposed by a server in the social networking service, the data from the feed can be displayed on the pages with the same look and feel and user experience as native social networking content.1. A method of playing a content item on a content playback device using a second display, comprising: i. instantiating an application on the second display; ii. establishing a browsing session between a second display and a source of content using the application, the application facilitating browsing and selection of a content item by a user; iii. loading an identifier of the content item in the application; iv. causing the content item to play back in a content playback device; v. tracking data associated with the browsing and playback; vi. populating a feed with the tracked data; and vii. transmitting the feed to at least one social networking service. 2. The method of claim 1, wherein the feed includes tags compliant with an API exposed by a server operated by the social networking service. 3. The method of claim 1, wherein the feed further includes data pertaining to the user. 4. The method of claim 1, wherein the feed further includes data pertaining to the source of the content item. 5. The method of claim 1, wherein the feed further includes data pertaining to the content playback device. 6. The method of claim 1, wherein a connection between the content playback platform and second display is wireless, and wherein a wireless transmission scheme includes a scheme selected from the group consisting of: WiFi, 802.11, 802.15, or 802.16. 7. The method of claim 1, wherein the feed is personalized on a per-user basis and is adapted for publication in substantially real time or wherein the feed is configured to be representative of a plurality of users and is further adapted for publication in bulk in substantially non-real time. 8. The method of claim 1, wherein the browsing session is associated with a user account. 9. The method of claim 7, including a further step of providing the user with a choice of opting in or opting out of the tracking. 10. The method of claim 7, further comprising: i. transmitting to the second display a list of available service providers; ii. receiving from the second display a selection of a first content item from one of the service providers; iii. placing the first content item in a queue; iv. receiving from the second display a selection of a second content item from another of the service providers; and v. placing the second content item in a queue. 11. The method of claim 1, wherein the causing includes causing the content playback device to request the content item. 12. A non-transitory computer-readable medium, comprising instructions for causing a computing device to implement the method of claim 1. 13. A second display, comprising: i. a display module, the display module providing a user interface and configured to display a content item or to receive a content item URL/URI; ii. an asset browsing and selection tracking module for tracking displayed content items and content items that are selected for playback on the content playback device; and iii. a network communications module, the network communications module for coupling the second display to a local network or to a content playback device and for passing information tracked by the asset browsing and selection tracking module to be used in a feed to a social networking service. 14. The second display of claim 13, further comprising a browsing module for browsing content items. 15. The second display of claim 14, wherein the browsing module is implemented in HTML, Javascript, or a native code using at least one of local execution, cloud-computing paradigm, or combination thereof. 16. The second display of claim 15, wherein the browsing module is a web-browsing module. 17. The second display of claim 13, wherein the passing is via a wireless communication scheme. 18. A system for publishing information on a social network, comprising: i. a processor; ii. memory bearing computer readable instructions capable of loading an application into a browser, the application being configured for browsing one or more content items from various ones of a plurality of content providers; iii. memory bearing computer readable instructions capable of receiving information about a content item; iv. memory bearing computer readable instructions capable of causing a content item, chosen on a second display, to be played back on a content playback device; and v. memory bearing computer readable instructions capable of tracking the browsing and playing back, the tracking generating data for populating a feed usable by a social networking service to publish the data. 19. The system of claim 18, wherein the feed includes at least one of asset object, service object, platform object, or user object, each of the objects being configured for linking to an additional resource when invoked from the social networking service. 20. The system of claim 19, wherein the additional resource is provided by one or more pages supported by the social networking service. 21. The system of claim 19 in which the additional resource is supported by one or more pages that are external to the social networking service. 22. The system of claim 18, wherein the feed is populated in an IPTV domain. 23. The system of claim 18, wherein the feed comprises at least one asset and associated metadata, the metadata incorporating tags that comply with an API exposed by the social networking service. 24. The system of claim 23, wherein the asset is selectable and is instantiated on an IPTV associated with a viewer of the social networking service when so selected. 25. The system of claim 18, wherein the feed includes advertising that is responsive to a user profile of a social networking service viewer. 26. A method for providing a feed from an IPTV domain to a social networking site, the IPTV domain including a content playback platform, second display operable by a user and management server infrastructure, comprising: i. tracking the user's behaviors at the second display when browsing and selecting an asset for playback on the content playback device, the asset being provided from a service to which the IPTV domain is coupled over a network; ii. populating the feed with a data object, the data object representing at least one of the asset, the service, the platform, or the user; iii. configuring the feed for interoperability with one or more pages supported by the social networking site so that the data object is selectable by a viewer of the site; and iv. publishing the feed to the social networking site from the management server infrastructure. 27. The method of claim 26, wherein the publishing is performed via interaction with an API exposed by the social networking site so that the feed is incorporated into the one or more pages as native social networking content. 28. The method of claim 26, wherein the selecting of the data object by the viewer triggers provision of additional information from the feed. 29. The method of claim 26, wherein the data object represents a second display associated with the viewer and wherein selecting the data object enables an application to execute on the second display to thereby display information about the asset. 30. The method of claim 26 further comprising configuring the one or more pages to implement one or more native social networking features. 31. The method of claim 30, wherein the one or more native social networking features include one of posting a comment, link, or content item. 32. The method of claim 26, further comprising exposing an interface to enable the user to consent to the publishing of the feed to the social networking site.
2,400
6,903
6,903
14,596,650
2,488
An apparatus for inspecting an edge portion of a substrate can inspect a defect or a chamfered width on an edge portion of a substrate. First and second right-angled prisms are disposed above and below the edge portion such that inclined surfaces thereof are directed toward the upper surface and lower surface of the edge portion. A lighting part irradiates the edge portion of the substrate with light. A photographing part is disposed adjacent to the edge portion. The photographing part takes an image of the upper surface of the edge portion from light that has passed through the first right-angled prism, an image of the lower surface of the edge portion from light that has passed through the second right-angled prism, and an image of an end surface of the edge portion.
1. An apparatus for inspecting an edge portion of a substrate, comprising: a first right-angled prism disposed above an edge portion of a substrate such that an inclined surface thereof is directed toward an upper surface of the edge portion of the substrate; a second right-angled prism disposed below the edge portion of the substrate such that an inclined surface thereof is directed toward a lower surface of the edge portion of the substrate; a lighting part irradiating the edge portion of the substrate with light; and a photographing part disposed adjacent to the edge portion of the substrate, wherein the photographing part takes an image of the upper surface of the edge portion of the substrate from light that has passed through the first right-angled prism, an image of the lower surface of the edge portion of the substrate from light that has passed through the second right-angled prism, and an image of an end surface of the edge portion of the substrate. 2. The apparatus according to claim 1, further comprising: a first correction plate disposed between the first right-angled prism and the photographing part to reduce a path of light that has passed through the first right-angled prism; and a second correction plate disposed between the second right-angled prism and the photographing part to reduce a path of light that has passed through the second right-angled prism. 3. The apparatus according to claim 2, wherein the first correction plate and the second correction plate are formed of BK7. 4. The apparatus according to claim 1, wherein an angle between an upper surface and the inclined surface of the first right-angled prism and an angle between a lower surface and the inclined surface of the second right-angled prism are acute angles smaller than 45°. 5. The apparatus according to claim 1, further comprising a display part displaying the images taken by the photographing part. 6. The apparatus according to claim 1, further comprising an air nozzle for removing impurities from the edge portion of the substrate by ejecting air onto the edge portion of the substrate. 7. The apparatus according to claim 1, further comprising a transportation part transporting the substrate.
An apparatus for inspecting an edge portion of a substrate can inspect a defect or a chamfered width on an edge portion of a substrate. First and second right-angled prisms are disposed above and below the edge portion such that inclined surfaces thereof are directed toward the upper surface and lower surface of the edge portion. A lighting part irradiates the edge portion of the substrate with light. A photographing part is disposed adjacent to the edge portion. The photographing part takes an image of the upper surface of the edge portion from light that has passed through the first right-angled prism, an image of the lower surface of the edge portion from light that has passed through the second right-angled prism, and an image of an end surface of the edge portion.1. An apparatus for inspecting an edge portion of a substrate, comprising: a first right-angled prism disposed above an edge portion of a substrate such that an inclined surface thereof is directed toward an upper surface of the edge portion of the substrate; a second right-angled prism disposed below the edge portion of the substrate such that an inclined surface thereof is directed toward a lower surface of the edge portion of the substrate; a lighting part irradiating the edge portion of the substrate with light; and a photographing part disposed adjacent to the edge portion of the substrate, wherein the photographing part takes an image of the upper surface of the edge portion of the substrate from light that has passed through the first right-angled prism, an image of the lower surface of the edge portion of the substrate from light that has passed through the second right-angled prism, and an image of an end surface of the edge portion of the substrate. 2. The apparatus according to claim 1, further comprising: a first correction plate disposed between the first right-angled prism and the photographing part to reduce a path of light that has passed through the first right-angled prism; and a second correction plate disposed between the second right-angled prism and the photographing part to reduce a path of light that has passed through the second right-angled prism. 3. The apparatus according to claim 2, wherein the first correction plate and the second correction plate are formed of BK7. 4. The apparatus according to claim 1, wherein an angle between an upper surface and the inclined surface of the first right-angled prism and an angle between a lower surface and the inclined surface of the second right-angled prism are acute angles smaller than 45°. 5. The apparatus according to claim 1, further comprising a display part displaying the images taken by the photographing part. 6. The apparatus according to claim 1, further comprising an air nozzle for removing impurities from the edge portion of the substrate by ejecting air onto the edge portion of the substrate. 7. The apparatus according to claim 1, further comprising a transportation part transporting the substrate.
2,400
6,904
6,904
14,517,812
2,465
The scale of the fabric being decoupled from the scale capabilities of each switch. Only the directly attached node devices are included in the name server database of a particular switch. Only needed connections, such as those from hosts to disks, i.e., initiators to targets, are generally maintained in the routing database. When a switch is connected to the network it is configured as either a server, storage or core switch, defining the routing entries that are necessary. This configuration addresses the various change notifications that must be provided from the switch. In host to host communications, disk to tape device communications in a backup, or disk to disk communications in a data migration, there must be transfers between like type devices, i.e. between two communications devices connected to server switches or connected to storage switches. These cases are preferably developed based on the zoning information.
1. A switch comprising: a processor; random access memory coupled to said processor; program storage coupled to said processor; and at least two ports coupled to said processor, at least one port for connecting to a node device and at least one port for connecting to another switch, wherein said program storage includes a program which, when executed by said processor, causes said processor to perform the following method: receiving a designation of the switch as one switch type of a plurality of switch types based on node devices connected or to be connected to the switch; developing name server entries for only node devices connected to the switch; and developing routes based on switch type and only between server and storage devices as a default condition. 2. The switch of claim 1, wherein said plurality of switch types include server and storage. 3. The switch of claim 2, wherein said plurality of switch types further include core. 4. The switch of claim 1, the method further comprising: developing routes between servers and between storage devices on an exception basis. 5. The switch of claim 4, wherein said developing routes between servers and between storage devices is performed based on review of zoning entries. 6. A method comprising: receiving a designation of a switch as one switch type of a plurality of switch types based on node devices connected or to be connected to said switch; developing name server entries for only node devices connected to said switch; and developing routes based on switch type and only between server and storage devices as a default condition. 7. The method of claim 6, wherein said plurality of switch types include server and storage. 8. The method of claim 7, wherein said plurality of switch types further include core. 9. The method of claim 6, further comprising: developing routes between servers and between storage devices on an exception basis. 10. The method of claim 9, wherein said developing routes between servers and between storage devices is performed based on review of zoning entries. 11. A non-transitory computer readable medium comprising instructions stored thereon that when executed by a processor cause the processor to perform a method, the method comprising: receiving a designation of a switch as one switch type of a plurality of switch types based on node devices connected or to be connected to said switch; developing name server entries for only node devices connected to said switch; and developing routes based on switch type and only between server and storage devices as a default condition. 12. The non-transitory computer readable medium of claim 11, wherein said plurality of switch types include server and storage. 13. The non-transitory computer readable medium of claim 12, wherein said plurality of switch types further include core. 14. The non-transitory computer readable medium of claim 11, the method further comprising: developing routes between servers and between storage devices on an exception basis. 15. The non-transitory computer readable medium of claim 14, wherein said developing routes between servers and between storage devices is performed based on review of zoning entries.
The scale of the fabric being decoupled from the scale capabilities of each switch. Only the directly attached node devices are included in the name server database of a particular switch. Only needed connections, such as those from hosts to disks, i.e., initiators to targets, are generally maintained in the routing database. When a switch is connected to the network it is configured as either a server, storage or core switch, defining the routing entries that are necessary. This configuration addresses the various change notifications that must be provided from the switch. In host to host communications, disk to tape device communications in a backup, or disk to disk communications in a data migration, there must be transfers between like type devices, i.e. between two communications devices connected to server switches or connected to storage switches. These cases are preferably developed based on the zoning information.1. A switch comprising: a processor; random access memory coupled to said processor; program storage coupled to said processor; and at least two ports coupled to said processor, at least one port for connecting to a node device and at least one port for connecting to another switch, wherein said program storage includes a program which, when executed by said processor, causes said processor to perform the following method: receiving a designation of the switch as one switch type of a plurality of switch types based on node devices connected or to be connected to the switch; developing name server entries for only node devices connected to the switch; and developing routes based on switch type and only between server and storage devices as a default condition. 2. The switch of claim 1, wherein said plurality of switch types include server and storage. 3. The switch of claim 2, wherein said plurality of switch types further include core. 4. The switch of claim 1, the method further comprising: developing routes between servers and between storage devices on an exception basis. 5. The switch of claim 4, wherein said developing routes between servers and between storage devices is performed based on review of zoning entries. 6. A method comprising: receiving a designation of a switch as one switch type of a plurality of switch types based on node devices connected or to be connected to said switch; developing name server entries for only node devices connected to said switch; and developing routes based on switch type and only between server and storage devices as a default condition. 7. The method of claim 6, wherein said plurality of switch types include server and storage. 8. The method of claim 7, wherein said plurality of switch types further include core. 9. The method of claim 6, further comprising: developing routes between servers and between storage devices on an exception basis. 10. The method of claim 9, wherein said developing routes between servers and between storage devices is performed based on review of zoning entries. 11. A non-transitory computer readable medium comprising instructions stored thereon that when executed by a processor cause the processor to perform a method, the method comprising: receiving a designation of a switch as one switch type of a plurality of switch types based on node devices connected or to be connected to said switch; developing name server entries for only node devices connected to said switch; and developing routes based on switch type and only between server and storage devices as a default condition. 12. The non-transitory computer readable medium of claim 11, wherein said plurality of switch types include server and storage. 13. The non-transitory computer readable medium of claim 12, wherein said plurality of switch types further include core. 14. The non-transitory computer readable medium of claim 11, the method further comprising: developing routes between servers and between storage devices on an exception basis. 15. The non-transitory computer readable medium of claim 14, wherein said developing routes between servers and between storage devices is performed based on review of zoning entries.
2,400
6,905
6,905
14,088,542
2,456
Services in a content delivery framework include selective warm-up and wind-down strategies. The warm up strategies include (i) obtaining and preloading a global configuration object; (ii) obtaining and preloading at least some customer data; and (iii) pre-fetching content. The wind-down strategies include stopping acceptance of requests; flushing a cache; and finishing current processing of said particular service.
1. A computer-implemented method, operable in a network comprising multiple services, said services running on a plurality of devices, the method operable on at least one device comprising hardware including memory and at least one processor, the method comprising: (A) in response to halting a particular running service of said multiple services, determining whether to (i) perform hard stop of said particular service, or (ii) wind down said particular service; and (B) when it is determined in (A) to wind down said particular service, winding down said particular service, wherein said winding down of said particular service comprises one or more wind-down acts selected from: (B)(1) stopping acceptance of requests at said particular service; and (B)(2) flushing a cache of said particular service; and (B)(3) finishing current processing of said particular service; and (C) terminating said particular service. 2. The method of claim 1 wherein the wind-down acts occur in any order. 3. The method of claim 1 wherein at least some of the wind-down acts occur in series. 4. The method of claim 1 wherein at least some of the wind-down acts occur in parallel. 5. The method of claim 1 wherein the wind-down act of flushing the cache in (B)(2) occurs after said terminating of said particular service in (C). 6. The method of claim 1 wherein the wind-down act of flushing the cache in (B)(2) occurs before and after said terminating of said particular service in (C). 7. The method of claim 1 wherein the particular service is a caching service. 8. The method of claim 7 wherein the winding down of the particular service in (B) comprises: stopping acceptance of requests at said caching service; and finishing processing of current requests at said caching service. 9. The method of claim 1 wherein the particular service is a reducer service. 10. The method of claim 9 wherein the reducer service winds down (i) by no longer accepting incoming event streams, and (ii) by finalizing said reducer service processing on event streams that said reducer service already has. 11. The method of claim 1 wherein the particular service is rendezvous service. 12. The method of claim 11 wherein the rendezvous service winds down (i) by no longer accepting incoming rendezvous requests, and (ii) by finalizing and processing the rendezvous service's outstanding requests. 13. The method of claim 12 wherein the incoming rendezvous requests comprise name resolution requests. 14. The method of claim 1 wherein the particular service is a collector service. 15. The method of claim 14 wherein the collector service winds down (i) by no longer accepting inputs, and (ii) by completing processing on data that said collector already has. 16. The method of claim 1 wherein the winding down in (B) is curtailed. 17. A computer-implemented method, operable in a network comprising multiple services including one or more cache services, said services running on a plurality of devices, the method operable on at least one device comprising hardware including memory and at least one processor, the method comprising: in response to a cache service of said one or more cache services being started, performing one or more warm up strategies selected from a group comprising: (i) obtaining a global configuration object; (ii) obtaining at least some customer data; and (iii) pre-fetching content. 18. The method of claim 17 wherein, when the one or more warm up strategies comprise obtaining a global configuration object, the cache service queries its neighbors or peers for the global configuration object. 19. The method of claim 17 wherein, when the one or more warm up strategies comprise obtaining at least some customer data, the at least some customer data comprises customer data of one or more popular customers at at least one neighbor of the cache service. 20. The method of claim 17 wherein the at least some customer data comprises a Customer Configuration Script (CCS). 21. The method of claim 17 wherein, when the one or more warm up strategies comprise obtaining at least some customer data, said obtaining of said at least some customer data is done before said cache service accepts incoming client connections. 22. The method of claim 17 wherein, when the one or more warm up strategies comprise pre-fetching content, the content comprises popular content. 23. The method of claim 17 wherein the cache service is a member of a cluster and wherein the one or more warm up strategies comprise a warm-up strategy wherein said cache service gets less traffic than other members of the cluster. 24. The method of claim 23 wherein the cache service gets less traffic than other members of the cluster until a cache miss rate of the cache service is substantially the same as a cache miss rate of the rest of the cluster. 25. The method of claim 17 wherein the cache service preloads data or content based on information or instructions received during a registration of said cache service. 26. The method of claim 25 wherein the cache service preloads data and content associated with at least one content provider. 27. The method of claim 25 wherein data preloaded by the cache service comprises customer data associated with the at least one content provider. 28. The method of claim 27 wherein the customer data comprise at least one customer configuration script (CCS) associated with at least one content provider. 29. The method of claim 17 wherein the at least some customer data comprises customer data of at least one popular customer at a neighbor of the cache service. 30. The method of claim 17 wherein the one or more warm up strategies comprise at least two warm up strategies, and wherein the performing performs the at least two warm up strategies at least partially in parallel. 31. The method of claim 17 wherein the one or more warm up strategies comprise at least two warm up strategies, and wherein the performing performs the at least two warm up strategies in parallel. 32. A system, operable in a network comprising multiple services, said services running on a plurality of devices, the system comprising: (a) hardware including memory and at least one processor, and (b) a service running on said hardware, wherein said service is configured to: (A) in response to halting a particular running service of said multiple services, determine whether to (i) perform hard stop of said particular service, or (ii) wind down said particular service; and (B) when it is determined in (A) to wind down said particular service, wind down said particular service using one or more wind-down acts selected from: (B)(1) stopping acceptance of requests at said particular service; and (B)(2) flushing a cache of said particular service; and (B)(3) finishing current processing of said particular service; and (C) terminate said particular service. 33. The system of claim 32 wherein said multiple services include one or more cache services, and wherein said service is a cache service, and wherein said service is further configured to: in response to said cache service being started, perform one or more warm up strategies selected from a group comprising: (i) obtaining a global configuration object; (ii) obtaining at least some customer data; and (iii) pre-fetching content. 34. A computer program product having computer readable instructions stored on non-transitory computer readable media, the computer readable instructions including instructions for implementing a computer-implemented method, said method operable on a device comprising hardware including memory and at least one processor and running a service on said hardware, said method, operable in a network comprising multiple services, said services running on a plurality of devices, and said method comprising: (A) in response to halting a particular running service of said multiple services, determining whether to (i) perform hard stop of said particular service, or (ii) wind down said particular service; and (B) when it is determined in (A) to wind down said particular service, winding down said particular service, wherein said winding down of said particular service comprises one or more wind-down acts selected from: (B)(1) stopping acceptance of requests at said particular service; and (B)(2) flushing a cache of said particular service; and (B)(3) finishing current processing of said particular service; and (C) terminating said particular service. 35. The computer program product of claim 34 wherein said multiple services comprise cache services, the method further comprising: in response to a cache service of said one or more cache services being started, performing one or more warm up strategies selected from a group comprising: (i) obtaining a global configuration object; (ii) obtaining at least some customer data; and (iii) pre-fetching content.
Services in a content delivery framework include selective warm-up and wind-down strategies. The warm up strategies include (i) obtaining and preloading a global configuration object; (ii) obtaining and preloading at least some customer data; and (iii) pre-fetching content. The wind-down strategies include stopping acceptance of requests; flushing a cache; and finishing current processing of said particular service.1. A computer-implemented method, operable in a network comprising multiple services, said services running on a plurality of devices, the method operable on at least one device comprising hardware including memory and at least one processor, the method comprising: (A) in response to halting a particular running service of said multiple services, determining whether to (i) perform hard stop of said particular service, or (ii) wind down said particular service; and (B) when it is determined in (A) to wind down said particular service, winding down said particular service, wherein said winding down of said particular service comprises one or more wind-down acts selected from: (B)(1) stopping acceptance of requests at said particular service; and (B)(2) flushing a cache of said particular service; and (B)(3) finishing current processing of said particular service; and (C) terminating said particular service. 2. The method of claim 1 wherein the wind-down acts occur in any order. 3. The method of claim 1 wherein at least some of the wind-down acts occur in series. 4. The method of claim 1 wherein at least some of the wind-down acts occur in parallel. 5. The method of claim 1 wherein the wind-down act of flushing the cache in (B)(2) occurs after said terminating of said particular service in (C). 6. The method of claim 1 wherein the wind-down act of flushing the cache in (B)(2) occurs before and after said terminating of said particular service in (C). 7. The method of claim 1 wherein the particular service is a caching service. 8. The method of claim 7 wherein the winding down of the particular service in (B) comprises: stopping acceptance of requests at said caching service; and finishing processing of current requests at said caching service. 9. The method of claim 1 wherein the particular service is a reducer service. 10. The method of claim 9 wherein the reducer service winds down (i) by no longer accepting incoming event streams, and (ii) by finalizing said reducer service processing on event streams that said reducer service already has. 11. The method of claim 1 wherein the particular service is rendezvous service. 12. The method of claim 11 wherein the rendezvous service winds down (i) by no longer accepting incoming rendezvous requests, and (ii) by finalizing and processing the rendezvous service's outstanding requests. 13. The method of claim 12 wherein the incoming rendezvous requests comprise name resolution requests. 14. The method of claim 1 wherein the particular service is a collector service. 15. The method of claim 14 wherein the collector service winds down (i) by no longer accepting inputs, and (ii) by completing processing on data that said collector already has. 16. The method of claim 1 wherein the winding down in (B) is curtailed. 17. A computer-implemented method, operable in a network comprising multiple services including one or more cache services, said services running on a plurality of devices, the method operable on at least one device comprising hardware including memory and at least one processor, the method comprising: in response to a cache service of said one or more cache services being started, performing one or more warm up strategies selected from a group comprising: (i) obtaining a global configuration object; (ii) obtaining at least some customer data; and (iii) pre-fetching content. 18. The method of claim 17 wherein, when the one or more warm up strategies comprise obtaining a global configuration object, the cache service queries its neighbors or peers for the global configuration object. 19. The method of claim 17 wherein, when the one or more warm up strategies comprise obtaining at least some customer data, the at least some customer data comprises customer data of one or more popular customers at at least one neighbor of the cache service. 20. The method of claim 17 wherein the at least some customer data comprises a Customer Configuration Script (CCS). 21. The method of claim 17 wherein, when the one or more warm up strategies comprise obtaining at least some customer data, said obtaining of said at least some customer data is done before said cache service accepts incoming client connections. 22. The method of claim 17 wherein, when the one or more warm up strategies comprise pre-fetching content, the content comprises popular content. 23. The method of claim 17 wherein the cache service is a member of a cluster and wherein the one or more warm up strategies comprise a warm-up strategy wherein said cache service gets less traffic than other members of the cluster. 24. The method of claim 23 wherein the cache service gets less traffic than other members of the cluster until a cache miss rate of the cache service is substantially the same as a cache miss rate of the rest of the cluster. 25. The method of claim 17 wherein the cache service preloads data or content based on information or instructions received during a registration of said cache service. 26. The method of claim 25 wherein the cache service preloads data and content associated with at least one content provider. 27. The method of claim 25 wherein data preloaded by the cache service comprises customer data associated with the at least one content provider. 28. The method of claim 27 wherein the customer data comprise at least one customer configuration script (CCS) associated with at least one content provider. 29. The method of claim 17 wherein the at least some customer data comprises customer data of at least one popular customer at a neighbor of the cache service. 30. The method of claim 17 wherein the one or more warm up strategies comprise at least two warm up strategies, and wherein the performing performs the at least two warm up strategies at least partially in parallel. 31. The method of claim 17 wherein the one or more warm up strategies comprise at least two warm up strategies, and wherein the performing performs the at least two warm up strategies in parallel. 32. A system, operable in a network comprising multiple services, said services running on a plurality of devices, the system comprising: (a) hardware including memory and at least one processor, and (b) a service running on said hardware, wherein said service is configured to: (A) in response to halting a particular running service of said multiple services, determine whether to (i) perform hard stop of said particular service, or (ii) wind down said particular service; and (B) when it is determined in (A) to wind down said particular service, wind down said particular service using one or more wind-down acts selected from: (B)(1) stopping acceptance of requests at said particular service; and (B)(2) flushing a cache of said particular service; and (B)(3) finishing current processing of said particular service; and (C) terminate said particular service. 33. The system of claim 32 wherein said multiple services include one or more cache services, and wherein said service is a cache service, and wherein said service is further configured to: in response to said cache service being started, perform one or more warm up strategies selected from a group comprising: (i) obtaining a global configuration object; (ii) obtaining at least some customer data; and (iii) pre-fetching content. 34. A computer program product having computer readable instructions stored on non-transitory computer readable media, the computer readable instructions including instructions for implementing a computer-implemented method, said method operable on a device comprising hardware including memory and at least one processor and running a service on said hardware, said method, operable in a network comprising multiple services, said services running on a plurality of devices, and said method comprising: (A) in response to halting a particular running service of said multiple services, determining whether to (i) perform hard stop of said particular service, or (ii) wind down said particular service; and (B) when it is determined in (A) to wind down said particular service, winding down said particular service, wherein said winding down of said particular service comprises one or more wind-down acts selected from: (B)(1) stopping acceptance of requests at said particular service; and (B)(2) flushing a cache of said particular service; and (B)(3) finishing current processing of said particular service; and (C) terminating said particular service. 35. The computer program product of claim 34 wherein said multiple services comprise cache services, the method further comprising: in response to a cache service of said one or more cache services being started, performing one or more warm up strategies selected from a group comprising: (i) obtaining a global configuration object; (ii) obtaining at least some customer data; and (iii) pre-fetching content.
2,400
6,906
6,906
14,056,787
2,485
A mobile device management system stores network parameters so that certain functionality can be disabled or placed in sleep mode to optimize and lengthen battery life. The mobile device analyzes its user calendar schedule to download navigation data and network parameters so that tasks such as downloading information and updates are performed during times that the mobile device is connected to lower cost network access such as WiFi networks. By performing tasks such as the downloading of information based on availability of low cost network resources, the battery life of the mobile device may be lengthened. By storing network parameters such as the location of dead zones and roaming zones, the constant pinging of the RF baseband chip can be disabled and only enabled when the mobile device knows it is close to an areas where the mobile device must switch networks, further reducing power consumption.
1. A mobile device network parameter selection system, comprising the steps of: examining a user calendar schedule stored on a mobile device; determining map locations for events detected in the user calendar schedule; storing network parameter resources corresponding to the map locations for the events; allocating the network parameter resources of the mobile device; and configuring the functionality of the mobile device for minimized energy usage. 2. The mobile device network parameter selection system of claim 1, further comprising: generating an RF topographical map of network resources. 3. The mobile device network parameter selection system of claim 1, wherein the step of determining map locations is accomplished via location beacons. 4. The mobile device network parameter selection system of claim 1, wherein the step of configuring of the functionality of the mobile device is based on least cost routing. 5. The mobile device network parameter selection system of claim 1, wherein the step of configuring of the functionality of the mobile device factors in latency delays. 6. The mobile device network parameter selection system of claim 1, wherein the step of configuring the functionality of the mobile device optimizes available bandwidth. 7. The mobile device network parameter selection system of claim 1, wherein the step of configuring the functionality of the mobile device compares types of bandwidths. 8. The mobile device network parameter selection system of claim 1, wherein the step of configuring the functionality of the mobile device implements total throughput. 9. The mobile device network parameter selection system of claim 1, wherein the step of configuring the functionality of the mobile device implements data throttling. 10. The mobile device network parameter selection system of claim 1, wherein the step of storing network parameter resources occurs when the mobile device travels a path a first time. 11. The mobile device network parameter selection system of claim 10, wherein the network parameter resources are stored in a memory location on the mobile device for later recall. 12. The mobile device network parameter selection system of claim 1, wherein the network parameter resources that are stored are obtained from the mobile device carrier network. 13. The mobile device network parameter selection system of claim 1, wherein the network parameter resources that are stored are obtained by querying friends who have traveled to a similar map location along a similar path as the mobile device. 14. The mobile device network parameter selection system of claim 1, wherein the network parameter resources that are stored are obtained by querying other network users who have traveled to a similar map location along a similar path as the mobile device. 15. The mobile device network parameter selection system of claim 1, wherein the step of allocating the network parameter resources of the mobile device utilizes information stored in a database on the mobile device. 16. The mobile device network parameter selection system of claim 3, wherein the location beacons are WiFi transmitters. 17. The mobile device network parameter selection system of claim 3, wherein the location beacons are wireless transmitters. 18. A mobile device bandwidth selection system, comprising the steps of: determining whether a mobile device has been inactive for a predetermined time period; determining whether the mobile device is in a local time zone between 12 am and 5 am, and if so, checking for updates; powering up functionality so that the mobile device can download and install the updates; and powering down the mobile device after downloading and installing the updates. 19. The mobile device bandwidth selection system of claim 18, wherein the updates are firmware updates. 20. The mobile device bandwidth selection system of claim 18, wherein the updates are application updates. 21. The mobile device bandwidth selection system of claim 18, wherein the updates are network parameter updates. 22. A mobile device network parameter selection system, comprising the steps of: detecting a type of network on which a mobile device is operating; determining if the mobile device is operating on a CDMA network, and if so, examining a calendar schedule of the mobile device for a destination and a map route to the destination, and recalling from a memory channel and sub-channel information for connecting the mobile device along the map route to the destination; determining if the mobile device is operating on a GSM network, and if so, examining the calendar schedule for the destination and the map route to the destination, and recalling from the memory a highest level of service for connecting the mobile device along the map route to the destination; determining if the mobile device is operating on a LTE network, and if so, examining the calendar schedule for the destination and the map route to the destination, and recalling from the memory the highest level of service for connecting the mobile device along the map route to the destination; and determining if the mobile device is operating on a new network operating standard, and if so, examining the calendar schedule for the destination and the map route to the destination, and recalling from the memory the highest level of service for connecting the mobile device along the map route to the destination.
A mobile device management system stores network parameters so that certain functionality can be disabled or placed in sleep mode to optimize and lengthen battery life. The mobile device analyzes its user calendar schedule to download navigation data and network parameters so that tasks such as downloading information and updates are performed during times that the mobile device is connected to lower cost network access such as WiFi networks. By performing tasks such as the downloading of information based on availability of low cost network resources, the battery life of the mobile device may be lengthened. By storing network parameters such as the location of dead zones and roaming zones, the constant pinging of the RF baseband chip can be disabled and only enabled when the mobile device knows it is close to an areas where the mobile device must switch networks, further reducing power consumption.1. A mobile device network parameter selection system, comprising the steps of: examining a user calendar schedule stored on a mobile device; determining map locations for events detected in the user calendar schedule; storing network parameter resources corresponding to the map locations for the events; allocating the network parameter resources of the mobile device; and configuring the functionality of the mobile device for minimized energy usage. 2. The mobile device network parameter selection system of claim 1, further comprising: generating an RF topographical map of network resources. 3. The mobile device network parameter selection system of claim 1, wherein the step of determining map locations is accomplished via location beacons. 4. The mobile device network parameter selection system of claim 1, wherein the step of configuring of the functionality of the mobile device is based on least cost routing. 5. The mobile device network parameter selection system of claim 1, wherein the step of configuring of the functionality of the mobile device factors in latency delays. 6. The mobile device network parameter selection system of claim 1, wherein the step of configuring the functionality of the mobile device optimizes available bandwidth. 7. The mobile device network parameter selection system of claim 1, wherein the step of configuring the functionality of the mobile device compares types of bandwidths. 8. The mobile device network parameter selection system of claim 1, wherein the step of configuring the functionality of the mobile device implements total throughput. 9. The mobile device network parameter selection system of claim 1, wherein the step of configuring the functionality of the mobile device implements data throttling. 10. The mobile device network parameter selection system of claim 1, wherein the step of storing network parameter resources occurs when the mobile device travels a path a first time. 11. The mobile device network parameter selection system of claim 10, wherein the network parameter resources are stored in a memory location on the mobile device for later recall. 12. The mobile device network parameter selection system of claim 1, wherein the network parameter resources that are stored are obtained from the mobile device carrier network. 13. The mobile device network parameter selection system of claim 1, wherein the network parameter resources that are stored are obtained by querying friends who have traveled to a similar map location along a similar path as the mobile device. 14. The mobile device network parameter selection system of claim 1, wherein the network parameter resources that are stored are obtained by querying other network users who have traveled to a similar map location along a similar path as the mobile device. 15. The mobile device network parameter selection system of claim 1, wherein the step of allocating the network parameter resources of the mobile device utilizes information stored in a database on the mobile device. 16. The mobile device network parameter selection system of claim 3, wherein the location beacons are WiFi transmitters. 17. The mobile device network parameter selection system of claim 3, wherein the location beacons are wireless transmitters. 18. A mobile device bandwidth selection system, comprising the steps of: determining whether a mobile device has been inactive for a predetermined time period; determining whether the mobile device is in a local time zone between 12 am and 5 am, and if so, checking for updates; powering up functionality so that the mobile device can download and install the updates; and powering down the mobile device after downloading and installing the updates. 19. The mobile device bandwidth selection system of claim 18, wherein the updates are firmware updates. 20. The mobile device bandwidth selection system of claim 18, wherein the updates are application updates. 21. The mobile device bandwidth selection system of claim 18, wherein the updates are network parameter updates. 22. A mobile device network parameter selection system, comprising the steps of: detecting a type of network on which a mobile device is operating; determining if the mobile device is operating on a CDMA network, and if so, examining a calendar schedule of the mobile device for a destination and a map route to the destination, and recalling from a memory channel and sub-channel information for connecting the mobile device along the map route to the destination; determining if the mobile device is operating on a GSM network, and if so, examining the calendar schedule for the destination and the map route to the destination, and recalling from the memory a highest level of service for connecting the mobile device along the map route to the destination; determining if the mobile device is operating on a LTE network, and if so, examining the calendar schedule for the destination and the map route to the destination, and recalling from the memory the highest level of service for connecting the mobile device along the map route to the destination; and determining if the mobile device is operating on a new network operating standard, and if so, examining the calendar schedule for the destination and the map route to the destination, and recalling from the memory the highest level of service for connecting the mobile device along the map route to the destination.
2,400
6,907
6,907
11,554,842
2,498
A method for coordinating a synchronous activity includes receiving an instruction from a first principal to send a tag request to a second principal to participate in an activity and sending the tag request to the second principal. After the tag request is received, it is determined whether the second principal is available to participate in the activity. When the second principal is available, a response is sent indicating that the second principal is available to participate in the activity and the first principal is notified that the second principal is available to participate in the activity after the response is received and it is determined that the first principal is available to receive the notification.
1. A method for coordinating a synchronous activity, the method comprising: receiving an instruction from a first principal to send a tag request to a second principal to participate in an activity, wherein at least one of the first and second principals is a human; sending the tag request to the second principal; determining whether the second principal is available to participate in the activity after the tag request is received; sending a response indicating the second principal is available to participate in the activity; and notifying the first principal that the second principal is available to participate in the activity after receiving the response and determining that the first principal is available to receive the notification. 2. The method of claim 1 further comprising generating the tag request by prompting the first principal to provide at least one request parameter that includes at least one of an identifier of the second principal, a time frame in which the activity is to be performed, a location of at least one of the first principal and the second principal for the activity, an urgency indicator, and a tag request expiration time. 3. The method of claim 2 wherein determining whether the second principal is available to participate in the activity comprises: determining whether the first principal is registered to submit the tag request to the second principal and rejecting the tag request when the first principal is not registered; and determining whether the tag request is valid when the first principal is registered. 4. The method of claim 3 wherein determining whether the tag request is valid includes: retrieving an activity rule designated by the second principal, wherein the activity rule defines circumstances under which the second principal will participate in the activity; determining whether any of the at least one request parameters in the tag request violate the activity rule; and concluding the tag request is valid when the at least one request parameters comply with the activity rule. 5. The method of claim 4 wherein determining whether the tag request is valid further includes: determining whether the first principal is qualified for each of the at least one request parameters based on the activity rule; and concluding the tag request is valid when the first principal is qualified. 6. The method of claim 3 further comprising: sending a message requesting the first principal to modify and resend the tag request when the tag request is invalid. 7. The method of claim 2 further comprising processing the tag request when the second principal is determined to be available to participate in the activity by: analyzing the tag request to determine whether each of the at least one request parameters is satisfied; and sending the response indicating the second principal is available to participate in the activity when each of the at least one request parameters is satisfied. 8. The method of claim 2 wherein the activity is a phone conversation and the method further comprises: attempting a phone call from the first principal to the second principal; and determining whether the first principal wants to generate the tag request when the attempted phone call is unsuccessful. 9. The method of claim 1 further comprising placing the tag request in a request list for the second principal when the second principal is not available to participate in the activity. 10. The method of claim 9 further comprising referring to the request list when the second principal is available to participate in the activity and processing the tag request in the request list. 11. The method of claim 9 wherein the request list comprises a plurality of tag requests and the method further comprises: calculating a priority rating for the tag request based on the at least one request parameters; and sorting the plurality of tag requests in descending order according to their respective priority ratings. 12. The method of claim 11 wherein the activity is a phone conversation and the method further comprises: initiating by the first principal a phone call to the second principal when the first principal receives the notification that the second principal is available to participate in a phone conversation; and modifying the priority rating of the tag request based on whether the second principal agrees to participate in the phone conversation. 13. The method of claim 1 further comprising: receiving an indication from the first principal to start the activity after the notification is received; determining whether a time period between receiving the indication and sending the response is greater than a predetermined time delay; determining whether the first principal wants to generate another tag request when the time period exceeds the predetermined time delay; and initiating the activity when the time period is within the predetermined time delay. 14. A computer readable medium containing program instructions for coordinating a synchronous activity, the computer readable medium comprising program instructions for: receiving an instruction from a first principal to send a tag request to a second principal to participate in an activity, wherein at least one of the first and second principals is a human; sending the tag request to the second principal; determining whether the second principal is available to participate in the activity after the tag request is received; sending a response indicating the second principal is available to participate in the activity; and notifying the first principal that the second principal is available to participate in the activity after receiving the response and determining that the first principal is available to receive the notification. 15. The computer readable medium of claim 13 further comprising generating the tag request by prompting the first principal to provide at least one request parameter that includes at least one of an identifier of the second principal, a time frame in which the activity is to be performed, a location of at least one of the first principal and the second principal for the activity, an urgency indicator, and a tag request expiration time. 16. The computer readable medium of claim 14 wherein the instructions for determining whether the second principal is available to participate in the activity further comprise instructions for: determining whether the first principal is registered to submit the tag request to the second principal and rejecting the tag request when the first principal is not registered; and determining whether the tag request is valid when the first principal is registered. 17. The computer readable medium of claim 15 wherein the instructions for determining whether the tag request is valid include: retrieving an activity rule designated by the second principal, wherein the activity rule defines circumstances under which the second principal will participate in the activity; determining whether any of the at least one request parameters in the tag request violate the activity rule; and concluding the tag request is valid when the at least one request parameters comply with the activity rule. 18. The computer readable medium of claim 16 wherein the instructions for determining whether the tag request is valid further include: determining whether the first principal is qualified for each of the at least one request parameters based on the activity rule; and concluding the tag request is valid when the first principal is qualified. 19. The computer readable medium of claim 15 further comprising instructions for: sending a message requesting the first principal to modify and resend the tag request when the tag request is invalid. 20. The computer readable medium of claim 15 further comprising instructions for processing the tag request when the second principal is determined to be available to participate in the activity, the processing instructions including instructions for: analyzing the tag request to determine whether each of the at least one request parameters is satisfied; and sending the response indicating the second principal is available to participate in the activity when each of the at least one request parameters is satisfied. 21. The computer readable medium of claim 15 wherein the activity is a phone conversation and the computer readable medium further comprises instructions for: attempting a phone call from the first principal to the second principal; and determining whether the first principal wants to generate the tag request when the attempted phone call is unsuccessful. 22. The computer readable medium of claim 14 further comprising instructions for placing the tag request in a request list for the second principal when the second principal is not available to participate in the activity. 23. The computer readable medium of claim 22 further comprising instructions for referring to the request list when the second principal is available to participate in the activity and processing the tag request in the request list. 24. The computer readable medium of claim 22 wherein the request list comprises a plurality of tag requests and the computer readable medium further comprises instructions for: calculating a priority rating for the tag request based on the at least one request parameters; and sorting the plurality of tag requests in descending order according to their respective priority ratings. 25. The computer readable medium of claim 24 wherein the activity is a phone conversation and the computer readable medium further comprises instructions for: initiating by the first principal a phone call to the second principal when the first principal receives the notification that the second principal is available to participate in a phone conversation; and modifying the priority rating of the tag request based on whether the second principal agrees to participate in the phone conversation. 26. The computer readable medium of claim 14 further comprising instructions for: receiving an indication from the first principal to start the activity after the notification is received; determining whether a time period between receiving the indication and sending the response is greater than a predetermined time delay; determining whether the first principal wants to generate another tag request when the time period exceeds the predetermined time delay; and initiating the activity when the time period is within the predetermined time delay. 27. A system for coordinating a synchronous activity comprising: means for receiving an instruction from a first principal to send a tag request to a second principal to participate in an activity, wherein at least one of the first and second principals is a human; means for sending the tag request to the second principal; means for determining whether the second principal is available to participate in the activity after the tag request is received; means for sending a response indicating the second principal is available to participate in the activity; and means for notifying the first principal that the second principal is available to participate in the activity after receiving the response and determining the first principal is available to receive the notification. 28. A system for coordinating a synchronous activity, the system communicatively coupled via a network to first and second communication devices associated with respective first and second principals, wherein at least one of the first and second principals is a human, the system comprising: a first assistant component associated with the first principal for receiving an instruction from the first communication device to send a tag request to the second principal to participate in an activity; and a second assistant component associated with the second principal configured to receive the tag request from the first assistant component, to determine whether the second principal is available to participate in the activity via the second communication device, and to send a response to the first assistant component when the second assistant component determines that the second principal is available to participate in the activity; wherein the first assistant component is further configured to notify the first principal that the second principal is available to participate in the activity after the first assistant component receives the response from the second assistant component and determines that the first principal is available to receive the notification via the first communication device. 29. The system of claim 28 further comprising: a first agent component associated with the first principal; and a second agent component associated with the second principal; wherein each of the first and second agent components are configured to monitor the respective first and second principal's availability to receive notifications and to participate in an activity using the first and second communication devices respectively. 30. The system of claim 29 wherein the first and second communication devices include the first and second agent components, respectively. 31. The system of claim 29 wherein one of the first agent component and the first assistant component is configured to generate a tag request by prompting the first principal to provide at least one request parameter that includes at least one of an identifier of the second principal, a time frame in which the activity is to be performed, a location of at least one of the first principal and the second principal for the activity, an urgency indicator, and a tag request expiration time. 32. The system of claim 31 wherein before determining whether the second principal is available to participate in the activity the second assistant component is further configured to determine whether the first principal is registered to submit the tag request to the second principal and to reject the tag request when the first principal is not registered, and to determine whether the tag request is valid when the first principal is registered. 33. The system of claim 32 wherein the second assistant component is configured to determine whether the tag request is valid by retrieving an activity rule designated by the second principal, wherein the activity rule defines circumstances under which the second principal will participate in the activity, determining whether any of the at least one request parameters in the tag request violate the activity rule, and concluding the tag request is valid when the at least one request parameters comply with the activity rule. 34. The system of claim 33 wherein the second assistant component is configured to determine whether the tag request is valid by determining whether the first principal is qualified for each of the at least one request parameters based on the activity rule, and concluding the tag request is valid when the first principal is qualified. 35. The system of claim 32 wherein the second assistant component is configured to send a message to the first assistant component requesting the first principal to modify and resend the tag request when the tag request is invalid. 36. The system of claim 31 wherein when the second assistant component determines that the second principal is available to participate in the activity, the second assistant component is further configured to process the tag request by analyzing the tag request to determine whether each of the at least one request parameters is satisfied, and sending the response to the first assistant component indicating the second principal is available to participate in the activity when each of the at least one request parameters is satisfied. 37. The system of claim 31 wherein the first and second communication devices are phones and the activity is a phone conversation, and wherein one of the first agent component and the first assistant component is configured to determine whether the first principal wants to generate a tag request when an attempted phone call to the second principal is unsuccessful. 38. The system of claim 28 wherein the second assistant component is further configured to place the tag request in a request list for the second principal when the second principal is not available to participate in the activity. 39. The system of claim 38 wherein the second assistant component is further configured to refer to the request list when the second principal is available to participate in the activity and to process the tag request in the request list. 40. The system of claim 38 wherein the request list comprises a plurality of tag requests and the second assistant component is further configured to calculate a priority rating for the tag request based on the at least one request parameters, and to sort the plurality of tag requests in descending order according to their respective priority ratings. 41. The system of claim 40 wherein the first and second communication devices are phones and the activity is a phone conversation, and wherein the second assistant component is further configured to modify the priority rating of the tag request based on whether the second principal agrees to participate in the phone conversation initiated by the first principal when the first principal receives the notification that the second principal is available to participate in a phone conversation. 42. The system of claim 28 wherein the second assistant component is configured to receive an indication from the first principal to start the activity after the notification is received, to determine whether a time period between receiving the indication and sending the response is greater than a predetermined time delay, to determine whether the first principal wants to generate another tag request when the time period exceeds the predetermined time delay, and to initiate the activity with the second principal when the time period is within the predetermined time delay.
A method for coordinating a synchronous activity includes receiving an instruction from a first principal to send a tag request to a second principal to participate in an activity and sending the tag request to the second principal. After the tag request is received, it is determined whether the second principal is available to participate in the activity. When the second principal is available, a response is sent indicating that the second principal is available to participate in the activity and the first principal is notified that the second principal is available to participate in the activity after the response is received and it is determined that the first principal is available to receive the notification.1. A method for coordinating a synchronous activity, the method comprising: receiving an instruction from a first principal to send a tag request to a second principal to participate in an activity, wherein at least one of the first and second principals is a human; sending the tag request to the second principal; determining whether the second principal is available to participate in the activity after the tag request is received; sending a response indicating the second principal is available to participate in the activity; and notifying the first principal that the second principal is available to participate in the activity after receiving the response and determining that the first principal is available to receive the notification. 2. The method of claim 1 further comprising generating the tag request by prompting the first principal to provide at least one request parameter that includes at least one of an identifier of the second principal, a time frame in which the activity is to be performed, a location of at least one of the first principal and the second principal for the activity, an urgency indicator, and a tag request expiration time. 3. The method of claim 2 wherein determining whether the second principal is available to participate in the activity comprises: determining whether the first principal is registered to submit the tag request to the second principal and rejecting the tag request when the first principal is not registered; and determining whether the tag request is valid when the first principal is registered. 4. The method of claim 3 wherein determining whether the tag request is valid includes: retrieving an activity rule designated by the second principal, wherein the activity rule defines circumstances under which the second principal will participate in the activity; determining whether any of the at least one request parameters in the tag request violate the activity rule; and concluding the tag request is valid when the at least one request parameters comply with the activity rule. 5. The method of claim 4 wherein determining whether the tag request is valid further includes: determining whether the first principal is qualified for each of the at least one request parameters based on the activity rule; and concluding the tag request is valid when the first principal is qualified. 6. The method of claim 3 further comprising: sending a message requesting the first principal to modify and resend the tag request when the tag request is invalid. 7. The method of claim 2 further comprising processing the tag request when the second principal is determined to be available to participate in the activity by: analyzing the tag request to determine whether each of the at least one request parameters is satisfied; and sending the response indicating the second principal is available to participate in the activity when each of the at least one request parameters is satisfied. 8. The method of claim 2 wherein the activity is a phone conversation and the method further comprises: attempting a phone call from the first principal to the second principal; and determining whether the first principal wants to generate the tag request when the attempted phone call is unsuccessful. 9. The method of claim 1 further comprising placing the tag request in a request list for the second principal when the second principal is not available to participate in the activity. 10. The method of claim 9 further comprising referring to the request list when the second principal is available to participate in the activity and processing the tag request in the request list. 11. The method of claim 9 wherein the request list comprises a plurality of tag requests and the method further comprises: calculating a priority rating for the tag request based on the at least one request parameters; and sorting the plurality of tag requests in descending order according to their respective priority ratings. 12. The method of claim 11 wherein the activity is a phone conversation and the method further comprises: initiating by the first principal a phone call to the second principal when the first principal receives the notification that the second principal is available to participate in a phone conversation; and modifying the priority rating of the tag request based on whether the second principal agrees to participate in the phone conversation. 13. The method of claim 1 further comprising: receiving an indication from the first principal to start the activity after the notification is received; determining whether a time period between receiving the indication and sending the response is greater than a predetermined time delay; determining whether the first principal wants to generate another tag request when the time period exceeds the predetermined time delay; and initiating the activity when the time period is within the predetermined time delay. 14. A computer readable medium containing program instructions for coordinating a synchronous activity, the computer readable medium comprising program instructions for: receiving an instruction from a first principal to send a tag request to a second principal to participate in an activity, wherein at least one of the first and second principals is a human; sending the tag request to the second principal; determining whether the second principal is available to participate in the activity after the tag request is received; sending a response indicating the second principal is available to participate in the activity; and notifying the first principal that the second principal is available to participate in the activity after receiving the response and determining that the first principal is available to receive the notification. 15. The computer readable medium of claim 13 further comprising generating the tag request by prompting the first principal to provide at least one request parameter that includes at least one of an identifier of the second principal, a time frame in which the activity is to be performed, a location of at least one of the first principal and the second principal for the activity, an urgency indicator, and a tag request expiration time. 16. The computer readable medium of claim 14 wherein the instructions for determining whether the second principal is available to participate in the activity further comprise instructions for: determining whether the first principal is registered to submit the tag request to the second principal and rejecting the tag request when the first principal is not registered; and determining whether the tag request is valid when the first principal is registered. 17. The computer readable medium of claim 15 wherein the instructions for determining whether the tag request is valid include: retrieving an activity rule designated by the second principal, wherein the activity rule defines circumstances under which the second principal will participate in the activity; determining whether any of the at least one request parameters in the tag request violate the activity rule; and concluding the tag request is valid when the at least one request parameters comply with the activity rule. 18. The computer readable medium of claim 16 wherein the instructions for determining whether the tag request is valid further include: determining whether the first principal is qualified for each of the at least one request parameters based on the activity rule; and concluding the tag request is valid when the first principal is qualified. 19. The computer readable medium of claim 15 further comprising instructions for: sending a message requesting the first principal to modify and resend the tag request when the tag request is invalid. 20. The computer readable medium of claim 15 further comprising instructions for processing the tag request when the second principal is determined to be available to participate in the activity, the processing instructions including instructions for: analyzing the tag request to determine whether each of the at least one request parameters is satisfied; and sending the response indicating the second principal is available to participate in the activity when each of the at least one request parameters is satisfied. 21. The computer readable medium of claim 15 wherein the activity is a phone conversation and the computer readable medium further comprises instructions for: attempting a phone call from the first principal to the second principal; and determining whether the first principal wants to generate the tag request when the attempted phone call is unsuccessful. 22. The computer readable medium of claim 14 further comprising instructions for placing the tag request in a request list for the second principal when the second principal is not available to participate in the activity. 23. The computer readable medium of claim 22 further comprising instructions for referring to the request list when the second principal is available to participate in the activity and processing the tag request in the request list. 24. The computer readable medium of claim 22 wherein the request list comprises a plurality of tag requests and the computer readable medium further comprises instructions for: calculating a priority rating for the tag request based on the at least one request parameters; and sorting the plurality of tag requests in descending order according to their respective priority ratings. 25. The computer readable medium of claim 24 wherein the activity is a phone conversation and the computer readable medium further comprises instructions for: initiating by the first principal a phone call to the second principal when the first principal receives the notification that the second principal is available to participate in a phone conversation; and modifying the priority rating of the tag request based on whether the second principal agrees to participate in the phone conversation. 26. The computer readable medium of claim 14 further comprising instructions for: receiving an indication from the first principal to start the activity after the notification is received; determining whether a time period between receiving the indication and sending the response is greater than a predetermined time delay; determining whether the first principal wants to generate another tag request when the time period exceeds the predetermined time delay; and initiating the activity when the time period is within the predetermined time delay. 27. A system for coordinating a synchronous activity comprising: means for receiving an instruction from a first principal to send a tag request to a second principal to participate in an activity, wherein at least one of the first and second principals is a human; means for sending the tag request to the second principal; means for determining whether the second principal is available to participate in the activity after the tag request is received; means for sending a response indicating the second principal is available to participate in the activity; and means for notifying the first principal that the second principal is available to participate in the activity after receiving the response and determining the first principal is available to receive the notification. 28. A system for coordinating a synchronous activity, the system communicatively coupled via a network to first and second communication devices associated with respective first and second principals, wherein at least one of the first and second principals is a human, the system comprising: a first assistant component associated with the first principal for receiving an instruction from the first communication device to send a tag request to the second principal to participate in an activity; and a second assistant component associated with the second principal configured to receive the tag request from the first assistant component, to determine whether the second principal is available to participate in the activity via the second communication device, and to send a response to the first assistant component when the second assistant component determines that the second principal is available to participate in the activity; wherein the first assistant component is further configured to notify the first principal that the second principal is available to participate in the activity after the first assistant component receives the response from the second assistant component and determines that the first principal is available to receive the notification via the first communication device. 29. The system of claim 28 further comprising: a first agent component associated with the first principal; and a second agent component associated with the second principal; wherein each of the first and second agent components are configured to monitor the respective first and second principal's availability to receive notifications and to participate in an activity using the first and second communication devices respectively. 30. The system of claim 29 wherein the first and second communication devices include the first and second agent components, respectively. 31. The system of claim 29 wherein one of the first agent component and the first assistant component is configured to generate a tag request by prompting the first principal to provide at least one request parameter that includes at least one of an identifier of the second principal, a time frame in which the activity is to be performed, a location of at least one of the first principal and the second principal for the activity, an urgency indicator, and a tag request expiration time. 32. The system of claim 31 wherein before determining whether the second principal is available to participate in the activity the second assistant component is further configured to determine whether the first principal is registered to submit the tag request to the second principal and to reject the tag request when the first principal is not registered, and to determine whether the tag request is valid when the first principal is registered. 33. The system of claim 32 wherein the second assistant component is configured to determine whether the tag request is valid by retrieving an activity rule designated by the second principal, wherein the activity rule defines circumstances under which the second principal will participate in the activity, determining whether any of the at least one request parameters in the tag request violate the activity rule, and concluding the tag request is valid when the at least one request parameters comply with the activity rule. 34. The system of claim 33 wherein the second assistant component is configured to determine whether the tag request is valid by determining whether the first principal is qualified for each of the at least one request parameters based on the activity rule, and concluding the tag request is valid when the first principal is qualified. 35. The system of claim 32 wherein the second assistant component is configured to send a message to the first assistant component requesting the first principal to modify and resend the tag request when the tag request is invalid. 36. The system of claim 31 wherein when the second assistant component determines that the second principal is available to participate in the activity, the second assistant component is further configured to process the tag request by analyzing the tag request to determine whether each of the at least one request parameters is satisfied, and sending the response to the first assistant component indicating the second principal is available to participate in the activity when each of the at least one request parameters is satisfied. 37. The system of claim 31 wherein the first and second communication devices are phones and the activity is a phone conversation, and wherein one of the first agent component and the first assistant component is configured to determine whether the first principal wants to generate a tag request when an attempted phone call to the second principal is unsuccessful. 38. The system of claim 28 wherein the second assistant component is further configured to place the tag request in a request list for the second principal when the second principal is not available to participate in the activity. 39. The system of claim 38 wherein the second assistant component is further configured to refer to the request list when the second principal is available to participate in the activity and to process the tag request in the request list. 40. The system of claim 38 wherein the request list comprises a plurality of tag requests and the second assistant component is further configured to calculate a priority rating for the tag request based on the at least one request parameters, and to sort the plurality of tag requests in descending order according to their respective priority ratings. 41. The system of claim 40 wherein the first and second communication devices are phones and the activity is a phone conversation, and wherein the second assistant component is further configured to modify the priority rating of the tag request based on whether the second principal agrees to participate in the phone conversation initiated by the first principal when the first principal receives the notification that the second principal is available to participate in a phone conversation. 42. The system of claim 28 wherein the second assistant component is configured to receive an indication from the first principal to start the activity after the notification is received, to determine whether a time period between receiving the indication and sending the response is greater than a predetermined time delay, to determine whether the first principal wants to generate another tag request when the time period exceeds the predetermined time delay, and to initiate the activity with the second principal when the time period is within the predetermined time delay.
2,400
6,908
6,908
13,620,647
2,439
A third-party can subscribe to one or more electronic message group lists without joining the group lists by creating a trust relationship between the subscriber and a group list member. In particular, the subscriber can send a trust indicator to the group member, who can then determine whether to accept the trust indicator for all or specific groups that are associated with the group member, as appropriate. In at least one embodiment, the group member can send a trust indicator acceptance message to the subscriber that identifies the group member, and any or all group lists associated with the group member. The subscriber can then receive messages directed to the trusted group member or group lists, and can send group messages to the group lists subject to a receive setting associated with the group lists or group members of the group lists.
1. A method, comprising: establishing, using at least one processor, a group that includes a plurality of group members, wherein membership in the group establishes a first trust level among the plurality of group members that enables each of the plurality of group members to send and/or receive group messages without a trust challenge; establishing a second trust relationship between a subscriber that is not one of the plurality of group members and the group list; and based on the second trust relationship, performing one or both of: sending one or more group messages sent by a group member to the subscriber; or sending one or more messages sent by the subscriber to one or more of the plurality of group members. 2. The method of claim 1, wherein establishing the second trust relationship between the subscriber and the group list comprises establishing the second trust relationship between the subscriber and at least one of the plurality of group members. 3. The method of claim 2, wherein the at least one of the plurality of group members is a member of a plurality of groups, and wherein establishing the second trust relationship between the subscriber and the at least one of the plurality of group members comprises establishing a limited trust relationship that establishes trust between the subscriber and less than all of the plurality of groups. 4. The method of claim 1, wherein the first trust level enabling each of the plurality of group members to send and/or receive group messages includes enabling each of the plurality of group members to send and/or receive messages to or from the group generally. 5. The method of claim 4, wherein sending and/or receiving messages to or from the group generally comprises sending and/or receiving messages to or from a group address that is associated with the group. 6. The method of claim 1, wherein the first trust level enabling each of the plurality of group members to send and/or receive group messages includes enabling each of the plurality of group members to send and/or receive messages to or from others of the plurality of group members. 7. The method of claim 1, wherein establishing the second trust relationship between the subscriber and the group list comprises verifying that a network address associated with the subscriber is one or both of valid or trusted. 8. The method of claim 1, wherein the group is associated with default subscriber receive privileges, and wherein the default subscriber receive privileges are applied to the second trust relationship. 9. The method of claim 1, wherein the group is associated with default subscriber accept privileges, and wherein the default subscriber accept privileges are applied to the second trust relationship. 10. The method of claim 1, wherein the group list comprises a first group list and wherein the subscriber comprises a second group list, and wherein establishing the second trust relationship comprises establishing a reciprocal trust relationship between the first group list and the second group list. 11. A computer program product comprising one or more non-transitory computer-readable storage media having stored thereon computer-executable instructions that, when executed by one or more processors of a computer system, cause the computer system to implement a method, comprising: establishing a group that includes a plurality of group members, wherein membership in the group establishes a first trust level among the plurality of group members that enables each of the plurality of group members to send and/or receive group messages without a trust challenge; establishing a second trust relationship between a subscriber that is not one of the plurality of group members and the group list; and based on the second trust relationship, performing one or both of: sending one or more group messages sent by a group member to the subscriber; or sending one or more messages sent by the subscriber to one or more of the plurality of group members. 12. The computer program product of claim 11, wherein establishing the second trust relationship between the subscriber and the group list comprises establishing the second trust relationship between the subscriber and at least one of the plurality of group members. 13. The computer program product of claim 12, wherein the at least one of the plurality of group members is a member of a plurality of groups, and wherein establishing the second trust relationship between the subscriber and the at least one of the plurality of group members comprises establishing a limited trust relationship that establishes trust between the subscriber and less than all of the plurality of groups. 14. The computer program product of claim 11, wherein the first trust level enabling each of the plurality of group members to send and/or receive group messages includes enabling each of the plurality of group members to send and/or receive messages to or from the group generally. 15. The computer program product of claim 11, wherein the first trust level enabling each of the plurality of group members to send and/or receive group messages includes enabling each of the plurality of group members to send and/or receive messages to or from others of the plurality of group members. 16. The computer program product of claim 11, wherein establishing the second trust relationship between the subscriber and the group list comprises verifying that a network address associated with the subscriber is one or both of valid or trusted. 17. The computer program product of claim 11, wherein the group is associated with default subscriber receive privileges, and wherein the default subscriber receive privileges are applied to the second trust relationship. 18. The computer program product of claim 11, wherein the group is associated with default subscriber accept privileges, and wherein the default subscriber accept privileges are applied to the second trust relationship. 19. The computer program product of claim 11, wherein the group list comprises a first group list and wherein the subscriber comprises a second group list, and wherein establishing the second trust relationship comprises establishing a reciprocal trust relationship between the first group list and the second group list. 20. A computer system, comprising: one or more processors; and one or more computer-readable media having stored thereon computer-executable instructions that, when executed by the one or more processors, cause the computer system to implement a method, comprising: establishing a group that includes a plurality of group members, wherein membership in the group establishes a first trust level among the plurality of group members that enables each of the plurality of group members to send and/or receive group messages without a trust challenge; establishing a second trust relationship between a subscriber that is not one of the plurality of group members and the group list; and based on the second trust relationship, performing one or both of: sending one or more group messages sent by a group member to the subscriber; or sending one or more messages sent by the subscriber to one or more of the plurality of group members.
A third-party can subscribe to one or more electronic message group lists without joining the group lists by creating a trust relationship between the subscriber and a group list member. In particular, the subscriber can send a trust indicator to the group member, who can then determine whether to accept the trust indicator for all or specific groups that are associated with the group member, as appropriate. In at least one embodiment, the group member can send a trust indicator acceptance message to the subscriber that identifies the group member, and any or all group lists associated with the group member. The subscriber can then receive messages directed to the trusted group member or group lists, and can send group messages to the group lists subject to a receive setting associated with the group lists or group members of the group lists.1. A method, comprising: establishing, using at least one processor, a group that includes a plurality of group members, wherein membership in the group establishes a first trust level among the plurality of group members that enables each of the plurality of group members to send and/or receive group messages without a trust challenge; establishing a second trust relationship between a subscriber that is not one of the plurality of group members and the group list; and based on the second trust relationship, performing one or both of: sending one or more group messages sent by a group member to the subscriber; or sending one or more messages sent by the subscriber to one or more of the plurality of group members. 2. The method of claim 1, wherein establishing the second trust relationship between the subscriber and the group list comprises establishing the second trust relationship between the subscriber and at least one of the plurality of group members. 3. The method of claim 2, wherein the at least one of the plurality of group members is a member of a plurality of groups, and wherein establishing the second trust relationship between the subscriber and the at least one of the plurality of group members comprises establishing a limited trust relationship that establishes trust between the subscriber and less than all of the plurality of groups. 4. The method of claim 1, wherein the first trust level enabling each of the plurality of group members to send and/or receive group messages includes enabling each of the plurality of group members to send and/or receive messages to or from the group generally. 5. The method of claim 4, wherein sending and/or receiving messages to or from the group generally comprises sending and/or receiving messages to or from a group address that is associated with the group. 6. The method of claim 1, wherein the first trust level enabling each of the plurality of group members to send and/or receive group messages includes enabling each of the plurality of group members to send and/or receive messages to or from others of the plurality of group members. 7. The method of claim 1, wherein establishing the second trust relationship between the subscriber and the group list comprises verifying that a network address associated with the subscriber is one or both of valid or trusted. 8. The method of claim 1, wherein the group is associated with default subscriber receive privileges, and wherein the default subscriber receive privileges are applied to the second trust relationship. 9. The method of claim 1, wherein the group is associated with default subscriber accept privileges, and wherein the default subscriber accept privileges are applied to the second trust relationship. 10. The method of claim 1, wherein the group list comprises a first group list and wherein the subscriber comprises a second group list, and wherein establishing the second trust relationship comprises establishing a reciprocal trust relationship between the first group list and the second group list. 11. A computer program product comprising one or more non-transitory computer-readable storage media having stored thereon computer-executable instructions that, when executed by one or more processors of a computer system, cause the computer system to implement a method, comprising: establishing a group that includes a plurality of group members, wherein membership in the group establishes a first trust level among the plurality of group members that enables each of the plurality of group members to send and/or receive group messages without a trust challenge; establishing a second trust relationship between a subscriber that is not one of the plurality of group members and the group list; and based on the second trust relationship, performing one or both of: sending one or more group messages sent by a group member to the subscriber; or sending one or more messages sent by the subscriber to one or more of the plurality of group members. 12. The computer program product of claim 11, wherein establishing the second trust relationship between the subscriber and the group list comprises establishing the second trust relationship between the subscriber and at least one of the plurality of group members. 13. The computer program product of claim 12, wherein the at least one of the plurality of group members is a member of a plurality of groups, and wherein establishing the second trust relationship between the subscriber and the at least one of the plurality of group members comprises establishing a limited trust relationship that establishes trust between the subscriber and less than all of the plurality of groups. 14. The computer program product of claim 11, wherein the first trust level enabling each of the plurality of group members to send and/or receive group messages includes enabling each of the plurality of group members to send and/or receive messages to or from the group generally. 15. The computer program product of claim 11, wherein the first trust level enabling each of the plurality of group members to send and/or receive group messages includes enabling each of the plurality of group members to send and/or receive messages to or from others of the plurality of group members. 16. The computer program product of claim 11, wherein establishing the second trust relationship between the subscriber and the group list comprises verifying that a network address associated with the subscriber is one or both of valid or trusted. 17. The computer program product of claim 11, wherein the group is associated with default subscriber receive privileges, and wherein the default subscriber receive privileges are applied to the second trust relationship. 18. The computer program product of claim 11, wherein the group is associated with default subscriber accept privileges, and wherein the default subscriber accept privileges are applied to the second trust relationship. 19. The computer program product of claim 11, wherein the group list comprises a first group list and wherein the subscriber comprises a second group list, and wherein establishing the second trust relationship comprises establishing a reciprocal trust relationship between the first group list and the second group list. 20. A computer system, comprising: one or more processors; and one or more computer-readable media having stored thereon computer-executable instructions that, when executed by the one or more processors, cause the computer system to implement a method, comprising: establishing a group that includes a plurality of group members, wherein membership in the group establishes a first trust level among the plurality of group members that enables each of the plurality of group members to send and/or receive group messages without a trust challenge; establishing a second trust relationship between a subscriber that is not one of the plurality of group members and the group list; and based on the second trust relationship, performing one or both of: sending one or more group messages sent by a group member to the subscriber; or sending one or more messages sent by the subscriber to one or more of the plurality of group members.
2,400
6,909
6,909
12,479,068
2,486
A video decoder system includes a video decoding engine, noise database, artifact estimator and post-processing unit. The video coder may generate recovered video from a data stream of coded video data, which may have visually-perceptible artifacts introduced as a byproduct of compression. The noise database may store a plurality of previously developed noise patches. The artifact estimator may estimate the location of coding artifacts present in the recovered video and select noise patches from the database to mask the artifacts and the post-processing unit may integrate the selected noise patches into the recovered video. In this manner, the video decoder may generate post-processed noise which may mask artifacts that otherwise would be generated by a video coding process.
1. A video decoder system, comprising: a video decoding engine to generate recovered video from a data stream of coded video data, a noise database storing a plurality of noise patches, and an artifact estimator to estimate a location of coding artifacts present in the recovered video and to select noise patches from the database to mask the artifacts, a post-processing unit to blend the selected noise patches into the recovered video. 2. The video decoder system of claim 1, wherein the artifact estimator estimates the location of coding artifacts based on a block's coding type. 3. The video decoder system of claim 1, wherein the artifact estimator estimates the location of coding artifacts based on a size of a display device present at the video decoder system. 4. The video decoder system of claim 1, wherein the artifact estimator estimates the location of coding artifacts based on processing resources available at the video decoder system. 5. The video decoder system of claim 1, wherein noise patches have a size that matches a size of pixel blocks from the coded video data. 6. The video decoder system of claim 1, wherein the noise database stores noise patches as sets comprising: a base noise patch having a base size and amplitude, a spatially scaled variant of the base noise patch, and an amplitude scaled variant of the base noise patch. 7. The video decoder system of claim 1, wherein the post-processing unit scales the selected noise patches prior to integrating them into the recovered video. 8. The video decoder system of claim 1, further comprising: a channel buffer to receive the data stream from a channel, a demultiplexer to route coded video data from the channel buffer to the video decoding engine and to route data defining new noise patches to the noise database. 9. The video decoder system of claim 1, wherein if the channel data includes an express identifier of a noise patch with coded data, the artifact estimator retrieves the identified noise patch for post-processing operations. 10. A video decoder system, comprising: a video decoding engine to generate recovered video from a data stream of coded video data, a noise database storing a plurality of noise patches, and a noise mapping system to retrieve noise patches from the database based on data present in the data stream, the data identifying a patch and a type of scaling to be applied, a post-processing unit to merge the retrieve noise patches and integrate them into the recovered video according to the identified scaling. 11. The video decoder system of claim 10, wherein the patch and scaling identifications are provided in the data stream by an encoder the noise database stores noise patches that replicate noise patches at the encoder. 12. The video decoder system of claim 10, further comprising: a channel buffer to receive the data stream from a channel, a demultiplexer to route coded video data from the channel buffer to the video decoding engine and to route noise patch data to the noise database. 13. A video decoding method, comprising: decoding coded video data to generate recovered video data, estimating a location of coding artifacts present in the recovered video, selecting previously-stored noise patches from memory to mask the artifacts, and merging the selected noise patches into the recovered video. 14. A video decoding method comprising: decoding coded video data to generate recovered video data, based on a patch identifier provided in a received data stream, selecting previously-stored noise patches from memory, scaling the retrieved noise patches according to a scaling identifier provided in the received data stream, and merging the selected noise patches into the recovered video. 15. The video decoding method of claim 14, wherein the scaling is spatial scaling of the retrieved noise patch. 16. The video decoding method of claim 14, wherein the scaling is amplitude scaling of the retrieved noise patch. 17. A video decoding method, comprising: responsive to an identifier in a received data stream, decoding AC coefficients of coded video data to generate a noise patch, and storing the noise patch in a noise database, the noise database to be used for incorporating noise in subsequently-decoded video data during post-processing operations. 18. The video decoding method of claim 17 wherein the decoding excludes DC coefficients associated with the decoded AC coefficients. 19. The video decoding method of claim 17 further comprising, for later-received coded video data: decoding the later-received coded video data to generate recovered video data corresponding thereto, estimating a location of coding artifacts present in the recovered video, retrieving a stored noise patch from memory, and merging the retrieved noise patch into the recovered video at a location corresponding to the estimated artifact. 20. The video decoding method of claim 17, further comprising, for later-received coded video data: decoding the later-received coded video data to generate recovered video data corresponding thereto, responsive to a patch identifier provided in a received data stream, retrieving the stored noise patch from memory, scaling the retrieved noise patch according to a scaling identifier provided in the received data stream, and merging the selected noise patch into the recovered video. 21. A video encoding system, comprising: a video coding engine to code source video data into a coded video data, a video decoder to decode the coded video data into recovered video data, an artifact estimator to identify locations of artifacts in the recovered video data, a noise database storing noise patches, and a patch selector to select stored noise patches that mask the artifacts when integrated with the recovered video data during a post-processing operation. 22. The video encoding system of claim 21, wherein the noise database stores noise patches as sets comprising: a base noise patch having a base size and amplitude, a spatially scaled variant of the base noise patch, and an amplitude scaled variant of the base noise patch. 23. A method, performed at a video encoder, comprising: coding source video data into a coded video data, decoding the coded video data into recovered video data, emulating a noise patch derivation to be performed at a decoder, the emulating identifying a first noise patch of the local noise database that would be used by the decoder, comparing recovered video data generated according to the emulation with a source video data, determining whether the noise database includes noise patches other than the first noise patch that better mask the artifacts, if other noise patches are identified by the determining, transmitting an identifier of the other noise patches in a channel with the coded video data in which the artifacts are located. 24. The method of claim 23, further comprising, if the noise database stores no noise patches that adequately mask the artifacts, generating a new noise patch and transmitting new noise patch a channel with the coded video data.
A video decoder system includes a video decoding engine, noise database, artifact estimator and post-processing unit. The video coder may generate recovered video from a data stream of coded video data, which may have visually-perceptible artifacts introduced as a byproduct of compression. The noise database may store a plurality of previously developed noise patches. The artifact estimator may estimate the location of coding artifacts present in the recovered video and select noise patches from the database to mask the artifacts and the post-processing unit may integrate the selected noise patches into the recovered video. In this manner, the video decoder may generate post-processed noise which may mask artifacts that otherwise would be generated by a video coding process.1. A video decoder system, comprising: a video decoding engine to generate recovered video from a data stream of coded video data, a noise database storing a plurality of noise patches, and an artifact estimator to estimate a location of coding artifacts present in the recovered video and to select noise patches from the database to mask the artifacts, a post-processing unit to blend the selected noise patches into the recovered video. 2. The video decoder system of claim 1, wherein the artifact estimator estimates the location of coding artifacts based on a block's coding type. 3. The video decoder system of claim 1, wherein the artifact estimator estimates the location of coding artifacts based on a size of a display device present at the video decoder system. 4. The video decoder system of claim 1, wherein the artifact estimator estimates the location of coding artifacts based on processing resources available at the video decoder system. 5. The video decoder system of claim 1, wherein noise patches have a size that matches a size of pixel blocks from the coded video data. 6. The video decoder system of claim 1, wherein the noise database stores noise patches as sets comprising: a base noise patch having a base size and amplitude, a spatially scaled variant of the base noise patch, and an amplitude scaled variant of the base noise patch. 7. The video decoder system of claim 1, wherein the post-processing unit scales the selected noise patches prior to integrating them into the recovered video. 8. The video decoder system of claim 1, further comprising: a channel buffer to receive the data stream from a channel, a demultiplexer to route coded video data from the channel buffer to the video decoding engine and to route data defining new noise patches to the noise database. 9. The video decoder system of claim 1, wherein if the channel data includes an express identifier of a noise patch with coded data, the artifact estimator retrieves the identified noise patch for post-processing operations. 10. A video decoder system, comprising: a video decoding engine to generate recovered video from a data stream of coded video data, a noise database storing a plurality of noise patches, and a noise mapping system to retrieve noise patches from the database based on data present in the data stream, the data identifying a patch and a type of scaling to be applied, a post-processing unit to merge the retrieve noise patches and integrate them into the recovered video according to the identified scaling. 11. The video decoder system of claim 10, wherein the patch and scaling identifications are provided in the data stream by an encoder the noise database stores noise patches that replicate noise patches at the encoder. 12. The video decoder system of claim 10, further comprising: a channel buffer to receive the data stream from a channel, a demultiplexer to route coded video data from the channel buffer to the video decoding engine and to route noise patch data to the noise database. 13. A video decoding method, comprising: decoding coded video data to generate recovered video data, estimating a location of coding artifacts present in the recovered video, selecting previously-stored noise patches from memory to mask the artifacts, and merging the selected noise patches into the recovered video. 14. A video decoding method comprising: decoding coded video data to generate recovered video data, based on a patch identifier provided in a received data stream, selecting previously-stored noise patches from memory, scaling the retrieved noise patches according to a scaling identifier provided in the received data stream, and merging the selected noise patches into the recovered video. 15. The video decoding method of claim 14, wherein the scaling is spatial scaling of the retrieved noise patch. 16. The video decoding method of claim 14, wherein the scaling is amplitude scaling of the retrieved noise patch. 17. A video decoding method, comprising: responsive to an identifier in a received data stream, decoding AC coefficients of coded video data to generate a noise patch, and storing the noise patch in a noise database, the noise database to be used for incorporating noise in subsequently-decoded video data during post-processing operations. 18. The video decoding method of claim 17 wherein the decoding excludes DC coefficients associated with the decoded AC coefficients. 19. The video decoding method of claim 17 further comprising, for later-received coded video data: decoding the later-received coded video data to generate recovered video data corresponding thereto, estimating a location of coding artifacts present in the recovered video, retrieving a stored noise patch from memory, and merging the retrieved noise patch into the recovered video at a location corresponding to the estimated artifact. 20. The video decoding method of claim 17, further comprising, for later-received coded video data: decoding the later-received coded video data to generate recovered video data corresponding thereto, responsive to a patch identifier provided in a received data stream, retrieving the stored noise patch from memory, scaling the retrieved noise patch according to a scaling identifier provided in the received data stream, and merging the selected noise patch into the recovered video. 21. A video encoding system, comprising: a video coding engine to code source video data into a coded video data, a video decoder to decode the coded video data into recovered video data, an artifact estimator to identify locations of artifacts in the recovered video data, a noise database storing noise patches, and a patch selector to select stored noise patches that mask the artifacts when integrated with the recovered video data during a post-processing operation. 22. The video encoding system of claim 21, wherein the noise database stores noise patches as sets comprising: a base noise patch having a base size and amplitude, a spatially scaled variant of the base noise patch, and an amplitude scaled variant of the base noise patch. 23. A method, performed at a video encoder, comprising: coding source video data into a coded video data, decoding the coded video data into recovered video data, emulating a noise patch derivation to be performed at a decoder, the emulating identifying a first noise patch of the local noise database that would be used by the decoder, comparing recovered video data generated according to the emulation with a source video data, determining whether the noise database includes noise patches other than the first noise patch that better mask the artifacts, if other noise patches are identified by the determining, transmitting an identifier of the other noise patches in a channel with the coded video data in which the artifacts are located. 24. The method of claim 23, further comprising, if the noise database stores no noise patches that adequately mask the artifacts, generating a new noise patch and transmitting new noise patch a channel with the coded video data.
2,400
6,910
6,910
14,556,878
2,484
Higher-resolution imagery of an airport runway can be provided from the pilot's point of view. Pilot point of view images may be generated using images captured by higher-resolution ground-based cameras. The images from the ground-based cameras are fed to a point of view processor that generates the pilot point of view images using aircraft position information. The pilot point of view images are transmitted to a display on the aircraft.
1. An imaging system, comprising: a plurality of image capture devices, each device capturing a different view to create a plurality of different views; a point of view processor to create a vehicle operator point of view image based on vehicle position information and the plurality of different views; and a transmitter to transmit the vehicle operator point of view image. 2. The imaging system of claim 1, where the image capture devices are optical cameras. 3. The imaging system of claim 1, where the image capture devices are millimeter wave cameras. 4. The imaging system of claim 1, where the image capture devices are infrared cameras. 5. The imaging system of claim 1, wherein the point of view processor creates the vehicle operator point of view image using image selection information. 6. The imaging system of claim 1, wherein the point of view processor creates the vehicle operator point of view image using display position information. 7. The imaging system of claim 1, wherein the point of view processor creates the vehicle operator point of view image using a stored image. 8. An imaging method, comprising the steps of: using a plurality of image capture devices to create a plurality of different views; obtaining vehicle position information; and generating a vehicle operator point of view image based on vehicle position information and the plurality of different views. 9. The method of claim 8, wherein the vehicle position information comprises radar information. 10. The method of claim 8, wherein the operator point of view image is generated using display position information. 11. The method of claim 8, the vehicle operator point of view image is generated using selection information. 12. An imaging method, comprising the steps of: receiving in a vehicle, off vehicle transmitted vehicle operator point of view images; and displaying in the vehicle, received off vehicle transmitted vehicle operator point of view images. 13. The method of claim 12, wherein the step of receiving comprises receiving a plurality of off vehicle transmitted vehicle operator point of view image types. 14. The method of claim 12, further comprising the step of transmitting an image type selection. 15. The method of claim 12, wherein the step of displaying comprises displaying a combination of received off vehicle transmitted vehicle operator point of view images and at least one image from an on vehicle image capture device. 16. The method of claim 12, further comprising the step of transmitting wearable display position information, and wherein the step of displaying comprises displaying on a wearable display. 17. An imaging method, comprising the steps of: receiving in a vehicle, off vehicle transmitted images and image capture location information; generating an operator point of view image using vehicle position information and the off vehicle transmitted images and image capture location information; and displaying in the vehicle, the operator point of view image. 18. The method of claim 17, wherein the step of generating comprises using an image from an on vehicle image capture device. 19. The method of claim 17, further comprising the step of selecting a subset of the off vehicle transmitted images for use in generating the operator point of view image. 20. The method of claim 17, wherein the step of generating comprises using display location information.
Higher-resolution imagery of an airport runway can be provided from the pilot's point of view. Pilot point of view images may be generated using images captured by higher-resolution ground-based cameras. The images from the ground-based cameras are fed to a point of view processor that generates the pilot point of view images using aircraft position information. The pilot point of view images are transmitted to a display on the aircraft.1. An imaging system, comprising: a plurality of image capture devices, each device capturing a different view to create a plurality of different views; a point of view processor to create a vehicle operator point of view image based on vehicle position information and the plurality of different views; and a transmitter to transmit the vehicle operator point of view image. 2. The imaging system of claim 1, where the image capture devices are optical cameras. 3. The imaging system of claim 1, where the image capture devices are millimeter wave cameras. 4. The imaging system of claim 1, where the image capture devices are infrared cameras. 5. The imaging system of claim 1, wherein the point of view processor creates the vehicle operator point of view image using image selection information. 6. The imaging system of claim 1, wherein the point of view processor creates the vehicle operator point of view image using display position information. 7. The imaging system of claim 1, wherein the point of view processor creates the vehicle operator point of view image using a stored image. 8. An imaging method, comprising the steps of: using a plurality of image capture devices to create a plurality of different views; obtaining vehicle position information; and generating a vehicle operator point of view image based on vehicle position information and the plurality of different views. 9. The method of claim 8, wherein the vehicle position information comprises radar information. 10. The method of claim 8, wherein the operator point of view image is generated using display position information. 11. The method of claim 8, the vehicle operator point of view image is generated using selection information. 12. An imaging method, comprising the steps of: receiving in a vehicle, off vehicle transmitted vehicle operator point of view images; and displaying in the vehicle, received off vehicle transmitted vehicle operator point of view images. 13. The method of claim 12, wherein the step of receiving comprises receiving a plurality of off vehicle transmitted vehicle operator point of view image types. 14. The method of claim 12, further comprising the step of transmitting an image type selection. 15. The method of claim 12, wherein the step of displaying comprises displaying a combination of received off vehicle transmitted vehicle operator point of view images and at least one image from an on vehicle image capture device. 16. The method of claim 12, further comprising the step of transmitting wearable display position information, and wherein the step of displaying comprises displaying on a wearable display. 17. An imaging method, comprising the steps of: receiving in a vehicle, off vehicle transmitted images and image capture location information; generating an operator point of view image using vehicle position information and the off vehicle transmitted images and image capture location information; and displaying in the vehicle, the operator point of view image. 18. The method of claim 17, wherein the step of generating comprises using an image from an on vehicle image capture device. 19. The method of claim 17, further comprising the step of selecting a subset of the off vehicle transmitted images for use in generating the operator point of view image. 20. The method of claim 17, wherein the step of generating comprises using display location information.
2,400
6,911
6,911
12,674,755
2,465
The present invention proposes a method for scheduling resource in a packet network, a network element for exchanging signaling with user equipments and a user equipment, wherein user equipments communicate therebetween using the resource allocated by network elements, said communication comprises talk-spurt periods during which data packets are transmitted and silent periods during which silence descriptor packets are transmitted, said method for scheduling resource comprising: said network element allocates resource for said user equipment for communication; both said user equipment and said network element detect the presence of said silence descriptor packet; said user equipment stops using the allocated resource and said network element releases the allocated resource, when said silence descriptor packet is detected; said network element determines the end of the interval for transmitting said silence descriptor packet; said network element allocates new resource to said user equipment when said interval ends or when a request for allocating resource is received from said user equipment before the end of said interval.
1. A method for scheduling resource in a packet network, wherein user equipments communicate therebetween using the resource allocated by a network element, said communication comprises talk-spurt periods during which data packets are transmitted and silent periods during which silence descriptor packets are transmitted, the method comprising: said network element allocates resource for said user equipments for communication; both said user equipments and said network element detect the presence of said silence descriptor packet; said user equipments stop using the allocated resource and said network element releases the allocated resource when said silence descriptor packet is detected; said network element determines the end of the interval for transmitting said silence descriptor packet; said network element allocates new resource to said user equipment when said interval ends or when a request for allocating resource is received from said user equipment before the end of said interval. 2. The method according to claim 1, wherein said silence descriptor packet is transmitted once per 160 ms during said silent period, and said data packet is transmitted once per 20 ms during said talk-spurt period. 3. The method according to claim 1, wherein said network element determines the end of the interval by timing. 4. The method according to claim 1, wherein the period of said timing is 160 ms. 5. The method according to claim 1, further comprising said network element reallocating the released resource to other user equipments, when said other user equipments request said network element to allocate resource. 6. A network element for exchanging signaling with user equipments, wherein said user equipments communicate therebetween using the resource allocated by the network element, said communication is based on packet switching and comprises talk-spurt periods during which data packets are transmitted and silent periods during which silence descriptor packets are transmitted, the network element comprising: detection means for detecting the presence of said silence descriptor packet or said data packet when said user equipment is communicating; timer adapted to start timing when said silence descriptor packet is detected to determine the end of the interval for transmitting said silence descriptor packet; state transition control means for changing said network element from a talk-spurt state to a silent state when it detects said silence descriptor packet, or changing said network element from the silent state to the talk-spurt state when it detects said data packet. 7. The network element according to claim 6, wherein said silence descriptor packet is transmitted once per 160 ms during said silent period, and said data packet is transmitted once per 20 ms during said talk-spurt period. 8. The network element according to claim 6, wherein when said network element changes from said talk-spurt state to said silent state, it stops the resource scheduling grant for said user equipment, and said timer start timing; and when said network element changes from said silent state to said talk-spurt state, it allocates new resource for said user equipment. 9. The network element according to claim 6, wherein the period of said timing is 160 ms. 10. A user equipment, wherein said user equipment communicates with other user equipments using the resource allocated by network elements, said communication is based on packet switching and comprises talk-spurt periods during which data packets are transmitted and silent periods during which silence descriptor packets are transmitted, the user equipment comprising: detection means for detecting the presence of said silence descriptor packet or said data packet when said user equipment is communicating; state transition control means for changing said user equipment from a talk-spurt state to a silent state when it detects said silence descriptor packet, or changing said user equipment from the silent state to the talk-spurt state when it detects said data packet. 11. The user equipment according to claim 10, wherein said silence descriptor packet is transmitted once per 160 ms during said silent period, and said data packet is transmitted once per 20 ms during said talk-spurt period. 12. The user equipment according to claim 10, wherein when said user equipment changes from said talk-spurt state to said silent state, it stops using the resource allocated by said network element, and when said user equipment changes from said silent state to said talk-spurt state, it sends a request for allocating resource to said network element.
The present invention proposes a method for scheduling resource in a packet network, a network element for exchanging signaling with user equipments and a user equipment, wherein user equipments communicate therebetween using the resource allocated by network elements, said communication comprises talk-spurt periods during which data packets are transmitted and silent periods during which silence descriptor packets are transmitted, said method for scheduling resource comprising: said network element allocates resource for said user equipment for communication; both said user equipment and said network element detect the presence of said silence descriptor packet; said user equipment stops using the allocated resource and said network element releases the allocated resource, when said silence descriptor packet is detected; said network element determines the end of the interval for transmitting said silence descriptor packet; said network element allocates new resource to said user equipment when said interval ends or when a request for allocating resource is received from said user equipment before the end of said interval.1. A method for scheduling resource in a packet network, wherein user equipments communicate therebetween using the resource allocated by a network element, said communication comprises talk-spurt periods during which data packets are transmitted and silent periods during which silence descriptor packets are transmitted, the method comprising: said network element allocates resource for said user equipments for communication; both said user equipments and said network element detect the presence of said silence descriptor packet; said user equipments stop using the allocated resource and said network element releases the allocated resource when said silence descriptor packet is detected; said network element determines the end of the interval for transmitting said silence descriptor packet; said network element allocates new resource to said user equipment when said interval ends or when a request for allocating resource is received from said user equipment before the end of said interval. 2. The method according to claim 1, wherein said silence descriptor packet is transmitted once per 160 ms during said silent period, and said data packet is transmitted once per 20 ms during said talk-spurt period. 3. The method according to claim 1, wherein said network element determines the end of the interval by timing. 4. The method according to claim 1, wherein the period of said timing is 160 ms. 5. The method according to claim 1, further comprising said network element reallocating the released resource to other user equipments, when said other user equipments request said network element to allocate resource. 6. A network element for exchanging signaling with user equipments, wherein said user equipments communicate therebetween using the resource allocated by the network element, said communication is based on packet switching and comprises talk-spurt periods during which data packets are transmitted and silent periods during which silence descriptor packets are transmitted, the network element comprising: detection means for detecting the presence of said silence descriptor packet or said data packet when said user equipment is communicating; timer adapted to start timing when said silence descriptor packet is detected to determine the end of the interval for transmitting said silence descriptor packet; state transition control means for changing said network element from a talk-spurt state to a silent state when it detects said silence descriptor packet, or changing said network element from the silent state to the talk-spurt state when it detects said data packet. 7. The network element according to claim 6, wherein said silence descriptor packet is transmitted once per 160 ms during said silent period, and said data packet is transmitted once per 20 ms during said talk-spurt period. 8. The network element according to claim 6, wherein when said network element changes from said talk-spurt state to said silent state, it stops the resource scheduling grant for said user equipment, and said timer start timing; and when said network element changes from said silent state to said talk-spurt state, it allocates new resource for said user equipment. 9. The network element according to claim 6, wherein the period of said timing is 160 ms. 10. A user equipment, wherein said user equipment communicates with other user equipments using the resource allocated by network elements, said communication is based on packet switching and comprises talk-spurt periods during which data packets are transmitted and silent periods during which silence descriptor packets are transmitted, the user equipment comprising: detection means for detecting the presence of said silence descriptor packet or said data packet when said user equipment is communicating; state transition control means for changing said user equipment from a talk-spurt state to a silent state when it detects said silence descriptor packet, or changing said user equipment from the silent state to the talk-spurt state when it detects said data packet. 11. The user equipment according to claim 10, wherein said silence descriptor packet is transmitted once per 160 ms during said silent period, and said data packet is transmitted once per 20 ms during said talk-spurt period. 12. The user equipment according to claim 10, wherein when said user equipment changes from said talk-spurt state to said silent state, it stops using the resource allocated by said network element, and when said user equipment changes from said silent state to said talk-spurt state, it sends a request for allocating resource to said network element.
2,400
6,912
6,912
13,698,778
2,484
A method and system secure remote video transmissions for the remote control of a vehicle. The system secures the remote transmission of an image via a photosensitive receiver of a camera capable of remotely displaying the image. The system contains an optical securing information generator capable of generating optical securing information and an optical module capable of optically superimposing a securing image including the optical securing information and the image of the object to form a secured optical image for acting on the photosensitive receiver capable of generating a video signal. The system couples a device for remotely receiving the video signal from the video system to a device for processing the video signal. The video signal processing device is capable of detecting, reading and extracting optical securing information in the video signal of the secured optical image. The system has a display device for displaying the optical securing information.
1-15. (canceled) 16. A method for securing a remote transmission of an image of an object intended to be captured by a photosensitive receiver of a camera of a video system and transmitted remotely by the video system, which comprises the steps of: generating an optical securing datum for the remote transmission of the image of the object; forming a secure optical image by optical superposition of a securing image containing the optical securing datum and of the image of the object, the secure optical image being intended to act on the photosensitive receiver of the camera in order to be converted into a video signal; and verifying the optical securing datum carried by the video signal. 17. The securing method according to claim 16, which further comprises forming a temporal variation of the optical securing datum. 18. The securing method according to claim 16, which further comprises forming a spatial variation of the optical securing datum. 19. The securing method according to claim 16, which further comprises forming the optical securing datum to include identification datum of the camera. 20. The securing method according to claim 16, wherein at least some of the secure optical image includes an overlay of the optical securing datum. 21. A securing device for securing a remote transmission of an image of an object to be captured by a photosensitive receiver of a camera of a video system, the securing device comprising: an optical securing data generator for generating an optical securing datum intended to form a securing image; and an optical module coupled to said optical securing data generator, said optical module, optically superposing a securing image and the image of the object for forming a secure optical image intended to act on the photosensitive receiver. 22. The securing device according to claim 21, wherein said optical securing data generator has a spatial light modulator. 23. The securing device according to claim 21, further comprising a clock that can be synchronized with a clock of a device for detecting the optical securing datum. 24. The securing device according to claim 21, wherein said optical module has a semi-reflective blade. 25. The securing device according to claim 21, wherein said optical module includes a 4F arrangement. 26. A detection device for detecting optical securing datum of a secure optical image of an object being captured by a photosensitive receiver of a camera of a video system, the detection device comprising: processing means for processing a video signal, said processing means able to detect, read and extract the optical securing datum included in the video signal of the secure optical image; coupling means able to couple said processing means to a device for remotely receiving the video signal of the video system; and means for displaying the optical securing datum. 27. The detection device according to claim 26, wherein said processing means is able to analyze the optical securing datum and to flag a failure of a remote transmission of data relating to the image of the object. 28. A securing system for securing a remote transmission of a video image, the securing system comprising: a securing device containing an optical securing data generator for generating optical securing datum intended to form a securing image, and an optical module coupled to said optical securing data generator, said optical module, optically superposing the securing image and the video image of an object for forming a secure optical image intended to act on a photosensitive receiver; a detection device containing: processing means for processing a video signal, said processing means able to detect, read and extract the optical securing datum included in the video signal of the secure optical image; coupling means able to couple said processing means to a device for remotely receiving the video signal of a video system; means for displaying the optical securing datum; and said securing device and said detection device cooperating with each other to enable a securing of a transmission of the video image using the video system. 29. The securing system according to claim 28, wherein said securing device includes further coupling means for coupling said securing device to a camera of said video system. 30. The securing system according to claim 28, wherein said detection device includes said coupling means for coupling said detection device to a receiver device of the video system.
A method and system secure remote video transmissions for the remote control of a vehicle. The system secures the remote transmission of an image via a photosensitive receiver of a camera capable of remotely displaying the image. The system contains an optical securing information generator capable of generating optical securing information and an optical module capable of optically superimposing a securing image including the optical securing information and the image of the object to form a secured optical image for acting on the photosensitive receiver capable of generating a video signal. The system couples a device for remotely receiving the video signal from the video system to a device for processing the video signal. The video signal processing device is capable of detecting, reading and extracting optical securing information in the video signal of the secured optical image. The system has a display device for displaying the optical securing information.1-15. (canceled) 16. A method for securing a remote transmission of an image of an object intended to be captured by a photosensitive receiver of a camera of a video system and transmitted remotely by the video system, which comprises the steps of: generating an optical securing datum for the remote transmission of the image of the object; forming a secure optical image by optical superposition of a securing image containing the optical securing datum and of the image of the object, the secure optical image being intended to act on the photosensitive receiver of the camera in order to be converted into a video signal; and verifying the optical securing datum carried by the video signal. 17. The securing method according to claim 16, which further comprises forming a temporal variation of the optical securing datum. 18. The securing method according to claim 16, which further comprises forming a spatial variation of the optical securing datum. 19. The securing method according to claim 16, which further comprises forming the optical securing datum to include identification datum of the camera. 20. The securing method according to claim 16, wherein at least some of the secure optical image includes an overlay of the optical securing datum. 21. A securing device for securing a remote transmission of an image of an object to be captured by a photosensitive receiver of a camera of a video system, the securing device comprising: an optical securing data generator for generating an optical securing datum intended to form a securing image; and an optical module coupled to said optical securing data generator, said optical module, optically superposing a securing image and the image of the object for forming a secure optical image intended to act on the photosensitive receiver. 22. The securing device according to claim 21, wherein said optical securing data generator has a spatial light modulator. 23. The securing device according to claim 21, further comprising a clock that can be synchronized with a clock of a device for detecting the optical securing datum. 24. The securing device according to claim 21, wherein said optical module has a semi-reflective blade. 25. The securing device according to claim 21, wherein said optical module includes a 4F arrangement. 26. A detection device for detecting optical securing datum of a secure optical image of an object being captured by a photosensitive receiver of a camera of a video system, the detection device comprising: processing means for processing a video signal, said processing means able to detect, read and extract the optical securing datum included in the video signal of the secure optical image; coupling means able to couple said processing means to a device for remotely receiving the video signal of the video system; and means for displaying the optical securing datum. 27. The detection device according to claim 26, wherein said processing means is able to analyze the optical securing datum and to flag a failure of a remote transmission of data relating to the image of the object. 28. A securing system for securing a remote transmission of a video image, the securing system comprising: a securing device containing an optical securing data generator for generating optical securing datum intended to form a securing image, and an optical module coupled to said optical securing data generator, said optical module, optically superposing the securing image and the video image of an object for forming a secure optical image intended to act on a photosensitive receiver; a detection device containing: processing means for processing a video signal, said processing means able to detect, read and extract the optical securing datum included in the video signal of the secure optical image; coupling means able to couple said processing means to a device for remotely receiving the video signal of a video system; means for displaying the optical securing datum; and said securing device and said detection device cooperating with each other to enable a securing of a transmission of the video image using the video system. 29. The securing system according to claim 28, wherein said securing device includes further coupling means for coupling said securing device to a camera of said video system. 30. The securing system according to claim 28, wherein said detection device includes said coupling means for coupling said detection device to a receiver device of the video system.
2,400
6,913
6,913
13,959,263
2,449
An approach for providing an exchange of profile information by using anonymous identifiers is described. An information exchange platform may select one of a plurality of device identifiers specific to corresponding one or more devices. The information exchange platform may also cause, at least in part, a transmission of the selected device identifier to another device separate from the one or more devices. Further, the plurality of device identifiers may be associated with one or more user profiles.
1. An apparatus comprising: at least one processor; and at least one memory including computer program code for one or more programs, the at least one memory and the computer program code configured to, with the at least one processor, cause the apparatus to perform at least the following, select one of a plurality of device identifiers specific to corresponding one or more devices; and cause, at least in part, a transmission of the selected device identifier to another device separate from the one or more devices, wherein the plurality of device identifiers are associated with one or more user profiles. 2. An apparatus of claim 1, wherein the plurality of device identifiers are anonymous device identifiers. 3. An apparatus of claim 1, wherein the transmission is wireless using a Bluetooth connection, a Near Field Communication (NFC) connection, or a combination thereof. 4. An apparatus of claim 1, wherein the apparatus is further configured to: access to one of the one or more user profiles based, at least in part, on the selected device identifier. 5. An apparatus of claim 4, wherein the apparatus is further configured to: render the one of the one or more user profiles on the other device based, at least in part, on the access to one of the one or more user profiles. 6. An apparatus of claim 1, wherein the one or more user profiles are associated with one or more access levels to the one or more user profiles. 7. An apparatus of claim 6, wherein the one or more access levels to the one or more user profiles are preset by corresponding one or more users in association with the plurality of device identifiers. 8. An apparatus of claim 6, wherein the apparatus is further configured to: determine one of the one or more access levels associated with the one of the one or more user profiles based, at least in part, on the selected device identifier; and access the one of the one or more user profiles based, at least in part, on the determined access level. 9. A method comprising: selecting one of a plurality of device identifiers specific to corresponding one or more devices; and initiating transmission of the selected device identifier to another device separate from the one or more devices, wherein the plurality of device identifiers are associated with one or more user profiles. 10. A method of claim 9, wherein the plurality of device identifiers are anonymous device identifiers. 11. A method of claim 9, wherein the transmission is wireless using a Bluetooth connection, a Near Field Communication (NFC) connection, or a combination thereof. 12. A method of claim 9, further comprising: accessing one of the one or more user profiles based, at least in part, on the selected device identifier. 13. A method of claim 9, wherein the one or more user profiles are associated with one or more access levels to the one or more user profiles. 14. A method of claim 13, wherein the one or more access levels to the one or more user profiles are preset by corresponding one or more users in association with the plurality of device identifiers. 15. A method of claim 13, further comprising: determining one of the one or more access levels associated with the one of the one or more user profiles based, at least in part, on the selected device identifier; and accessing the one of the one or more user profiles based, at least in part, on the determined access level. 16. A system comprising: a selector that receives a user input; a processor configured to select one of a plurality of device identifiers specific to corresponding one or more devices based on the user input; a transceiver configured to transmit the selected device identifier to other device; a circuitry connected to the selector, the processor, and the transceiver; and a housing containing the selector, the processor, the transceiver, and the circuitry, wherein the plurality of device identifiers are associated with one or more user profiles. 17. A system of claim 16, wherein the plurality of device identifiers are anonymous device identifiers. 18. A system of claim 16, wherein the transceiver is configured to transmit wirelessly using a Bluetooth connection, a Near Field Communication (NFC) connection, or a combination thereof. 19. A system of claim 16, wherein the housing is coupled to other device that includes a mobile phone. 20. A system of claim 19, wherein the housing includes a protective case for the mobile phone.
An approach for providing an exchange of profile information by using anonymous identifiers is described. An information exchange platform may select one of a plurality of device identifiers specific to corresponding one or more devices. The information exchange platform may also cause, at least in part, a transmission of the selected device identifier to another device separate from the one or more devices. Further, the plurality of device identifiers may be associated with one or more user profiles.1. An apparatus comprising: at least one processor; and at least one memory including computer program code for one or more programs, the at least one memory and the computer program code configured to, with the at least one processor, cause the apparatus to perform at least the following, select one of a plurality of device identifiers specific to corresponding one or more devices; and cause, at least in part, a transmission of the selected device identifier to another device separate from the one or more devices, wherein the plurality of device identifiers are associated with one or more user profiles. 2. An apparatus of claim 1, wherein the plurality of device identifiers are anonymous device identifiers. 3. An apparatus of claim 1, wherein the transmission is wireless using a Bluetooth connection, a Near Field Communication (NFC) connection, or a combination thereof. 4. An apparatus of claim 1, wherein the apparatus is further configured to: access to one of the one or more user profiles based, at least in part, on the selected device identifier. 5. An apparatus of claim 4, wherein the apparatus is further configured to: render the one of the one or more user profiles on the other device based, at least in part, on the access to one of the one or more user profiles. 6. An apparatus of claim 1, wherein the one or more user profiles are associated with one or more access levels to the one or more user profiles. 7. An apparatus of claim 6, wherein the one or more access levels to the one or more user profiles are preset by corresponding one or more users in association with the plurality of device identifiers. 8. An apparatus of claim 6, wherein the apparatus is further configured to: determine one of the one or more access levels associated with the one of the one or more user profiles based, at least in part, on the selected device identifier; and access the one of the one or more user profiles based, at least in part, on the determined access level. 9. A method comprising: selecting one of a plurality of device identifiers specific to corresponding one or more devices; and initiating transmission of the selected device identifier to another device separate from the one or more devices, wherein the plurality of device identifiers are associated with one or more user profiles. 10. A method of claim 9, wherein the plurality of device identifiers are anonymous device identifiers. 11. A method of claim 9, wherein the transmission is wireless using a Bluetooth connection, a Near Field Communication (NFC) connection, or a combination thereof. 12. A method of claim 9, further comprising: accessing one of the one or more user profiles based, at least in part, on the selected device identifier. 13. A method of claim 9, wherein the one or more user profiles are associated with one or more access levels to the one or more user profiles. 14. A method of claim 13, wherein the one or more access levels to the one or more user profiles are preset by corresponding one or more users in association with the plurality of device identifiers. 15. A method of claim 13, further comprising: determining one of the one or more access levels associated with the one of the one or more user profiles based, at least in part, on the selected device identifier; and accessing the one of the one or more user profiles based, at least in part, on the determined access level. 16. A system comprising: a selector that receives a user input; a processor configured to select one of a plurality of device identifiers specific to corresponding one or more devices based on the user input; a transceiver configured to transmit the selected device identifier to other device; a circuitry connected to the selector, the processor, and the transceiver; and a housing containing the selector, the processor, the transceiver, and the circuitry, wherein the plurality of device identifiers are associated with one or more user profiles. 17. A system of claim 16, wherein the plurality of device identifiers are anonymous device identifiers. 18. A system of claim 16, wherein the transceiver is configured to transmit wirelessly using a Bluetooth connection, a Near Field Communication (NFC) connection, or a combination thereof. 19. A system of claim 16, wherein the housing is coupled to other device that includes a mobile phone. 20. A system of claim 19, wherein the housing includes a protective case for the mobile phone.
2,400
6,914
6,914
13,944,177
2,483
Methods and systems for preventing vehicle theft. A video stream of a parking area wherein a vehicle is parked can be captured, the video stream provided by a theft notification service to which the vehicle is pre-registered. The vehicle in the video stream can be identified. The video stream is then analyzed to detect motion with respect to the vehicle. An alert can then be generated if motion is detected.
1. A method for preventing vehicle theft, said method comprising: capturing a video stream of a parking area wherein a vehicle is parked, said video stream provided by a theft notification service to which said vehicle is pre-registered; identifying said vehicle in said video stream; analyzing said video stream to detect a motion with respect to said vehicle; and generating an alert if said motion is detected. 2. The method of claim 1 wherein said vehicle comprises at least one of an automobile, motorcycle, a motorized scooter, and a bicycle. 3. The method of claim 1 further comprising registering said vehicle with said theft notification service via a computing device. 4. The method of claim 3 further comprising identifying said vehicle in said video stream using information provided by said registering of said vehicle with said theft notification service. 5. The method of claim 1 further comprising transmitting said alert regarding said motion to a mobile communications device of a user associated with said vehicle. 6. The method of claim 5 further comprising transmitting back a response from said user regarding said alert to indicate whether said user authorized said motion. 7. The method of claim 1 further comprising providing a link to a webpage associated with said theft notification service, wherein said webpage displays interactive data for verification, enforcement, and prosecution use by civil authorities. 8. The method of claim 1 wherein said motion comprises an unauthorized movement of said vehicle. 9. A system for preventing vehicle theft, said system comprising: a processor; a data bus coupled to said processor; and a computer-usable medium embodying computer program code, said computer-usable medium being coupled to said data bus, said computer program code comprising instructions executable by said processor and configured for: capturing a video stream of a parking area wherein a vehicle is parked, said video stream provided by a theft notification service to which said vehicle is pre-registered; identifying said vehicle in said video stream; analyzing said video stream to detect a motion with respect to said vehicle; and generating an alert if said motion is detected. 10. The system of claim 9 wherein said vehicle comprises at least one of an automobile, motorcycle, a motorized scooter, and a bicycle. 11. The system of claim 9 wherein said instructions are further configured for registering said vehicle with said theft notification service via a computing device. 12. The system of claim 11 wherein said instructions are further configured for identifying said vehicle in said video stream using information provided by said registering of said vehicle with said theft notification service. 13. The system of claim 9 wherein said instructions are further configured for transmitting said alert regarding said motion to a mobile communications device of a user associated with said vehicle. 14. The system of claim 13 wherein said instructions are further configured for transmitting back a response from said user regarding said alert to indicate whether said user authorized said motion. 15. The system of claim 9 wherein said instructions are further configured for providing a link to a webpage associated with said theft notification service, wherein said webpage displays interactive data for verification, enforcement, and prosecution use by civil authorities. 16. The system of claim 9 wherein said motion comprises an unauthorized movement of said vehicle. 17. A processor-readable medium storing computer code representing instructions to cause a process for preventing vehicle theft, said computer code further comprising code to: capture a video stream of a parking area wherein a vehicle is parked, said video stream provided by a theft notification service to which said vehicle is pre-registered; identify said vehicle in said video stream; analyze said video stream to detect a motion with respect to said vehicle; and generate an alert if said motion is detected. 18. The processor-readable medium of claim 17 wherein said vehicle comprises at least one of an automobile, motorcycle, a motorized scooter, and a bicycle. 19. The processor-readable of claim 17 wherein said code further comprises code to: register said vehicle with said theft notification service via a computing device; and identify said vehicle in said video stream using information provided by said registering of said vehicle with said theft notification service. 20. The processor-readable medium of claim 17 wherein said code further comprises code to; transmit said alert regarding said motion to a mobile communications device of a user associated with said vehicle; and transmit back a response from said user regarding said alert to indicate whether said user authorized said motion.
Methods and systems for preventing vehicle theft. A video stream of a parking area wherein a vehicle is parked can be captured, the video stream provided by a theft notification service to which the vehicle is pre-registered. The vehicle in the video stream can be identified. The video stream is then analyzed to detect motion with respect to the vehicle. An alert can then be generated if motion is detected.1. A method for preventing vehicle theft, said method comprising: capturing a video stream of a parking area wherein a vehicle is parked, said video stream provided by a theft notification service to which said vehicle is pre-registered; identifying said vehicle in said video stream; analyzing said video stream to detect a motion with respect to said vehicle; and generating an alert if said motion is detected. 2. The method of claim 1 wherein said vehicle comprises at least one of an automobile, motorcycle, a motorized scooter, and a bicycle. 3. The method of claim 1 further comprising registering said vehicle with said theft notification service via a computing device. 4. The method of claim 3 further comprising identifying said vehicle in said video stream using information provided by said registering of said vehicle with said theft notification service. 5. The method of claim 1 further comprising transmitting said alert regarding said motion to a mobile communications device of a user associated with said vehicle. 6. The method of claim 5 further comprising transmitting back a response from said user regarding said alert to indicate whether said user authorized said motion. 7. The method of claim 1 further comprising providing a link to a webpage associated with said theft notification service, wherein said webpage displays interactive data for verification, enforcement, and prosecution use by civil authorities. 8. The method of claim 1 wherein said motion comprises an unauthorized movement of said vehicle. 9. A system for preventing vehicle theft, said system comprising: a processor; a data bus coupled to said processor; and a computer-usable medium embodying computer program code, said computer-usable medium being coupled to said data bus, said computer program code comprising instructions executable by said processor and configured for: capturing a video stream of a parking area wherein a vehicle is parked, said video stream provided by a theft notification service to which said vehicle is pre-registered; identifying said vehicle in said video stream; analyzing said video stream to detect a motion with respect to said vehicle; and generating an alert if said motion is detected. 10. The system of claim 9 wherein said vehicle comprises at least one of an automobile, motorcycle, a motorized scooter, and a bicycle. 11. The system of claim 9 wherein said instructions are further configured for registering said vehicle with said theft notification service via a computing device. 12. The system of claim 11 wherein said instructions are further configured for identifying said vehicle in said video stream using information provided by said registering of said vehicle with said theft notification service. 13. The system of claim 9 wherein said instructions are further configured for transmitting said alert regarding said motion to a mobile communications device of a user associated with said vehicle. 14. The system of claim 13 wherein said instructions are further configured for transmitting back a response from said user regarding said alert to indicate whether said user authorized said motion. 15. The system of claim 9 wherein said instructions are further configured for providing a link to a webpage associated with said theft notification service, wherein said webpage displays interactive data for verification, enforcement, and prosecution use by civil authorities. 16. The system of claim 9 wherein said motion comprises an unauthorized movement of said vehicle. 17. A processor-readable medium storing computer code representing instructions to cause a process for preventing vehicle theft, said computer code further comprising code to: capture a video stream of a parking area wherein a vehicle is parked, said video stream provided by a theft notification service to which said vehicle is pre-registered; identify said vehicle in said video stream; analyze said video stream to detect a motion with respect to said vehicle; and generate an alert if said motion is detected. 18. The processor-readable medium of claim 17 wherein said vehicle comprises at least one of an automobile, motorcycle, a motorized scooter, and a bicycle. 19. The processor-readable of claim 17 wherein said code further comprises code to: register said vehicle with said theft notification service via a computing device; and identify said vehicle in said video stream using information provided by said registering of said vehicle with said theft notification service. 20. The processor-readable medium of claim 17 wherein said code further comprises code to; transmit said alert regarding said motion to a mobile communications device of a user associated with said vehicle; and transmit back a response from said user regarding said alert to indicate whether said user authorized said motion.
2,400
6,915
6,915
13,335,439
2,456
A system for detecting a vulnerability in a Web service can include a processor configured to initiate executable operations including determining whether a Web service uses identity of a requester to select one of a plurality of different paths of a branch in program code of the Web service and, responsive to determining that the Web service does select one of a plurality of different paths of a branch according to identity of the requester, indicating that the Web service has a potential vulnerability.
1-15. (canceled) 16. A system comprising: a processor configured to initiate executable operations comprising: determining whether a Web service uses identity of a requester to select one of a plurality of different paths of a branch in program code of the Web service; and responsive to determining that the Web service does select one of a plurality of different paths of a branch according to identity of the requester, indicating that the Web service has a potential vulnerability. 17. The system of claim 16, wherein the processor is further configured to initiate executable operations comprising: determining a trusted identity to which identity of the requester is compared; and submitting a payload to the Web service while impersonating the trusted identity. 18. The system of claim 17, wherein the processor is further configured to initiate executable operations comprising: defeating identity verification within the Web service; and defeating identity decryption within the Web service. 19. The system of claim 17, wherein the processor is further configured to initiate executable operations comprising: comparing a response to the payload from the Web service with an expected response; and indicating whether the Web service has a vulnerability according to the comparing. 20. A computer program product for detecting a vulnerability in a Web service, the computer program product comprising: a computer readable storage medium having computer readable program code embodied therewith, the computer readable program code comprising: computer readable program code configured to determine whether a Web service uses identity of a requester to select one of a plurality of different paths of a branch in program code of the Web service; and computer readable program code configured to, responsive to determining that the Web service does select one of a plurality of different paths of a branch according to identity of the requester, indicate that the Web service has a potential vulnerability. 21. The computer program product of claim 20, further comprising: computer readable program code configured to determine a trusted identity to which identity of the requester is compared; and computer readable program code configured to submit a payload to the Web service while impersonating the trusted identity. 22. The computer program product of claim 21, further comprising: computer readable program code configured to defeat identity verification within the Web service. 23. The computer program product of claim 21, further comprising: computer readable program code configured to defeat identity decryption within the Web service. 24. The computer program product of claim 21, further comprising: computer readable program code configured to compare a response to the payload from the Web service with an expected response; and computer readable program code configured to indicate whether the Web service has a vulnerability according to the comparing. 25. The computer program product of claim 20, further comprising: computer readable program code configured to locate a seed instruction in the program code of the Web service in which identity of the requester is determined; and computer readable program code configured to determine whether a value of the seed instruction that indicates identity of the requestor is determinative in selecting one of the plurality of paths for the branch.
A system for detecting a vulnerability in a Web service can include a processor configured to initiate executable operations including determining whether a Web service uses identity of a requester to select one of a plurality of different paths of a branch in program code of the Web service and, responsive to determining that the Web service does select one of a plurality of different paths of a branch according to identity of the requester, indicating that the Web service has a potential vulnerability.1-15. (canceled) 16. A system comprising: a processor configured to initiate executable operations comprising: determining whether a Web service uses identity of a requester to select one of a plurality of different paths of a branch in program code of the Web service; and responsive to determining that the Web service does select one of a plurality of different paths of a branch according to identity of the requester, indicating that the Web service has a potential vulnerability. 17. The system of claim 16, wherein the processor is further configured to initiate executable operations comprising: determining a trusted identity to which identity of the requester is compared; and submitting a payload to the Web service while impersonating the trusted identity. 18. The system of claim 17, wherein the processor is further configured to initiate executable operations comprising: defeating identity verification within the Web service; and defeating identity decryption within the Web service. 19. The system of claim 17, wherein the processor is further configured to initiate executable operations comprising: comparing a response to the payload from the Web service with an expected response; and indicating whether the Web service has a vulnerability according to the comparing. 20. A computer program product for detecting a vulnerability in a Web service, the computer program product comprising: a computer readable storage medium having computer readable program code embodied therewith, the computer readable program code comprising: computer readable program code configured to determine whether a Web service uses identity of a requester to select one of a plurality of different paths of a branch in program code of the Web service; and computer readable program code configured to, responsive to determining that the Web service does select one of a plurality of different paths of a branch according to identity of the requester, indicate that the Web service has a potential vulnerability. 21. The computer program product of claim 20, further comprising: computer readable program code configured to determine a trusted identity to which identity of the requester is compared; and computer readable program code configured to submit a payload to the Web service while impersonating the trusted identity. 22. The computer program product of claim 21, further comprising: computer readable program code configured to defeat identity verification within the Web service. 23. The computer program product of claim 21, further comprising: computer readable program code configured to defeat identity decryption within the Web service. 24. The computer program product of claim 21, further comprising: computer readable program code configured to compare a response to the payload from the Web service with an expected response; and computer readable program code configured to indicate whether the Web service has a vulnerability according to the comparing. 25. The computer program product of claim 20, further comprising: computer readable program code configured to locate a seed instruction in the program code of the Web service in which identity of the requester is determined; and computer readable program code configured to determine whether a value of the seed instruction that indicates identity of the requestor is determinative in selecting one of the plurality of paths for the branch.
2,400
6,916
6,916
13,516,863
2,487
Provided are an image encoding method and device. When carrying out image encoding for a block within a slice, at least one block in a restored block of the slice is set as a reference block. When this is done, the encoding parameters of the reference block are distinguished, and the block to be encoded is encoded adaptively based on the encoding parameters.
1. A video coding method, comprising: reconstructing a plurality of blocks within a first slice with respect to the first slice including the plurality of blocks; determining at least one block among the plurality of reconstructed blocks as a referencing block; discriminating a coding parameter of the referencing block; and adaptively coding, a coding target block, within the first slice based on the coding parameter. 2. The video coding method of claim 1, wherein the referencing block is determined in accordance with a relative position with respect to the coding target block. 3. The video coding method of claim 2, wherein the referencing block is at least one block, most adjacent to the coding target block, among the plurality of reconstructed blocks. 4. The video coding method of claim 2, wherein the referencing block is the reconstructed block in which a block position within a picture corresponds to the coding target block within the previously reconstructed picture. 5. The video coding method of claim 2, wherein the relative position is at least one of a fixed position within the first slice, a position changeable within the first slice, and a position changeable in a slice unit. 6. The video coding method of claim 1, wherein the discriminating of the coding parameter includes applying motion information, of the referencing block, as the coding parameter of the referencing block, and the adaptively coding, of the coding target block, includes coding the coding target block based on the motion information of the referencing block. 7. The video coding method of claim 1, wherein the coding parameter includes a luminance intra-prediction direction of the referencing block, and the coding target block is coded to have the luminance intra-prediction direction of the referencing block or coded to have the luminance intra-prediction direction similar to the intra-prediction direction of the referencing block. 8. The video coding method of claim 1, wherein, when the referencing block is intra-coded, the coding parameter includes at least one of an intra-coding mode, a luminance intra-prediction direction, a luminance intra-prediction scheme, a chrominance intra-prediction direction, a chrominance intra-prediction scheme, a transform method, a displacement vector, a coded block pattern, residual signal presence and absence, and a coefficient scan method. 9. The video coding method of claim 1, wherein the coding parameter includes a motion vector, and the coding target block is coded to a motion vector of the referencing block or corded only to a motion vector similar to the motion vector of the referencing block when the referencing block is inter-coded. 10. The video coding method of claim 1, wherein the coding parameter includes a reference picture index, and the coding target block is coded to a reference picture index of the referencing block or coded only to a reference picture index, similar to the reference picture index of the referencing block, when the referencing block is inter-coded. 11. The video coding method of claim 1, wherein the coding parameter includes a prediction direction, and the coding target block is coded in a prediction direction of the referencing block when the referencing block is inter-coded. 12. The video coding method of claim 1, wherein, when the referencing block is inter-coded, the coding parameter includes at least one of an inter-coding mode, an inter macro block partition, a motion vector, a reference picture index, a reference picture list, a prediction direction, an adaptive interpolation filter, residual signal presence and absence, and a coefficient scan method. 13. The video coding method of claim 1, further comprising: discriminating characteristics of the referencing block based on the coding parameter, wherein the coding target block is adaptively coded based on the coding parameter when spatial redundancy is higher than temporal redundancy of the characteristics. 14. The video coding method of claim 1, wherein a coding mode of the coding is determined as a coding mode selected according to competition between an adaptively coded mode and an adaptively uncoded mode. 15. The video coding method of claim 13, wherein the selected coding mode is signaled to a decoder by a coding scheme indicator. 16. The video coding method of claim 1, further comprising: transmitting, to a decoder, a referencing block identifier with respect to which referencing block is selected. 17. A video decoding method, comprising: reconstructing a plurality of blocks within a first slice with respect to the first slice including the plurality of blocks; determining at least one block among the plurality of reconstructed blocks as a referencing block; discriminating a coding parameter of the referencing block; and adaptively decoding a decoding target block within the first slice based on the coding parameter. 18. The video decoding method of claim 17, wherein the adaptively decoding of the decoding target block includes deducting omitted coding parameter information from the referencing block. 19. The video decoding method of claim 18, wherein the omitted coding parameter information is deducted from the referencing block using a referencing block identifier indicating which referencing block is selected. 20. A video coding device, comprising: a storage unit to store data; a buffer to receive data with respect to a slice and blocks within the slice, and to store the received data; and a control unit to receive the data with respect to the slice and blocks, within the slice from the buffer, to determine a referencing block, to discriminate a coding parameter of the referencing block, to discriminate characteristics of the referencing block, and to adaptively code a coding target block within the slice, wherein the storage unit receives data required for an operation of the control unit from the control unit, and transmits the data stored in accordance with a request of the control unit to the control unit.
Provided are an image encoding method and device. When carrying out image encoding for a block within a slice, at least one block in a restored block of the slice is set as a reference block. When this is done, the encoding parameters of the reference block are distinguished, and the block to be encoded is encoded adaptively based on the encoding parameters.1. A video coding method, comprising: reconstructing a plurality of blocks within a first slice with respect to the first slice including the plurality of blocks; determining at least one block among the plurality of reconstructed blocks as a referencing block; discriminating a coding parameter of the referencing block; and adaptively coding, a coding target block, within the first slice based on the coding parameter. 2. The video coding method of claim 1, wherein the referencing block is determined in accordance with a relative position with respect to the coding target block. 3. The video coding method of claim 2, wherein the referencing block is at least one block, most adjacent to the coding target block, among the plurality of reconstructed blocks. 4. The video coding method of claim 2, wherein the referencing block is the reconstructed block in which a block position within a picture corresponds to the coding target block within the previously reconstructed picture. 5. The video coding method of claim 2, wherein the relative position is at least one of a fixed position within the first slice, a position changeable within the first slice, and a position changeable in a slice unit. 6. The video coding method of claim 1, wherein the discriminating of the coding parameter includes applying motion information, of the referencing block, as the coding parameter of the referencing block, and the adaptively coding, of the coding target block, includes coding the coding target block based on the motion information of the referencing block. 7. The video coding method of claim 1, wherein the coding parameter includes a luminance intra-prediction direction of the referencing block, and the coding target block is coded to have the luminance intra-prediction direction of the referencing block or coded to have the luminance intra-prediction direction similar to the intra-prediction direction of the referencing block. 8. The video coding method of claim 1, wherein, when the referencing block is intra-coded, the coding parameter includes at least one of an intra-coding mode, a luminance intra-prediction direction, a luminance intra-prediction scheme, a chrominance intra-prediction direction, a chrominance intra-prediction scheme, a transform method, a displacement vector, a coded block pattern, residual signal presence and absence, and a coefficient scan method. 9. The video coding method of claim 1, wherein the coding parameter includes a motion vector, and the coding target block is coded to a motion vector of the referencing block or corded only to a motion vector similar to the motion vector of the referencing block when the referencing block is inter-coded. 10. The video coding method of claim 1, wherein the coding parameter includes a reference picture index, and the coding target block is coded to a reference picture index of the referencing block or coded only to a reference picture index, similar to the reference picture index of the referencing block, when the referencing block is inter-coded. 11. The video coding method of claim 1, wherein the coding parameter includes a prediction direction, and the coding target block is coded in a prediction direction of the referencing block when the referencing block is inter-coded. 12. The video coding method of claim 1, wherein, when the referencing block is inter-coded, the coding parameter includes at least one of an inter-coding mode, an inter macro block partition, a motion vector, a reference picture index, a reference picture list, a prediction direction, an adaptive interpolation filter, residual signal presence and absence, and a coefficient scan method. 13. The video coding method of claim 1, further comprising: discriminating characteristics of the referencing block based on the coding parameter, wherein the coding target block is adaptively coded based on the coding parameter when spatial redundancy is higher than temporal redundancy of the characteristics. 14. The video coding method of claim 1, wherein a coding mode of the coding is determined as a coding mode selected according to competition between an adaptively coded mode and an adaptively uncoded mode. 15. The video coding method of claim 13, wherein the selected coding mode is signaled to a decoder by a coding scheme indicator. 16. The video coding method of claim 1, further comprising: transmitting, to a decoder, a referencing block identifier with respect to which referencing block is selected. 17. A video decoding method, comprising: reconstructing a plurality of blocks within a first slice with respect to the first slice including the plurality of blocks; determining at least one block among the plurality of reconstructed blocks as a referencing block; discriminating a coding parameter of the referencing block; and adaptively decoding a decoding target block within the first slice based on the coding parameter. 18. The video decoding method of claim 17, wherein the adaptively decoding of the decoding target block includes deducting omitted coding parameter information from the referencing block. 19. The video decoding method of claim 18, wherein the omitted coding parameter information is deducted from the referencing block using a referencing block identifier indicating which referencing block is selected. 20. A video coding device, comprising: a storage unit to store data; a buffer to receive data with respect to a slice and blocks within the slice, and to store the received data; and a control unit to receive the data with respect to the slice and blocks, within the slice from the buffer, to determine a referencing block, to discriminate a coding parameter of the referencing block, to discriminate characteristics of the referencing block, and to adaptively code a coding target block within the slice, wherein the storage unit receives data required for an operation of the control unit from the control unit, and transmits the data stored in accordance with a request of the control unit to the control unit.
2,400
6,917
6,917
14,322,575
2,466
A transmission point (TP) comprises a processor configured to generate a transmission parameter related to a transmission property of the TP, wherein the transmission parameter comprises at least one of a transmission rank, a beamforming matrix, a transmission power, and an on/off status, and a transmitter coupled to the processor and configured to transmit the transmission parameter as part of a coordinated multi-point (CoMP) scheme. A transmission point (TP) comprises a processor configured to generate a transmission parameter related to a desired transmission property, wherein the transmission parameter comprises at least one of a transmission rank, a beamforming matrix, a transmission power, and an on/off status, and a transmitter coupled to the processor and configured to transmit the transmission parameter as part of a coordinated multi-point (CoMP) scheme.
1. A transmission point (TP) comprising: a processor configured to generate a transmission parameter related to a transmission property of the TP, wherein the transmission parameter comprises at least one of a transmission rank, a beamforming matrix, a transmission power, and an on/off status; and a transmitter coupled to the processor and configured to transmit the transmission parameter as part of a coordinated multi-point (CoMP) scheme. 2. The TP of claim 1, wherein the transmission parameter comprises a transmission rank, and wherein the transmission rank indicates a number of spatial layers transmitted by the TP. 3. The TP of claim 1, wherein the transmission parameter comprises a beamforming matrix, and wherein the beamforming matrix indicates a beamforming/precoding operation of the TP. 4. The TP of claim 1, wherein the transmission parameter comprises a transmission power, and wherein the transmission power indicates a power of the transmitter when transmitting data. 5. The TP of claim 4, wherein the transmission power is indicated as an absolute power. 6. The TP of claim 4, wherein the transmission power is indicated as a power relative to a reference power. 7. The TP of claim 1, wherein the transmission parameter comprises an on/off status, and wherein the on/off status indicates whether or not the TP is actively transmitting. 8. The TP of claim 7, wherein the on/off status comprises on/off data for each frequency resource in a subframe. 9. A transmission point (TP) comprising: a processor configured to generate a transmission parameter related to a desired transmission property, wherein the transmission parameter comprises at least one of a transmission rank, a beamforming matrix, a transmission power, and an on/off status; and a transmitter coupled to the processor and configured to transmit the transmission parameter as part of a coordinated multi-point (CoMP) scheme. 10. The TP of claim 9, wherein the transmitter is further configured to transmit the transmission parameter for all frequency resources in a subframe. 11. The TP of claim 9, wherein the transmitter is further configured to transmit the transmission parameter for less than all frequency resources in a subframe. 12. The TP of claim 9, wherein the desired transmission property is a transmission property that the TP desires another TP to implement. 13. An apparatus comprising: a receiver configured to receive a transmission parameter as part of a coordinated multi-point (CoMP) scheme; a processor coupled to the receiver and configured to: process the transmission parameter, and generate transmission instructions based on the transmission parameter; and a transmitter coupled to the processor and configured to transmit a radio subframe based on the transmission instructions. 14. The apparatus of claim 13, wherein the processor is configured to generate the transmission instructions to reduce inter-cell interference (ICI). 15. The apparatus of claim 14, wherein the processor is configured to generate the transmission instructions to comprise instructions to transmit with a first beamforming matrix that is substantially orthogonal to a second beamforming matrix associated with the transmission parameter. 16. The apparatus of claim 13, wherein the transmission parameter is a transmission rank. 17. The apparatus of claim 13, wherein the transmission parameter is a beamforming matrix. 18. The apparatus of claim 13, wherein the transmission parameter is a transmission power. 19. The apparatus of claim 13, wherein the transmission parameter is an on/off status. 20. A transmission point (TP) comprising: a receiver configured to receive a transmission parameter as part of a coordinated multi-point (CoMP) scheme, wherein the transmission parameter is at least one of a transmission rank, a beamforming matrix, a transmission power, and an on/off status; a processor coupled to the receiver and configured to: process the transmission parameter, and generate transmission instructions based on the transmission parameter, wherein the transmission instructions comprise instructions to adjust at least one of a transmission power, a transmission direction, and a transmission scheduling of the TP; and a transmitter coupled to the processor and configured to transmit a radio subframe based on the transmission instructions. 21. The TP of claim 20, wherein the transmission parameter is based on an average over a number of radio subframes. 22. The TP of claim 20, wherein the processor is configured to generate the transmission instructions to comprise instructions to transmit with a first beamforming matrix that is substantially orthogonal to a second beamforming matrix associated with the transmission parameter. 23. A method comprising: receiving a transmission parameter as part of a coordinated multi-point (CoMP) scheme; processing the transmission parameter; generating transmission instructions based on the transmission parameter; and transmitting a radio subframe based on the transmission instructions. 24. The method of claim 23, wherein the transmission parameter is received over an X2 interface using an X2 application protocol (X2AP). 25. The method of claim 23, wherein the transmission parameter is based on an average over a number of radio subframes. 26. The method of claim of claim 23, wherein the transmission parameter is one of a transmission rank, a beamforming matrix, a transmission power, and an on/off status.
A transmission point (TP) comprises a processor configured to generate a transmission parameter related to a transmission property of the TP, wherein the transmission parameter comprises at least one of a transmission rank, a beamforming matrix, a transmission power, and an on/off status, and a transmitter coupled to the processor and configured to transmit the transmission parameter as part of a coordinated multi-point (CoMP) scheme. A transmission point (TP) comprises a processor configured to generate a transmission parameter related to a desired transmission property, wherein the transmission parameter comprises at least one of a transmission rank, a beamforming matrix, a transmission power, and an on/off status, and a transmitter coupled to the processor and configured to transmit the transmission parameter as part of a coordinated multi-point (CoMP) scheme.1. A transmission point (TP) comprising: a processor configured to generate a transmission parameter related to a transmission property of the TP, wherein the transmission parameter comprises at least one of a transmission rank, a beamforming matrix, a transmission power, and an on/off status; and a transmitter coupled to the processor and configured to transmit the transmission parameter as part of a coordinated multi-point (CoMP) scheme. 2. The TP of claim 1, wherein the transmission parameter comprises a transmission rank, and wherein the transmission rank indicates a number of spatial layers transmitted by the TP. 3. The TP of claim 1, wherein the transmission parameter comprises a beamforming matrix, and wherein the beamforming matrix indicates a beamforming/precoding operation of the TP. 4. The TP of claim 1, wherein the transmission parameter comprises a transmission power, and wherein the transmission power indicates a power of the transmitter when transmitting data. 5. The TP of claim 4, wherein the transmission power is indicated as an absolute power. 6. The TP of claim 4, wherein the transmission power is indicated as a power relative to a reference power. 7. The TP of claim 1, wherein the transmission parameter comprises an on/off status, and wherein the on/off status indicates whether or not the TP is actively transmitting. 8. The TP of claim 7, wherein the on/off status comprises on/off data for each frequency resource in a subframe. 9. A transmission point (TP) comprising: a processor configured to generate a transmission parameter related to a desired transmission property, wherein the transmission parameter comprises at least one of a transmission rank, a beamforming matrix, a transmission power, and an on/off status; and a transmitter coupled to the processor and configured to transmit the transmission parameter as part of a coordinated multi-point (CoMP) scheme. 10. The TP of claim 9, wherein the transmitter is further configured to transmit the transmission parameter for all frequency resources in a subframe. 11. The TP of claim 9, wherein the transmitter is further configured to transmit the transmission parameter for less than all frequency resources in a subframe. 12. The TP of claim 9, wherein the desired transmission property is a transmission property that the TP desires another TP to implement. 13. An apparatus comprising: a receiver configured to receive a transmission parameter as part of a coordinated multi-point (CoMP) scheme; a processor coupled to the receiver and configured to: process the transmission parameter, and generate transmission instructions based on the transmission parameter; and a transmitter coupled to the processor and configured to transmit a radio subframe based on the transmission instructions. 14. The apparatus of claim 13, wherein the processor is configured to generate the transmission instructions to reduce inter-cell interference (ICI). 15. The apparatus of claim 14, wherein the processor is configured to generate the transmission instructions to comprise instructions to transmit with a first beamforming matrix that is substantially orthogonal to a second beamforming matrix associated with the transmission parameter. 16. The apparatus of claim 13, wherein the transmission parameter is a transmission rank. 17. The apparatus of claim 13, wherein the transmission parameter is a beamforming matrix. 18. The apparatus of claim 13, wherein the transmission parameter is a transmission power. 19. The apparatus of claim 13, wherein the transmission parameter is an on/off status. 20. A transmission point (TP) comprising: a receiver configured to receive a transmission parameter as part of a coordinated multi-point (CoMP) scheme, wherein the transmission parameter is at least one of a transmission rank, a beamforming matrix, a transmission power, and an on/off status; a processor coupled to the receiver and configured to: process the transmission parameter, and generate transmission instructions based on the transmission parameter, wherein the transmission instructions comprise instructions to adjust at least one of a transmission power, a transmission direction, and a transmission scheduling of the TP; and a transmitter coupled to the processor and configured to transmit a radio subframe based on the transmission instructions. 21. The TP of claim 20, wherein the transmission parameter is based on an average over a number of radio subframes. 22. The TP of claim 20, wherein the processor is configured to generate the transmission instructions to comprise instructions to transmit with a first beamforming matrix that is substantially orthogonal to a second beamforming matrix associated with the transmission parameter. 23. A method comprising: receiving a transmission parameter as part of a coordinated multi-point (CoMP) scheme; processing the transmission parameter; generating transmission instructions based on the transmission parameter; and transmitting a radio subframe based on the transmission instructions. 24. The method of claim 23, wherein the transmission parameter is received over an X2 interface using an X2 application protocol (X2AP). 25. The method of claim 23, wherein the transmission parameter is based on an average over a number of radio subframes. 26. The method of claim of claim 23, wherein the transmission parameter is one of a transmission rank, a beamforming matrix, a transmission power, and an on/off status.
2,400
6,918
6,918
14,333,751
2,442
Systems and methods for Transmission Control Protocol (TCP) acknowledgement (ACK) packet suppression are described. In various implementations, these systems and methods may be applicable to low-power communications. For example, a method may include receive an incoming TCP packet at a TCP layer implemented by the communication system; de-encapsulating the incoming TCP packet using a TCP protocol to identify an incoming Secure Sockets Layer (SSL) or Transport Layer Security (TLS) packet; passing the incoming SSL or TLS packet from the TCP layer to an SSL or TLS layer; and signaling, by the SSL or TLS layer to the TCP layer in response to the SSL or TLS layer having received the incoming SSL or TLS packet, that a TCP acknowledgement be suppressed by the TCP layer.
1. A method, comprising: receiving an incoming transport packet at a transport layer implemented via a computer system; de-encapsulating the incoming transport packet using a transport protocol to identify an incoming security packet and passing the incoming security packet to a security layer; and signaling, by the security layer to the transport layer in response to the security layer having received the incoming security packet, that an acknowledgement packet be suppressed by the transport layer. 2. The method of claim 1, wherein the incoming transport packet is a Transmission Control Protocol (TCP) packet, wherein the transport layer is a TCP layer, wherein the transport protocol is a TCP protocol, and wherein the acknowledgement packet is a TCP acknowledgement packet. 3. The method of claim 1, wherein the incoming security packet is a Transport Layer Security (TLS) packet or a Secure Sockets Layer (SSL) packet. 4. The method of claim 1, wherein the incoming security packet is a part of a security handshake between the computer system and another computer system, and wherein the handshake takes place over a network. 5. The method of claim 4, wherein the security handshake includes a Secure Sockets Layer (SSL) handshake, and wherein the incoming security package includes a client hello message, a server hello message, a server hello done message, a client finished message, a server finished message, or a change cipher spec notification. 6. The method of claim 1, further comprising suppressing transmission of the acknowledgement packet by the transport layer in response to the signaling. 7. The method of claim 1, further comprising: receiving, at the transport layer, an outgoing security packet in response to the incoming security packet; and encapsulating, by the transport layer, the outgoing security packet using the transport protocol into an outgoing transport packet. 8. The method of claim 7, wherein the outgoing transport packet includes an acknowledgement indication. 9. The method of claim 8, wherein the acknowledgement indication is in a header portion of the outgoing transport packet. 10. The method of claim 8, wherein the acknowledgement indication is in an acknowledgement field of the header portion. 11. A communication system having a processor and a memory coupled to the processor, the memory configured to store program instructions executable by the processor to cause the communication system to: receive an incoming Transmission Control Protocol (TCP) packet at a TCP layer implemented by the communication system; de-encapsulate the incoming TCP packet using a TCP protocol to identify an incoming Secure Sockets Layer (SSL) packet; pass the incoming SSL packet from the TCP layer to an SSL layer; and signal, by the SSL layer to the TCP layer in response to the SSL layer having received the incoming SSL packet, that a TCP acknowledgement be suppressed by the TCP layer. 12. The communication system of claim 11, wherein the incoming SSL packet is a part of an SSL handshake between the communication system and another communication system, and wherein the handshake takes place over a network. 13. The communication system of claim 12, wherein the incoming security package includes a client hello message, a server hello message, a server hello done message, a client finished message, a server finished message, or a change cipher spec notification. 14. The communication system of claim 12, wherein the program instructions are executable by the processor to further cause the communication system to suppress transmission of the TCP acknowledgement by the TCP layer in response to the signal. 15. The communication system of claim 14, wherein the program instructions are executable by the processor to further cause the communication system to: receive, at the TCP layer, an outgoing SSL packet in response to the incoming SSL packet; and encapsulate, by the TCP layer, the outgoing SSL packet using the TCP protocol into an outgoing TCP packet, wherein the outgoing TCP packet includes an acknowledgement indication in a header portion of the outgoing TCP packet. 16. A non-transitory electronic storage medium having program instructions stored thereon that, upon execution by a processor within a communication system, cause the communication system to: receive an incoming Transmission Control Protocol (TCP) packet at a TCP layer implemented by the communication system; de-encapsulate the incoming TCP packet using a TCP protocol to identify an incoming Transport Layer Security (TLS) packet; pass the incoming TLS packet from the TCP layer to a TLS layer; and signal, by the TLS layer to the TCP layer in response to the TLS layer having received the incoming TLS packet, that a TCP acknowledgement be suppressed by the TCP layer. 17. The non-transitory electronic storage medium of claim 16, wherein the incoming TLS packet is a part of an TLS handshake between the communication system and another communication system, and wherein the handshake takes place over a network. 18. The non-transitory electronic storage medium of claim 16, wherein the program instructions are executable by the processor to further cause the communication system to suppress transmission of the TCP acknowledgement by the TCP layer in response to the signal. 19. The non-transitory electronic storage medium of claim 16, wherein the program instructions are executable by the processor to further cause the communication system to: receive, at the TCP layer, an outgoing TLS packet in response to the incoming TLS packet; and encapsulate, by the TCP layer, the outgoing TLS packet using the TCP protocol into an outgoing TCP packet. 20. The non-transitory electronic storage medium of claim 19, wherein the outgoing TCP packet includes an acknowledgement indication in a header portion of the outgoing TCP packet.
Systems and methods for Transmission Control Protocol (TCP) acknowledgement (ACK) packet suppression are described. In various implementations, these systems and methods may be applicable to low-power communications. For example, a method may include receive an incoming TCP packet at a TCP layer implemented by the communication system; de-encapsulating the incoming TCP packet using a TCP protocol to identify an incoming Secure Sockets Layer (SSL) or Transport Layer Security (TLS) packet; passing the incoming SSL or TLS packet from the TCP layer to an SSL or TLS layer; and signaling, by the SSL or TLS layer to the TCP layer in response to the SSL or TLS layer having received the incoming SSL or TLS packet, that a TCP acknowledgement be suppressed by the TCP layer.1. A method, comprising: receiving an incoming transport packet at a transport layer implemented via a computer system; de-encapsulating the incoming transport packet using a transport protocol to identify an incoming security packet and passing the incoming security packet to a security layer; and signaling, by the security layer to the transport layer in response to the security layer having received the incoming security packet, that an acknowledgement packet be suppressed by the transport layer. 2. The method of claim 1, wherein the incoming transport packet is a Transmission Control Protocol (TCP) packet, wherein the transport layer is a TCP layer, wherein the transport protocol is a TCP protocol, and wherein the acknowledgement packet is a TCP acknowledgement packet. 3. The method of claim 1, wherein the incoming security packet is a Transport Layer Security (TLS) packet or a Secure Sockets Layer (SSL) packet. 4. The method of claim 1, wherein the incoming security packet is a part of a security handshake between the computer system and another computer system, and wherein the handshake takes place over a network. 5. The method of claim 4, wherein the security handshake includes a Secure Sockets Layer (SSL) handshake, and wherein the incoming security package includes a client hello message, a server hello message, a server hello done message, a client finished message, a server finished message, or a change cipher spec notification. 6. The method of claim 1, further comprising suppressing transmission of the acknowledgement packet by the transport layer in response to the signaling. 7. The method of claim 1, further comprising: receiving, at the transport layer, an outgoing security packet in response to the incoming security packet; and encapsulating, by the transport layer, the outgoing security packet using the transport protocol into an outgoing transport packet. 8. The method of claim 7, wherein the outgoing transport packet includes an acknowledgement indication. 9. The method of claim 8, wherein the acknowledgement indication is in a header portion of the outgoing transport packet. 10. The method of claim 8, wherein the acknowledgement indication is in an acknowledgement field of the header portion. 11. A communication system having a processor and a memory coupled to the processor, the memory configured to store program instructions executable by the processor to cause the communication system to: receive an incoming Transmission Control Protocol (TCP) packet at a TCP layer implemented by the communication system; de-encapsulate the incoming TCP packet using a TCP protocol to identify an incoming Secure Sockets Layer (SSL) packet; pass the incoming SSL packet from the TCP layer to an SSL layer; and signal, by the SSL layer to the TCP layer in response to the SSL layer having received the incoming SSL packet, that a TCP acknowledgement be suppressed by the TCP layer. 12. The communication system of claim 11, wherein the incoming SSL packet is a part of an SSL handshake between the communication system and another communication system, and wherein the handshake takes place over a network. 13. The communication system of claim 12, wherein the incoming security package includes a client hello message, a server hello message, a server hello done message, a client finished message, a server finished message, or a change cipher spec notification. 14. The communication system of claim 12, wherein the program instructions are executable by the processor to further cause the communication system to suppress transmission of the TCP acknowledgement by the TCP layer in response to the signal. 15. The communication system of claim 14, wherein the program instructions are executable by the processor to further cause the communication system to: receive, at the TCP layer, an outgoing SSL packet in response to the incoming SSL packet; and encapsulate, by the TCP layer, the outgoing SSL packet using the TCP protocol into an outgoing TCP packet, wherein the outgoing TCP packet includes an acknowledgement indication in a header portion of the outgoing TCP packet. 16. A non-transitory electronic storage medium having program instructions stored thereon that, upon execution by a processor within a communication system, cause the communication system to: receive an incoming Transmission Control Protocol (TCP) packet at a TCP layer implemented by the communication system; de-encapsulate the incoming TCP packet using a TCP protocol to identify an incoming Transport Layer Security (TLS) packet; pass the incoming TLS packet from the TCP layer to a TLS layer; and signal, by the TLS layer to the TCP layer in response to the TLS layer having received the incoming TLS packet, that a TCP acknowledgement be suppressed by the TCP layer. 17. The non-transitory electronic storage medium of claim 16, wherein the incoming TLS packet is a part of an TLS handshake between the communication system and another communication system, and wherein the handshake takes place over a network. 18. The non-transitory electronic storage medium of claim 16, wherein the program instructions are executable by the processor to further cause the communication system to suppress transmission of the TCP acknowledgement by the TCP layer in response to the signal. 19. The non-transitory electronic storage medium of claim 16, wherein the program instructions are executable by the processor to further cause the communication system to: receive, at the TCP layer, an outgoing TLS packet in response to the incoming TLS packet; and encapsulate, by the TCP layer, the outgoing TLS packet using the TCP protocol into an outgoing TCP packet. 20. The non-transitory electronic storage medium of claim 19, wherein the outgoing TCP packet includes an acknowledgement indication in a header portion of the outgoing TCP packet.
2,400
6,919
6,919
14,125,976
2,461
To control content delivery to plural clients ( 6 ) of a mobile communication network ( 1 ), a network entity ( 5 ) of the mobile communication network ( 1 ) collects geo information of the plural clients ( 6 ) and evaluates the collected geo information of the plural clients ( 6 ) based on a rule to determine whether the content delivery is to be adapted. The network entity ( 5 ) identifies a region for which the content delivery is to be adapted. The network entity ( 5 ) selectively outputs a message ( 9 ) to a controlling entity ( 10 ) if it is determined that the content delivery is to be adapted. The controlling entity ( 10 ) controls the content delivery in response to receiving the message ( 9 ), to adapt the content delivery for clients located in the identified region.
1-23. (canceled) 24. A method of controlling content delivery to plural clients of a mobile communication network, the content being delivered to the plural clients over a radio access network of the mobile communication network, the method comprising: collecting geo information of the plural clients by a network entity associated with the mobile communication network; evaluating, by the network entity, the collected geo information of the plural clients based on a rule: to determine whether the content delivery is to be adapted; and to identify a region for which the content delivery is to be adapted; selectively outputting, by the network entity, a message to a controlling entity in response to it being determined that the content delivery is to be adapted; controlling, by the controlling entity, the content delivery in response to receiving the message, so as to adapt the content delivery for clients located in the identified region. 25. The method of claim 24, wherein, in order to adapt the content delivery for the clients located in the identified region, the controlling entity generates a control message to at least one of: adapt a content delivery rate at which a content source provides content to the clients located in the identified region; perform a quality of service bearer adaptation in the mobile communication network over which content is delivered; prioritize clients located in the identified region based on subscription information. 26. The method of claim 25, wherein the controlling entity: selects a content delivery rate at which a content source delivers content to the clients in the region based on the received message; generates the control message based on the selected content delivery rate. 27. The method of claim 26, wherein different content delivery rates are selected for at least two different cells of the radio access network. 28. The method of claim 26: wherein the controlling entity transmits the control message to an execution point; wherein, in response to receiving the control message, the execution point directs a request for content coming from a client located in the identified region to a content server of the content source which is associated with the selected content delivery rate. 29. The method of claim 26: wherein the controlling entity sends the control message to the clients located in the identified region; wherein, in response to receiving the control message, the clients located in the identified region request the content from a content server of the content source which is associated with the selected content delivery rate. 30. The method of claim 24: wherein the evaluating comprises predicting a region affected by a congestion situation in the radio access network based on the collected geo information of the plural clients; wherein the controlling entity controls the content delivery to relieve congestion in the radio access network in the identified region. 31. The method of claim 24, further comprising providing, by the controlling entity, the rule to the network entity. 32. The method of claim 31, further comprising: receiving, by the controlling entity, quality reports from the plural clients to which the content is delivered; wherein the controlling entity modifies the rule based on the received quality reports. 33. A controlling entity configured to control content delivery to plural clients of a mobile communication network, the controlling entity comprising: an interface for communication with a network entity of the mobile communication network; a control circuit configured to: output a rule for evaluating geo information of the plural clients to the network entity over the interface; receive a message from the network entity over the interface, the message containing information on a location-dependent adaptation of the content delivery; adapt the content delivery in a location-dependent manner for clients located in a region based on the received message, the region determined based on the information. 34. The controlling entity of claim 33, wherein the control circuit is configured to generate a control message based on the received message to adapt a content delivery rate at which a content source provides content to the clients located in the region. 35. The controlling entity of claim 34: wherein the information comprises addresses of the clients located in the region; wherein the control circuit is configured to generate the control message based on the addresses. 36. The controlling entity of claim 35, wherein the control circuit is configured to send the control message to an execution point which receives a client request for content delivery, the control message comprising at least a subset of the addresses. 37. The controlling entity of claim 34: wherein the information comprises a region identifier for the region; wherein the control circuit is configured to send the control message to the clients located in the region. 38. The controlling entity of claim 37, wherein the control circuit is configured to generate the control message based on a content delivery rate selected based on the received message, the control message including at least one of a tag and a command to transmit a manifest file. 39. The controlling entity of claim 34, wherein the control circuit is configured to: generate a further control message based on the message; output the further control message to the mobile communication network to perform a Quality of Service bearer adaptation. 40. The controlling entity of claim 33, wherein the control circuit is configured to adapt the content delivery based on subscription types of the clients located in the region. 41. The controlling entity of claim 33, wherein the control circuit is configured to: evaluate quality reports received from the plural clients to which the content is delivered; adapt the rule based on the received quality reports; output the adapted rule to the network entity over the interface. 42. A network entity for a mobile communication network, the network entity comprising: a receiver configured to receive geo information of plural clients of a mobile communication network; an interface configured to receive a rule from a controlling entity controlling content delivery to the plural clients; a processing circuit configured to: evaluate the received geo information of the plural clients based on the received rule to: determine whether the content delivery is to be adapted; identify a region for which the content delivery is to be adapted; selectively output a message over the interface in response to it being determined that the content delivery is to be adapted. 43. The network entity of claim 42, wherein the processing circuit is configured to: predict regions affected by a congestion situation in a radio access network of the mobile communication network based on the collected geo information of the plural clients to identify the region; selectively output the message based on the predicted regions. 44. The network entity of claim 43, wherein the processing circuit is configured to respectively compare, for each of a plurality of regions, an indicator to at least one threshold to predict the regions affected by the congestion situation, the indicator indicative of a number of clients located in the corresponding region. 45. The network entity of claim 42, wherein the processing circuit is configured to: determine addresses of the clients located in the region; output the message including the determined addresses. 46. The network entity of claim 42, wherein the message includes an identifier of the region.
To control content delivery to plural clients ( 6 ) of a mobile communication network ( 1 ), a network entity ( 5 ) of the mobile communication network ( 1 ) collects geo information of the plural clients ( 6 ) and evaluates the collected geo information of the plural clients ( 6 ) based on a rule to determine whether the content delivery is to be adapted. The network entity ( 5 ) identifies a region for which the content delivery is to be adapted. The network entity ( 5 ) selectively outputs a message ( 9 ) to a controlling entity ( 10 ) if it is determined that the content delivery is to be adapted. The controlling entity ( 10 ) controls the content delivery in response to receiving the message ( 9 ), to adapt the content delivery for clients located in the identified region.1-23. (canceled) 24. A method of controlling content delivery to plural clients of a mobile communication network, the content being delivered to the plural clients over a radio access network of the mobile communication network, the method comprising: collecting geo information of the plural clients by a network entity associated with the mobile communication network; evaluating, by the network entity, the collected geo information of the plural clients based on a rule: to determine whether the content delivery is to be adapted; and to identify a region for which the content delivery is to be adapted; selectively outputting, by the network entity, a message to a controlling entity in response to it being determined that the content delivery is to be adapted; controlling, by the controlling entity, the content delivery in response to receiving the message, so as to adapt the content delivery for clients located in the identified region. 25. The method of claim 24, wherein, in order to adapt the content delivery for the clients located in the identified region, the controlling entity generates a control message to at least one of: adapt a content delivery rate at which a content source provides content to the clients located in the identified region; perform a quality of service bearer adaptation in the mobile communication network over which content is delivered; prioritize clients located in the identified region based on subscription information. 26. The method of claim 25, wherein the controlling entity: selects a content delivery rate at which a content source delivers content to the clients in the region based on the received message; generates the control message based on the selected content delivery rate. 27. The method of claim 26, wherein different content delivery rates are selected for at least two different cells of the radio access network. 28. The method of claim 26: wherein the controlling entity transmits the control message to an execution point; wherein, in response to receiving the control message, the execution point directs a request for content coming from a client located in the identified region to a content server of the content source which is associated with the selected content delivery rate. 29. The method of claim 26: wherein the controlling entity sends the control message to the clients located in the identified region; wherein, in response to receiving the control message, the clients located in the identified region request the content from a content server of the content source which is associated with the selected content delivery rate. 30. The method of claim 24: wherein the evaluating comprises predicting a region affected by a congestion situation in the radio access network based on the collected geo information of the plural clients; wherein the controlling entity controls the content delivery to relieve congestion in the radio access network in the identified region. 31. The method of claim 24, further comprising providing, by the controlling entity, the rule to the network entity. 32. The method of claim 31, further comprising: receiving, by the controlling entity, quality reports from the plural clients to which the content is delivered; wherein the controlling entity modifies the rule based on the received quality reports. 33. A controlling entity configured to control content delivery to plural clients of a mobile communication network, the controlling entity comprising: an interface for communication with a network entity of the mobile communication network; a control circuit configured to: output a rule for evaluating geo information of the plural clients to the network entity over the interface; receive a message from the network entity over the interface, the message containing information on a location-dependent adaptation of the content delivery; adapt the content delivery in a location-dependent manner for clients located in a region based on the received message, the region determined based on the information. 34. The controlling entity of claim 33, wherein the control circuit is configured to generate a control message based on the received message to adapt a content delivery rate at which a content source provides content to the clients located in the region. 35. The controlling entity of claim 34: wherein the information comprises addresses of the clients located in the region; wherein the control circuit is configured to generate the control message based on the addresses. 36. The controlling entity of claim 35, wherein the control circuit is configured to send the control message to an execution point which receives a client request for content delivery, the control message comprising at least a subset of the addresses. 37. The controlling entity of claim 34: wherein the information comprises a region identifier for the region; wherein the control circuit is configured to send the control message to the clients located in the region. 38. The controlling entity of claim 37, wherein the control circuit is configured to generate the control message based on a content delivery rate selected based on the received message, the control message including at least one of a tag and a command to transmit a manifest file. 39. The controlling entity of claim 34, wherein the control circuit is configured to: generate a further control message based on the message; output the further control message to the mobile communication network to perform a Quality of Service bearer adaptation. 40. The controlling entity of claim 33, wherein the control circuit is configured to adapt the content delivery based on subscription types of the clients located in the region. 41. The controlling entity of claim 33, wherein the control circuit is configured to: evaluate quality reports received from the plural clients to which the content is delivered; adapt the rule based on the received quality reports; output the adapted rule to the network entity over the interface. 42. A network entity for a mobile communication network, the network entity comprising: a receiver configured to receive geo information of plural clients of a mobile communication network; an interface configured to receive a rule from a controlling entity controlling content delivery to the plural clients; a processing circuit configured to: evaluate the received geo information of the plural clients based on the received rule to: determine whether the content delivery is to be adapted; identify a region for which the content delivery is to be adapted; selectively output a message over the interface in response to it being determined that the content delivery is to be adapted. 43. The network entity of claim 42, wherein the processing circuit is configured to: predict regions affected by a congestion situation in a radio access network of the mobile communication network based on the collected geo information of the plural clients to identify the region; selectively output the message based on the predicted regions. 44. The network entity of claim 43, wherein the processing circuit is configured to respectively compare, for each of a plurality of regions, an indicator to at least one threshold to predict the regions affected by the congestion situation, the indicator indicative of a number of clients located in the corresponding region. 45. The network entity of claim 42, wherein the processing circuit is configured to: determine addresses of the clients located in the region; output the message including the determined addresses. 46. The network entity of claim 42, wherein the message includes an identifier of the region.
2,400
6,920
6,920
14,307,808
2,497
A Virtual network computing (VNC) server receives a client launch request from a VNC client and provides a log-in page for display at the VNC client. The log-in page includes a graphical representation of a keyboard having a plurality of keys. Individual key designations at the keyboard are unique and are generated randomly in response to the client launch request. The VNC server receives pointing device movement coordinates from the VNC client; the movement coordinates indicating selection of individual keys at the keyboard by a user of the VNC client.
1. A method comprising: receiving, at a Virtual network computing (VNC) server, a client launch request from a VNC client; providing a log-in page for display at the VNC client in response to receiving the client launch request, the log-in page including display of a graphical representation of a keyboard having a plurality of keys, wherein individual key designations are unique and generated randomly in response to the client launch request; and receiving pointer device movement coordinates from the VNC client, the movement coordinates indicating selection of individual keys at the keyboard by a user of the VNC client. 2. The method of claim 1, further comprising: storing the randomly generated key designations at a memory device associated with the VNC server; and decoding the pointer device movement coordinates to determine log-in credentials provided by the user based on the stored key designations. 3. The method of claim 1, wherein the VNC server is a process executed at a service processor included at an information handling system. 4. The method of claim 3, wherein the VNC client is associated with a remote management server, the VNC client to establish authorized access at the information handling system. 5. The method of claim 1, further comprising receiving the client launch request over an un-encrypted communication network. 6. The method of claim 1, further comprising receiving the pointer device movement coordinates from the VNC client over an un-encrypted communication network. 7. The method of claim 1, further comprising authenticating log-in credentials associated with the VNC client based on the pointer device movement coordinates received from the VNC client. 8. The method of claim 1, further comprising disabling keyboard stroke detection at a physical keyboard associated an information handling system executing the VNC client. 9. An information handling system comprising: a network interface device; and a service processor, the service processor to implement a Virtual network computing (VNC) server, the VNC server to: receive, using the network interface device, a client launch request from a VNC client; provide a log-in page for display at the VNC client in response to receiving the client launch request, the log-in page including display of a graphical representation of a keyboard having a plurality of keys, wherein individual key designations are unique and generated randomly in response to the client launch request; and receive pointer device movement coordinates from the VNC client, the movement coordinates indicating selection of individual keys at the keyboard by a user of the VNC client. 10. The information handling system of claim 9, wherein the VNC server is further to: store the randomly generated key designations at a memory device associated with the VNC server; and decode the pointer device movement coordinates to determine log-in credentials provided by the user based on the stored key designations. 11. The information handling system of claim 9, wherein the VNC client is associated with a remote management server, the VNC client to establish authorized access at the information handling system. 12. The information handling system of claim 9, wherein the VNC server is further to receive the client launch request over an un-encrypted communication network. 13. The information handling system of claim 9, wherein the VNC server is further to receive the pointer device movement coordinates from the VNC client over an un-encrypted communication network. 14. The information handling system of claim 9, wherein the VNC server is further to authenticate log-in credentials associated with the VNC client based on the pointer device movement coordinates received from the VNC client. 15. The information handling system of claim 9, wherein the VNC server is further to disable keyboard stroke detection at a physical keyboard associated an information handling system executing the VNC client. 16. A non-transitory storage medium embodying a software program, the software program comprising instructions executable by a processor to implement a Virtual network computing (VNC) server, the VNC server to: receive a client launch request from a VNC client; provide a log-in page for display at the VNC client in response to receiving the client launch request, the log-in page including display of a graphical representation of a keyboard having a plurality of keys, wherein individual key designations are unique and generated randomly in response to the client launch request; and receive pointer device movement coordinates from the VNC client, the movement coordinates indicating selection of individual keys at the keyboard by a user of the VNC client 17. The non-transitory storage medium of claim 16, wherein the VNC server is further to: store the randomly generated key designations at a memory device associated with the VNC server; and decode the pointer device movement coordinates to determine log-in credentials provided by the user based on the stored key designations. 18. The non-transitory storage medium of claim 16, wherein the VNC server is a process executed at a service processor included at an information handling system. 19. The non-transitory storage medium of claim 16, wherein the VNC client is associated with a remote management server, the VNC client to establish authorized access at the information handling system. 20. The non-transitory storage medium of claim 16, wherein the VNC server is further to receive the client launch request over an un-encrypted communication network.
A Virtual network computing (VNC) server receives a client launch request from a VNC client and provides a log-in page for display at the VNC client. The log-in page includes a graphical representation of a keyboard having a plurality of keys. Individual key designations at the keyboard are unique and are generated randomly in response to the client launch request. The VNC server receives pointing device movement coordinates from the VNC client; the movement coordinates indicating selection of individual keys at the keyboard by a user of the VNC client.1. A method comprising: receiving, at a Virtual network computing (VNC) server, a client launch request from a VNC client; providing a log-in page for display at the VNC client in response to receiving the client launch request, the log-in page including display of a graphical representation of a keyboard having a plurality of keys, wherein individual key designations are unique and generated randomly in response to the client launch request; and receiving pointer device movement coordinates from the VNC client, the movement coordinates indicating selection of individual keys at the keyboard by a user of the VNC client. 2. The method of claim 1, further comprising: storing the randomly generated key designations at a memory device associated with the VNC server; and decoding the pointer device movement coordinates to determine log-in credentials provided by the user based on the stored key designations. 3. The method of claim 1, wherein the VNC server is a process executed at a service processor included at an information handling system. 4. The method of claim 3, wherein the VNC client is associated with a remote management server, the VNC client to establish authorized access at the information handling system. 5. The method of claim 1, further comprising receiving the client launch request over an un-encrypted communication network. 6. The method of claim 1, further comprising receiving the pointer device movement coordinates from the VNC client over an un-encrypted communication network. 7. The method of claim 1, further comprising authenticating log-in credentials associated with the VNC client based on the pointer device movement coordinates received from the VNC client. 8. The method of claim 1, further comprising disabling keyboard stroke detection at a physical keyboard associated an information handling system executing the VNC client. 9. An information handling system comprising: a network interface device; and a service processor, the service processor to implement a Virtual network computing (VNC) server, the VNC server to: receive, using the network interface device, a client launch request from a VNC client; provide a log-in page for display at the VNC client in response to receiving the client launch request, the log-in page including display of a graphical representation of a keyboard having a plurality of keys, wherein individual key designations are unique and generated randomly in response to the client launch request; and receive pointer device movement coordinates from the VNC client, the movement coordinates indicating selection of individual keys at the keyboard by a user of the VNC client. 10. The information handling system of claim 9, wherein the VNC server is further to: store the randomly generated key designations at a memory device associated with the VNC server; and decode the pointer device movement coordinates to determine log-in credentials provided by the user based on the stored key designations. 11. The information handling system of claim 9, wherein the VNC client is associated with a remote management server, the VNC client to establish authorized access at the information handling system. 12. The information handling system of claim 9, wherein the VNC server is further to receive the client launch request over an un-encrypted communication network. 13. The information handling system of claim 9, wherein the VNC server is further to receive the pointer device movement coordinates from the VNC client over an un-encrypted communication network. 14. The information handling system of claim 9, wherein the VNC server is further to authenticate log-in credentials associated with the VNC client based on the pointer device movement coordinates received from the VNC client. 15. The information handling system of claim 9, wherein the VNC server is further to disable keyboard stroke detection at a physical keyboard associated an information handling system executing the VNC client. 16. A non-transitory storage medium embodying a software program, the software program comprising instructions executable by a processor to implement a Virtual network computing (VNC) server, the VNC server to: receive a client launch request from a VNC client; provide a log-in page for display at the VNC client in response to receiving the client launch request, the log-in page including display of a graphical representation of a keyboard having a plurality of keys, wherein individual key designations are unique and generated randomly in response to the client launch request; and receive pointer device movement coordinates from the VNC client, the movement coordinates indicating selection of individual keys at the keyboard by a user of the VNC client 17. The non-transitory storage medium of claim 16, wherein the VNC server is further to: store the randomly generated key designations at a memory device associated with the VNC server; and decode the pointer device movement coordinates to determine log-in credentials provided by the user based on the stored key designations. 18. The non-transitory storage medium of claim 16, wherein the VNC server is a process executed at a service processor included at an information handling system. 19. The non-transitory storage medium of claim 16, wherein the VNC client is associated with a remote management server, the VNC client to establish authorized access at the information handling system. 20. The non-transitory storage medium of claim 16, wherein the VNC server is further to receive the client launch request over an un-encrypted communication network.
2,400
6,921
6,921
14,574,744
2,446
An apparatus includes first hardware configured to communicate, via a first interface, over a supervisory control network with one or more components of an industrial process control and automation system. The apparatus also includes second hardware configured to communicate, via a second interface, with a computing platform that virtualizes at least one other component of the industrial process control and automation system. The apparatus further includes a third interface configured to transport information between the first and second hardware.
1. An apparatus comprising: first hardware configured to communicate, via a first interface, over a supervisory control network with one or more components of an industrial process control and automation system; second hardware configured to communicate, via a second interface, with a computing platform that virtualizes at least one other component of the industrial process control and automation system; and a third interface configured to transport information between the first and second hardware. 2. The apparatus of claim 1, wherein: the first interface is configured to communicate over a local control network; and the second interface is configured to communicate over a redundant Ethernet network. 3. The apparatus of claim 1, wherein the apparatus is configured to provide a remote connection into the supervisory control network for the at least one other component virtualized by the computing platform. 4. The apparatus of claim 1, wherein: the first hardware comprises an emulated personality of a supervisory device that would communicate over the supervisory control network; and the second hardware comprises slot registers configured to store data being transferred to and from the emulated personality. 5. The apparatus of claim 4, wherein the second hardware is configured to perform one or more slot emulation tasks to support data transfer between the slot registers and the computing platform. 6. The apparatus of claim 1, wherein the third interface comprises a backplane of a chassis configured to receive the first and second hardware. 7. The apparatus of claim 1, wherein: the second hardware is configured to occupy a single slot of a chassis; and the second hardware supports multiple hardware interfaces and is configured to enable or disable each of the multiple hardware interfaces. 8. A system comprising: a network interface device comprising: first hardware configured to communicate, via a first interface, over a supervisory control network with one or more components of an industrial process control and automation system; second hardware; and a third interface configured to transport information between the first and second hardware; and a computing platform configured to virtualize at least one other component of the industrial process control and automation system; wherein the second hardware is configured to communicate, via a second interface, with the computing platform. 9. The system of claim 8, wherein: the first interface is configured to communicate over a local control network; and the second interface is configured to communicate over a redundant Ethernet network. 10. The system of claim 9, wherein the network interface device is configured to provide a remote connection into the supervisory control network for the at least one other component virtualized by the computing platform. 11. The system of claim 9, wherein: the first hardware comprises an emulated personality of a supervisory device that would communicate over the supervisory control network; and the second hardware comprises slot registers configured to store data being transferred to and from the emulated personality. 12. The system of claim 11, wherein the second hardware is configured to perform one or more slot emulation tasks to support data transfer between the slot registers and the computing platform. 13. The system of claim 12, wherein the computing platform comprises an emulator service configured to emulate a physical interface that is provided by the network interface device and that is expected by the at least one other component virtualized by the computing platform. 14. The system of claim 8, wherein: the third interface comprises a backplane of a chassis configured to receive the first and second hardware; the second hardware is configured to occupy a single slot of the chassis; and the second hardware supports multiple hardware interfaces and is configured to enable or disable each of the multiple hardware interfaces. 15. A method comprising: using first hardware of a network interface device to communicate, via a first interface, over a supervisory control network with one or more components of an industrial process control and automation system; using second hardware of the network interface device to communicate, via a second interface, with a computing platform that virtualizes at least one other component of the industrial process control and automation system; and transporting information between the first and second hardware using a third interface of the network interface device. 16. The method of claim 15, wherein the network interface device provides a remote connection into the supervisory control network for the at least one other component virtualized by the computing platform. 17. The method of claim 15, further comprising: emulating a personality of a supervisory device that would communicate over the supervisory control network using the first hardware; and storing data being transferred to and from the emulated personality using slot registers of the second hardware. 18. The method of claim 17, further comprising: performing one or more slot emulation tasks to support data transfer between the slot registers and the computing platform using the second hardware. 19. The method of claim 15, wherein the third interface comprises a backplane of a chassis configured to receive the first and second hardware. 20. The method of claim 15, wherein: the second hardware occupies a single slot of a chassis; the second hardware supports multiple hardware interfaces; and the method further comprises enabling or disabling each of the multiple hardware interfaces.
An apparatus includes first hardware configured to communicate, via a first interface, over a supervisory control network with one or more components of an industrial process control and automation system. The apparatus also includes second hardware configured to communicate, via a second interface, with a computing platform that virtualizes at least one other component of the industrial process control and automation system. The apparatus further includes a third interface configured to transport information between the first and second hardware.1. An apparatus comprising: first hardware configured to communicate, via a first interface, over a supervisory control network with one or more components of an industrial process control and automation system; second hardware configured to communicate, via a second interface, with a computing platform that virtualizes at least one other component of the industrial process control and automation system; and a third interface configured to transport information between the first and second hardware. 2. The apparatus of claim 1, wherein: the first interface is configured to communicate over a local control network; and the second interface is configured to communicate over a redundant Ethernet network. 3. The apparatus of claim 1, wherein the apparatus is configured to provide a remote connection into the supervisory control network for the at least one other component virtualized by the computing platform. 4. The apparatus of claim 1, wherein: the first hardware comprises an emulated personality of a supervisory device that would communicate over the supervisory control network; and the second hardware comprises slot registers configured to store data being transferred to and from the emulated personality. 5. The apparatus of claim 4, wherein the second hardware is configured to perform one or more slot emulation tasks to support data transfer between the slot registers and the computing platform. 6. The apparatus of claim 1, wherein the third interface comprises a backplane of a chassis configured to receive the first and second hardware. 7. The apparatus of claim 1, wherein: the second hardware is configured to occupy a single slot of a chassis; and the second hardware supports multiple hardware interfaces and is configured to enable or disable each of the multiple hardware interfaces. 8. A system comprising: a network interface device comprising: first hardware configured to communicate, via a first interface, over a supervisory control network with one or more components of an industrial process control and automation system; second hardware; and a third interface configured to transport information between the first and second hardware; and a computing platform configured to virtualize at least one other component of the industrial process control and automation system; wherein the second hardware is configured to communicate, via a second interface, with the computing platform. 9. The system of claim 8, wherein: the first interface is configured to communicate over a local control network; and the second interface is configured to communicate over a redundant Ethernet network. 10. The system of claim 9, wherein the network interface device is configured to provide a remote connection into the supervisory control network for the at least one other component virtualized by the computing platform. 11. The system of claim 9, wherein: the first hardware comprises an emulated personality of a supervisory device that would communicate over the supervisory control network; and the second hardware comprises slot registers configured to store data being transferred to and from the emulated personality. 12. The system of claim 11, wherein the second hardware is configured to perform one or more slot emulation tasks to support data transfer between the slot registers and the computing platform. 13. The system of claim 12, wherein the computing platform comprises an emulator service configured to emulate a physical interface that is provided by the network interface device and that is expected by the at least one other component virtualized by the computing platform. 14. The system of claim 8, wherein: the third interface comprises a backplane of a chassis configured to receive the first and second hardware; the second hardware is configured to occupy a single slot of the chassis; and the second hardware supports multiple hardware interfaces and is configured to enable or disable each of the multiple hardware interfaces. 15. A method comprising: using first hardware of a network interface device to communicate, via a first interface, over a supervisory control network with one or more components of an industrial process control and automation system; using second hardware of the network interface device to communicate, via a second interface, with a computing platform that virtualizes at least one other component of the industrial process control and automation system; and transporting information between the first and second hardware using a third interface of the network interface device. 16. The method of claim 15, wherein the network interface device provides a remote connection into the supervisory control network for the at least one other component virtualized by the computing platform. 17. The method of claim 15, further comprising: emulating a personality of a supervisory device that would communicate over the supervisory control network using the first hardware; and storing data being transferred to and from the emulated personality using slot registers of the second hardware. 18. The method of claim 17, further comprising: performing one or more slot emulation tasks to support data transfer between the slot registers and the computing platform using the second hardware. 19. The method of claim 15, wherein the third interface comprises a backplane of a chassis configured to receive the first and second hardware. 20. The method of claim 15, wherein: the second hardware occupies a single slot of a chassis; the second hardware supports multiple hardware interfaces; and the method further comprises enabling or disabling each of the multiple hardware interfaces.
2,400
6,922
6,922
13,448,871
2,442
Aspects of the disclosure relate to validation of a request for an asset based on information in the request. Validation of the request can be processed by a network node in a network repository that contains the asset. In one aspect, validation of the request can comprise determining if the request is legitimate based at least on processing at least a portion of the information in the request. In response to a legitimate request, the network node can process the request and, as a result, a data object associated with the asset can be supplied to a device originating the request. In the alternative, the network node can yield an exception.
1. An apparatus comprising: a memory having computer-executable instructions encoded thereon; and a processor functionally coupled to the memory and configured, by the computer-executable instructions, to receive a request for a data object from a first network node, the request comprising a first identifier (ID) indicative of a first value and a second identifier indicative of a second value, the first identifier being a key identifier, the first value comprising a key value and the second value comprising a reference hash value associated with the key value, to determine if the request is legitimate based at least on the second value, and to transmit the request to a second network node in response to determining the request is legitimate. 2. The apparatus of claim 1, wherein the processor is further configured to receive the data object from the second network node in response to the request being legitimate, the data object being a media content fragment. 3. The apparatus of claim 1, wherein the processor is further configured to transmit an error notification to the first network node in response to determining the request is non-legitimate. 4. The apparatus of claim 1, wherein to receive the request for the data object, the processor is configured to receive information representative of the data object, the information being formatted according to a specific communication protocol. 5. The apparatus of claim 4, wherein the information is formatted as a uniform resource locator (URL), a first portion of the URL comprising the first identifier and a second portion of the URL comprising the second identifier. 6. The apparatus of claim 1, wherein the reference hash value is a signed hash value, the key value signing, at least in part, reference hash value. 7. The apparatus of claim 1, wherein to determine if the request is legitimate based at least on the second value, the processor is further configured: to validate the key value; and in response to the key value being valid, to determine a checksum value by evaluating a function of data indicative of at least a portion of the information indicative of the data object, and to compare the checksum value with the reference hash value, the request being valid when the checksum value equals the reference hash value. 8. The apparatus of claim 7, wherein to validate the key value, the processor is configured to ascertain that the key value is present in a key-ID—key-value mapping relating at least one key identifier to at least one key value. 9. The apparatus of claim 7, wherein to determine the checksum value, the processor is configured to determine a hash value by performing a hash of at least a portion of the information indicative of the data object, the hash value being a signed hash value. 10. A method comprising: receiving, at a first network node, a request for a data object, the request comprising a first identifier (ID) indicative of a first value and a second identifier indicative of a second value, the first identifier being a key identifier, the first value comprising a key value and the second value comprising a reference hash value associated with the key value; determining, at the first network node, if the request is legitimate based at least on the second value; and transmitting, by the first network node, the request to a second network node in response to the request being determined to be legitimate. 11. The method of claim 10, further comprising receiving, at the first network node, the data object from the second network node in response to the transmitting action, wherein the data object is a media content fragment. 12. The method of claim 10, further comprising transmitting, by the first network node, an error notification to a third network node in response to the request being determined to be non-legitimate. 13. The method of claim 10, wherein the receiving action comprises receiving information indicative of the data object, the information being formatted according to a specific communication protocol. 14. The method of claim 13, wherein the information is formatted as a uniform resource locator (URL), a first portion of the URL comprising the first identifier and a second portion of the URL comprising the second identifier. 15. The method of claim 10, wherein the reference hash value is a signed hash value, the key value signing, at least in part, reference hash value. 16. The method of claim 13, wherein the determining action comprises determining a hash value by evaluating a hash function of the data indicative of at least a portion of the information in response to the key value being valid, the hash value being a signed hash value. 17. The method of claim 10, wherein the determining action comprises: validating, by the first network node, the key value; determining, by the first network node, a third value by evaluating a function of data indicative of at least a portion of the information in response to the first value being valid; and comparing the third value with the reference hash value, the request being valid when the third value equals the reference hash value. 18. The method of claim 17, wherein the validating action comprises ascertaining that the key value is present in a mapping relating at least one key identifier to at least one key value. 19. A method comprising: generating a request for a data object, the request comprising an identifier (ID) indicative of a first value, and a second value, the identifier comprising a key identifier, the first value comprising a key value and the second value comprising a predetermined hash value associated with the key value; and transmitting the request for the data object to a first network node, the first network node being configured to validate the request and to transmit the request to a second network node in response to the request being valid. 20. The method of claim 19, wherein the key value is included in an key-ID—key-value mapping relating at least one key identifier to at least one key value. 21. The method of claim 20, wherein the predetermined hash value is a signed hash value, the key value signing, at least in part, reference hash value. 22. The method of claim 19, wherein the generating action comprises formatting the request for the data object according to a specific communication protocol, the data object being a media content fragment. 23. The method of claim 22, wherein the formatting action comprises formatting the request for the data object according to a web-based communication protocol comprising at least one of hypertext transfer protocol (HTTP), simple object access protocol (SOAP), or simple network management protocol (SNMP).
Aspects of the disclosure relate to validation of a request for an asset based on information in the request. Validation of the request can be processed by a network node in a network repository that contains the asset. In one aspect, validation of the request can comprise determining if the request is legitimate based at least on processing at least a portion of the information in the request. In response to a legitimate request, the network node can process the request and, as a result, a data object associated with the asset can be supplied to a device originating the request. In the alternative, the network node can yield an exception.1. An apparatus comprising: a memory having computer-executable instructions encoded thereon; and a processor functionally coupled to the memory and configured, by the computer-executable instructions, to receive a request for a data object from a first network node, the request comprising a first identifier (ID) indicative of a first value and a second identifier indicative of a second value, the first identifier being a key identifier, the first value comprising a key value and the second value comprising a reference hash value associated with the key value, to determine if the request is legitimate based at least on the second value, and to transmit the request to a second network node in response to determining the request is legitimate. 2. The apparatus of claim 1, wherein the processor is further configured to receive the data object from the second network node in response to the request being legitimate, the data object being a media content fragment. 3. The apparatus of claim 1, wherein the processor is further configured to transmit an error notification to the first network node in response to determining the request is non-legitimate. 4. The apparatus of claim 1, wherein to receive the request for the data object, the processor is configured to receive information representative of the data object, the information being formatted according to a specific communication protocol. 5. The apparatus of claim 4, wherein the information is formatted as a uniform resource locator (URL), a first portion of the URL comprising the first identifier and a second portion of the URL comprising the second identifier. 6. The apparatus of claim 1, wherein the reference hash value is a signed hash value, the key value signing, at least in part, reference hash value. 7. The apparatus of claim 1, wherein to determine if the request is legitimate based at least on the second value, the processor is further configured: to validate the key value; and in response to the key value being valid, to determine a checksum value by evaluating a function of data indicative of at least a portion of the information indicative of the data object, and to compare the checksum value with the reference hash value, the request being valid when the checksum value equals the reference hash value. 8. The apparatus of claim 7, wherein to validate the key value, the processor is configured to ascertain that the key value is present in a key-ID—key-value mapping relating at least one key identifier to at least one key value. 9. The apparatus of claim 7, wherein to determine the checksum value, the processor is configured to determine a hash value by performing a hash of at least a portion of the information indicative of the data object, the hash value being a signed hash value. 10. A method comprising: receiving, at a first network node, a request for a data object, the request comprising a first identifier (ID) indicative of a first value and a second identifier indicative of a second value, the first identifier being a key identifier, the first value comprising a key value and the second value comprising a reference hash value associated with the key value; determining, at the first network node, if the request is legitimate based at least on the second value; and transmitting, by the first network node, the request to a second network node in response to the request being determined to be legitimate. 11. The method of claim 10, further comprising receiving, at the first network node, the data object from the second network node in response to the transmitting action, wherein the data object is a media content fragment. 12. The method of claim 10, further comprising transmitting, by the first network node, an error notification to a third network node in response to the request being determined to be non-legitimate. 13. The method of claim 10, wherein the receiving action comprises receiving information indicative of the data object, the information being formatted according to a specific communication protocol. 14. The method of claim 13, wherein the information is formatted as a uniform resource locator (URL), a first portion of the URL comprising the first identifier and a second portion of the URL comprising the second identifier. 15. The method of claim 10, wherein the reference hash value is a signed hash value, the key value signing, at least in part, reference hash value. 16. The method of claim 13, wherein the determining action comprises determining a hash value by evaluating a hash function of the data indicative of at least a portion of the information in response to the key value being valid, the hash value being a signed hash value. 17. The method of claim 10, wherein the determining action comprises: validating, by the first network node, the key value; determining, by the first network node, a third value by evaluating a function of data indicative of at least a portion of the information in response to the first value being valid; and comparing the third value with the reference hash value, the request being valid when the third value equals the reference hash value. 18. The method of claim 17, wherein the validating action comprises ascertaining that the key value is present in a mapping relating at least one key identifier to at least one key value. 19. A method comprising: generating a request for a data object, the request comprising an identifier (ID) indicative of a first value, and a second value, the identifier comprising a key identifier, the first value comprising a key value and the second value comprising a predetermined hash value associated with the key value; and transmitting the request for the data object to a first network node, the first network node being configured to validate the request and to transmit the request to a second network node in response to the request being valid. 20. The method of claim 19, wherein the key value is included in an key-ID—key-value mapping relating at least one key identifier to at least one key value. 21. The method of claim 20, wherein the predetermined hash value is a signed hash value, the key value signing, at least in part, reference hash value. 22. The method of claim 19, wherein the generating action comprises formatting the request for the data object according to a specific communication protocol, the data object being a media content fragment. 23. The method of claim 22, wherein the formatting action comprises formatting the request for the data object according to a web-based communication protocol comprising at least one of hypertext transfer protocol (HTTP), simple object access protocol (SOAP), or simple network management protocol (SNMP).
2,400
6,923
6,923
14,407,793
2,413
A guard period for switching between uplink and downlink subframes is created by shortening an uplink subframe, i.e., by not transmitting during one or more symbol intervals at the beginning of the subframe interval. A grant message includes signaling indicating when a shortened subframe should be transmitted. An example method is implemented in a first wireless node configured to transmit data in transmit subframes occurring at defined subframe intervals and having a predetermined number of symbol intervals. This example method includes determining ( 1620 ) that a transmit subframe is to be shortened, relative to the predetermined number of symbol intervals and, in response to this determination, shortening ( 1630 ) transmission of the transmit subframe by not transmitting during a beginning portion of the subframe interval for the transmit subframe and transmitting during the remainder of the subframe interval.
1. A method in a first wireless node configured to transmit data in transmit subframes occurring at defined subframe intervals and having a predetermined number of symbol intervals, the method comprising: determining that a transmit subframe is to be shortened, relative to the predetermined number of symbol intervals; and, in response to said determining, shortening transmission of the transmit subframe by not transmitting during one or more symbol intervals at the beginning of the subframe interval for the transmit subframe and transmitting during the remainder of the subframe interval. 2. The method of claim 1, wherein determining that the first transmit subframe is to be shortened comprises receiving, from a second wireless node, a grant message containing subframe-shortening information, the subframe-shortening information indicating that the transmit subframe is to be shortened. 3. The method of claim 2, wherein the subframe-shortening information consists of a single bit indicating that the transmit subframe is to be shortened by omitting a predetermined number of symbols from the beginning of the transmit subframe. 4. The method of claim 3, further comprising receiving configuration information from the second wireless node, prior to receiving the grant message, wherein the configuration information specifies the predetermined number. 5. The method of claim 2, wherein the subframe-shortening information specifies a number of symbols to be omitted at the beginning of the transmit subframe. 6. The method of claim 1, wherein determining that the transmit subframe is to be shortened comprises determining that a scheduled broadcast subframe is to be received in a receive subframe preceding and overlapping the transmit subframe. 7. A method in a first wireless node configured to receive data in receive subframes occurring at defined subframe intervals and having a predetermined number of symbol intervals, the method comprising: transmitting, to a second wireless node, a grant message containing subframe-shortening information, the subframe-shortening information indicating that a subframe transmitted by the second wireless node during a first subframe interval is to be shortened by omitting one or more symbols from the beginning of the transmitted subframe; and receiving a first shortened subframe from the second wireless node, during the first subframe interval, wherein the first shortened subframe is shortened, relative to the predetermined number of symbol intervals. 8. The method of claim 7, wherein the subframe-shortening information consists of a single bit indicating that the subframe transmitted during the first subframe interval is to be shortened by omitting a predetermined number of symbols from the beginning of the transmitted subframe. 9. The method of claim 8, further comprising transmitting configuration information, to the second wireless node, prior to transmitting the grant message, wherein the configuration information specifies a number of symbols to be omitted from the beginning of the subframe transmitted during the first subframe interval. 10. The method of claim 7, wherein the subframe-shortening information specifies a number of symbols to be omitted at the beginning of the subframe transmitted during the first subframe interval. 11. The method of claim 7, wherein receiving the shortened subframe comprises decoding data from the first shortened subframe, wherein said decoding comprises treating one or more omitted symbols at the beginning of the first subframe interval as punctured data. 12. The method of claim 7, wherein receiving the shortened subframe comprising retrieving decoded data from the first shortened subframe, wherein said retrieving comprises de-mapping data symbols from the first downlink subframe according to a de-mapping pattern that disregards omitted symbol intervals at the beginning of the first subframe interval and decoding the de-mapped data symbols. 13. The method of claim 7, further comprising transmitting a scheduled broadcast subframe during a second subframe interval and receiving a second shortened subframe during a third subframe interval immediately succeeding the second subframe interval. 14. A first wireless node, comprising a receiver circuit, a transmitter circuit configured to transmit data in transmit subframes occurring at defined subframe intervals and having a predetermined number of symbol intervals, and a processing circuit configured to control the receiver circuit and transmitter circuit, wherein the processing circuit is further configured to: determine that a transmit subframe is to be shortened, relative to the predetermined number of symbol intervals; and, in response to said determining, control the transmitter circuit to shorten transmission of the transmit subframe by not transmitting during one or more symbol intervals at the beginning of the subframe interval for the transmit subframe and transmitting during the remainder of the subframe interval. 15. The first wireless node of claim 14, wherein the processing circuit is configured to determine that the transmit subframe is to be shortened by receiving from a second wireless node, via the receiver circuit, a grant message containing subframe-shortening information, the subframe-shortening information indicating that the transmit subframe is to be shortened. 16. The first wireless node of claim 15, wherein the subframe-shortening information consists of a single bit indicating that the transmit subframe is to be shortened by omitting a predetermined number of symbols from the beginning of the transmit subframe. 17. The first wireless node of claim 16, wherein the processing circuit is further configured to receive configuration information from the second wireless node, via the receiver circuit, prior to receiving the grant message, wherein the configuration information specifies the predetermined number. 18. The first wireless node of claim 15, wherein the subframe-shortening information specifies a number of symbols to be omitted at the beginning of the transmit subframe. 19. The first wireless node of claim 14, wherein the processing circuit is configured to determine that the transmit subframe is to be shortened by determining that a scheduled broadcast subframe is to be received in a receive subframe preceding and overlapping the transmit subframe. 20. A first wireless node, comprising a transmitter circuit, a receiver circuit configured to receive data in receive subframes occurring at defined subframe intervals and having a predetermined number of symbol intervals, and a processing circuit configured to control the receiver circuit and the transmitter circuit, wherein the processing circuit is further configured to: transmit to a second wireless node, via the transmitter circuit, a grant message containing subframe-shortening information, the subframe-shortening information indicating that a subframe transmitted during a first subframe interval by the second wireless node is to be shortened; and receive a first shortened subframe from the second wireless node, via the receiver circuit, during the first subframe interval, wherein the first shortened subframe is shortened, relative to the predetermined number of symbol intervals. 21. The first wireless node of claim 20, wherein the subframe-shortening information consists of a single bit indicating that the subframe transmitted during the first subframe interval is to be shortened by omitting a predetermined number of symbols from the beginning of the transmitted subframe. 22. The first wireless node of claim 21, wherein the processor circuit is further configured to transmit configuration information to the second wireless node, via the transmitter circuit, prior to transmitting the grant message, wherein the configuration information specifies the predetermined number. 23. The first wireless node of claim 20, wherein the subframe-shortening information specifies a number of symbols to be omitted at the beginning of the subframe transmitted during the first subframe interval. 24. The first wireless node of claim 20, wherein the processing circuit is further configured to decode data from the first shortened subframe, wherein said decoding comprises treating one or more omitted symbols at the beginning of the first subframe interval as punctured data symbols. 25. The first wireless node of claim 20, wherein the processing circuit is further configured to retrieve decoded data from the first shortened subframe, wherein said retrieving comprises de-mapping data symbols from the first downlink subframe according to a de-mapping pattern that disregards omitted symbol intervals at the beginning of the first subframe interval and decoding the de-mapped data symbols. 26. The first wireless node of claim 20, wherein the processing circuit is further configured to control the transmitter circuit to transmit a scheduled broadcast subframe during a second subframe interval, and wherein the processing circuit is further configured to receive, via the receiver circuit, a second shortened subframe during a third subframe interval immediately succeeding the second subframe interval. 27. (canceled) 28. (canceled) 29. A non-transitory computer-readable medium having a computer program stored thereupon, the computer program comprising computer program code that, when executed by a wireless node configured to receive data in receive subframes occurring at defined subframe intervals and having a predetermined number of symbol intervals, causes the wireless node to perform the steps of: transmitting, to a second wireless node, a grant message containing subframe-shortening information, the subframe-shortening information indicating that a subframe transmitted by the second wireless node during a first subframe interval is to be shortened by omitting one or more symbols from the beginning of the transmitted subframe; and receiving a first shortened subframe from the second wireless node, during the first subframe interval, wherein the first shortened subframe is shortened, relative to the predetermined number of symbol intervals. 30. A non-transitory computer-readable medium having a computer program stored thereupon, the computer program comprising computer program code that, when executed by a wireless node configured to transmit data in transmit subframes occurring at defined subframe intervals and having a predetermined number of symbol intervals, causes the wireless node to perform the steps of: determining that a transmit subframe is to be shortened, relative to the predetermined number of symbol intervals; and, in response to said determining, shortening transmission of the transmit subframe by not transmitting during one or more symbol intervals at the beginning of the subframe interval for the transmit subframe and transmitting during the remainder of the subframe interval.
A guard period for switching between uplink and downlink subframes is created by shortening an uplink subframe, i.e., by not transmitting during one or more symbol intervals at the beginning of the subframe interval. A grant message includes signaling indicating when a shortened subframe should be transmitted. An example method is implemented in a first wireless node configured to transmit data in transmit subframes occurring at defined subframe intervals and having a predetermined number of symbol intervals. This example method includes determining ( 1620 ) that a transmit subframe is to be shortened, relative to the predetermined number of symbol intervals and, in response to this determination, shortening ( 1630 ) transmission of the transmit subframe by not transmitting during a beginning portion of the subframe interval for the transmit subframe and transmitting during the remainder of the subframe interval.1. A method in a first wireless node configured to transmit data in transmit subframes occurring at defined subframe intervals and having a predetermined number of symbol intervals, the method comprising: determining that a transmit subframe is to be shortened, relative to the predetermined number of symbol intervals; and, in response to said determining, shortening transmission of the transmit subframe by not transmitting during one or more symbol intervals at the beginning of the subframe interval for the transmit subframe and transmitting during the remainder of the subframe interval. 2. The method of claim 1, wherein determining that the first transmit subframe is to be shortened comprises receiving, from a second wireless node, a grant message containing subframe-shortening information, the subframe-shortening information indicating that the transmit subframe is to be shortened. 3. The method of claim 2, wherein the subframe-shortening information consists of a single bit indicating that the transmit subframe is to be shortened by omitting a predetermined number of symbols from the beginning of the transmit subframe. 4. The method of claim 3, further comprising receiving configuration information from the second wireless node, prior to receiving the grant message, wherein the configuration information specifies the predetermined number. 5. The method of claim 2, wherein the subframe-shortening information specifies a number of symbols to be omitted at the beginning of the transmit subframe. 6. The method of claim 1, wherein determining that the transmit subframe is to be shortened comprises determining that a scheduled broadcast subframe is to be received in a receive subframe preceding and overlapping the transmit subframe. 7. A method in a first wireless node configured to receive data in receive subframes occurring at defined subframe intervals and having a predetermined number of symbol intervals, the method comprising: transmitting, to a second wireless node, a grant message containing subframe-shortening information, the subframe-shortening information indicating that a subframe transmitted by the second wireless node during a first subframe interval is to be shortened by omitting one or more symbols from the beginning of the transmitted subframe; and receiving a first shortened subframe from the second wireless node, during the first subframe interval, wherein the first shortened subframe is shortened, relative to the predetermined number of symbol intervals. 8. The method of claim 7, wherein the subframe-shortening information consists of a single bit indicating that the subframe transmitted during the first subframe interval is to be shortened by omitting a predetermined number of symbols from the beginning of the transmitted subframe. 9. The method of claim 8, further comprising transmitting configuration information, to the second wireless node, prior to transmitting the grant message, wherein the configuration information specifies a number of symbols to be omitted from the beginning of the subframe transmitted during the first subframe interval. 10. The method of claim 7, wherein the subframe-shortening information specifies a number of symbols to be omitted at the beginning of the subframe transmitted during the first subframe interval. 11. The method of claim 7, wherein receiving the shortened subframe comprises decoding data from the first shortened subframe, wherein said decoding comprises treating one or more omitted symbols at the beginning of the first subframe interval as punctured data. 12. The method of claim 7, wherein receiving the shortened subframe comprising retrieving decoded data from the first shortened subframe, wherein said retrieving comprises de-mapping data symbols from the first downlink subframe according to a de-mapping pattern that disregards omitted symbol intervals at the beginning of the first subframe interval and decoding the de-mapped data symbols. 13. The method of claim 7, further comprising transmitting a scheduled broadcast subframe during a second subframe interval and receiving a second shortened subframe during a third subframe interval immediately succeeding the second subframe interval. 14. A first wireless node, comprising a receiver circuit, a transmitter circuit configured to transmit data in transmit subframes occurring at defined subframe intervals and having a predetermined number of symbol intervals, and a processing circuit configured to control the receiver circuit and transmitter circuit, wherein the processing circuit is further configured to: determine that a transmit subframe is to be shortened, relative to the predetermined number of symbol intervals; and, in response to said determining, control the transmitter circuit to shorten transmission of the transmit subframe by not transmitting during one or more symbol intervals at the beginning of the subframe interval for the transmit subframe and transmitting during the remainder of the subframe interval. 15. The first wireless node of claim 14, wherein the processing circuit is configured to determine that the transmit subframe is to be shortened by receiving from a second wireless node, via the receiver circuit, a grant message containing subframe-shortening information, the subframe-shortening information indicating that the transmit subframe is to be shortened. 16. The first wireless node of claim 15, wherein the subframe-shortening information consists of a single bit indicating that the transmit subframe is to be shortened by omitting a predetermined number of symbols from the beginning of the transmit subframe. 17. The first wireless node of claim 16, wherein the processing circuit is further configured to receive configuration information from the second wireless node, via the receiver circuit, prior to receiving the grant message, wherein the configuration information specifies the predetermined number. 18. The first wireless node of claim 15, wherein the subframe-shortening information specifies a number of symbols to be omitted at the beginning of the transmit subframe. 19. The first wireless node of claim 14, wherein the processing circuit is configured to determine that the transmit subframe is to be shortened by determining that a scheduled broadcast subframe is to be received in a receive subframe preceding and overlapping the transmit subframe. 20. A first wireless node, comprising a transmitter circuit, a receiver circuit configured to receive data in receive subframes occurring at defined subframe intervals and having a predetermined number of symbol intervals, and a processing circuit configured to control the receiver circuit and the transmitter circuit, wherein the processing circuit is further configured to: transmit to a second wireless node, via the transmitter circuit, a grant message containing subframe-shortening information, the subframe-shortening information indicating that a subframe transmitted during a first subframe interval by the second wireless node is to be shortened; and receive a first shortened subframe from the second wireless node, via the receiver circuit, during the first subframe interval, wherein the first shortened subframe is shortened, relative to the predetermined number of symbol intervals. 21. The first wireless node of claim 20, wherein the subframe-shortening information consists of a single bit indicating that the subframe transmitted during the first subframe interval is to be shortened by omitting a predetermined number of symbols from the beginning of the transmitted subframe. 22. The first wireless node of claim 21, wherein the processor circuit is further configured to transmit configuration information to the second wireless node, via the transmitter circuit, prior to transmitting the grant message, wherein the configuration information specifies the predetermined number. 23. The first wireless node of claim 20, wherein the subframe-shortening information specifies a number of symbols to be omitted at the beginning of the subframe transmitted during the first subframe interval. 24. The first wireless node of claim 20, wherein the processing circuit is further configured to decode data from the first shortened subframe, wherein said decoding comprises treating one or more omitted symbols at the beginning of the first subframe interval as punctured data symbols. 25. The first wireless node of claim 20, wherein the processing circuit is further configured to retrieve decoded data from the first shortened subframe, wherein said retrieving comprises de-mapping data symbols from the first downlink subframe according to a de-mapping pattern that disregards omitted symbol intervals at the beginning of the first subframe interval and decoding the de-mapped data symbols. 26. The first wireless node of claim 20, wherein the processing circuit is further configured to control the transmitter circuit to transmit a scheduled broadcast subframe during a second subframe interval, and wherein the processing circuit is further configured to receive, via the receiver circuit, a second shortened subframe during a third subframe interval immediately succeeding the second subframe interval. 27. (canceled) 28. (canceled) 29. A non-transitory computer-readable medium having a computer program stored thereupon, the computer program comprising computer program code that, when executed by a wireless node configured to receive data in receive subframes occurring at defined subframe intervals and having a predetermined number of symbol intervals, causes the wireless node to perform the steps of: transmitting, to a second wireless node, a grant message containing subframe-shortening information, the subframe-shortening information indicating that a subframe transmitted by the second wireless node during a first subframe interval is to be shortened by omitting one or more symbols from the beginning of the transmitted subframe; and receiving a first shortened subframe from the second wireless node, during the first subframe interval, wherein the first shortened subframe is shortened, relative to the predetermined number of symbol intervals. 30. A non-transitory computer-readable medium having a computer program stored thereupon, the computer program comprising computer program code that, when executed by a wireless node configured to transmit data in transmit subframes occurring at defined subframe intervals and having a predetermined number of symbol intervals, causes the wireless node to perform the steps of: determining that a transmit subframe is to be shortened, relative to the predetermined number of symbol intervals; and, in response to said determining, shortening transmission of the transmit subframe by not transmitting during one or more symbol intervals at the beginning of the subframe interval for the transmit subframe and transmitting during the remainder of the subframe interval.
2,400
6,924
6,924
14,478,633
2,488
A common surveillance system allows multiple users to share and communicate surveillance data with each other as well as with one or more agencies, such as law enforcement, hospitals, and/or emergency services. A geo-reference database stores image data from imaging devices. A computer-implemented user interface accesses the geo-reference database to present stored image data on a display device. The user interface generates a status-board display, accessible to a specific client computer, showing images relating to a time and/or location of a display view imaged from the imaging devices. A common-operating platform shows images with a time and/or location associated with each image and is globally accessible to multiple client computers via one or more data communication networks. Based on a user input, images may be shared real-time via a bridge between the status-board display and the common-operating platform.
1. A system for generating a common operating platform of a surveillance system for display by remote client devices, the system comprising: a processing system having at least processing circuitry, the processing system configured to: generate, for display on a display device, a client-specific status board having a customized surveillance platform including multiple display views from multiple surveillance sources, each of the multiple display views being associated with a time and place, generate, for display on the display device, the common operating platform comprising a map having multiple display views from multiple surveillance sources that are provided by the client devices, and communicate, in response to an operation input, one or more display views in real-time between the client-specific status board and the common operating platform. 2. The system according to claim 1, wherein a user can access the common operating platform based on display views and provide input data to the common operating platform. 3. The system according to claim 1, wherein the one or more processors are further configured to: set a status indicator for a view of the one or more display views shared between the common-surveillance system and the client-specific status board; and display the status indicator along with the shared view in the common-surveillance system and/or the client-specific status board. 4. The system according to claim 1, wherein the one or more processors are further configured to: associate a description for a view of the one or more display views shared between the common-surveillance system and the client-specific status board; and display the description along with the shared view in the common-surveillance system and/or the client-specific status board. 5. The system according to claim 1, wherein the one or more views originate from one or more mobile imaging devices that are configured to record an event indicating at least a time and a location of the event. 6. The system of claim 1, wherein the one or more processors are further configured to: image one or more payment cards using the one or more surveillance sources; generate data related to the one or more payment cards; and store the generated data and the imaged one or more payment cards in a database. 7. The system of claim 1, wherein the one or more processors are further configured to submit at least one image generated from the one or more surveillance sources to an emergency facility, the at least one image encoded to provide information relevant to an event requiring services of the emergency facility. 8. The system of claim 7, wherein the encoded information comprises at least one of a time of the event, a date of the event, a location of the event, an altitude of the surveillance source, a direction being viewed by the surveillance source, and/or a type of surveillance source. 9. The system according to claim 1, wherein the one or more display views from the one or more surveillance sources represent a single location. 10. The system according to claim 1, wherein the one or more display views from the one or more surveillance sources represent multiple locations. 11. A system, comprising: one or more geo-reference databases configured to store image data from one or more imaging devices; and a computer-implemented user interface configured to access the one or more geo-reference databases so that at least some of the stored image data may be presented via the user interface on a display device, the computer-implemented user interface configured to: generate a status-board display showing one or more images relating to a time and/or location of a display view imaged from the one or more imaging devices, the status-board display being accessible to a specific client computer; generate a common-operating platform showing one or more images having a time and/or location associated with each image, when the common-operating platform is globally accessible to multiple client computers via one or more data communication networks; designate, based on a user input, one or more images to be shared real-time via a bridge between the status-board display and the common-operating platform, the one or more images being represented in a first manner on the status-board display and represented in a second manner in the common-operating platform. 12. The system of claim 11, wherein the one or more images are represented in the first manner by showing thumbnail views of the one or more images. 13. The system of claim 11, wherein the one or more images are represented in the second manner by showing icons in a map based view corresponding to the one or more images. 14. A method implemented using an information processing apparatus having one or more processors and for generating a common operating platform of a surveillance system for display by remote client devices, the method comprising: generating, for display on a display device, a client-specific status board having a customized surveillance platform including multiple display views from multiple surveillance sources, each of the multiple display views being associated with a time and place; generating, for display on the display device, the common operating platform comprising a map having multiple display views from multiple surveillance sources that are provided by the client devices; and communicating, in response to an operation input, one or more display views in real-time between the client-specific status board and the common operating platform. 15. The method according to claim 14, wherein a user can access the common operating platform based on display views and provide input data to the common operating platform. 16. The method according to claim 14, further comprising: setting a status indicator for a view of the one or more display views shared between the common-surveillance system and the client-specific status board; and displaying the status indicator along with the shared view in the common-surveillance system and/or the client-specific status board. 17. The method according to claim 14, further comprising: associating a description for a view of the one or more display views shared between the common-surveillance system and the client-specific status board; and displaying the description along with the shared view in the common-surveillance system and/or the client-specific status board. 18. The method according to claim 14, wherein the one or more views originate from one or more mobile imaging devices that are configured to record an event indicating at least a time and a location of the event. 19. The method of claim 14, further comprising: imaging one or more payment cards using the one or more surveillance sources; generating data related to the one or more payment cards; and storing the generated data and the imaged one or more payment cards in a database. 20. The method of claim 14, wherein the one or more processors are further configured to submit at least one image generated from the one or more surveillance sources to an emergency facility, the at least one image encoded to provide information relevant to an event requiring services of the emergency facility.
A common surveillance system allows multiple users to share and communicate surveillance data with each other as well as with one or more agencies, such as law enforcement, hospitals, and/or emergency services. A geo-reference database stores image data from imaging devices. A computer-implemented user interface accesses the geo-reference database to present stored image data on a display device. The user interface generates a status-board display, accessible to a specific client computer, showing images relating to a time and/or location of a display view imaged from the imaging devices. A common-operating platform shows images with a time and/or location associated with each image and is globally accessible to multiple client computers via one or more data communication networks. Based on a user input, images may be shared real-time via a bridge between the status-board display and the common-operating platform.1. A system for generating a common operating platform of a surveillance system for display by remote client devices, the system comprising: a processing system having at least processing circuitry, the processing system configured to: generate, for display on a display device, a client-specific status board having a customized surveillance platform including multiple display views from multiple surveillance sources, each of the multiple display views being associated with a time and place, generate, for display on the display device, the common operating platform comprising a map having multiple display views from multiple surveillance sources that are provided by the client devices, and communicate, in response to an operation input, one or more display views in real-time between the client-specific status board and the common operating platform. 2. The system according to claim 1, wherein a user can access the common operating platform based on display views and provide input data to the common operating platform. 3. The system according to claim 1, wherein the one or more processors are further configured to: set a status indicator for a view of the one or more display views shared between the common-surveillance system and the client-specific status board; and display the status indicator along with the shared view in the common-surveillance system and/or the client-specific status board. 4. The system according to claim 1, wherein the one or more processors are further configured to: associate a description for a view of the one or more display views shared between the common-surveillance system and the client-specific status board; and display the description along with the shared view in the common-surveillance system and/or the client-specific status board. 5. The system according to claim 1, wherein the one or more views originate from one or more mobile imaging devices that are configured to record an event indicating at least a time and a location of the event. 6. The system of claim 1, wherein the one or more processors are further configured to: image one or more payment cards using the one or more surveillance sources; generate data related to the one or more payment cards; and store the generated data and the imaged one or more payment cards in a database. 7. The system of claim 1, wherein the one or more processors are further configured to submit at least one image generated from the one or more surveillance sources to an emergency facility, the at least one image encoded to provide information relevant to an event requiring services of the emergency facility. 8. The system of claim 7, wherein the encoded information comprises at least one of a time of the event, a date of the event, a location of the event, an altitude of the surveillance source, a direction being viewed by the surveillance source, and/or a type of surveillance source. 9. The system according to claim 1, wherein the one or more display views from the one or more surveillance sources represent a single location. 10. The system according to claim 1, wherein the one or more display views from the one or more surveillance sources represent multiple locations. 11. A system, comprising: one or more geo-reference databases configured to store image data from one or more imaging devices; and a computer-implemented user interface configured to access the one or more geo-reference databases so that at least some of the stored image data may be presented via the user interface on a display device, the computer-implemented user interface configured to: generate a status-board display showing one or more images relating to a time and/or location of a display view imaged from the one or more imaging devices, the status-board display being accessible to a specific client computer; generate a common-operating platform showing one or more images having a time and/or location associated with each image, when the common-operating platform is globally accessible to multiple client computers via one or more data communication networks; designate, based on a user input, one or more images to be shared real-time via a bridge between the status-board display and the common-operating platform, the one or more images being represented in a first manner on the status-board display and represented in a second manner in the common-operating platform. 12. The system of claim 11, wherein the one or more images are represented in the first manner by showing thumbnail views of the one or more images. 13. The system of claim 11, wherein the one or more images are represented in the second manner by showing icons in a map based view corresponding to the one or more images. 14. A method implemented using an information processing apparatus having one or more processors and for generating a common operating platform of a surveillance system for display by remote client devices, the method comprising: generating, for display on a display device, a client-specific status board having a customized surveillance platform including multiple display views from multiple surveillance sources, each of the multiple display views being associated with a time and place; generating, for display on the display device, the common operating platform comprising a map having multiple display views from multiple surveillance sources that are provided by the client devices; and communicating, in response to an operation input, one or more display views in real-time between the client-specific status board and the common operating platform. 15. The method according to claim 14, wherein a user can access the common operating platform based on display views and provide input data to the common operating platform. 16. The method according to claim 14, further comprising: setting a status indicator for a view of the one or more display views shared between the common-surveillance system and the client-specific status board; and displaying the status indicator along with the shared view in the common-surveillance system and/or the client-specific status board. 17. The method according to claim 14, further comprising: associating a description for a view of the one or more display views shared between the common-surveillance system and the client-specific status board; and displaying the description along with the shared view in the common-surveillance system and/or the client-specific status board. 18. The method according to claim 14, wherein the one or more views originate from one or more mobile imaging devices that are configured to record an event indicating at least a time and a location of the event. 19. The method of claim 14, further comprising: imaging one or more payment cards using the one or more surveillance sources; generating data related to the one or more payment cards; and storing the generated data and the imaged one or more payment cards in a database. 20. The method of claim 14, wherein the one or more processors are further configured to submit at least one image generated from the one or more surveillance sources to an emergency facility, the at least one image encoded to provide information relevant to an event requiring services of the emergency facility.
2,400
6,925
6,925
14,577,812
2,498
Systems and techniques for a System-on-a-Chip (SoC) security plugin are described herein. A component message may be received at an interconnect endpoint from an SoC component. The interconnect endpoint may pass the component message to a security component via a security interlink. The security component may secure the component message, using a cryptographic engine, to create a secured message. The secured message is delivered back to the interconnect endpoint via the security interlink and transmitted across the interconnect by the interconnect endpoint.
1. A security plugin for a system-on-a-chip platform, the security plugin comprising: a cryptographic circuit including: a cryptographic engine selected from a plurality of cryptographic engines; and a standard interface that is generic to the plurality of cryptographic engines, wherein, in operation, an unencrypted message from an initiator component received by a system-on-a-chip interconnect interface is provided to the cryptographic engine via the standard interface to produce an encrypted message that is transmitted to a destination component, the standard interface comprising: a messaging bus; and translator corresponding to the cryptographic engine, the translator, when in operation, to translate messages of the messaging bus to inputs of the cryptographic engine; a cryptographic controller to manage a cryptographic key used by the cryptographic engine to create the encrypted message; and a cryptographic state manager to manage cryptographic session states of a cryptographic session between the initiator component and the destination component. 2. The security plugin of claim 1, wherein the cryptographic circuit includes an integrity engine selected from a plurality of integrity engines, and wherein the standard interface is generic to the plurality of integrity engines. 3. The security plugin of claim 1, wherein the plurality of cryptographic engines includes a set of Advanced Encryption Standard cryptographic engines. 4. The security plugin of claim 1, wherein the plurality of cryptographic engines are classified by at least one of die size, power consumption, cost, throughput performance, or cryptographic performance. 5. The security plugin of claim 1, wherein the cryptographic controller is to negotiate with a communication peer to obtain a session key. 6. The security plugin of claim 1, wherein to manage cryptographic session states between the initiator component and the destination component includes the cryptographic state manager to maintain a data structure of cryptographic sessions, the data structure including fields for a destination component, a sequence number, and a session key. 7. The security plugin of claim 1, comprising an access controller to manage access rights of system-on-a-chip components, the access controller including: a security-attributes-of-the-initiators registry to store access rights of the system-on-a-chip components; and a filter to block the message in response to a determination that the initiator component does not have access to the destination component based on the security-attributes-of-the-initiators registry. 8. The security plugin of claim 1, comprising an interconnect message header analyzer to: determine whether a message received by the interconnect interface from another system-on-a-chip interconnect interface is an encrypted message; relay the message to the cryptographic circuit if the message is an encrypted message; and pass the message through to the interconnect interface if the message is not an encrypted message. 9. A method for a security plugin for a system-on-a-chip, the method comprising: receiving a component message at a bus endpoint from a system-on-a-chip component; passing, by the bus endpoint, the component message to a security component via a security interconnect; receiving the component message by the security component via the security interconnect; encrypting the component message using a cryptographic engine, the cryptographic engine being one of a plurality of cryptographic engines, the security interconnect being the same for all of the plurality of cryptographic engines, the encrypting including: transmitting the component message to the cryptographic engine by the security component via a messaging bus; translating a bus communication from the messaging bus to an input accepted by the cryptographic engine; translating an output of the cryptographic engine produced in response to the input to a second bus communication including an encrypted message form of the component message; communicating the encrypted message to the bus endpoint via the security interconnect; and transmitting the encrypted message across the interconnect by the bus endpoint. 10. The method of claim 9, wherein encrypting the component message includes adding a message integrity element from a message integrity circuit of the security component. 11. The method of claim 10 comprising: receiving a second encrypted message over the interconnect; relaying the second encrypted message to the security component to verify the integrity of the second encrypted message; and dropping the second encrypted message in response to being unable to verify the integrity of the second encrypted message. 12. The method of claim 9 comprising: receiving a second encrypted message over the interconnect; reading a message header for the second encrypted message to determine that it is encrypted; passing, by the bus endpoint, the second encrypted message to the security component via the security interconnect; decrypting, by the security component, the second encrypted message to create a second component message; and transmitting the second component message to the system-on-a-chip component. 13. The method of claim 9 comprising: receiving a second component message including an initiator identifier and a destination identifier; accessing a security-attributes-of-the-initiators registry to determine that an initiator component does not have access to a destination component based on the initiator identifier and the destination identifier; and discarding the second component message in response to the determination that an initiator component does not have access to a destination component. 14. The method of claim 9 comprising establishing a cryptographic session for a communications between the system-on-a-chip component and a destination component. 15. The method of claim 14, wherein a session key for the cryptographic session is used by the cryptographic engine to encrypt the component message, and wherein the session key corresponds to the communications stream and no other communications stream of the interconnect. 16. The method of claim 9, wherein every message traversing a bus to which the bus endpoint is a terminus is encrypted by respective security components in endpoints of the bus. 17. At least one non-transitory machine readable medium including instructions that, when executed by a machine, cause the machine to perform operations for a security plugin for a system-on-a-chip, the operations comprising: receiving a component message at a bus endpoint from a system-on-a-chip component; passing, by the bus endpoint, the component message to a security component via a security interconnect; receiving the component message by the security component via the security interconnect; encrypting the component message using a cryptographic engine, the cryptographic engine being one of a plurality of cryptographic engines, the security interconnect being the same for all of the plurality of cryptographic engines, the encrypting including: transmitting the component message to the cryptographic engine by the security component via a messaging bus; translating a bus communication from the messaging bus to an input accepted by the cryptographic engine; translating an output of the cryptographic engine produced in response to the input to a second bus communication including an encrypted message form of the component message; communicating the encrypted message to the bus endpoint via the security interconnect; and transmitting the encrypted message across the interconnect by the bus endpoint. 18. The at least one machine readable medium of claim 17, wherein encrypting the component message includes adding a message integrity element from a message integrity circuit of the security component. 19. The at least one machine readable medium of claim 18, wherein the operations comprise: receiving a second encrypted message over the interconnect; relaying the second encrypted message to the security component to verify the integrity of the second encrypted message; and dropping the second encrypted message in response to being unable to verify the integrity of the second encrypted message. 20. The at least one machine readable medium of claim 17, wherein the operations comprise: receiving a second encrypted message over the interconnect; reading a message header for the second encrypted message to determine that it is encrypted; passing, by the bus endpoint, the second encrypted message to the security component via the security interconnect; decrypting, by the security component, the second encrypted message to create a second component message; and transmitting the second component message to the system-on-a-chip component. 21. The at least one machine readable medium of claim 17, wherein the operations comprise: receiving a second component message including an initiator identifier and a destination identifier; accessing a security-attributes-of-the-initiators registry to determine that an initiator component does not have access to a destination component based on the initiator identifier and the destination identifier; and discarding the second component message in response to the determination that an initiator component does not have access to a destination component. 22. The at least one machine readable medium of claim 17, wherein the operations comprise establishing a cryptographic session for a communications between the system-on-a-chip component and a destination component. 23. The at least one machine readable medium of claim 22, wherein a session key for the cryptographic session is used by the cryptographic engine to encrypt the component message, and wherein the session key corresponds to the communications stream and no other communications stream of the interconnect. 24. The at least one machine readable medium of claim 17, wherein every message traversing a bus to which the bus endpoint is a terminus is encrypted by respective security components in endpoints of the bus.
Systems and techniques for a System-on-a-Chip (SoC) security plugin are described herein. A component message may be received at an interconnect endpoint from an SoC component. The interconnect endpoint may pass the component message to a security component via a security interlink. The security component may secure the component message, using a cryptographic engine, to create a secured message. The secured message is delivered back to the interconnect endpoint via the security interlink and transmitted across the interconnect by the interconnect endpoint.1. A security plugin for a system-on-a-chip platform, the security plugin comprising: a cryptographic circuit including: a cryptographic engine selected from a plurality of cryptographic engines; and a standard interface that is generic to the plurality of cryptographic engines, wherein, in operation, an unencrypted message from an initiator component received by a system-on-a-chip interconnect interface is provided to the cryptographic engine via the standard interface to produce an encrypted message that is transmitted to a destination component, the standard interface comprising: a messaging bus; and translator corresponding to the cryptographic engine, the translator, when in operation, to translate messages of the messaging bus to inputs of the cryptographic engine; a cryptographic controller to manage a cryptographic key used by the cryptographic engine to create the encrypted message; and a cryptographic state manager to manage cryptographic session states of a cryptographic session between the initiator component and the destination component. 2. The security plugin of claim 1, wherein the cryptographic circuit includes an integrity engine selected from a plurality of integrity engines, and wherein the standard interface is generic to the plurality of integrity engines. 3. The security plugin of claim 1, wherein the plurality of cryptographic engines includes a set of Advanced Encryption Standard cryptographic engines. 4. The security plugin of claim 1, wherein the plurality of cryptographic engines are classified by at least one of die size, power consumption, cost, throughput performance, or cryptographic performance. 5. The security plugin of claim 1, wherein the cryptographic controller is to negotiate with a communication peer to obtain a session key. 6. The security plugin of claim 1, wherein to manage cryptographic session states between the initiator component and the destination component includes the cryptographic state manager to maintain a data structure of cryptographic sessions, the data structure including fields for a destination component, a sequence number, and a session key. 7. The security plugin of claim 1, comprising an access controller to manage access rights of system-on-a-chip components, the access controller including: a security-attributes-of-the-initiators registry to store access rights of the system-on-a-chip components; and a filter to block the message in response to a determination that the initiator component does not have access to the destination component based on the security-attributes-of-the-initiators registry. 8. The security plugin of claim 1, comprising an interconnect message header analyzer to: determine whether a message received by the interconnect interface from another system-on-a-chip interconnect interface is an encrypted message; relay the message to the cryptographic circuit if the message is an encrypted message; and pass the message through to the interconnect interface if the message is not an encrypted message. 9. A method for a security plugin for a system-on-a-chip, the method comprising: receiving a component message at a bus endpoint from a system-on-a-chip component; passing, by the bus endpoint, the component message to a security component via a security interconnect; receiving the component message by the security component via the security interconnect; encrypting the component message using a cryptographic engine, the cryptographic engine being one of a plurality of cryptographic engines, the security interconnect being the same for all of the plurality of cryptographic engines, the encrypting including: transmitting the component message to the cryptographic engine by the security component via a messaging bus; translating a bus communication from the messaging bus to an input accepted by the cryptographic engine; translating an output of the cryptographic engine produced in response to the input to a second bus communication including an encrypted message form of the component message; communicating the encrypted message to the bus endpoint via the security interconnect; and transmitting the encrypted message across the interconnect by the bus endpoint. 10. The method of claim 9, wherein encrypting the component message includes adding a message integrity element from a message integrity circuit of the security component. 11. The method of claim 10 comprising: receiving a second encrypted message over the interconnect; relaying the second encrypted message to the security component to verify the integrity of the second encrypted message; and dropping the second encrypted message in response to being unable to verify the integrity of the second encrypted message. 12. The method of claim 9 comprising: receiving a second encrypted message over the interconnect; reading a message header for the second encrypted message to determine that it is encrypted; passing, by the bus endpoint, the second encrypted message to the security component via the security interconnect; decrypting, by the security component, the second encrypted message to create a second component message; and transmitting the second component message to the system-on-a-chip component. 13. The method of claim 9 comprising: receiving a second component message including an initiator identifier and a destination identifier; accessing a security-attributes-of-the-initiators registry to determine that an initiator component does not have access to a destination component based on the initiator identifier and the destination identifier; and discarding the second component message in response to the determination that an initiator component does not have access to a destination component. 14. The method of claim 9 comprising establishing a cryptographic session for a communications between the system-on-a-chip component and a destination component. 15. The method of claim 14, wherein a session key for the cryptographic session is used by the cryptographic engine to encrypt the component message, and wherein the session key corresponds to the communications stream and no other communications stream of the interconnect. 16. The method of claim 9, wherein every message traversing a bus to which the bus endpoint is a terminus is encrypted by respective security components in endpoints of the bus. 17. At least one non-transitory machine readable medium including instructions that, when executed by a machine, cause the machine to perform operations for a security plugin for a system-on-a-chip, the operations comprising: receiving a component message at a bus endpoint from a system-on-a-chip component; passing, by the bus endpoint, the component message to a security component via a security interconnect; receiving the component message by the security component via the security interconnect; encrypting the component message using a cryptographic engine, the cryptographic engine being one of a plurality of cryptographic engines, the security interconnect being the same for all of the plurality of cryptographic engines, the encrypting including: transmitting the component message to the cryptographic engine by the security component via a messaging bus; translating a bus communication from the messaging bus to an input accepted by the cryptographic engine; translating an output of the cryptographic engine produced in response to the input to a second bus communication including an encrypted message form of the component message; communicating the encrypted message to the bus endpoint via the security interconnect; and transmitting the encrypted message across the interconnect by the bus endpoint. 18. The at least one machine readable medium of claim 17, wherein encrypting the component message includes adding a message integrity element from a message integrity circuit of the security component. 19. The at least one machine readable medium of claim 18, wherein the operations comprise: receiving a second encrypted message over the interconnect; relaying the second encrypted message to the security component to verify the integrity of the second encrypted message; and dropping the second encrypted message in response to being unable to verify the integrity of the second encrypted message. 20. The at least one machine readable medium of claim 17, wherein the operations comprise: receiving a second encrypted message over the interconnect; reading a message header for the second encrypted message to determine that it is encrypted; passing, by the bus endpoint, the second encrypted message to the security component via the security interconnect; decrypting, by the security component, the second encrypted message to create a second component message; and transmitting the second component message to the system-on-a-chip component. 21. The at least one machine readable medium of claim 17, wherein the operations comprise: receiving a second component message including an initiator identifier and a destination identifier; accessing a security-attributes-of-the-initiators registry to determine that an initiator component does not have access to a destination component based on the initiator identifier and the destination identifier; and discarding the second component message in response to the determination that an initiator component does not have access to a destination component. 22. The at least one machine readable medium of claim 17, wherein the operations comprise establishing a cryptographic session for a communications between the system-on-a-chip component and a destination component. 23. The at least one machine readable medium of claim 22, wherein a session key for the cryptographic session is used by the cryptographic engine to encrypt the component message, and wherein the session key corresponds to the communications stream and no other communications stream of the interconnect. 24. The at least one machine readable medium of claim 17, wherein every message traversing a bus to which the bus endpoint is a terminus is encrypted by respective security components in endpoints of the bus.
2,400
6,926
6,926
13,498,480
2,458
An Application Execution Server and a method for managing a Background Process which is associated with a Rich Internet Application which is accessible via a Web Browser of an Internet Enabled User Device. The Application Execution Server comprises a Background Process Manager which is adapted to create a Background Process, in response to receiving a request for such a process from the Rich Internet Application, the Background Process being adapted to recognize a triggered event associated with said associated rich Internet application and to invoke the Rich Internet Application, irrespective of whether the Web Browser and/or the Rich Internet Application is presently running or not.
1.-21. (canceled) 22. An application execution server configured to manage a background process associated with a rich Internet application that is accessible via a web browser of an Internet-enabled user device, wherein the application execution server comprises a background process manager configured to: create the background process in response to receiving a request for such a process from the rich Internet application; recognize a triggered event associated with said rich Internet application; and invoke said rich Internet application irrespective of whether or not at least one of the web browser and the rich Internet application is running. 23. The application execution server according to claim 22, wherein the background process manager is configured to create said background process by acquiring executable code according to said request and executing said code. 24. The application execution server according to claim 23, wherein the background process manager is configured to acquire said code from a server. 25. The application execution server according to claim 24, wherein the background process manager is configured to identify the server by extracting a URL from the received request. 26. The application execution server according to claim 22, wherein the background process manager is further configured to enable interaction between the background process and the rich Internet application. 27. The application execution server according to claim 22, wherein the background process manager further comprises a server network function configured to enable communication between the background process and the rich Internet application by supporting a persistent communication channel. 28. The application execution server according to claim 22, wherein the application execution server is configured as an integrated part of said Internet-enabled user device. 29. The application execution server according to claim 22, wherein the application execution server is configured as a standalone network entity, and is configured to establish communication with said Internet-enabled user device. 30. The application execution server according to claim 22, wherein the background process manager is configured to invoke said rich Internet application responsive to recognizing said triggered event. 31. An Internet-enabled user device configured to enable communication between a rich Internet application that is accessible via a web browser and an associated background process that resides on an application execution server, wherein the Internet-enabled user device comprises: a user interface; and a persistent rich Internet application manager configured to: request said background process to be created at said application execution server; request a persistent artifact associated with said background process to be set-up on said user interface; and support communication between the background process and the associated persistent artifact, irrespective of whether or not at least one of the web browser and the rich Internet application is running. 32. The Internet-enabled user device according to claim 31, wherein the persistent rich Internet application manager is configured to receive a request for creating the background process from the rich Internet application or from the web browser. 33. The Internet-enabled user device according to claim 31, wherein the persistent rich Internet application manager further comprises a client network function configured to enable persistent communication between the rich Internet application and the background process by providing a persistent communication channel between the persistent rich Internet application manager and the application execution server. 34. The Internet-enabled user device according to claim 33, wherein the persistent rich Internet application manager is configured to perform one or more functions according to instructions associated with the rich Internet application, said instructions being provided to the persistent rich Internet application manager from the background process via the persistent communication channel. 35. The Internet-enabled user device according to claim 34, wherein said client network function is configured to enable persistent communication by applying a remote procedure call mechanism or a representative state transfer mechanism. 36. The Internet-enabled user device according to claim 34, wherein the persistent rich Internet application manager is configured to acquire executable code according to said instructions and to execute said code. 37. The Internet-enabled user device according to claim 31, wherein the persistent rich Internet application manager is further configured to interact with at least one device interface of said Internet-enabled user device, according to instructions provided from said background process. 38. The Internet-enabled user device according to claim 31, wherein the Internet-enabled user device is any of a fixed or wireless user device. 39. A method performed by an application execution server for managing a background process that is associated with a rich Internet application executed on an Internet-enabled user device, wherein the method comprises: receiving a request for said background process from the rich Internet application; and creating, by executing instructions in accordance with said request, said background process to recognize a triggered event associated with said rich Internet application and to invoke said rich Internet application irrespective of whether or not at least one of the web browser and the rich Internet application is running. 40. The method according to claim 39, further comprising: receiving a notification request from said background process requesting a notification associated with said rich Internet application, said notification request being triggered by said event; and transmitting said notification request to said Internet-enabled user device, thereby enabling notification of said event at said Internet-enabled user device. 41. A method executed by an Internet-enabled user device for enabling communication between a rich Internet application accessible via a web browser of the Internet-enabled user device and an associated background process residing on an application execution server, wherein the method comprises: receiving a request from the rich Internet application for creating said background process; setting up a perceptible artifact associated with said background process on a user interface of the Internet-enabled user device; according to the received request, sending a request to said application execution server requesting that the application execution server create said background process; and managing communication between the background process and the perceptible artifact in response to receiving a notification from the background process, irrespective of whether or not at least one of the web browser and the rich Internet application is running. 42. The method according to claim 41, wherein said managing comprises: receiving a message comprising a notification from said application execution server; notifying said rich Internet application; and supporting communication between the persistent rich Internet application manager and the rich Internet application according to pre-defined instructions, if said notification is approved with as indicated via the perceptible artifact. 43. The method according to claim 41, further comprising processing background process communication messages communicated between the background process and a device Interface of the Internet-enabled user device.
An Application Execution Server and a method for managing a Background Process which is associated with a Rich Internet Application which is accessible via a Web Browser of an Internet Enabled User Device. The Application Execution Server comprises a Background Process Manager which is adapted to create a Background Process, in response to receiving a request for such a process from the Rich Internet Application, the Background Process being adapted to recognize a triggered event associated with said associated rich Internet application and to invoke the Rich Internet Application, irrespective of whether the Web Browser and/or the Rich Internet Application is presently running or not.1.-21. (canceled) 22. An application execution server configured to manage a background process associated with a rich Internet application that is accessible via a web browser of an Internet-enabled user device, wherein the application execution server comprises a background process manager configured to: create the background process in response to receiving a request for such a process from the rich Internet application; recognize a triggered event associated with said rich Internet application; and invoke said rich Internet application irrespective of whether or not at least one of the web browser and the rich Internet application is running. 23. The application execution server according to claim 22, wherein the background process manager is configured to create said background process by acquiring executable code according to said request and executing said code. 24. The application execution server according to claim 23, wherein the background process manager is configured to acquire said code from a server. 25. The application execution server according to claim 24, wherein the background process manager is configured to identify the server by extracting a URL from the received request. 26. The application execution server according to claim 22, wherein the background process manager is further configured to enable interaction between the background process and the rich Internet application. 27. The application execution server according to claim 22, wherein the background process manager further comprises a server network function configured to enable communication between the background process and the rich Internet application by supporting a persistent communication channel. 28. The application execution server according to claim 22, wherein the application execution server is configured as an integrated part of said Internet-enabled user device. 29. The application execution server according to claim 22, wherein the application execution server is configured as a standalone network entity, and is configured to establish communication with said Internet-enabled user device. 30. The application execution server according to claim 22, wherein the background process manager is configured to invoke said rich Internet application responsive to recognizing said triggered event. 31. An Internet-enabled user device configured to enable communication between a rich Internet application that is accessible via a web browser and an associated background process that resides on an application execution server, wherein the Internet-enabled user device comprises: a user interface; and a persistent rich Internet application manager configured to: request said background process to be created at said application execution server; request a persistent artifact associated with said background process to be set-up on said user interface; and support communication between the background process and the associated persistent artifact, irrespective of whether or not at least one of the web browser and the rich Internet application is running. 32. The Internet-enabled user device according to claim 31, wherein the persistent rich Internet application manager is configured to receive a request for creating the background process from the rich Internet application or from the web browser. 33. The Internet-enabled user device according to claim 31, wherein the persistent rich Internet application manager further comprises a client network function configured to enable persistent communication between the rich Internet application and the background process by providing a persistent communication channel between the persistent rich Internet application manager and the application execution server. 34. The Internet-enabled user device according to claim 33, wherein the persistent rich Internet application manager is configured to perform one or more functions according to instructions associated with the rich Internet application, said instructions being provided to the persistent rich Internet application manager from the background process via the persistent communication channel. 35. The Internet-enabled user device according to claim 34, wherein said client network function is configured to enable persistent communication by applying a remote procedure call mechanism or a representative state transfer mechanism. 36. The Internet-enabled user device according to claim 34, wherein the persistent rich Internet application manager is configured to acquire executable code according to said instructions and to execute said code. 37. The Internet-enabled user device according to claim 31, wherein the persistent rich Internet application manager is further configured to interact with at least one device interface of said Internet-enabled user device, according to instructions provided from said background process. 38. The Internet-enabled user device according to claim 31, wherein the Internet-enabled user device is any of a fixed or wireless user device. 39. A method performed by an application execution server for managing a background process that is associated with a rich Internet application executed on an Internet-enabled user device, wherein the method comprises: receiving a request for said background process from the rich Internet application; and creating, by executing instructions in accordance with said request, said background process to recognize a triggered event associated with said rich Internet application and to invoke said rich Internet application irrespective of whether or not at least one of the web browser and the rich Internet application is running. 40. The method according to claim 39, further comprising: receiving a notification request from said background process requesting a notification associated with said rich Internet application, said notification request being triggered by said event; and transmitting said notification request to said Internet-enabled user device, thereby enabling notification of said event at said Internet-enabled user device. 41. A method executed by an Internet-enabled user device for enabling communication between a rich Internet application accessible via a web browser of the Internet-enabled user device and an associated background process residing on an application execution server, wherein the method comprises: receiving a request from the rich Internet application for creating said background process; setting up a perceptible artifact associated with said background process on a user interface of the Internet-enabled user device; according to the received request, sending a request to said application execution server requesting that the application execution server create said background process; and managing communication between the background process and the perceptible artifact in response to receiving a notification from the background process, irrespective of whether or not at least one of the web browser and the rich Internet application is running. 42. The method according to claim 41, wherein said managing comprises: receiving a message comprising a notification from said application execution server; notifying said rich Internet application; and supporting communication between the persistent rich Internet application manager and the rich Internet application according to pre-defined instructions, if said notification is approved with as indicated via the perceptible artifact. 43. The method according to claim 41, further comprising processing background process communication messages communicated between the background process and a device Interface of the Internet-enabled user device.
2,400
6,927
6,927
14,547,476
2,449
A plurality of devices are connected to a network and are controlled by a plurality of controllers, information is efficiently shared so that the control using the controllers is made to be easy. Any one of the devices is set as a host device and it distributes identical share information to another device. When a controller is connected to any device and this device is connected to a service server, the device is registered as a source device in the share information. When another controller is connected to any device other than the source device, this device refers to the share information so as to specify the source device and register account information of another controller as share information. The source device is connected to the service server by using account information in the share information.
1. An information sharing system without a server comprising: a plurality of network devices, wherein each of the plurality of network devices includes a processor, a storage unit, and a communication interface, identical share information is stored in each of the storage units of the plurality of network devices, when a first controller in a plurality of controllers is connected to a first network device of the plurality of network devices, the processor of the first network device connects to a service server, and distributes source device information representing the connection to the service server as share information to another network device via the communication interface, when the second controller of the plurality of controllers is connected to a second network device of the plurality of network devices, the processor of the second network device reads the source device information as the share information from the storage unit, and processes a request from the second controller. 2. The information sharing system according to claim 1, wherein the processor of the second network device distributes account information of the second controller as share information to another network device, and when receiving a request of connection to the service server from the second controller, the processor transmits the request of the connection to the service server to the first network device based on the source device information as the share information, when receiving the request of connection to the service server from the processor of the second network device, the processor of the first network device makes the connection to the service server using the account information of the second controller as the share information. 3. The information sharing system according to claim 1, wherein when receiving a screen request from the second controller, the processor of the second network device transmits the screen request to the first network device based on the source device information as the share information, when receiving the screen request from the processor of the second network device, the processor of the first network device transmits screen information transmitted to the first controller to the second network device. 4. The information sharing system according to claim 1, wherein the processor of any device of the plurality of network devices distributes information stored in the storage unit as share information to another device via the communication interface.
A plurality of devices are connected to a network and are controlled by a plurality of controllers, information is efficiently shared so that the control using the controllers is made to be easy. Any one of the devices is set as a host device and it distributes identical share information to another device. When a controller is connected to any device and this device is connected to a service server, the device is registered as a source device in the share information. When another controller is connected to any device other than the source device, this device refers to the share information so as to specify the source device and register account information of another controller as share information. The source device is connected to the service server by using account information in the share information.1. An information sharing system without a server comprising: a plurality of network devices, wherein each of the plurality of network devices includes a processor, a storage unit, and a communication interface, identical share information is stored in each of the storage units of the plurality of network devices, when a first controller in a plurality of controllers is connected to a first network device of the plurality of network devices, the processor of the first network device connects to a service server, and distributes source device information representing the connection to the service server as share information to another network device via the communication interface, when the second controller of the plurality of controllers is connected to a second network device of the plurality of network devices, the processor of the second network device reads the source device information as the share information from the storage unit, and processes a request from the second controller. 2. The information sharing system according to claim 1, wherein the processor of the second network device distributes account information of the second controller as share information to another network device, and when receiving a request of connection to the service server from the second controller, the processor transmits the request of the connection to the service server to the first network device based on the source device information as the share information, when receiving the request of connection to the service server from the processor of the second network device, the processor of the first network device makes the connection to the service server using the account information of the second controller as the share information. 3. The information sharing system according to claim 1, wherein when receiving a screen request from the second controller, the processor of the second network device transmits the screen request to the first network device based on the source device information as the share information, when receiving the screen request from the processor of the second network device, the processor of the first network device transmits screen information transmitted to the first controller to the second network device. 4. The information sharing system according to claim 1, wherein the processor of any device of the plurality of network devices distributes information stored in the storage unit as share information to another device via the communication interface.
2,400
6,928
6,928
15,465,004
2,447
A method for scheduling a meeting using an email client that is part of an email system includes receiving a request at the email client to schedule the meeting. The request may include an indication of the resources that are to be provided by a conferencing system for the meeting. The method also includes communicating the request to a conference bridge that is part of the conferencing system and receiving from the conference bridge an access code associated with the meeting. The method also includes appending the access code to a meeting invitation associated with the meeting and providing the meeting invitation to an email server that is part of the email system. The method also includes sending the meeting invitation to users invited to participate in the meeting.
1-24. (canceled) 25. A method comprising: at an email client that is part of an email system, receiving a request to schedule a meeting, wherein the request includes a schedule for the meeting and specifies resources that are to be used during the meeting by a conferencing system, the resources that are specified in the request include at least one of video conferencing or desktop sharing, and the email system is separate from the conferencing system; from the email client, communicating the request directly to a conference bridge that is part of the conferencing system, wherein the request is communicated from the email client directly to the conference bridge by a plug-in associated with the email client; at the email client, receiving directly from the conference bridge an access code associated with the meeting; at the email client, automatically appending the access code to a subject line of a meeting invitation associated with the meeting; from the email client, providing the meeting invitation including the access code to an email server that is part of the email system; and from the email server, sending the meeting invitation including the access code to users invited to participate in the meeting. 26. The method of claim 25, wherein a computing platform of the email system is different from a computing platform of the conferencing system. 27. The method of claim 25 wherein the access code includes a code portion and a uniform resource identifier (URI) portion. 28. The method of claim 25 wherein the access code includes at least one of a host access code, a moderator access code, or a participant access code. 29. The method of claim 25 wherein the meeting request is a request to schedule a new meeting that has not been previously scheduled. 30. The method of claim 25 wherein the meeting request is a request to change at least one of a schedule or the resources of a previously scheduled meeting. 31. A method comprising: from an email client that is part of an email system, communicating a meeting request directly to a conference bridge of a conferencing system, wherein the meeting request is communicated from the email client directly to the conference bridge by a plug-in associated with the email client, the meeting request is generated at the email client by a user of the email client, the meeting request specifies resources that are to be used during the meeting by the conferencing system, the resources that are specified in the meeting request include at least one of video conferencing or desktop sharing, and the email system is separate from the conferencing system; at the email client, receiving an access code associated with the meeting directly from the conference bridge; at the email client, automatically appending the access code to a meeting invitation associated with the meeting, the meeting invitation generated by the email client; and from the email client, communicating the meeting invitation to users invited to participate in the meeting. 32. The method of claim 31 wherein a computing platform of the email system is different from a computing platform of the conferencing system. 33. The method of claim 31 wherein the access code is appended to a subject line of the meeting invitation. 34. The method of claim 31 wherein the access code is appended to a body of the meeting invitation. 35. The method of claim 31 wherein the access code includes a code portion and a uniform resource identifier (URI) portion. 36. The method of claim 31 wherein the access code includes at least one of a host access code, a moderator access code, or a participant access code. 37. The method of claim 31 wherein the meeting request is a request to schedule a new meeting that has not been previously scheduled. 38. The method of claim 31 wherein the meeting request is a request to change at least one of a schedule or the resources of a previously scheduled meeting.
A method for scheduling a meeting using an email client that is part of an email system includes receiving a request at the email client to schedule the meeting. The request may include an indication of the resources that are to be provided by a conferencing system for the meeting. The method also includes communicating the request to a conference bridge that is part of the conferencing system and receiving from the conference bridge an access code associated with the meeting. The method also includes appending the access code to a meeting invitation associated with the meeting and providing the meeting invitation to an email server that is part of the email system. The method also includes sending the meeting invitation to users invited to participate in the meeting.1-24. (canceled) 25. A method comprising: at an email client that is part of an email system, receiving a request to schedule a meeting, wherein the request includes a schedule for the meeting and specifies resources that are to be used during the meeting by a conferencing system, the resources that are specified in the request include at least one of video conferencing or desktop sharing, and the email system is separate from the conferencing system; from the email client, communicating the request directly to a conference bridge that is part of the conferencing system, wherein the request is communicated from the email client directly to the conference bridge by a plug-in associated with the email client; at the email client, receiving directly from the conference bridge an access code associated with the meeting; at the email client, automatically appending the access code to a subject line of a meeting invitation associated with the meeting; from the email client, providing the meeting invitation including the access code to an email server that is part of the email system; and from the email server, sending the meeting invitation including the access code to users invited to participate in the meeting. 26. The method of claim 25, wherein a computing platform of the email system is different from a computing platform of the conferencing system. 27. The method of claim 25 wherein the access code includes a code portion and a uniform resource identifier (URI) portion. 28. The method of claim 25 wherein the access code includes at least one of a host access code, a moderator access code, or a participant access code. 29. The method of claim 25 wherein the meeting request is a request to schedule a new meeting that has not been previously scheduled. 30. The method of claim 25 wherein the meeting request is a request to change at least one of a schedule or the resources of a previously scheduled meeting. 31. A method comprising: from an email client that is part of an email system, communicating a meeting request directly to a conference bridge of a conferencing system, wherein the meeting request is communicated from the email client directly to the conference bridge by a plug-in associated with the email client, the meeting request is generated at the email client by a user of the email client, the meeting request specifies resources that are to be used during the meeting by the conferencing system, the resources that are specified in the meeting request include at least one of video conferencing or desktop sharing, and the email system is separate from the conferencing system; at the email client, receiving an access code associated with the meeting directly from the conference bridge; at the email client, automatically appending the access code to a meeting invitation associated with the meeting, the meeting invitation generated by the email client; and from the email client, communicating the meeting invitation to users invited to participate in the meeting. 32. The method of claim 31 wherein a computing platform of the email system is different from a computing platform of the conferencing system. 33. The method of claim 31 wherein the access code is appended to a subject line of the meeting invitation. 34. The method of claim 31 wherein the access code is appended to a body of the meeting invitation. 35. The method of claim 31 wherein the access code includes a code portion and a uniform resource identifier (URI) portion. 36. The method of claim 31 wherein the access code includes at least one of a host access code, a moderator access code, or a participant access code. 37. The method of claim 31 wherein the meeting request is a request to schedule a new meeting that has not been previously scheduled. 38. The method of claim 31 wherein the meeting request is a request to change at least one of a schedule or the resources of a previously scheduled meeting.
2,400
6,929
6,929
14,461,520
2,488
A method and apparatus for video coding using motion-compensated partitioning is provided. Video coding using motion-compensated partitioning may include identifying a current block of a current frame of an input video stream, generating an encoded block by encoding the current block using motion-compensated partitioning, wherein encoding the current block using motion-compensated partitioning includes, generating coarse motion estimation information for the current block, partitioning the current block, generating fine motion estimation information for the current block, and transmitting or storing the encoded block.
1. A method comprising: identifying a current block of a current frame of an input video stream; generating, by a processor in response to instructions stored on a non-transitory computer readable medium, an encoded block by encoding the current block using motion-compensated partitioning, wherein encoding the current block using motion-compensated partitioning includes: generating coarse motion estimation information for the current block, partitioning the current block, and generating fine motion estimation information for the current block; and transmitting or storing the encoded block. 2. The method of claim 1, wherein the current block is an N×N size block, and wherein generating coarse motion estimation information for the current block includes: dividing the current block into a plurality of KxK basic blocks, where N is a multiple of K; and generating motion information and prediction error information for each respective basic block from the plurality of basic blocks by performing course motion searching for each respective basic block. 3. The method of claim 2, wherein partitioning the current block includes: determining a partitioning scheme from a plurality of candidate partitioning schemes, wherein each candidate partitioning scheme from the plurality of candidate partitioning schemes includes at least one candidate from a plurality of candidate partitions for the current block, wherein determining the partitioning scheme includes: generating a partitioning decision tree including a plurality of nodes, wherein each node from the plurality of nodes represents a candidate partition from the plurality of candidate partitions, traversing the partitioning decision tree in a depth-first order, wherein traversing the partitioning decision tree in a depth-first order includes: identifying a first node from the plurality of nodes, the first node having a plurality of child nodes from the plurality of nodes, wherein each child node is a leaf node, each leaf node representing a respective basic block size partition from the plurality of partitions; determining node information for the first node by evaluating a plurality of partitioning criteria based on the motion information and the prediction error information generated for each respective basic block from the plurality of basic blocks wherein each child node from the plurality of child nodes corresponds with a basic block from the plurality of basic blocks, and generating a pruned partitioning decision tree by removing a node from the partitioning decision tree on a condition that partitioning information for the node indicates no partitioning for the node; and generating a partitioned block by partitioning the current block using the pruned partitioning scheme. 4. The method of claim 3, wherein determining the node information for the first node includes: using an average of a horizontal component of motion information of each child node as a horizontal component of motion information for the first node, using an average of a vertical component of motion information of each child node as a vertical component of motion information for the first node, using a sum of a prediction error value of each child node as a prediction error value for the first node, and using a value of no partitioning for partitioning information for the first node, on a condition that partitioning information for each respective child node has a no partitioning value, on a condition that prediction error information for each respective child node is within a corresponding prediction error threshold, on a condition that a horizontal motion difference for each respective child node is within a corresponding horizontal motion similarity threshold, and on a condition that a vertical motion difference for each respective child node is within a corresponding vertical motion similarity threshold; and using an invalid value as a horizontal component of motion information for the first node, using an invalid value as a vertical component of motion information for the first node, using invalid value as a prediction error value for the first node, and using a value of partitioning for partitioning information for the first node, on a condition that partitioning information for a child node has a partitioning value, on a condition that prediction error information for a child node exceeds the corresponding prediction error threshold, on a condition that a horizontal motion difference for a child node exceeds the corresponding horizontal motion similarity threshold, or on a condition that a vertical motion difference for a child node exceeds the corresponding vertical motion similarity threshold. 5. The method of claim 4, wherein generating the fine motion estimation information for the current block includes: generating sub-pixel motion information for each partition from the partitioned block; and determining a prediction mode for each partition from the partitioned block. 6. A method comprising: identifying a current block of a current frame of an input video stream; generating, by a processor in response to instructions stored on a non-transitory computer readable medium, an encoded block by encoding the current block, wherein encoding the current block includes motion-compensated partitioning the current block; and transmitting or storing the encoded block. 7. The method of claim 6, wherein motion-compensated partitioning the current block includes: generating coarse motion estimation information for the current block; partitioning the current block; and generating fine motion estimation information for the current block. 8. The method of claim 7, wherein generating coarse motion estimation information for the current block includes dividing the current block into a plurality of basic blocks. 9. The method of claim 8, wherein the current block includes N pixels per row and N pixels per column, and each respective basic block from the plurality of basic blocks includes K pixels per row and K pixels per column, where N is a multiple of K. 10. The method of claim 8, wherein generating coarse motion estimation information for the current block includes: generating motion information and prediction error information for each respective basic block from the plurality of basic blocks by performing course motion searching for each respective basic block. 11. The method of claim 7, wherein partitioning the current block includes: determining a partitioning scheme from a plurality of candidate partitioning schemes, wherein each candidate partitioning scheme from the plurality of candidate partitioning schemes includes at least one candidate from a plurality of candidate partitions for the current block; and partitioning the current block using the partitioning scheme. 12. The method of claim 11, wherein determining the partitioning scheme includes generating a partitioning decision tree including a plurality of nodes, wherein each node from the plurality of nodes represents a candidate partition from the plurality of candidate partitions. 13. The method of claim 12, wherein determining the partitioning scheme includes traversing the partitioning decision tree in a depth-first order. 14. The method of claim 13, wherein traversing the partitioning decision tree in a depth-first order includes: identifying a first node from the plurality of nodes, the first node having a plurality of child nodes from the plurality of nodes, wherein each child node is a leaf node, each leaf node representing a respective basic block size partition from the plurality of partitions; and determining node information for the first node by evaluating a plurality of partitioning criteria based on each child node from the plurality of child nodes. 15. The method of claim 14, wherein determining the node information for the first node includes: using an average of a horizontal component of motion information of each child node as a horizontal component of motion information for the first node, using an average of a vertical component of motion information of each child node as a vertical component of motion information for the first node, using a sum of a prediction error value of each child node as a prediction error value for the first node, and using a value of no partitioning for partitioning information for the first node, on a condition that partitioning information for each respective child node has a no partitioning value, on a condition that prediction error information for each respective child node is within a corresponding prediction error threshold, on a condition that a horizontal motion difference for each respective child node is within a corresponding horizontal motion similarity threshold, and on a condition that a vertical motion difference for each respective child node is within a corresponding vertical motion similarity threshold; and using an invalid value as a horizontal component of motion information for the first node, using an invalid value as a vertical component of motion information for the first node, using invalid value as a prediction error value for the first node, and using a value of partitioning for partitioning information for the first node, on a condition that partitioning information for a child node has a partitioning value, on a condition that prediction error information for a child node exceeds the corresponding prediction error threshold, on a condition that a horizontal motion difference for a child node exceeds the corresponding horizontal motion similarity threshold, or on a condition that a vertical motion difference for a child node exceeds the corresponding vertical motion similarity threshold. 16. The method of claim 14, wherein the partitioning decision tree includes a root node that is a parent of a plurality of intermediate child nodes, wherein the first node is an intermediate child node from the plurality of intermediate child nodes, and wherein each child node is a leaf node. 17. The method of claim 16, wherein the root node represents the current block which is a 64×64 block, and wherein the first node represents a 32×32 partition of the current block, and wherein the child node represents a 16×16 partition of the 32×32 partition, wherein 16×16 is a basic block size and 64×64 is a coding unit size. 18. The method of claim 13, wherein determining the partitioning scheme includes pruning the partitioning decision tree, wherein pruning the partitioning decision tree includes removing a child node of a first node on a condition that partitioning information for the first node indicates no partitioning for the first node. 19. The method of claim 11, wherein generating fine motion estimation information for the current block includes: generating sub-pixel motion information for each partition from the partitioning scheme; and determining a prediction mode for each partition from the partitioning scheme. 20. A method comprising: identifying a current block of a current frame of an input video stream; generating, by a processor in response to instructions stored on a non-transitory computer readable medium, an encoded block by encoding the current block, wherein encoding the current block includes: generating coarse motion estimation information for the current block, wherein the current block is a N×N size block, and wherein generating coarse motion estimation information for the current block includes: dividing the current block into a plurality of KxK basic blocks, where N is a multiple of K; and generating motion information and prediction error information for each respective basic block from the plurality of basic blocks by performing course motion searching for each respective basic block, determining a partitioning scheme from a plurality of candidate partitioning schemes, wherein each candidate partitioning scheme from the plurality of candidate partitioning schemes includes at least one candidate from a plurality of candidate partitions for the current block, wherein determining the partitioning scheme includes: generating a partitioning decision tree including a plurality of nodes, wherein each node from the plurality of nodes represents a candidate partition from the plurality of candidate partitions; and traversing the partitioning decision tree in a depth-first order, wherein traversing the partitioning decision tree in a depth-first order includes: identifying a first node from the plurality of nodes, the first node having a plurality of child nodes from the plurality of nodes, wherein each child node is a leaf node, each leaf node representing a respective basic block size partition from the plurality of partitions, determining node information for the first node by evaluating a plurality of partitioning criteria based on each child node from the plurality of child nodes, and pruning the partitioning decision tree, wherein pruning the partitioning decision tree includes removing a child node of a first node on a condition that partitioning information for the first node indicates no partitioning for the first node, partitioning the current block using the partitioning scheme, and generating fine motion estimation information for the current block, wherein generating fine motion estimation information for the current block includes: generating sub-pixel motion information for each partition from the partitioning scheme; and determining a prediction mode for each partition from the partitioning scheme; and transmitting or storing the encoded block. 21. The method of claim 19, wherein determining the node information for the first node includes: using an average of a horizontal component of motion information of each child node as a horizontal component of motion information for the first node, using an average of a vertical component of motion information of each child node as a vertical component of motion information for the first node, using a sum of a prediction error value of each child node as a prediction error value for the first node, and using a value of no partitioning for partitioning information for the first node, on a condition that partitioning information for each respective child node has a no partitioning value, on a condition that prediction error information for each respective child node is within a corresponding prediction error threshold, on a condition that a horizontal motion difference for each respective child node is within a corresponding horizontal motion similarity threshold, and on a condition that a vertical motion difference for each respective child node is within a corresponding vertical motion similarity threshold; and using an invalid value as a horizontal component of motion information for the first node, using an invalid value as a vertical component of motion information for the first node, using invalid value as a prediction error value for the first node, and using a value of partitioning for partitioning information for the first node, on a condition that partitioning information for a child node has a partitioning value, on a condition that prediction error information for a child node exceeds the corresponding prediction error threshold, on a condition that a horizontal motion difference for a child node exceeds the corresponding horizontal motion similarity threshold, or on a condition that a vertical motion difference for a child node exceeds the corresponding vertical motion similarity threshold.
A method and apparatus for video coding using motion-compensated partitioning is provided. Video coding using motion-compensated partitioning may include identifying a current block of a current frame of an input video stream, generating an encoded block by encoding the current block using motion-compensated partitioning, wherein encoding the current block using motion-compensated partitioning includes, generating coarse motion estimation information for the current block, partitioning the current block, generating fine motion estimation information for the current block, and transmitting or storing the encoded block.1. A method comprising: identifying a current block of a current frame of an input video stream; generating, by a processor in response to instructions stored on a non-transitory computer readable medium, an encoded block by encoding the current block using motion-compensated partitioning, wherein encoding the current block using motion-compensated partitioning includes: generating coarse motion estimation information for the current block, partitioning the current block, and generating fine motion estimation information for the current block; and transmitting or storing the encoded block. 2. The method of claim 1, wherein the current block is an N×N size block, and wherein generating coarse motion estimation information for the current block includes: dividing the current block into a plurality of KxK basic blocks, where N is a multiple of K; and generating motion information and prediction error information for each respective basic block from the plurality of basic blocks by performing course motion searching for each respective basic block. 3. The method of claim 2, wherein partitioning the current block includes: determining a partitioning scheme from a plurality of candidate partitioning schemes, wherein each candidate partitioning scheme from the plurality of candidate partitioning schemes includes at least one candidate from a plurality of candidate partitions for the current block, wherein determining the partitioning scheme includes: generating a partitioning decision tree including a plurality of nodes, wherein each node from the plurality of nodes represents a candidate partition from the plurality of candidate partitions, traversing the partitioning decision tree in a depth-first order, wherein traversing the partitioning decision tree in a depth-first order includes: identifying a first node from the plurality of nodes, the first node having a plurality of child nodes from the plurality of nodes, wherein each child node is a leaf node, each leaf node representing a respective basic block size partition from the plurality of partitions; determining node information for the first node by evaluating a plurality of partitioning criteria based on the motion information and the prediction error information generated for each respective basic block from the plurality of basic blocks wherein each child node from the plurality of child nodes corresponds with a basic block from the plurality of basic blocks, and generating a pruned partitioning decision tree by removing a node from the partitioning decision tree on a condition that partitioning information for the node indicates no partitioning for the node; and generating a partitioned block by partitioning the current block using the pruned partitioning scheme. 4. The method of claim 3, wherein determining the node information for the first node includes: using an average of a horizontal component of motion information of each child node as a horizontal component of motion information for the first node, using an average of a vertical component of motion information of each child node as a vertical component of motion information for the first node, using a sum of a prediction error value of each child node as a prediction error value for the first node, and using a value of no partitioning for partitioning information for the first node, on a condition that partitioning information for each respective child node has a no partitioning value, on a condition that prediction error information for each respective child node is within a corresponding prediction error threshold, on a condition that a horizontal motion difference for each respective child node is within a corresponding horizontal motion similarity threshold, and on a condition that a vertical motion difference for each respective child node is within a corresponding vertical motion similarity threshold; and using an invalid value as a horizontal component of motion information for the first node, using an invalid value as a vertical component of motion information for the first node, using invalid value as a prediction error value for the first node, and using a value of partitioning for partitioning information for the first node, on a condition that partitioning information for a child node has a partitioning value, on a condition that prediction error information for a child node exceeds the corresponding prediction error threshold, on a condition that a horizontal motion difference for a child node exceeds the corresponding horizontal motion similarity threshold, or on a condition that a vertical motion difference for a child node exceeds the corresponding vertical motion similarity threshold. 5. The method of claim 4, wherein generating the fine motion estimation information for the current block includes: generating sub-pixel motion information for each partition from the partitioned block; and determining a prediction mode for each partition from the partitioned block. 6. A method comprising: identifying a current block of a current frame of an input video stream; generating, by a processor in response to instructions stored on a non-transitory computer readable medium, an encoded block by encoding the current block, wherein encoding the current block includes motion-compensated partitioning the current block; and transmitting or storing the encoded block. 7. The method of claim 6, wherein motion-compensated partitioning the current block includes: generating coarse motion estimation information for the current block; partitioning the current block; and generating fine motion estimation information for the current block. 8. The method of claim 7, wherein generating coarse motion estimation information for the current block includes dividing the current block into a plurality of basic blocks. 9. The method of claim 8, wherein the current block includes N pixels per row and N pixels per column, and each respective basic block from the plurality of basic blocks includes K pixels per row and K pixels per column, where N is a multiple of K. 10. The method of claim 8, wherein generating coarse motion estimation information for the current block includes: generating motion information and prediction error information for each respective basic block from the plurality of basic blocks by performing course motion searching for each respective basic block. 11. The method of claim 7, wherein partitioning the current block includes: determining a partitioning scheme from a plurality of candidate partitioning schemes, wherein each candidate partitioning scheme from the plurality of candidate partitioning schemes includes at least one candidate from a plurality of candidate partitions for the current block; and partitioning the current block using the partitioning scheme. 12. The method of claim 11, wherein determining the partitioning scheme includes generating a partitioning decision tree including a plurality of nodes, wherein each node from the plurality of nodes represents a candidate partition from the plurality of candidate partitions. 13. The method of claim 12, wherein determining the partitioning scheme includes traversing the partitioning decision tree in a depth-first order. 14. The method of claim 13, wherein traversing the partitioning decision tree in a depth-first order includes: identifying a first node from the plurality of nodes, the first node having a plurality of child nodes from the plurality of nodes, wherein each child node is a leaf node, each leaf node representing a respective basic block size partition from the plurality of partitions; and determining node information for the first node by evaluating a plurality of partitioning criteria based on each child node from the plurality of child nodes. 15. The method of claim 14, wherein determining the node information for the first node includes: using an average of a horizontal component of motion information of each child node as a horizontal component of motion information for the first node, using an average of a vertical component of motion information of each child node as a vertical component of motion information for the first node, using a sum of a prediction error value of each child node as a prediction error value for the first node, and using a value of no partitioning for partitioning information for the first node, on a condition that partitioning information for each respective child node has a no partitioning value, on a condition that prediction error information for each respective child node is within a corresponding prediction error threshold, on a condition that a horizontal motion difference for each respective child node is within a corresponding horizontal motion similarity threshold, and on a condition that a vertical motion difference for each respective child node is within a corresponding vertical motion similarity threshold; and using an invalid value as a horizontal component of motion information for the first node, using an invalid value as a vertical component of motion information for the first node, using invalid value as a prediction error value for the first node, and using a value of partitioning for partitioning information for the first node, on a condition that partitioning information for a child node has a partitioning value, on a condition that prediction error information for a child node exceeds the corresponding prediction error threshold, on a condition that a horizontal motion difference for a child node exceeds the corresponding horizontal motion similarity threshold, or on a condition that a vertical motion difference for a child node exceeds the corresponding vertical motion similarity threshold. 16. The method of claim 14, wherein the partitioning decision tree includes a root node that is a parent of a plurality of intermediate child nodes, wherein the first node is an intermediate child node from the plurality of intermediate child nodes, and wherein each child node is a leaf node. 17. The method of claim 16, wherein the root node represents the current block which is a 64×64 block, and wherein the first node represents a 32×32 partition of the current block, and wherein the child node represents a 16×16 partition of the 32×32 partition, wherein 16×16 is a basic block size and 64×64 is a coding unit size. 18. The method of claim 13, wherein determining the partitioning scheme includes pruning the partitioning decision tree, wherein pruning the partitioning decision tree includes removing a child node of a first node on a condition that partitioning information for the first node indicates no partitioning for the first node. 19. The method of claim 11, wherein generating fine motion estimation information for the current block includes: generating sub-pixel motion information for each partition from the partitioning scheme; and determining a prediction mode for each partition from the partitioning scheme. 20. A method comprising: identifying a current block of a current frame of an input video stream; generating, by a processor in response to instructions stored on a non-transitory computer readable medium, an encoded block by encoding the current block, wherein encoding the current block includes: generating coarse motion estimation information for the current block, wherein the current block is a N×N size block, and wherein generating coarse motion estimation information for the current block includes: dividing the current block into a plurality of KxK basic blocks, where N is a multiple of K; and generating motion information and prediction error information for each respective basic block from the plurality of basic blocks by performing course motion searching for each respective basic block, determining a partitioning scheme from a plurality of candidate partitioning schemes, wherein each candidate partitioning scheme from the plurality of candidate partitioning schemes includes at least one candidate from a plurality of candidate partitions for the current block, wherein determining the partitioning scheme includes: generating a partitioning decision tree including a plurality of nodes, wherein each node from the plurality of nodes represents a candidate partition from the plurality of candidate partitions; and traversing the partitioning decision tree in a depth-first order, wherein traversing the partitioning decision tree in a depth-first order includes: identifying a first node from the plurality of nodes, the first node having a plurality of child nodes from the plurality of nodes, wherein each child node is a leaf node, each leaf node representing a respective basic block size partition from the plurality of partitions, determining node information for the first node by evaluating a plurality of partitioning criteria based on each child node from the plurality of child nodes, and pruning the partitioning decision tree, wherein pruning the partitioning decision tree includes removing a child node of a first node on a condition that partitioning information for the first node indicates no partitioning for the first node, partitioning the current block using the partitioning scheme, and generating fine motion estimation information for the current block, wherein generating fine motion estimation information for the current block includes: generating sub-pixel motion information for each partition from the partitioning scheme; and determining a prediction mode for each partition from the partitioning scheme; and transmitting or storing the encoded block. 21. The method of claim 19, wherein determining the node information for the first node includes: using an average of a horizontal component of motion information of each child node as a horizontal component of motion information for the first node, using an average of a vertical component of motion information of each child node as a vertical component of motion information for the first node, using a sum of a prediction error value of each child node as a prediction error value for the first node, and using a value of no partitioning for partitioning information for the first node, on a condition that partitioning information for each respective child node has a no partitioning value, on a condition that prediction error information for each respective child node is within a corresponding prediction error threshold, on a condition that a horizontal motion difference for each respective child node is within a corresponding horizontal motion similarity threshold, and on a condition that a vertical motion difference for each respective child node is within a corresponding vertical motion similarity threshold; and using an invalid value as a horizontal component of motion information for the first node, using an invalid value as a vertical component of motion information for the first node, using invalid value as a prediction error value for the first node, and using a value of partitioning for partitioning information for the first node, on a condition that partitioning information for a child node has a partitioning value, on a condition that prediction error information for a child node exceeds the corresponding prediction error threshold, on a condition that a horizontal motion difference for a child node exceeds the corresponding horizontal motion similarity threshold, or on a condition that a vertical motion difference for a child node exceeds the corresponding vertical motion similarity threshold.
2,400
6,930
6,930
14,816,892
2,455
Systems and methods for performing routing are described. A primary route being used to transmit a plurality of messages is identified. The primary route includes one or more channels that are each associated with a particular message type. One or more alternate routes for potentially transmitting the plurality of messages are identified, each of which also includes comprises one or more channels that are associated with a particular message type. A factor associated with the primary route is evaluated with respect to a corresponding factor associated with each alternate route and, based on the evaluation, a determination is made whether one of the alternate routes should replace the primary route for transmission of the plurality of messages.
1. A computer-implemented method comprising: identifying a primary route being used to transmit a plurality of messages, wherein the primary route comprises one or more channels each associated with a particular message type; identifying one or more alternate routes for potentially transmitting the plurality of messages, wherein each alternate route comprises one or more channels each associated with a particular message type; evaluating a factor associated with the primary route with respect to a corresponding factor associated with each alternate route; and based on the evaluation, determining whether one of the alternate routes should replace the primary route for transmission of the plurality of messages. 2. The method of claim 1, wherein the factor comprises a property of a particular channel, the property comprising one of quality of service, delivery receipt availability, delivery receipt delay, recipient reachability, communication regulations or restrictions, cost, and user preference. 3. The method of claim 1, further comprising: tracking over a period of time first network metric data of a channel of the primary route and second network metric data of a channel of a particular alternate route, wherein the factor comprises channel quality of service, and wherein evaluating the factor comprises: determining, based on the first network metric data, a quality of service of the channel of the primary route; and determining, based on the second network metric data, a quality of service of the channel of the particular alternate route. 4. The method of claim 1, further comprising: tracking over a period of time an average length of time to receive a delivery receipt based on a transmitted message over a particular channel of the primary route, wherein the factor comprises channel delivery receipt delay, and wherein evaluating the factor comprises determining that the delivery receipt delay of the particular channel of the primary route exceeds a maximum delay threshold. 5. The method of claim 1, further comprising: receiving indications of transmission of a subplurality of messages wherein the transmission occurs over the primary route; and receiving, for at least one of the subplurality of messages, an indication of a conversion based on the at least one message, wherein the factor comprises route quality, and wherein evaluating the factor comprises determining a quality of the primary route based on at least a subset of the indications of transmission and at least a subset of the indications of conversion. 6. The method of claim 5, wherein a particular conversion comprises a verification of delivery of the message based on a response to the message. 7. The method of claim 1, wherein evaluating the factor comprises predicting whether a change in a value of the factor is likely to occur. 8. The method of claim 7, wherein the predicting is based on a risk measure. 9. The method of claim 7, wherein the predicting is based on historical attributes associated with the primary route. 10. The method of claim 1, wherein determining whether an alternate route should replace the primary route comprises selecting one of the plurality of alternate routes based at least in part on the corresponding factor associated with selected alternate route. 11. The method of claim 1, further comprising redesignating the primary route as an alternate route. 12. The method of claim 1, wherein a particular message comprises identity verification information. 13. The method of claim 1, wherein a particular message type comprises a text message, a multimedia message, or a voice message. 14. A system comprising: one or more computers programmed to perform operations comprising: identifying a primary route being used to transmit a plurality of messages, wherein the primary route comprises one or more channels each associated with a particular message type; identifying one or more alternate routes for potentially transmitting the plurality of messages, wherein each alternate route comprises one or more channels each associated with a particular message type; evaluating a factor associated with the primary route with respect to a corresponding factor associated with each alternate route; and based on the evaluation, determining whether one of the alternate routes should replace the primary route for transmission of the plurality of messages. 15. The system of claim 14, wherein the factor comprises a property of a particular channel, the property comprising one of quality of service, delivery receipt availability, delivery receipt delay, recipient reachability, communication regulations or restrictions, cost, and user preference. 16. The system of claim 14, wherein the operations further comprise: tracking over a period of time first network metric data of a channel of the primary route and second network metric data of a channel of a particular alternate route, wherein the factor comprises channel quality of service, and wherein evaluating the factor comprises: determining, based on the first network metric data, a quality of service of the channel of the primary route; and determining, based on the second network metric data, a quality of service of the channel of the particular alternate route. 17. The system of claim 14, wherein the operations further comprise: tracking over a period of time an average length of time to receive a delivery receipt based on a transmitted message over a particular channel of the primary route, wherein the factor comprises channel delivery receipt delay, and wherein evaluating the factor comprises determining that the delivery receipt delay of the particular channel of the primary route exceeds a maximum delay threshold. 18. The system of claim 14, wherein the operations further comprise: receiving indications of transmission of a subplurality of messages wherein the transmission occurs over the primary route; and receiving, for at least one of the subplurality of messages, an indication of a conversion based on the at least one message, wherein the factor comprises route quality, and wherein evaluating the factor comprises determining a quality of the primary route based on at least a subset of the indications of transmission and at least a subset of the indications of conversion. 19. The system of claim 18, wherein a particular conversion comprises a verification of delivery of the message based on a response to the message. 20. The system of claim 14, wherein evaluating the factor comprises predicting whether a change in a value of the factor is likely to occur. 21. The system of claim 20, wherein the predicting is based on a risk measure. 22. The system of claim 20, wherein the predicting is based on historical attributes associated with the primary route. 23. The system of claim 14, wherein determining whether an alternate route should replace the primary route comprises selecting one of the plurality of alternate routes based at least in part on the corresponding factor associated with selected alternate route. 24. The system of claim 14, wherein the operations further comprise redesignating the primary route as an alternate route. 25. The system of claim 14, wherein a particular message comprises identity verification information. 26. The system of claim 14, wherein a particular message type comprises a text message, a multimedia message, or a voice message.
Systems and methods for performing routing are described. A primary route being used to transmit a plurality of messages is identified. The primary route includes one or more channels that are each associated with a particular message type. One or more alternate routes for potentially transmitting the plurality of messages are identified, each of which also includes comprises one or more channels that are associated with a particular message type. A factor associated with the primary route is evaluated with respect to a corresponding factor associated with each alternate route and, based on the evaluation, a determination is made whether one of the alternate routes should replace the primary route for transmission of the plurality of messages.1. A computer-implemented method comprising: identifying a primary route being used to transmit a plurality of messages, wherein the primary route comprises one or more channels each associated with a particular message type; identifying one or more alternate routes for potentially transmitting the plurality of messages, wherein each alternate route comprises one or more channels each associated with a particular message type; evaluating a factor associated with the primary route with respect to a corresponding factor associated with each alternate route; and based on the evaluation, determining whether one of the alternate routes should replace the primary route for transmission of the plurality of messages. 2. The method of claim 1, wherein the factor comprises a property of a particular channel, the property comprising one of quality of service, delivery receipt availability, delivery receipt delay, recipient reachability, communication regulations or restrictions, cost, and user preference. 3. The method of claim 1, further comprising: tracking over a period of time first network metric data of a channel of the primary route and second network metric data of a channel of a particular alternate route, wherein the factor comprises channel quality of service, and wherein evaluating the factor comprises: determining, based on the first network metric data, a quality of service of the channel of the primary route; and determining, based on the second network metric data, a quality of service of the channel of the particular alternate route. 4. The method of claim 1, further comprising: tracking over a period of time an average length of time to receive a delivery receipt based on a transmitted message over a particular channel of the primary route, wherein the factor comprises channel delivery receipt delay, and wherein evaluating the factor comprises determining that the delivery receipt delay of the particular channel of the primary route exceeds a maximum delay threshold. 5. The method of claim 1, further comprising: receiving indications of transmission of a subplurality of messages wherein the transmission occurs over the primary route; and receiving, for at least one of the subplurality of messages, an indication of a conversion based on the at least one message, wherein the factor comprises route quality, and wherein evaluating the factor comprises determining a quality of the primary route based on at least a subset of the indications of transmission and at least a subset of the indications of conversion. 6. The method of claim 5, wherein a particular conversion comprises a verification of delivery of the message based on a response to the message. 7. The method of claim 1, wherein evaluating the factor comprises predicting whether a change in a value of the factor is likely to occur. 8. The method of claim 7, wherein the predicting is based on a risk measure. 9. The method of claim 7, wherein the predicting is based on historical attributes associated with the primary route. 10. The method of claim 1, wherein determining whether an alternate route should replace the primary route comprises selecting one of the plurality of alternate routes based at least in part on the corresponding factor associated with selected alternate route. 11. The method of claim 1, further comprising redesignating the primary route as an alternate route. 12. The method of claim 1, wherein a particular message comprises identity verification information. 13. The method of claim 1, wherein a particular message type comprises a text message, a multimedia message, or a voice message. 14. A system comprising: one or more computers programmed to perform operations comprising: identifying a primary route being used to transmit a plurality of messages, wherein the primary route comprises one or more channels each associated with a particular message type; identifying one or more alternate routes for potentially transmitting the plurality of messages, wherein each alternate route comprises one or more channels each associated with a particular message type; evaluating a factor associated with the primary route with respect to a corresponding factor associated with each alternate route; and based on the evaluation, determining whether one of the alternate routes should replace the primary route for transmission of the plurality of messages. 15. The system of claim 14, wherein the factor comprises a property of a particular channel, the property comprising one of quality of service, delivery receipt availability, delivery receipt delay, recipient reachability, communication regulations or restrictions, cost, and user preference. 16. The system of claim 14, wherein the operations further comprise: tracking over a period of time first network metric data of a channel of the primary route and second network metric data of a channel of a particular alternate route, wherein the factor comprises channel quality of service, and wherein evaluating the factor comprises: determining, based on the first network metric data, a quality of service of the channel of the primary route; and determining, based on the second network metric data, a quality of service of the channel of the particular alternate route. 17. The system of claim 14, wherein the operations further comprise: tracking over a period of time an average length of time to receive a delivery receipt based on a transmitted message over a particular channel of the primary route, wherein the factor comprises channel delivery receipt delay, and wherein evaluating the factor comprises determining that the delivery receipt delay of the particular channel of the primary route exceeds a maximum delay threshold. 18. The system of claim 14, wherein the operations further comprise: receiving indications of transmission of a subplurality of messages wherein the transmission occurs over the primary route; and receiving, for at least one of the subplurality of messages, an indication of a conversion based on the at least one message, wherein the factor comprises route quality, and wherein evaluating the factor comprises determining a quality of the primary route based on at least a subset of the indications of transmission and at least a subset of the indications of conversion. 19. The system of claim 18, wherein a particular conversion comprises a verification of delivery of the message based on a response to the message. 20. The system of claim 14, wherein evaluating the factor comprises predicting whether a change in a value of the factor is likely to occur. 21. The system of claim 20, wherein the predicting is based on a risk measure. 22. The system of claim 20, wherein the predicting is based on historical attributes associated with the primary route. 23. The system of claim 14, wherein determining whether an alternate route should replace the primary route comprises selecting one of the plurality of alternate routes based at least in part on the corresponding factor associated with selected alternate route. 24. The system of claim 14, wherein the operations further comprise redesignating the primary route as an alternate route. 25. The system of claim 14, wherein a particular message comprises identity verification information. 26. The system of claim 14, wherein a particular message type comprises a text message, a multimedia message, or a voice message.
2,400
6,931
6,931
14,755,583
2,478
Wireless environment information is obtained by aggregating data corresponding to wireless signals detected by wireless devices in the wireless environment. A wireless device is configured to obtain additional information for a wireless environment based on determining that wireless environment information is insufficient. One or more devices are configured based at least on the additional information.
1. A non-transitory computer readable medium comprising instructions which, when executed by one or more hardware processors, causes performance of operations comprising: identifying a wireless environment comprising a plurality of wireless devices; aggregating data corresponding to a set of wireless signals detected by one or more wireless devices in the plurality of wireless devices to obtain wireless environment information; determining that the wireless environment information is insufficient; and responsive to the determining operation, configuring at least a first wireless device, of the plurality of wireless devices, to obtain additional information for the wireless environment. 2. The medium of claim 1, wherein the determining operation comprises determining that the wireless environment information is insufficient for a particular radio frequency neighborhood, and wherein the first wireless device is selected from the particular radio frequency neighborhood. 3. The medium of claim 1, wherein the determining operation comprises determining that the wireless environment information is insufficient for a particular radio frequency channel, and wherein the first wireless device is configured to obtain the additional information for the particular radio frequency channel. 4. The medium of claim 1, wherein determining that the wireless environment information is insufficient is based on determining that at least a portion of the wireless environment information is outdated. 5. The medium of claim 1, wherein determining that the wireless environment information is insufficient is based on determining that a subset, of the wireless environment information, that corresponds to a particular radio frequency neighborhood is originating from an insufficient number of wireless devices from the plurality of wireless devices. 6. The medium of claim 1, wherein determining that the wireless environment information is insufficient is based on determining that a subset, of the wireless environment information, that corresponds to a particular radio frequency neighborhood is insufficient. 7. The medium of claim 1, wherein determining that the wireless environment information is insufficient comprises determining that data detected by a second wireless device, of the plurality of wireless devices, is outdated, and the second wireless device is different from the first wireless device. 8. The medium of claim 7, wherein the second wireless device and the first wireless device are in a same radio frequency neighborhood. 9. The medium of claim 1, wherein the operations further comprise: prior to configuring the first wireless device to obtain the additional information: identifying at least two wireless devices, of the plurality of wireless devices, corresponding to a particular radio frequency neighborhood; determining a load at each wireless device of the at least two wireless devices; selecting the first wireless device from the at least two wireless devices based on the load at the first wireless device. 10. The medium of claim 9, wherein selecting the first wireless device from the at least two wireless devices is based on determining that the load at the first wireless device is less than the load of another of the at least two wireless devices. 11. The medium of claim 1, wherein the operations further comprise: prior to configuring the first wireless device to obtain the additional information: identifying at least two, of the plurality of wireless devices, corresponding to a particular radio frequency neighborhood; identifying characteristics of any active connections at each wireless device of the at least two wireless devices; selecting the first wireless device from the at least two wireless devices based on (a) the characteristics of any active connections at the first wireless device or (b) determining that there are no active connections at the first wireless device. 12. The medium of claim 11, wherein the characteristics of any active connections at each wireless device comprise latency sensitivity or error sensitivity of the data being transmitted or received by each wireless device. 13. The medium of claim 1, wherein the operations further comprise: prior to configuring the first wireless device to obtain the additional information: identifying at least two, of the plurality of wireless devices, corresponding to a particular radio frequency neighborhood; identifying a current operating channel for each wireless device of the at least two wireless devices; selecting the first wireless device from the at least two wireless devices based on the current operating channel of the first wireless device. 14. The medium of claim 1, wherein the operations further comprise: selecting the first wireless device for obtaining the additional information based on a current operating channel of the first wireless device matching a particular channel for which the additional information is needed. 15. The medium of claim 1, wherein the operations further comprise: selecting the first wireless device for obtaining the additional information based on a set of radio frequency neighborhoods to which the first wireless device belongs. 16. The medium of claim 1, wherein the operations further comprise selecting a subset of devices from the plurality of wireless devices to obtain the additional information, wherein the selecting operation is based on selecting the subset with a lowest number of devices that can obtain the additional information. 17. The medium of claim 1, wherein the operations further comprise selecting a time period for the first wireless device to obtain the additional information based on the information for the wireless environment. 18. The medium of claim 1, wherein the operations further comprise selecting a frequency with which the first wireless device is to obtain the additional information based on the information for the wireless environment. 19. The medium of claim 1, wherein the operations are performed by a controller. 20. The medium of claim 1, wherein the operations further comprise selecting the first wireless device to obtain the additional information based on historical information related to a subset of the plurality of wireless devices successfully obtaining information for a particular radio frequency neighborhood. 21. The medium of claim 1, wherein the operations further comprise configuring one or more parameters of a second wireless device based on the additional information obtained by the first wireless device. 22. A method, comprising: identifying a wireless environment comprising a plurality of wireless devices; aggregating data corresponding to a set of wireless signals detected by one or more wireless devices in the plurality of wireless devices to obtain wireless environment information; determining that the wireless environment information is insufficient; and responsive to the determining operation, configuring at least a first wireless device, of the plurality of wireless devices, to obtain additional information for the wireless environment. 23. A system, comprising: at least one device including a hardware processor; the system being configured to perform operations comprising: identifying a wireless environment comprising a plurality of wireless devices; aggregating data corresponding to a set of wireless signals detected by one or more wireless devices in the plurality of wireless devices to obtain wireless environment information; determining that the wireless environment information is insufficient; and responsive to the determining operation, configuring at least a first wireless device, of the plurality of wireless devices, to obtain additional information for the wireless environment.
Wireless environment information is obtained by aggregating data corresponding to wireless signals detected by wireless devices in the wireless environment. A wireless device is configured to obtain additional information for a wireless environment based on determining that wireless environment information is insufficient. One or more devices are configured based at least on the additional information.1. A non-transitory computer readable medium comprising instructions which, when executed by one or more hardware processors, causes performance of operations comprising: identifying a wireless environment comprising a plurality of wireless devices; aggregating data corresponding to a set of wireless signals detected by one or more wireless devices in the plurality of wireless devices to obtain wireless environment information; determining that the wireless environment information is insufficient; and responsive to the determining operation, configuring at least a first wireless device, of the plurality of wireless devices, to obtain additional information for the wireless environment. 2. The medium of claim 1, wherein the determining operation comprises determining that the wireless environment information is insufficient for a particular radio frequency neighborhood, and wherein the first wireless device is selected from the particular radio frequency neighborhood. 3. The medium of claim 1, wherein the determining operation comprises determining that the wireless environment information is insufficient for a particular radio frequency channel, and wherein the first wireless device is configured to obtain the additional information for the particular radio frequency channel. 4. The medium of claim 1, wherein determining that the wireless environment information is insufficient is based on determining that at least a portion of the wireless environment information is outdated. 5. The medium of claim 1, wherein determining that the wireless environment information is insufficient is based on determining that a subset, of the wireless environment information, that corresponds to a particular radio frequency neighborhood is originating from an insufficient number of wireless devices from the plurality of wireless devices. 6. The medium of claim 1, wherein determining that the wireless environment information is insufficient is based on determining that a subset, of the wireless environment information, that corresponds to a particular radio frequency neighborhood is insufficient. 7. The medium of claim 1, wherein determining that the wireless environment information is insufficient comprises determining that data detected by a second wireless device, of the plurality of wireless devices, is outdated, and the second wireless device is different from the first wireless device. 8. The medium of claim 7, wherein the second wireless device and the first wireless device are in a same radio frequency neighborhood. 9. The medium of claim 1, wherein the operations further comprise: prior to configuring the first wireless device to obtain the additional information: identifying at least two wireless devices, of the plurality of wireless devices, corresponding to a particular radio frequency neighborhood; determining a load at each wireless device of the at least two wireless devices; selecting the first wireless device from the at least two wireless devices based on the load at the first wireless device. 10. The medium of claim 9, wherein selecting the first wireless device from the at least two wireless devices is based on determining that the load at the first wireless device is less than the load of another of the at least two wireless devices. 11. The medium of claim 1, wherein the operations further comprise: prior to configuring the first wireless device to obtain the additional information: identifying at least two, of the plurality of wireless devices, corresponding to a particular radio frequency neighborhood; identifying characteristics of any active connections at each wireless device of the at least two wireless devices; selecting the first wireless device from the at least two wireless devices based on (a) the characteristics of any active connections at the first wireless device or (b) determining that there are no active connections at the first wireless device. 12. The medium of claim 11, wherein the characteristics of any active connections at each wireless device comprise latency sensitivity or error sensitivity of the data being transmitted or received by each wireless device. 13. The medium of claim 1, wherein the operations further comprise: prior to configuring the first wireless device to obtain the additional information: identifying at least two, of the plurality of wireless devices, corresponding to a particular radio frequency neighborhood; identifying a current operating channel for each wireless device of the at least two wireless devices; selecting the first wireless device from the at least two wireless devices based on the current operating channel of the first wireless device. 14. The medium of claim 1, wherein the operations further comprise: selecting the first wireless device for obtaining the additional information based on a current operating channel of the first wireless device matching a particular channel for which the additional information is needed. 15. The medium of claim 1, wherein the operations further comprise: selecting the first wireless device for obtaining the additional information based on a set of radio frequency neighborhoods to which the first wireless device belongs. 16. The medium of claim 1, wherein the operations further comprise selecting a subset of devices from the plurality of wireless devices to obtain the additional information, wherein the selecting operation is based on selecting the subset with a lowest number of devices that can obtain the additional information. 17. The medium of claim 1, wherein the operations further comprise selecting a time period for the first wireless device to obtain the additional information based on the information for the wireless environment. 18. The medium of claim 1, wherein the operations further comprise selecting a frequency with which the first wireless device is to obtain the additional information based on the information for the wireless environment. 19. The medium of claim 1, wherein the operations are performed by a controller. 20. The medium of claim 1, wherein the operations further comprise selecting the first wireless device to obtain the additional information based on historical information related to a subset of the plurality of wireless devices successfully obtaining information for a particular radio frequency neighborhood. 21. The medium of claim 1, wherein the operations further comprise configuring one or more parameters of a second wireless device based on the additional information obtained by the first wireless device. 22. A method, comprising: identifying a wireless environment comprising a plurality of wireless devices; aggregating data corresponding to a set of wireless signals detected by one or more wireless devices in the plurality of wireless devices to obtain wireless environment information; determining that the wireless environment information is insufficient; and responsive to the determining operation, configuring at least a first wireless device, of the plurality of wireless devices, to obtain additional information for the wireless environment. 23. A system, comprising: at least one device including a hardware processor; the system being configured to perform operations comprising: identifying a wireless environment comprising a plurality of wireless devices; aggregating data corresponding to a set of wireless signals detected by one or more wireless devices in the plurality of wireless devices to obtain wireless environment information; determining that the wireless environment information is insufficient; and responsive to the determining operation, configuring at least a first wireless device, of the plurality of wireless devices, to obtain additional information for the wireless environment.
2,400
6,932
6,932
14,427,556
2,476
A network node ( 110 ) and a method therein for managing radio, resources are disclosed. The radio resources are dedicated for beacon ( 121, 122 ) signaling, fey a first device; ( 131 ) and a second device ( 132 ), in conjunction with device-to-device, “D2D”, discovery. The first device: ( 131 ) is stationary and the second device ( 132 ) is non-stationary. The network node ( 110 ) selects ( 202 ) a first and a second set of radio resources out of the radio resources. The first and second sets are dedicated for beacon signaling by the first device ( 131 ) and the second device ( 132 ), respectively. The first set of radio resources Is non-overlapping with the second set of radio resources. Then the network node ( 110 ) schedules ( 203 ) a specific radio resource of the first set of radio resources to the first device ( 131 ). Next, the network node ( 110 ) sends ( 204 ) information about the scheduled specific radio resource to the first device ( 131 ). The network node ( 110 ) further sends ( 205 ) information about the second set of radio resources to the second device ( 132 ). In this manner, the second device ( 132 ) restricts Us radio resources usable for beacon signaling to the second set of radio resources.
1-24. (canceled) 25. A method, in a network node for managing radio resources, wherein the radio resources are dedicated for beacon signaling, by a first device and a second device, in conjunction with device-to-device (D2D) discovery, wherein the first device is stationary and the second device is non-stationary, the method comprising: selecting a first and a second set of radio resources out of the radio resources, wherein the first and second sets are dedicated for beacon signaling by the first device and the second device, respectively, wherein the first set of radio resources is non-overlapping with the second set of radio resources; scheduling a specific radio resource of the first set of radio resources to the first device; sending information about the scheduled specific radio resource to the first device; and sending information about the second set of radio resources to the second device, whereby the second device restricts its radio resources usable for beacon signaling to the second set of radio resources. 26. The method of claim 25, wherein the selection of the first set and/or second set of radio resources is based on one or more of: information relating to how often the first device and/or the second device requires the beacon signaling; service requirements for the first device and/or second device; and radio resource allocation in a second cell neighboring to a first cell operated by the network node. 27. The method of claim 25, wherein the information about the second set of radio resources comprises information about resource elements to be used for beacon signaling and/or information relating to a pseudo-random sequence for selection of the first and second sets of radio resources. 28. The method of claim 25, wherein the sending of the scheduled specific radio resource further comprises sending information relating to a pseudo-random sequence for selection of the first and second sets of radio resources to the first device. 29. The method of claim 28, further comprising re-scheduling, to the first device, the specific radio resource of the first set of radio resources while taking the first set of radio resources, selected according to the pseudo-random sequence, into account. 30. The method of claim 25, further comprising detecting the first device as stationary and the second device as non-stationary among the devices. 31. The method of claim 25, wherein the network node is comprised in a cellular radio communication network. 32. The method of claim 25, wherein the first and second devices are comprised in a D2D network, wherein the D2D network is managed by the network node via a cellular radio communication link. 33. The method of claim 25, wherein the radio resources denote one or more resource elements in a time-frequency grid of a cellular radio communication network that comprises the network node. 34. The method of claim 25, wherein the first device is one of a first number of stationary devices and the second device is one of a second number of non-stationary devices, wherein the selection of the first and second set of radio resources further is based on one or more of: the first number of stationary devices, and the second number of non-stationary devices. 35. A network node configured to manage radio resources, wherein the radio resources are dedicated for beacon signaling, by a first device and a second device, in conjunction with device-to-device (D2D) discovery, the first device being stationary and the second device being non-stationary, wherein the network node comprises: a processing circuit configured to select a first and a second set of radio resources out of the radio resources, wherein the first and second sets are dedicated for beacon signaling by the first device and the second device, respectively, wherein the first set of radio resources is non-overlapping with the second set of radio resources, wherein the processing circuit further is configured to schedule a specific radio resource of the first set of radio resources to the first device; and a transmitter configured to send: information about the scheduled specific radio resource to the first device; and information about the second set of radio resources to the second device, whereby the second device restricts its radio resources usable for beacon signaling to the second set of radio resources. 36. The network node of claim 35, wherein the processing circuit further is configured to select the first set and/or second set of radio resources based on one or more of: information relating to how often the first device and/or the second device requires the beacon signaling; service requirements for the first device and/or second device; and radio resource allocation in a second cell neighboring to a first cell operated by the network node. 37. The network node of claim 35, wherein the information about the second set of radio resources comprises information about resource elements to be used for beacon signaling and/or information relating to a pseudo-random sequence for selection of the first and second sets of radio resources. 38. The network node of claim 35, wherein the transmitter further is configured to send information relating to a/the pseudo-random sequence for selection of the first and second sets of radio resources to the first device. 39. The network node of claim 38, wherein the processing circuit further is configured to re-schedule, to the first device, the specific radio resource of the first set of radio resources, while taking the first set of radio resources, selected according to the pseudo-random sequence, into account. 40. The network node of claim 35, wherein the processing circuit further is configured to detect the first device as stationary and the second device as non-stationary among the devices. 41. The network node of claim 35, wherein the network node is comprised in a cellular radio communication network. 42. The network node of claim 35, wherein the first and second devices are comprised in a D2D network, wherein the D2D network is managed by the network node via a cellular radio communication link. 43. The network node of claim 35, wherein the radio resources denote one or more resource elements in a time-frequency grid of a cellular radio communication network that comprises the network node. 44. The network node of claim 35, wherein the first device is one of a first number of stationary devices and the second device is one of a second number of non-stationary devices, wherein the processing circuit further is configured to select the first and second set of radio resources based on one or more of: the first number of stationary devices, and the second number of non-stationary devices.
A network node ( 110 ) and a method therein for managing radio, resources are disclosed. The radio resources are dedicated for beacon ( 121, 122 ) signaling, fey a first device; ( 131 ) and a second device ( 132 ), in conjunction with device-to-device, “D2D”, discovery. The first device: ( 131 ) is stationary and the second device ( 132 ) is non-stationary. The network node ( 110 ) selects ( 202 ) a first and a second set of radio resources out of the radio resources. The first and second sets are dedicated for beacon signaling by the first device ( 131 ) and the second device ( 132 ), respectively. The first set of radio resources Is non-overlapping with the second set of radio resources. Then the network node ( 110 ) schedules ( 203 ) a specific radio resource of the first set of radio resources to the first device ( 131 ). Next, the network node ( 110 ) sends ( 204 ) information about the scheduled specific radio resource to the first device ( 131 ). The network node ( 110 ) further sends ( 205 ) information about the second set of radio resources to the second device ( 132 ). In this manner, the second device ( 132 ) restricts Us radio resources usable for beacon signaling to the second set of radio resources.1-24. (canceled) 25. A method, in a network node for managing radio resources, wherein the radio resources are dedicated for beacon signaling, by a first device and a second device, in conjunction with device-to-device (D2D) discovery, wherein the first device is stationary and the second device is non-stationary, the method comprising: selecting a first and a second set of radio resources out of the radio resources, wherein the first and second sets are dedicated for beacon signaling by the first device and the second device, respectively, wherein the first set of radio resources is non-overlapping with the second set of radio resources; scheduling a specific radio resource of the first set of radio resources to the first device; sending information about the scheduled specific radio resource to the first device; and sending information about the second set of radio resources to the second device, whereby the second device restricts its radio resources usable for beacon signaling to the second set of radio resources. 26. The method of claim 25, wherein the selection of the first set and/or second set of radio resources is based on one or more of: information relating to how often the first device and/or the second device requires the beacon signaling; service requirements for the first device and/or second device; and radio resource allocation in a second cell neighboring to a first cell operated by the network node. 27. The method of claim 25, wherein the information about the second set of radio resources comprises information about resource elements to be used for beacon signaling and/or information relating to a pseudo-random sequence for selection of the first and second sets of radio resources. 28. The method of claim 25, wherein the sending of the scheduled specific radio resource further comprises sending information relating to a pseudo-random sequence for selection of the first and second sets of radio resources to the first device. 29. The method of claim 28, further comprising re-scheduling, to the first device, the specific radio resource of the first set of radio resources while taking the first set of radio resources, selected according to the pseudo-random sequence, into account. 30. The method of claim 25, further comprising detecting the first device as stationary and the second device as non-stationary among the devices. 31. The method of claim 25, wherein the network node is comprised in a cellular radio communication network. 32. The method of claim 25, wherein the first and second devices are comprised in a D2D network, wherein the D2D network is managed by the network node via a cellular radio communication link. 33. The method of claim 25, wherein the radio resources denote one or more resource elements in a time-frequency grid of a cellular radio communication network that comprises the network node. 34. The method of claim 25, wherein the first device is one of a first number of stationary devices and the second device is one of a second number of non-stationary devices, wherein the selection of the first and second set of radio resources further is based on one or more of: the first number of stationary devices, and the second number of non-stationary devices. 35. A network node configured to manage radio resources, wherein the radio resources are dedicated for beacon signaling, by a first device and a second device, in conjunction with device-to-device (D2D) discovery, the first device being stationary and the second device being non-stationary, wherein the network node comprises: a processing circuit configured to select a first and a second set of radio resources out of the radio resources, wherein the first and second sets are dedicated for beacon signaling by the first device and the second device, respectively, wherein the first set of radio resources is non-overlapping with the second set of radio resources, wherein the processing circuit further is configured to schedule a specific radio resource of the first set of radio resources to the first device; and a transmitter configured to send: information about the scheduled specific radio resource to the first device; and information about the second set of radio resources to the second device, whereby the second device restricts its radio resources usable for beacon signaling to the second set of radio resources. 36. The network node of claim 35, wherein the processing circuit further is configured to select the first set and/or second set of radio resources based on one or more of: information relating to how often the first device and/or the second device requires the beacon signaling; service requirements for the first device and/or second device; and radio resource allocation in a second cell neighboring to a first cell operated by the network node. 37. The network node of claim 35, wherein the information about the second set of radio resources comprises information about resource elements to be used for beacon signaling and/or information relating to a pseudo-random sequence for selection of the first and second sets of radio resources. 38. The network node of claim 35, wherein the transmitter further is configured to send information relating to a/the pseudo-random sequence for selection of the first and second sets of radio resources to the first device. 39. The network node of claim 38, wherein the processing circuit further is configured to re-schedule, to the first device, the specific radio resource of the first set of radio resources, while taking the first set of radio resources, selected according to the pseudo-random sequence, into account. 40. The network node of claim 35, wherein the processing circuit further is configured to detect the first device as stationary and the second device as non-stationary among the devices. 41. The network node of claim 35, wherein the network node is comprised in a cellular radio communication network. 42. The network node of claim 35, wherein the first and second devices are comprised in a D2D network, wherein the D2D network is managed by the network node via a cellular radio communication link. 43. The network node of claim 35, wherein the radio resources denote one or more resource elements in a time-frequency grid of a cellular radio communication network that comprises the network node. 44. The network node of claim 35, wherein the first device is one of a first number of stationary devices and the second device is one of a second number of non-stationary devices, wherein the processing circuit further is configured to select the first and second set of radio resources based on one or more of: the first number of stationary devices, and the second number of non-stationary devices.
2,400
6,933
6,933
14,616,432
2,477
Methods and apparatuses for wireless communication between at least one base station and user equipment, the user equipment including a transceiver and processing circuitry. The transceiver is configured to receive a packet comprising a control message with a header and a payload related to fragments of multimedia content. The header includes a message identifier indicating whether the control message is a low delay consumption message, a length of the controller message, and a version of the control message. The processing circuitry is configured to determine whether the control message is the low delay consumption message based on the message identifier. The processing circuitry is also configured to, responsive to the control message being the low delay consumption message, configure the packet based on the payload and the control message before receiving headers of the fragments of the multimedia content.
1. A user equipment for wireless communication with at least one base station comprising: a transceiver operable to communicate with the at least one base station by transmitting radio frequency signals to the at least one base station and by receiving radio frequency signals from the at least one base station configured to: receive a packet comprising a control message with a header and a payload related to fragments of multimedia content, wherein the header comprises: a message identifier indicating whether the control message is a low delay consumption message, a length of the controller message, and a version of the control message; and processing circuitry configured to: determine whether the control message is the low delay consumption message based on the message identifier; and responsive to the control message being the low delay consumption message, configure the packet based on the payload and the control message before receiving headers of the fragments of the multimedia content. 2. The user equipment of claim 1, wherein the payload comprises: a coding dependency structure flag indicating whether a decoding order of the packet is the same as a presentation order; a base presentation time offset indicating a base offset for presenting the fragments of the multimedia content; a period between two intra-coded samples; a sign of a sample presentation time offset for each fragment; and a value of the sample presentation time offset for each fragment. 3. The user equipment of claim 2, wherein the processing circuitry is further configured to: responsive to the coding dependency structure flag indicating that the decoding order of the packet is the same as the presentation order, configure the packet based on a base presentation time offset. 4. The user equipment of claim 2, wherein the processing circuitry is further configured to: responsive to the coding dependency structure flag indicating that the decoding order of the packet is not the same as the presentation order, configure the packet based on the sample presentation time offset for each fragment, the sign, and the value. 5. The user equipment of claim 1, wherein the processing circuitry is further configured to: responsive to the control message not being the low delay consumption message, configure the packet in sequential order. 6. The user equipment of claim 1, wherein the header further comprises: extension information including configuration information related to the control message payload. 7. The user equipment of claim 2, wherein configuring the packet based on the sample presentation time offset for each fragment, the sign, and the value is based on the version. 8. A method for wireless communication with at least one base station comprising: receiving a packet comprising a control message with a header and a payload related to fragments of multimedia content, wherein the header comprises: a message identifier indicating whether the control message is a low delay consumption message, a length of the controller message, and a version of the control message; and determine whether the control message is the low delay consumption message based on the message identifier; and responsive to the control message being the low delay consumption message, configure the packet based on the payload and the control message before receiving headers of the fragments of the multimedia content. 9. The method of claim 8, wherein the payload comprises: a coding dependency structure flag indicating whether a decoding order of the packet is the same as a presentation order; a base presentation time offset indicating a base offset for presenting the fragments of the multimedia content; a period between two intra-coded samples; a sign of a sample presentation time offset for each fragment; and a value of the sample presentation time offset for each fragment. 10. The method of claim 9, further comprising: responsive to the coding dependency structure flag indicating that the decoding order of the packet is the same as the presentation order, configuring the packet based on a base presentation time offset. 11. The method of claim 9, further comprising: responsive to the coding dependency structure flag indicating that the decoding order of the packet is not the same as the presentation order, configuring the packet based on the sample presentation time offset for each fragment, the sign, and the value. 12. The method of claim 8, further comprising: responsive to the control message not being the low delay consumption message, configuring the packet in sequential order. 13. The method of claim 8, wherein the header further comprises: extension information including configuration information related to the control message payload. 14. The method of claim 9, wherein configuring the packet based on the sample presentation time offset for each fragment, the sign, and the value is based on the version. 15. A system, the system comprising: a user equipment for wireless communication with at least one base station, the user equipment comprising: a transceiver operable to communicate with the at least one base station by transmitting radio frequency signals to the at least one base station and by receiving radio frequency signals from the at least one base station configured to: receive a packet comprising a control message with a header and a payload related to fragments of multimedia content, wherein the header comprises: a message identifier indicating whether the control message is a low delay consumption message, a length of the controller message, and a version of the control message; and processing circuitry configured to: determine whether the control message is the low delay consumption message based on the message identifier; and responsive to the control message being the low delay consumption message, configure the packet based on the payload and the control message before receiving headers of the fragments of the multimedia content. 16. The user equipment of claim 15, wherein the payload comprises: a coding dependency structure flag indicating whether a decoding order of the packet is the same as a presentation order; a base presentation time offset indicating a base offset for presenting the fragments of the multimedia content; a period between two intra-coded samples; a sign of a sample presentation time offset for each fragment; and a value of the sample presentation time offset for each fragment. 17. The user equipment of claim 16, wherein the processing circuitry is further configured to: responsive to the coding dependency structure flag indicating that the decoding order of the packet is the same as the presentation order, configure the packet based on a base presentation time offset. 18. The user equipment of claim 16, wherein the processing circuitry is further configured to: responsive to the coding dependency structure flag indicating that the decoding order of the packet is not the same as the presentation order, configure the packet based on the sample presentation time offset for each fragment, the sign, and the value. 19. The user equipment of claim 15, wherein the processing circuitry is further configured to: responsive to the control message not being the low delay consumption message, configure the packet in sequential order. 20. The user equipment of claim 15, wherein the header further comprises: extension information including configuration information related to the control message payload.
Methods and apparatuses for wireless communication between at least one base station and user equipment, the user equipment including a transceiver and processing circuitry. The transceiver is configured to receive a packet comprising a control message with a header and a payload related to fragments of multimedia content. The header includes a message identifier indicating whether the control message is a low delay consumption message, a length of the controller message, and a version of the control message. The processing circuitry is configured to determine whether the control message is the low delay consumption message based on the message identifier. The processing circuitry is also configured to, responsive to the control message being the low delay consumption message, configure the packet based on the payload and the control message before receiving headers of the fragments of the multimedia content.1. A user equipment for wireless communication with at least one base station comprising: a transceiver operable to communicate with the at least one base station by transmitting radio frequency signals to the at least one base station and by receiving radio frequency signals from the at least one base station configured to: receive a packet comprising a control message with a header and a payload related to fragments of multimedia content, wherein the header comprises: a message identifier indicating whether the control message is a low delay consumption message, a length of the controller message, and a version of the control message; and processing circuitry configured to: determine whether the control message is the low delay consumption message based on the message identifier; and responsive to the control message being the low delay consumption message, configure the packet based on the payload and the control message before receiving headers of the fragments of the multimedia content. 2. The user equipment of claim 1, wherein the payload comprises: a coding dependency structure flag indicating whether a decoding order of the packet is the same as a presentation order; a base presentation time offset indicating a base offset for presenting the fragments of the multimedia content; a period between two intra-coded samples; a sign of a sample presentation time offset for each fragment; and a value of the sample presentation time offset for each fragment. 3. The user equipment of claim 2, wherein the processing circuitry is further configured to: responsive to the coding dependency structure flag indicating that the decoding order of the packet is the same as the presentation order, configure the packet based on a base presentation time offset. 4. The user equipment of claim 2, wherein the processing circuitry is further configured to: responsive to the coding dependency structure flag indicating that the decoding order of the packet is not the same as the presentation order, configure the packet based on the sample presentation time offset for each fragment, the sign, and the value. 5. The user equipment of claim 1, wherein the processing circuitry is further configured to: responsive to the control message not being the low delay consumption message, configure the packet in sequential order. 6. The user equipment of claim 1, wherein the header further comprises: extension information including configuration information related to the control message payload. 7. The user equipment of claim 2, wherein configuring the packet based on the sample presentation time offset for each fragment, the sign, and the value is based on the version. 8. A method for wireless communication with at least one base station comprising: receiving a packet comprising a control message with a header and a payload related to fragments of multimedia content, wherein the header comprises: a message identifier indicating whether the control message is a low delay consumption message, a length of the controller message, and a version of the control message; and determine whether the control message is the low delay consumption message based on the message identifier; and responsive to the control message being the low delay consumption message, configure the packet based on the payload and the control message before receiving headers of the fragments of the multimedia content. 9. The method of claim 8, wherein the payload comprises: a coding dependency structure flag indicating whether a decoding order of the packet is the same as a presentation order; a base presentation time offset indicating a base offset for presenting the fragments of the multimedia content; a period between two intra-coded samples; a sign of a sample presentation time offset for each fragment; and a value of the sample presentation time offset for each fragment. 10. The method of claim 9, further comprising: responsive to the coding dependency structure flag indicating that the decoding order of the packet is the same as the presentation order, configuring the packet based on a base presentation time offset. 11. The method of claim 9, further comprising: responsive to the coding dependency structure flag indicating that the decoding order of the packet is not the same as the presentation order, configuring the packet based on the sample presentation time offset for each fragment, the sign, and the value. 12. The method of claim 8, further comprising: responsive to the control message not being the low delay consumption message, configuring the packet in sequential order. 13. The method of claim 8, wherein the header further comprises: extension information including configuration information related to the control message payload. 14. The method of claim 9, wherein configuring the packet based on the sample presentation time offset for each fragment, the sign, and the value is based on the version. 15. A system, the system comprising: a user equipment for wireless communication with at least one base station, the user equipment comprising: a transceiver operable to communicate with the at least one base station by transmitting radio frequency signals to the at least one base station and by receiving radio frequency signals from the at least one base station configured to: receive a packet comprising a control message with a header and a payload related to fragments of multimedia content, wherein the header comprises: a message identifier indicating whether the control message is a low delay consumption message, a length of the controller message, and a version of the control message; and processing circuitry configured to: determine whether the control message is the low delay consumption message based on the message identifier; and responsive to the control message being the low delay consumption message, configure the packet based on the payload and the control message before receiving headers of the fragments of the multimedia content. 16. The user equipment of claim 15, wherein the payload comprises: a coding dependency structure flag indicating whether a decoding order of the packet is the same as a presentation order; a base presentation time offset indicating a base offset for presenting the fragments of the multimedia content; a period between two intra-coded samples; a sign of a sample presentation time offset for each fragment; and a value of the sample presentation time offset for each fragment. 17. The user equipment of claim 16, wherein the processing circuitry is further configured to: responsive to the coding dependency structure flag indicating that the decoding order of the packet is the same as the presentation order, configure the packet based on a base presentation time offset. 18. The user equipment of claim 16, wherein the processing circuitry is further configured to: responsive to the coding dependency structure flag indicating that the decoding order of the packet is not the same as the presentation order, configure the packet based on the sample presentation time offset for each fragment, the sign, and the value. 19. The user equipment of claim 15, wherein the processing circuitry is further configured to: responsive to the control message not being the low delay consumption message, configure the packet in sequential order. 20. The user equipment of claim 15, wherein the header further comprises: extension information including configuration information related to the control message payload.
2,400
6,934
6,934
14,519,648
2,438
A processing system includes a processing core to execute a task and a memory management unit, coupled to the core. The memory management unit includes a storage unit to store a page table entry including one or more identifiers of memory frames, a protection key, and an access mode bit indicating whether the one or more memory frames are accessible according to a user mode or according to a supervisor mode, a first permission register including a plurality of fields, each field comprising a set of bits reflecting a set of memory access permissions under the user mode, and a second permission register storing a plurality of fields, each field comprising a set of bits reflecting a set of memory access permissions under the supervisor mode.
1. A processing system comprising: a processing core to execute a task; and a memory management unit, coupled to the processing core, comprising: a storage unit to store a page table entry comprising one or more identifiers of memory frames, a protection key, and an access mode bit indicating whether the one or more memory frames are accessible according to a user mode or according to a supervisor mode; a first permission register comprising a plurality of fields, each field comprising a set of bits reflecting a set of memory access permissions under the user mode; and a second permission register storing a plurality of fields, each field comprising a set of bits reflecting a set of memory access permissions under the supervisor mode. 2. The processing system of claim 1, wherein the memory management unit further comprises a multiplexer comprising a first input coupled to the first permission register, a second input coupled to the second permission register, and a control pin coupled to the access mode bit. 3. The processing system of claim 2, wherein the multiplexer, responsive to the access mode bit indicating the user mode, is to provide a first set of bits stored in one of the plurality of fields of the first permission register to an output of the multiplexer, and the multiplexer, responsive to the access mode bit indicating the supervisor mode, is to provide a second set of bits stored in one of the plurality of fields of the second permission register to the output of the multiplexer. 4. The processing system of claim 3, wherein the one of the plurality of fields of the first permission register is selected according to the protection key of the page table entry, and the one of the plurality fields of the second permission register is selected according to the protection key of the page table entry. 5. The processing system of claim 3, wherein the first set of bits comprises at least one of a first bit indicating a read permission, a second bit indicating a write permission, or a third bit indicating an execution permission, and wherein the second set of bits comprises at least one of a first bit indicating a read permission, a second bit indicating a write permission, or a third bit indicating an execution permission. 6. The processing system of claim 5, wherein the page table entry comprises a plurality of status bits. 7. The processing system of claim 6, wherein the memory management unit comprises a controller to receive the plurality of status bits and determine a first set of memory access permissions based on the plurality of status bits, and wherein the first set of memory access permissions comprises at least one of a first bit indicating a read permission, a second bit indicating a write permission, or a third bit indicating an execution permission. 8. The processing system of claim 7, wherein the memory management unit comprises an AND logic comprising a first input to receive the first of memory access permissions and a second input to receive a second set of memory access permissions from the output of the multiplexer, wherein the AND logic is to generate a set of final memory access permissions based on the first and the second sets of memory access permissions. 9. The processing system of claim 8, wherein the memory management unit provides the task access to the one or more memory frames based on the final memory access permission. 10. The processing system of claim 1, wherein the task has a privilege level of one of a user-mode access or a supervisor-mode access. 11. The processing system of claim 10, wherein the first permission register is accessible by the task having a privilege level of one of the user-mode access or the supervisor-mode access. 12. The processing system of claim 11, wherein the first permission register comprises multiple permissions bits that are settable by the task having the privilege level of one of the user-mode access or the supervisor-mode access. 13. The processing system of claim 12, wherein the task having the privilege level of one of the user-mode access or the supervisor-mode access is to identify a permission bit stored in the first permission register and set the permission bit to disable the permission. 14. The processor of claim 1, wherein the protection key comprises n bits, and each of the first and second permission registers comprises 2n fields. 15. A system-on-a chip (SoC) comprising: a memory; and a processor, communicatively coupled to the memory, comprising: a processing core to execute a task; and a memory management unit, coupled to the processing core, comprising: a storage unit to store a page table entry comprising one or more identifiers of memory frames, a protection key, and an access mode bit indicating whether the one or more memory frames are accessible according to a user mode or according to a supervisor mode; a first permission register comprising a plurality of fields, each field comprising a set of bits reflecting a set of memory access permissions under the user mode; and a second permission register storing a plurality of fields, each field comprising a set of bits reflecting a set of memory access permissions under the supervisor mode. 16. The SoC of claim 15, wherein the memory management unit further comprises a multiplexer comprising a first input coupled to the first permission register, a second input coupled to the second permission register, and a control pin coupled to the access mode bit. 17. The SoC of claim 16, wherein the multiplexer, responsive to the access mode bit indicating the user mode, is to provide a first set of bits stored in one of the plurality of fields of the first permission register to an output of the multiplexer, and the multiplexer, responsive to the access mode bit indicating the supervisor mode, is to provide a second set of bits stored in one of the plurality of fields of the second permission register to the output of the multiplexer. 18. The SoC of claim 17, wherein the one of the plurality of fields of the first permission register is selected according to the protection key of the page table entry, and the one of the plurality fields of the second permission register is selected according to the protection key of the page table entry. 19. The SoC of claim 17, wherein the first set of bits comprises at least one of a first bit indicating a read permission, a second bit indicating a write permission, or a third bit indicating an execution permission, and wherein the second set of bits comprises at least one of a first bit indicating a read permission, a second bit indicating a write permission, or a third bit indicating an execution permission. 20. The SoC of claim 19, wherein the page table entry comprises a plurality of status bits, wherein the memory management unit comprises a controller to receive the plurality of status bits and determine a first set of memory access permissions based on the plurality of status bits, and wherein the first set of memory access permissions comprises at least one of a first bit indicating a read permission, a second bit indicating a write permission, or a third bit indicating an execution permission, and wherein the memory management unit comprises an AND logic comprising a first input to receive the first of memory access permissions and a second input to receive a second set of memory access permissions from the output of the multiplexer, wherein the AND logic is to generate a set of final memory access permissions based on the first and the second sets of memory access permissions. 21. A method, comprising: determining, by a processing core, an access mode of a task based on a privilege level of the task, wherein the access mode is one of a user-mode access or a supervisor-mode access; determining an identifier of a memory frame allocated by the task; selecting, by the processing core executing an operating system, a protection key for the task; and storing the protection key, the access mode, and the identifier in a page table entry of a memory management unit coupled to the processing core. 22. The method of claim 21, further comprising: determining a memory access permission for the task, the memory access permission comprising at least one of a first bit indicating a read permission, a second bit indicating a write permission, or a third bit indicating an execution permission; selecting, based on the access mode, one of a first permission register assigned for the user-mode access or a second permission register assigned for the supervisor-mode access; identifying, based on the protection key, a field in the selected one of the first permission register or the second permission register; and storing the memory access permission in the identified field. 23. The method of claim 21, wherein the first permission register is accessible by the task having a privilege level of the user-mode access, and wherein the first permission register comprises a write disable bit that is settable by the task having the privilege level of the user-mode access.
A processing system includes a processing core to execute a task and a memory management unit, coupled to the core. The memory management unit includes a storage unit to store a page table entry including one or more identifiers of memory frames, a protection key, and an access mode bit indicating whether the one or more memory frames are accessible according to a user mode or according to a supervisor mode, a first permission register including a plurality of fields, each field comprising a set of bits reflecting a set of memory access permissions under the user mode, and a second permission register storing a plurality of fields, each field comprising a set of bits reflecting a set of memory access permissions under the supervisor mode.1. A processing system comprising: a processing core to execute a task; and a memory management unit, coupled to the processing core, comprising: a storage unit to store a page table entry comprising one or more identifiers of memory frames, a protection key, and an access mode bit indicating whether the one or more memory frames are accessible according to a user mode or according to a supervisor mode; a first permission register comprising a plurality of fields, each field comprising a set of bits reflecting a set of memory access permissions under the user mode; and a second permission register storing a plurality of fields, each field comprising a set of bits reflecting a set of memory access permissions under the supervisor mode. 2. The processing system of claim 1, wherein the memory management unit further comprises a multiplexer comprising a first input coupled to the first permission register, a second input coupled to the second permission register, and a control pin coupled to the access mode bit. 3. The processing system of claim 2, wherein the multiplexer, responsive to the access mode bit indicating the user mode, is to provide a first set of bits stored in one of the plurality of fields of the first permission register to an output of the multiplexer, and the multiplexer, responsive to the access mode bit indicating the supervisor mode, is to provide a second set of bits stored in one of the plurality of fields of the second permission register to the output of the multiplexer. 4. The processing system of claim 3, wherein the one of the plurality of fields of the first permission register is selected according to the protection key of the page table entry, and the one of the plurality fields of the second permission register is selected according to the protection key of the page table entry. 5. The processing system of claim 3, wherein the first set of bits comprises at least one of a first bit indicating a read permission, a second bit indicating a write permission, or a third bit indicating an execution permission, and wherein the second set of bits comprises at least one of a first bit indicating a read permission, a second bit indicating a write permission, or a third bit indicating an execution permission. 6. The processing system of claim 5, wherein the page table entry comprises a plurality of status bits. 7. The processing system of claim 6, wherein the memory management unit comprises a controller to receive the plurality of status bits and determine a first set of memory access permissions based on the plurality of status bits, and wherein the first set of memory access permissions comprises at least one of a first bit indicating a read permission, a second bit indicating a write permission, or a third bit indicating an execution permission. 8. The processing system of claim 7, wherein the memory management unit comprises an AND logic comprising a first input to receive the first of memory access permissions and a second input to receive a second set of memory access permissions from the output of the multiplexer, wherein the AND logic is to generate a set of final memory access permissions based on the first and the second sets of memory access permissions. 9. The processing system of claim 8, wherein the memory management unit provides the task access to the one or more memory frames based on the final memory access permission. 10. The processing system of claim 1, wherein the task has a privilege level of one of a user-mode access or a supervisor-mode access. 11. The processing system of claim 10, wherein the first permission register is accessible by the task having a privilege level of one of the user-mode access or the supervisor-mode access. 12. The processing system of claim 11, wherein the first permission register comprises multiple permissions bits that are settable by the task having the privilege level of one of the user-mode access or the supervisor-mode access. 13. The processing system of claim 12, wherein the task having the privilege level of one of the user-mode access or the supervisor-mode access is to identify a permission bit stored in the first permission register and set the permission bit to disable the permission. 14. The processor of claim 1, wherein the protection key comprises n bits, and each of the first and second permission registers comprises 2n fields. 15. A system-on-a chip (SoC) comprising: a memory; and a processor, communicatively coupled to the memory, comprising: a processing core to execute a task; and a memory management unit, coupled to the processing core, comprising: a storage unit to store a page table entry comprising one or more identifiers of memory frames, a protection key, and an access mode bit indicating whether the one or more memory frames are accessible according to a user mode or according to a supervisor mode; a first permission register comprising a plurality of fields, each field comprising a set of bits reflecting a set of memory access permissions under the user mode; and a second permission register storing a plurality of fields, each field comprising a set of bits reflecting a set of memory access permissions under the supervisor mode. 16. The SoC of claim 15, wherein the memory management unit further comprises a multiplexer comprising a first input coupled to the first permission register, a second input coupled to the second permission register, and a control pin coupled to the access mode bit. 17. The SoC of claim 16, wherein the multiplexer, responsive to the access mode bit indicating the user mode, is to provide a first set of bits stored in one of the plurality of fields of the first permission register to an output of the multiplexer, and the multiplexer, responsive to the access mode bit indicating the supervisor mode, is to provide a second set of bits stored in one of the plurality of fields of the second permission register to the output of the multiplexer. 18. The SoC of claim 17, wherein the one of the plurality of fields of the first permission register is selected according to the protection key of the page table entry, and the one of the plurality fields of the second permission register is selected according to the protection key of the page table entry. 19. The SoC of claim 17, wherein the first set of bits comprises at least one of a first bit indicating a read permission, a second bit indicating a write permission, or a third bit indicating an execution permission, and wherein the second set of bits comprises at least one of a first bit indicating a read permission, a second bit indicating a write permission, or a third bit indicating an execution permission. 20. The SoC of claim 19, wherein the page table entry comprises a plurality of status bits, wherein the memory management unit comprises a controller to receive the plurality of status bits and determine a first set of memory access permissions based on the plurality of status bits, and wherein the first set of memory access permissions comprises at least one of a first bit indicating a read permission, a second bit indicating a write permission, or a third bit indicating an execution permission, and wherein the memory management unit comprises an AND logic comprising a first input to receive the first of memory access permissions and a second input to receive a second set of memory access permissions from the output of the multiplexer, wherein the AND logic is to generate a set of final memory access permissions based on the first and the second sets of memory access permissions. 21. A method, comprising: determining, by a processing core, an access mode of a task based on a privilege level of the task, wherein the access mode is one of a user-mode access or a supervisor-mode access; determining an identifier of a memory frame allocated by the task; selecting, by the processing core executing an operating system, a protection key for the task; and storing the protection key, the access mode, and the identifier in a page table entry of a memory management unit coupled to the processing core. 22. The method of claim 21, further comprising: determining a memory access permission for the task, the memory access permission comprising at least one of a first bit indicating a read permission, a second bit indicating a write permission, or a third bit indicating an execution permission; selecting, based on the access mode, one of a first permission register assigned for the user-mode access or a second permission register assigned for the supervisor-mode access; identifying, based on the protection key, a field in the selected one of the first permission register or the second permission register; and storing the memory access permission in the identified field. 23. The method of claim 21, wherein the first permission register is accessible by the task having a privilege level of the user-mode access, and wherein the first permission register comprises a write disable bit that is settable by the task having the privilege level of the user-mode access.
2,400
6,935
6,935
12,174,963
2,448
Web pages retrieved by a browser core are translated into user interface component definitions and page information. The definitions and page information are transmitted to a user device which recomposes the definitions and page information into a format for presentation to a user on a user device. Transmitting the definitions and page information includes translation of the definitions and page information into a format appropriate for both the particular communications media on which the information is transmitted, and the device to which the information is transmitted. The device includes a browser client which performs the recomposition. The browser client also receives user input, and may respond by altering the information locally at the user device, and sending information related to the user selection back to the browser core for further processing. The browser core also tracks user sessions, thus allowing a user to access the network from several devices, and capture session information for each access from each device. This allows users to switch devices, and start a new session at the point where a previous session ended.
1. Apparatus for transmitting network-related information, comprising: means for receiving a request for first network information; means for retrieving first network information having interactive elements; means for analyzing the first network information and creating second network information comprising definitions based on characteristics of the interactive elements; and means for transmitting the second network information and the definitions. 2. The apparatus according to claim 1, wherein the means for receiving a request includes: means for capturing session information related to the request. 3. The apparatus according to claim 1, wherein the means for retrieving network information includes: means for accessing the Internet. 4. The apparatus according to claim 1, wherein the means for transmitting includes: means for translating the second network information from a first format to a second format. 5. The apparatus according to claim 1, wherein the means for transmitting includes: first path means for transmitting the definitions; and second path means for transmitting the second network information. 6. The apparatus according to claim 1, further comprising: means for receiving user requests related to the definitions. 7. A method for transmitting network-related information, comprising: retrieving first network information having interactive elements; analyzing the first network information and creating second network information and definitions based on characteristics of the interactive elements; and transmitting the second network information and the definitions. 8. The method according to claim 7, wherein the step of receiving a request includes: capturing session information related to the request. 9. The method according to claim 7, wherein the step of retrieving network information includes the substep of: accessing the Internet. 10. The method according to claim 7, wherein the step of transmitting includes the substep of: translating the second network information from a first format to a second format. 11. The method according to claim 7, wherein the step of transmitting includes the substeps of: transmitting the definitions on a first path; and transmitting the second network information on a second path. 12. The method according to claim 7, further comprising the step of: receiving user requests related to the definitions. 13. A system for handling network information transfer between a network and a user device, comprising: means for receiving a network request from a user device for first network information; means for retrieving the first network information; means for processing the first network information to create second network information comprising a user interface element definition and display information; means for transmitting the second network information over a communications media; and means for receiving the second network information and recomposing the second network information to form third network information for the user device. 14-45. (canceled)
Web pages retrieved by a browser core are translated into user interface component definitions and page information. The definitions and page information are transmitted to a user device which recomposes the definitions and page information into a format for presentation to a user on a user device. Transmitting the definitions and page information includes translation of the definitions and page information into a format appropriate for both the particular communications media on which the information is transmitted, and the device to which the information is transmitted. The device includes a browser client which performs the recomposition. The browser client also receives user input, and may respond by altering the information locally at the user device, and sending information related to the user selection back to the browser core for further processing. The browser core also tracks user sessions, thus allowing a user to access the network from several devices, and capture session information for each access from each device. This allows users to switch devices, and start a new session at the point where a previous session ended.1. Apparatus for transmitting network-related information, comprising: means for receiving a request for first network information; means for retrieving first network information having interactive elements; means for analyzing the first network information and creating second network information comprising definitions based on characteristics of the interactive elements; and means for transmitting the second network information and the definitions. 2. The apparatus according to claim 1, wherein the means for receiving a request includes: means for capturing session information related to the request. 3. The apparatus according to claim 1, wherein the means for retrieving network information includes: means for accessing the Internet. 4. The apparatus according to claim 1, wherein the means for transmitting includes: means for translating the second network information from a first format to a second format. 5. The apparatus according to claim 1, wherein the means for transmitting includes: first path means for transmitting the definitions; and second path means for transmitting the second network information. 6. The apparatus according to claim 1, further comprising: means for receiving user requests related to the definitions. 7. A method for transmitting network-related information, comprising: retrieving first network information having interactive elements; analyzing the first network information and creating second network information and definitions based on characteristics of the interactive elements; and transmitting the second network information and the definitions. 8. The method according to claim 7, wherein the step of receiving a request includes: capturing session information related to the request. 9. The method according to claim 7, wherein the step of retrieving network information includes the substep of: accessing the Internet. 10. The method according to claim 7, wherein the step of transmitting includes the substep of: translating the second network information from a first format to a second format. 11. The method according to claim 7, wherein the step of transmitting includes the substeps of: transmitting the definitions on a first path; and transmitting the second network information on a second path. 12. The method according to claim 7, further comprising the step of: receiving user requests related to the definitions. 13. A system for handling network information transfer between a network and a user device, comprising: means for receiving a network request from a user device for first network information; means for retrieving the first network information; means for processing the first network information to create second network information comprising a user interface element definition and display information; means for transmitting the second network information over a communications media; and means for receiving the second network information and recomposing the second network information to form third network information for the user device. 14-45. (canceled)
2,400
6,936
6,936
13,862,380
2,436
Time-based functionality restrictions may be provided. Periodic scans may be performed to identify requests to perform functions on user devices, to determine whether the functions are compliant with compliance rules associated with the user devices that specify time periods during which the user devices are authorized to perform the functions, and to perform remedial actions if the functions are not compliant with the compliance rules.
1. A method comprising: identifying at least one request to perform at least one function on at least one user device; determining whether the at least one request does not comply with at least one compliance rule associated with the at least one user device, wherein the at least one compliance rule comprises at least one time period when the at least one user device is authorized to perform the at least one function; and, performing at least one remedial action in response to at least one determination that the at least one request does not comply with at least one of the at least one compliance rule. 2. The method of claim 1, wherein the at least one request does not comply with the at least one compliance rule if the at least one request does not comply with the at least one compliance rule at the time of the at least one request. 3. The method of claim 1, wherein performing the at least one remedial action in response to the at least one determination that the at least one request does not comply with at least one of the at least one compliance rule comprises at least one of a determination that the at least one request does not comply with a threshold number of the at least one compliance rule and a determination that the at least one request does not comply with each of the at least one compliance rule. 4. The method of claim 1, wherein the at least one remedial action comprises at least one remedial action taken with respect to the at least one user device. 5. The method of claim 1, wherein the at least one remedial action further comprises at least one of disabling at least one hardware feature of the at least one user device, disabling at least one software feature of the at least one user device, disabling at least one application of the at least one user device, erasing the contents of at least one memory location of at least one user device, restoring the at least one user device to its factory state, and queuing the at least one request to perform the at least one function on the at least one user device until the at least one request complies with the at least one compliance rule associated with the at least one user device. 6. The method of claim 5, wherein the contents of the at least one memory location of the at least one user device comprises content associated with the at least one request, content associated with the at least one function, content associated with business data, and content associated with personal data. 7. The method of claim 1, wherein the at least one remedial action comprises at least one remedial action taken with respect to at least one remote service communicatively coupled to the at least one user device. 8. The method of claim 7, wherein the at least one remedial action further comprises at least one of blocking at least one data transmission from the at least one user device to the at least one remote service, blocking at least one data transmission from the at least one remote service to the at least one user device, and erasing at least the contents of at least one memory location of the at least one remote service. 9. An apparatus comprising: at least one memory storage; and at least one processor coupled to the at least one memory storage, wherein the at least one processor is configured to: identify at least one function being performed by at least one user device; determine whether the at least one function does not comply with at least one of at least one compliance rule associated with the at least one user device, wherein the at least one compliance rule comprises at least one time period when the at least one user device is authorized to perform the at least one function; and, performing at least one remedial action in response to at least one determination that the at least one function does not comply with at least one of the at least one compliance rule. 10. The apparatus of claim 9, wherein the at least one user device is communicatively coupled to the apparatus. 11. The apparatus of claim 9, wherein the at least one processor is configured to identify the at least one function being performed by the at least one user device on a periodic basis. 12. The apparatus of claim 11, wherein the periodic basis comprises a configurable setting defined by at least one administrator of the apparatus. 13. The apparatus of claim 9, wherein the at least one processor is configured to identify the at least one function being performed by the at least one user device at the request of at least one administrator of the apparatus. 14. The apparatus of claim 9, wherein performing the at least one remedial action in response to the at least one determination that the at least one request does not comply with at least one of the at least one compliance rule comprises at least one of a determination that the at least one request does not comply with a threshold number of the at least one compliance rule and a determination that the at least one request does not comply with each of the at least one compliance rule. 15. The apparatus of claim 9, wherein the at least one remedial action comprises at least one of disabling at least one hardware feature of the at least one user device, disabling at least one software feature of the at least one user device, disabling at least one application of the at least one user device, erasing the contents of at least one memory location of the at least one user device associated with business data, erasing the contents of at least one memory location of the at least one user device associated with business data, restoring the at least one user device to its factory state, and queuing the at least one request to perform the at least one function on the at least one user device until the at least one request complies with the at least one compliance rule associated with the at least one user device. 16. The apparatus of claim 9, wherein the at least one remedial action comprises at least one of blocking at least one data transmission from the at least one user device to at least one remote service communicatively coupled to the at least one user device, blocking at least one data transmission from the at least one remote service to the at least one user device, and erasing at least the contents of at least one memory location of the at least one remote service. 17. A non-transitory computer-readable medium that stores a set of instructions that when executed performs a method executed by the set of instructions comprising: identifying at least one function of at least one user device that does not comply with at least one of at least one compliance rule associated with the at least one user device, wherein the at least one compliance rule comprises at least one time period when the at least one user device is authorized to perform the at least one function; determining whether the noncompliant function has been previously detected; and, performing an escalated remedial action in response to at least one determination that the noncompliant function has been previously detected. 18. The non-transitory computer-readable medium of claim 17, wherein the escalated remedial action comprises erasing the contents of at least one memory location of the at least one user device, wherein the contents of the at least one memory location comprises business data. 19. The non-transitory computer-readable medium of claim 17, wherein the escalated remedial action comprises erasing the contents of at least one memory location of the at least one user device, wherein the contents of the at least one memory location comprises personal data. 20. The non-transitory computer-readable medium of claim 17, wherein the escalated remedial action comprises restoring the at least one user device to its factory state.
Time-based functionality restrictions may be provided. Periodic scans may be performed to identify requests to perform functions on user devices, to determine whether the functions are compliant with compliance rules associated with the user devices that specify time periods during which the user devices are authorized to perform the functions, and to perform remedial actions if the functions are not compliant with the compliance rules.1. A method comprising: identifying at least one request to perform at least one function on at least one user device; determining whether the at least one request does not comply with at least one compliance rule associated with the at least one user device, wherein the at least one compliance rule comprises at least one time period when the at least one user device is authorized to perform the at least one function; and, performing at least one remedial action in response to at least one determination that the at least one request does not comply with at least one of the at least one compliance rule. 2. The method of claim 1, wherein the at least one request does not comply with the at least one compliance rule if the at least one request does not comply with the at least one compliance rule at the time of the at least one request. 3. The method of claim 1, wherein performing the at least one remedial action in response to the at least one determination that the at least one request does not comply with at least one of the at least one compliance rule comprises at least one of a determination that the at least one request does not comply with a threshold number of the at least one compliance rule and a determination that the at least one request does not comply with each of the at least one compliance rule. 4. The method of claim 1, wherein the at least one remedial action comprises at least one remedial action taken with respect to the at least one user device. 5. The method of claim 1, wherein the at least one remedial action further comprises at least one of disabling at least one hardware feature of the at least one user device, disabling at least one software feature of the at least one user device, disabling at least one application of the at least one user device, erasing the contents of at least one memory location of at least one user device, restoring the at least one user device to its factory state, and queuing the at least one request to perform the at least one function on the at least one user device until the at least one request complies with the at least one compliance rule associated with the at least one user device. 6. The method of claim 5, wherein the contents of the at least one memory location of the at least one user device comprises content associated with the at least one request, content associated with the at least one function, content associated with business data, and content associated with personal data. 7. The method of claim 1, wherein the at least one remedial action comprises at least one remedial action taken with respect to at least one remote service communicatively coupled to the at least one user device. 8. The method of claim 7, wherein the at least one remedial action further comprises at least one of blocking at least one data transmission from the at least one user device to the at least one remote service, blocking at least one data transmission from the at least one remote service to the at least one user device, and erasing at least the contents of at least one memory location of the at least one remote service. 9. An apparatus comprising: at least one memory storage; and at least one processor coupled to the at least one memory storage, wherein the at least one processor is configured to: identify at least one function being performed by at least one user device; determine whether the at least one function does not comply with at least one of at least one compliance rule associated with the at least one user device, wherein the at least one compliance rule comprises at least one time period when the at least one user device is authorized to perform the at least one function; and, performing at least one remedial action in response to at least one determination that the at least one function does not comply with at least one of the at least one compliance rule. 10. The apparatus of claim 9, wherein the at least one user device is communicatively coupled to the apparatus. 11. The apparatus of claim 9, wherein the at least one processor is configured to identify the at least one function being performed by the at least one user device on a periodic basis. 12. The apparatus of claim 11, wherein the periodic basis comprises a configurable setting defined by at least one administrator of the apparatus. 13. The apparatus of claim 9, wherein the at least one processor is configured to identify the at least one function being performed by the at least one user device at the request of at least one administrator of the apparatus. 14. The apparatus of claim 9, wherein performing the at least one remedial action in response to the at least one determination that the at least one request does not comply with at least one of the at least one compliance rule comprises at least one of a determination that the at least one request does not comply with a threshold number of the at least one compliance rule and a determination that the at least one request does not comply with each of the at least one compliance rule. 15. The apparatus of claim 9, wherein the at least one remedial action comprises at least one of disabling at least one hardware feature of the at least one user device, disabling at least one software feature of the at least one user device, disabling at least one application of the at least one user device, erasing the contents of at least one memory location of the at least one user device associated with business data, erasing the contents of at least one memory location of the at least one user device associated with business data, restoring the at least one user device to its factory state, and queuing the at least one request to perform the at least one function on the at least one user device until the at least one request complies with the at least one compliance rule associated with the at least one user device. 16. The apparatus of claim 9, wherein the at least one remedial action comprises at least one of blocking at least one data transmission from the at least one user device to at least one remote service communicatively coupled to the at least one user device, blocking at least one data transmission from the at least one remote service to the at least one user device, and erasing at least the contents of at least one memory location of the at least one remote service. 17. A non-transitory computer-readable medium that stores a set of instructions that when executed performs a method executed by the set of instructions comprising: identifying at least one function of at least one user device that does not comply with at least one of at least one compliance rule associated with the at least one user device, wherein the at least one compliance rule comprises at least one time period when the at least one user device is authorized to perform the at least one function; determining whether the noncompliant function has been previously detected; and, performing an escalated remedial action in response to at least one determination that the noncompliant function has been previously detected. 18. The non-transitory computer-readable medium of claim 17, wherein the escalated remedial action comprises erasing the contents of at least one memory location of the at least one user device, wherein the contents of the at least one memory location comprises business data. 19. The non-transitory computer-readable medium of claim 17, wherein the escalated remedial action comprises erasing the contents of at least one memory location of the at least one user device, wherein the contents of the at least one memory location comprises personal data. 20. The non-transitory computer-readable medium of claim 17, wherein the escalated remedial action comprises restoring the at least one user device to its factory state.
2,400
6,937
6,937
14,274,363
2,457
In one embodiment, a system includes a processor and logic integrated with and/or executable by the processor, the logic being configured to cause the processor to: collect, by the processor, workload information for a computing/storage device for a present time period and one or more previous time periods; determine, by the processor, a maximum workload parameter for the present time period and the one or more previous time periods; determine, by the processor, a maximum workload threshold that corresponds to the maximum workload parameter; compute, by the processor, a difference between the maximum workload threshold and the maximum workload parameter; and determine, by the processor, an amount of workload to move to the computing/storage device based on the difference. Other methods and computer program products are presented in additional embodiments.
1. A method for managing data, the method comprising: collecting workload information for one or more computing/storage devices in a tiered data storage system over a period of time; determining a peak workload for the period of time on a per rank basis; determining a maximum workload threshold for the one or more computing/storage devices in the tiered data storage system over the period of time; and preventing movement of additional workload to the one or more computing/storage devices in the tiered data storage system over the period of time when adding the additional workload to the peak workload causes overload of the one or more computing/storage devices in the tiered data storage system. 2. The method as recited in claim 1, further comprising determining an amount of workload to move to the one or more computing/storage devices in the tiered data storage system based on a difference between the maximum workload threshold and the peak workload. 3. The method as recited in claim 1, wherein the period of time encompasses a cyclical workload pattern for the tiered data storage system. 4. The method as recited in claim 3, wherein the period of time is at least three days. 5. The method as recited in claim 3, wherein the period of time is seven days. 6. The method as recited in claim 1, wherein the workload information comprises a bandwidth of data input and output from the one or more computing/storage devices, and wherein the peak workload is a peak bandwidth of the one or more computing/storage devices. 7. The method as recited in claim 1, wherein the determining the peak workload for the period of time on the per rank basis, the determining the maximum workload threshold, and the preventing movement of the additional workload is performed for each of the one or more computing/storage devices individually. 8. The method as recited in claim 1, wherein the method is performed once per day. 9. A system, comprising a processor and logic integrated with and/or executable by the processor, the logic being configured to cause the processor to: collect, by the processor, workload information for a computing/storage device for a present time period and one or more previous time periods; determine, by the processor, a maximum workload parameter for the present time period and the one or more previous time periods; determine, by the processor, a maximum workload threshold that corresponds to the maximum workload parameter, compute, by the processor, a difference between the maximum workload threshold and the maximum workload parameter, and determine, by the processor, an amount of workload to move to the computing/storage device based on the difference. 10. The system as recited in claim 9, wherein the amount of workload moved to the computing/storage device is greater when the difference is greater than the amount of workload moved to the computing/storage device when the difference is less. 11. The system as recited in claim 9, wherein the time period is one day. 12. The system as recited in claim 9, wherein the one or more previous time periods includes at least two previous time periods. 13. The system as recited in claim 9, wherein the workload information comprises a bandwidth of data input and output from the computing/storage device, and wherein the maximum workload parameter comprises a peak bandwidth of the computing/storage device. 14. The system as recited in claim 9, wherein the computing/storage device comprises at least one of: random access memory (RAM), a direct access storage device (DASD), an array of DASDs, and a redundant array of independent disks (RAID). 15. The system as recited in claim 9, wherein the time period is one day and the one or more previous time periods includes at least two previous days. 16. The system as recited in claim 9, wherein the amount of workload to move to the computing/storage device is determined again after each time period. 17. A computer program product for managing data, the computer program product comprising a computer readable storage medium having program code embodied therewith, the program code executable by a processor to cause the processor to: collect workload information for a computing/storage device for a present time period and one or more previous time periods; determine a maximum workload parameter for the present time period and the one or more previous time periods; determine a maximum workload threshold that corresponds to the maximum workload parameter; compute a difference between the maximum workload threshold and the maximum workload parameter; and determine an amount of workload to move to the computing/storage device based on the difference. 18. The computer program product as recited in claim 17, wherein the amount of workload moved to the computing/storage device is greater when the difference is greater than the amount of workload moved to the computing/storage device when the difference is less, wherein the time period is one day, wherein the one or more previous time periods includes at least two previous days, wherein the workload information comprises a bandwidth of data input and output from the computing/storage device, and wherein the maximum workload parameter comprises a peak bandwidth of the computing/storage device. 19. The computer program product as recited in claim 17, wherein the computing/storage device comprises at least one of: random access memory (RAM), a direct access storage device (DASD), an array of DASDs, and a redundant array of independent disks (RAID), and wherein the amount of workload to move to the computing/storage device is determined again after each time period.
In one embodiment, a system includes a processor and logic integrated with and/or executable by the processor, the logic being configured to cause the processor to: collect, by the processor, workload information for a computing/storage device for a present time period and one or more previous time periods; determine, by the processor, a maximum workload parameter for the present time period and the one or more previous time periods; determine, by the processor, a maximum workload threshold that corresponds to the maximum workload parameter; compute, by the processor, a difference between the maximum workload threshold and the maximum workload parameter; and determine, by the processor, an amount of workload to move to the computing/storage device based on the difference. Other methods and computer program products are presented in additional embodiments.1. A method for managing data, the method comprising: collecting workload information for one or more computing/storage devices in a tiered data storage system over a period of time; determining a peak workload for the period of time on a per rank basis; determining a maximum workload threshold for the one or more computing/storage devices in the tiered data storage system over the period of time; and preventing movement of additional workload to the one or more computing/storage devices in the tiered data storage system over the period of time when adding the additional workload to the peak workload causes overload of the one or more computing/storage devices in the tiered data storage system. 2. The method as recited in claim 1, further comprising determining an amount of workload to move to the one or more computing/storage devices in the tiered data storage system based on a difference between the maximum workload threshold and the peak workload. 3. The method as recited in claim 1, wherein the period of time encompasses a cyclical workload pattern for the tiered data storage system. 4. The method as recited in claim 3, wherein the period of time is at least three days. 5. The method as recited in claim 3, wherein the period of time is seven days. 6. The method as recited in claim 1, wherein the workload information comprises a bandwidth of data input and output from the one or more computing/storage devices, and wherein the peak workload is a peak bandwidth of the one or more computing/storage devices. 7. The method as recited in claim 1, wherein the determining the peak workload for the period of time on the per rank basis, the determining the maximum workload threshold, and the preventing movement of the additional workload is performed for each of the one or more computing/storage devices individually. 8. The method as recited in claim 1, wherein the method is performed once per day. 9. A system, comprising a processor and logic integrated with and/or executable by the processor, the logic being configured to cause the processor to: collect, by the processor, workload information for a computing/storage device for a present time period and one or more previous time periods; determine, by the processor, a maximum workload parameter for the present time period and the one or more previous time periods; determine, by the processor, a maximum workload threshold that corresponds to the maximum workload parameter, compute, by the processor, a difference between the maximum workload threshold and the maximum workload parameter, and determine, by the processor, an amount of workload to move to the computing/storage device based on the difference. 10. The system as recited in claim 9, wherein the amount of workload moved to the computing/storage device is greater when the difference is greater than the amount of workload moved to the computing/storage device when the difference is less. 11. The system as recited in claim 9, wherein the time period is one day. 12. The system as recited in claim 9, wherein the one or more previous time periods includes at least two previous time periods. 13. The system as recited in claim 9, wherein the workload information comprises a bandwidth of data input and output from the computing/storage device, and wherein the maximum workload parameter comprises a peak bandwidth of the computing/storage device. 14. The system as recited in claim 9, wherein the computing/storage device comprises at least one of: random access memory (RAM), a direct access storage device (DASD), an array of DASDs, and a redundant array of independent disks (RAID). 15. The system as recited in claim 9, wherein the time period is one day and the one or more previous time periods includes at least two previous days. 16. The system as recited in claim 9, wherein the amount of workload to move to the computing/storage device is determined again after each time period. 17. A computer program product for managing data, the computer program product comprising a computer readable storage medium having program code embodied therewith, the program code executable by a processor to cause the processor to: collect workload information for a computing/storage device for a present time period and one or more previous time periods; determine a maximum workload parameter for the present time period and the one or more previous time periods; determine a maximum workload threshold that corresponds to the maximum workload parameter; compute a difference between the maximum workload threshold and the maximum workload parameter; and determine an amount of workload to move to the computing/storage device based on the difference. 18. The computer program product as recited in claim 17, wherein the amount of workload moved to the computing/storage device is greater when the difference is greater than the amount of workload moved to the computing/storage device when the difference is less, wherein the time period is one day, wherein the one or more previous time periods includes at least two previous days, wherein the workload information comprises a bandwidth of data input and output from the computing/storage device, and wherein the maximum workload parameter comprises a peak bandwidth of the computing/storage device. 19. The computer program product as recited in claim 17, wherein the computing/storage device comprises at least one of: random access memory (RAM), a direct access storage device (DASD), an array of DASDs, and a redundant array of independent disks (RAID), and wherein the amount of workload to move to the computing/storage device is determined again after each time period.
2,400
6,938
6,938
14,743,211
2,472
Techniques for sending control information relating to multiple downlink carriers and data on a single uplink carrier are described. A user equipment (UE) may be scheduled to transmit on a designated uplink carrier. The UE can multiplex control information for multiple downlink carriers with data for transmission on the uplink carrier in a same subframe. Multiplexing may be performed according to a type of the control information and/or an ordering, priority, or association of the downlink carriers. The UE can selectively encode the control information separately for each downlink carrier and/or jointly across downlink carriers. The control information may be mapped to a single layer or multiple layers of a data channel. The UE may send the multiplexed control information and data on the data channel in the subframe while maintaining a single-carrier waveform.
1. A method of wireless communication comprising: identifying a data channel of an uplink carrier, the data channel having a plurality of layers; determining control information for one or more downlink carriers to send on the data channel; mapping the control information onto one or more of the plurality of layers based at least in part on a type of the control information; and sending the control information over the data channel in accordance with the mapping. 2. The method of claim 1, wherein mapping the control information to the one or more of the plurality of layers comprises: mapping a first type of the control information to a first number of layers of the plurality of layers; and mapping a second type of the control information to a second number of layers of the plurality of layers, the second number of layers being different from the first number of layers. 3. The method of claim 2, wherein mapping the first type of the control information to the first number of layers comprises mapping the first type of the control information onto one layer of the plurality of layers. 4. The method of claim 2, wherein mapping the second type of the control information to the second number of layers comprises mapping the second type of the control information onto each of the plurality of layers. 5. The method of claim 2, wherein the first type of the control information comprises a channel quality indicator, a precoding matrix indicator, or a combination thereof, and wherein the second type of the control information comprises a rank indicator, an acknowledgement/negative acknowledgement, or a combination thereof. 6. The method of claim 1, further comprising: multiplexing the control information with a packet, wherein a different portion of the packet is sent on each of the plurality of layers. 7. The method of claim 6, further comprising: splitting the control information among the plurality of layers. 8. The method of claim 1, further comprising: multiplexing the control information with a plurality of packets, wherein one packet of the plurality of packets is sent on each of the plurality of layers. 9. The method of claim 8, further comprising: splitting the control information among the plurality of packets. 10. The method of claim 1, further comprising: jointly encoding the control information to obtain jointly coded control information for the one or more downlink carriers prior to the mapping the control information onto the one or more of the plurality of layers. 11. An apparatus for wireless communication, comprising: a processor; and memory coupled to the processor storing instructions that, when executed by the processor, cause the apparatus to: identify a data channel of an uplink carrier, the data channel having a plurality of layers; determine control information for one or more downlink carriers to send on the data channel; map the control information onto one or more of the plurality of layers based at least in part on a type of the control information; and send the control information over the data channel in accordance with the mapping. 12. The apparatus of claim 11, wherein the instructions are executable to cause the apparatus to: map a first type of the control information to a first number of layers of the plurality of layers; and map a second type of the control information to a second number of layers of the plurality of layers, the second number of layers being different from the first number of layers. 13. The apparatus of claim 12, wherein the instructions are executable to cause the apparatus to: map the first type of the control information onto one layer of the plurality of layers. 14. The apparatus of claim 12, wherein the instructions are executable to cause the apparatus to: map the second type of the control information onto each of the plurality of layers. 15. The apparatus of claim 12, wherein the first type of the control information comprises a channel quality indicator, a precoding matrix indicator, or a combination thereof, and wherein the second type of the control information comprises a rank indicator, an acknowledgement/negative acknowledgement, or a combination thereof. 16. The apparatus of claim 11, wherein the instructions are executable to cause the apparatus to: multiplex the control information with a packet, wherein a different portion of the packet is sent on each of the plurality of layers. 17. The apparatus of claim 16, wherein the instructions are executable to cause the apparatus to: split the control information among the plurality of layers. 18. The apparatus of claim 11, wherein the instructions are executable to cause the apparatus to: multiplex the control information with a plurality of packets, wherein one packet of the plurality of packets is sent on each of the plurality of layers. 19. The apparatus of claim 18, wherein the instructions are executable to cause the apparatus to: split the control information among the plurality of packets. 20. The apparatus of claim 11, wherein the instructions are executable to cause the apparatus to: jointly encoding the control information to obtain jointly coded control information for the one or more downlink carriers prior to the mapping the control information onto the one or more of the plurality of layers. 21. An apparatus for wireless communication, comprising: means for identifying a data channel of an uplink carrier, the data channel having a plurality of layers; means for determining control information for one or more downlink carriers to send on the data channel; means for mapping the control information onto one or more of the of the plurality of layers based at least in part on a type of the control information; and means for sending the control information over the data channel in accordance with the mapping. 22. The apparatus of claim 21, wherein the means for mapping the control information to the one or more of the plurality of layers comprises: means for mapping a first type of the control information to a first number of layers of the plurality of layers; and means for mapping a second type of the control information to a second number of layers of the plurality of layers, the second number of layers being different from the first number of layers. 23. The apparatus of claim 22, wherein the means for mapping the first type of the control information to the first number of layers maps the first type of the control information onto one layer of the plurality of layers. 24. The apparatus of claim 22, wherein the means for mapping the second type of the control information to the second number of layers maps the second type of the control information onto each of the plurality of layers. 25. The apparatus of claim 22, wherein the first type of the control information comprises a channel quality indicator, a precoding matrix indicator, or a combination thereof, and wherein the second type of the control information comprises a rank indicator, an acknowledgement/negative acknowledgement, or a combination thereof. 26. The apparatus of claim 21, further comprising: means for multiplexing the control information with a packet, wherein a different portion of the packet is sent on each of the plurality of layers. 27. The apparatus of claim 26, further comprising: means for splitting the control information among the plurality of layers. 28. The apparatus of claim 21, further comprising: means for multiplexing the control information with a plurality of packets, wherein one packet of the plurality of packets is sent on each of the plurality of layers. 29. The apparatus of claim 28, further comprising: means for splitting the control information among the plurality of packets. 30. A non-transitory computer-readable medium storing code for wireless communication, the code comprising instructions that are executable to: identify a data channel of an uplink carrier, the data channel having a plurality of layers; determine control information for one or more downlink carriers to send on the data channel; map the control information onto one or more of the plurality of layers based at least in part on a type of the control information; and send the control information over the data channel in accordance with the mapping.
Techniques for sending control information relating to multiple downlink carriers and data on a single uplink carrier are described. A user equipment (UE) may be scheduled to transmit on a designated uplink carrier. The UE can multiplex control information for multiple downlink carriers with data for transmission on the uplink carrier in a same subframe. Multiplexing may be performed according to a type of the control information and/or an ordering, priority, or association of the downlink carriers. The UE can selectively encode the control information separately for each downlink carrier and/or jointly across downlink carriers. The control information may be mapped to a single layer or multiple layers of a data channel. The UE may send the multiplexed control information and data on the data channel in the subframe while maintaining a single-carrier waveform.1. A method of wireless communication comprising: identifying a data channel of an uplink carrier, the data channel having a plurality of layers; determining control information for one or more downlink carriers to send on the data channel; mapping the control information onto one or more of the plurality of layers based at least in part on a type of the control information; and sending the control information over the data channel in accordance with the mapping. 2. The method of claim 1, wherein mapping the control information to the one or more of the plurality of layers comprises: mapping a first type of the control information to a first number of layers of the plurality of layers; and mapping a second type of the control information to a second number of layers of the plurality of layers, the second number of layers being different from the first number of layers. 3. The method of claim 2, wherein mapping the first type of the control information to the first number of layers comprises mapping the first type of the control information onto one layer of the plurality of layers. 4. The method of claim 2, wherein mapping the second type of the control information to the second number of layers comprises mapping the second type of the control information onto each of the plurality of layers. 5. The method of claim 2, wherein the first type of the control information comprises a channel quality indicator, a precoding matrix indicator, or a combination thereof, and wherein the second type of the control information comprises a rank indicator, an acknowledgement/negative acknowledgement, or a combination thereof. 6. The method of claim 1, further comprising: multiplexing the control information with a packet, wherein a different portion of the packet is sent on each of the plurality of layers. 7. The method of claim 6, further comprising: splitting the control information among the plurality of layers. 8. The method of claim 1, further comprising: multiplexing the control information with a plurality of packets, wherein one packet of the plurality of packets is sent on each of the plurality of layers. 9. The method of claim 8, further comprising: splitting the control information among the plurality of packets. 10. The method of claim 1, further comprising: jointly encoding the control information to obtain jointly coded control information for the one or more downlink carriers prior to the mapping the control information onto the one or more of the plurality of layers. 11. An apparatus for wireless communication, comprising: a processor; and memory coupled to the processor storing instructions that, when executed by the processor, cause the apparatus to: identify a data channel of an uplink carrier, the data channel having a plurality of layers; determine control information for one or more downlink carriers to send on the data channel; map the control information onto one or more of the plurality of layers based at least in part on a type of the control information; and send the control information over the data channel in accordance with the mapping. 12. The apparatus of claim 11, wherein the instructions are executable to cause the apparatus to: map a first type of the control information to a first number of layers of the plurality of layers; and map a second type of the control information to a second number of layers of the plurality of layers, the second number of layers being different from the first number of layers. 13. The apparatus of claim 12, wherein the instructions are executable to cause the apparatus to: map the first type of the control information onto one layer of the plurality of layers. 14. The apparatus of claim 12, wherein the instructions are executable to cause the apparatus to: map the second type of the control information onto each of the plurality of layers. 15. The apparatus of claim 12, wherein the first type of the control information comprises a channel quality indicator, a precoding matrix indicator, or a combination thereof, and wherein the second type of the control information comprises a rank indicator, an acknowledgement/negative acknowledgement, or a combination thereof. 16. The apparatus of claim 11, wherein the instructions are executable to cause the apparatus to: multiplex the control information with a packet, wherein a different portion of the packet is sent on each of the plurality of layers. 17. The apparatus of claim 16, wherein the instructions are executable to cause the apparatus to: split the control information among the plurality of layers. 18. The apparatus of claim 11, wherein the instructions are executable to cause the apparatus to: multiplex the control information with a plurality of packets, wherein one packet of the plurality of packets is sent on each of the plurality of layers. 19. The apparatus of claim 18, wherein the instructions are executable to cause the apparatus to: split the control information among the plurality of packets. 20. The apparatus of claim 11, wherein the instructions are executable to cause the apparatus to: jointly encoding the control information to obtain jointly coded control information for the one or more downlink carriers prior to the mapping the control information onto the one or more of the plurality of layers. 21. An apparatus for wireless communication, comprising: means for identifying a data channel of an uplink carrier, the data channel having a plurality of layers; means for determining control information for one or more downlink carriers to send on the data channel; means for mapping the control information onto one or more of the of the plurality of layers based at least in part on a type of the control information; and means for sending the control information over the data channel in accordance with the mapping. 22. The apparatus of claim 21, wherein the means for mapping the control information to the one or more of the plurality of layers comprises: means for mapping a first type of the control information to a first number of layers of the plurality of layers; and means for mapping a second type of the control information to a second number of layers of the plurality of layers, the second number of layers being different from the first number of layers. 23. The apparatus of claim 22, wherein the means for mapping the first type of the control information to the first number of layers maps the first type of the control information onto one layer of the plurality of layers. 24. The apparatus of claim 22, wherein the means for mapping the second type of the control information to the second number of layers maps the second type of the control information onto each of the plurality of layers. 25. The apparatus of claim 22, wherein the first type of the control information comprises a channel quality indicator, a precoding matrix indicator, or a combination thereof, and wherein the second type of the control information comprises a rank indicator, an acknowledgement/negative acknowledgement, or a combination thereof. 26. The apparatus of claim 21, further comprising: means for multiplexing the control information with a packet, wherein a different portion of the packet is sent on each of the plurality of layers. 27. The apparatus of claim 26, further comprising: means for splitting the control information among the plurality of layers. 28. The apparatus of claim 21, further comprising: means for multiplexing the control information with a plurality of packets, wherein one packet of the plurality of packets is sent on each of the plurality of layers. 29. The apparatus of claim 28, further comprising: means for splitting the control information among the plurality of packets. 30. A non-transitory computer-readable medium storing code for wireless communication, the code comprising instructions that are executable to: identify a data channel of an uplink carrier, the data channel having a plurality of layers; determine control information for one or more downlink carriers to send on the data channel; map the control information onto one or more of the plurality of layers based at least in part on a type of the control information; and send the control information over the data channel in accordance with the mapping.
2,400
6,939
6,939
14,458,257
2,462
An example method is provided for a source device to perform discovery of a path maximum transmission unit (PMTU) of a path between the source device and a destination device in a communications network. The method may comprise configuring and sending a request message to the destination device via an intermediate device on the path. The request message may be configured to have a size of an estimated PMTU of the path, to cause a reply message to be received from the destination device or at least one report message to be received from the intermediate device, and to include a flag that allows fragmentation of the request message. The method may further comprise receiving the reply message from the destination device or the at least one report message from the intermediate device responsive to the request message; and based on the reply message or the at least one report message, determining that fragmentation of the request message has occurred because the estimated PMTU is greater than an actual PMTU and updating the estimated PMTU.
1. A method for a source device to perform discovery of a path maximum transmission unit (PMTU) of a path between the source device and a destination device in a communications network, comprising: configuring a request message to have a size of an estimated PMTU of the path, to cause a reply message to be received from the destination device or at least one report message to be received from an intermediate device on the path, and to include a flag that allows fragmentation of the request message; sending the request message to the destination device via the intermediate device; receiving the reply message from the destination device or the at least one report message from the intermediate device responsive to the request message; and based on the reply message or the at least one report message, determining that fragmentation of the request message has occurred because the estimated PMTU is greater than an actual PMTU and updating the estimated PMTU. 2. The method of claim 1, wherein determining that fragmentation of the request message has occurred comprises: determining that the at least one report message from the intermediate device comprises multiple report messages for multiple fragments of the request message. 3. The method of claim 2, wherein updating the estimated PMTU based on the at least one report message comprises: based on the multiple report messages, determining a largest fragment of the request message, wherein each report message includes header information of one of the multiple fragments of the request message; and updating the estimated PMTU based on the largest fragment of the request message. 4. The method of claim 1, wherein configuring the request message further comprises: configuring the request message to have a time to live (TTL) parameter that expires at the intermediate device, wherein expiry of the TTL parameter causes the intermediate device to send the at least one report message in the form of at least one TTL expired message. 5. The method of claim 4, further comprising: sending a further request message addressed to the destination device via the intermediate device and a further intermediate device on the path, wherein the further request message is configured to have a size of the updated estimated PMTU, to cause a further report message from the further intermediate device by updating the TTL parameter and to have a flag that allows fragmentation of the further request message; receiving the further report message from the further intermediate device responsive to the further request message; and in response to determining that fragmentation of the further request message has occurred, further updating the updated estimated PMTU based on the further report message. 6. The method of claim 5, further comprising repeatedly sending the further request message and updating the estimated PMTU until the reply message is received from the destination device. 7. The method of claim 1, wherein determining that fragmentation of the request message has occurred comprises: determining that the reply message from the destination device comprises multiple fragments of the reply message. 8. The method of claim 7, wherein configuring the request message comprises: configuring the request message to have a TTL parameter that does not expire at the intermediate device, wherein the non-expiry of the TTL parameter allows the request message to reach the destination device to cause the destination device to send the reply message to the source device. 9. The method of claim 7, wherein updating the estimated PMTU based on the reply message comprises: determining a largest fragment of the reply message; and updating the estimated PMTU based on the largest fragment of the reply message. 10. The method of claim 1, wherein: the request message is an echo request message; and the reply message is an echo reply message that is configured to have the size of the estimated PMTU of the path and the flag that allows fragmentation of the echo reply message before reaching the source device. 11. The method of claim 1, wherein the request message is configured to cause the: the reply message from the destination device if routing between the source device and the destination device is symmetric; or the at least one report message from the intermediate device if routing between the source device and the destination device is asymmetric. 12. A non-transitory computer-readable storage medium that includes a set of instructions which, in response to execution by a processor, causes the processor to perform a method for a source device to perform discovery of a path maximum transmission unit (PMTU) of a path between the source device and a destination device in a communications network, the method comprising: configuring a request message to have a size of an estimated PMTU of the path, to cause a reply message to be received from the destination device or at least one report message to be received from an intermediate device on the path, and to include a flag that allows fragmentation of the request message; sending the request message to the destination device via the intermediate device; receiving the reply message from the destination device or the at least one report message from the intermediate device responsive to the request message; and based on the reply message or the at least one report message, determining that fragmentation of the request message has occurred because the estimated PMTU is greater than an actual PMTU and updating the estimated PMTU. 13. The non-transitory computer-readable storage medium of claim 12, determining that fragmentation of the request message has occurred comprises: determining that the at least one report message from the intermediate device comprises multiple report messages for multiple fragments of the request message. 14. The non-transitory computer-readable storage medium of claim 13, wherein updating the estimated PMTU based on the at least one report message comprises: based on the multiple report messages, determining a largest fragment of the request message, wherein each report message includes header information of one of the multiple fragments of the request message; and updating the estimated PMTU based on the largest fragment of the request message. 15. The non-transitory computer-readable storage medium of claim 12, wherein configuring the request message comprises: configuring the request message to have a time to live (TTL) parameter that expires at the intermediate device, wherein expiry of the TTL parameter causes the intermediate device to send the at least one report message in the form of at least one TTL expired message. 16. The non-transitory computer-readable storage medium of claim 14, further comprising: sending a further request message addressed to the destination device via the intermediate device and a further intermediate device on the path, wherein the further request message is configured to have a size of the updated estimated PMTU, to cause a further report message from the further intermediate device by updating the TTL parameter and to have a flag that allows fragmentation of the further request message; receiving the further report message from the further intermediate device responsive to the further request message; and in response to determining that fragmentation of the further request message has occurred, further updating the updated estimated PMTU based on the further report message. 17. The non-transitory computer-readable storage medium of claim 16, further comprising repeatedly sending the further request message and updating the estimated PMTU until the reply message is received from the destination device. 18. The non-transitory computer-readable storage medium of claim 12, wherein determining that fragmentation of the request message has occurred comprises: determining that the reply message from the destination device comprises multiple fragments of the reply message. 19. The non-transitory computer-readable storage medium of claim 18, wherein configuring the request message comprises: configuring the request message to have a TTL parameter that does not expire at the intermediate device, wherein non-expiry of the TTL parameter allows the request message to reach the destination device and to cause the destination device to send the reply message to the source device. 20. The non-transitory computer-readable storage medium of claim 18, wherein updating the estimated PMTU based on the reply message comprises: determining a largest fragment of the reply message; and updating the estimated PMTU based on the largest fragment of the reply message. 21. The non-transitory computer-readable storage medium of claim 12, wherein: the request message is an echo request message; and the reply message is an echo reply message that is configured to have the size of the estimated PMTU of the path and the flag that allows fragmentation of the echo reply message before reaching the source device. 22. The non-transitory computer-readable storage medium of claim 12, wherein the request message is configured to cause the: the reply message from the destination device if routing between the source device and the destination device is symmetric; or the at least one report message from the intermediate device if routing between the source device and the destination device is asymmetric.
An example method is provided for a source device to perform discovery of a path maximum transmission unit (PMTU) of a path between the source device and a destination device in a communications network. The method may comprise configuring and sending a request message to the destination device via an intermediate device on the path. The request message may be configured to have a size of an estimated PMTU of the path, to cause a reply message to be received from the destination device or at least one report message to be received from the intermediate device, and to include a flag that allows fragmentation of the request message. The method may further comprise receiving the reply message from the destination device or the at least one report message from the intermediate device responsive to the request message; and based on the reply message or the at least one report message, determining that fragmentation of the request message has occurred because the estimated PMTU is greater than an actual PMTU and updating the estimated PMTU.1. A method for a source device to perform discovery of a path maximum transmission unit (PMTU) of a path between the source device and a destination device in a communications network, comprising: configuring a request message to have a size of an estimated PMTU of the path, to cause a reply message to be received from the destination device or at least one report message to be received from an intermediate device on the path, and to include a flag that allows fragmentation of the request message; sending the request message to the destination device via the intermediate device; receiving the reply message from the destination device or the at least one report message from the intermediate device responsive to the request message; and based on the reply message or the at least one report message, determining that fragmentation of the request message has occurred because the estimated PMTU is greater than an actual PMTU and updating the estimated PMTU. 2. The method of claim 1, wherein determining that fragmentation of the request message has occurred comprises: determining that the at least one report message from the intermediate device comprises multiple report messages for multiple fragments of the request message. 3. The method of claim 2, wherein updating the estimated PMTU based on the at least one report message comprises: based on the multiple report messages, determining a largest fragment of the request message, wherein each report message includes header information of one of the multiple fragments of the request message; and updating the estimated PMTU based on the largest fragment of the request message. 4. The method of claim 1, wherein configuring the request message further comprises: configuring the request message to have a time to live (TTL) parameter that expires at the intermediate device, wherein expiry of the TTL parameter causes the intermediate device to send the at least one report message in the form of at least one TTL expired message. 5. The method of claim 4, further comprising: sending a further request message addressed to the destination device via the intermediate device and a further intermediate device on the path, wherein the further request message is configured to have a size of the updated estimated PMTU, to cause a further report message from the further intermediate device by updating the TTL parameter and to have a flag that allows fragmentation of the further request message; receiving the further report message from the further intermediate device responsive to the further request message; and in response to determining that fragmentation of the further request message has occurred, further updating the updated estimated PMTU based on the further report message. 6. The method of claim 5, further comprising repeatedly sending the further request message and updating the estimated PMTU until the reply message is received from the destination device. 7. The method of claim 1, wherein determining that fragmentation of the request message has occurred comprises: determining that the reply message from the destination device comprises multiple fragments of the reply message. 8. The method of claim 7, wherein configuring the request message comprises: configuring the request message to have a TTL parameter that does not expire at the intermediate device, wherein the non-expiry of the TTL parameter allows the request message to reach the destination device to cause the destination device to send the reply message to the source device. 9. The method of claim 7, wherein updating the estimated PMTU based on the reply message comprises: determining a largest fragment of the reply message; and updating the estimated PMTU based on the largest fragment of the reply message. 10. The method of claim 1, wherein: the request message is an echo request message; and the reply message is an echo reply message that is configured to have the size of the estimated PMTU of the path and the flag that allows fragmentation of the echo reply message before reaching the source device. 11. The method of claim 1, wherein the request message is configured to cause the: the reply message from the destination device if routing between the source device and the destination device is symmetric; or the at least one report message from the intermediate device if routing between the source device and the destination device is asymmetric. 12. A non-transitory computer-readable storage medium that includes a set of instructions which, in response to execution by a processor, causes the processor to perform a method for a source device to perform discovery of a path maximum transmission unit (PMTU) of a path between the source device and a destination device in a communications network, the method comprising: configuring a request message to have a size of an estimated PMTU of the path, to cause a reply message to be received from the destination device or at least one report message to be received from an intermediate device on the path, and to include a flag that allows fragmentation of the request message; sending the request message to the destination device via the intermediate device; receiving the reply message from the destination device or the at least one report message from the intermediate device responsive to the request message; and based on the reply message or the at least one report message, determining that fragmentation of the request message has occurred because the estimated PMTU is greater than an actual PMTU and updating the estimated PMTU. 13. The non-transitory computer-readable storage medium of claim 12, determining that fragmentation of the request message has occurred comprises: determining that the at least one report message from the intermediate device comprises multiple report messages for multiple fragments of the request message. 14. The non-transitory computer-readable storage medium of claim 13, wherein updating the estimated PMTU based on the at least one report message comprises: based on the multiple report messages, determining a largest fragment of the request message, wherein each report message includes header information of one of the multiple fragments of the request message; and updating the estimated PMTU based on the largest fragment of the request message. 15. The non-transitory computer-readable storage medium of claim 12, wherein configuring the request message comprises: configuring the request message to have a time to live (TTL) parameter that expires at the intermediate device, wherein expiry of the TTL parameter causes the intermediate device to send the at least one report message in the form of at least one TTL expired message. 16. The non-transitory computer-readable storage medium of claim 14, further comprising: sending a further request message addressed to the destination device via the intermediate device and a further intermediate device on the path, wherein the further request message is configured to have a size of the updated estimated PMTU, to cause a further report message from the further intermediate device by updating the TTL parameter and to have a flag that allows fragmentation of the further request message; receiving the further report message from the further intermediate device responsive to the further request message; and in response to determining that fragmentation of the further request message has occurred, further updating the updated estimated PMTU based on the further report message. 17. The non-transitory computer-readable storage medium of claim 16, further comprising repeatedly sending the further request message and updating the estimated PMTU until the reply message is received from the destination device. 18. The non-transitory computer-readable storage medium of claim 12, wherein determining that fragmentation of the request message has occurred comprises: determining that the reply message from the destination device comprises multiple fragments of the reply message. 19. The non-transitory computer-readable storage medium of claim 18, wherein configuring the request message comprises: configuring the request message to have a TTL parameter that does not expire at the intermediate device, wherein non-expiry of the TTL parameter allows the request message to reach the destination device and to cause the destination device to send the reply message to the source device. 20. The non-transitory computer-readable storage medium of claim 18, wherein updating the estimated PMTU based on the reply message comprises: determining a largest fragment of the reply message; and updating the estimated PMTU based on the largest fragment of the reply message. 21. The non-transitory computer-readable storage medium of claim 12, wherein: the request message is an echo request message; and the reply message is an echo reply message that is configured to have the size of the estimated PMTU of the path and the flag that allows fragmentation of the echo reply message before reaching the source device. 22. The non-transitory computer-readable storage medium of claim 12, wherein the request message is configured to cause the: the reply message from the destination device if routing between the source device and the destination device is symmetric; or the at least one report message from the intermediate device if routing between the source device and the destination device is asymmetric.
2,400
6,940
6,940
12,655,008
2,424
A method and apparatus is provided for the delivery of digital television and interactive broadband service in a manner that maximizes the usage of the digital broadcast spectrum. A digital television signal is transmitted to a given broadcast area in a relatively small part (for example, a 1 MHz band) of one or more licensed portions of the digital broadcast spectrum. Interactive broadband service is delivered within at least a portion of the same broadcast area covered by the broadcast digital television signal, in the remainder (for example, a 5 MHz band) of an unused part of the same licensed portion of the digital broadcast spectrum as is occupied by the digital television signal, or within an unlicensed (unused) portion of the digital broadcast spectrum. The broadcasting of the digital television and delivery the interactive broadband service occur simultaneously. In one embodiment, digital television and broadband service are delivered by the same equipment within the same bandwidth.
1. A method for delivery of interactive broadband service comprising the steps of: providing interactive broadband service at a first node, delivering the interactive broadband service to communications devices from a second node and connecting the first node and the second node, wherein the step of connecting the first node and the second node comprises the step of enabling one or more communications paths selected from the following group: fiber, cable, fixed wireless, cellular, PCS, WiMax, laser and local exchange carrier telephone network. 2. The method of claim 1 wherein each of the communications paths utilizes a different communication medium. 3. Apparatus for delivery of interactive broadband service comprising: means for providing interactive broadband service at a first node, means for delivering the interactive broadband service to communications devices from a second node, and means for connecting said first node and said second node, wherein said means for connecting said first node and said second node comprises means for enabling one or more types of communications paths selected from the following group: fiber, cable, fixed wireless, cellular, PCS, WiMax, laser and local exchange carrier telephone network. 4. The apparatus of claim 3 wherein each of said communication paths utilizes a different communications medium.
A method and apparatus is provided for the delivery of digital television and interactive broadband service in a manner that maximizes the usage of the digital broadcast spectrum. A digital television signal is transmitted to a given broadcast area in a relatively small part (for example, a 1 MHz band) of one or more licensed portions of the digital broadcast spectrum. Interactive broadband service is delivered within at least a portion of the same broadcast area covered by the broadcast digital television signal, in the remainder (for example, a 5 MHz band) of an unused part of the same licensed portion of the digital broadcast spectrum as is occupied by the digital television signal, or within an unlicensed (unused) portion of the digital broadcast spectrum. The broadcasting of the digital television and delivery the interactive broadband service occur simultaneously. In one embodiment, digital television and broadband service are delivered by the same equipment within the same bandwidth.1. A method for delivery of interactive broadband service comprising the steps of: providing interactive broadband service at a first node, delivering the interactive broadband service to communications devices from a second node and connecting the first node and the second node, wherein the step of connecting the first node and the second node comprises the step of enabling one or more communications paths selected from the following group: fiber, cable, fixed wireless, cellular, PCS, WiMax, laser and local exchange carrier telephone network. 2. The method of claim 1 wherein each of the communications paths utilizes a different communication medium. 3. Apparatus for delivery of interactive broadband service comprising: means for providing interactive broadband service at a first node, means for delivering the interactive broadband service to communications devices from a second node, and means for connecting said first node and said second node, wherein said means for connecting said first node and said second node comprises means for enabling one or more types of communications paths selected from the following group: fiber, cable, fixed wireless, cellular, PCS, WiMax, laser and local exchange carrier telephone network. 4. The apparatus of claim 3 wherein each of said communication paths utilizes a different communications medium.
2,400
6,941
6,941
15,092,216
2,431
An automation control system is provided that includes an interface device configured to enable a user to monitor, control, or monitor and control processes of the automation control system. The interface device includes a display that presents a graphical-user-interface that enables the user to monitor, control, or monitor and control the process of the automation control system. Further, a processor renders a plurality of interface screens to the display. The processor determines a current set of access rights of a protected interface screen of the plurality of interface screens, at least one object of the protected interface screen, or both. The access rights are inherited from access rights associated with one or more of the plurality of interface screens, a folder containing the at least one interface screen, or both. Further, the processor provides access, via the protected interface screen, to monitor, control, or monitor and control the processes based upon the set of access rights.
1. An automation control system, comprising: an interface device configured to enable a user to monitor, control, or monitor and control processes of the automation control system: a display of the interface device, wherein the interface device and display are configured to present a graphical-user-interface that enables the user to monitor, control, or monitor and control the processes of the automation control system; a processor of the interface device configured to: render a plurality of interface screens to the display; determine a set of access rights of a protected interface screen of the plurality of interface screens, at least one object of the protected interface screen, or both; wherein the set of access rights are inherited from access rights associated with a one or more of the plurality of interface screens, a folder containing the protected interface screen, or both; and provide access, via the protected interface screen, to monitor, control, or monitor and control the processes based upon the set of access rights. 2. The automation control system of claim 1, wherein the interface device comprises a human machine interface (HMI). 3. The automation control system of claim 1, wherein the access rights comprise role-based access rights. 4. The automation control system of claim 1, wherein the access rights are inherited from a higher-level interface page relative to the protected interface screen. 5. The automation control system of claim 1, wherein the set of access rights comprise access rights of the at least one object of the protected interface screen, inherited from access rights of the protected interface screen. 6. The automation control system of claim 1, wherein the processor is configured to render choices for the set of access rights, the choices comprising: a full access choice, a read only access choice, a no access choice, and an inherit access choice; and wherein the set of access rights are inherited only when the inherit access choice is selected. 7. The automation control system of claim 1, wherein the access rights comprise a forced inherit access right that requires inheritance. 8. The automation control system of claim 1, wherein the access rights are inherited from a security properties screen that provides security settings a root screen of the plurality of interface screens. 9. The automation control system of claim 8, wherein the security properties screen provides security settings for user roles. 10. The automation control system of claim 9, wherein the user roles comprise: an administrator role, an engineer role, a maintenance role, an operator role, a restricted role, a supervisor role, a none role, a user-defined role, or any combination thereof. 11. The automation control system of claim 9, wherein the security properties screen comprises a reset button that, when actuated, resets the user roles to an inherit access choice. 12. A tangible, non-transitory, machine-readable medium of an automation control system, comprising instructions to: present, via an electronic device display, a graphical-user-interface that enables the user to monitor, control, or monitor and control the processes of the automation control system, wherein the graphical-user-interface comprises a plurality of interface screens to display; determine a set of access rights of a protected interface screen of the plurality of interface screens, at least one object of the protected interface screen, or both; wherein the access rights are inherited from access rights associated with one or more of the plurality of interface screens, a folder containing the protected interface screen, or both; and provide access, via the protected interface screen, to monitor, control, or monitor and control the processes based upon the set of access rights. 13. The machine-readable medium of claim 12, comprising instructions to: inherit the set of access rights from a higher-level interface page relative to the protected interface screen. 14. The machine-readable medium of claim 12, comprising instructions to: inherit the access rights from a global container that contains a set of elements associated with the protected interface screen. 15. The machine-readable medium of claim 12, comprising instructions to: inherit the access rights from a folder containing the protected interface screen. 16. The machine-readable medium of claim 12, comprising instructions to: inherit the access rights from a security properties screen that provides security settings of a root screen of the plurality of interface screens. 17. The machine-readable medium of claim 12, comprising instructions to: present choices for the set of access rights, the choices comprising: a full access choice, a read only access choice, a no access choice, and an inherit access choice; and wherein the access rights are inherited only when the inherit access choice is selected. 18. A method, comprising: presenting, via an electronic device display of a human-machine-interface of an automation control system, a graphical-user-interface that enables a user to monitor, control, or monitor and control processes of the automation control system, wherein the graphical-user-interface comprises a plurality of interface screens to the display; determining a set of access rights of a protected interface screen of the plurality of interface screens, at least one object of the protected interface screen, or both; wherein the set of access rights are inherited from access rights associated with one or more of the plurality of interface screens, a folder containing protected interface screen, or both; and providing access, via the protected interface screen, to monitor, control, or monitor and control the processes based upon the set of access rights. 19. The method of claim 18, comprising: determining higher-level access rights for a higher-level interface page relative to the protected interface screen; and setting the set of access rights based upon the higher-level access rights. 20. The method of claim 18, comprising: determining folder-based access rights for a folder containing the protected interface screen; and setting the set of access rights based upon the folder-based access rights.
An automation control system is provided that includes an interface device configured to enable a user to monitor, control, or monitor and control processes of the automation control system. The interface device includes a display that presents a graphical-user-interface that enables the user to monitor, control, or monitor and control the process of the automation control system. Further, a processor renders a plurality of interface screens to the display. The processor determines a current set of access rights of a protected interface screen of the plurality of interface screens, at least one object of the protected interface screen, or both. The access rights are inherited from access rights associated with one or more of the plurality of interface screens, a folder containing the at least one interface screen, or both. Further, the processor provides access, via the protected interface screen, to monitor, control, or monitor and control the processes based upon the set of access rights.1. An automation control system, comprising: an interface device configured to enable a user to monitor, control, or monitor and control processes of the automation control system: a display of the interface device, wherein the interface device and display are configured to present a graphical-user-interface that enables the user to monitor, control, or monitor and control the processes of the automation control system; a processor of the interface device configured to: render a plurality of interface screens to the display; determine a set of access rights of a protected interface screen of the plurality of interface screens, at least one object of the protected interface screen, or both; wherein the set of access rights are inherited from access rights associated with a one or more of the plurality of interface screens, a folder containing the protected interface screen, or both; and provide access, via the protected interface screen, to monitor, control, or monitor and control the processes based upon the set of access rights. 2. The automation control system of claim 1, wherein the interface device comprises a human machine interface (HMI). 3. The automation control system of claim 1, wherein the access rights comprise role-based access rights. 4. The automation control system of claim 1, wherein the access rights are inherited from a higher-level interface page relative to the protected interface screen. 5. The automation control system of claim 1, wherein the set of access rights comprise access rights of the at least one object of the protected interface screen, inherited from access rights of the protected interface screen. 6. The automation control system of claim 1, wherein the processor is configured to render choices for the set of access rights, the choices comprising: a full access choice, a read only access choice, a no access choice, and an inherit access choice; and wherein the set of access rights are inherited only when the inherit access choice is selected. 7. The automation control system of claim 1, wherein the access rights comprise a forced inherit access right that requires inheritance. 8. The automation control system of claim 1, wherein the access rights are inherited from a security properties screen that provides security settings a root screen of the plurality of interface screens. 9. The automation control system of claim 8, wherein the security properties screen provides security settings for user roles. 10. The automation control system of claim 9, wherein the user roles comprise: an administrator role, an engineer role, a maintenance role, an operator role, a restricted role, a supervisor role, a none role, a user-defined role, or any combination thereof. 11. The automation control system of claim 9, wherein the security properties screen comprises a reset button that, when actuated, resets the user roles to an inherit access choice. 12. A tangible, non-transitory, machine-readable medium of an automation control system, comprising instructions to: present, via an electronic device display, a graphical-user-interface that enables the user to monitor, control, or monitor and control the processes of the automation control system, wherein the graphical-user-interface comprises a plurality of interface screens to display; determine a set of access rights of a protected interface screen of the plurality of interface screens, at least one object of the protected interface screen, or both; wherein the access rights are inherited from access rights associated with one or more of the plurality of interface screens, a folder containing the protected interface screen, or both; and provide access, via the protected interface screen, to monitor, control, or monitor and control the processes based upon the set of access rights. 13. The machine-readable medium of claim 12, comprising instructions to: inherit the set of access rights from a higher-level interface page relative to the protected interface screen. 14. The machine-readable medium of claim 12, comprising instructions to: inherit the access rights from a global container that contains a set of elements associated with the protected interface screen. 15. The machine-readable medium of claim 12, comprising instructions to: inherit the access rights from a folder containing the protected interface screen. 16. The machine-readable medium of claim 12, comprising instructions to: inherit the access rights from a security properties screen that provides security settings of a root screen of the plurality of interface screens. 17. The machine-readable medium of claim 12, comprising instructions to: present choices for the set of access rights, the choices comprising: a full access choice, a read only access choice, a no access choice, and an inherit access choice; and wherein the access rights are inherited only when the inherit access choice is selected. 18. A method, comprising: presenting, via an electronic device display of a human-machine-interface of an automation control system, a graphical-user-interface that enables a user to monitor, control, or monitor and control processes of the automation control system, wherein the graphical-user-interface comprises a plurality of interface screens to the display; determining a set of access rights of a protected interface screen of the plurality of interface screens, at least one object of the protected interface screen, or both; wherein the set of access rights are inherited from access rights associated with one or more of the plurality of interface screens, a folder containing protected interface screen, or both; and providing access, via the protected interface screen, to monitor, control, or monitor and control the processes based upon the set of access rights. 19. The method of claim 18, comprising: determining higher-level access rights for a higher-level interface page relative to the protected interface screen; and setting the set of access rights based upon the higher-level access rights. 20. The method of claim 18, comprising: determining folder-based access rights for a folder containing the protected interface screen; and setting the set of access rights based upon the folder-based access rights.
2,400
6,942
6,942
14,572,443
2,439
A cloud asset manager can securely provide multi-tenant access to remote assets while preserving isolation across tenants. The remote asset manager defines various roles for legitimate users of the remote asset manager. The roles are associated with credentials that provide access to the remote assets and/or information about the remote assets maintained by a service provider. And the users map to roles based on attempted actions that access the service provider. Thus, a user's requested action is attempted with credentials associated with a role that maps to the requested action.
1. A method comprising: after authentication of login information, selecting a set of mappings of actions to roles from a plurality of mappings of actions to roles for multiple tenants of remote assets hosted by a service provider, the selecting based, at least in part, on the authenticated login information; in response to detection of a requested action for a remote asset hosted by the service provider, determining which of the roles maps to the requested action as indicated by the mappings; in response to determining the role that maps to the requested action as indicated by the mappings, obtaining credentials for the role that maps to the requested action; and attempting the requested action using the credentials. 2. The method of claim 1, wherein attempting the requested action comprises submitting an indication of the requested action and the credentials to an interface of the service provider. 3. The method of claim 1, further comprising retrieving the set of mappings from storage and caching the set of mappings. 4. The method of claim 1 further comprising: determining a first service provider interface from a plurality of service provider interfaces based, at least in part, on the remote asset; wherein attempting the requested action comprises submitting an indication of the requested action and the credentials to the first service provider interface. 5. The method of claim 1 further comprising indicating denial of the requested action in response to determining that the requested action does not map to any of the roles in the mappings. 6. The method of claim 1, further comprising determining that the requested action maps to a first role, wherein the requested action is a viewing action and the credentials are shared across tenants for the viewing action. 7. The method of claim 6 further comprising, during a session corresponding to the authenticated login information,: detecting a second requested action, which is not a viewing action; determining that the second requested action maps to a second role in response to detecting the second requested action; obtaining second credentials for the second role in response to determining that the second requested action maps to the second role; and attempting the second requested action with the second credentials. 8. A non-transitory machine-readable medium having program instructions stored therein, the program instructions to: after authentication of login information, select a set of mappings of actions to roles based, at least in part, on the authenticated login information from a plurality of mappings of actions to roles for multiple tenants of remote assets hosted by a service provider; in response to detection of a requested action for a remote asset hosted by the service provider, determine which of the roles maps to the requested action in accordance with the mappings; obtain credentials for the role determined to map to the requested action; and attempt the requested action using the credentials. 9. The non-transitory machine-readable medium of claim 8, wherein the program instructions to attempt the second requested action comprise program instructions to submit an indication of the requested action and the credentials to an interface of the service provider. 10. The non-transitory machine-readable medium of claim 8, wherein the program instructions further comprise program instructions to retrieve the set of mappings from storage and to cache the set of mappings. 11. The non-transitory machine-readable medium of claim 8, wherein the program instructions further comprise program instructions to: determine a first service provider interface from a plurality of service provider interfaces based, at least in part, on the remote asset; wherein the program instructions to attempt the requested action comprise program instructions to submit an indication of the requested action and the credentials to the first service provider interface. 12. The non-transitory machine-readable medium of claim 8 further comprising program instructions to indicate denial of the requested action in response to determining that the requested action does not map to any of the roles in the mappings. 13. The non-transitory machine-readable medium of claim 8, further comprising program instructions to determine that the requested action maps to a first role, wherein the requested action is a viewing action and the credentials are shared across tenants for the viewing action. 14. The non-transitory machine-readable medium of claim 13 further comprising program instructions to, during a session corresponding to the authenticated login information: detect a second requested action, which is not a viewing action; determine that the second requested action maps to a second role in response to detecting the second requested action; obtain second credentials for the second role in response to determining that the second requested action maps to the second role; and attempt the second requested action with the second credentials. 15. An apparatus comprising: a processor; a network interface; and a machine-readable storage medium having program instructions stored therein, the program instructions executable by the processor to cause the apparatus to, after authentication of login information, select a set of mappings of actions to roles based, at least in part, on the authenticated login information from a plurality of mappings of actions to roles for multiple tenants of remote assets hosted by a service provider; in response to detection of a requested action for a remote asset hosted by the service provider, determine which of the roles maps to the requested action in accordance with the mappings; obtain credentials for the role determined to map to the requested action; and attempt the requested action using the credentials. 16. The apparatus of claim 15, wherein the program instructions to attempt the second requested action comprise program instructions executable by the processor to cause the apparatus to submit an indication of the requested action and the credentials to an interface of the service provider. 17. The apparatus of claim 15, wherein the program instructions further comprise program instructions executable by the processor to cause the apparatus to retrieve the set of mappings from storage and to cache the set of mappings. 18. The apparatus of claim 15, wherein the program instructions further comprise program instructions executable by the processor to cause the apparatus to: determine a first service provider interface from a plurality of service provider interfaces based, at least in part, on the remote asset; wherein the program instructions to attempt the requested action comprise program instructions to submit an indication of the requested action and the credentials to the first service provider interface. 19. The apparatus of claim 15, further comprising program instructions executable by the processor to cause the apparatus to determine that the requested action maps to a first role, wherein the requested action is a viewing action and the credentials are shared across tenants for the viewing action. 20. The apparatus of claim 19 further comprising program instructions executable by the processor to cause the apparatus to, during a session corresponding to the authenticated login information: detect a second requested action, which is not a viewing action; determine that the second requested action maps to a second role in response to detecting the second requested action; obtain second credentials for the second role in response to determining that the second requested action maps to the second role; and attempt the second requested action with the second credentials.
A cloud asset manager can securely provide multi-tenant access to remote assets while preserving isolation across tenants. The remote asset manager defines various roles for legitimate users of the remote asset manager. The roles are associated with credentials that provide access to the remote assets and/or information about the remote assets maintained by a service provider. And the users map to roles based on attempted actions that access the service provider. Thus, a user's requested action is attempted with credentials associated with a role that maps to the requested action.1. A method comprising: after authentication of login information, selecting a set of mappings of actions to roles from a plurality of mappings of actions to roles for multiple tenants of remote assets hosted by a service provider, the selecting based, at least in part, on the authenticated login information; in response to detection of a requested action for a remote asset hosted by the service provider, determining which of the roles maps to the requested action as indicated by the mappings; in response to determining the role that maps to the requested action as indicated by the mappings, obtaining credentials for the role that maps to the requested action; and attempting the requested action using the credentials. 2. The method of claim 1, wherein attempting the requested action comprises submitting an indication of the requested action and the credentials to an interface of the service provider. 3. The method of claim 1, further comprising retrieving the set of mappings from storage and caching the set of mappings. 4. The method of claim 1 further comprising: determining a first service provider interface from a plurality of service provider interfaces based, at least in part, on the remote asset; wherein attempting the requested action comprises submitting an indication of the requested action and the credentials to the first service provider interface. 5. The method of claim 1 further comprising indicating denial of the requested action in response to determining that the requested action does not map to any of the roles in the mappings. 6. The method of claim 1, further comprising determining that the requested action maps to a first role, wherein the requested action is a viewing action and the credentials are shared across tenants for the viewing action. 7. The method of claim 6 further comprising, during a session corresponding to the authenticated login information,: detecting a second requested action, which is not a viewing action; determining that the second requested action maps to a second role in response to detecting the second requested action; obtaining second credentials for the second role in response to determining that the second requested action maps to the second role; and attempting the second requested action with the second credentials. 8. A non-transitory machine-readable medium having program instructions stored therein, the program instructions to: after authentication of login information, select a set of mappings of actions to roles based, at least in part, on the authenticated login information from a plurality of mappings of actions to roles for multiple tenants of remote assets hosted by a service provider; in response to detection of a requested action for a remote asset hosted by the service provider, determine which of the roles maps to the requested action in accordance with the mappings; obtain credentials for the role determined to map to the requested action; and attempt the requested action using the credentials. 9. The non-transitory machine-readable medium of claim 8, wherein the program instructions to attempt the second requested action comprise program instructions to submit an indication of the requested action and the credentials to an interface of the service provider. 10. The non-transitory machine-readable medium of claim 8, wherein the program instructions further comprise program instructions to retrieve the set of mappings from storage and to cache the set of mappings. 11. The non-transitory machine-readable medium of claim 8, wherein the program instructions further comprise program instructions to: determine a first service provider interface from a plurality of service provider interfaces based, at least in part, on the remote asset; wherein the program instructions to attempt the requested action comprise program instructions to submit an indication of the requested action and the credentials to the first service provider interface. 12. The non-transitory machine-readable medium of claim 8 further comprising program instructions to indicate denial of the requested action in response to determining that the requested action does not map to any of the roles in the mappings. 13. The non-transitory machine-readable medium of claim 8, further comprising program instructions to determine that the requested action maps to a first role, wherein the requested action is a viewing action and the credentials are shared across tenants for the viewing action. 14. The non-transitory machine-readable medium of claim 13 further comprising program instructions to, during a session corresponding to the authenticated login information: detect a second requested action, which is not a viewing action; determine that the second requested action maps to a second role in response to detecting the second requested action; obtain second credentials for the second role in response to determining that the second requested action maps to the second role; and attempt the second requested action with the second credentials. 15. An apparatus comprising: a processor; a network interface; and a machine-readable storage medium having program instructions stored therein, the program instructions executable by the processor to cause the apparatus to, after authentication of login information, select a set of mappings of actions to roles based, at least in part, on the authenticated login information from a plurality of mappings of actions to roles for multiple tenants of remote assets hosted by a service provider; in response to detection of a requested action for a remote asset hosted by the service provider, determine which of the roles maps to the requested action in accordance with the mappings; obtain credentials for the role determined to map to the requested action; and attempt the requested action using the credentials. 16. The apparatus of claim 15, wherein the program instructions to attempt the second requested action comprise program instructions executable by the processor to cause the apparatus to submit an indication of the requested action and the credentials to an interface of the service provider. 17. The apparatus of claim 15, wherein the program instructions further comprise program instructions executable by the processor to cause the apparatus to retrieve the set of mappings from storage and to cache the set of mappings. 18. The apparatus of claim 15, wherein the program instructions further comprise program instructions executable by the processor to cause the apparatus to: determine a first service provider interface from a plurality of service provider interfaces based, at least in part, on the remote asset; wherein the program instructions to attempt the requested action comprise program instructions to submit an indication of the requested action and the credentials to the first service provider interface. 19. The apparatus of claim 15, further comprising program instructions executable by the processor to cause the apparatus to determine that the requested action maps to a first role, wherein the requested action is a viewing action and the credentials are shared across tenants for the viewing action. 20. The apparatus of claim 19 further comprising program instructions executable by the processor to cause the apparatus to, during a session corresponding to the authenticated login information: detect a second requested action, which is not a viewing action; determine that the second requested action maps to a second role in response to detecting the second requested action; obtain second credentials for the second role in response to determining that the second requested action maps to the second role; and attempt the second requested action with the second credentials.
2,400
6,943
6,943
14,746,747
2,454
A user context system and method are provided. The system may define a user context and then one or more rules based on that device and those connected on the context of the user. The system may also have an orbit user interface that displays the users who context has been distributed by the system.
1. A user context system, comprising: one or more computing devices, each computing device having a context component; a backend context component capable of being coupled to each computing device; the context component determining a current context of the computing device, the current context of the computing device being a state of the computing device during an activity and initiating, based on the current context of the computing device, a context rule to perform one or more actions associated with the computing device, wherein each action changes a function of the computing device while the computing device has the current context; the backend context component distributing the current context of the computing device to a plurality of other computing devices so that the other computing devices have information about the current context of the computing device. 2. The system of claim 1, wherein the context component persists the current context of the computing device across a plurality of apps capable of being executed by the computing device. 3. The system of claim 1, wherein the context component generates a group context, wherein the group context is the same context for a plurality of computing devices. 4. The system of claim 1, wherein the context component further comprises a context application on the computing device that determines the current context of the computing device and initiates the context rule. 5. The system of claim 1, wherein each computing device further comprises a sensor that generates a sensor signal and wherein the context component determines the current context based in part on the sensor signal. 6. The system of claim 1, wherein the context component uses a model to determine the current context, wherein the model defines the state of the computing device during a predetermined time. 7. The system of claim 1, wherein the content component generates a context icon based on the current context of the computing device. 8. The system of claim 1, wherein the current context of the computing device is a user driving a vehicle and the context rule is blocking texts and calls for the computing device while the user is driving a vehicle. 9. The system of claim 1, wherein the current context of the computing device is a user attending church and the context rule is blocking texts and calls for the computing device while the user is attending church. 10. A method for determining and distributing context on a computing device, comprising: determining a current context of a computing device, the current context of the computing device being a state of the computing device during an activity; initiating, based on the current context of the computing device, a context rule to perform one or more actions associated with the computing device, wherein each action changes a function of the computing device while the computing device has the current context; and distributing the current context of the computing device to a plurality of other computing devices so that the other computing devices have information about the current context of the computing device. 11. The method of claim 10 further comprising persisting the current context of the computing device across a plurality of apps capable of being executed by the computing device. 12. The method of claim 10 further comprising generating a group context, wherein the group context is the same context for a plurality of computing devices. 13. The method of claim 10 further comprising executing a context application on the computing device that determines the current context of the computing device and initiates the context rule. 14. The method of claim 10, wherein determining the current context further comprises receiving a sensor signal and determining the current context based in part on the sensor signal. 15. The method of claim 10, wherein determining the current context further comprises using a model to determine the current context, wherein the model defines the state of the computing device during a predetermined time. 16. The method of claim 10 further comprising generating a context icon based on the current context of the computing device. 17. The method of claim 10, wherein the current context of the computing device is a user driving a vehicle and the context rule is blocking texts and calls for the computing device while the user is driving a vehicle. 18. The method of claim 10, wherein the current context of the computing device is a user attending church and the context rule is blocking texts and calls for the computing device while the user is attending church. 19. A method for determining and distributing user context on a computing device, comprising: determining a current context of a user of the computing device, the current context of the user being an activity of the user; initiating, based on the current context of the user, a context rule to perform one or more actions associated with the computing device, wherein each action changes a function of the computing device while the user has the current context; and distributing the current context of the user to a plurality of other users so that the other computing devices have information about the current context of the user. 20. The method of claim 19 further comprising persisting the current context of the user across a plurality of apps capable of being executed by the computing device. 21. The method of claim 19 further comprising generating a group context, wherein the group context is the same context for a plurality of users. 22. The method of claim 19 further comprising executing a context application on the computing device that determines the current context of the user and initiates the context rule. 23. The method of claim 19, wherein determining the current context further comprises receiving a sensor signal and determining the current context based in part on the sensor signal. 24. The method of claim 19, wherein determining the current context further comprises using a user model to determine the current context, wherein the user model defines an activity of the user during a predetermined time. 25. The method of claim 19 further comprising generating a context icon based on the current context of the user. 26. The method of claim 19, wherein the current context of the computing device is a user driving a vehicle and the context rule is blocking texts and calls for the computing device while the user is driving a vehicle. 27. The method of claim 19, wherein the current context of the computing device is a user attending church and the context rule is blocking texts and calls for the computing device while the user is attending church.
A user context system and method are provided. The system may define a user context and then one or more rules based on that device and those connected on the context of the user. The system may also have an orbit user interface that displays the users who context has been distributed by the system.1. A user context system, comprising: one or more computing devices, each computing device having a context component; a backend context component capable of being coupled to each computing device; the context component determining a current context of the computing device, the current context of the computing device being a state of the computing device during an activity and initiating, based on the current context of the computing device, a context rule to perform one or more actions associated with the computing device, wherein each action changes a function of the computing device while the computing device has the current context; the backend context component distributing the current context of the computing device to a plurality of other computing devices so that the other computing devices have information about the current context of the computing device. 2. The system of claim 1, wherein the context component persists the current context of the computing device across a plurality of apps capable of being executed by the computing device. 3. The system of claim 1, wherein the context component generates a group context, wherein the group context is the same context for a plurality of computing devices. 4. The system of claim 1, wherein the context component further comprises a context application on the computing device that determines the current context of the computing device and initiates the context rule. 5. The system of claim 1, wherein each computing device further comprises a sensor that generates a sensor signal and wherein the context component determines the current context based in part on the sensor signal. 6. The system of claim 1, wherein the context component uses a model to determine the current context, wherein the model defines the state of the computing device during a predetermined time. 7. The system of claim 1, wherein the content component generates a context icon based on the current context of the computing device. 8. The system of claim 1, wherein the current context of the computing device is a user driving a vehicle and the context rule is blocking texts and calls for the computing device while the user is driving a vehicle. 9. The system of claim 1, wherein the current context of the computing device is a user attending church and the context rule is blocking texts and calls for the computing device while the user is attending church. 10. A method for determining and distributing context on a computing device, comprising: determining a current context of a computing device, the current context of the computing device being a state of the computing device during an activity; initiating, based on the current context of the computing device, a context rule to perform one or more actions associated with the computing device, wherein each action changes a function of the computing device while the computing device has the current context; and distributing the current context of the computing device to a plurality of other computing devices so that the other computing devices have information about the current context of the computing device. 11. The method of claim 10 further comprising persisting the current context of the computing device across a plurality of apps capable of being executed by the computing device. 12. The method of claim 10 further comprising generating a group context, wherein the group context is the same context for a plurality of computing devices. 13. The method of claim 10 further comprising executing a context application on the computing device that determines the current context of the computing device and initiates the context rule. 14. The method of claim 10, wherein determining the current context further comprises receiving a sensor signal and determining the current context based in part on the sensor signal. 15. The method of claim 10, wherein determining the current context further comprises using a model to determine the current context, wherein the model defines the state of the computing device during a predetermined time. 16. The method of claim 10 further comprising generating a context icon based on the current context of the computing device. 17. The method of claim 10, wherein the current context of the computing device is a user driving a vehicle and the context rule is blocking texts and calls for the computing device while the user is driving a vehicle. 18. The method of claim 10, wherein the current context of the computing device is a user attending church and the context rule is blocking texts and calls for the computing device while the user is attending church. 19. A method for determining and distributing user context on a computing device, comprising: determining a current context of a user of the computing device, the current context of the user being an activity of the user; initiating, based on the current context of the user, a context rule to perform one or more actions associated with the computing device, wherein each action changes a function of the computing device while the user has the current context; and distributing the current context of the user to a plurality of other users so that the other computing devices have information about the current context of the user. 20. The method of claim 19 further comprising persisting the current context of the user across a plurality of apps capable of being executed by the computing device. 21. The method of claim 19 further comprising generating a group context, wherein the group context is the same context for a plurality of users. 22. The method of claim 19 further comprising executing a context application on the computing device that determines the current context of the user and initiates the context rule. 23. The method of claim 19, wherein determining the current context further comprises receiving a sensor signal and determining the current context based in part on the sensor signal. 24. The method of claim 19, wherein determining the current context further comprises using a user model to determine the current context, wherein the user model defines an activity of the user during a predetermined time. 25. The method of claim 19 further comprising generating a context icon based on the current context of the user. 26. The method of claim 19, wherein the current context of the computing device is a user driving a vehicle and the context rule is blocking texts and calls for the computing device while the user is driving a vehicle. 27. The method of claim 19, wherein the current context of the computing device is a user attending church and the context rule is blocking texts and calls for the computing device while the user is attending church.
2,400
6,944
6,944
13,283,100
2,481
A video display device comprising a video source and a video playback mechanism. The video source comprises a plurality of time-based metadata. The video playback mechanism uses at least one of the plurality of time-based metadata to display at least one of the video source, and one or more menu options.
1. A video display device comprising, a video source comprising a plurality of time-based metadata; and a video playback mechanism using at least one of the plurality of time-based metadata to display at least a portion of the video source, wherein the at least one of the plurality of time-based metadata comprises metadata corresponding to one or more selected menu options. 2. The video display device of claim 1 wherein, the video playback mechanism, comprises a user-interface comprising the one or more menu options; and is adapted to provide an automated review of at least a portion of the plurality of time-based metadata. 3. The video display device of claim 2 wherein, the one or more menu options comprises at least one or more first menu options; and further comprising, one or more additional menu options corresponding to, at least a portion of the plurality of time-based metadata, and the at least one or more first menu options. 4. The video display device of claim 3 wherein, the one or more additional menu options comprise at least one first additional menu option and at least one second additional menu option; and the at least one second additional menu option corresponds to at least one of the at least one first additional menu option and is adapted to display at least a portion of the video source. 5. The video display device of claim 3 wherein the video playback mechanism further comprises a display of at least one section of the video source, the display of at least one section of the video source corresponding to, the at least one or more first menu items; and at least one of, the one or more additional menu options, and the at least at portion of the plurality of time-based metadata. 6. The video display device of claim 1 wherein, the plurality of time-based metadata, comprises information related to the video source; and corresponds to a plurality of timestamps in the video source. 7. The video display device of claim 6 wherein, the information related to the video source comprises at least one of, one or more objects in the video source, one or more events occurring in the video source, and one or more persons in the video source; and the plurality of timestamps comprises, a starting timestamp for a scene including the at least one of one of, the one or more objects in the video source, the one or more events occurring in the video source, and the one or more persons in the video source, and an ending timestamp for a scene including the at least one of one of, the one or more objects in the video source, the one or more events occurring in the video source, and the one or more persons in the video source. 8. A method of displaying at least a portion of one or more videos comprising, choosing at least one video source comprising time-based metadata; identifying in the at least one video source at least one of, one or more objects, one or more events, and one or more persons; reviewing the time-based metadata; and displaying one or more sections of the video source comprising the at least one of, one or more objects, one or more events, and one or more persons. 9. The method of claim 8 wherein, identifying in the video source at least one of one or more objects, one or more events, and one or more persons comprises choosing one or more menu options; reviewing the time-based metadata comprises determining a starting timestamp and an ending timestamp for the one or more sections of the video source comprising the at least one of one or more objects, one or more events, and one or more persons; and displaying one or more sections of the video source comprising the at least one of one or more objects, one or more events, and one or more persons comprises displaying one or more sections of the video source beginning at the starting timestamp for one of the one or more sections of the video source and ending at the ending timestamp for one of the one or more sections of the video source. 10. The method of claim 9 wherein, the one or more menu options comprises a first list of the at least one of the one or more objects, one or more events, and one or more persons; and further comprising, selecting at least one of the one or more objects, one or more events, and one or more persons from the first list of the at least one of the one or more objects, one or more events, and one or more persons prior to reviewing time-based metadata in the video source; displaying a second list of at least one of the one or more objects, one or more events, and one or more persons, the second list corresponding to at least one of a selected one or more objects, one or events, and one or more persons prior to the displaying one or more sections of the video source; and selecting an item from the second list of at least one of the one or more objects, one or more events, and one or more persons prior to the displaying one or more sections of the video source. 11. The method of claim 8 further comprising, displaying the one or more sections of video source substantially simultaneously as reviewing time-based metadata in the video source; and displaying one or more real-time menu options, wherein the one or more real-time menu options correspond to one or more objects, one or more events, or one or more persons being displayed in the one or more sections of the video. 12. The method of claim 11 further comprising, choosing at least one of the one or more real-time menu options; and saving the at least one of the one or more real-time menu options. 13. The method of claim 8, further comprising, inputting the time-based metadata to the video source; and wherein, reviewing time-based metadata in the video source comprises determining when the one or more objects are present in the video. 14. A video display system comprising, a digital video source comprising a plurality of time-based metadata, the plurality of time-based metadata corresponding to content in the video source; a network device adapted to provide at least a portion of the video source based on at least one, starting timestamp of the time-based metadata, and ending timestamp of the time-based metadata; and a video display device, comprising a user interface, the user interface comprising one or more menu items related to the plurality of time-based metadata, at least one of the user interface and the one or more menu items displayed one of, substantially simultaneously, prior to, and after, encountering the time-based metadata, and wherein the video display device is adapted to, receive the at least a portion of the video source, and display the at least a portion of the video source. 15. The video display system of claim 14 wherein, the starting timestamp of the time-based metadata comprises a start time in the video source for a display of at least one of, one or more objects, one or more events, and one or more persons; and the ending timestamp of the time-based metadata comprises an ending time in the video source for a display of at least one of the, one or more objects, one or more events, and one or more persons. 16. The video display system of claim 14 wherein the user interface further comprises a follow up list, wherein the follow-up list is adapted to display one or more chosen menu options. 17. The video display system of claim 14 wherein the at least a portion of the video source comprises at least a portion of a plurality of video sources. 18. The video display system of claim 14 further comprising, a video source metadata input device; a video selection mechanism providing a plurality of options for viewing one or more sections of the video source, the video selection mechanism using the video source metadata in obtaining the one or more sections of the video source; and wherein, the video display device displays the one or more sections of the video source. 19. The video system of claim 18 wherein, the plurality of time-based metadata comprises information associated with the video source; and the video source metadata input device comprises at least one of, a manual input device, and an automatic input device. 20. The video system of claim 19 wherein, the automatic input device comprises an object recognition device.
A video display device comprising a video source and a video playback mechanism. The video source comprises a plurality of time-based metadata. The video playback mechanism uses at least one of the plurality of time-based metadata to display at least one of the video source, and one or more menu options.1. A video display device comprising, a video source comprising a plurality of time-based metadata; and a video playback mechanism using at least one of the plurality of time-based metadata to display at least a portion of the video source, wherein the at least one of the plurality of time-based metadata comprises metadata corresponding to one or more selected menu options. 2. The video display device of claim 1 wherein, the video playback mechanism, comprises a user-interface comprising the one or more menu options; and is adapted to provide an automated review of at least a portion of the plurality of time-based metadata. 3. The video display device of claim 2 wherein, the one or more menu options comprises at least one or more first menu options; and further comprising, one or more additional menu options corresponding to, at least a portion of the plurality of time-based metadata, and the at least one or more first menu options. 4. The video display device of claim 3 wherein, the one or more additional menu options comprise at least one first additional menu option and at least one second additional menu option; and the at least one second additional menu option corresponds to at least one of the at least one first additional menu option and is adapted to display at least a portion of the video source. 5. The video display device of claim 3 wherein the video playback mechanism further comprises a display of at least one section of the video source, the display of at least one section of the video source corresponding to, the at least one or more first menu items; and at least one of, the one or more additional menu options, and the at least at portion of the plurality of time-based metadata. 6. The video display device of claim 1 wherein, the plurality of time-based metadata, comprises information related to the video source; and corresponds to a plurality of timestamps in the video source. 7. The video display device of claim 6 wherein, the information related to the video source comprises at least one of, one or more objects in the video source, one or more events occurring in the video source, and one or more persons in the video source; and the plurality of timestamps comprises, a starting timestamp for a scene including the at least one of one of, the one or more objects in the video source, the one or more events occurring in the video source, and the one or more persons in the video source, and an ending timestamp for a scene including the at least one of one of, the one or more objects in the video source, the one or more events occurring in the video source, and the one or more persons in the video source. 8. A method of displaying at least a portion of one or more videos comprising, choosing at least one video source comprising time-based metadata; identifying in the at least one video source at least one of, one or more objects, one or more events, and one or more persons; reviewing the time-based metadata; and displaying one or more sections of the video source comprising the at least one of, one or more objects, one or more events, and one or more persons. 9. The method of claim 8 wherein, identifying in the video source at least one of one or more objects, one or more events, and one or more persons comprises choosing one or more menu options; reviewing the time-based metadata comprises determining a starting timestamp and an ending timestamp for the one or more sections of the video source comprising the at least one of one or more objects, one or more events, and one or more persons; and displaying one or more sections of the video source comprising the at least one of one or more objects, one or more events, and one or more persons comprises displaying one or more sections of the video source beginning at the starting timestamp for one of the one or more sections of the video source and ending at the ending timestamp for one of the one or more sections of the video source. 10. The method of claim 9 wherein, the one or more menu options comprises a first list of the at least one of the one or more objects, one or more events, and one or more persons; and further comprising, selecting at least one of the one or more objects, one or more events, and one or more persons from the first list of the at least one of the one or more objects, one or more events, and one or more persons prior to reviewing time-based metadata in the video source; displaying a second list of at least one of the one or more objects, one or more events, and one or more persons, the second list corresponding to at least one of a selected one or more objects, one or events, and one or more persons prior to the displaying one or more sections of the video source; and selecting an item from the second list of at least one of the one or more objects, one or more events, and one or more persons prior to the displaying one or more sections of the video source. 11. The method of claim 8 further comprising, displaying the one or more sections of video source substantially simultaneously as reviewing time-based metadata in the video source; and displaying one or more real-time menu options, wherein the one or more real-time menu options correspond to one or more objects, one or more events, or one or more persons being displayed in the one or more sections of the video. 12. The method of claim 11 further comprising, choosing at least one of the one or more real-time menu options; and saving the at least one of the one or more real-time menu options. 13. The method of claim 8, further comprising, inputting the time-based metadata to the video source; and wherein, reviewing time-based metadata in the video source comprises determining when the one or more objects are present in the video. 14. A video display system comprising, a digital video source comprising a plurality of time-based metadata, the plurality of time-based metadata corresponding to content in the video source; a network device adapted to provide at least a portion of the video source based on at least one, starting timestamp of the time-based metadata, and ending timestamp of the time-based metadata; and a video display device, comprising a user interface, the user interface comprising one or more menu items related to the plurality of time-based metadata, at least one of the user interface and the one or more menu items displayed one of, substantially simultaneously, prior to, and after, encountering the time-based metadata, and wherein the video display device is adapted to, receive the at least a portion of the video source, and display the at least a portion of the video source. 15. The video display system of claim 14 wherein, the starting timestamp of the time-based metadata comprises a start time in the video source for a display of at least one of, one or more objects, one or more events, and one or more persons; and the ending timestamp of the time-based metadata comprises an ending time in the video source for a display of at least one of the, one or more objects, one or more events, and one or more persons. 16. The video display system of claim 14 wherein the user interface further comprises a follow up list, wherein the follow-up list is adapted to display one or more chosen menu options. 17. The video display system of claim 14 wherein the at least a portion of the video source comprises at least a portion of a plurality of video sources. 18. The video display system of claim 14 further comprising, a video source metadata input device; a video selection mechanism providing a plurality of options for viewing one or more sections of the video source, the video selection mechanism using the video source metadata in obtaining the one or more sections of the video source; and wherein, the video display device displays the one or more sections of the video source. 19. The video system of claim 18 wherein, the plurality of time-based metadata comprises information associated with the video source; and the video source metadata input device comprises at least one of, a manual input device, and an automatic input device. 20. The video system of claim 19 wherein, the automatic input device comprises an object recognition device.
2,400
6,945
6,945
14,247,810
2,434
Embodiments of the present invention provide a mechanism for monitoring data using a watchlist item and a watchlist item definition that includes a set of parameters for identifying a set of data items for user action and criteria for recommending or requiring user action for the set of data items to be identified.
1. A method for monitoring data items, comprising: identifying data items in a database for monitoring; determining a set of parameters for identifying a set of data items amongst the data items in the database for user action; determining criteria for recommending or requiring user action for the set of data items to be identified; creating a watchlist item definition for evaluating the data items in the database for monitoring, wherein the watchlist item definition includes the set of parameters for identifying the set of data items amongst the data items in the database for user action and the watchlist item definition defines criteria for recommending or requiring user action for the set of data items to be identified; evaluating the watchlist item definition to identify the set of data items for user action by comparing the data items in the database against the set of parameters in the watchlist item definition; presenting an indication of the set of data items after evaluating the watchlist item definition; and providing an alert recommending or requiring user action when the set of data items identified during evaluation of the watchlist item definition meets the criteria for recommending or requiring user action defined by the watchlist item definition. 2. The method of claim 1, wherein identifying the set of data items for user action comprises utilizing an existing framework for a database having the set of data items. 3. The method of claim 2, wherein identifying the set of data items for user action involves performing logical operations on the database. 4. The method of claim 2, wherein utilizing the existing framework comprises performing a query. 5. The method of claim 1, wherein the alert is a warning alert when the set of data items meets a warning threshold. 6. The method of claim 5, wherein the alert is a critical alert when the set of data items meets the warning threshold and a critical threshold. 7. The method of claim 1, further comprising re-evaluation the watchlist item definition. 8. The method of claim 7, wherein the watchlist item definition is re-evaluated upon user request. 9. The method of claim 7, wherein the watchlist item definition is re-evaluated periodically. 10. The method of claim 1, wherein the indication of the set of data items and the alert recommending or requiring user action are provided to a user without requiring the user to perform an active step. 11. The method of claim 1, wherein selecting the indication of the set of data items allows the user to be presented with the set of data items for user action. 12. A computer program product embodied on a computer readable medium, the computer readable medium having stored thereon a sequence of instructions which, when executed by a processor causes the processor to execute a method for monitoring data items comprising: identifying data items in a database for monitoring; determining a set of parameters for identifying a set of data items amongst the data items in the database for user action; determining criteria for recommending or requiring user action for the set of data items to be identified; creating a watchlist item definition for evaluating the data items in the database for monitoring, wherein the watchlist item definition includes the set of parameters for identifying the set of data items amongst the data items in the database for user action and the watchlist item definition defines criteria for recommending or requiring user action for the set of data items to be identified; evaluating the watchlist item definition to identify the set of data items for user action by comparing the data items in the database against the set of parameters in the watchlist item definition; presenting an indication of the set of data items after evaluating the watchlist item definition; and providing an alert recommending or requiring user action when the set of data items identified during evaluation of the watchlist item definition meets the criteria for recommending or requiring user action defined by the watchlist item definition. 13. The computer program product of claim 12, wherein identifying the set of data items for user action comprises utilizing an existing framework for a database having the set of data items. 14. The computer program product of claim 13, wherein identifying the set of data items for user action involves performing logical operations on the database. 15. The computer program product of claim 13, wherein utilizing the existing framework comprises performing a query. 16. The computer program product of claim 12, wherein the alert is a warning alert when the set of data items meets a warning threshold. 17. The computer program product of claim 16, wherein the alert is a critical alert when the set of data items meets the warning threshold and a critical threshold. 18. The computer program product of claim 12, further comprising re-evaluation the watchlist item definition. 19. The computer program product of claim 18, wherein the watchlist item definition is re-evaluated upon user request. 20. The computer program product of claim 18, wherein the watchlist item definition is re-evaluated periodically. 21. The computer program product of claim 12, wherein the indication of the set of data items and the alert recommending or requiring user action are provided to a user without requiring the user to perform an active step. 22. The computer program product of claim 12, wherein selecting the indication of the set of data items allows the user to be presented with the set of data items for user action. 23. A system for monitoring data items, comprising: a processor for: identifying data items in a database for monitoring; determining a set of parameters for identifying a set of data items amongst the data items in the database for user action; determining criteria for recommending or requiring user action for the set of data items to be identified; creating a watchlist item definition for evaluating the data items in the database for monitoring, wherein the watchlist item definition includes the set of parameters for identifying the set of data items amongst the data items in the database for user action and the watchlist item definition defines criteria for recommending or requiring user action for the set of data items to be identified; evaluating the watchlist item definition to identify the set of data items for user action by comparing the data items in the database against the set of parameters in the watchlist item definition; presenting an indication of the set of data items after evaluating the watchlist item definition; and providing an alert recommending or requiring user action when the set of data items identified during evaluation of the watchlist item definition meets the criteria for recommending or requiring user action defined by the watchlist item definition. 24. The system of claim 23, wherein identifying the set of data items for user action comprises utilizing an existing framework for a database having the set of data items. 25. The system of claim 24, wherein identifying the set of data items for user action involves performing logical operations on the database. 26. The system of claim 24, wherein utilizing the existing framework comprises performing a query. 27. The system of claim 23, wherein the alert is a warning alert when the set of data items meets a warning threshold. 28. The system of claim 27, wherein the alert is a critical alert when the set of data items meets the warning threshold and a critical threshold. 29. The system of claim 23, further comprising re-evaluation the watchlist item definition. 30. The system of claim 29, wherein the watchlist item definition is re-evaluated upon user request. 31. The system of claim 29, wherein the watchlist item definition is re-evaluated periodically. 32. The system of claim 23, wherein the indication of the set of data items and the alert recommending or requiring user action are provided to a user without requiring the user to perform an active step. 33. The system of claim 23, wherein selecting the indication of the set of data items allows the user to be presented with the set of data items for user action.
Embodiments of the present invention provide a mechanism for monitoring data using a watchlist item and a watchlist item definition that includes a set of parameters for identifying a set of data items for user action and criteria for recommending or requiring user action for the set of data items to be identified.1. A method for monitoring data items, comprising: identifying data items in a database for monitoring; determining a set of parameters for identifying a set of data items amongst the data items in the database for user action; determining criteria for recommending or requiring user action for the set of data items to be identified; creating a watchlist item definition for evaluating the data items in the database for monitoring, wherein the watchlist item definition includes the set of parameters for identifying the set of data items amongst the data items in the database for user action and the watchlist item definition defines criteria for recommending or requiring user action for the set of data items to be identified; evaluating the watchlist item definition to identify the set of data items for user action by comparing the data items in the database against the set of parameters in the watchlist item definition; presenting an indication of the set of data items after evaluating the watchlist item definition; and providing an alert recommending or requiring user action when the set of data items identified during evaluation of the watchlist item definition meets the criteria for recommending or requiring user action defined by the watchlist item definition. 2. The method of claim 1, wherein identifying the set of data items for user action comprises utilizing an existing framework for a database having the set of data items. 3. The method of claim 2, wherein identifying the set of data items for user action involves performing logical operations on the database. 4. The method of claim 2, wherein utilizing the existing framework comprises performing a query. 5. The method of claim 1, wherein the alert is a warning alert when the set of data items meets a warning threshold. 6. The method of claim 5, wherein the alert is a critical alert when the set of data items meets the warning threshold and a critical threshold. 7. The method of claim 1, further comprising re-evaluation the watchlist item definition. 8. The method of claim 7, wherein the watchlist item definition is re-evaluated upon user request. 9. The method of claim 7, wherein the watchlist item definition is re-evaluated periodically. 10. The method of claim 1, wherein the indication of the set of data items and the alert recommending or requiring user action are provided to a user without requiring the user to perform an active step. 11. The method of claim 1, wherein selecting the indication of the set of data items allows the user to be presented with the set of data items for user action. 12. A computer program product embodied on a computer readable medium, the computer readable medium having stored thereon a sequence of instructions which, when executed by a processor causes the processor to execute a method for monitoring data items comprising: identifying data items in a database for monitoring; determining a set of parameters for identifying a set of data items amongst the data items in the database for user action; determining criteria for recommending or requiring user action for the set of data items to be identified; creating a watchlist item definition for evaluating the data items in the database for monitoring, wherein the watchlist item definition includes the set of parameters for identifying the set of data items amongst the data items in the database for user action and the watchlist item definition defines criteria for recommending or requiring user action for the set of data items to be identified; evaluating the watchlist item definition to identify the set of data items for user action by comparing the data items in the database against the set of parameters in the watchlist item definition; presenting an indication of the set of data items after evaluating the watchlist item definition; and providing an alert recommending or requiring user action when the set of data items identified during evaluation of the watchlist item definition meets the criteria for recommending or requiring user action defined by the watchlist item definition. 13. The computer program product of claim 12, wherein identifying the set of data items for user action comprises utilizing an existing framework for a database having the set of data items. 14. The computer program product of claim 13, wherein identifying the set of data items for user action involves performing logical operations on the database. 15. The computer program product of claim 13, wherein utilizing the existing framework comprises performing a query. 16. The computer program product of claim 12, wherein the alert is a warning alert when the set of data items meets a warning threshold. 17. The computer program product of claim 16, wherein the alert is a critical alert when the set of data items meets the warning threshold and a critical threshold. 18. The computer program product of claim 12, further comprising re-evaluation the watchlist item definition. 19. The computer program product of claim 18, wherein the watchlist item definition is re-evaluated upon user request. 20. The computer program product of claim 18, wherein the watchlist item definition is re-evaluated periodically. 21. The computer program product of claim 12, wherein the indication of the set of data items and the alert recommending or requiring user action are provided to a user without requiring the user to perform an active step. 22. The computer program product of claim 12, wherein selecting the indication of the set of data items allows the user to be presented with the set of data items for user action. 23. A system for monitoring data items, comprising: a processor for: identifying data items in a database for monitoring; determining a set of parameters for identifying a set of data items amongst the data items in the database for user action; determining criteria for recommending or requiring user action for the set of data items to be identified; creating a watchlist item definition for evaluating the data items in the database for monitoring, wherein the watchlist item definition includes the set of parameters for identifying the set of data items amongst the data items in the database for user action and the watchlist item definition defines criteria for recommending or requiring user action for the set of data items to be identified; evaluating the watchlist item definition to identify the set of data items for user action by comparing the data items in the database against the set of parameters in the watchlist item definition; presenting an indication of the set of data items after evaluating the watchlist item definition; and providing an alert recommending or requiring user action when the set of data items identified during evaluation of the watchlist item definition meets the criteria for recommending or requiring user action defined by the watchlist item definition. 24. The system of claim 23, wherein identifying the set of data items for user action comprises utilizing an existing framework for a database having the set of data items. 25. The system of claim 24, wherein identifying the set of data items for user action involves performing logical operations on the database. 26. The system of claim 24, wherein utilizing the existing framework comprises performing a query. 27. The system of claim 23, wherein the alert is a warning alert when the set of data items meets a warning threshold. 28. The system of claim 27, wherein the alert is a critical alert when the set of data items meets the warning threshold and a critical threshold. 29. The system of claim 23, further comprising re-evaluation the watchlist item definition. 30. The system of claim 29, wherein the watchlist item definition is re-evaluated upon user request. 31. The system of claim 29, wherein the watchlist item definition is re-evaluated periodically. 32. The system of claim 23, wherein the indication of the set of data items and the alert recommending or requiring user action are provided to a user without requiring the user to perform an active step. 33. The system of claim 23, wherein selecting the indication of the set of data items allows the user to be presented with the set of data items for user action.
2,400
6,946
6,946
13,348,348
2,442
A computer-implemented method, operable in a content delivery network (CDN) including a plurality of cache servers and domain name servers. At a cache server in the CDN, a first domain name is obtained, the first domain name being associated with a client request for a resource from the cache server. One or more values associated with the client request are determined and a second domain name is generated, including information from the first domain name and information relating to the one or more values associated with the client request. The second domain name is provided to the client.
1. A computer-implemented method, operable in a content delivery network (CDN) comprising a plurality of cache servers, the method comprising: (A) at a cache server in the CDN, obtaining a first domain name, said first domain name being a fully qualified domain name and being associated with a client request for a resource from said cache server; (B) determining one or more values associated with the client request; (C) generating a second domain name, said second domain name including first information from said first domain name and second information relating to said one or more values associated with the client request; and (D) providing the second domain name to the client. 2. The method of claim 1 wherein the first domain name is a hostname from a first uniform resource locator (URL) that was used to request the resource from the cache server. 3. The method of claim 2 wherein the client request is an HTTP request, and wherein the determining in (B) comprises: determining at least one value from an HTTP header associated with the HTTP request. 4. The method of claim 1 wherein the second information is associated with one or more keys, and wherein the second domain name comprises said one or more keys and a corresponding one or more key values. 5. The method of claim 2 wherein the client request is an HTTP request, and wherein the providing in (D) comprises: (d1) creating a second URL by modifying the first URL to replace the hostname from the first URL with the second domain name; and (d2) providing the client with the second URL. 6. The method of claim 5 wherein the second URL is provided to the client in (d2) using an HTTP REDIRECT. 7. The method of claim 5 wherein the second URL is provided to the client in (d2) as a URL embedded within a resource. 8. The method of claim 1 wherein the one or more values associated with the client request include one or more of: an network address of the client; a type of device associated with the client; a type of content associated with the client request; an identification of the requested object; and a data transmission rate. 9. The method of claim 8 wherein the client request is an HTTP request, and wherein the network address is an Internet Protocol (IP) address of the client. 10. The method of claim 8 wherein the type of device is selected from: phone, computer, television, set-top box. 11. A computer-implemented method, operable in a content delivery network (CDN) comprising a plurality of cache server sites and a domain name system including one or more domain name servers configured to provide domain name resolution, and, the method comprising: (A) at a domain name server in the CDN, obtaining a request to resolve a first domain name; (B) extracting one or more keys and one or more corresponding values from said first domain name; (C) generating a second domain name based on said first domain name, said second domain name excluding information from said first domain name relating to said one or more keys and said one or more values; and (D) resolving said second domain name using at least some of the one or more values extracted from the first domain name. 12. The method of claim 11 wherein the one or more values associated with the client request include one or more of: an network address of a client; a type of device associated with the client; a type of content associated with a client request; an identification of the requested resource; and a data transmission rate. 13. The method of claim 12 wherein the network address is an Internet Protocol (IP) address of the client. 14. The method of claim 12 wherein the type of device is selected from: phone, computer, television, set-top box. 15. The method of claim 12 wherein the domain name server in the CDN performs policy-based name resolution using at least some of the one or more values extracted from the first domain name. 16. A server, implemented by hardware in combination with software, the server constructed and configured to: (a) obtain a first domain name, said first domain name being a fully qualified domain name and being associated with a client request for a resource from said cache server; (b) determine one or more values associated with the client request; (c) generate a second domain name, said second domain name including first information from said first domain name and second information relating to said one or more values associated with the client request; and (d) provide the second domain name to the client. 17. The server as in claim 16 wherein the server is a cache server operable in a content delivery network (CDN). 18. The server as in claim 16 wherein the server is an origin server operable in a content delivery network (CDN). 19. A device, implemented by hardware in combination with software, the device constructed and configured to: (a) obtain a first domain name, said first domain name being a fully qualified domain name and being associated with a request for a resource from a cache server in a content delivery network (CDN); (b) determine one or more values associated with the request; (c) generate a second domain name, said second domain name including first information from said first domain name and second information relating to said one or more values associated with the request; and (d) provide the second domain name. 20. The device of claim 19 wherein the device comprises a plugin. 21. The device of claim 19 wherein the device comprises a client-side script. 22. (canceled)
A computer-implemented method, operable in a content delivery network (CDN) including a plurality of cache servers and domain name servers. At a cache server in the CDN, a first domain name is obtained, the first domain name being associated with a client request for a resource from the cache server. One or more values associated with the client request are determined and a second domain name is generated, including information from the first domain name and information relating to the one or more values associated with the client request. The second domain name is provided to the client.1. A computer-implemented method, operable in a content delivery network (CDN) comprising a plurality of cache servers, the method comprising: (A) at a cache server in the CDN, obtaining a first domain name, said first domain name being a fully qualified domain name and being associated with a client request for a resource from said cache server; (B) determining one or more values associated with the client request; (C) generating a second domain name, said second domain name including first information from said first domain name and second information relating to said one or more values associated with the client request; and (D) providing the second domain name to the client. 2. The method of claim 1 wherein the first domain name is a hostname from a first uniform resource locator (URL) that was used to request the resource from the cache server. 3. The method of claim 2 wherein the client request is an HTTP request, and wherein the determining in (B) comprises: determining at least one value from an HTTP header associated with the HTTP request. 4. The method of claim 1 wherein the second information is associated with one or more keys, and wherein the second domain name comprises said one or more keys and a corresponding one or more key values. 5. The method of claim 2 wherein the client request is an HTTP request, and wherein the providing in (D) comprises: (d1) creating a second URL by modifying the first URL to replace the hostname from the first URL with the second domain name; and (d2) providing the client with the second URL. 6. The method of claim 5 wherein the second URL is provided to the client in (d2) using an HTTP REDIRECT. 7. The method of claim 5 wherein the second URL is provided to the client in (d2) as a URL embedded within a resource. 8. The method of claim 1 wherein the one or more values associated with the client request include one or more of: an network address of the client; a type of device associated with the client; a type of content associated with the client request; an identification of the requested object; and a data transmission rate. 9. The method of claim 8 wherein the client request is an HTTP request, and wherein the network address is an Internet Protocol (IP) address of the client. 10. The method of claim 8 wherein the type of device is selected from: phone, computer, television, set-top box. 11. A computer-implemented method, operable in a content delivery network (CDN) comprising a plurality of cache server sites and a domain name system including one or more domain name servers configured to provide domain name resolution, and, the method comprising: (A) at a domain name server in the CDN, obtaining a request to resolve a first domain name; (B) extracting one or more keys and one or more corresponding values from said first domain name; (C) generating a second domain name based on said first domain name, said second domain name excluding information from said first domain name relating to said one or more keys and said one or more values; and (D) resolving said second domain name using at least some of the one or more values extracted from the first domain name. 12. The method of claim 11 wherein the one or more values associated with the client request include one or more of: an network address of a client; a type of device associated with the client; a type of content associated with a client request; an identification of the requested resource; and a data transmission rate. 13. The method of claim 12 wherein the network address is an Internet Protocol (IP) address of the client. 14. The method of claim 12 wherein the type of device is selected from: phone, computer, television, set-top box. 15. The method of claim 12 wherein the domain name server in the CDN performs policy-based name resolution using at least some of the one or more values extracted from the first domain name. 16. A server, implemented by hardware in combination with software, the server constructed and configured to: (a) obtain a first domain name, said first domain name being a fully qualified domain name and being associated with a client request for a resource from said cache server; (b) determine one or more values associated with the client request; (c) generate a second domain name, said second domain name including first information from said first domain name and second information relating to said one or more values associated with the client request; and (d) provide the second domain name to the client. 17. The server as in claim 16 wherein the server is a cache server operable in a content delivery network (CDN). 18. The server as in claim 16 wherein the server is an origin server operable in a content delivery network (CDN). 19. A device, implemented by hardware in combination with software, the device constructed and configured to: (a) obtain a first domain name, said first domain name being a fully qualified domain name and being associated with a request for a resource from a cache server in a content delivery network (CDN); (b) determine one or more values associated with the request; (c) generate a second domain name, said second domain name including first information from said first domain name and second information relating to said one or more values associated with the request; and (d) provide the second domain name. 20. The device of claim 19 wherein the device comprises a plugin. 21. The device of claim 19 wherein the device comprises a client-side script. 22. (canceled)
2,400
6,947
6,947
14,706,968
2,434
Captcha techniques for detecting if a client device is operating under control of a human user based upon a client profile and service policy when matching a captcha response to an expected captcha response.
1. A method comprising: receiving, by a service gateway, a service request from a client device; extracting, by the service gateway, client information from the received service request; selecting, by the service gateway, a captcha based upon the diem information and a client policy in response to the service request; generating, by the service gateway, captcha instructions for the determined captcha; generating, by the service gateway, an expected captcha response for the determined captcha; sending, by the service gateway, the captcha instructions to the client device; receiving, by the service gateway, a captcha response from the client device in response to the captcha instructions; comparing, by the service gateway, the captcha response to the expected captcha response to determine based on the service policy if the client device is operating under control of a human user or operating autonomously; and sending, by the service gateway, the service request to an appropriate server device if the client device is operating under control of a human user. 2. The method according to claim 1, further comprising declining, by the service gateway, the service request if the client device is operating autonomously. 3. The method according to claim 1, further comprising handling, by the service gateway, the service request according to the service policy based upon whether the client device is operating under control of a human user or operating autonomously. 4. The method according to claim 3, wherein the handling is specified by a web access firewall policy of the service policy. 5. The method according to claim 1, further comprising: generating, by the service gateway, the expected captcha response including expected timing information for the determined captcha; receiving, by the service gateway, the captcha response including timing information from the client device in response to the captcha instructions; and comparing, by the service gateway, the captcha response including timing information to the expected captcha response including timing information to determine based on the service policy if the client device is operating under control of a human user or operating autonomously. 6. A computing device for executing computing device executable instructions stored in computing storage module that when executed by a processor module of the computing device perform a nettled comprising: receiving, by a service gateway, a service request from a client device; extracting, by the service gateway, client information from the received service request; selecting, by the service gateway, a captcha based upon the client information and a client policy in response to the service request; generating, by the service gateway, captcha instructions for the determined captcha; generating, by the service gateway, an expected captcha response for the determined captcha; sending, by the service gateway, the captcha instructions to the client device; receiving, by the service gateway, a captcha response from the client device in response to the captcha instructions; comparing, by the service gateway, the captcha response to the expected captcha response to determine based on the service policy if the client device is operating under control of a human user or operating autonomously; and sending, by the service gateway, the service request to an appropriate server device if the client device is operating under control of a human user. 7. The method according to claim 6, further comprising declining, by the service gateway, the service request if the client device is operating autonomously. 8. The method according to claim 6, further comprising handling, by the service gateway, the service request according to the service policy based upon whether the client device is operating under control of a human use or operating autonomously. 9. The method according to claim 8, wherein the handling is specified by a web access firewall policy of the service policy. 10. The method according to claim 6, further comprising: generating, by the service gateway, the expected captcha response including expected timing information for the determined captcha; receiving, by the service gateway, the captcha response including timing information from the client device in response to the captcha instructions; and comparing, by the service gateway, the captcha response including timing information to the expected captcha response including timing information to determine based on the service policy if the client device is operating under control of a human user or operating autonomously. 11. The method according to claim 6, wherein the service polity is stored in the computing storage module of the computing device. 12. The method according to claim 6, wherein the client profile is stored in the computing storage module of the computing device. 13. The method according to claim 6, wherein the captcha is selected from a captcha database stored in the computing storage module of the computing device.
Captcha techniques for detecting if a client device is operating under control of a human user based upon a client profile and service policy when matching a captcha response to an expected captcha response.1. A method comprising: receiving, by a service gateway, a service request from a client device; extracting, by the service gateway, client information from the received service request; selecting, by the service gateway, a captcha based upon the diem information and a client policy in response to the service request; generating, by the service gateway, captcha instructions for the determined captcha; generating, by the service gateway, an expected captcha response for the determined captcha; sending, by the service gateway, the captcha instructions to the client device; receiving, by the service gateway, a captcha response from the client device in response to the captcha instructions; comparing, by the service gateway, the captcha response to the expected captcha response to determine based on the service policy if the client device is operating under control of a human user or operating autonomously; and sending, by the service gateway, the service request to an appropriate server device if the client device is operating under control of a human user. 2. The method according to claim 1, further comprising declining, by the service gateway, the service request if the client device is operating autonomously. 3. The method according to claim 1, further comprising handling, by the service gateway, the service request according to the service policy based upon whether the client device is operating under control of a human user or operating autonomously. 4. The method according to claim 3, wherein the handling is specified by a web access firewall policy of the service policy. 5. The method according to claim 1, further comprising: generating, by the service gateway, the expected captcha response including expected timing information for the determined captcha; receiving, by the service gateway, the captcha response including timing information from the client device in response to the captcha instructions; and comparing, by the service gateway, the captcha response including timing information to the expected captcha response including timing information to determine based on the service policy if the client device is operating under control of a human user or operating autonomously. 6. A computing device for executing computing device executable instructions stored in computing storage module that when executed by a processor module of the computing device perform a nettled comprising: receiving, by a service gateway, a service request from a client device; extracting, by the service gateway, client information from the received service request; selecting, by the service gateway, a captcha based upon the client information and a client policy in response to the service request; generating, by the service gateway, captcha instructions for the determined captcha; generating, by the service gateway, an expected captcha response for the determined captcha; sending, by the service gateway, the captcha instructions to the client device; receiving, by the service gateway, a captcha response from the client device in response to the captcha instructions; comparing, by the service gateway, the captcha response to the expected captcha response to determine based on the service policy if the client device is operating under control of a human user or operating autonomously; and sending, by the service gateway, the service request to an appropriate server device if the client device is operating under control of a human user. 7. The method according to claim 6, further comprising declining, by the service gateway, the service request if the client device is operating autonomously. 8. The method according to claim 6, further comprising handling, by the service gateway, the service request according to the service policy based upon whether the client device is operating under control of a human use or operating autonomously. 9. The method according to claim 8, wherein the handling is specified by a web access firewall policy of the service policy. 10. The method according to claim 6, further comprising: generating, by the service gateway, the expected captcha response including expected timing information for the determined captcha; receiving, by the service gateway, the captcha response including timing information from the client device in response to the captcha instructions; and comparing, by the service gateway, the captcha response including timing information to the expected captcha response including timing information to determine based on the service policy if the client device is operating under control of a human user or operating autonomously. 11. The method according to claim 6, wherein the service polity is stored in the computing storage module of the computing device. 12. The method according to claim 6, wherein the client profile is stored in the computing storage module of the computing device. 13. The method according to claim 6, wherein the captcha is selected from a captcha database stored in the computing storage module of the computing device.
2,400
6,948
6,948
14,694,648
2,463
An apparatus integral with or directly coupled to an appliance is provided. The apparatus may connect to a user device at the apparatus configured to operate as a wireless local area network (WLAN) access point. The apparatus may receive a command over the connection from the user device to cause the apparatus to scan for one or more available WLAN(s) and obtain one or more service set identifiers (SSIDs) of the available WLAN(s). The apparatus may send the SSID(s) over the connection to the user device for display and user selection of a selected SSID of the SSID(s), with the selected SSID being of a selected WLAN of the available WLAN(s). And the apparatus may receive the selected SSID over the connection from the user device to enable the apparatus to connect directly to the selected WLAN as a WLAN station using the selected SSID.
1. An apparatus integral with or directly coupled to an appliance, the apparatus comprising a processor and a memory storing executable instructions that in response to execution by the processor cause the apparatus and thereby the appliance to at least: connect to a user device at the apparatus configured to operate as a wireless local area network (WLAN) access point, and thereby establish a wireless connection with the user device; receive a command over the wireless connection from the user device to cause the apparatus to scan for one or more available WLANs and obtain one or more service set identifiers (SSIDs) of the one or more available WLANs; send the one or more SSIDs over the wireless connection to the user device for display and user selection of a selected SSID of the one or more SSIDs, the selected SSID being of a selected WLAN of the one or more available WLANs; and receive the selected SSID over the wireless connection from the user device to enable the apparatus to connect directly to the selected WLAN as a WLAN station using the selected SSID. 2. The apparatus of claim 1, wherein the user device is configured to prompt the user for a password for the selected WLAN, and receive the password manually entered by the user, and wherein the apparatus being caused to receive the selected SSID includes being caused to receive the selected SSID and the password from the user device to enable the appliance to connect directly to the selected WLAN as a WLAN station using the selected SSID. 3. The apparatus of claim 2, wherein the apparatus being caused to receive the selected SSID and the password from the user device includes being caused to receive the selected SSID, the password and an identifier associated with a user account with a service platform configured to provide one or more services for the appliance, and wherein the memory stores further executable instructions that in response to execution by the processor cause the apparatus and thereby the appliance to further send the identifier to the service platform via the selected WLAN to enable the service platform to bind the appliance to the user account. 4. The apparatus of claim 1, wherein the apparatus being caused to receive the selected SSID from the user device includes being caused to receive the selected SSID and an identifier associated with a user account with a service platform configured to provide one or more services for the appliance, and wherein the memory stores further executable instructions that in response to execution by the processor cause the apparatus and thereby the appliance to further send the identifier to the service platform via the selected WLAN to enable the service platform to bind the appliance to the user account. 5. The apparatus of claim 1, wherein the apparatus is caused to connect to the user device without authentication of the user device or appliance to the other and without user authentication to either the user device or appliance. 6. An apparatus comprising a processor and a memory storing executable instructions that in response to execution by the processor cause the apparatus to at least: connect to the appliance configured to operate as a wireless local area network (WLAN) access point, and thereby establish a wireless connection with the appliance; send a command over the wireless connection to the appliance to cause the appliance to scan for one or more available WLANs and obtain one or more service set identifiers (SSIDs) of the one or more available WLANs; receive the one or more SSIDs over the wireless connection from the appliance; display the one or more SSIDs for user selection of a selected SSID of the one or more SSIDs, the selected SSID being of a selected WLAN of the one or more available WLANs; and send the selected SSID over the wireless connection to the appliance to enable the appliance to connect directly to the selected WLAN as a WLAN station using the selected SSID. 7. The apparatus of claim 6, wherein the memory stores further executable instructions that in response to execution by the processor cause the apparatus to further prompt the user for a password for the selected WLAN, and receive the password manually entered by the user, and wherein the apparatus being caused to send the selected SSID includes being caused to send the selected SSID and the password to the appliance to enable the appliance to connect directly to the selected WLAN as a WLAN station using the selected SSID. 8. The apparatus of claim 7, wherein the apparatus being caused to send the selected SSID and the password to the appliance includes being caused to send the selected SSID, the password and an identifier associated with a user account with a service platform configured to provide one or more services for the appliance, the appliance being configured send the identifier to the service platform via the selected WLAN to enable the service platform to bind the appliance to the user account. 9. The apparatus of claim 6, wherein the apparatus being caused to send the selected SSID to the appliance includes being caused to send the selected SSID and an identifier associated with a user account with a service platform configured to provide one or more services for the appliance, the appliance being configured send the identifier to the service platform via the selected WLAN to enable the service platform to bind the appliance to the user account. 10. The apparatus of claim 6, wherein the apparatus is caused to connect to the appliance without authentication of the apparatus or appliance to the other and without user authentication to either the apparatus or appliance. 11. A method of provisioning an appliance for network connectivity, the method comprising at the appliance: connecting to a user device at the appliance configured to operate as a wireless local area network (WLAN) access point, and thereby establishing a wireless connection with the user device; receiving a command over the wireless connection from the user device to cause the appliance to scan for one or more available WLANs and obtain one or more service set identifiers (SSIDs) of the one or more available WLANs; sending the one or more SSIDs over the wireless connection to the user device for display and user selection of a selected SSID of the one or more SSIDs, the selected SSID being of a selected WLAN of the one or more available WLANs; and receiving the selected SSID over the wireless connection from the user device to enable the appliance to connect directly to the selected WLAN as a WLAN station using the selected SSID. 12. The method of claim 11, wherein the user device is configured to prompt the user for a password for the selected WLAN, and receive the password manually entered by the user, and wherein receiving the selected SSID includes receiving the selected SSID and the password from the user device to enable the appliance to connect directly to the selected WLAN as a WLAN station using the selected SSID. 13. The method of claim 12, wherein receiving the selected SSID and the password from the user device includes receiving the selected SSID, the password and an identifier associated with a user account with a service platform configured to provide one or more services for the appliance, and wherein the method further comprises at the appliance, sending the identifier to the service platform via the selected WLAN to enable the service platform to bind the appliance to the user account. 14. The method of claim 11, wherein receiving the selected SSID from the user device includes receiving the selected SSID and an identifier associated with a user account with a service platform configured to provide one or more services for the appliance, and wherein the method further comprises at the appliance, sending the identifier to the service platform via the selected WLAN to enable the service platform to bind the appliance to the user account. 15. The method of claim 11, wherein connecting to the user device occurs without authentication of the user device or appliance to the other and without user authentication to either the user device or appliance. 16. A method of provisioning an appliance for network connectivity, the method comprising at a user device: connecting to the appliance configured to operate as a wireless local area network (WLAN) access point, and thereby establishing a wireless connection with the appliance; sending a command over the wireless connection to the appliance to cause the appliance to scan for one or more available WLANs and obtain one or more service set identifiers (SSIDs) of the one or more available WLANs; receiving the one or more SSIDs over the wireless connection from the appliance; displaying the one or more SSIDs for user selection of a selected SSID of the one or more SSIDs, the selected SSID being of a selected WLAN of the one or more available WLANs; and sending the selected SSID over the wireless connection to the appliance to enable the appliance to connect directly to the selected WLAN as a WLAN station using the selected SSID. 17. The method of claim 16 further comprising at the user device: prompting the user for a password for the selected WLAN, and receiving the password manually entered by the user, wherein sending the selected SSID includes sending the selected SSID and the password to the appliance to enable the appliance to connect directly to the selected WLAN as a WLAN station using the selected SSID. 18. The method of claim 17, wherein sending the selected SSID and the password to the appliance includes sending the selected SSID, the password and an identifier associated with a user account with a service platform configured to provide one or more services for the appliance, the appliance being configured send the identifier to the service platform via the selected WLAN to enable the service platform to bind the appliance to the user account. 19. The method of claim 16, wherein sending the selected SSID to the appliance includes sending the selected SSID and an identifier associated with a user account with a service platform configured to provide one or more services for the appliance, the appliance being configured send the identifier to the service platform via the selected WLAN to enable the service platform to bind the appliance to the user account. 20. The method of claim 16, wherein connecting to the appliance occurs without authentication of the user device or appliance to the other and without user authentication to either the user device or appliance.
An apparatus integral with or directly coupled to an appliance is provided. The apparatus may connect to a user device at the apparatus configured to operate as a wireless local area network (WLAN) access point. The apparatus may receive a command over the connection from the user device to cause the apparatus to scan for one or more available WLAN(s) and obtain one or more service set identifiers (SSIDs) of the available WLAN(s). The apparatus may send the SSID(s) over the connection to the user device for display and user selection of a selected SSID of the SSID(s), with the selected SSID being of a selected WLAN of the available WLAN(s). And the apparatus may receive the selected SSID over the connection from the user device to enable the apparatus to connect directly to the selected WLAN as a WLAN station using the selected SSID.1. An apparatus integral with or directly coupled to an appliance, the apparatus comprising a processor and a memory storing executable instructions that in response to execution by the processor cause the apparatus and thereby the appliance to at least: connect to a user device at the apparatus configured to operate as a wireless local area network (WLAN) access point, and thereby establish a wireless connection with the user device; receive a command over the wireless connection from the user device to cause the apparatus to scan for one or more available WLANs and obtain one or more service set identifiers (SSIDs) of the one or more available WLANs; send the one or more SSIDs over the wireless connection to the user device for display and user selection of a selected SSID of the one or more SSIDs, the selected SSID being of a selected WLAN of the one or more available WLANs; and receive the selected SSID over the wireless connection from the user device to enable the apparatus to connect directly to the selected WLAN as a WLAN station using the selected SSID. 2. The apparatus of claim 1, wherein the user device is configured to prompt the user for a password for the selected WLAN, and receive the password manually entered by the user, and wherein the apparatus being caused to receive the selected SSID includes being caused to receive the selected SSID and the password from the user device to enable the appliance to connect directly to the selected WLAN as a WLAN station using the selected SSID. 3. The apparatus of claim 2, wherein the apparatus being caused to receive the selected SSID and the password from the user device includes being caused to receive the selected SSID, the password and an identifier associated with a user account with a service platform configured to provide one or more services for the appliance, and wherein the memory stores further executable instructions that in response to execution by the processor cause the apparatus and thereby the appliance to further send the identifier to the service platform via the selected WLAN to enable the service platform to bind the appliance to the user account. 4. The apparatus of claim 1, wherein the apparatus being caused to receive the selected SSID from the user device includes being caused to receive the selected SSID and an identifier associated with a user account with a service platform configured to provide one or more services for the appliance, and wherein the memory stores further executable instructions that in response to execution by the processor cause the apparatus and thereby the appliance to further send the identifier to the service platform via the selected WLAN to enable the service platform to bind the appliance to the user account. 5. The apparatus of claim 1, wherein the apparatus is caused to connect to the user device without authentication of the user device or appliance to the other and without user authentication to either the user device or appliance. 6. An apparatus comprising a processor and a memory storing executable instructions that in response to execution by the processor cause the apparatus to at least: connect to the appliance configured to operate as a wireless local area network (WLAN) access point, and thereby establish a wireless connection with the appliance; send a command over the wireless connection to the appliance to cause the appliance to scan for one or more available WLANs and obtain one or more service set identifiers (SSIDs) of the one or more available WLANs; receive the one or more SSIDs over the wireless connection from the appliance; display the one or more SSIDs for user selection of a selected SSID of the one or more SSIDs, the selected SSID being of a selected WLAN of the one or more available WLANs; and send the selected SSID over the wireless connection to the appliance to enable the appliance to connect directly to the selected WLAN as a WLAN station using the selected SSID. 7. The apparatus of claim 6, wherein the memory stores further executable instructions that in response to execution by the processor cause the apparatus to further prompt the user for a password for the selected WLAN, and receive the password manually entered by the user, and wherein the apparatus being caused to send the selected SSID includes being caused to send the selected SSID and the password to the appliance to enable the appliance to connect directly to the selected WLAN as a WLAN station using the selected SSID. 8. The apparatus of claim 7, wherein the apparatus being caused to send the selected SSID and the password to the appliance includes being caused to send the selected SSID, the password and an identifier associated with a user account with a service platform configured to provide one or more services for the appliance, the appliance being configured send the identifier to the service platform via the selected WLAN to enable the service platform to bind the appliance to the user account. 9. The apparatus of claim 6, wherein the apparatus being caused to send the selected SSID to the appliance includes being caused to send the selected SSID and an identifier associated with a user account with a service platform configured to provide one or more services for the appliance, the appliance being configured send the identifier to the service platform via the selected WLAN to enable the service platform to bind the appliance to the user account. 10. The apparatus of claim 6, wherein the apparatus is caused to connect to the appliance without authentication of the apparatus or appliance to the other and without user authentication to either the apparatus or appliance. 11. A method of provisioning an appliance for network connectivity, the method comprising at the appliance: connecting to a user device at the appliance configured to operate as a wireless local area network (WLAN) access point, and thereby establishing a wireless connection with the user device; receiving a command over the wireless connection from the user device to cause the appliance to scan for one or more available WLANs and obtain one or more service set identifiers (SSIDs) of the one or more available WLANs; sending the one or more SSIDs over the wireless connection to the user device for display and user selection of a selected SSID of the one or more SSIDs, the selected SSID being of a selected WLAN of the one or more available WLANs; and receiving the selected SSID over the wireless connection from the user device to enable the appliance to connect directly to the selected WLAN as a WLAN station using the selected SSID. 12. The method of claim 11, wherein the user device is configured to prompt the user for a password for the selected WLAN, and receive the password manually entered by the user, and wherein receiving the selected SSID includes receiving the selected SSID and the password from the user device to enable the appliance to connect directly to the selected WLAN as a WLAN station using the selected SSID. 13. The method of claim 12, wherein receiving the selected SSID and the password from the user device includes receiving the selected SSID, the password and an identifier associated with a user account with a service platform configured to provide one or more services for the appliance, and wherein the method further comprises at the appliance, sending the identifier to the service platform via the selected WLAN to enable the service platform to bind the appliance to the user account. 14. The method of claim 11, wherein receiving the selected SSID from the user device includes receiving the selected SSID and an identifier associated with a user account with a service platform configured to provide one or more services for the appliance, and wherein the method further comprises at the appliance, sending the identifier to the service platform via the selected WLAN to enable the service platform to bind the appliance to the user account. 15. The method of claim 11, wherein connecting to the user device occurs without authentication of the user device or appliance to the other and without user authentication to either the user device or appliance. 16. A method of provisioning an appliance for network connectivity, the method comprising at a user device: connecting to the appliance configured to operate as a wireless local area network (WLAN) access point, and thereby establishing a wireless connection with the appliance; sending a command over the wireless connection to the appliance to cause the appliance to scan for one or more available WLANs and obtain one or more service set identifiers (SSIDs) of the one or more available WLANs; receiving the one or more SSIDs over the wireless connection from the appliance; displaying the one or more SSIDs for user selection of a selected SSID of the one or more SSIDs, the selected SSID being of a selected WLAN of the one or more available WLANs; and sending the selected SSID over the wireless connection to the appliance to enable the appliance to connect directly to the selected WLAN as a WLAN station using the selected SSID. 17. The method of claim 16 further comprising at the user device: prompting the user for a password for the selected WLAN, and receiving the password manually entered by the user, wherein sending the selected SSID includes sending the selected SSID and the password to the appliance to enable the appliance to connect directly to the selected WLAN as a WLAN station using the selected SSID. 18. The method of claim 17, wherein sending the selected SSID and the password to the appliance includes sending the selected SSID, the password and an identifier associated with a user account with a service platform configured to provide one or more services for the appliance, the appliance being configured send the identifier to the service platform via the selected WLAN to enable the service platform to bind the appliance to the user account. 19. The method of claim 16, wherein sending the selected SSID to the appliance includes sending the selected SSID and an identifier associated with a user account with a service platform configured to provide one or more services for the appliance, the appliance being configured send the identifier to the service platform via the selected WLAN to enable the service platform to bind the appliance to the user account. 20. The method of claim 16, wherein connecting to the appliance occurs without authentication of the user device or appliance to the other and without user authentication to either the user device or appliance.
2,400
6,949
6,949
15,044,267
2,484
A method of video encoding is provided to reduce the cost of network DVR storage by building on a concept of Just-In Time (JIT) transcoding which eliminates storing all formats of content in a DVR. A super-encoding procedure is provided that encodes a high resolution format, such as HEVC, while metadata is provided for lower resolution formats, such as MPEG4. The metadata can include items like motion vectors to reduce the computational costs during JIT transcoding. The super-encoded data is stored in memory of the DVR. High resolution encoded data is read directly out of the DVR memory, while lower resolutions are transcoded from the DVR memory data using the metadata to increase efficiency.
1. A method for performing video encoding for storage comprising: providing super-encoding to compute an efficient compressed stream for storage for a single layer first resolution video; and computing metadata that reduces the computational load for subsequent Just In Time (JIT) transcoding the stored first resolution video as part of the super-encoding to a single layer second resolution video and storing the metadata with the compressed stream, wherein the metadata targets the largest computational load of transcoding. 2. The method of claim 1, wherein the metadata comprises motion vectors. 3. The method of claim 1, wherein the metadata comprises mode decisions on intra versus inter prediction blocks. 4. The method of claim 1, wherein the first resolution video is HEVC and the second resolution video is MPEG4. 5. The method of claim 4, wherein the metadata comprises motion vectors needed for MPEG4 which are not provided by HEVC when HEVC uses very large or very small block sizes relative to MPEG4. 6. A system for encoding video encoding for storage, the system comprising: an encoding processor having an input for receiving input video data and providing an encoded video output; a digital video recorder (DVR) having a first memory for receiving and storing the encoded video output from the processor; a second memory connected to the encoding processor, the second memory storing code data to enable the encoding processor to perform the following steps: providing super-encoding on the input video to compute an efficient compressed stream for storage for a single layer first high resolution video; and computing metadata that reduces the computational load for subsequent Just In Time (JIT) transcoding the stored first high resolution video as part of the super-encoding to a single layer second resolution video and storing the metadata with the compressed stream, wherein the metadata targets the largest computational load of transcoding. 7. The system of claim 6, wherein the metadata comprises motion vectors. 8. The system of claim 6, wherein the metadata comprises mode decisions on intra versus inter prediction blocks. 9. The system of claim 6, wherein the first resolution video is HEVC and the second resolution video is MPEG4. 10. The method of claim 9, wherein the metadata comprises motion vectors needed for MPEG4 which are not provided by HEVC when HEVC uses very large or very small block sizes relative to MPEG4. 11-12. (canceled) 13. The method of claim 1, wherein subsequent just in time transcoding is performed for the second resolution video for providing to a first video display with a different resolution than a second video display capable of displaying the first resolution video. 14. The system of claim 6, wherein subsequent just in time transcoding is performed for the second resolution video for providing to a first video display with a different resolution than a second video display capable of displaying the first resolution video.
A method of video encoding is provided to reduce the cost of network DVR storage by building on a concept of Just-In Time (JIT) transcoding which eliminates storing all formats of content in a DVR. A super-encoding procedure is provided that encodes a high resolution format, such as HEVC, while metadata is provided for lower resolution formats, such as MPEG4. The metadata can include items like motion vectors to reduce the computational costs during JIT transcoding. The super-encoded data is stored in memory of the DVR. High resolution encoded data is read directly out of the DVR memory, while lower resolutions are transcoded from the DVR memory data using the metadata to increase efficiency.1. A method for performing video encoding for storage comprising: providing super-encoding to compute an efficient compressed stream for storage for a single layer first resolution video; and computing metadata that reduces the computational load for subsequent Just In Time (JIT) transcoding the stored first resolution video as part of the super-encoding to a single layer second resolution video and storing the metadata with the compressed stream, wherein the metadata targets the largest computational load of transcoding. 2. The method of claim 1, wherein the metadata comprises motion vectors. 3. The method of claim 1, wherein the metadata comprises mode decisions on intra versus inter prediction blocks. 4. The method of claim 1, wherein the first resolution video is HEVC and the second resolution video is MPEG4. 5. The method of claim 4, wherein the metadata comprises motion vectors needed for MPEG4 which are not provided by HEVC when HEVC uses very large or very small block sizes relative to MPEG4. 6. A system for encoding video encoding for storage, the system comprising: an encoding processor having an input for receiving input video data and providing an encoded video output; a digital video recorder (DVR) having a first memory for receiving and storing the encoded video output from the processor; a second memory connected to the encoding processor, the second memory storing code data to enable the encoding processor to perform the following steps: providing super-encoding on the input video to compute an efficient compressed stream for storage for a single layer first high resolution video; and computing metadata that reduces the computational load for subsequent Just In Time (JIT) transcoding the stored first high resolution video as part of the super-encoding to a single layer second resolution video and storing the metadata with the compressed stream, wherein the metadata targets the largest computational load of transcoding. 7. The system of claim 6, wherein the metadata comprises motion vectors. 8. The system of claim 6, wherein the metadata comprises mode decisions on intra versus inter prediction blocks. 9. The system of claim 6, wherein the first resolution video is HEVC and the second resolution video is MPEG4. 10. The method of claim 9, wherein the metadata comprises motion vectors needed for MPEG4 which are not provided by HEVC when HEVC uses very large or very small block sizes relative to MPEG4. 11-12. (canceled) 13. The method of claim 1, wherein subsequent just in time transcoding is performed for the second resolution video for providing to a first video display with a different resolution than a second video display capable of displaying the first resolution video. 14. The system of claim 6, wherein subsequent just in time transcoding is performed for the second resolution video for providing to a first video display with a different resolution than a second video display capable of displaying the first resolution video.
2,400
6,950
6,950
13,530,920
2,487
A method and apparatus for decoding video. The method includes determining a sample adaptive offset edge type of at least a portion of the image, determining a boundary edge type of the at least a portion of the image, modifying the sample adaptive offset edge type of the at least a portion of the image according to the determined edge type of the at least a portion of the image, selecting a sample adaptive offset type according to at least one of the determined sample adaptive offset edge type or the modified sample adaptive offset edge type, and filtering at least a portion of the image utilizing the selected filter type.
1-3. (canceled) 4. A video decoding method, comprising: determining a sample adaptive offset edge type of at least a portion of the image; determining a boundary edge type of the at least a portion of the image; modifying the sample adaptive offset edge type of the at least a portion of the image according to the determined boundary edge type of the at least a portion of the image; and selecting a sample adaptive offset type according to at least one of the determined sample adaptive offset edge type or the modified sample adaptive offset edge type; and filtering at least a portion of the image utilizing the selected sample adaptive offset type. 5. The video decoding method of claim 4, wherein the boundary edge type is at least one of a bottom edge, a top edge, a right edge, and a left edge. 6. The video decoding method of claim 4, wherein the sample adaptive offset type is at least one of zero degree edge, 90 degree edge, 135 degree edge, 45 degree edge and a band offset type. 7. The video decoding method of claim 4, wherein the at least a portion of an image is at least one of a slice, LCU or a full image. 8. A video decoder utilizing sample adaptive type according to a modified sample adaptive offset edge type of a portion of an image, wherein the sample adaptive offset type is modified based on a boundary edge type of the portion of the image. 9. The video decoder of claim 8, wherein the boundary edge type is at least one of a bottom edge, a top edge, a right edge, and a left edge. 10. The video decoder of claim 8, wherein the sample adaptive offset type is at least one of zero degree edge, 90 degree edge, 135 degree edge, 45 degree edge and a band offset type. 11. The video decoder of claim 8, wherein the at least a portion of an image is at least one of a slice, LCU or a full image. 12. A non-transitory computer readable medium with executable computer instructions, when executed perform a video processing method, the method comprising: determining a sample adaptive offset edge type of at least a portion of the image; determining a boundary edge type of the at least a portion of the image; modifying the sample adaptive offset edge type of the at least a portion of the image according to the determined boundary edge type of the at least a portion of the image; and selecting a sample adaptive offset type according to at least one of the determined sample adaptive offset edge type or the modified sample adaptive offset edge type; and filtering at least a portion of the image utilizing the selected sample adaptive offset type. 13. The A non-transitory computer readable medium of claim 12, wherein the boundary edge type is at least one of a bottom edge, a top edge, a right edge, and a left edge. 14. The non-transitory computer readable medium of claim 12, wherein the sample adaptive offset type is at least one of zero degree edge, 90 degree edge, 135 degree edge, 45 degree edge and a band offset type. 15. The non-transitory computer readable medium of claim 12, wherein the at least a portion of an image is at least one of a slice, LCU or a full image.
A method and apparatus for decoding video. The method includes determining a sample adaptive offset edge type of at least a portion of the image, determining a boundary edge type of the at least a portion of the image, modifying the sample adaptive offset edge type of the at least a portion of the image according to the determined edge type of the at least a portion of the image, selecting a sample adaptive offset type according to at least one of the determined sample adaptive offset edge type or the modified sample adaptive offset edge type, and filtering at least a portion of the image utilizing the selected filter type.1-3. (canceled) 4. A video decoding method, comprising: determining a sample adaptive offset edge type of at least a portion of the image; determining a boundary edge type of the at least a portion of the image; modifying the sample adaptive offset edge type of the at least a portion of the image according to the determined boundary edge type of the at least a portion of the image; and selecting a sample adaptive offset type according to at least one of the determined sample adaptive offset edge type or the modified sample adaptive offset edge type; and filtering at least a portion of the image utilizing the selected sample adaptive offset type. 5. The video decoding method of claim 4, wherein the boundary edge type is at least one of a bottom edge, a top edge, a right edge, and a left edge. 6. The video decoding method of claim 4, wherein the sample adaptive offset type is at least one of zero degree edge, 90 degree edge, 135 degree edge, 45 degree edge and a band offset type. 7. The video decoding method of claim 4, wherein the at least a portion of an image is at least one of a slice, LCU or a full image. 8. A video decoder utilizing sample adaptive type according to a modified sample adaptive offset edge type of a portion of an image, wherein the sample adaptive offset type is modified based on a boundary edge type of the portion of the image. 9. The video decoder of claim 8, wherein the boundary edge type is at least one of a bottom edge, a top edge, a right edge, and a left edge. 10. The video decoder of claim 8, wherein the sample adaptive offset type is at least one of zero degree edge, 90 degree edge, 135 degree edge, 45 degree edge and a band offset type. 11. The video decoder of claim 8, wherein the at least a portion of an image is at least one of a slice, LCU or a full image. 12. A non-transitory computer readable medium with executable computer instructions, when executed perform a video processing method, the method comprising: determining a sample adaptive offset edge type of at least a portion of the image; determining a boundary edge type of the at least a portion of the image; modifying the sample adaptive offset edge type of the at least a portion of the image according to the determined boundary edge type of the at least a portion of the image; and selecting a sample adaptive offset type according to at least one of the determined sample adaptive offset edge type or the modified sample adaptive offset edge type; and filtering at least a portion of the image utilizing the selected sample adaptive offset type. 13. The A non-transitory computer readable medium of claim 12, wherein the boundary edge type is at least one of a bottom edge, a top edge, a right edge, and a left edge. 14. The non-transitory computer readable medium of claim 12, wherein the sample adaptive offset type is at least one of zero degree edge, 90 degree edge, 135 degree edge, 45 degree edge and a band offset type. 15. The non-transitory computer readable medium of claim 12, wherein the at least a portion of an image is at least one of a slice, LCU or a full image.
2,400
6,951
6,951
14,242,640
2,449
In one embodiment, a method provides a first orchestration service instance for managing a set of containers operating on a controller node where the controller node controls a set of physical nodes. The method also provides a set of second orchestration service instances for managing a set of first services operating in the set of containers where a second orchestration service instance in a container manages a respective first service in the container. The set of physical nodes include a set of third orchestration service instances for managing a set of second services operating on the set of physical nodes. The first orchestration instance, the set of second orchestration service instances, and the set of third orchestration service instances communicate through a shared communication service that maintains a global state of the controller node, the set of containers, and the set of physical nodes.
1. A method comprising: providing a first orchestration service instance for managing a set of containers operating on a controller node, wherein the controller node controls a set of physical nodes; and providing a set of second orchestration service instances for managing a set of first services operating in the set of containers, wherein a second orchestration service instance in a container manages a respective first service in the container, wherein: the set of physical nodes include a set of third orchestration service instances for managing a set of second services operating on the set of physical nodes, and the first orchestration instance, the set of second orchestration service instances, and the set of third orchestration service instances communicate through a shared communication service that maintains a global state of the controller node, the set of containers, and the set of physical nodes. 2. The method of claim 1, wherein: the first orchestration instance monitors for changes in the set of containers, and performs an action based on determining a change in the set of containers. 3. The method of claim 2, wherein: a second orchestration service in the set of second orchestration services posts the change to the communication service, and the first orchestration instance detects the change by monitoring the communication service. 4. The method of claim 1, wherein: the controller node is included in a plurality of controller nodes, and the first orchestration service instance determines a change from the communication service with respect to another controller node in the plurality of controller nodes and performs an action based on determining the change. 5. The method of claim 1, wherein: each second orchestration service instance in a respective container monitors for changes in a respective first service in the respective container, and each second orchestration service instance performs an action based on determining a change in the respective first service. 6. The method of claim 5, wherein: each second orchestration service posts the change in the respective second service to the communication service, and the first orchestration instance detects the change by monitoring the communication service. 7. The method of claim 1, wherein: each third orchestration service instance in a respective physical node monitors for changes in a respective second service in the respective physical node, and each third orchestration service instance performs an action based on determining a change in the respective second service. 8. The method of claim 7, wherein: each third orchestration service posts the change in the respective second service to the physical node, and the physical node detects the change and posts an aggregate status for the physical node including the change to the communication service. 9. The method of claim 1, wherein: when a second orchestration service instance in a respective container initialized, the second orchestration service performs an election process to determine whether the second orchestration service instance should be a master or slave, and the second orchestration service instance records a result of the election process to the communication service. 10. An apparatus comprising: one or more computer processors; and a non-transitory computer-readable storage medium comprising instructions, that when executed, control the one or more computer processors to be configured for: providing a first orchestration service instance for managing a set of containers operating on a controller node, wherein the controller node controls a set of physical nodes; and providing a set of second orchestration service instances for managing a set of first services operating in the set of containers, wherein a second orchestration service instance in a container manages a respective first service in the container, wherein: the set of physical nodes include a set of third orchestration service instances for managing a set of second services operating on the set of physical nodes, and the first orchestration instance, the set of second orchestration service instances, and the set of third orchestration service instances communicate through a shared communication service that maintains a global state of the controller node, the set of containers, and the set of physical nodes. 11. The apparatus of claim 10, wherein: the first orchestration instance monitors for changes in the set of containers, and performs an action based on determining a change in the set of containers. 12. The apparatus of claim 11, wherein: a second orchestration service in the set of second orchestration services posts the change to the communication service, and the first orchestration instance detects the change by monitoring the communication service. 13. The apparatus of claim 10, wherein: the controller node is included in a plurality of controller nodes, and the first orchestration service instance determines a change from the communication service with respect to another controller node in the plurality of controller nodes and performs an action based on determining the change. 14. The apparatus of claim 10, wherein: each second orchestration service instance in a respective container monitors changes in a respective first service in the respective container, and each second orchestration service instance performs an action based on determining a change in the respective first service. 15. The apparatus of claim 14, wherein: each second orchestration service posts the change in the respective second service to the communication service, and the first orchestration instance detects the change by monitoring the communication service. 16. The apparatus of claim 10, wherein: each third orchestration service instance in a respective physical node monitors for changes in a respective second service in the respective physical node, and each third orchestration service instance performs an action based on determining a change in the respective second service. 17. The apparatus of claim 16, wherein: each third orchestration service posts the change in the respective second service to the physical node, and the physical node detects the change and posts an aggregate status for the physical node including the change to the communication service. 18. The apparatus of claim 10, wherein: when a second orchestration service instance in a respective container initialized, the second orchestration service performs an election process to determine whether the second orchestration service instance should be a master or slave, and the second orchestration service instance records a result of the election process to the communication service. 19. A non-transitory computer-readable storage medium containing instructions, that when executed, control a computer system to be configured for: providing a first orchestration service instance for managing a set of containers operating on a controller node, wherein the controller node controls a set of physical nodes; and providing a set of second orchestration service instances for managing a set of first services operating in the set of containers, wherein a second orchestration service instance in a container manages a respective first service in the container, wherein: the set of physical nodes include a set of third orchestration service instances for managing a set of second services operating on the set of physical nodes, and the first orchestration instance, the set of second orchestration service instances, and the set of third orchestration service instances communicate through a shared communication service that maintains a global state of the controller node, the set of containers, and the set of physical nodes. 20. The non-transitory computer-readable storage medium of claim 19, wherein: the first orchestration instance monitors for changes in the set of containers, and performs an action based on determining a change in the set of containers.
In one embodiment, a method provides a first orchestration service instance for managing a set of containers operating on a controller node where the controller node controls a set of physical nodes. The method also provides a set of second orchestration service instances for managing a set of first services operating in the set of containers where a second orchestration service instance in a container manages a respective first service in the container. The set of physical nodes include a set of third orchestration service instances for managing a set of second services operating on the set of physical nodes. The first orchestration instance, the set of second orchestration service instances, and the set of third orchestration service instances communicate through a shared communication service that maintains a global state of the controller node, the set of containers, and the set of physical nodes.1. A method comprising: providing a first orchestration service instance for managing a set of containers operating on a controller node, wherein the controller node controls a set of physical nodes; and providing a set of second orchestration service instances for managing a set of first services operating in the set of containers, wherein a second orchestration service instance in a container manages a respective first service in the container, wherein: the set of physical nodes include a set of third orchestration service instances for managing a set of second services operating on the set of physical nodes, and the first orchestration instance, the set of second orchestration service instances, and the set of third orchestration service instances communicate through a shared communication service that maintains a global state of the controller node, the set of containers, and the set of physical nodes. 2. The method of claim 1, wherein: the first orchestration instance monitors for changes in the set of containers, and performs an action based on determining a change in the set of containers. 3. The method of claim 2, wherein: a second orchestration service in the set of second orchestration services posts the change to the communication service, and the first orchestration instance detects the change by monitoring the communication service. 4. The method of claim 1, wherein: the controller node is included in a plurality of controller nodes, and the first orchestration service instance determines a change from the communication service with respect to another controller node in the plurality of controller nodes and performs an action based on determining the change. 5. The method of claim 1, wherein: each second orchestration service instance in a respective container monitors for changes in a respective first service in the respective container, and each second orchestration service instance performs an action based on determining a change in the respective first service. 6. The method of claim 5, wherein: each second orchestration service posts the change in the respective second service to the communication service, and the first orchestration instance detects the change by monitoring the communication service. 7. The method of claim 1, wherein: each third orchestration service instance in a respective physical node monitors for changes in a respective second service in the respective physical node, and each third orchestration service instance performs an action based on determining a change in the respective second service. 8. The method of claim 7, wherein: each third orchestration service posts the change in the respective second service to the physical node, and the physical node detects the change and posts an aggregate status for the physical node including the change to the communication service. 9. The method of claim 1, wherein: when a second orchestration service instance in a respective container initialized, the second orchestration service performs an election process to determine whether the second orchestration service instance should be a master or slave, and the second orchestration service instance records a result of the election process to the communication service. 10. An apparatus comprising: one or more computer processors; and a non-transitory computer-readable storage medium comprising instructions, that when executed, control the one or more computer processors to be configured for: providing a first orchestration service instance for managing a set of containers operating on a controller node, wherein the controller node controls a set of physical nodes; and providing a set of second orchestration service instances for managing a set of first services operating in the set of containers, wherein a second orchestration service instance in a container manages a respective first service in the container, wherein: the set of physical nodes include a set of third orchestration service instances for managing a set of second services operating on the set of physical nodes, and the first orchestration instance, the set of second orchestration service instances, and the set of third orchestration service instances communicate through a shared communication service that maintains a global state of the controller node, the set of containers, and the set of physical nodes. 11. The apparatus of claim 10, wherein: the first orchestration instance monitors for changes in the set of containers, and performs an action based on determining a change in the set of containers. 12. The apparatus of claim 11, wherein: a second orchestration service in the set of second orchestration services posts the change to the communication service, and the first orchestration instance detects the change by monitoring the communication service. 13. The apparatus of claim 10, wherein: the controller node is included in a plurality of controller nodes, and the first orchestration service instance determines a change from the communication service with respect to another controller node in the plurality of controller nodes and performs an action based on determining the change. 14. The apparatus of claim 10, wherein: each second orchestration service instance in a respective container monitors changes in a respective first service in the respective container, and each second orchestration service instance performs an action based on determining a change in the respective first service. 15. The apparatus of claim 14, wherein: each second orchestration service posts the change in the respective second service to the communication service, and the first orchestration instance detects the change by monitoring the communication service. 16. The apparatus of claim 10, wherein: each third orchestration service instance in a respective physical node monitors for changes in a respective second service in the respective physical node, and each third orchestration service instance performs an action based on determining a change in the respective second service. 17. The apparatus of claim 16, wherein: each third orchestration service posts the change in the respective second service to the physical node, and the physical node detects the change and posts an aggregate status for the physical node including the change to the communication service. 18. The apparatus of claim 10, wherein: when a second orchestration service instance in a respective container initialized, the second orchestration service performs an election process to determine whether the second orchestration service instance should be a master or slave, and the second orchestration service instance records a result of the election process to the communication service. 19. A non-transitory computer-readable storage medium containing instructions, that when executed, control a computer system to be configured for: providing a first orchestration service instance for managing a set of containers operating on a controller node, wherein the controller node controls a set of physical nodes; and providing a set of second orchestration service instances for managing a set of first services operating in the set of containers, wherein a second orchestration service instance in a container manages a respective first service in the container, wherein: the set of physical nodes include a set of third orchestration service instances for managing a set of second services operating on the set of physical nodes, and the first orchestration instance, the set of second orchestration service instances, and the set of third orchestration service instances communicate through a shared communication service that maintains a global state of the controller node, the set of containers, and the set of physical nodes. 20. The non-transitory computer-readable storage medium of claim 19, wherein: the first orchestration instance monitors for changes in the set of containers, and performs an action based on determining a change in the set of containers.
2,400
6,952
6,952
14,917,839
2,438
A callback, which may be assigned to a creation event of an application process, may be executed. In response to the execution of the callback, a data flow control object may be injected into the application process. The data flow control object may be to intercept a system call made by the application process and to control flow of data handled by the system call.
1. A non-transitory computer readable storage medium including executable instructions that, when executed by a processor, cause the processor to: execute a callback that is assigned to a creation event of an application process; and in response to the execution, inject a data flow control object into the application process, the data flow control object to intercept a system call made by the application process and to control flow of data being handled by the system call. 2. The non-transitory computer readable storage medium, of claim 1 wherein the callback is assigned to the creation event using a kernel module of an operating system. 3. The non-transitory computer readable storage medium of claim 2 further comprising executable instructions to suspend the application process during the injection. 4. The non-transitory computer readable storage medium of claim 2 wherein the data flow control object is injected prior to the application process being deployed. 5. The non-transitory computer readable storage medium of claim 1 wherein the callback is assigned to the creation event using management instrumentation of an operating system. 6. The non-transitory computer readable storage medium of claim 1 wherein the data flow control object is to prevent data from being exported by the application process, or to monitor, encrypt, or redact the data in response to the data being exported by the application process. 7. A computer-implemented method comprising: assigning a callback to a creation event of an application process; executing the callback in response to the creation event to cause a data flow control object to be injected into the application process, the data flow control object to intercept a system call made by the application process and to control flow of data handled by the system call. 8. The computer-implemented method of claim 7 wherein the callback is assigned to the creation event using a kernel module of an operating system. 9. The computer-implemented method of claim 8 further comprising executable instructions to suspend the application process during the injection. 10. The computer-implemented method of claim 8 wherein the data low control object is injected prior to the application process being deployed. 11. The computer-implemented method of claim 7 wherein the callback is assigned to the creation event using management instrumentation of an operating system. 12. The computer-implemented method of claim 7 wherein the data flow control object is to prevent data from being exported by the application process, or to monitor, encrypt, or redact the data in response to the data being exported by the application process. 13. A computing device comprising: hardware resources; an operating system to manage the hardware resources and to provide service for an application process, the operating system having a kernel module or management instrumentation; and a callback to be assigned to a creation event of an application process using the kernel module or the management instrumentation, the callback to be executed in response to the creation event to cause a data flow control object to be injected into the application process, the data flow control object to intercept a system call made by the application process and to control flow of data handled by the system call. 14. The computing device of claim 13 wherein the data flow control object is to be injected prior to the application process being deployed. 15. The computing device of claim 13 wherein the data flow control object is to prevent data from being exported by the application process, or to monitor, encrypt, or redact the data in response to the data being exported by the application process.
A callback, which may be assigned to a creation event of an application process, may be executed. In response to the execution of the callback, a data flow control object may be injected into the application process. The data flow control object may be to intercept a system call made by the application process and to control flow of data handled by the system call.1. A non-transitory computer readable storage medium including executable instructions that, when executed by a processor, cause the processor to: execute a callback that is assigned to a creation event of an application process; and in response to the execution, inject a data flow control object into the application process, the data flow control object to intercept a system call made by the application process and to control flow of data being handled by the system call. 2. The non-transitory computer readable storage medium, of claim 1 wherein the callback is assigned to the creation event using a kernel module of an operating system. 3. The non-transitory computer readable storage medium of claim 2 further comprising executable instructions to suspend the application process during the injection. 4. The non-transitory computer readable storage medium of claim 2 wherein the data flow control object is injected prior to the application process being deployed. 5. The non-transitory computer readable storage medium of claim 1 wherein the callback is assigned to the creation event using management instrumentation of an operating system. 6. The non-transitory computer readable storage medium of claim 1 wherein the data flow control object is to prevent data from being exported by the application process, or to monitor, encrypt, or redact the data in response to the data being exported by the application process. 7. A computer-implemented method comprising: assigning a callback to a creation event of an application process; executing the callback in response to the creation event to cause a data flow control object to be injected into the application process, the data flow control object to intercept a system call made by the application process and to control flow of data handled by the system call. 8. The computer-implemented method of claim 7 wherein the callback is assigned to the creation event using a kernel module of an operating system. 9. The computer-implemented method of claim 8 further comprising executable instructions to suspend the application process during the injection. 10. The computer-implemented method of claim 8 wherein the data low control object is injected prior to the application process being deployed. 11. The computer-implemented method of claim 7 wherein the callback is assigned to the creation event using management instrumentation of an operating system. 12. The computer-implemented method of claim 7 wherein the data flow control object is to prevent data from being exported by the application process, or to monitor, encrypt, or redact the data in response to the data being exported by the application process. 13. A computing device comprising: hardware resources; an operating system to manage the hardware resources and to provide service for an application process, the operating system having a kernel module or management instrumentation; and a callback to be assigned to a creation event of an application process using the kernel module or the management instrumentation, the callback to be executed in response to the creation event to cause a data flow control object to be injected into the application process, the data flow control object to intercept a system call made by the application process and to control flow of data handled by the system call. 14. The computing device of claim 13 wherein the data flow control object is to be injected prior to the application process being deployed. 15. The computing device of claim 13 wherein the data flow control object is to prevent data from being exported by the application process, or to monitor, encrypt, or redact the data in response to the data being exported by the application process.
2,400
6,953
6,953
12,969,873
2,487
A method for testing an optical investigation system, with an imaging device, a video camera and a light source for optical investigation of an object, a reference surface with predetermined optical properties is illuminated with illuminating light from a light source. An image of the reference surface is recorded by the imaging device and the video camera. An operating condition of the video camera that prevails during the recording of the image is recorded. The functionality or another property of the investigation system is determined on the basis of the recorded operating condition.
1. A method for testing an optical investigation system, with an imaging device, a video camera and a light source for optical investigation of an object, with the following steps: illuminate a reference surface with predetermined optical properties with illuminating light from the light source; record an image of the reference surface by means of the imaging device and video camera; record an operating condition of the video camera that prevails during the recording of the image; determine the functionality or another property of the investigation system on the basis of the recorded operating condition. 2. A method according to claim 1, in addition with the following step: position the distal end of the imaging device at a predetermined position in relation to the reference surface. 3. The method according to claim 1, in addition with the following steps: record an expected application of the optical investigation system; ascertain a requirement that is associated with the expected application of the optical investigation system, so that the functionality for the expected application or another predetermined property of the optical investigation system is present if the operating condition corresponds to the requirement. 4. The method according to claim 1, wherein the reference surface is illuminated with an irradiance that equals a predetermined fraction of the irradiance applied in the expected use of the optical investigation system. 5. The method according to claim 1, wherein: the step of recording the operating condition includes ascertaining an exposure parameter; the step of determining the functionality or another property includes comparing the ascertained exposure parameter with a predetermined threshold value. 6. The method according to claim 1, wherein: the step of illuminating successively includes illuminating the reference surface with illuminating light with a first spectrum and illuminating the reference surface with illuminating light with a second spectrum; a first operating condition of the video camera that prevails during the recording of an image while illuminating the reference surface with illuminating light with the first spectrum is recorded; a second operating condition of the video camera that prevails during the recording of an image of the illumination of the reference surface with illuminating light with the second spectrum is recorded; the functionality or the other property is determined on the basis of the first operating condition and of the second operating condition. 7. The method according to claim 1, wherein the step of determining the functionality or another property includes the following steps: ascertain an indicator parameter from the recorded first operating condition and the recorded second operating condition; compare the ascertained indicator parameter with a threshold value. 8. The method according to claim 1, wherein the recording of an operating condition includes ascertaining one exposure parameter for each of a number of color channels. 9. The method according to claim 1, wherein the recording of an operating condition includes recording a white balance parameter. 10. The method according to claim 1, wherein the recording of an operating condition includes a noise level or a signal-noise distance in the recorded image 11. The method according to claim 1, in addition with the following steps: record patient data; file information on the functionality or the other property as well as the patient data in a databank. 12-13. (canceled) 14. A computer readable storage medium including a set of instructions executable by a processor for testing an optical investigation system, the set of instructions operable to: illuminate a reference surface with predetermined optical properties with illuminating light from a light source; record an image of the reference surface by means of an imaging device and video camera; record an operating condition of the video camera that prevails during the recording of the image; determine the functionality or another property of the investigation system on the basis of the recorded operating condition. 15. A control device for an optical investigation comprising: a light source, said light source illuminating a reference surface with predetermined optical properties; a video camera; an imaging device; said video camera and said imaging device recording an image of said reference surface; a memory, said memory storing an operating condition of said video camera that prevails during the recording of the image; and a processor, said processor determining the functionality or another property of the investigation system from said operating condition.
A method for testing an optical investigation system, with an imaging device, a video camera and a light source for optical investigation of an object, a reference surface with predetermined optical properties is illuminated with illuminating light from a light source. An image of the reference surface is recorded by the imaging device and the video camera. An operating condition of the video camera that prevails during the recording of the image is recorded. The functionality or another property of the investigation system is determined on the basis of the recorded operating condition.1. A method for testing an optical investigation system, with an imaging device, a video camera and a light source for optical investigation of an object, with the following steps: illuminate a reference surface with predetermined optical properties with illuminating light from the light source; record an image of the reference surface by means of the imaging device and video camera; record an operating condition of the video camera that prevails during the recording of the image; determine the functionality or another property of the investigation system on the basis of the recorded operating condition. 2. A method according to claim 1, in addition with the following step: position the distal end of the imaging device at a predetermined position in relation to the reference surface. 3. The method according to claim 1, in addition with the following steps: record an expected application of the optical investigation system; ascertain a requirement that is associated with the expected application of the optical investigation system, so that the functionality for the expected application or another predetermined property of the optical investigation system is present if the operating condition corresponds to the requirement. 4. The method according to claim 1, wherein the reference surface is illuminated with an irradiance that equals a predetermined fraction of the irradiance applied in the expected use of the optical investigation system. 5. The method according to claim 1, wherein: the step of recording the operating condition includes ascertaining an exposure parameter; the step of determining the functionality or another property includes comparing the ascertained exposure parameter with a predetermined threshold value. 6. The method according to claim 1, wherein: the step of illuminating successively includes illuminating the reference surface with illuminating light with a first spectrum and illuminating the reference surface with illuminating light with a second spectrum; a first operating condition of the video camera that prevails during the recording of an image while illuminating the reference surface with illuminating light with the first spectrum is recorded; a second operating condition of the video camera that prevails during the recording of an image of the illumination of the reference surface with illuminating light with the second spectrum is recorded; the functionality or the other property is determined on the basis of the first operating condition and of the second operating condition. 7. The method according to claim 1, wherein the step of determining the functionality or another property includes the following steps: ascertain an indicator parameter from the recorded first operating condition and the recorded second operating condition; compare the ascertained indicator parameter with a threshold value. 8. The method according to claim 1, wherein the recording of an operating condition includes ascertaining one exposure parameter for each of a number of color channels. 9. The method according to claim 1, wherein the recording of an operating condition includes recording a white balance parameter. 10. The method according to claim 1, wherein the recording of an operating condition includes a noise level or a signal-noise distance in the recorded image 11. The method according to claim 1, in addition with the following steps: record patient data; file information on the functionality or the other property as well as the patient data in a databank. 12-13. (canceled) 14. A computer readable storage medium including a set of instructions executable by a processor for testing an optical investigation system, the set of instructions operable to: illuminate a reference surface with predetermined optical properties with illuminating light from a light source; record an image of the reference surface by means of an imaging device and video camera; record an operating condition of the video camera that prevails during the recording of the image; determine the functionality or another property of the investigation system on the basis of the recorded operating condition. 15. A control device for an optical investigation comprising: a light source, said light source illuminating a reference surface with predetermined optical properties; a video camera; an imaging device; said video camera and said imaging device recording an image of said reference surface; a memory, said memory storing an operating condition of said video camera that prevails during the recording of the image; and a processor, said processor determining the functionality or another property of the investigation system from said operating condition.
2,400
6,954
6,954
13,837,205
2,458
A method and system for transparent and automatic establishment of a personalized communication session across heterogeneous networks utilizes a network node for providing personalization services. Communication sessions initiated on any number of heterogeneous networks are transparently and automatically personalized for subscribers to personalization services offered by the network node by routing media in the communication session through the personalization node.
1. A method for providing a personalized communication session between a caller and a callee comprising: (a) automatically establishing a first leg between the caller and a network node by routing a call from the caller to the callee to the network node; (b) at the network node: (i) determining session information associated with the call; (ii) generating at least one audio personalization parameter for the call based upon the session information; (iii) configuring an audio processor using the at least one audio personalization parameter; and (iv) establishing a second leg between the network node and the callee; (v) bridging the first leg and the second leg such that an audio signal associated with the call is routed through the audio processor. 2. The method of claim 1, wherein the session information comprises at least one of: i. an automatic number identification (ANI); ii. a session initiation protocol (SIP) identifier; iii. an equipment identifier; and iv. a communication device information relating to at least one of the caller and the caller. 3. The method of claim 1, wherein generating at least one audio personalization parameter further comprises: (a) generating at least one query from the session information; (b) submitting a query to a database, wherein the database returns the at least one personalization parameter based upon the query 4. The method of claim 3, wherein generating at least one query from the session information further comprises: (a) transforming the session information into a structured data representation, wherein the structured data representation provides a mapping from a session information value to a database field. 5. The method of claim 1, wherein the session information comprises both in-band session information and out-of band session information, such that the out-of band session information is transmitted over an out-of-band communication channel. 6. The method of claim 5, wherein the out-of-band communication channel comprises a communication channel distinct from a communication channel associated with the first leg. 7. The method of claim 1, wherein the network node is coupled to a first network and the caller is associated with a second network, such that the first and second networks utilize distinct signaling and media transport protocols. 8. The method of claim 8, wherein the first network is a packet-data network and the second network is the PSTN. 9. The method according to claim 8, wherein the first network is a packet-data network and the second network is a cellular network. 10. The method according to claim 1, wherein the audio processor provides a left signal path and a right signal path, the left and right signal paths respectively configured based upon a hearing profile for a left ear and a hearing profile for a right ear. 11. The method according to claim 10, wherein audio media provided on the first leg is in monaural format and the audio processor is configured to split the monaural audio signal for binaural processing via the left signal path and the right signal path.
A method and system for transparent and automatic establishment of a personalized communication session across heterogeneous networks utilizes a network node for providing personalization services. Communication sessions initiated on any number of heterogeneous networks are transparently and automatically personalized for subscribers to personalization services offered by the network node by routing media in the communication session through the personalization node.1. A method for providing a personalized communication session between a caller and a callee comprising: (a) automatically establishing a first leg between the caller and a network node by routing a call from the caller to the callee to the network node; (b) at the network node: (i) determining session information associated with the call; (ii) generating at least one audio personalization parameter for the call based upon the session information; (iii) configuring an audio processor using the at least one audio personalization parameter; and (iv) establishing a second leg between the network node and the callee; (v) bridging the first leg and the second leg such that an audio signal associated with the call is routed through the audio processor. 2. The method of claim 1, wherein the session information comprises at least one of: i. an automatic number identification (ANI); ii. a session initiation protocol (SIP) identifier; iii. an equipment identifier; and iv. a communication device information relating to at least one of the caller and the caller. 3. The method of claim 1, wherein generating at least one audio personalization parameter further comprises: (a) generating at least one query from the session information; (b) submitting a query to a database, wherein the database returns the at least one personalization parameter based upon the query 4. The method of claim 3, wherein generating at least one query from the session information further comprises: (a) transforming the session information into a structured data representation, wherein the structured data representation provides a mapping from a session information value to a database field. 5. The method of claim 1, wherein the session information comprises both in-band session information and out-of band session information, such that the out-of band session information is transmitted over an out-of-band communication channel. 6. The method of claim 5, wherein the out-of-band communication channel comprises a communication channel distinct from a communication channel associated with the first leg. 7. The method of claim 1, wherein the network node is coupled to a first network and the caller is associated with a second network, such that the first and second networks utilize distinct signaling and media transport protocols. 8. The method of claim 8, wherein the first network is a packet-data network and the second network is the PSTN. 9. The method according to claim 8, wherein the first network is a packet-data network and the second network is a cellular network. 10. The method according to claim 1, wherein the audio processor provides a left signal path and a right signal path, the left and right signal paths respectively configured based upon a hearing profile for a left ear and a hearing profile for a right ear. 11. The method according to claim 10, wherein audio media provided on the first leg is in monaural format and the audio processor is configured to split the monaural audio signal for binaural processing via the left signal path and the right signal path.
2,400
6,955
6,955
15,079,954
2,482
According to one aspect of the teachings presented herein, a projective volume monitoring apparatus is configured to protect against the intrusion of crawling and walking persons into a monitoring zone. The apparatus acquires stereo images of a first monitoring zone that begins at a defined height above a floor and of a second monitoring zone that lies below the first monitoring zone and extends downward to a floor or other surface on which persons may walk or crawl, and processes the stereo images to obtain range pixels. The apparatus detects object intrusions within the first monitoring zone by processing the corresponding range pixels using first object detection parameters that are tuned for the detection of walking or running persons, and detects object intrusions within the second monitoring zone by processing the corresponding range pixels using second object detection parameters that are tuned for the detection of crawling or prone persons.
1. A method of protecting against the intrusion of crawling and walking persons into a monitoring zone comprising: acquiring stereo images of a first monitoring zone that begins at a defined height above a floor and of a second monitoring zone that lies below the first monitoring zone and extends downward to a floor or other surface on which persons may walk or crawl; processing the stereo images to obtain range pixels; detecting object intrusions within the first monitoring zone by processing those range pixels corresponding to the first monitoring zone using first object detection parameters that are tuned for the detection of walking or running persons; and detecting object intrusions within the second monitoring zone by processing those range pixels corresponding to the second monitoring zone using second object detection parameters that are tuned for the detection of crawling or prone persons. 2. The method of claim 1, wherein the first object detection parameters include a first minimum object size threshold that defines a minimum size for detectable objects within the first monitoring zone, and further include a first maximum object speed that defines a maximum speed for detectable objects within the first monitoring zone, and wherein the second object detection parameters include a second minimum object size threshold that is larger than the first minimum object size threshold, and further include a second maximum object speed that is lower than the first maximum object speed. 3. The method of claim 1, wherein the first monitoring zone begins about 420 mm above the floor or other surface, and wherein the second monitoring zone extends from 300 mm above the floor or other surface up to the beginning of the first monitoring zone, or up to the beginning of a defined protection zone. 4. The method of claim 2, wherein the first minimum object size threshold is at or about 200 mm in cross section, the second minimum object size threshold is more than 200 mm in cross section, the first maximum object speed is about 1.6 m/s, and the second maximum object speed is about 0.8 m/s.
According to one aspect of the teachings presented herein, a projective volume monitoring apparatus is configured to protect against the intrusion of crawling and walking persons into a monitoring zone. The apparatus acquires stereo images of a first monitoring zone that begins at a defined height above a floor and of a second monitoring zone that lies below the first monitoring zone and extends downward to a floor or other surface on which persons may walk or crawl, and processes the stereo images to obtain range pixels. The apparatus detects object intrusions within the first monitoring zone by processing the corresponding range pixels using first object detection parameters that are tuned for the detection of walking or running persons, and detects object intrusions within the second monitoring zone by processing the corresponding range pixels using second object detection parameters that are tuned for the detection of crawling or prone persons.1. A method of protecting against the intrusion of crawling and walking persons into a monitoring zone comprising: acquiring stereo images of a first monitoring zone that begins at a defined height above a floor and of a second monitoring zone that lies below the first monitoring zone and extends downward to a floor or other surface on which persons may walk or crawl; processing the stereo images to obtain range pixels; detecting object intrusions within the first monitoring zone by processing those range pixels corresponding to the first monitoring zone using first object detection parameters that are tuned for the detection of walking or running persons; and detecting object intrusions within the second monitoring zone by processing those range pixels corresponding to the second monitoring zone using second object detection parameters that are tuned for the detection of crawling or prone persons. 2. The method of claim 1, wherein the first object detection parameters include a first minimum object size threshold that defines a minimum size for detectable objects within the first monitoring zone, and further include a first maximum object speed that defines a maximum speed for detectable objects within the first monitoring zone, and wherein the second object detection parameters include a second minimum object size threshold that is larger than the first minimum object size threshold, and further include a second maximum object speed that is lower than the first maximum object speed. 3. The method of claim 1, wherein the first monitoring zone begins about 420 mm above the floor or other surface, and wherein the second monitoring zone extends from 300 mm above the floor or other surface up to the beginning of the first monitoring zone, or up to the beginning of a defined protection zone. 4. The method of claim 2, wherein the first minimum object size threshold is at or about 200 mm in cross section, the second minimum object size threshold is more than 200 mm in cross section, the first maximum object speed is about 1.6 m/s, and the second maximum object speed is about 0.8 m/s.
2,400
6,956
6,956
14,261,971
2,486
A system and method of monitoring events in a casino. The system combines chip monitoring, card monitoring and video monitoring to identify problems, both in real-time as well as for historical review. The system uses the card information to transition between various game states in order to determine whether the chip actions are allowed, and to generate alerts when the chip actions are not allowed. The system also uses the card information to identify winning and losing bets in order to verify that the collections and payouts of chips are correct.
1. A method of monitoring events in a casino environment, comprising the steps of: receiving, from a video camera, video data of a table game in the casino environment; receiving, from a radio-frequency identification chip monitor, casino chip data of the table game, wherein the casino chip data includes at least one casino chip location and at least one casino chip identifier; receiving, from a game result monitor, game result data of the table game, wherein the game result data includes at least one game result identifier; and displaying together the video data, the casino chip data and the game result data to enhance monitoring of the events at the table game. 2. The method of claim 1, wherein the casino chip data is received contemporaneously with the video data. 3. The method of claim 1, wherein the game result data is received contemporaneously with the video data. 4. The method of claim 1, further comprising: storing the video data, the casino chip data and the game result data having been received. 5. The method of claim 1, wherein the video data has a plurality of video data timestamps, wherein the casino chip data has a plurality of casino chip data timestamps, wherein the game result data has a plurality of game result data timestamps, wherein displaying together the video data, the casino chip data and the game result data comprises: displaying together the video data, the casino chip data and the game result data using the plurality of video data timestamps, the plurality of casino chip data timestamps, and the plurality of game result data timestamps. 6. The method of claim 1, wherein the video data has a plurality of video data timestamps, wherein the casino chip data has a plurality of casino chip data timestamps, wherein the game result data has a plurality of game result data timestamps, further comprising: receiving a user input that selects a timestamp; and displaying together the video data, the casino chip data and the game result data at the timestamp selected by the user input. 7. The method of claim 1, further comprising: accessing a chip database using the at least one casino chip identifier; receiving, from the chip database, at least one casino chip value that corresponds to the at least one casino chip identifier; and displaying the at least one casino chip value when displaying the casino chip data. 8. The method of claim 1, wherein the at least one casino chip location is a dealer tray, wherein the at least one casino chip identifier is at least one casino chip being located in the dealer tray, wherein displaying the casino chip data enhances monitoring of the at least one casino chip being located in the dealer tray. 9. The method of claim 1, wherein the radio-frequency identification chip monitor is a radio-frequency identification drop box, wherein the at least one casino chip location is a read area of the radio-frequency identification drop box, wherein the at least one casino chip identifier is at least one casino chip being located in the read area, wherein displaying the casino chip data enhances monitoring of the at least one casino chip being located in the read area. 10. The method of claim 1, further comprising: accessing a commission schedule, wherein the at least one casino chip location is a read area of the radio-frequency identification drop box, wherein the at least one casino chip identifier is at least one casino chip being located in the read area; computing a commission amount by applying the commission schedule to the at least one casino chip being located in the read area; and displaying the commission amount when displaying the video data, the casino chip data and the game result data. 11. The method of claim 1, further comprising: accessing rules of the table game; monitoring the casino chip data to identify when a violation of the rules of the table game has occurred; and generating an alert when the casino chip data indicates that the violation has occurred. 12. The method of claim 1, further comprising: accessing rules of the table game, wherein the rules are associated with a set of states; and changing from a first state of the set of states to a second state of the set of states according to the game result data. 13. The method of claim 1, further comprising: receiving customer identification data corresponding to a customer participating in the table game; correlating the customer identification data with the casino chip data; and displaying the customer identification data having been correlated to enhance evaluating the customer. 14. The method of claim 1, further comprising: receiving dealer identification data corresponding to a dealer operating the table game; correlating the dealer identification data with the casino chip data and the game result data; and displaying the dealer identification data having been correlated to enhance evaluating the dealer. 15. The method of claim 1, wherein the game result monitor is one of a card monitor, a roulette monitor and a dice monitor. 16. An apparatus for monitoring events in a casino environment, comprising: a video camera that generates video data of a table game in the casino environment; a radio-frequency identification chip monitor that generates casino chip data of the table game, wherein the casino chip data includes at least one casino chip location and at least one casino chip identifier; a game result monitor that generates game result data of the table game, wherein the game result data includes at least one game result identifier; and a computer system that receives and displays together the video data, the casino chip data and the game result data to enhance monitoring of the events at the table game. 17. A computer program stored on a non-transitory computer readable medium that controls a computer system to monitor events in a casino environment, comprising: a video component that receives video data of a table game in the casino environment; a chip monitor component that receives casino chip data of the table game, wherein the casino chip data includes at least one casino chip location and at least one casino chip identifier; a game result monitor component that receives game result data of the table game, wherein the game result data includes at least one game result identifier; and an output component that outputs together the video data, the casino chip data and the game result data to enhance monitoring of the events at the table game. 18. A method of monitoring events in a casino environment, comprising the steps of: receiving, from a radio-frequency identification chip monitor, casino chip data of the table game, wherein the casino chip data includes at least one casino chip location and at least one casino chip identifier; receiving, from a game result monitor, game result data of the table game, wherein the game result data includes at least one game result identifier; accessing rules of the table game according to the at least one game result identifier; monitoring the casino chip data to identify when a violation of the rules of the table game has occurred; and generating an alert when the casino chip data indicates that the violation has occurred.
A system and method of monitoring events in a casino. The system combines chip monitoring, card monitoring and video monitoring to identify problems, both in real-time as well as for historical review. The system uses the card information to transition between various game states in order to determine whether the chip actions are allowed, and to generate alerts when the chip actions are not allowed. The system also uses the card information to identify winning and losing bets in order to verify that the collections and payouts of chips are correct.1. A method of monitoring events in a casino environment, comprising the steps of: receiving, from a video camera, video data of a table game in the casino environment; receiving, from a radio-frequency identification chip monitor, casino chip data of the table game, wherein the casino chip data includes at least one casino chip location and at least one casino chip identifier; receiving, from a game result monitor, game result data of the table game, wherein the game result data includes at least one game result identifier; and displaying together the video data, the casino chip data and the game result data to enhance monitoring of the events at the table game. 2. The method of claim 1, wherein the casino chip data is received contemporaneously with the video data. 3. The method of claim 1, wherein the game result data is received contemporaneously with the video data. 4. The method of claim 1, further comprising: storing the video data, the casino chip data and the game result data having been received. 5. The method of claim 1, wherein the video data has a plurality of video data timestamps, wherein the casino chip data has a plurality of casino chip data timestamps, wherein the game result data has a plurality of game result data timestamps, wherein displaying together the video data, the casino chip data and the game result data comprises: displaying together the video data, the casino chip data and the game result data using the plurality of video data timestamps, the plurality of casino chip data timestamps, and the plurality of game result data timestamps. 6. The method of claim 1, wherein the video data has a plurality of video data timestamps, wherein the casino chip data has a plurality of casino chip data timestamps, wherein the game result data has a plurality of game result data timestamps, further comprising: receiving a user input that selects a timestamp; and displaying together the video data, the casino chip data and the game result data at the timestamp selected by the user input. 7. The method of claim 1, further comprising: accessing a chip database using the at least one casino chip identifier; receiving, from the chip database, at least one casino chip value that corresponds to the at least one casino chip identifier; and displaying the at least one casino chip value when displaying the casino chip data. 8. The method of claim 1, wherein the at least one casino chip location is a dealer tray, wherein the at least one casino chip identifier is at least one casino chip being located in the dealer tray, wherein displaying the casino chip data enhances monitoring of the at least one casino chip being located in the dealer tray. 9. The method of claim 1, wherein the radio-frequency identification chip monitor is a radio-frequency identification drop box, wherein the at least one casino chip location is a read area of the radio-frequency identification drop box, wherein the at least one casino chip identifier is at least one casino chip being located in the read area, wherein displaying the casino chip data enhances monitoring of the at least one casino chip being located in the read area. 10. The method of claim 1, further comprising: accessing a commission schedule, wherein the at least one casino chip location is a read area of the radio-frequency identification drop box, wherein the at least one casino chip identifier is at least one casino chip being located in the read area; computing a commission amount by applying the commission schedule to the at least one casino chip being located in the read area; and displaying the commission amount when displaying the video data, the casino chip data and the game result data. 11. The method of claim 1, further comprising: accessing rules of the table game; monitoring the casino chip data to identify when a violation of the rules of the table game has occurred; and generating an alert when the casino chip data indicates that the violation has occurred. 12. The method of claim 1, further comprising: accessing rules of the table game, wherein the rules are associated with a set of states; and changing from a first state of the set of states to a second state of the set of states according to the game result data. 13. The method of claim 1, further comprising: receiving customer identification data corresponding to a customer participating in the table game; correlating the customer identification data with the casino chip data; and displaying the customer identification data having been correlated to enhance evaluating the customer. 14. The method of claim 1, further comprising: receiving dealer identification data corresponding to a dealer operating the table game; correlating the dealer identification data with the casino chip data and the game result data; and displaying the dealer identification data having been correlated to enhance evaluating the dealer. 15. The method of claim 1, wherein the game result monitor is one of a card monitor, a roulette monitor and a dice monitor. 16. An apparatus for monitoring events in a casino environment, comprising: a video camera that generates video data of a table game in the casino environment; a radio-frequency identification chip monitor that generates casino chip data of the table game, wherein the casino chip data includes at least one casino chip location and at least one casino chip identifier; a game result monitor that generates game result data of the table game, wherein the game result data includes at least one game result identifier; and a computer system that receives and displays together the video data, the casino chip data and the game result data to enhance monitoring of the events at the table game. 17. A computer program stored on a non-transitory computer readable medium that controls a computer system to monitor events in a casino environment, comprising: a video component that receives video data of a table game in the casino environment; a chip monitor component that receives casino chip data of the table game, wherein the casino chip data includes at least one casino chip location and at least one casino chip identifier; a game result monitor component that receives game result data of the table game, wherein the game result data includes at least one game result identifier; and an output component that outputs together the video data, the casino chip data and the game result data to enhance monitoring of the events at the table game. 18. A method of monitoring events in a casino environment, comprising the steps of: receiving, from a radio-frequency identification chip monitor, casino chip data of the table game, wherein the casino chip data includes at least one casino chip location and at least one casino chip identifier; receiving, from a game result monitor, game result data of the table game, wherein the game result data includes at least one game result identifier; accessing rules of the table game according to the at least one game result identifier; monitoring the casino chip data to identify when a violation of the rules of the table game has occurred; and generating an alert when the casino chip data indicates that the violation has occurred.
2,400
6,957
6,957
14,751,356
2,445
A method, user equipment (UE) and application server for adding media stream of multimedia session. A UE1 establishes a multimedia session with a UE2, receives a media stream adding request directed at the multimedia session of the UE1; the media stream adding request includes an identity of a UE3 and the media type of the media flow requested to be added; the UE3 is controlled to establish a media stream of the media type with the UE2. Therefore, adding the media stream on the UE3 is realized, and the user may realize the multimedia session with the peer end through multiple UEs, thereby avoiding the inconvenience that the media stream can only be added to the two parties in the session and living up to the users' diversified requirements on the multimedia services.
1. A method for adding a media stream for a multimedia session, comprising: controlling, by an application server, a first user equipment (UE) to establish a multimedia session with a second UE; receiving, by the application server, a media stream adding request directed at the multimedia session sent by the first UE, wherein the media stream adding request comprises an identity of a third UE and a media type of a media stream requested to be added, wherein the first UE and the third UE both register using an identical public user identity; sending, by the application server, to the third UE a session Invite, wherein the session Invite includes, as an address of a calling party, the address of an identity of the second UE; and controlling, by the application server, the third UE and the second UE to perform a media information negotiation directed at the media type. 2. The method of claim 1, wherein, before the application server receives the media stream adding request directed at the multimedia session of the first UE, the method comprises: receiving, by the first UE, the media stream adding request, wherein the media stream adding request comprises the media type of the media stream to be added. 3. The method of claim 1, further comprising: transmitting, by the third UE and the second UE, the media stream of the media type when the media information negotiation succeeds. 4. The method of claim 1, wherein the media stream adding request directed at the multimedia session sent by the first UE is realized through a SIP message; wherein the SIP message comprises the media stream type and the identity of a third UE. 5. The method of claim 4, wherein the SIP message is a subscriber message. 6. The method of claim 4, wherein the SIP message is a notify message. 7. The method of claim 1, wherein a first UE Globally Routable User Agent (UA) URIs (GRUU) gr parameter and a third UE GRUU gr parameter are set to different values to differentiate the first UE and the third UE. 8. A first apparatus, comprising: a session establishing unit, configured to establish a multimedia session with a second apparatus under the control of an application server; and a media stream adding request sending unit, adapted configured to send a media stream adding request directed at the multimedia session to the application server, wherein the media stream adding request comprises an identity of a third apparatus and a media type of a media stream requested to be added, so that the application server according to the media stream adding request controls the third apparatus to establish the media stream of the media type with the second apparatus, wherein the first apparatus and the third apparatus both register using an identical public user identity, and wherein said control comprises: the application server sending to the third equipment a session Invite, wherein the session Invite includes, as an address of a calling party, an address of an identity of the second apparatus; and the application server controlling the third apparatus and the second apparatus to perform a media information negotiation directed at the media type. 9. The apparatus of claim 8, wherein the media stream adding request directed at the multimedia session is realized through a SIP message; wherein the SIP message comprises the media stream type and the identity of a third equipment. 10. The apparatus of claim 9, wherein the SIP message is a subscriber message. 11. The apparatus of claim 9, wherein the SIP message is a notify message. 12. The apparatus of claim 8, wherein a first apparatus Globally Routable User Agent (UA) URIs (GRUU) gr parameter and a third apparatus GRUU gr parameter are set to different values to differentiate the first apparatus and the third apparatus. 13. An application server, comprising: a session control unit configured to control a first user equipment (UE) to establish a multimedia session with a second UE; a receiving unit configured to receive a media stream adding request sent by the first UE that is directed at the multimedia session, wherein the media stream adding request comprises an identity of a third UE and a media type of a media stream requested to be added, wherein the first UE and the third UE both register using an identical public user identity; and a media stream adding control unit configured to control the third UE to establish the media stream of the media type with the second UE, wherein said control comprises: sending to the third UE a session Invite, wherein the session Invite sent to the third UE includes, as an address of a calling party, an address of an identity of the second UE; and controlling the third UE and the second UE to perform a media information negotiation directed at the media type, so that the third UE and the second UE transmit the media stream of the media type when the media information negotiation succeeds. 14. The application server of claim 13, wherein the media stream adding request directed at the multimedia session is realized through a SIP message; wherein the SIP message comprises the media stream type and the identity of the third UE. 15. The application server of claim 14, wherein the SIP message is a subscriber message. 16. The application server of claim 14, wherein the SIP message is a notify message. 17. The application server of claim 13, wherein a first UE Globally Routable User Agent (UA) URIs (GRUU) gr parameter and a third UE GRUU gr parameter are set to different values to differentiate the first UE and the third UE.
A method, user equipment (UE) and application server for adding media stream of multimedia session. A UE1 establishes a multimedia session with a UE2, receives a media stream adding request directed at the multimedia session of the UE1; the media stream adding request includes an identity of a UE3 and the media type of the media flow requested to be added; the UE3 is controlled to establish a media stream of the media type with the UE2. Therefore, adding the media stream on the UE3 is realized, and the user may realize the multimedia session with the peer end through multiple UEs, thereby avoiding the inconvenience that the media stream can only be added to the two parties in the session and living up to the users' diversified requirements on the multimedia services.1. A method for adding a media stream for a multimedia session, comprising: controlling, by an application server, a first user equipment (UE) to establish a multimedia session with a second UE; receiving, by the application server, a media stream adding request directed at the multimedia session sent by the first UE, wherein the media stream adding request comprises an identity of a third UE and a media type of a media stream requested to be added, wherein the first UE and the third UE both register using an identical public user identity; sending, by the application server, to the third UE a session Invite, wherein the session Invite includes, as an address of a calling party, the address of an identity of the second UE; and controlling, by the application server, the third UE and the second UE to perform a media information negotiation directed at the media type. 2. The method of claim 1, wherein, before the application server receives the media stream adding request directed at the multimedia session of the first UE, the method comprises: receiving, by the first UE, the media stream adding request, wherein the media stream adding request comprises the media type of the media stream to be added. 3. The method of claim 1, further comprising: transmitting, by the third UE and the second UE, the media stream of the media type when the media information negotiation succeeds. 4. The method of claim 1, wherein the media stream adding request directed at the multimedia session sent by the first UE is realized through a SIP message; wherein the SIP message comprises the media stream type and the identity of a third UE. 5. The method of claim 4, wherein the SIP message is a subscriber message. 6. The method of claim 4, wherein the SIP message is a notify message. 7. The method of claim 1, wherein a first UE Globally Routable User Agent (UA) URIs (GRUU) gr parameter and a third UE GRUU gr parameter are set to different values to differentiate the first UE and the third UE. 8. A first apparatus, comprising: a session establishing unit, configured to establish a multimedia session with a second apparatus under the control of an application server; and a media stream adding request sending unit, adapted configured to send a media stream adding request directed at the multimedia session to the application server, wherein the media stream adding request comprises an identity of a third apparatus and a media type of a media stream requested to be added, so that the application server according to the media stream adding request controls the third apparatus to establish the media stream of the media type with the second apparatus, wherein the first apparatus and the third apparatus both register using an identical public user identity, and wherein said control comprises: the application server sending to the third equipment a session Invite, wherein the session Invite includes, as an address of a calling party, an address of an identity of the second apparatus; and the application server controlling the third apparatus and the second apparatus to perform a media information negotiation directed at the media type. 9. The apparatus of claim 8, wherein the media stream adding request directed at the multimedia session is realized through a SIP message; wherein the SIP message comprises the media stream type and the identity of a third equipment. 10. The apparatus of claim 9, wherein the SIP message is a subscriber message. 11. The apparatus of claim 9, wherein the SIP message is a notify message. 12. The apparatus of claim 8, wherein a first apparatus Globally Routable User Agent (UA) URIs (GRUU) gr parameter and a third apparatus GRUU gr parameter are set to different values to differentiate the first apparatus and the third apparatus. 13. An application server, comprising: a session control unit configured to control a first user equipment (UE) to establish a multimedia session with a second UE; a receiving unit configured to receive a media stream adding request sent by the first UE that is directed at the multimedia session, wherein the media stream adding request comprises an identity of a third UE and a media type of a media stream requested to be added, wherein the first UE and the third UE both register using an identical public user identity; and a media stream adding control unit configured to control the third UE to establish the media stream of the media type with the second UE, wherein said control comprises: sending to the third UE a session Invite, wherein the session Invite sent to the third UE includes, as an address of a calling party, an address of an identity of the second UE; and controlling the third UE and the second UE to perform a media information negotiation directed at the media type, so that the third UE and the second UE transmit the media stream of the media type when the media information negotiation succeeds. 14. The application server of claim 13, wherein the media stream adding request directed at the multimedia session is realized through a SIP message; wherein the SIP message comprises the media stream type and the identity of the third UE. 15. The application server of claim 14, wherein the SIP message is a subscriber message. 16. The application server of claim 14, wherein the SIP message is a notify message. 17. The application server of claim 13, wherein a first UE Globally Routable User Agent (UA) URIs (GRUU) gr parameter and a third UE GRUU gr parameter are set to different values to differentiate the first UE and the third UE.
2,400
6,958
6,958
13,930,089
2,483
Methods of encoding and decoding video in a low-fidelity mode are described. A coding unit level low-fidelity flag is present in the bitstream to signal whether low-fidelity mode is enabled for a particular coding unit or not. If enabled, then, for that coding unit, the chroma quantization parameter is determined using the luma quantization parameter adjusted by a low-fidelity-mode offset. If not enabled, then, for that coding unit, the chroma quantization parameter is determined using the luma quantization parameter without adjustment by the low-fidelity-mode offset. The chroma quantization parameter is then used in the scaling of quantized chroma transform domain coefficients. Use with luma or other video components is also proposed.
1. A method of decoding video from a bitstream of encoded video using a video decoder, the video including a picture partitioned into coding units, the method comprising: for one of the coding units, reconstructing a low-fidelity flag associated with that coding unit and associated with a video component; if the low-fidelity flag is set, then determining a quantization parameter for the video component based upon a low-fidelity-mode offset; if the low-fidelity flag is not set, then determining the quantization parameter for the video component without using the low-fidelity-mode offset; and dequantizing decoded coefficients in the video component for the coding unit, based upon the quantization parameter, to produce dequantized coefficients. 2. The method claimed in claim 1, wherein the video component includes at least one of a luma component, a chroma component, an alpha component, a red component, a green component, and a blue component. 3. The method claimed in claim 1, wherein reconstructing the low-fidelity flag comprises decoding the low-fidelity flag from the bitstream. 4. The method claimed in claim 3, wherein decoding the low-fidelity flag comprises decoding the low-fidelity flag from a coding unit header associated with said one of the coding units. 5. The method claimed in claim 1, wherein the low-fidelity flag comprises a chroma-low-fidelity flag associated with a chroma component, and wherein, if the chroma-low-fidelity flag is set, determining the quantization parameter comprises determining a chroma quantization parameter by indexing a look-up table, based upon the sum of a luma quantization parameter, a predetermined chroma QP offset value, and the low-fidelity-mode offset. 6. The method claimed in claim 5, wherein the bitstream is encoded in a high-fidelity format, and wherein indexing a look-up table to determine the chroma quantization parameter comprises indexing a chroma-subsampled format look-up table of chroma quantization parameters. 7. The method claimed in claim 6, wherein the high-fidelity format is one of 4:4:4 and 4:2:2, and wherein the chroma-subsampled format is 4:2:0. 8. The method claimed in claim 1, wherein the bitstream is encoded in a high-fidelity format, and wherein: if the low-fidelity flag is set, then determining the quantization parameter includes indexing a low-fidelity format look-up table using a QP value and the low-fidelity-mode offset; and if the low-fidelity is not set, then determining the quantization parameter includes indexing a high-fidelity format look-up table using the QP value without the low-fidelity-mode offset. 9. The method claimed in claim 1, the method further comprising: if the low-fidelity flag is set, determining the minimum transform size used to decode a transform tree associated with the video component of that coding unit, based upon a low-fidelity-specific minimum; if the low-fidelity flag is not set, using a pre-determined minimum transform size for use in decoding a transform tree associated with that coding unit; and decoding, from the bitstream, a transform tree in the video component for the coding unit based upon the minimum transform size, to produce decoded coefficients. 10. The method claimed in claim 1, the method further comprising: if the low-fidelity flag is set, determining the number of intra prediction modes associated with the video component of that coding unit to be one; if the low-fidelity flag is not set, determining the number of intra prediction modes associated with the video component of that coding unit, based upon the partitioning of the coding unit; and decoding, from the bitstream, the determined number of intra prediction modes for the video component of that coding unit. 11. A decoder for decoding a bitstream of encoded video to dequantize coefficients in a video decoder, the decoder comprising: a processor; a memory; and a decoding application stored in memory and containing instructions for configuring the processor to perform the method claimed in claim 1. 12. A non-transitory processor-readable medium storing processor-executable instructions which, when executed, configure one or more processors to perform the method claimed in claim 1. 13. A method of encoding video to produce a bitstream of encoded video using a video encoder, the video including a picture partitioned into coding units, the method comprising: for one of the coding units, encoding a low-fidelity flag associated with that coding unit and associated with a video component, wherein the low-fidelity flag is set if the coding unit is to be encoded in low-fidelity mode and is not set if the coding unit is not to be encoded low-fidelity mode; if the coding unit is to be encoded in the low-fidelity mode, determining a quantization parameter for the video component based upon a low-fidelity-mode offset; if the coding unit is not to be encoded in the low-fidelity mode, then determining the quantization parameter for the video component without using the low-fidelity-mode offset; and quantizing transform coefficients in the video component for the coding unit, based upon the quantization parameter, to produce quantized coefficients. 14. The method claimed in claim 13, wherein the video component includes at least one of a luma component, a chroma component, an alpha component, a red component, a green component, and a blue component. 15. The method claimed in claim 14, wherein the low-fidelity flag comprises a chroma-low-fidelity flag associated with a chroma component, and wherein, if the coding unit is to be encoded in the low-fidelity mode, determining the quantization parameter comprises determining a chroma quantization parameter by indexing a look-up table, based upon the sum of a luma quantization parameter, a predetermined chroma QP offset value, and the low-fidelity-mode offset. 16. The method claimed in claim 15, wherein the bitstream is encoded in a high-fidelity format, and wherein indexing a look-up table to determine the chroma quantization parameter comprises indexing a low-fidelity format look-up table of chroma quantization parameters. 17. The method claimed in claim 13, the method further comprising: if the low-fidelity flag is set, determining the minimum transform size used to encode a transform tree associated with the video component of that coding unit, based upon a low-fidelity-specific minimum; if the low-fidelity flag is not set, using a pre-determined minimum transform size for use in encoding a transform tree associated with that coding unit; and encoding a transform tree in the video component for the coding unit based upon the minimum transform size. 18. The method claimed in claim 13, the method further comprising: if the low-fidelity flag is set, determining the number of intra prediction modes associated with the video component of that coding unit to be one; if the low-fidelity flag is not set, determining the number of intra prediction modes associated with the video component of that coding unit, based upon the partitioning of the coding unit; and encoding the determined number of intra prediction modes into the bitstream for the video component of that coding unit. 19. An encoder for encoding video, the video including a picture partitioned into coding units, the encoder comprising: a processor; a memory; and an encoding application stored in memory and containing instructions for configuring the processor to perform the method claimed in claim 13. 20. A non-transitory processor-readable medium storing processor-executable instructions which, when executed, configure one or more processors to perform the method claimed in claim 13.
Methods of encoding and decoding video in a low-fidelity mode are described. A coding unit level low-fidelity flag is present in the bitstream to signal whether low-fidelity mode is enabled for a particular coding unit or not. If enabled, then, for that coding unit, the chroma quantization parameter is determined using the luma quantization parameter adjusted by a low-fidelity-mode offset. If not enabled, then, for that coding unit, the chroma quantization parameter is determined using the luma quantization parameter without adjustment by the low-fidelity-mode offset. The chroma quantization parameter is then used in the scaling of quantized chroma transform domain coefficients. Use with luma or other video components is also proposed.1. A method of decoding video from a bitstream of encoded video using a video decoder, the video including a picture partitioned into coding units, the method comprising: for one of the coding units, reconstructing a low-fidelity flag associated with that coding unit and associated with a video component; if the low-fidelity flag is set, then determining a quantization parameter for the video component based upon a low-fidelity-mode offset; if the low-fidelity flag is not set, then determining the quantization parameter for the video component without using the low-fidelity-mode offset; and dequantizing decoded coefficients in the video component for the coding unit, based upon the quantization parameter, to produce dequantized coefficients. 2. The method claimed in claim 1, wherein the video component includes at least one of a luma component, a chroma component, an alpha component, a red component, a green component, and a blue component. 3. The method claimed in claim 1, wherein reconstructing the low-fidelity flag comprises decoding the low-fidelity flag from the bitstream. 4. The method claimed in claim 3, wherein decoding the low-fidelity flag comprises decoding the low-fidelity flag from a coding unit header associated with said one of the coding units. 5. The method claimed in claim 1, wherein the low-fidelity flag comprises a chroma-low-fidelity flag associated with a chroma component, and wherein, if the chroma-low-fidelity flag is set, determining the quantization parameter comprises determining a chroma quantization parameter by indexing a look-up table, based upon the sum of a luma quantization parameter, a predetermined chroma QP offset value, and the low-fidelity-mode offset. 6. The method claimed in claim 5, wherein the bitstream is encoded in a high-fidelity format, and wherein indexing a look-up table to determine the chroma quantization parameter comprises indexing a chroma-subsampled format look-up table of chroma quantization parameters. 7. The method claimed in claim 6, wherein the high-fidelity format is one of 4:4:4 and 4:2:2, and wherein the chroma-subsampled format is 4:2:0. 8. The method claimed in claim 1, wherein the bitstream is encoded in a high-fidelity format, and wherein: if the low-fidelity flag is set, then determining the quantization parameter includes indexing a low-fidelity format look-up table using a QP value and the low-fidelity-mode offset; and if the low-fidelity is not set, then determining the quantization parameter includes indexing a high-fidelity format look-up table using the QP value without the low-fidelity-mode offset. 9. The method claimed in claim 1, the method further comprising: if the low-fidelity flag is set, determining the minimum transform size used to decode a transform tree associated with the video component of that coding unit, based upon a low-fidelity-specific minimum; if the low-fidelity flag is not set, using a pre-determined minimum transform size for use in decoding a transform tree associated with that coding unit; and decoding, from the bitstream, a transform tree in the video component for the coding unit based upon the minimum transform size, to produce decoded coefficients. 10. The method claimed in claim 1, the method further comprising: if the low-fidelity flag is set, determining the number of intra prediction modes associated with the video component of that coding unit to be one; if the low-fidelity flag is not set, determining the number of intra prediction modes associated with the video component of that coding unit, based upon the partitioning of the coding unit; and decoding, from the bitstream, the determined number of intra prediction modes for the video component of that coding unit. 11. A decoder for decoding a bitstream of encoded video to dequantize coefficients in a video decoder, the decoder comprising: a processor; a memory; and a decoding application stored in memory and containing instructions for configuring the processor to perform the method claimed in claim 1. 12. A non-transitory processor-readable medium storing processor-executable instructions which, when executed, configure one or more processors to perform the method claimed in claim 1. 13. A method of encoding video to produce a bitstream of encoded video using a video encoder, the video including a picture partitioned into coding units, the method comprising: for one of the coding units, encoding a low-fidelity flag associated with that coding unit and associated with a video component, wherein the low-fidelity flag is set if the coding unit is to be encoded in low-fidelity mode and is not set if the coding unit is not to be encoded low-fidelity mode; if the coding unit is to be encoded in the low-fidelity mode, determining a quantization parameter for the video component based upon a low-fidelity-mode offset; if the coding unit is not to be encoded in the low-fidelity mode, then determining the quantization parameter for the video component without using the low-fidelity-mode offset; and quantizing transform coefficients in the video component for the coding unit, based upon the quantization parameter, to produce quantized coefficients. 14. The method claimed in claim 13, wherein the video component includes at least one of a luma component, a chroma component, an alpha component, a red component, a green component, and a blue component. 15. The method claimed in claim 14, wherein the low-fidelity flag comprises a chroma-low-fidelity flag associated with a chroma component, and wherein, if the coding unit is to be encoded in the low-fidelity mode, determining the quantization parameter comprises determining a chroma quantization parameter by indexing a look-up table, based upon the sum of a luma quantization parameter, a predetermined chroma QP offset value, and the low-fidelity-mode offset. 16. The method claimed in claim 15, wherein the bitstream is encoded in a high-fidelity format, and wherein indexing a look-up table to determine the chroma quantization parameter comprises indexing a low-fidelity format look-up table of chroma quantization parameters. 17. The method claimed in claim 13, the method further comprising: if the low-fidelity flag is set, determining the minimum transform size used to encode a transform tree associated with the video component of that coding unit, based upon a low-fidelity-specific minimum; if the low-fidelity flag is not set, using a pre-determined minimum transform size for use in encoding a transform tree associated with that coding unit; and encoding a transform tree in the video component for the coding unit based upon the minimum transform size. 18. The method claimed in claim 13, the method further comprising: if the low-fidelity flag is set, determining the number of intra prediction modes associated with the video component of that coding unit to be one; if the low-fidelity flag is not set, determining the number of intra prediction modes associated with the video component of that coding unit, based upon the partitioning of the coding unit; and encoding the determined number of intra prediction modes into the bitstream for the video component of that coding unit. 19. An encoder for encoding video, the video including a picture partitioned into coding units, the encoder comprising: a processor; a memory; and an encoding application stored in memory and containing instructions for configuring the processor to perform the method claimed in claim 13. 20. A non-transitory processor-readable medium storing processor-executable instructions which, when executed, configure one or more processors to perform the method claimed in claim 13.
2,400
6,959
6,959
14,321,691
2,486
A method for identifying contamination upon a lens of a stereoscopic camera is disclosed. The stereoscopic camera is arranged such that it has the same capturing area over time, and is provided with a first camera providing first images of said capturing area and a second camera providing second images of said capturing area. The first and second images are divided into at least one evaluation area correspondently located in respective image. A traffic surveillance system is also disclosed where contamination upon a lens of a stereoscopic camera is identified according to said method.
1. A method for identifying contamination upon a lens of a stereoscopic camera, wherein said stereoscopic camera is arranged such that a capturing area of said stereoscopic camera is predefined such that images from said stereoscopic camera have the same capturing area over time, is provided with a first camera adapted to cover said capturing area by providing first images of said capturing area, and is provided with a second camera adapted to cover said capturing area by providing second images of said capturing area, wherein said first images are divided into at least one evaluation area and said second images are divided into at least one evaluation area, wherein the respective evaluation area of said first and said second images are correspondently located in respective image, wherein said method comprises the steps of: forming historical image data for said evaluation areas, wherein said historical image data comprises an image parameter representing the respective evaluation area from a predetermined number of previously captured first and second images, comparing said historical image data for the evaluation area of said first image with historical image data for the evaluation area of said second image, and indicating that at least one lens of said stereoscopic camera is contaminated, if a deviation larger than a threshold value between the compared historical image data is identified. 2. The method according to claim 1, wherein the method further comprises the steps of: identifying a minimum value (Bmin1, Bmin2) and a maximum value (Bmax1, Bmax2) of said image parameter from said historical image data for each evaluation area, calculating a first difference value between said minimum and said maximum value (Bmin1, Bmin2; Bmax1, Bmax2) for each evaluation area, comparing said first difference value from the evaluation area of said first images with said first difference value from the evaluation area of said second images, and identifying the evaluation area of said first or second images associated with the lowest first difference value as obstructed by contamination on the lens. 3. The method according to claim 2, wherein when a new first and second image has been captured by said stereoscopic camera, the method further comprises the steps of: calculating an average value of said parameter of said historical image data for the respective evaluation areas of said first and second images, calculating a second difference value between said average values, and adding said second difference value to the parameter value from the evaluation area of a newly taken image in which the evaluation area is identified as obstructed. 4. The method according to claim 1, wherein said historical image data is represented by an average value of said parameter. 5. The method according to claim 1, wherein said historical image data is represented by a histogram of said parameter. 6. The method according to claim 5, wherein the histogram has a separate class for each possible value of said parameter, or the histogram has classes for bundles of values of said parameter. 7. The method according to claim 5, wherein a normal value (n0, nc) is defined as the most frequent image parameter value for the evaluation area of respective first and second images, wherein the method further comprises the step of: adjusting the histogram of the evaluation area identified as obstructed such, that its shape and position corresponds to the histogram of its corresponding evaluation area. 8. The method according to claim 1, wherein said parameter is selected among the following parameters; brightness, colour channel, contrast or any other image parameter. 9. The method according to claim 1, wherein said first and second images are divided into a plurality of correspondent evaluation areas. 10. The method according to claim 9, wherein each evaluation area is defined as an individual pixel in the respective first and second image. 11. The method according to claim 1, wherein the historical image data is collected from a predetermined number of previously captured images. 12. The method according to claim 1, wherein the historical image data is continuously updated. 13. The method according to claim 12, wherein the historical image data is updated at predetermined time intervals by replacing the image parameter value from the oldest previously captured image by the corresponding image parameter value from a newly captured image. 14. The method according to claim 1, wherein the method further comprises the step of generating a warning message when at least one lens of said stereoscopic camera is identified to have reached a predetermined level of contamination. 15. A traffic surveillance facility, comprising: a stereoscopic camera, wherein said stereoscopic camera is arranged such that a capturing area of said stereoscopic camera is predefined such that images from said stereoscopic camera have the same capturing area over time, is provided with a first camera adapted to cover said capturing area by providing first images of said capturing area, and is provided with a second camera adapted to cover said capturing area by providing second images of said capturing area, wherein said first images are divided into at least one evaluation area and said second images are divided into at least one evaluation area, wherein the respective evaluation area of said first and said second images are correspondently located in respective image; and an electronic control unit provided to: control said stereoscopic camera; and perform an identification of contamination upon a lens of the stereoscopic camera, the electronic control unit configured to: form historical image data for said evaluation areas, wherein said historical image data comprises an image parameter representing the respective evaluation area from a predetermined number of previously captured first and second images, compare said historical image data for the evaluation area of said first image with historical image data for the evaluation area of said second image, and indicate that at least one lens of said stereoscopic camera is contaminated, if a deviation larger than a threshold value between the compared historical image data is identified.
A method for identifying contamination upon a lens of a stereoscopic camera is disclosed. The stereoscopic camera is arranged such that it has the same capturing area over time, and is provided with a first camera providing first images of said capturing area and a second camera providing second images of said capturing area. The first and second images are divided into at least one evaluation area correspondently located in respective image. A traffic surveillance system is also disclosed where contamination upon a lens of a stereoscopic camera is identified according to said method.1. A method for identifying contamination upon a lens of a stereoscopic camera, wherein said stereoscopic camera is arranged such that a capturing area of said stereoscopic camera is predefined such that images from said stereoscopic camera have the same capturing area over time, is provided with a first camera adapted to cover said capturing area by providing first images of said capturing area, and is provided with a second camera adapted to cover said capturing area by providing second images of said capturing area, wherein said first images are divided into at least one evaluation area and said second images are divided into at least one evaluation area, wherein the respective evaluation area of said first and said second images are correspondently located in respective image, wherein said method comprises the steps of: forming historical image data for said evaluation areas, wherein said historical image data comprises an image parameter representing the respective evaluation area from a predetermined number of previously captured first and second images, comparing said historical image data for the evaluation area of said first image with historical image data for the evaluation area of said second image, and indicating that at least one lens of said stereoscopic camera is contaminated, if a deviation larger than a threshold value between the compared historical image data is identified. 2. The method according to claim 1, wherein the method further comprises the steps of: identifying a minimum value (Bmin1, Bmin2) and a maximum value (Bmax1, Bmax2) of said image parameter from said historical image data for each evaluation area, calculating a first difference value between said minimum and said maximum value (Bmin1, Bmin2; Bmax1, Bmax2) for each evaluation area, comparing said first difference value from the evaluation area of said first images with said first difference value from the evaluation area of said second images, and identifying the evaluation area of said first or second images associated with the lowest first difference value as obstructed by contamination on the lens. 3. The method according to claim 2, wherein when a new first and second image has been captured by said stereoscopic camera, the method further comprises the steps of: calculating an average value of said parameter of said historical image data for the respective evaluation areas of said first and second images, calculating a second difference value between said average values, and adding said second difference value to the parameter value from the evaluation area of a newly taken image in which the evaluation area is identified as obstructed. 4. The method according to claim 1, wherein said historical image data is represented by an average value of said parameter. 5. The method according to claim 1, wherein said historical image data is represented by a histogram of said parameter. 6. The method according to claim 5, wherein the histogram has a separate class for each possible value of said parameter, or the histogram has classes for bundles of values of said parameter. 7. The method according to claim 5, wherein a normal value (n0, nc) is defined as the most frequent image parameter value for the evaluation area of respective first and second images, wherein the method further comprises the step of: adjusting the histogram of the evaluation area identified as obstructed such, that its shape and position corresponds to the histogram of its corresponding evaluation area. 8. The method according to claim 1, wherein said parameter is selected among the following parameters; brightness, colour channel, contrast or any other image parameter. 9. The method according to claim 1, wherein said first and second images are divided into a plurality of correspondent evaluation areas. 10. The method according to claim 9, wherein each evaluation area is defined as an individual pixel in the respective first and second image. 11. The method according to claim 1, wherein the historical image data is collected from a predetermined number of previously captured images. 12. The method according to claim 1, wherein the historical image data is continuously updated. 13. The method according to claim 12, wherein the historical image data is updated at predetermined time intervals by replacing the image parameter value from the oldest previously captured image by the corresponding image parameter value from a newly captured image. 14. The method according to claim 1, wherein the method further comprises the step of generating a warning message when at least one lens of said stereoscopic camera is identified to have reached a predetermined level of contamination. 15. A traffic surveillance facility, comprising: a stereoscopic camera, wherein said stereoscopic camera is arranged such that a capturing area of said stereoscopic camera is predefined such that images from said stereoscopic camera have the same capturing area over time, is provided with a first camera adapted to cover said capturing area by providing first images of said capturing area, and is provided with a second camera adapted to cover said capturing area by providing second images of said capturing area, wherein said first images are divided into at least one evaluation area and said second images are divided into at least one evaluation area, wherein the respective evaluation area of said first and said second images are correspondently located in respective image; and an electronic control unit provided to: control said stereoscopic camera; and perform an identification of contamination upon a lens of the stereoscopic camera, the electronic control unit configured to: form historical image data for said evaluation areas, wherein said historical image data comprises an image parameter representing the respective evaluation area from a predetermined number of previously captured first and second images, compare said historical image data for the evaluation area of said first image with historical image data for the evaluation area of said second image, and indicate that at least one lens of said stereoscopic camera is contaminated, if a deviation larger than a threshold value between the compared historical image data is identified.
2,400
6,960
6,960
14,883,006
2,466
Aspects of the subject disclosure may include, for example, a communication device that includes a communication interface that facilitates a call from a user of the communication device to a communication device of a called party via a network, the call including voice communications of the user. An imaging sensor captures video of the user. A processor compares the video of the user to the voice communications to determine if the video of the user is consistent with the voice communications. The video of the user is analyzed to determine if an identity of the user is authenticated. An indication of user authentication is generated, responsive to determining the identity of the user is authenticated and to determining the video of the user coincides with the voice communications. The indication of the user authentication is sent to the called party in association with the call. Other embodiments are disclosed.
1. A communication device comprising: a communication interface configured to facilitate a call from a user of the communication device to a remote device of a called party via a network, the call including voice communications of a user; at least one imaging sensor configured to capture video of the user; a memory that stores instructions; and a processor coupled to the memory, wherein responsive to executing the instructions, the processor is configured to perform user authentication operations comprising: comparing the video of the user to the voice communications to determine if the video of the user is consistent with the voice communications; analyzing the video of the user to determine if an identity of the user is authenticated; and generating an indication of user authentication, responsive to determining the identity of the user is authenticated and to determining the video of the user coincides with the voice communications; wherein the communication interface is further configured to send the indication of the user authentication to the called party in association with the call. 2. The communication device of claim 1 wherein analyzing the video of the user to determine if the identity of the user is authenticated includes: receiving certified image data corresponding to the user via the network; comparing the certified image data to the video of the user; and authenticating the user if the video of the user compares favorably to the certified image data. 3. The communication device of claim 1 wherein comparing the video of the user to the voice communications to determine if the video of the user is consistent with the voice communications includes: identifying facial expressions of the user in the video; comparing the facial expressions of the user to words spoken by the user during the voice communication; and determining if the facial expressions of the user are consistent with the words spoken by the user during the voice communications. 4. The communication device of claim 3 wherein identifying facial expressions of the user in the video includes identifying at least one of: movements of a mouth of the user or movements of lips of the user. 5. The communication device of claim 4 wherein determining if the facial expressions of the user are consistent with the words spoken by the user during the voice communications includes determining if at least one of: movements of the mouth of the user synchronize with the words spoken by the user, or movements of lips of the user synchronize with the words spoken by the user. 6. The communication device of claim 1 wherein the communication interface is further configured to receive an authentication request from the called party via the network, and wherein the processor performs the user authentication operations further responsive to receiving the authentication request. 7. The communication device of claim 6 wherein analyzing the video of the user to determine if the identity of the user is authenticated includes: receiving image data corresponding to the user from the called party; comparing the image data to the video of the user; and authenticating the user if the video of the user compares favorably to the image data. 8. The communication device of claim 1 wherein the communication interface is further configured to send an authentication request to the called party, and receive a response to the authentication request via the network. 9. The communication device of claim 1 wherein the processor is further configured to perform user authentication operations comprising: analyzing the voice communication of the user to further determine if the voice of the user is authenticated; wherein generating the indication of user authentication is further responsive to determining the voice of the user is authenticated. 10. The communication device of claim 1 wherein the call is a voice call that does not include video communications between the user and the called party. 11. A method comprising: placing a voice call to a communication device of a called party via a network, the call including voice communications of a caller; capturing video of the caller via at least one imaging sensor; performing, via a processor that executes instructions stored in a memory, caller authentication operations comprising: comparing the video of the caller to the voice communications to determine if the video of the caller is consistent with the voice communications; analyzing the video of the caller to determine if an identity of the caller is authenticated; and generating an indication of caller authentication, responsive to determining the identity of the caller is authenticated and to determining the video of the caller coincides with the voice communications; and sending the indication of the caller authentication to the called party in association with the voice call. 12. The method of claim 11 wherein analyzing the video of the caller to determine if the identity of the caller is authenticated includes: receiving certified image data corresponding to the caller via the network; comparing the certified image data to the video of the caller; and authenticating the caller if the video of the caller compares favorably to the certified image data. 13. The method of claim 11 wherein comparing the video of the caller to the voice communications to determine if the video of the caller is consistent with the voice communications includes: identifying facial expressions of the caller in the video; comparing the facial expressions of the caller to words spoken by the caller during the voice communication; and determining if the facial expressions of the caller are consistent with the words spoken by the caller during the voice communications. 14. The method of claim 13 wherein identifying facial expressions of the caller in the video includes identifying at least one of: movements of a mouth of the caller or movements of lips of the caller. 15. The method of claim 14 wherein determining if the facial expressions of the caller are consistent with the words spoken by the caller during the voice communications includes determining if at least one of: movements of the mouth of the caller synchronize with the words spoken by the caller, or movements of lips of the caller synchronize with the words spoken by the caller. 16. The method of claim 11 wherein the method further comprises: receiving an authentication request from the called party via the network, and wherein the processor performs the caller authentication operations further responsive to receiving the authentication request. 17. The method of claim 16 wherein analyzing the video of the caller to determine if the identity of the caller is authenticated includes: receiving image data corresponding to the caller from the called party; comparing the image data to the video of the caller; and authenticating the caller if the video of the caller compares favorably to the image data. 18. The method of claim 11 wherein the method further comprises: sending an authentication request to the called party; and receiving a response to the authentication request via the network. 19. The method of claim 11 wherein the processor is further configured to perform caller authentication operations comprising: analyzing the voice communication of the caller to further determine if the voice of the caller is authenticated; wherein generating the indication of caller authentication is further responsive to determining the voice of the caller is authenticated. 20. An article of manufacture that includes a tangible storage medium that stores operational instructions, that when executed by a processor, causes the processor to: compare video of a caller captured in association with a voice call from the caller to a called party, to voice communications of the caller associated with the call to determine if the video of the caller is consistent with the voice communications; analyzing the video of the caller to determine if an identity of the caller is authenticated; and generating an indication of caller authentication, responsive to determining the identity of the caller is authenticated and to determining the video of the caller coincides with the voice communications; and wherein the indication of the caller authentication is sent to the called party in association with the voice call.
Aspects of the subject disclosure may include, for example, a communication device that includes a communication interface that facilitates a call from a user of the communication device to a communication device of a called party via a network, the call including voice communications of the user. An imaging sensor captures video of the user. A processor compares the video of the user to the voice communications to determine if the video of the user is consistent with the voice communications. The video of the user is analyzed to determine if an identity of the user is authenticated. An indication of user authentication is generated, responsive to determining the identity of the user is authenticated and to determining the video of the user coincides with the voice communications. The indication of the user authentication is sent to the called party in association with the call. Other embodiments are disclosed.1. A communication device comprising: a communication interface configured to facilitate a call from a user of the communication device to a remote device of a called party via a network, the call including voice communications of a user; at least one imaging sensor configured to capture video of the user; a memory that stores instructions; and a processor coupled to the memory, wherein responsive to executing the instructions, the processor is configured to perform user authentication operations comprising: comparing the video of the user to the voice communications to determine if the video of the user is consistent with the voice communications; analyzing the video of the user to determine if an identity of the user is authenticated; and generating an indication of user authentication, responsive to determining the identity of the user is authenticated and to determining the video of the user coincides with the voice communications; wherein the communication interface is further configured to send the indication of the user authentication to the called party in association with the call. 2. The communication device of claim 1 wherein analyzing the video of the user to determine if the identity of the user is authenticated includes: receiving certified image data corresponding to the user via the network; comparing the certified image data to the video of the user; and authenticating the user if the video of the user compares favorably to the certified image data. 3. The communication device of claim 1 wherein comparing the video of the user to the voice communications to determine if the video of the user is consistent with the voice communications includes: identifying facial expressions of the user in the video; comparing the facial expressions of the user to words spoken by the user during the voice communication; and determining if the facial expressions of the user are consistent with the words spoken by the user during the voice communications. 4. The communication device of claim 3 wherein identifying facial expressions of the user in the video includes identifying at least one of: movements of a mouth of the user or movements of lips of the user. 5. The communication device of claim 4 wherein determining if the facial expressions of the user are consistent with the words spoken by the user during the voice communications includes determining if at least one of: movements of the mouth of the user synchronize with the words spoken by the user, or movements of lips of the user synchronize with the words spoken by the user. 6. The communication device of claim 1 wherein the communication interface is further configured to receive an authentication request from the called party via the network, and wherein the processor performs the user authentication operations further responsive to receiving the authentication request. 7. The communication device of claim 6 wherein analyzing the video of the user to determine if the identity of the user is authenticated includes: receiving image data corresponding to the user from the called party; comparing the image data to the video of the user; and authenticating the user if the video of the user compares favorably to the image data. 8. The communication device of claim 1 wherein the communication interface is further configured to send an authentication request to the called party, and receive a response to the authentication request via the network. 9. The communication device of claim 1 wherein the processor is further configured to perform user authentication operations comprising: analyzing the voice communication of the user to further determine if the voice of the user is authenticated; wherein generating the indication of user authentication is further responsive to determining the voice of the user is authenticated. 10. The communication device of claim 1 wherein the call is a voice call that does not include video communications between the user and the called party. 11. A method comprising: placing a voice call to a communication device of a called party via a network, the call including voice communications of a caller; capturing video of the caller via at least one imaging sensor; performing, via a processor that executes instructions stored in a memory, caller authentication operations comprising: comparing the video of the caller to the voice communications to determine if the video of the caller is consistent with the voice communications; analyzing the video of the caller to determine if an identity of the caller is authenticated; and generating an indication of caller authentication, responsive to determining the identity of the caller is authenticated and to determining the video of the caller coincides with the voice communications; and sending the indication of the caller authentication to the called party in association with the voice call. 12. The method of claim 11 wherein analyzing the video of the caller to determine if the identity of the caller is authenticated includes: receiving certified image data corresponding to the caller via the network; comparing the certified image data to the video of the caller; and authenticating the caller if the video of the caller compares favorably to the certified image data. 13. The method of claim 11 wherein comparing the video of the caller to the voice communications to determine if the video of the caller is consistent with the voice communications includes: identifying facial expressions of the caller in the video; comparing the facial expressions of the caller to words spoken by the caller during the voice communication; and determining if the facial expressions of the caller are consistent with the words spoken by the caller during the voice communications. 14. The method of claim 13 wherein identifying facial expressions of the caller in the video includes identifying at least one of: movements of a mouth of the caller or movements of lips of the caller. 15. The method of claim 14 wherein determining if the facial expressions of the caller are consistent with the words spoken by the caller during the voice communications includes determining if at least one of: movements of the mouth of the caller synchronize with the words spoken by the caller, or movements of lips of the caller synchronize with the words spoken by the caller. 16. The method of claim 11 wherein the method further comprises: receiving an authentication request from the called party via the network, and wherein the processor performs the caller authentication operations further responsive to receiving the authentication request. 17. The method of claim 16 wherein analyzing the video of the caller to determine if the identity of the caller is authenticated includes: receiving image data corresponding to the caller from the called party; comparing the image data to the video of the caller; and authenticating the caller if the video of the caller compares favorably to the image data. 18. The method of claim 11 wherein the method further comprises: sending an authentication request to the called party; and receiving a response to the authentication request via the network. 19. The method of claim 11 wherein the processor is further configured to perform caller authentication operations comprising: analyzing the voice communication of the caller to further determine if the voice of the caller is authenticated; wherein generating the indication of caller authentication is further responsive to determining the voice of the caller is authenticated. 20. An article of manufacture that includes a tangible storage medium that stores operational instructions, that when executed by a processor, causes the processor to: compare video of a caller captured in association with a voice call from the caller to a called party, to voice communications of the caller associated with the call to determine if the video of the caller is consistent with the voice communications; analyzing the video of the caller to determine if an identity of the caller is authenticated; and generating an indication of caller authentication, responsive to determining the identity of the caller is authenticated and to determining the video of the caller coincides with the voice communications; and wherein the indication of the caller authentication is sent to the called party in association with the voice call.
2,400
6,961
6,961
13,899,849
2,442
One embodiment of the present invention provides a computing system. The computing system includes a processor and a computer-readable storage medium for storing instructions. Based on the instructions, the processor operates the computing system as an overlay gateway. The computing system initiates and terminates an overlay tunnel associated with a virtual machine. During operation, the computing system maps a virtual Internet Protocol (IP) address of the virtual machine to a second IP address used to terminate the overlay tunnel based on information received from a configuration system. The computing system then determines an output port for a data packet based on the second IP address. The data packet comprises an inner packet and the destination address of this inner packet corresponds to the virtual IP address.
1. A computing system, comprising: a processor; a computer-readable storage medium storing instructions which when executed by the processor causes the processor to perform a method, the method comprising: initiating or terminating an overlay tunnel associated with a virtual machine; mapping a virtual Internet Protocol (IP) address of the virtual machine to a second IP address used to terminate the overlay tunnel based on information received from a configuration system; and determining an output port for a data packet comprising an inner packet based on the second IP address, wherein the destination address of the inner packet corresponds to the virtual IP address. 2. The computing system of claim 1, wherein the mapping is further based on a virtual media access control (MAC) address corresponding to the virtual IP address. 3. The computing system of claim 1, wherein the method further comprises updating the mapping which maps the virtual IP address of the virtual machine to a third IP address used to determine the output port for the data packet. 4. The computing system of claim 1, wherein the configuration system is one or more of: a virtualization controller which allocates the virtual machine to a hypervisor in a host machine and assigns the virtual IP addresses to the virtual machine; a network manager which notifies the hypervisor regarding networking information; and a shim device which obtains networking information from the network manager. 5. The computing system of claim 4, further comprising a shim control plane layer operable to recognize a plurality of virtualization controllers, wherein a respective virtualization controller corresponds to a different virtualization mechanism. 6. The computing system of claim 1, further comprising a shim data plane layer operable to recognize a plurality of overlay tunneling mechanisms. 7. The computing system of claim 6, wherein a tunneling mechanism is associated with one or more of: a Virtual Extensible Local Area Network (VXLAN); a Generic Routing Encapsulation (GRE) protocol; a Network Virtualization using GRE (NVGRE) protocol; and an openvSwitch GRE protocol. 8. The computing system of claim 1, wherein the method further comprises identifying in a data packet a logical IP address associated with the computing system and a remote computing system, wherein the data packet is associated with the overlay tunnel. 9. The computing system of claim 8, wherein the method further comprises: determining an active status of the computing system in conjunction with the remote computing system; and precluding the computing system from processing a packet associated with the logical IP address in response to detecting the computing system not being active. 10. The computing system of claim 9, wherein the method further comprises: detecting a failure of the remote computing system; and processing a packet associated with the logical IP address in response to detecting the failure. 11. The computing system of claim 8, wherein the method further comprises: identifying a tunnel termination IP address associated with the computing system and a remote computing system, wherein the data packet is associated with the overlay tunnel; and wherein the tunnel termination IP address belongs to a subnet different from a subnet to which the logical IP address belongs. 12. A method, comprising: initiating or terminating, by a computing system, an overlay tunnel associated with a virtual machine; mapping a virtual Internet Protocol (IP) address of the virtual machine to a second IP address used to terminate the overlay tunnel based on information received from a configuration system; and determining an output port for a data packet comprising an inner packet based on the second IP address, wherein the destination address of the inner packet corresponds to the virtual IP address. 13. The method of claim 12, wherein the mapping is further based on a virtual media access control (MAC) address corresponding to the virtual IP address. 14. The method of claim 12, further comprising updating the mapping which maps the virtual IP address of the virtual machine to a third IP address used to determine the output port for the data packet. 15. The method of claim 12, wherein the configuration system is one or more of: a virtualization controller which allocates the virtual machine to a hypervisor in a host machine and assigns the virtual IP addresses to the virtual machine; a network manager which notifies the hypervisor regarding networking information; and a shim device which obtains networking information from the network manager. 16. The method of claim 15, further comprising recognizing a plurality of virtualization controllers, wherein a respective virtualization controller corresponds to a different virtualization mechanism. 17. The method of claim 12, further comprising recognizing a plurality of overlay tunneling mechanisms. 18. The method of claim 17, wherein a tunneling mechanism is associated with one or more of: a Virtual Extensible Local Area Network (VXLAN); a Generic Routing Encapsulation (GRE) protocol; a Network Virtualization using GRE (NVGRE) protocol; and an openvSwitch GRE protocol. 19. The method of claim 12, further comprising identifying in a data packet a logical IP address associated with the computing system and a remote computing system, wherein the data packet is associated with the overlay tunnel. 20. The method claim 19, further comprising: determining an active status of the computing system in conjunction with the remote computing system; and precluding the computing system from processing a packet associated with the logical IP address in response to detecting the computing system not being active. 21. The method of claim 20, further comprising: detecting a failure of the remote computing system; and processing a packet associated with the logical IP address in response to detecting the failure. 22. The method of claim 19, further comprising: identifying a tunnel termination IP address associated with the computing system and a remote computing system, wherein the data packet is associated with the overlay tunnel; and wherein the tunnel termination IP address belongs to a subnet different from a subnet to which the logical IP address belongs. 23. A computing means, comprising: a tunneling means for initiating or terminating an overlay tunnel associated with a virtual machine; a mapping means for mapping a virtual Internet Protocol (IP) address of the virtual machine to a second IP address used to terminate the overlay tunnel based on information received from a configuration system; and a forwarding means for determining an output port for a data packet comprising an inner packet based on the second IP address, wherein the destination address of the inner packet corresponds to the virtual IP address.
One embodiment of the present invention provides a computing system. The computing system includes a processor and a computer-readable storage medium for storing instructions. Based on the instructions, the processor operates the computing system as an overlay gateway. The computing system initiates and terminates an overlay tunnel associated with a virtual machine. During operation, the computing system maps a virtual Internet Protocol (IP) address of the virtual machine to a second IP address used to terminate the overlay tunnel based on information received from a configuration system. The computing system then determines an output port for a data packet based on the second IP address. The data packet comprises an inner packet and the destination address of this inner packet corresponds to the virtual IP address.1. A computing system, comprising: a processor; a computer-readable storage medium storing instructions which when executed by the processor causes the processor to perform a method, the method comprising: initiating or terminating an overlay tunnel associated with a virtual machine; mapping a virtual Internet Protocol (IP) address of the virtual machine to a second IP address used to terminate the overlay tunnel based on information received from a configuration system; and determining an output port for a data packet comprising an inner packet based on the second IP address, wherein the destination address of the inner packet corresponds to the virtual IP address. 2. The computing system of claim 1, wherein the mapping is further based on a virtual media access control (MAC) address corresponding to the virtual IP address. 3. The computing system of claim 1, wherein the method further comprises updating the mapping which maps the virtual IP address of the virtual machine to a third IP address used to determine the output port for the data packet. 4. The computing system of claim 1, wherein the configuration system is one or more of: a virtualization controller which allocates the virtual machine to a hypervisor in a host machine and assigns the virtual IP addresses to the virtual machine; a network manager which notifies the hypervisor regarding networking information; and a shim device which obtains networking information from the network manager. 5. The computing system of claim 4, further comprising a shim control plane layer operable to recognize a plurality of virtualization controllers, wherein a respective virtualization controller corresponds to a different virtualization mechanism. 6. The computing system of claim 1, further comprising a shim data plane layer operable to recognize a plurality of overlay tunneling mechanisms. 7. The computing system of claim 6, wherein a tunneling mechanism is associated with one or more of: a Virtual Extensible Local Area Network (VXLAN); a Generic Routing Encapsulation (GRE) protocol; a Network Virtualization using GRE (NVGRE) protocol; and an openvSwitch GRE protocol. 8. The computing system of claim 1, wherein the method further comprises identifying in a data packet a logical IP address associated with the computing system and a remote computing system, wherein the data packet is associated with the overlay tunnel. 9. The computing system of claim 8, wherein the method further comprises: determining an active status of the computing system in conjunction with the remote computing system; and precluding the computing system from processing a packet associated with the logical IP address in response to detecting the computing system not being active. 10. The computing system of claim 9, wherein the method further comprises: detecting a failure of the remote computing system; and processing a packet associated with the logical IP address in response to detecting the failure. 11. The computing system of claim 8, wherein the method further comprises: identifying a tunnel termination IP address associated with the computing system and a remote computing system, wherein the data packet is associated with the overlay tunnel; and wherein the tunnel termination IP address belongs to a subnet different from a subnet to which the logical IP address belongs. 12. A method, comprising: initiating or terminating, by a computing system, an overlay tunnel associated with a virtual machine; mapping a virtual Internet Protocol (IP) address of the virtual machine to a second IP address used to terminate the overlay tunnel based on information received from a configuration system; and determining an output port for a data packet comprising an inner packet based on the second IP address, wherein the destination address of the inner packet corresponds to the virtual IP address. 13. The method of claim 12, wherein the mapping is further based on a virtual media access control (MAC) address corresponding to the virtual IP address. 14. The method of claim 12, further comprising updating the mapping which maps the virtual IP address of the virtual machine to a third IP address used to determine the output port for the data packet. 15. The method of claim 12, wherein the configuration system is one or more of: a virtualization controller which allocates the virtual machine to a hypervisor in a host machine and assigns the virtual IP addresses to the virtual machine; a network manager which notifies the hypervisor regarding networking information; and a shim device which obtains networking information from the network manager. 16. The method of claim 15, further comprising recognizing a plurality of virtualization controllers, wherein a respective virtualization controller corresponds to a different virtualization mechanism. 17. The method of claim 12, further comprising recognizing a plurality of overlay tunneling mechanisms. 18. The method of claim 17, wherein a tunneling mechanism is associated with one or more of: a Virtual Extensible Local Area Network (VXLAN); a Generic Routing Encapsulation (GRE) protocol; a Network Virtualization using GRE (NVGRE) protocol; and an openvSwitch GRE protocol. 19. The method of claim 12, further comprising identifying in a data packet a logical IP address associated with the computing system and a remote computing system, wherein the data packet is associated with the overlay tunnel. 20. The method claim 19, further comprising: determining an active status of the computing system in conjunction with the remote computing system; and precluding the computing system from processing a packet associated with the logical IP address in response to detecting the computing system not being active. 21. The method of claim 20, further comprising: detecting a failure of the remote computing system; and processing a packet associated with the logical IP address in response to detecting the failure. 22. The method of claim 19, further comprising: identifying a tunnel termination IP address associated with the computing system and a remote computing system, wherein the data packet is associated with the overlay tunnel; and wherein the tunnel termination IP address belongs to a subnet different from a subnet to which the logical IP address belongs. 23. A computing means, comprising: a tunneling means for initiating or terminating an overlay tunnel associated with a virtual machine; a mapping means for mapping a virtual Internet Protocol (IP) address of the virtual machine to a second IP address used to terminate the overlay tunnel based on information received from a configuration system; and a forwarding means for determining an output port for a data packet comprising an inner packet based on the second IP address, wherein the destination address of the inner packet corresponds to the virtual IP address.
2,400
6,962
6,962
13,468,028
2,465
A mobile phone that is delivered by an original equipment manufacturer in an unbranded state. The mobile phone comprises a near-field-communication radio transceiver, a memory, a processor, and an application stored in the memory. When executed by the processor, the application reads brand information, using the near-field-communication radio transceiver, from a radio frequency identity (RFID) tag coupled to the mobile phone during an order fulfillment process in a distribution center of a communication service provider and, based on the brand information, loads brand firmware into the memory, whereby the mobile phone presents a branded look and feel.
1. A mobile phone that is delivered by an original equipment manufacturer (OEM) in an unbranded state, comprising: a near-field-communication (NFC) radio transceiver; a memory; a processor; and an application stored in the memory that, when executed by the processor, reads brand information, using the near-field-communication radio transceiver, from a radio frequency identity (RFID) tag coupled to the mobile phone during an order fulfillment process in a distribution center of a communication service provider and based on the brand information, loads brand firmware into the memory, whereby the mobile phone presents a branded look and feel. 2. The mobile phone of claim 1, wherein the brand information read from the radio frequency identity tag comprises branding graphics firmware. 3. The mobile phone of claim 1, wherein the radio frequency identity tag is coupled to a branded battery cover that is attached to the mobile phone during the order fulfillment process. 4. The mobile phone of claim 1, wherein the brand information read from the radio frequency identity tag comprises links to branding content, and wherein the application further accesses the links to acquire at least some of the brand firmware. 5. The mobile phone of claim 1, wherein the brand firmware comprises at least one of a preferred roaming list (PRL) or executable application firmware. 6. The mobile phone of claim 1, wherein the application, based on the brand information read from the radio frequency identity tag, determines a brand identity, uses the brand identity to access a wireless network in the distribution center, and downloads brand firmware from the wireless network. 7. A method of providing branding firmware to a portable electronic device after manufacturing of the portable electronic device, comprising: receiving the portable electronic device in a distribution center, wherein the distribution center is a different location from the location where the portable electronic device is manufactured; providing a component comprising branding information to the portable electronic device in the distribution center; scanning the component to determine a brand identification, wherein the scanning is performed by an electronic scanner in the distribution center; selecting branding firmware based on the brand identification, wherein the selecting is performed by a computer; and wirelessly transmitting the branding firmware to the portable electronic device in the distribution center. 8. The method of claim 7, wherein the portable electronic device is one of a mobile phone, a personal digital assistant, or a media player. 9. The method of claim 7, wherein the component has a branded graphic and scanning the component to determine the brand identification is performed by an optical scanner. 10. The method of claim 7, wherein the component has a radio frequency identity (RFID) tag and scanning the component to determine the brand identification is performed by a near-field-communication (NFC) reader. 11. The method of claim 7, further comprising: when the branding firmware is not loaded into the portable electronic device in the distribution center, detecting that the branding firmware has not loaded into the portable electronic device; and wirelessly transmitting branding firmware to the portable electronic device via a cellular wireless network. 12. The method of claim 7, further comprising: providing a different component having different branding information to the portable electronic device; resetting a branded state flag in the portable electronic device; receiving a request from the portable electronic device for different branding information based on the reset branded state flag in the portable electronic device; and wirelessly transmitting different branding firmware to the portable electronic device, wherein the different branding firmware is identified by the request from the portable electronic device. 13. A mobile electronic device branded firmware provisioning system, comprising: a data store comprising a plurality of different branded firmware, each branded firmware associated with a different communication service provider brand; a wireless communication network; and a server computer that receives a request from a mobile electronic device for one of the branded firmware, that retrieves a copy of the requested branded firmware from the data store, and that transmits the copy of the requested branded firmware to the mobile electronic device wirelessly via the wireless communication network. 14. The system of claim 13, wherein the branded firmware comprises branded graphics. 15. The system of claim 14, wherein the branded graphics comprise a splash screen graphic. 16. The system of claim 14, wherein the branded graphics comprises a background graphic. 17. The system of claim 13, wherein the branded firmware comprises branded applications. 18. The system of claim 13, wherein the branded firmware comprises a branded interface and applications pack, where the branded interface and applications pack comprises at least three of a branded media file, a branded application, a branded web widget, and a branded network service. 19. The system of claim 13, wherein the branded firmware comprises a link to a branded on-line store. 20. The system of claim 13, wherein the request from the mobile electronic device is a file transfer protocol (FTP) request that identifies the branded firmware.
A mobile phone that is delivered by an original equipment manufacturer in an unbranded state. The mobile phone comprises a near-field-communication radio transceiver, a memory, a processor, and an application stored in the memory. When executed by the processor, the application reads brand information, using the near-field-communication radio transceiver, from a radio frequency identity (RFID) tag coupled to the mobile phone during an order fulfillment process in a distribution center of a communication service provider and, based on the brand information, loads brand firmware into the memory, whereby the mobile phone presents a branded look and feel.1. A mobile phone that is delivered by an original equipment manufacturer (OEM) in an unbranded state, comprising: a near-field-communication (NFC) radio transceiver; a memory; a processor; and an application stored in the memory that, when executed by the processor, reads brand information, using the near-field-communication radio transceiver, from a radio frequency identity (RFID) tag coupled to the mobile phone during an order fulfillment process in a distribution center of a communication service provider and based on the brand information, loads brand firmware into the memory, whereby the mobile phone presents a branded look and feel. 2. The mobile phone of claim 1, wherein the brand information read from the radio frequency identity tag comprises branding graphics firmware. 3. The mobile phone of claim 1, wherein the radio frequency identity tag is coupled to a branded battery cover that is attached to the mobile phone during the order fulfillment process. 4. The mobile phone of claim 1, wherein the brand information read from the radio frequency identity tag comprises links to branding content, and wherein the application further accesses the links to acquire at least some of the brand firmware. 5. The mobile phone of claim 1, wherein the brand firmware comprises at least one of a preferred roaming list (PRL) or executable application firmware. 6. The mobile phone of claim 1, wherein the application, based on the brand information read from the radio frequency identity tag, determines a brand identity, uses the brand identity to access a wireless network in the distribution center, and downloads brand firmware from the wireless network. 7. A method of providing branding firmware to a portable electronic device after manufacturing of the portable electronic device, comprising: receiving the portable electronic device in a distribution center, wherein the distribution center is a different location from the location where the portable electronic device is manufactured; providing a component comprising branding information to the portable electronic device in the distribution center; scanning the component to determine a brand identification, wherein the scanning is performed by an electronic scanner in the distribution center; selecting branding firmware based on the brand identification, wherein the selecting is performed by a computer; and wirelessly transmitting the branding firmware to the portable electronic device in the distribution center. 8. The method of claim 7, wherein the portable electronic device is one of a mobile phone, a personal digital assistant, or a media player. 9. The method of claim 7, wherein the component has a branded graphic and scanning the component to determine the brand identification is performed by an optical scanner. 10. The method of claim 7, wherein the component has a radio frequency identity (RFID) tag and scanning the component to determine the brand identification is performed by a near-field-communication (NFC) reader. 11. The method of claim 7, further comprising: when the branding firmware is not loaded into the portable electronic device in the distribution center, detecting that the branding firmware has not loaded into the portable electronic device; and wirelessly transmitting branding firmware to the portable electronic device via a cellular wireless network. 12. The method of claim 7, further comprising: providing a different component having different branding information to the portable electronic device; resetting a branded state flag in the portable electronic device; receiving a request from the portable electronic device for different branding information based on the reset branded state flag in the portable electronic device; and wirelessly transmitting different branding firmware to the portable electronic device, wherein the different branding firmware is identified by the request from the portable electronic device. 13. A mobile electronic device branded firmware provisioning system, comprising: a data store comprising a plurality of different branded firmware, each branded firmware associated with a different communication service provider brand; a wireless communication network; and a server computer that receives a request from a mobile electronic device for one of the branded firmware, that retrieves a copy of the requested branded firmware from the data store, and that transmits the copy of the requested branded firmware to the mobile electronic device wirelessly via the wireless communication network. 14. The system of claim 13, wherein the branded firmware comprises branded graphics. 15. The system of claim 14, wherein the branded graphics comprise a splash screen graphic. 16. The system of claim 14, wherein the branded graphics comprises a background graphic. 17. The system of claim 13, wherein the branded firmware comprises branded applications. 18. The system of claim 13, wherein the branded firmware comprises a branded interface and applications pack, where the branded interface and applications pack comprises at least three of a branded media file, a branded application, a branded web widget, and a branded network service. 19. The system of claim 13, wherein the branded firmware comprises a link to a branded on-line store. 20. The system of claim 13, wherein the request from the mobile electronic device is a file transfer protocol (FTP) request that identifies the branded firmware.
2,400
6,963
6,963
13,922,948
2,486
An apparatus for encoding video data, the apparatus comprising a compliance module configured to compare a resource requirement associated with encoding video data to form at least part of an encoded frame using a standard encoding mode with an acceptable resource level and an encoder configured to, responsive to a determination that the resource requirement will exceed the acceptable resource level, form the at least part of an encoded frame by encoding some of the video data using the standard encoding mode and filling a remainder of the at least part of the encoded frame with data that is associated with a lower resource usage than data generated using the standard encoding mode.
1. An apparatus for encoding video data, the apparatus comprising: a compliance module configured to compare a resource requirement associated with encoding the video data to form at least part of an encoded frame using a standard encoding mode with an acceptable resource level; and an encoder configured to, responsive to a determination that the resource requirement will exceed the acceptable resource level, form the at least part of an encoded frame by encoding some of the video data using the standard encoding mode and filling a remainder of the at least part of the encoded frame with data that is associated with a lower resource usage than data generated using the standard encoding mode. 2. An apparatus as claimed in claim 1, wherein the compliance module is configured to compare the resource requirement with the acceptable resource level while the encoder is encoding the video data using the standard encoding mode. 3. An apparatus as claimed in claim 2, wherein the compliance module is configured to, if it determines that the resource requirement exceeds the acceptable resource level, invoke a panic mode that causes the encoder to cease encoding the video data using the standard encoding mode. 4. An apparatus as claimed in claim 1, wherein the video data represents an image, the encoder being configured to form the at least part of an encoded frame so that at least some of the image represented by the video data is not encoded in it. 5. An apparatus as claimed in claim 1, wherein the encoder is configured to fill the filling the remainder of the at least part of an encoded frame with cheap data. 6. An apparatus as claimed in claim 1, wherein the encoder is configured to fill the remainder of the at least part of an encoded frame with data representing a repetition of an earlier frame. 7. An apparatus as claimed in claim 1, wherein the encoder is configured to fill the remainder of the at least part of an encoded frame with data representing a repetition of an earlier part of the encoded frame. 8. An apparatus as claimed in claim 1, wherein the encoder is configured to fill the remainder of the at least part of an encoded frame with data representing a block of uniform colour. 9. An apparatus as claimed in claim 1, wherein the encoder is configured to, when encoding a subsequent frame, commence encoding from a point in the subsequent frame that corresponds to a point at which the encoder ceased using the standard encoding mode when forming the at least part of an encoded frame. 10. An apparatus as claimed in claim 1, wherein the encoder is configured to, when forming a subsequent encoded frame, fill the start of the subsequent frame with data generated using a restrained encoding mode until the encoder reaches a point in the frame that corresponds to a point at which the encoder ceased using the standard encoding mode when forming the at least part of an encoded frame. 11. An apparatus as claimed in claim 1, wherein the encoder is configured to form the at least part of an encoded frame and at least one subsequent encoded frame so as to generate, on a screen output of a decoder that has decoded those encoded frames, an image that is progressively updated. 12. An apparatus as claimed in claim 1, wherein the encoder is configured to select video data to encode using the standard encoding mode in dependence on a perceptual significance associated with that video data. 13. An apparatus as claimed in claim 1, wherein the encoder is configured to select video data to encode using the standard encoding mode based on a facial recognition algorithm. 14. An apparatus as claimed in claim 1, wherein the encoder is configured to compare the resource requirement with an acceptable resource level that is associated with frame length and/or encoding time. 15. An apparatus as claimed in claim 1, wherein the encoder is configured to use, to generate the data that is associated with a lower resource usage, an encoding mode restricted to a subset of a plurality of basis functions associated with the standard encoding mode, the basis functions in said subset being characterized by a lower spatial frequency relative to others of the plurality of basis functions. 16. An apparatus as claimed in claim 1, wherein the apparatus is configured to encode the signal as part of a live video call. 17. An apparatus as claimed in claim 1, wherein the apparatus is configured to: receive an indication of a received frame from a receiving device; check that indication against a frame transmitted by the apparatus, said frame being at least partly filled with data associated with a lower resource level than data generated using the standard encoding mode; and if the check indicates that the frame that is at least partly filled with lower resource data was not received successfully by the receiving device, retransmit that frame to the receiving device. 18. An apparatus as claimed in claim 1, comprising a generation module configured to generate video data for the encoder, the generation module being configured to generate said video data in dependence on an encoding mode being implemented by the encoder. 19. A computer program product for encoding video data representing one or more images, comprising code embodied on a computer-readable storage medium and configured so as when executed to perform operations comprising: comparing a resource requirement associated with encoding video data to form at least part of an encoded frame using a standard encoding mode with an acceptable resource level; and responsive to a determination that the resource requirement will exceed the acceptable resource level, forming the at least part of an encoded frame by encoding some of the video data using the standard encoding mode and filling a remainder of the at least part of the encoded frame with data that is associated with a lower resource usage than data generated using the standard encoding mode. 20. A computer program product for encoding a video signal comprising one or more frames representing a sequence of images, comprising code embodied on a computer-readable storage medium and configured so as when executed to perform operations comprising: comparing a resource requirement associated with encoding video data to form at least part of an encoded frame using a standard encoding mode with an acceptable resource level; and forming a frame that is compliant with the acceptable resource level; in performing said forming, invoking a panic mode when it is determined that encoding the video data using the standard encoding mode will exceed the acceptable resource level, said panic mode causing the encoding of the video data using the standard encoding mode to cease and the remainder of the at least part of the encoded frame to be filled with cheap data.
An apparatus for encoding video data, the apparatus comprising a compliance module configured to compare a resource requirement associated with encoding video data to form at least part of an encoded frame using a standard encoding mode with an acceptable resource level and an encoder configured to, responsive to a determination that the resource requirement will exceed the acceptable resource level, form the at least part of an encoded frame by encoding some of the video data using the standard encoding mode and filling a remainder of the at least part of the encoded frame with data that is associated with a lower resource usage than data generated using the standard encoding mode.1. An apparatus for encoding video data, the apparatus comprising: a compliance module configured to compare a resource requirement associated with encoding the video data to form at least part of an encoded frame using a standard encoding mode with an acceptable resource level; and an encoder configured to, responsive to a determination that the resource requirement will exceed the acceptable resource level, form the at least part of an encoded frame by encoding some of the video data using the standard encoding mode and filling a remainder of the at least part of the encoded frame with data that is associated with a lower resource usage than data generated using the standard encoding mode. 2. An apparatus as claimed in claim 1, wherein the compliance module is configured to compare the resource requirement with the acceptable resource level while the encoder is encoding the video data using the standard encoding mode. 3. An apparatus as claimed in claim 2, wherein the compliance module is configured to, if it determines that the resource requirement exceeds the acceptable resource level, invoke a panic mode that causes the encoder to cease encoding the video data using the standard encoding mode. 4. An apparatus as claimed in claim 1, wherein the video data represents an image, the encoder being configured to form the at least part of an encoded frame so that at least some of the image represented by the video data is not encoded in it. 5. An apparatus as claimed in claim 1, wherein the encoder is configured to fill the filling the remainder of the at least part of an encoded frame with cheap data. 6. An apparatus as claimed in claim 1, wherein the encoder is configured to fill the remainder of the at least part of an encoded frame with data representing a repetition of an earlier frame. 7. An apparatus as claimed in claim 1, wherein the encoder is configured to fill the remainder of the at least part of an encoded frame with data representing a repetition of an earlier part of the encoded frame. 8. An apparatus as claimed in claim 1, wherein the encoder is configured to fill the remainder of the at least part of an encoded frame with data representing a block of uniform colour. 9. An apparatus as claimed in claim 1, wherein the encoder is configured to, when encoding a subsequent frame, commence encoding from a point in the subsequent frame that corresponds to a point at which the encoder ceased using the standard encoding mode when forming the at least part of an encoded frame. 10. An apparatus as claimed in claim 1, wherein the encoder is configured to, when forming a subsequent encoded frame, fill the start of the subsequent frame with data generated using a restrained encoding mode until the encoder reaches a point in the frame that corresponds to a point at which the encoder ceased using the standard encoding mode when forming the at least part of an encoded frame. 11. An apparatus as claimed in claim 1, wherein the encoder is configured to form the at least part of an encoded frame and at least one subsequent encoded frame so as to generate, on a screen output of a decoder that has decoded those encoded frames, an image that is progressively updated. 12. An apparatus as claimed in claim 1, wherein the encoder is configured to select video data to encode using the standard encoding mode in dependence on a perceptual significance associated with that video data. 13. An apparatus as claimed in claim 1, wherein the encoder is configured to select video data to encode using the standard encoding mode based on a facial recognition algorithm. 14. An apparatus as claimed in claim 1, wherein the encoder is configured to compare the resource requirement with an acceptable resource level that is associated with frame length and/or encoding time. 15. An apparatus as claimed in claim 1, wherein the encoder is configured to use, to generate the data that is associated with a lower resource usage, an encoding mode restricted to a subset of a plurality of basis functions associated with the standard encoding mode, the basis functions in said subset being characterized by a lower spatial frequency relative to others of the plurality of basis functions. 16. An apparatus as claimed in claim 1, wherein the apparatus is configured to encode the signal as part of a live video call. 17. An apparatus as claimed in claim 1, wherein the apparatus is configured to: receive an indication of a received frame from a receiving device; check that indication against a frame transmitted by the apparatus, said frame being at least partly filled with data associated with a lower resource level than data generated using the standard encoding mode; and if the check indicates that the frame that is at least partly filled with lower resource data was not received successfully by the receiving device, retransmit that frame to the receiving device. 18. An apparatus as claimed in claim 1, comprising a generation module configured to generate video data for the encoder, the generation module being configured to generate said video data in dependence on an encoding mode being implemented by the encoder. 19. A computer program product for encoding video data representing one or more images, comprising code embodied on a computer-readable storage medium and configured so as when executed to perform operations comprising: comparing a resource requirement associated with encoding video data to form at least part of an encoded frame using a standard encoding mode with an acceptable resource level; and responsive to a determination that the resource requirement will exceed the acceptable resource level, forming the at least part of an encoded frame by encoding some of the video data using the standard encoding mode and filling a remainder of the at least part of the encoded frame with data that is associated with a lower resource usage than data generated using the standard encoding mode. 20. A computer program product for encoding a video signal comprising one or more frames representing a sequence of images, comprising code embodied on a computer-readable storage medium and configured so as when executed to perform operations comprising: comparing a resource requirement associated with encoding video data to form at least part of an encoded frame using a standard encoding mode with an acceptable resource level; and forming a frame that is compliant with the acceptable resource level; in performing said forming, invoking a panic mode when it is determined that encoding the video data using the standard encoding mode will exceed the acceptable resource level, said panic mode causing the encoding of the video data using the standard encoding mode to cease and the remainder of the at least part of the encoded frame to be filled with cheap data.
2,400
6,964
6,964
13,843,623
2,453
A method for reviewing an inmate's communications that includes receiving a two-party message including a media item, and determining whether the media item is viewable pending review. When the media item is viewable pending review, placing the media item in a conditionally viewable repository for the inmate, and making the two-party message accessible to the recipient based on the media item being placed in the conditionally viewable repository for the inmate. When the media item is not viewable pending review, placing the media item in a conditionally held repository for the inmate, and making the two-party message inaccessible to the recipient based on the media item being placed in the conditionally held repository for the inmate. The method further includes receiving review results of a review process performed on the media item, and moving the media item to a reviewed media items repository based on the review results.
1. A method for reviewing communications of an inmate comprising: receiving a two-party message comprising a media item, wherein a first party of the two-party message is the inmate, and wherein the two-party message targets a recipient; determining whether the media item is viewable pending review; when the media item is viewable pending review: placing the media item in a conditionally viewable repository for the inmate; and making the two-party message accessible to the recipient based on the media item being placed in the conditionally viewable repository for the inmate; when the media item is not viewable pending review: placing the media item in a conditionally held repository for the inmate; and making the two-party message inaccessible to the recipient based on the media item being placed in the conditionally held repository for the inmate; receiving review results of a review process performed on the media item; and moving the media item to a reviewed media items repository based on the review results. 2. The method of claim 1, wherein the review results indicate that the media item is rejected, wherein moving the media item to the reviewed media items repository based on the review results comprises moving the media item to a rejected repository, and wherein the method further comprises: making the two-party message inaccessible to the recipient based on the media item being placed in the rejected repository for the inmate. 3. The method of claim 1, wherein placing the media item in the conditionally viewable repository for the inmate comprises: obtaining preliminary restrictions for the inmate, and placing the media item in the conditionally viewable repository based on the preliminary restrictions. 4. The method of claim 1, wherein the review process performed on the media item comprises: obtaining restrictions for the inmate, determining an attribute of the media item, and generating the review results based on a comparison of the restrictions and the attribute. 5. The method of claim 4, wherein the review process is performed by a software reviewer. 6. The method of claim 1, wherein a second party of the two-party message is external to a controlled facility housing the inmate. 7. The method of claim 1, wherein the recipient is the inmate. 8. A non-transitory computer readable medium comprising instructions that, when executed by a processor, perform a method for reviewing communications of an inmate, the method comprising: receiving a two-party message comprising a media item, wherein a first party of the two-party message is the inmate, and wherein the two-party message targets a recipient; determining whether the media item is viewable pending review; when the media item is viewable pending review: placing the media item in a conditionally viewable repository for the inmate; making the two-party message accessible to the recipient based on the media item being placed in the conditionally viewable repository for the inmate; when the media item is not viewable pending review: placing the media item in a conditionally held repository for the inmate; and making the two-party message inaccessible to the recipient based on the media item being placed in the conditionally held repository for the inmate; receiving review results of a review process performed on the media item; and moving the media item to a reviewed media items repository based on the review results. 9. The non-transitory computer readable medium of claim 8, wherein the review results indicate that the media item is rejected, wherein moving the media item to the reviewed media items repository based on the review results comprises moving the media item to a rejected repository, and wherein the method further comprises: making the two-party message inaccessible to the recipient based on the media item being placed in the rejected repository for the inmate. 10. The non-transitory computer readable medium of claim 8, wherein placing the media item in the conditionally viewable repository for the inmate comprises: obtaining preliminary restrictions for the inmate, and placing the media item in the conditionally viewable repository based on the preliminary restrictions. 11. The non-transitory computer readable medium of claim 8, wherein the review process performed on the media item comprises: obtaining restrictions for the inmate, determining an attribute of the media item, and generating the review results based on a comparison of the restrictions and the attribute. 12. The non-transitory computer readable medium of claim 11, wherein the review process is performed by a software reviewer. 13. The non-transitory computer readable medium of claim 8, wherein a second party of the two-party message is external to a controlled facility housing the inmate. 14. The non-transitory computer readable medium of claim 8, wherein the recipient is the inmate. 15. A system for reviewing communications of an inmate, comprising: a message server configured to: receive a two-party message comprising a media item, wherein a first party of the two-party message is the inmate, and wherein the two-party message targets a recipient, determine whether the media item is viewable pending review, when the media item is viewable pending review: place the media item in a conditionally viewable repository for the inmate; and make the two-party message accessible to the recipient based on the media item being placed in the conditionally viewable repository for the inmate, when the media item is not viewable pending review: place the media item in a conditionally held repository for the inmate; and make the two-party message inaccessible to the recipient based on the media item being placed in the conditionally held repository for the inmate, receive review results of a review process performed on the media item, and move the media item to a reviewed media items repository based on the review results; and a database server comprising: the conditionally viewable repository, the conditionally held repository, and a rejected repository. 16. The system of claim 15, wherein the review results indicate that the media item is rejected, wherein moving the media item to the reviewed media items repository based on the review results comprises moving the media item to the rejected repository, and wherein the message server is further configured to: make the two-party message inaccessible to the recipient based on the media item being placed in the rejected repository for the inmate. 17. The system of claim 15, wherein the database server further comprises: preliminary restrictions for the inmate, and wherein the message server is further configured to: obtain preliminary restrictions for the inmate, and place the media item in the conditionally viewable repository based on the preliminary restrictions. 18. The system of claim 15, wherein the database server further comprises: restrictions for the inmate, and a reviewer application configured to: obtain the restrictions for the inmate, determine an attribute of the media item, and generate the review results based on a comparison of the restrictions and the attribute. 19. The system of claim 15, further comprising: an inmate application, and an outsider application, wherein the message is generated by one selected from a group consisting of the inmate application and the outsider application. 20. The system of claim 19, wherein the inmate application is executing on a computing system located within a controlled facility.
A method for reviewing an inmate's communications that includes receiving a two-party message including a media item, and determining whether the media item is viewable pending review. When the media item is viewable pending review, placing the media item in a conditionally viewable repository for the inmate, and making the two-party message accessible to the recipient based on the media item being placed in the conditionally viewable repository for the inmate. When the media item is not viewable pending review, placing the media item in a conditionally held repository for the inmate, and making the two-party message inaccessible to the recipient based on the media item being placed in the conditionally held repository for the inmate. The method further includes receiving review results of a review process performed on the media item, and moving the media item to a reviewed media items repository based on the review results.1. A method for reviewing communications of an inmate comprising: receiving a two-party message comprising a media item, wherein a first party of the two-party message is the inmate, and wherein the two-party message targets a recipient; determining whether the media item is viewable pending review; when the media item is viewable pending review: placing the media item in a conditionally viewable repository for the inmate; and making the two-party message accessible to the recipient based on the media item being placed in the conditionally viewable repository for the inmate; when the media item is not viewable pending review: placing the media item in a conditionally held repository for the inmate; and making the two-party message inaccessible to the recipient based on the media item being placed in the conditionally held repository for the inmate; receiving review results of a review process performed on the media item; and moving the media item to a reviewed media items repository based on the review results. 2. The method of claim 1, wherein the review results indicate that the media item is rejected, wherein moving the media item to the reviewed media items repository based on the review results comprises moving the media item to a rejected repository, and wherein the method further comprises: making the two-party message inaccessible to the recipient based on the media item being placed in the rejected repository for the inmate. 3. The method of claim 1, wherein placing the media item in the conditionally viewable repository for the inmate comprises: obtaining preliminary restrictions for the inmate, and placing the media item in the conditionally viewable repository based on the preliminary restrictions. 4. The method of claim 1, wherein the review process performed on the media item comprises: obtaining restrictions for the inmate, determining an attribute of the media item, and generating the review results based on a comparison of the restrictions and the attribute. 5. The method of claim 4, wherein the review process is performed by a software reviewer. 6. The method of claim 1, wherein a second party of the two-party message is external to a controlled facility housing the inmate. 7. The method of claim 1, wherein the recipient is the inmate. 8. A non-transitory computer readable medium comprising instructions that, when executed by a processor, perform a method for reviewing communications of an inmate, the method comprising: receiving a two-party message comprising a media item, wherein a first party of the two-party message is the inmate, and wherein the two-party message targets a recipient; determining whether the media item is viewable pending review; when the media item is viewable pending review: placing the media item in a conditionally viewable repository for the inmate; making the two-party message accessible to the recipient based on the media item being placed in the conditionally viewable repository for the inmate; when the media item is not viewable pending review: placing the media item in a conditionally held repository for the inmate; and making the two-party message inaccessible to the recipient based on the media item being placed in the conditionally held repository for the inmate; receiving review results of a review process performed on the media item; and moving the media item to a reviewed media items repository based on the review results. 9. The non-transitory computer readable medium of claim 8, wherein the review results indicate that the media item is rejected, wherein moving the media item to the reviewed media items repository based on the review results comprises moving the media item to a rejected repository, and wherein the method further comprises: making the two-party message inaccessible to the recipient based on the media item being placed in the rejected repository for the inmate. 10. The non-transitory computer readable medium of claim 8, wherein placing the media item in the conditionally viewable repository for the inmate comprises: obtaining preliminary restrictions for the inmate, and placing the media item in the conditionally viewable repository based on the preliminary restrictions. 11. The non-transitory computer readable medium of claim 8, wherein the review process performed on the media item comprises: obtaining restrictions for the inmate, determining an attribute of the media item, and generating the review results based on a comparison of the restrictions and the attribute. 12. The non-transitory computer readable medium of claim 11, wherein the review process is performed by a software reviewer. 13. The non-transitory computer readable medium of claim 8, wherein a second party of the two-party message is external to a controlled facility housing the inmate. 14. The non-transitory computer readable medium of claim 8, wherein the recipient is the inmate. 15. A system for reviewing communications of an inmate, comprising: a message server configured to: receive a two-party message comprising a media item, wherein a first party of the two-party message is the inmate, and wherein the two-party message targets a recipient, determine whether the media item is viewable pending review, when the media item is viewable pending review: place the media item in a conditionally viewable repository for the inmate; and make the two-party message accessible to the recipient based on the media item being placed in the conditionally viewable repository for the inmate, when the media item is not viewable pending review: place the media item in a conditionally held repository for the inmate; and make the two-party message inaccessible to the recipient based on the media item being placed in the conditionally held repository for the inmate, receive review results of a review process performed on the media item, and move the media item to a reviewed media items repository based on the review results; and a database server comprising: the conditionally viewable repository, the conditionally held repository, and a rejected repository. 16. The system of claim 15, wherein the review results indicate that the media item is rejected, wherein moving the media item to the reviewed media items repository based on the review results comprises moving the media item to the rejected repository, and wherein the message server is further configured to: make the two-party message inaccessible to the recipient based on the media item being placed in the rejected repository for the inmate. 17. The system of claim 15, wherein the database server further comprises: preliminary restrictions for the inmate, and wherein the message server is further configured to: obtain preliminary restrictions for the inmate, and place the media item in the conditionally viewable repository based on the preliminary restrictions. 18. The system of claim 15, wherein the database server further comprises: restrictions for the inmate, and a reviewer application configured to: obtain the restrictions for the inmate, determine an attribute of the media item, and generate the review results based on a comparison of the restrictions and the attribute. 19. The system of claim 15, further comprising: an inmate application, and an outsider application, wherein the message is generated by one selected from a group consisting of the inmate application and the outsider application. 20. The system of claim 19, wherein the inmate application is executing on a computing system located within a controlled facility.
2,400
6,965
6,965
14,023,534
2,443
Processing a media file includes receiving a request for a media file from a client system and determining, using a processor, a non-chronological ordering of a plurality of segments of the media file for buffering according to historical playback data for each of the plurality of segments of the media file. A first segment of the media file is sent for buffering to the client system as specified by the non-chronological ordering of the plurality of segments. The non-chronological ordering is determined prior to sending any segment of the media file to the client system.
1. A method, comprising: receiving a request for a media file from a client system; determining, using a processor, a non-chronological ordering of a plurality of segments of the media file for buffering according to historical playback data for each of the plurality of segments of the media file; and sending a first segment of the media file, as specified by the non-chronological ordering of the plurality of segments, for buffering to the client system; wherein the non-chronological ordering is determined prior to sending any segment of the media file to the client system. 2. The method of claim 1, wherein the first segment sent to the client system is not a first chronological segment of the media file. 3. The method of claim 1, further comprising: determining user-specific data from the request; wherein determining a non-chronological ordering of the plurality of segments of the media file is further performed according to the user-specific data from the request. 4. The method of claim 3, wherein the user-specific data includes an identifier of a user of the client system, wherein only historical playback data of the plurality of segments of the media file from other users belonging to a social network of the user of the client system is used to determine the non-chronological ordering. 5. The method of claim 1, wherein the non-chronological ordering of segments is determined according to at least one tag assigned to at least one of the plurality of segments of the media file. 6. The method of claim 1, wherein the non-chronological ordering of segments is determined according to at least one sentiment indicator assigned to at least one of the plurality of segments of the media file. 7. The method of claim 1, further comprising: determining a segmentation of the media file responsive to the request. 8. The method of claim 1, wherein the sending of at least the first segment of the media file is performed without initiation of playback of the media file within the client system. 9. The method of claim 1, further comprising: providing a visualization of the plurality of segments of the media file to the client system, wherein the visualization indicates the determined non-chronological ordering of the segments to be buffered. 10. A method, comprising: including, using a processor, a reference to a media file within a Web page, wherein the media file comprises a plurality of segments; and including within the reference, a parameter indicating that segments of the media file are to be buffered in a non-chronological order. 11. The method of claim 10, further comprising: determining values for the parameter, wherein the values indicate individual segments of the media file, and wherein an order of the values specifies the non-chronological order of segments of the media file for buffering. 12. The method of claim 11, wherein a client system determines the values for the parameter. 13-25. (canceled)
Processing a media file includes receiving a request for a media file from a client system and determining, using a processor, a non-chronological ordering of a plurality of segments of the media file for buffering according to historical playback data for each of the plurality of segments of the media file. A first segment of the media file is sent for buffering to the client system as specified by the non-chronological ordering of the plurality of segments. The non-chronological ordering is determined prior to sending any segment of the media file to the client system.1. A method, comprising: receiving a request for a media file from a client system; determining, using a processor, a non-chronological ordering of a plurality of segments of the media file for buffering according to historical playback data for each of the plurality of segments of the media file; and sending a first segment of the media file, as specified by the non-chronological ordering of the plurality of segments, for buffering to the client system; wherein the non-chronological ordering is determined prior to sending any segment of the media file to the client system. 2. The method of claim 1, wherein the first segment sent to the client system is not a first chronological segment of the media file. 3. The method of claim 1, further comprising: determining user-specific data from the request; wherein determining a non-chronological ordering of the plurality of segments of the media file is further performed according to the user-specific data from the request. 4. The method of claim 3, wherein the user-specific data includes an identifier of a user of the client system, wherein only historical playback data of the plurality of segments of the media file from other users belonging to a social network of the user of the client system is used to determine the non-chronological ordering. 5. The method of claim 1, wherein the non-chronological ordering of segments is determined according to at least one tag assigned to at least one of the plurality of segments of the media file. 6. The method of claim 1, wherein the non-chronological ordering of segments is determined according to at least one sentiment indicator assigned to at least one of the plurality of segments of the media file. 7. The method of claim 1, further comprising: determining a segmentation of the media file responsive to the request. 8. The method of claim 1, wherein the sending of at least the first segment of the media file is performed without initiation of playback of the media file within the client system. 9. The method of claim 1, further comprising: providing a visualization of the plurality of segments of the media file to the client system, wherein the visualization indicates the determined non-chronological ordering of the segments to be buffered. 10. A method, comprising: including, using a processor, a reference to a media file within a Web page, wherein the media file comprises a plurality of segments; and including within the reference, a parameter indicating that segments of the media file are to be buffered in a non-chronological order. 11. The method of claim 10, further comprising: determining values for the parameter, wherein the values indicate individual segments of the media file, and wherein an order of the values specifies the non-chronological order of segments of the media file for buffering. 12. The method of claim 11, wherein a client system determines the values for the parameter. 13-25. (canceled)
2,400
6,966
6,966
14,898,260
2,485
In an example, a device may include a division unit and a plurality of encoding units. The division unit may divide a video frame into a plurality of subframes. Each of encoding units may encode a corresponding one of the plurality of subframes. The division unit may determine a number of the subframes based on a number of the encoding units.
1. A device, comprising: a division unit to divide a video frame into a plurality of subframes; and a plurality of encoding units, each of encoding units to encode a corresponding one of the plurality of subframes, wherein the division unit is to determine a number of the subframes the video frame is to be divided into based on a number of the plurality of encoding units, the number of the plurality of encoding units is based on a number of processors included in the device, and each of the encoding units do not communicate with each other. 2. The device of claim 1, wherein, each of the encoding units includes a separate one of the processors of the device, and the plurality of encoding units are to encode the subframes in parallel. 3. The device of claim 2, further comprising: an allocation unit to determine the number of the processors included in the device and to allocate a threshold number of the processors to the encoding units. 4. The device of claim 1, further comprising: a position unit to add position information to each of the subframes, the position information to indicate at least one of a number of the subframe and a location of the subframe with respect to the video frame. 5. The device of claim 1, wherein, the division unit divides the subframes to be approximately equal in size, and the subframes do not overlap with respect to the video frame. 6. The device of claim 1, wherein, each of the encoding units includes a separate instance of an encoder, and each of the encoding units is to operate independently of each other. 7. A system, comprising: the device of claim 1; a plurality of decoding units, each of decoding units to decode a corresponding one of the plurality of subframes; and a routing unit to route each of subframes to one of the decoding units based on the position information of the subframes. 8. The system of claim 7, further comprising: a capture unit to capture the video frame to be encoded by the plurality of encoding units; a transmit unit to transmit the encoded subframes to the routing unit; and an output unit to combine the plurality of decoded subframes into a single decoded frame and to display the decoded frame. 9. A method, comprising: determining a number of processors available to encode a video frame; dividing the video frame into a plurality of subframes based on the number of processors; and configuring each of the processors to encode one of the subframes, wherein the processors are to encode the subframes in parallel. 10. The method of claim 9, wherein the dividing further includes adding position information to each of the subframes, the position information to indicate at least one of a number of the subframe and a location of the subframe with respect to the video frame. 11. The method of claim 9, wherein the determining the number of processors available includes determining a total number of processors included in a device and selecting a threshold number of the total number of processors to be dedicated to encoding. 12. The method of claim 9, wherein, the dividing divides a plurality of the video frames into subframes, and each of the processors encode the same subframe of each of the video frames. 13. A non-transitory computer-readable storage medium storing instructions that, if executed by a processor of a device, cause the processor to: allocate a threshold number of a plurality of processors to encoding a video frame, where the threshold number is greater than one; divide the video frame into the threshold number of subframes; and assign each of the allocated processors to encode one of the subframes, wherein each of the allocated processors is to encode independently of each other. 14. The non-transitory computer-readable storage medium of claim 13, wherein each of the allocated processors encode in parallel using separate encoders. 15. The non-transitory computer-readable storage medium of claim 14, wherein the threshold number is determined based on a number of the plurality of processors to be dedicated non-encoding processes.
In an example, a device may include a division unit and a plurality of encoding units. The division unit may divide a video frame into a plurality of subframes. Each of encoding units may encode a corresponding one of the plurality of subframes. The division unit may determine a number of the subframes based on a number of the encoding units.1. A device, comprising: a division unit to divide a video frame into a plurality of subframes; and a plurality of encoding units, each of encoding units to encode a corresponding one of the plurality of subframes, wherein the division unit is to determine a number of the subframes the video frame is to be divided into based on a number of the plurality of encoding units, the number of the plurality of encoding units is based on a number of processors included in the device, and each of the encoding units do not communicate with each other. 2. The device of claim 1, wherein, each of the encoding units includes a separate one of the processors of the device, and the plurality of encoding units are to encode the subframes in parallel. 3. The device of claim 2, further comprising: an allocation unit to determine the number of the processors included in the device and to allocate a threshold number of the processors to the encoding units. 4. The device of claim 1, further comprising: a position unit to add position information to each of the subframes, the position information to indicate at least one of a number of the subframe and a location of the subframe with respect to the video frame. 5. The device of claim 1, wherein, the division unit divides the subframes to be approximately equal in size, and the subframes do not overlap with respect to the video frame. 6. The device of claim 1, wherein, each of the encoding units includes a separate instance of an encoder, and each of the encoding units is to operate independently of each other. 7. A system, comprising: the device of claim 1; a plurality of decoding units, each of decoding units to decode a corresponding one of the plurality of subframes; and a routing unit to route each of subframes to one of the decoding units based on the position information of the subframes. 8. The system of claim 7, further comprising: a capture unit to capture the video frame to be encoded by the plurality of encoding units; a transmit unit to transmit the encoded subframes to the routing unit; and an output unit to combine the plurality of decoded subframes into a single decoded frame and to display the decoded frame. 9. A method, comprising: determining a number of processors available to encode a video frame; dividing the video frame into a plurality of subframes based on the number of processors; and configuring each of the processors to encode one of the subframes, wherein the processors are to encode the subframes in parallel. 10. The method of claim 9, wherein the dividing further includes adding position information to each of the subframes, the position information to indicate at least one of a number of the subframe and a location of the subframe with respect to the video frame. 11. The method of claim 9, wherein the determining the number of processors available includes determining a total number of processors included in a device and selecting a threshold number of the total number of processors to be dedicated to encoding. 12. The method of claim 9, wherein, the dividing divides a plurality of the video frames into subframes, and each of the processors encode the same subframe of each of the video frames. 13. A non-transitory computer-readable storage medium storing instructions that, if executed by a processor of a device, cause the processor to: allocate a threshold number of a plurality of processors to encoding a video frame, where the threshold number is greater than one; divide the video frame into the threshold number of subframes; and assign each of the allocated processors to encode one of the subframes, wherein each of the allocated processors is to encode independently of each other. 14. The non-transitory computer-readable storage medium of claim 13, wherein each of the allocated processors encode in parallel using separate encoders. 15. The non-transitory computer-readable storage medium of claim 14, wherein the threshold number is determined based on a number of the plurality of processors to be dedicated non-encoding processes.
2,400
6,967
6,967
14,052,207
2,481
A first video frame and a second video frame in a flow of digital video frames are encoded by extracting for the frames in question respective sets of keypoints and descriptors, with each descriptor including a plurality of orientation histograms regarding a patch of pixels centred on the respective keypoint. Once a pair of linked descriptors has been identified, one for the first frame and one for the second frame, which have a minimum distance from among the distances between any one of the descriptors of the first frame and any one of the descriptors of the second frame, the differences of the histograms of the descriptors linked in said pair are calculated, and the descriptors linked in said pair are encoded as the set including one of the linked descriptors and the aforesaid histogram differences by subjecting the histogram differences to a thesholding setting at zero all the differences below a certain threshold, to quantization, and to an encoding of a run-length type. The run-length encoding is followed by a further encoding chosen from among a Huffman encoding, an arithmetical encoding, and a type encoding.
1. A method of encoding a first and a second video frame in a flow of digital video frames, the method including: extracting for said first and second frame respective sets of points of interest and descriptors wherein each descriptor includes a plurality of orientation histograms relative to a patch of pixels centered on the respective point of interest, identifying a pair of linked descriptors, one for the first frame and the other for the second frame, having a minimum distance out of the distances of any of the descriptors for the first frame and any of the descriptors for the second frame, calculating the differences of the histograms of the descriptors linked in said pair, and encoding the descriptors linked in said pair as a set including one of the descriptors linked in said pair and said histogram differences, wherein said histogram differences are subjected, after thresholding by setting to zero all the differences below a certain threshold, to quantization and to run-length encoding. 2. The method of claim 1, wherein said run-length encoding is followed by further encoding selected out of Huffman coding, arithmetic coding and type encoding. 3. The method of claim 1, including, prior to calculating said histogram differences, projecting to a common coordinate system the histograms of the descriptors linked in said pair. 4. The method of claim 1, including: identifying, in addition to said pair of linked descriptors having a minimum distance out of the distances of any of the descriptors for the first frame and any of the descriptors for the second frame, a second pair of linked descriptors having a distance which differs from said minimum distance by less than a threshold difference, and encoding both said pair of linked descriptors and said second pair as an encoded pair. 5. A method of decoding a first and a second video frame encoded with the method according claim 1, the decoding method including: recovering said histogram differences subjected to quantization and run-length coding, subjecting said recovered histogram differences to inverse run-length coding to produce two-component entities including a number equal to RUN followed or preceded by number of zeros equal to LENGTH, subjecting said two-component entities to inverse quantization, generating, from said one of the descriptors linked in said pair and said two-component entities subjected to inverse quantization, a replica of the other of the descriptors linked in said pair. 6. The method of claim 5, wherein said recovering said run-length encoded differences includes a decoding operation selected out of Huffman decoding, arithmetic decoding and type decoding. 7. An encoder for encoding a flow of digital video frames, the encoder configured for implementing the method of encoding according to claim 1. 8. A decoder for decoding a flow of digital video frames encoded with the method according to claim 1. 9. A computer program product, loadable into the memory of at least one computer and including software code portions for performing the method of encoding according to claim 1. 10. A computer program product, loadable into the memory of at least one computer and including software code portions for performing the method of decoding according to claim 5.
A first video frame and a second video frame in a flow of digital video frames are encoded by extracting for the frames in question respective sets of keypoints and descriptors, with each descriptor including a plurality of orientation histograms regarding a patch of pixels centred on the respective keypoint. Once a pair of linked descriptors has been identified, one for the first frame and one for the second frame, which have a minimum distance from among the distances between any one of the descriptors of the first frame and any one of the descriptors of the second frame, the differences of the histograms of the descriptors linked in said pair are calculated, and the descriptors linked in said pair are encoded as the set including one of the linked descriptors and the aforesaid histogram differences by subjecting the histogram differences to a thesholding setting at zero all the differences below a certain threshold, to quantization, and to an encoding of a run-length type. The run-length encoding is followed by a further encoding chosen from among a Huffman encoding, an arithmetical encoding, and a type encoding.1. A method of encoding a first and a second video frame in a flow of digital video frames, the method including: extracting for said first and second frame respective sets of points of interest and descriptors wherein each descriptor includes a plurality of orientation histograms relative to a patch of pixels centered on the respective point of interest, identifying a pair of linked descriptors, one for the first frame and the other for the second frame, having a minimum distance out of the distances of any of the descriptors for the first frame and any of the descriptors for the second frame, calculating the differences of the histograms of the descriptors linked in said pair, and encoding the descriptors linked in said pair as a set including one of the descriptors linked in said pair and said histogram differences, wherein said histogram differences are subjected, after thresholding by setting to zero all the differences below a certain threshold, to quantization and to run-length encoding. 2. The method of claim 1, wherein said run-length encoding is followed by further encoding selected out of Huffman coding, arithmetic coding and type encoding. 3. The method of claim 1, including, prior to calculating said histogram differences, projecting to a common coordinate system the histograms of the descriptors linked in said pair. 4. The method of claim 1, including: identifying, in addition to said pair of linked descriptors having a minimum distance out of the distances of any of the descriptors for the first frame and any of the descriptors for the second frame, a second pair of linked descriptors having a distance which differs from said minimum distance by less than a threshold difference, and encoding both said pair of linked descriptors and said second pair as an encoded pair. 5. A method of decoding a first and a second video frame encoded with the method according claim 1, the decoding method including: recovering said histogram differences subjected to quantization and run-length coding, subjecting said recovered histogram differences to inverse run-length coding to produce two-component entities including a number equal to RUN followed or preceded by number of zeros equal to LENGTH, subjecting said two-component entities to inverse quantization, generating, from said one of the descriptors linked in said pair and said two-component entities subjected to inverse quantization, a replica of the other of the descriptors linked in said pair. 6. The method of claim 5, wherein said recovering said run-length encoded differences includes a decoding operation selected out of Huffman decoding, arithmetic decoding and type decoding. 7. An encoder for encoding a flow of digital video frames, the encoder configured for implementing the method of encoding according to claim 1. 8. A decoder for decoding a flow of digital video frames encoded with the method according to claim 1. 9. A computer program product, loadable into the memory of at least one computer and including software code portions for performing the method of encoding according to claim 1. 10. A computer program product, loadable into the memory of at least one computer and including software code portions for performing the method of decoding according to claim 5.
2,400
6,968
6,968
14,962,362
2,425
A computer implemented method for inserting advertisement content into a program content stream includes receiving, by a headend content server, the program content stream. The program content stream includes an advertisement insertion cue. The method further includes detecting the advertisement insertion cue in the program content stream, and the advertisement insertion cue indicates an insertion point in the program content stream for inserting an advertisement. The method further includes modifying the advertisement insertion cue to indicate an expiration date and time for playout of a first advertisement content to be inserted into the program content stream, and inserting the first advertisement content into the program content stream.
1. A computer implemented method for inserting advertisement content into a program content stream, comprising: receiving, by a headend content server, the program content stream, the program content stream having an advertisement insertion cue; detecting, by the headend content server, the advertisement insertion cue in the program content stream, the advertisement insertion cue indicating an insertion time slot in the program content stream for inserting an advertisement; modifying, by the headend content server, the advertisement insertion cue to indicate an expiration date and time for playout of any advertisement that is later inserted into the program content stream at the insertion time slot; and inserting, by the headend content server, a first advertisement into the program content stream at the insertion time slot. 2. The method of claim 1, wherein the detected advertisement insertion cue includes presentation time stamp information, and wherein modifying, by the headend content server, the advertisement insertion cue to indicate an expiration date and time for playout of any advertisement that is later inserted into the program content stream at the insertion time slot comprises: generating a configurable value indicating an amount of time until expiration for the any advertisement that is later inserted into the program content stream at the insertion time slot; and adding the configurable value to the presentation time stamp information, thereby resulting in the expiration date and time for playout of the any advertisement that is later inserted into the program content stream at the insertion time slot. 3. The method of claim 1, further comprising: receiving, by a receiving device, the program content stream including the inserted first advertisement; recording, by the receiving device, the program content stream including the inserted first advertisement; determining, at a time of playout of the recorded program content stream including the inserted first advertisement, whether the expiration date and time for playout of the inserted first advertisement has passed; and inserting a second advertisement in the recorded program content stream to replace the first advertisement if the expiration date and time for playout of the inserted first advertisement has passed. 4. The method of claim 3, wherein determining whether the expiration date and time for playout of the inserted first advertisement has passed comprises: determining, by the receiving device, at a time of playout of the recorded program content stream including the inserted first advertisement, whether the expiration date and time for playout of the inserted first advertisement has passed. 5. The method of claim 3, wherein determining whether the expiration date and time for playout of the inserted first advertisement has passed comprises: determining, by the headend content server, at a time of playout of the recorded program content stream including the inserted first advertisement, whether the expiration date and time for playout of the inserted first advertisement has passed. 6. The method of claim 3, wherein inserting a second advertisement in the recorded program content stream to replace the first advertisement if the expiration date and time for playout of the inserted first advertisement has passed, comprises: inserting, by the receiving device, a second advertisement in the recorded program content stream to replace the first advertisement if the expiration date and time for playout of the inserted first advertisement has passed. 7. The method of claim 3, wherein inserting a second advertisement in the recorded program content stream to replace the first advertisement if the expiration date and time for playout of the inserted first advertisement has passed, comprises: inserting, by the headend content server, a second advertisement in the recorded program content stream to replace the first advertisement if the expiration date and time for playout of the inserted first advertisement has passed. 8. The method of claim 3, wherein the first advertisement comprises a national advertisement, and the second advertisement comprises a local advertisement. 9. An advertisement insertion system, comprising: a headend content server configured to: receive a program content stream, the program content stream having an advertisement insertion cue; detect the advertisement insertion cue in the program content stream, the advertisement insertion cue indicating an insertion time slot in the program content stream for inserting an advertisement; modify the advertisement insertion cue to indicate an expiration date and time for playout of any advertisement that is later inserted into the program content stream at the insertion time slot; and insert a first advertisement into the program content stream at the insertion time slot. 10. The advertisement insertion system of claim 9, wherein the headend content server is further configured to: generate a configurable value indicating an amount of time until expiration for the any advertisement that is later inserted into the program content stream at the insertion time slot; and add the configurable value to the presentation time stamp information, thereby resulting in the expiration date and time for playout of the any advertisement that is later inserted into the program content stream at the insertion time slot. 11. The advertisement insertion system of claim 9, further comprising: a receiving device configured to: receive the program content stream including the inserted first advertisement; and record the program content stream including the inserted first advertisement. 12. The advertisement insertion system of claim 11, wherein the receiving device is further configured to: determine, at a time of playout of the recorded program content stream including the inserted first advertisement, whether the expiration date and time for playout of the inserted first advertisement has passed; and insert a second advertisement in the recorded program content stream to replace the first advertisement if the expiration date and time for playout of the inserted first advertisement has passed. 13. The advertisement insertion system of claim 11, wherein the headend content server is further configured to: determine, at a time of playout of the recorded program content stream including the inserted first advertisement, whether the expiration date and time for playout of the inserted first advertisement has passed; and insert a second advertisement in the recorded program content stream to replace the first advertisement if the expiration date and time for playout of the inserted first advertisement has passed. 14. The advertisement insertion system of claim 12, wherein the first advertisement comprises a national advertisement, and the second advertisement comprises a local advertisement. 15. The advertisement insertion system of claim 13, wherein the first advertisement comprises a national advertisement, and the second advertisement comprises a local advertisement. 16. A method of inserting advertisement content during playout by a receiving device of a recorded program content stream, the recorded program content stream having an advertisement insertion cue indicating an expiration date and time for playout of a first advertisement inserted in the program content stream, comprising: analyzing, by the receiving device, the advertisement insertion cue at a time of playout of the recorded program content stream; determining, based on the analyzed advertisement insertion cue, whether the expiration date and time for playout of the first advertisement has passed; and inserting, by the receiving device, a second advertisement in the recorded program content stream to replace the first advertisement if the expiration date and time for playout of the inserted first advertisement has passed. 17. The method of claim 1, wherein the advertisement insertion cue is a SCTE-35 advertisement insertion cue, and modifying the advertisement insertion cue includes adding a field to the SCTE-35 advertisement insertion cue that indicates the expiration date and time for playout of the any advertisement that is later inserted into the program content stream at the insertion time slot. 18. The advertisement insertion system of claim 9, wherein the advertisement insertion cue is a SCTE-35 advertisement insertion cue, and the headend content server is configured to modify the advertisement insertion cue by adding a field to the SCTE-35 advertisement insertion cue that indicates the expiration date and time for playout of the any advertisement that is later inserted into the program content stream at the insertion time slot. 19. The method of claim 16, wherein the advertisement insertion cue is a modified SCTE-35 advertisement insertion cue that includes a field that indicates the expiration date and time for playout of the first advertisement inserted in the program content stream.
A computer implemented method for inserting advertisement content into a program content stream includes receiving, by a headend content server, the program content stream. The program content stream includes an advertisement insertion cue. The method further includes detecting the advertisement insertion cue in the program content stream, and the advertisement insertion cue indicates an insertion point in the program content stream for inserting an advertisement. The method further includes modifying the advertisement insertion cue to indicate an expiration date and time for playout of a first advertisement content to be inserted into the program content stream, and inserting the first advertisement content into the program content stream.1. A computer implemented method for inserting advertisement content into a program content stream, comprising: receiving, by a headend content server, the program content stream, the program content stream having an advertisement insertion cue; detecting, by the headend content server, the advertisement insertion cue in the program content stream, the advertisement insertion cue indicating an insertion time slot in the program content stream for inserting an advertisement; modifying, by the headend content server, the advertisement insertion cue to indicate an expiration date and time for playout of any advertisement that is later inserted into the program content stream at the insertion time slot; and inserting, by the headend content server, a first advertisement into the program content stream at the insertion time slot. 2. The method of claim 1, wherein the detected advertisement insertion cue includes presentation time stamp information, and wherein modifying, by the headend content server, the advertisement insertion cue to indicate an expiration date and time for playout of any advertisement that is later inserted into the program content stream at the insertion time slot comprises: generating a configurable value indicating an amount of time until expiration for the any advertisement that is later inserted into the program content stream at the insertion time slot; and adding the configurable value to the presentation time stamp information, thereby resulting in the expiration date and time for playout of the any advertisement that is later inserted into the program content stream at the insertion time slot. 3. The method of claim 1, further comprising: receiving, by a receiving device, the program content stream including the inserted first advertisement; recording, by the receiving device, the program content stream including the inserted first advertisement; determining, at a time of playout of the recorded program content stream including the inserted first advertisement, whether the expiration date and time for playout of the inserted first advertisement has passed; and inserting a second advertisement in the recorded program content stream to replace the first advertisement if the expiration date and time for playout of the inserted first advertisement has passed. 4. The method of claim 3, wherein determining whether the expiration date and time for playout of the inserted first advertisement has passed comprises: determining, by the receiving device, at a time of playout of the recorded program content stream including the inserted first advertisement, whether the expiration date and time for playout of the inserted first advertisement has passed. 5. The method of claim 3, wherein determining whether the expiration date and time for playout of the inserted first advertisement has passed comprises: determining, by the headend content server, at a time of playout of the recorded program content stream including the inserted first advertisement, whether the expiration date and time for playout of the inserted first advertisement has passed. 6. The method of claim 3, wherein inserting a second advertisement in the recorded program content stream to replace the first advertisement if the expiration date and time for playout of the inserted first advertisement has passed, comprises: inserting, by the receiving device, a second advertisement in the recorded program content stream to replace the first advertisement if the expiration date and time for playout of the inserted first advertisement has passed. 7. The method of claim 3, wherein inserting a second advertisement in the recorded program content stream to replace the first advertisement if the expiration date and time for playout of the inserted first advertisement has passed, comprises: inserting, by the headend content server, a second advertisement in the recorded program content stream to replace the first advertisement if the expiration date and time for playout of the inserted first advertisement has passed. 8. The method of claim 3, wherein the first advertisement comprises a national advertisement, and the second advertisement comprises a local advertisement. 9. An advertisement insertion system, comprising: a headend content server configured to: receive a program content stream, the program content stream having an advertisement insertion cue; detect the advertisement insertion cue in the program content stream, the advertisement insertion cue indicating an insertion time slot in the program content stream for inserting an advertisement; modify the advertisement insertion cue to indicate an expiration date and time for playout of any advertisement that is later inserted into the program content stream at the insertion time slot; and insert a first advertisement into the program content stream at the insertion time slot. 10. The advertisement insertion system of claim 9, wherein the headend content server is further configured to: generate a configurable value indicating an amount of time until expiration for the any advertisement that is later inserted into the program content stream at the insertion time slot; and add the configurable value to the presentation time stamp information, thereby resulting in the expiration date and time for playout of the any advertisement that is later inserted into the program content stream at the insertion time slot. 11. The advertisement insertion system of claim 9, further comprising: a receiving device configured to: receive the program content stream including the inserted first advertisement; and record the program content stream including the inserted first advertisement. 12. The advertisement insertion system of claim 11, wherein the receiving device is further configured to: determine, at a time of playout of the recorded program content stream including the inserted first advertisement, whether the expiration date and time for playout of the inserted first advertisement has passed; and insert a second advertisement in the recorded program content stream to replace the first advertisement if the expiration date and time for playout of the inserted first advertisement has passed. 13. The advertisement insertion system of claim 11, wherein the headend content server is further configured to: determine, at a time of playout of the recorded program content stream including the inserted first advertisement, whether the expiration date and time for playout of the inserted first advertisement has passed; and insert a second advertisement in the recorded program content stream to replace the first advertisement if the expiration date and time for playout of the inserted first advertisement has passed. 14. The advertisement insertion system of claim 12, wherein the first advertisement comprises a national advertisement, and the second advertisement comprises a local advertisement. 15. The advertisement insertion system of claim 13, wherein the first advertisement comprises a national advertisement, and the second advertisement comprises a local advertisement. 16. A method of inserting advertisement content during playout by a receiving device of a recorded program content stream, the recorded program content stream having an advertisement insertion cue indicating an expiration date and time for playout of a first advertisement inserted in the program content stream, comprising: analyzing, by the receiving device, the advertisement insertion cue at a time of playout of the recorded program content stream; determining, based on the analyzed advertisement insertion cue, whether the expiration date and time for playout of the first advertisement has passed; and inserting, by the receiving device, a second advertisement in the recorded program content stream to replace the first advertisement if the expiration date and time for playout of the inserted first advertisement has passed. 17. The method of claim 1, wherein the advertisement insertion cue is a SCTE-35 advertisement insertion cue, and modifying the advertisement insertion cue includes adding a field to the SCTE-35 advertisement insertion cue that indicates the expiration date and time for playout of the any advertisement that is later inserted into the program content stream at the insertion time slot. 18. The advertisement insertion system of claim 9, wherein the advertisement insertion cue is a SCTE-35 advertisement insertion cue, and the headend content server is configured to modify the advertisement insertion cue by adding a field to the SCTE-35 advertisement insertion cue that indicates the expiration date and time for playout of the any advertisement that is later inserted into the program content stream at the insertion time slot. 19. The method of claim 16, wherein the advertisement insertion cue is a modified SCTE-35 advertisement insertion cue that includes a field that indicates the expiration date and time for playout of the first advertisement inserted in the program content stream.
2,400
6,969
6,969
13,744,221
2,461
Access terminals are adapted to identify one or more capabilities (e.g., characteristics, features). Such an access terminal can send a capability indication message to a network node. The capability indication message is adapted to identify at least one capability associated with the access terminal. The network node can receive the capability indication message and can identify one or more performance attributes associated with each identified capability of the access terminal, which performance attributes can be beneficially altered or optimized in light of the identified capabilities. The network node and the access terminal can then employ one or more adjusted performance attributes associated with each identified capability. Other aspects, embodiments, and features are also included.
1. An access terminal, comprising: a communications interface; a storage medium; and a processing circuit coupled to the communications interface and the storage medium, the processing circuit adapted to: send, via the communications interface, a capability indication message adapted to identify at least one capability associated with the access terminal; and employ at least one altered performance attribute associated with the at least one capability identified in the capability indication message. 2. The access terminal of claim 1, wherein the processing circuit is further adapted to: identify the at least one capability associated with the access terminal. 3. The access terminal of claim 1, wherein the capability indication message is sent in a general extension message. 4. The access terminal of claim 1, wherein the capability indication message is adapted to identify the access terminal as stationary. 5. The access terminal of claim 1, wherein the capability indication message is adapted to identify the access terminal as power sensitive. 6. The access terminal of claim 1, wherein the at least one altered performance attribute includes one or more altered performance attributes selected from a group of altered performance attributes comprising: reception of a page message transmitted to a limited paging area corresponding to a location recently associated with the access terminal; reception of a direct channel assignment sent without a preceding page; a reduced dormancy timer; a fast call setup; and an increased point-to-point protocol (PPP) inactivity timer. 7. A method operational on an access terminal, comprising: identifying at least one capability associated with the access terminal; transmitting a capability indication message adapted to identify the at least one identified capability associated with the access terminal; and employing at least one adjusted performance attribute associated with the at least one capability identified in the capability indication message. 8. The method of claim 7, wherein transmitting the capability indication message adapted to identify the at least one identified capability associated with the access terminal comprises: transmitting the capability indication message adapted to identify the access terminal as stationary. 9. The method of claim 7, wherein transmitting the capability indication message adapted to identify the at least one identified capability associated with the access terminal comprises: transmitting the capability indication message adapted to identify the access terminal as power sensitive. 10. The method of claim 7, wherein employing at least one adjusted performance attribute comprises: receiving a page message transmitted to a limited paging area corresponding to a location recently associated with the access terminal. 11. The method of claim 7, wherein employing at least one adjusted performance attribute comprises: receiving a direct channel assignment sent without a preceding page. 12. The method of claim 7, wherein employing at least one adjusted performance attribute comprises: receiving a reduced value for a dormancy timer. 13. The method of claim 7, wherein employing at least one adjusted performance attribute comprises: performing a fast call setup. 14. The method of claim 7, wherein employing at least one adjusted performance attribute comprises: receiving an increased point-to-point protocol (PPP) inactivity timer. 15. An access terminal, comprising: means for identifying at least one capability associated with the access terminal; means for transmitting a capability indication message adapted to identify the at least one identified capability associated with the access terminal; and means for employing at least one adjusted performance attribute associated with the at least one capability identified in the capability indication message. 16. The access terminal of claim 15, wherein the capability indication message is adapted to identify the access terminal as stationary, as power sensitive, or both. 17. The access terminal of claim 15, wherein the at least one altered performance attribute includes one or more altered performance attributes selected from a group of altered performance attributes comprising reception of a page message transmitted to a limited paging area corresponding to a location recently associated with the access terminal, reception of a direct channel assignment sent without a preceding page, a reduced dormancy timer, a fast call setup, and an increased point-to-point protocol (PPP) inactivity timer. 18. A computer-readable storage medium, comprising programming for causing a computer to: transmit a capability indication message adapted to identify at least one capability associated with an access terminal; and employ at least one altered performance attribute associated with the at least one capability identified in the capability indication message. 19. The computer-readable storage medium of claim 18, further comprising programming for causing a computer to: identify the at least one capability associated with the access terminal. 20. The computer-readable storage medium of claim 18, wherein the capability indication message is adapted to identify the access terminal as stationary, as power sensitive, or both stationary and power sensitive. 21. The computer-readable storage medium of claim 18, wherein the at least one altered performance attribute includes one or more altered performance attributes selected from a group of altered performance attributes comprising reception of a page message transmitted to a limited paging area corresponding to a location recently associated with the access terminal, reception of a direct channel assignment sent without a preceding page, a reduced value for a dormancy timer, a fast call setup, and an increased point-to-point protocol (PPP) inactivity timer. 22. A network node, comprising: a communications interface; a storage medium; and a processing circuit coupled to the communications interface and the storage medium, the processing circuit adapted to: receive a capability indication message via the communications interface, wherein the capability indication message identifies at least one capability associated with an access terminal; and employ at least one adjusted performance attribute for the access terminal, where the at least one adjusted performance attribute is associated with the at least one capability identified in the received capability indication message. 23. The network node of claim 22, wherein the capability indication message is received in a general extension message. 24. The network node of claim 22, wherein the capability indication message identifies the access terminal as stationary. 25. The network node of claim 24, wherein the at least one adjusted performance attribute comprises at least one adjusted performance attribute selected from a group of adjusted performance attributes comprising: transmission of a page message for the access terminal to a limited paging area corresponding to a location recently associated with the access terminal; and transmission of a direct channel assignment to the access terminal without a previously transmitted page message. 26. The network node of claim 22, wherein the capability indication message identifies the access terminal as power sensitive. 27. The network node of claim 26, wherein the at least one adjusted performance attribute comprises at least one adjusted performance attribute selected from a group of adjusted performance attributes comprising: a reduced duration for a dormancy timer associated with the access terminal; transmission of a direct channel assignment to the access terminal without a previously transmitted page message; a fast call setup procedure for the access terminal; and an increased duration of a point-to-point protocol (PPP) inactivity timer associated with the access terminal. 28. The network node of claim 22, wherein the processing circuit is adapted to: identify the at least one adjusted performance attribute associated with the at least one capability identified in the received capability indication message. 29. A method operational on a network node, comprising: receiving a capability indication message identifying at least one capability associated with an access terminal; and employing at least one adjusted performance attribute for the access terminal, where the at least one adjusted performance attribute is selected based on the at least one capability identified in the received capability indication message. 30. The method of claim 29, wherein receiving the capability indication message comprises: receiving a general extension message comprising the capability indication message. 31. The method of claim 29, wherein receiving the capability indication message identifying at least one capability associated with an access terminal comprises: receiving the capability indication message identifying the access terminal as an at least substantially stationary device. 32. The method of claim 31, wherein employing the at least one adjusted performance attribute for the access terminal comprises: employing a limited paging area for transmitting a page message for the access terminal, the limited paging area corresponding to a location recently associated with the access terminal. 33. The method of claim 32, wherein employing the limited paging area for transmitting a page message for the access terminal, the limited paging area corresponding to the location recently associated with the access terminal comprises: transmitting the page message over a set of cells corresponding to a recent active set for the access terminal. 34. The method of claim 31, wherein employing the at least one adjusted performance attribute for the access terminal comprises: transmitting a direct channel assignment to the access terminal without previously transmitting a page message. 35. The method of claim 29, wherein receiving the capability indication message identifying at least one capability associated with an access terminal comprises: receiving the capability indication message identifying the access terminal as a power-sensitive device. 36. The method of claim 35, wherein employing the at least one adjusted performance attribute for the access terminal comprises: employing a reduced dormancy timer for the access terminal. 37. The method of claim 35, wherein employing the at least one adjusted performance attribute for the access terminal comprises: performing a fast call setup with the access terminal. 38. The method of claim 35, wherein employing the at least one adjusted performance attribute for the access terminal comprises: employing an increased point-to-point protocol (PPP) inactivity timer for the access terminal. 39. A network node, comprising: means for receiving a capability indication message identifying at least one capability associated with an access terminal; and means for employing at least one adjusted performance attribute for the access terminal, where the at least one adjusted performance attribute is selected based on the at least one capability identified in the received capability indication message. 40. The network node of claim 39, wherein the capability indication message identifies the access terminal as a stationary device, a power-sensitive device, or both a stationary and power-sensitive device. 41. The network node of claim 39, wherein the at least one adjusted performance attribute comprises at least one adjusted performance attribute selected from a group of adjusted performance attributes comprising: transmission of a page message for the access terminal to a limited paging area corresponding to a location recently associated with the access terminal; transmission of a direct channel assignment to the access terminal without a previously transmitted page message; a reduced duration for a dormancy timer associated with the access terminal; a fast call setup procedure for the access terminal; and an increased duration of a point-to-point protocol (PPP) inactivity timer associated with the access terminal. 42. A computer-readable storage medium, comprising programming for causing a computer to: receive a capability indication message identifying at least one capability associated with an access terminal; and employ at least one adjusted performance attribute for the access terminal, where the at least one adjusted performance attribute is selected based on the at least one capability identified in the received capability indication message. 43. The computer-readable storage medium of claim 42, wherein the capability indication message identifies the access terminal as a stationary device, a power-sensitive device, or both a stationary and power-sensitive device. 44. The computer-readable storage medium of claim 42, wherein the at least one adjusted performance attribute comprises at least one adjusted performance attribute selected from a group of adjusted performance attributes comprising transmission of a page message for the access terminal to a limited paging area corresponding to a location recently associated with the access terminal, transmission of a direct channel assignment to the access terminal without a previously transmitted page message, a reduced duration for a dormancy timer associated with the access terminal, a fast call setup procedure for the access terminal, and an increased duration of a point-to-point protocol (PPP) inactivity timer associated with the access terminal.
Access terminals are adapted to identify one or more capabilities (e.g., characteristics, features). Such an access terminal can send a capability indication message to a network node. The capability indication message is adapted to identify at least one capability associated with the access terminal. The network node can receive the capability indication message and can identify one or more performance attributes associated with each identified capability of the access terminal, which performance attributes can be beneficially altered or optimized in light of the identified capabilities. The network node and the access terminal can then employ one or more adjusted performance attributes associated with each identified capability. Other aspects, embodiments, and features are also included.1. An access terminal, comprising: a communications interface; a storage medium; and a processing circuit coupled to the communications interface and the storage medium, the processing circuit adapted to: send, via the communications interface, a capability indication message adapted to identify at least one capability associated with the access terminal; and employ at least one altered performance attribute associated with the at least one capability identified in the capability indication message. 2. The access terminal of claim 1, wherein the processing circuit is further adapted to: identify the at least one capability associated with the access terminal. 3. The access terminal of claim 1, wherein the capability indication message is sent in a general extension message. 4. The access terminal of claim 1, wherein the capability indication message is adapted to identify the access terminal as stationary. 5. The access terminal of claim 1, wherein the capability indication message is adapted to identify the access terminal as power sensitive. 6. The access terminal of claim 1, wherein the at least one altered performance attribute includes one or more altered performance attributes selected from a group of altered performance attributes comprising: reception of a page message transmitted to a limited paging area corresponding to a location recently associated with the access terminal; reception of a direct channel assignment sent without a preceding page; a reduced dormancy timer; a fast call setup; and an increased point-to-point protocol (PPP) inactivity timer. 7. A method operational on an access terminal, comprising: identifying at least one capability associated with the access terminal; transmitting a capability indication message adapted to identify the at least one identified capability associated with the access terminal; and employing at least one adjusted performance attribute associated with the at least one capability identified in the capability indication message. 8. The method of claim 7, wherein transmitting the capability indication message adapted to identify the at least one identified capability associated with the access terminal comprises: transmitting the capability indication message adapted to identify the access terminal as stationary. 9. The method of claim 7, wherein transmitting the capability indication message adapted to identify the at least one identified capability associated with the access terminal comprises: transmitting the capability indication message adapted to identify the access terminal as power sensitive. 10. The method of claim 7, wherein employing at least one adjusted performance attribute comprises: receiving a page message transmitted to a limited paging area corresponding to a location recently associated with the access terminal. 11. The method of claim 7, wherein employing at least one adjusted performance attribute comprises: receiving a direct channel assignment sent without a preceding page. 12. The method of claim 7, wherein employing at least one adjusted performance attribute comprises: receiving a reduced value for a dormancy timer. 13. The method of claim 7, wherein employing at least one adjusted performance attribute comprises: performing a fast call setup. 14. The method of claim 7, wherein employing at least one adjusted performance attribute comprises: receiving an increased point-to-point protocol (PPP) inactivity timer. 15. An access terminal, comprising: means for identifying at least one capability associated with the access terminal; means for transmitting a capability indication message adapted to identify the at least one identified capability associated with the access terminal; and means for employing at least one adjusted performance attribute associated with the at least one capability identified in the capability indication message. 16. The access terminal of claim 15, wherein the capability indication message is adapted to identify the access terminal as stationary, as power sensitive, or both. 17. The access terminal of claim 15, wherein the at least one altered performance attribute includes one or more altered performance attributes selected from a group of altered performance attributes comprising reception of a page message transmitted to a limited paging area corresponding to a location recently associated with the access terminal, reception of a direct channel assignment sent without a preceding page, a reduced dormancy timer, a fast call setup, and an increased point-to-point protocol (PPP) inactivity timer. 18. A computer-readable storage medium, comprising programming for causing a computer to: transmit a capability indication message adapted to identify at least one capability associated with an access terminal; and employ at least one altered performance attribute associated with the at least one capability identified in the capability indication message. 19. The computer-readable storage medium of claim 18, further comprising programming for causing a computer to: identify the at least one capability associated with the access terminal. 20. The computer-readable storage medium of claim 18, wherein the capability indication message is adapted to identify the access terminal as stationary, as power sensitive, or both stationary and power sensitive. 21. The computer-readable storage medium of claim 18, wherein the at least one altered performance attribute includes one or more altered performance attributes selected from a group of altered performance attributes comprising reception of a page message transmitted to a limited paging area corresponding to a location recently associated with the access terminal, reception of a direct channel assignment sent without a preceding page, a reduced value for a dormancy timer, a fast call setup, and an increased point-to-point protocol (PPP) inactivity timer. 22. A network node, comprising: a communications interface; a storage medium; and a processing circuit coupled to the communications interface and the storage medium, the processing circuit adapted to: receive a capability indication message via the communications interface, wherein the capability indication message identifies at least one capability associated with an access terminal; and employ at least one adjusted performance attribute for the access terminal, where the at least one adjusted performance attribute is associated with the at least one capability identified in the received capability indication message. 23. The network node of claim 22, wherein the capability indication message is received in a general extension message. 24. The network node of claim 22, wherein the capability indication message identifies the access terminal as stationary. 25. The network node of claim 24, wherein the at least one adjusted performance attribute comprises at least one adjusted performance attribute selected from a group of adjusted performance attributes comprising: transmission of a page message for the access terminal to a limited paging area corresponding to a location recently associated with the access terminal; and transmission of a direct channel assignment to the access terminal without a previously transmitted page message. 26. The network node of claim 22, wherein the capability indication message identifies the access terminal as power sensitive. 27. The network node of claim 26, wherein the at least one adjusted performance attribute comprises at least one adjusted performance attribute selected from a group of adjusted performance attributes comprising: a reduced duration for a dormancy timer associated with the access terminal; transmission of a direct channel assignment to the access terminal without a previously transmitted page message; a fast call setup procedure for the access terminal; and an increased duration of a point-to-point protocol (PPP) inactivity timer associated with the access terminal. 28. The network node of claim 22, wherein the processing circuit is adapted to: identify the at least one adjusted performance attribute associated with the at least one capability identified in the received capability indication message. 29. A method operational on a network node, comprising: receiving a capability indication message identifying at least one capability associated with an access terminal; and employing at least one adjusted performance attribute for the access terminal, where the at least one adjusted performance attribute is selected based on the at least one capability identified in the received capability indication message. 30. The method of claim 29, wherein receiving the capability indication message comprises: receiving a general extension message comprising the capability indication message. 31. The method of claim 29, wherein receiving the capability indication message identifying at least one capability associated with an access terminal comprises: receiving the capability indication message identifying the access terminal as an at least substantially stationary device. 32. The method of claim 31, wherein employing the at least one adjusted performance attribute for the access terminal comprises: employing a limited paging area for transmitting a page message for the access terminal, the limited paging area corresponding to a location recently associated with the access terminal. 33. The method of claim 32, wherein employing the limited paging area for transmitting a page message for the access terminal, the limited paging area corresponding to the location recently associated with the access terminal comprises: transmitting the page message over a set of cells corresponding to a recent active set for the access terminal. 34. The method of claim 31, wherein employing the at least one adjusted performance attribute for the access terminal comprises: transmitting a direct channel assignment to the access terminal without previously transmitting a page message. 35. The method of claim 29, wherein receiving the capability indication message identifying at least one capability associated with an access terminal comprises: receiving the capability indication message identifying the access terminal as a power-sensitive device. 36. The method of claim 35, wherein employing the at least one adjusted performance attribute for the access terminal comprises: employing a reduced dormancy timer for the access terminal. 37. The method of claim 35, wherein employing the at least one adjusted performance attribute for the access terminal comprises: performing a fast call setup with the access terminal. 38. The method of claim 35, wherein employing the at least one adjusted performance attribute for the access terminal comprises: employing an increased point-to-point protocol (PPP) inactivity timer for the access terminal. 39. A network node, comprising: means for receiving a capability indication message identifying at least one capability associated with an access terminal; and means for employing at least one adjusted performance attribute for the access terminal, where the at least one adjusted performance attribute is selected based on the at least one capability identified in the received capability indication message. 40. The network node of claim 39, wherein the capability indication message identifies the access terminal as a stationary device, a power-sensitive device, or both a stationary and power-sensitive device. 41. The network node of claim 39, wherein the at least one adjusted performance attribute comprises at least one adjusted performance attribute selected from a group of adjusted performance attributes comprising: transmission of a page message for the access terminal to a limited paging area corresponding to a location recently associated with the access terminal; transmission of a direct channel assignment to the access terminal without a previously transmitted page message; a reduced duration for a dormancy timer associated with the access terminal; a fast call setup procedure for the access terminal; and an increased duration of a point-to-point protocol (PPP) inactivity timer associated with the access terminal. 42. A computer-readable storage medium, comprising programming for causing a computer to: receive a capability indication message identifying at least one capability associated with an access terminal; and employ at least one adjusted performance attribute for the access terminal, where the at least one adjusted performance attribute is selected based on the at least one capability identified in the received capability indication message. 43. The computer-readable storage medium of claim 42, wherein the capability indication message identifies the access terminal as a stationary device, a power-sensitive device, or both a stationary and power-sensitive device. 44. The computer-readable storage medium of claim 42, wherein the at least one adjusted performance attribute comprises at least one adjusted performance attribute selected from a group of adjusted performance attributes comprising transmission of a page message for the access terminal to a limited paging area corresponding to a location recently associated with the access terminal, transmission of a direct channel assignment to the access terminal without a previously transmitted page message, a reduced duration for a dormancy timer associated with the access terminal, a fast call setup procedure for the access terminal, and an increased duration of a point-to-point protocol (PPP) inactivity timer associated with the access terminal.
2,400
6,970
6,970
14,214,794
2,486
The disclosure extends to systems and methods for reducing the area of an image sensor by employing bi-directional pads used for both image data issuance and configuration command reception and internal supply voltage generation, for reducing the number of conductors in an endoscope system.
1. An endoscopic device comprising: a CMOS image sensor having an area sufficient to be located near a tip of a distal end of the endoscopic device; a plurality of on-chip registers for configuring the image sensor operation; and a plurality of pads having an output state and an input state for sending and receiving data; wherein the pads automatically switch between the output state and the input state; wherein when the pads are in the output state image data is output from the image sensor during a rolling-readout time frame and wherein when the pads are in the input state they receive control commands for the operation of the image sensor. 2. The endoscopic device of claim 1, further comprising a frame period that is divided into three defined states: a rolling-readout state during which image data is output through the pads, a service-line state during which non-image data is output through the pads, and a configuration state during which the instruction data is received by the image sensor through the pads. 3. The endoscopic device of claim 2, further comprising a state identifier that identifies what state the pads are in during an operation cycle over the system. 4. The endoscopic device of claim 2, wherein during the rolling-readout state and service-line state the camera system may not issue slow-control commands. 5. The endoscopic device of claim 2, further comprising an emitter wherein pulse control corresponds to the pad state. 6. The endoscopic device of claim 5, wherein a pulse is emitted during the configuration state. 7. The endoscopic device of claim 5, wherein a pulse is emitted during the service-line state. 8. The endoscopic device of claim 5, wherein a pulse is emitted during the service line-state and configuration state. 9. An endoscopic system comprising: An endoscope comprising: an image sensor disposed near a tip of a distal end of a lumen of the endoscope; a plurality of on-chip registers for configuring the image sensor operation; and a plurality of pads having an output state and an input state for sending and receiving data; wherein the pads automatically switch between the output state and the input state wherein when the pads are in the output state image data is output from the image sensor during a rolling-readout time frame and wherein when the pads are in the input state they receive control commands for the operation of the image sensor; a plurality of on-chip registers used to configure sensor operation; wherein a plurality of the pads are incorporating bi-direction data pads that output issue image data during a defined portion of the frame timing, and output other types of data during another portion of the frame; and wherein the pads switch direction and receive commands from the external camera system during a third defined time period during the specific frame time period. 10. The endoscopic system of claim 9, further comprising a serial command protocol used by a camera system to electronically communicate with the sensor when the pads are in a receive state. 11. The endoscopic system of claim 9, further comprising a protocol for configuring on-chip registers. 12. The endoscopic system of claim 9, further comprising a clock for coordinating the function of external devices in electronic communication with the endoscopic system. 13. The endoscopic system of claim 9, wherein the image sensor is a minimal area CMOS image sensor for use at a distal end of the endoscope. 14. The endoscopic system of claim 13, further comprising a voltage converter to provide power to at least the image sensor circuitry from an external power supply source. 15. The endoscopic system of claim 9, further comprising a plurality voltage converters. 16. The endoscopic system of claim 14, wherein the voltage converter is an up converter. 17. The endoscopic system of claim 14, wherein the voltage converter is a down converter. 18. The endoscopic system of claim 9, further comprising a single signal of data to a sensor. 19. The endoscopic system of claim 9, further comprising a plurality of data signals to a sensor. 20. The endoscopic system of claim 9, further comprising a switch-cap DC-DC converter. 21. The endoscopic system of claim 9, further comprising a LDO converter. 22. The endoscopic system of claim 9, further comprising a switch-cap DC-DC converter and a LDO converter. 23. The endoscopic system of claim 9, further comprising analog data from the device to the sensor and an analog to digital converter on the sensor to receive external device data. 24. The endoscopic system of claim 9, further comprising a standard serial protocol used to transmit digital data from device to sensor. 25. The endoscopic system of claim 9, further comprising a user interface having a button that may be pressed by an operator to aid in the operation of the endoscope. 26. The endoscopic system of claim 9, further comprising an angle sensor to determine an angle of an endoscope lumen relative a hand-piece. 27. The endoscopic system of claim 26, wherein the angle sensor is of Hall Effect type. 28. The endoscopic system of claim 26, wherein the angle sensor is of potentiometer type. 29. The endoscopic system of claim 26, wherein the angle sensor is of optoelectronic type. 30. The endoscopic system of claim 9, further comprising a frame period that is divided into three defined states: a rolling-readout state during which image data is output through the pads, a service-line state during which non-image data is output through the pads, and a configuration state during which the instruction data is received by the image sensor through the pads. 31. The endoscopic system of claim 30, further comprising a state identifier that identifies what state the pads are in during an operation cycle over the system. 32. The endoscopic system of claim 30, wherein during the rolling-readout state and service-line state the camera system may not issue slow-control commands. 33. The endoscopic system of claim 30, further comprising an emitter wherein pulse control corresponds to the pad state. 34. The endoscopic system of claim 33, wherein a pulse is emitted during the configuration state. 35. The endoscopic system of claim 33, wherein a pulse is emitted during the service-line state. 36. The endoscopic system of claim 33, wherein a pulse is emitted during the service line-state and configuration state.
The disclosure extends to systems and methods for reducing the area of an image sensor by employing bi-directional pads used for both image data issuance and configuration command reception and internal supply voltage generation, for reducing the number of conductors in an endoscope system.1. An endoscopic device comprising: a CMOS image sensor having an area sufficient to be located near a tip of a distal end of the endoscopic device; a plurality of on-chip registers for configuring the image sensor operation; and a plurality of pads having an output state and an input state for sending and receiving data; wherein the pads automatically switch between the output state and the input state; wherein when the pads are in the output state image data is output from the image sensor during a rolling-readout time frame and wherein when the pads are in the input state they receive control commands for the operation of the image sensor. 2. The endoscopic device of claim 1, further comprising a frame period that is divided into three defined states: a rolling-readout state during which image data is output through the pads, a service-line state during which non-image data is output through the pads, and a configuration state during which the instruction data is received by the image sensor through the pads. 3. The endoscopic device of claim 2, further comprising a state identifier that identifies what state the pads are in during an operation cycle over the system. 4. The endoscopic device of claim 2, wherein during the rolling-readout state and service-line state the camera system may not issue slow-control commands. 5. The endoscopic device of claim 2, further comprising an emitter wherein pulse control corresponds to the pad state. 6. The endoscopic device of claim 5, wherein a pulse is emitted during the configuration state. 7. The endoscopic device of claim 5, wherein a pulse is emitted during the service-line state. 8. The endoscopic device of claim 5, wherein a pulse is emitted during the service line-state and configuration state. 9. An endoscopic system comprising: An endoscope comprising: an image sensor disposed near a tip of a distal end of a lumen of the endoscope; a plurality of on-chip registers for configuring the image sensor operation; and a plurality of pads having an output state and an input state for sending and receiving data; wherein the pads automatically switch between the output state and the input state wherein when the pads are in the output state image data is output from the image sensor during a rolling-readout time frame and wherein when the pads are in the input state they receive control commands for the operation of the image sensor; a plurality of on-chip registers used to configure sensor operation; wherein a plurality of the pads are incorporating bi-direction data pads that output issue image data during a defined portion of the frame timing, and output other types of data during another portion of the frame; and wherein the pads switch direction and receive commands from the external camera system during a third defined time period during the specific frame time period. 10. The endoscopic system of claim 9, further comprising a serial command protocol used by a camera system to electronically communicate with the sensor when the pads are in a receive state. 11. The endoscopic system of claim 9, further comprising a protocol for configuring on-chip registers. 12. The endoscopic system of claim 9, further comprising a clock for coordinating the function of external devices in electronic communication with the endoscopic system. 13. The endoscopic system of claim 9, wherein the image sensor is a minimal area CMOS image sensor for use at a distal end of the endoscope. 14. The endoscopic system of claim 13, further comprising a voltage converter to provide power to at least the image sensor circuitry from an external power supply source. 15. The endoscopic system of claim 9, further comprising a plurality voltage converters. 16. The endoscopic system of claim 14, wherein the voltage converter is an up converter. 17. The endoscopic system of claim 14, wherein the voltage converter is a down converter. 18. The endoscopic system of claim 9, further comprising a single signal of data to a sensor. 19. The endoscopic system of claim 9, further comprising a plurality of data signals to a sensor. 20. The endoscopic system of claim 9, further comprising a switch-cap DC-DC converter. 21. The endoscopic system of claim 9, further comprising a LDO converter. 22. The endoscopic system of claim 9, further comprising a switch-cap DC-DC converter and a LDO converter. 23. The endoscopic system of claim 9, further comprising analog data from the device to the sensor and an analog to digital converter on the sensor to receive external device data. 24. The endoscopic system of claim 9, further comprising a standard serial protocol used to transmit digital data from device to sensor. 25. The endoscopic system of claim 9, further comprising a user interface having a button that may be pressed by an operator to aid in the operation of the endoscope. 26. The endoscopic system of claim 9, further comprising an angle sensor to determine an angle of an endoscope lumen relative a hand-piece. 27. The endoscopic system of claim 26, wherein the angle sensor is of Hall Effect type. 28. The endoscopic system of claim 26, wherein the angle sensor is of potentiometer type. 29. The endoscopic system of claim 26, wherein the angle sensor is of optoelectronic type. 30. The endoscopic system of claim 9, further comprising a frame period that is divided into three defined states: a rolling-readout state during which image data is output through the pads, a service-line state during which non-image data is output through the pads, and a configuration state during which the instruction data is received by the image sensor through the pads. 31. The endoscopic system of claim 30, further comprising a state identifier that identifies what state the pads are in during an operation cycle over the system. 32. The endoscopic system of claim 30, wherein during the rolling-readout state and service-line state the camera system may not issue slow-control commands. 33. The endoscopic system of claim 30, further comprising an emitter wherein pulse control corresponds to the pad state. 34. The endoscopic system of claim 33, wherein a pulse is emitted during the configuration state. 35. The endoscopic system of claim 33, wherein a pulse is emitted during the service-line state. 36. The endoscopic system of claim 33, wherein a pulse is emitted during the service line-state and configuration state.
2,400
6,971
6,971
14,011,173
2,482
Virtual access control may include detecting entry of a person into a virtual controlled zone, and counting and/or identifying people including the person entering into the virtual controlled zone. Virtual access control may further include determining an authorization of the person to continue through the virtual controlled zone based on a facial identification of the person, and alerting the person to stop, exit from, or continue through the virtual controlled zone based on the determined authorization. An alarm may be generated if the person violates directions provided by the alert.
1. A method for virtual access control, the method comprising: detecting entry of a person into a virtual controlled zone; at least one of counting and identifying people including the person entering into the virtual controlled zone; determining, by a processor, an authorization of the person to continue through the virtual controlled zone based on a facial identification of the person; alerting the person to stop, exit from, or continue through the virtual controlled zone based on the determined authorization; and generating an alarm if the person violates directions provided by the alert. 2. The method of claim 1, wherein alerting the person to stop, exit from, or continue through the virtual controlled zone further comprises: displaying at least one of arrows and crosses on a graphical user interface (GUI) in predetermined directions and in predetermined colors to alert the person to stop, exit from, or continue through the virtual controlled zone. 3. The method of claim 1, wherein alerting the person to stop, exit from, or continue through the virtual controlled zone further comprises: using at least one of floor lighting, wall lighting, and an audible signal to alert the person to stop, exit from, or continue through the virtual controlled zone. 4. The method of claim 1, wherein alerting the person to stop, exit from, or continue through the virtual controlled zone further comprises: using wall lighting that includes primary entry and exit lights disposed adjacent a primary entry location of the virtual controlled zone; and using secondary entry and exit lights disposed adjacent a secondary entry location of the virtual controlled zone that is disposed generally opposite to the primary entry location. 5. The method of claim 1, wherein alerting the person to stop, exit from, or continue through the virtual controlled zone further comprises: using floor lighting that forms at least one of arrows and crosses in predetermined directions and in predetermined colors to alert the person to stop, exit from, or continue through the virtual controlled zone. 6. The method of claim 1, wherein alerting the person to stop, exit from, or continue through the virtual controlled zone further comprises: displaying a symbol on a graphical user interface (GUI) to indicate an overcrowded state of the virtual controlled zone. 7. The method of claim 1, wherein alerting the person to stop, exit from, or continue through the virtual controlled zone further comprises: determining a state of occupancy of the virtual controlled zone; and generating different alerts for the person to stop, exit from, or continue through the virtual controlled zone based on different states of occupancy including the state of occupancy of the virtual controlled zone. 8. The method of claim 7, wherein the different states of occupancy include: a state of occupancy including at least one of a primary enter state into the virtual controlled zone, a primary exit state from the virtual controlled zone, a central empty state for the virtual controlled zone, a central occupied state for the virtual controlled zone, a central over-crowded state for the virtual controlled zone, a decision accept state based on the determined authorization to allow the person to continue through the virtual controlled zone, and a decision deny state based on the determined authorization to deny the person from continuing through the virtual controlled zone. 9. The method of claim 1, wherein generating an alarm if the person violates directions provided by the alert further comprises: generating a visual or audible alarm if the person violates directions provided by the alert. 10. The method of claim 1, wherein counting people including the person entering into the virtual controlled zone further comprises: determining an area of the person's head in a downward direction; comparing the area of the person's head to an area of the virtual controlled zone; and determining a number of people in the virtual controlled zone based on the comparison. 11. The method of claim 1, wherein counting people including the person entering into the virtual controlled zone further comprises: determining a difference between entry and exit signals of the people that respectively enter and exit the virtual controlled zone. 12. The method of claim 1, wherein identifying people including the person entering into the virtual controlled zone further comprises: comparing a two-dimensional (2D) image of the face of the person against previously captured images of faces of people; and identifying the person based on a match of the 2D image of the face of the person to one of the previously captured images of faces of people. 13. The method of claim 1, wherein identifying people including the person entering into the virtual controlled zone further comprises: capturing a two-dimensional (2D) image of the face of the person by using a camera; determining an angle of the face of the person relative to a central axis of the camera; determining if the angle of the face of the person is less than or equal to a predetermined threshold relative to the central axis of the camera; based on a determination that the angle of the face of the person is less than or equal to the predetermined threshold, converting the 2D image to a 3D image model; and using the 3D image model to identify the person based on a match of the 3D image model to one of the previously captured 2D images of faces of people. 14. The method of claim 13, wherein the predetermined threshold is approximately ±45° relative to the central axis of the camera. 15. The method of claim 13, wherein using the 3D image model to identify the person based on a match of the 3D image model to one of the previously captured 2D images of faces of people further comprises: rotating the 3D image model to an angle approximately equal to the angle of the face of the person in the 2D image of the face of the person; and analyzing the rotated 3D image model to determine if the rotated 3D image model matches one of the previously captured 2D images of faces of people. 16. The method of claim 1, wherein identifying people including the person entering into the virtual controlled zone further comprises: capturing a two-dimensional (2D) image of the face of the person by using a camera; determining an angle of the face of the person relative to a central axis of the camera; determining if the angle of the face of the person is less than or equal to a predetermined threshold relative to the central axis of the camera; based on a determination that the angle of the face of the person is less than or equal to the predetermined threshold, converting the 2D image to a 3D image model; rotating the 3D image model to an angle approximately equal to the central axis of the camera; generating a 2D image based on the rotated 3D model; comparing the generated 2D image against previously captured images of faces of people; and identifying the person based on a match of the generated 2D image of the face of the person to one of the previously captured 2D images of faces of people. 17. The method of claim 16, wherein the predetermined threshold is approximately ±30° relative to the central axis of the camera for a uniform background and approximately ±45° relative to the central axis of the camera for a non-uniform background. 18. The method of claim 16, wherein identifying people including the person entering into the virtual controlled zone further comprises: using the 3D image model to further identify the person based on a match of the 3D image model to one of the previously captured 2D images of faces of people. 19. A virtual access control system comprising: a memory storing machine readable instructions to: detect entry of a person into a virtual controlled zone; at least one of count and identify people including the person entering into the virtual controlled zone; determine an authorization of the person to continue through the virtual controlled zone based on at least one of a facial and an information based identification of the person; alert the person to stop, exit from, or continue through the virtual controlled zone based on the determined authorization; and generate an alarm if the person violates directions provided by the alert; and a processor to implement the machine readable instructions. 20. A non-transitory computer readable medium having stored thereon machine readable instructions for virtual access control, the machine readable instructions when executed cause a computer system to: detect entry of a person into a virtual controlled zone; at least one of count and identify people including the person entering into the virtual controlled zone; determine, by a processor, an authorization of the person to continue through the virtual controlled zone based on at least one of a facial and an information based identification of the person; alert the person to stop, exit from, or continue through the virtual controlled zone based on the determined authorization; and generate an alarm if the person violates directions provided by the alert.
Virtual access control may include detecting entry of a person into a virtual controlled zone, and counting and/or identifying people including the person entering into the virtual controlled zone. Virtual access control may further include determining an authorization of the person to continue through the virtual controlled zone based on a facial identification of the person, and alerting the person to stop, exit from, or continue through the virtual controlled zone based on the determined authorization. An alarm may be generated if the person violates directions provided by the alert.1. A method for virtual access control, the method comprising: detecting entry of a person into a virtual controlled zone; at least one of counting and identifying people including the person entering into the virtual controlled zone; determining, by a processor, an authorization of the person to continue through the virtual controlled zone based on a facial identification of the person; alerting the person to stop, exit from, or continue through the virtual controlled zone based on the determined authorization; and generating an alarm if the person violates directions provided by the alert. 2. The method of claim 1, wherein alerting the person to stop, exit from, or continue through the virtual controlled zone further comprises: displaying at least one of arrows and crosses on a graphical user interface (GUI) in predetermined directions and in predetermined colors to alert the person to stop, exit from, or continue through the virtual controlled zone. 3. The method of claim 1, wherein alerting the person to stop, exit from, or continue through the virtual controlled zone further comprises: using at least one of floor lighting, wall lighting, and an audible signal to alert the person to stop, exit from, or continue through the virtual controlled zone. 4. The method of claim 1, wherein alerting the person to stop, exit from, or continue through the virtual controlled zone further comprises: using wall lighting that includes primary entry and exit lights disposed adjacent a primary entry location of the virtual controlled zone; and using secondary entry and exit lights disposed adjacent a secondary entry location of the virtual controlled zone that is disposed generally opposite to the primary entry location. 5. The method of claim 1, wherein alerting the person to stop, exit from, or continue through the virtual controlled zone further comprises: using floor lighting that forms at least one of arrows and crosses in predetermined directions and in predetermined colors to alert the person to stop, exit from, or continue through the virtual controlled zone. 6. The method of claim 1, wherein alerting the person to stop, exit from, or continue through the virtual controlled zone further comprises: displaying a symbol on a graphical user interface (GUI) to indicate an overcrowded state of the virtual controlled zone. 7. The method of claim 1, wherein alerting the person to stop, exit from, or continue through the virtual controlled zone further comprises: determining a state of occupancy of the virtual controlled zone; and generating different alerts for the person to stop, exit from, or continue through the virtual controlled zone based on different states of occupancy including the state of occupancy of the virtual controlled zone. 8. The method of claim 7, wherein the different states of occupancy include: a state of occupancy including at least one of a primary enter state into the virtual controlled zone, a primary exit state from the virtual controlled zone, a central empty state for the virtual controlled zone, a central occupied state for the virtual controlled zone, a central over-crowded state for the virtual controlled zone, a decision accept state based on the determined authorization to allow the person to continue through the virtual controlled zone, and a decision deny state based on the determined authorization to deny the person from continuing through the virtual controlled zone. 9. The method of claim 1, wherein generating an alarm if the person violates directions provided by the alert further comprises: generating a visual or audible alarm if the person violates directions provided by the alert. 10. The method of claim 1, wherein counting people including the person entering into the virtual controlled zone further comprises: determining an area of the person's head in a downward direction; comparing the area of the person's head to an area of the virtual controlled zone; and determining a number of people in the virtual controlled zone based on the comparison. 11. The method of claim 1, wherein counting people including the person entering into the virtual controlled zone further comprises: determining a difference between entry and exit signals of the people that respectively enter and exit the virtual controlled zone. 12. The method of claim 1, wherein identifying people including the person entering into the virtual controlled zone further comprises: comparing a two-dimensional (2D) image of the face of the person against previously captured images of faces of people; and identifying the person based on a match of the 2D image of the face of the person to one of the previously captured images of faces of people. 13. The method of claim 1, wherein identifying people including the person entering into the virtual controlled zone further comprises: capturing a two-dimensional (2D) image of the face of the person by using a camera; determining an angle of the face of the person relative to a central axis of the camera; determining if the angle of the face of the person is less than or equal to a predetermined threshold relative to the central axis of the camera; based on a determination that the angle of the face of the person is less than or equal to the predetermined threshold, converting the 2D image to a 3D image model; and using the 3D image model to identify the person based on a match of the 3D image model to one of the previously captured 2D images of faces of people. 14. The method of claim 13, wherein the predetermined threshold is approximately ±45° relative to the central axis of the camera. 15. The method of claim 13, wherein using the 3D image model to identify the person based on a match of the 3D image model to one of the previously captured 2D images of faces of people further comprises: rotating the 3D image model to an angle approximately equal to the angle of the face of the person in the 2D image of the face of the person; and analyzing the rotated 3D image model to determine if the rotated 3D image model matches one of the previously captured 2D images of faces of people. 16. The method of claim 1, wherein identifying people including the person entering into the virtual controlled zone further comprises: capturing a two-dimensional (2D) image of the face of the person by using a camera; determining an angle of the face of the person relative to a central axis of the camera; determining if the angle of the face of the person is less than or equal to a predetermined threshold relative to the central axis of the camera; based on a determination that the angle of the face of the person is less than or equal to the predetermined threshold, converting the 2D image to a 3D image model; rotating the 3D image model to an angle approximately equal to the central axis of the camera; generating a 2D image based on the rotated 3D model; comparing the generated 2D image against previously captured images of faces of people; and identifying the person based on a match of the generated 2D image of the face of the person to one of the previously captured 2D images of faces of people. 17. The method of claim 16, wherein the predetermined threshold is approximately ±30° relative to the central axis of the camera for a uniform background and approximately ±45° relative to the central axis of the camera for a non-uniform background. 18. The method of claim 16, wherein identifying people including the person entering into the virtual controlled zone further comprises: using the 3D image model to further identify the person based on a match of the 3D image model to one of the previously captured 2D images of faces of people. 19. A virtual access control system comprising: a memory storing machine readable instructions to: detect entry of a person into a virtual controlled zone; at least one of count and identify people including the person entering into the virtual controlled zone; determine an authorization of the person to continue through the virtual controlled zone based on at least one of a facial and an information based identification of the person; alert the person to stop, exit from, or continue through the virtual controlled zone based on the determined authorization; and generate an alarm if the person violates directions provided by the alert; and a processor to implement the machine readable instructions. 20. A non-transitory computer readable medium having stored thereon machine readable instructions for virtual access control, the machine readable instructions when executed cause a computer system to: detect entry of a person into a virtual controlled zone; at least one of count and identify people including the person entering into the virtual controlled zone; determine, by a processor, an authorization of the person to continue through the virtual controlled zone based on at least one of a facial and an information based identification of the person; alert the person to stop, exit from, or continue through the virtual controlled zone based on the determined authorization; and generate an alarm if the person violates directions provided by the alert.
2,400
6,972
6,972
15,272,937
2,465
Techniques for sending control information to support operation on multiple component carriers (CCs) are disclosed. A user equipment (UE) may be configured with multiple CCs for carrier aggregation. The multiple CCs may be associated with different uplink-downlink configurations and may have different downlink subframes and uplink subframes. In one aspect, uplink control information (UCI) for a secondary CC (SCC) may be sent on a primary CC (PCC) based on a UCI transmission timeline for the PCC (and not based on a UCI transmission timeline for the SCC). For example, a downlink grant for the SCC may be sent based on a downlink grant transmission timeline for the PCC. In another aspect, uplink grants for an SCC may be sent on the PCC based on an uplink grant transmission timeline for the PCC (and not based on an uplink grant transmission timeline for the SCC).
1. A method for wireless communication, comprising: identifying a first component carrier (CC) and a second CC configured for a user equipment (UE) for carrier aggregation, the first and second CCs being associated with different system configurations, wherein the different system configurations comprise different uplink-downlink configurations; and receiving an uplink grant sent on the first CC for uplink data transmission on the second CC, wherein the uplink grant is sent on the first CC based on an uplink grant transmission timeline for the second uplink-downlink configuration for the second CC. 2. The method of claim 1, wherein the uplink-downlink configuration for the first CC includes more downlink subframes than the uplink-downlink configuration for the second CC. 3. The method of claim 1, wherein the uplink-downlink configuration for the second CC includes more uplink subframes than downlink subframes. 4. The method of claim 1, further comprising: receiving a second uplink grant sent on the first CC for uplink data transmission on the first CC, wherein the second uplink grant is sent based on an uplink grant transmission timeline for the uplink-downlink configuration for the first CC. 5. The method of claim 1, further comprising: sending uplink data transmission on the second CC; and receiving acknowledgement/negative acknowledgement (ACK/NACK) for the uplink data transmission on the first CC in a subframe, the subframe being available to send the ACK/NACK and determined based on the first uplink-downlink configuration for the first CC. 6. The method of claim 1, further comprising: receiving a downlink grant sent on the first CC for downlink data transmission on the second CC, wherein the downlink grant is sent based on a downlink grant transmission timeline for the second uplink-downlink configuration for the second CC. 7. The method of claim 1, wherein the first CC is a downlink primary CC (PCC) and the second CC is an uplink PCC for the UE. 8. The method of claim 7, further comprising: receiving downlink control information (DCI) on the downlink PCC; and sending uplink control information UCI on the uplink PCC. 9. The method of claim 8, further comprising: receiving an assignment of the downlink PCC, or uplink PCC, or both for the UE. 10. The method of claim 1, wherein the first CC is a primary CC (PCC) and the second CC is a secondary CC (SCC) for a user equipment (UE). 11. The method of claim 1, further comprising: sending uplink control information (UCI) for data transmission on the second CC, the UCI being sent on the first CC based on a UCI transmission timeline for the first CC. 12. The method of claim 1, further comprising: sending first uplink control information (UCI) on the first CC; and sending second UCI on the second CC. 13. The method of claim 12, wherein the first UCI sent on the first CC is for data transmission on the first CC, and wherein the second UCI sent on the second CC is for data transmission on the second CC. 14. The method of claim 12, wherein the first UCI is sent on the first CC and the second UCI is sent on the second CC in same subframe. 15. The method of claim 12, wherein the first UCI is sent on the first CC in a first subframe, and wherein the second UCI is sent on the second CC in a second subframe different from the first subframe. 16. The method of claim 15, wherein the second subframe is a downlink subframe for the first CC and is an uplink subframe for the second CC. 17. An apparatus for wireless communication, comprising: at least one processor configured to: identify a first component carrier (CC) and a second CC configured for a user equipment (UE) for carrier aggregation, the first and second CCs being associated with different system configurations, wherein the different system configurations comprise different uplink-downlink configurations; and receive an uplink grant sent on the first CC for uplink data transmission on the second CC, wherein the uplink grant is sent on the first CC based on an uplink grant transmission timeline for the second uplink-downlink configuration for the second CC; and a memory coupled with the at least one processor. 18. The apparatus of claim 17, wherein the uplink-downlink configuration for the first CC includes more downlink subframes than the uplink-downlink configuration for the second CC. 19. The apparatus of claim 17, wherein the uplink-downlink configuration for the second CC includes more uplink subframes than downlink subframes. 20. The apparatus of claim 17, wherein the at least one processor is further configured to: receive a second uplink grant sent on the first CC for uplink data transmission on the first CC, wherein the second uplink grant is sent based on an uplink grant transmission timeline for the uplink-downlink configuration for the first CC. 21. The apparatus of claim 17, wherein the at least one processor is further configured to: send uplink data transmission on the second CC; and receive acknowledgement/negative acknowledgement (ACK/NACK) for the uplink data transmission on the first CC in a subframe, the subframe being available to send the ACK/NACK and determined based on the first uplink-downlink configuration for the first CC. 22. The apparatus of claim 17, wherein the at least one processor is further configured to: receive a downlink grant sent on the first CC for downlink data transmission on the second CC, wherein the downlink grant is sent based on a downlink grant transmission timeline for the second uplink-downlink configuration for the second CC. 23. The apparatus of claim 17, wherein the first CC is a downlink primary CC (PCC) and the second CC is an uplink PCC for the UE. 24. The apparatus of claim 23, wherein the at least one processor is further configured to: receive downlink control information (DCI) on the downlink PCC; and send uplink control information UCI on the uplink PCC. 25. The apparatus of claim 24, wherein the at least one processor is further configured to: receive an assignment of the downlink PCC, or uplink PCC, or both for the UE. 26. The apparatus of claim 17, wherein the first CC is a primary CC (PCC) and the second CC is a secondary CC (SCC) for a user equipment (UE). 27. The apparatus of claim 17, wherein the at least one processor is further configured to: sending uplink control information (UCI) for data transmission on the second CC, the UCI being sent on the first CC based on a UCI transmission timeline for the first CC. 28. The apparatus of claim 17, wherein the at least one processor is further configured to: sending first uplink control information (UCI) on the first CC; and sending second UCI on the second CC. 29. The apparatus of claim 28, wherein the first UCI sent on the first CC is for data transmission on the first CC, and wherein the second UCI sent on the second CC is for data transmission on the second CC. 30. The apparatus of claim 28, wherein the first UCI is sent on the first CC and the second UCI is sent on the second CC in same subframe. 31. The apparatus of claim 28, wherein the first UCI is sent on the first CC in a first subframe, and wherein the second UCI is sent on the second CC in a second subframe different from the first subframe. 32. The apparatus of claim 31, wherein the second subframe is a downlink subframe for the first CC and is an uplink subframe for the second CC. 33. An apparatus for wireless communication, comprising: means for identifying a first component carrier (CC) and a second CC configured for a user equipment (UE) for carrier aggregation, the first and second CCs being associated with different system configurations, wherein the different system configurations comprise different uplink-downlink configurations; and means for receiving an uplink grant sent on the first CC for uplink data transmission on the second CC, wherein the uplink grant is sent on the first CC based on an uplink grant transmission timeline for the second uplink-downlink configuration for the second CC. 34. A computer readable medium having computer executable code stored thereon for: identifying a first component carrier (CC) and a second CC configured for a user equipment (UE) for carrier aggregation, the first and second CCs being associated with different system configurations, wherein the different system configurations comprise different uplink-downlink configurations; and receiving an uplink grant sent on the first CC for uplink data transmission on the second CC, wherein the uplink grant is sent on the first CC based on an uplink grant transmission timeline for the second uplink-downlink configuration for the second CC.
Techniques for sending control information to support operation on multiple component carriers (CCs) are disclosed. A user equipment (UE) may be configured with multiple CCs for carrier aggregation. The multiple CCs may be associated with different uplink-downlink configurations and may have different downlink subframes and uplink subframes. In one aspect, uplink control information (UCI) for a secondary CC (SCC) may be sent on a primary CC (PCC) based on a UCI transmission timeline for the PCC (and not based on a UCI transmission timeline for the SCC). For example, a downlink grant for the SCC may be sent based on a downlink grant transmission timeline for the PCC. In another aspect, uplink grants for an SCC may be sent on the PCC based on an uplink grant transmission timeline for the PCC (and not based on an uplink grant transmission timeline for the SCC).1. A method for wireless communication, comprising: identifying a first component carrier (CC) and a second CC configured for a user equipment (UE) for carrier aggregation, the first and second CCs being associated with different system configurations, wherein the different system configurations comprise different uplink-downlink configurations; and receiving an uplink grant sent on the first CC for uplink data transmission on the second CC, wherein the uplink grant is sent on the first CC based on an uplink grant transmission timeline for the second uplink-downlink configuration for the second CC. 2. The method of claim 1, wherein the uplink-downlink configuration for the first CC includes more downlink subframes than the uplink-downlink configuration for the second CC. 3. The method of claim 1, wherein the uplink-downlink configuration for the second CC includes more uplink subframes than downlink subframes. 4. The method of claim 1, further comprising: receiving a second uplink grant sent on the first CC for uplink data transmission on the first CC, wherein the second uplink grant is sent based on an uplink grant transmission timeline for the uplink-downlink configuration for the first CC. 5. The method of claim 1, further comprising: sending uplink data transmission on the second CC; and receiving acknowledgement/negative acknowledgement (ACK/NACK) for the uplink data transmission on the first CC in a subframe, the subframe being available to send the ACK/NACK and determined based on the first uplink-downlink configuration for the first CC. 6. The method of claim 1, further comprising: receiving a downlink grant sent on the first CC for downlink data transmission on the second CC, wherein the downlink grant is sent based on a downlink grant transmission timeline for the second uplink-downlink configuration for the second CC. 7. The method of claim 1, wherein the first CC is a downlink primary CC (PCC) and the second CC is an uplink PCC for the UE. 8. The method of claim 7, further comprising: receiving downlink control information (DCI) on the downlink PCC; and sending uplink control information UCI on the uplink PCC. 9. The method of claim 8, further comprising: receiving an assignment of the downlink PCC, or uplink PCC, or both for the UE. 10. The method of claim 1, wherein the first CC is a primary CC (PCC) and the second CC is a secondary CC (SCC) for a user equipment (UE). 11. The method of claim 1, further comprising: sending uplink control information (UCI) for data transmission on the second CC, the UCI being sent on the first CC based on a UCI transmission timeline for the first CC. 12. The method of claim 1, further comprising: sending first uplink control information (UCI) on the first CC; and sending second UCI on the second CC. 13. The method of claim 12, wherein the first UCI sent on the first CC is for data transmission on the first CC, and wherein the second UCI sent on the second CC is for data transmission on the second CC. 14. The method of claim 12, wherein the first UCI is sent on the first CC and the second UCI is sent on the second CC in same subframe. 15. The method of claim 12, wherein the first UCI is sent on the first CC in a first subframe, and wherein the second UCI is sent on the second CC in a second subframe different from the first subframe. 16. The method of claim 15, wherein the second subframe is a downlink subframe for the first CC and is an uplink subframe for the second CC. 17. An apparatus for wireless communication, comprising: at least one processor configured to: identify a first component carrier (CC) and a second CC configured for a user equipment (UE) for carrier aggregation, the first and second CCs being associated with different system configurations, wherein the different system configurations comprise different uplink-downlink configurations; and receive an uplink grant sent on the first CC for uplink data transmission on the second CC, wherein the uplink grant is sent on the first CC based on an uplink grant transmission timeline for the second uplink-downlink configuration for the second CC; and a memory coupled with the at least one processor. 18. The apparatus of claim 17, wherein the uplink-downlink configuration for the first CC includes more downlink subframes than the uplink-downlink configuration for the second CC. 19. The apparatus of claim 17, wherein the uplink-downlink configuration for the second CC includes more uplink subframes than downlink subframes. 20. The apparatus of claim 17, wherein the at least one processor is further configured to: receive a second uplink grant sent on the first CC for uplink data transmission on the first CC, wherein the second uplink grant is sent based on an uplink grant transmission timeline for the uplink-downlink configuration for the first CC. 21. The apparatus of claim 17, wherein the at least one processor is further configured to: send uplink data transmission on the second CC; and receive acknowledgement/negative acknowledgement (ACK/NACK) for the uplink data transmission on the first CC in a subframe, the subframe being available to send the ACK/NACK and determined based on the first uplink-downlink configuration for the first CC. 22. The apparatus of claim 17, wherein the at least one processor is further configured to: receive a downlink grant sent on the first CC for downlink data transmission on the second CC, wherein the downlink grant is sent based on a downlink grant transmission timeline for the second uplink-downlink configuration for the second CC. 23. The apparatus of claim 17, wherein the first CC is a downlink primary CC (PCC) and the second CC is an uplink PCC for the UE. 24. The apparatus of claim 23, wherein the at least one processor is further configured to: receive downlink control information (DCI) on the downlink PCC; and send uplink control information UCI on the uplink PCC. 25. The apparatus of claim 24, wherein the at least one processor is further configured to: receive an assignment of the downlink PCC, or uplink PCC, or both for the UE. 26. The apparatus of claim 17, wherein the first CC is a primary CC (PCC) and the second CC is a secondary CC (SCC) for a user equipment (UE). 27. The apparatus of claim 17, wherein the at least one processor is further configured to: sending uplink control information (UCI) for data transmission on the second CC, the UCI being sent on the first CC based on a UCI transmission timeline for the first CC. 28. The apparatus of claim 17, wherein the at least one processor is further configured to: sending first uplink control information (UCI) on the first CC; and sending second UCI on the second CC. 29. The apparatus of claim 28, wherein the first UCI sent on the first CC is for data transmission on the first CC, and wherein the second UCI sent on the second CC is for data transmission on the second CC. 30. The apparatus of claim 28, wherein the first UCI is sent on the first CC and the second UCI is sent on the second CC in same subframe. 31. The apparatus of claim 28, wherein the first UCI is sent on the first CC in a first subframe, and wherein the second UCI is sent on the second CC in a second subframe different from the first subframe. 32. The apparatus of claim 31, wherein the second subframe is a downlink subframe for the first CC and is an uplink subframe for the second CC. 33. An apparatus for wireless communication, comprising: means for identifying a first component carrier (CC) and a second CC configured for a user equipment (UE) for carrier aggregation, the first and second CCs being associated with different system configurations, wherein the different system configurations comprise different uplink-downlink configurations; and means for receiving an uplink grant sent on the first CC for uplink data transmission on the second CC, wherein the uplink grant is sent on the first CC based on an uplink grant transmission timeline for the second uplink-downlink configuration for the second CC. 34. A computer readable medium having computer executable code stored thereon for: identifying a first component carrier (CC) and a second CC configured for a user equipment (UE) for carrier aggregation, the first and second CCs being associated with different system configurations, wherein the different system configurations comprise different uplink-downlink configurations; and receiving an uplink grant sent on the first CC for uplink data transmission on the second CC, wherein the uplink grant is sent on the first CC based on an uplink grant transmission timeline for the second uplink-downlink configuration for the second CC.
2,400
6,973
6,973
11,685,194
2,468
A communication system according to the current invention contains a context vault ( 104 ) and context community manager ( 105 ) for enriching a communication session between a first user ( 101 ) and second user ( 102 ) with context information. The context vault ( 104 ) maintains context information, e.g. location or agenda information, and/or context information locators in relation to users. The community context manager ( 105 ) maintains access rights in relation to the context information. During the communication session between the first user ( 101 ) and a second user ( 102 ), the communication server ( 103 ) retrieves context information in relation to the first user ( 101 ) from the context vault ( 104 ) and provides that context information or parts thereof to the second user ( 102 ) in accordance with the access rights kept in the community context manager ( 105 ), and vice versa.
1. A communication system comprising a communication network for interconnecting a plurality of users and a communication server (103; 203; 303) for establishing a communication session between at least a first user (101; 201; 301) and a second user (102; 202; 302) of said plurality of users, CHARACTERIZED IN THAT said communication system further comprises: a. a context vault (104; 204; 304) for maintaining context information and/or context locators in relation to one or more of said plurality of users; and b. a community context manager (105; 205; 305) for maintaining access rights in relation to said context information; and further in that: c. said communication server (103; 203; 303) is adapted to retrieve context information in relation to said first user (101; 201; 301) from said context vault (104; 304) and provide said context information or parts thereof during said communication session to said second user (102; 202; 302) in accordance with said access rights, and vice versa. 2. A communication system according to claim 1, CHARACTERISED IN THAT said communication system further comprises: d. said context vault is a location context vault (204) for maintaining location context information and/or location context locators in relation to locations; and e. said community context manager is a location context manager (205) further adapted to determine the location of a user; and further in that: f. said communication server (203) is adapted to retrieve location context information in relation to the location of said first user (201) from said location context vault (204) and provide said location context information or parts thereof during said communication session to said second user (202), and vice versa. 3. A communication system according to claim 1 CHARACTERISED IN THAT said communication system further comprises: g. a context skin vault (306) for maintaining a plurality of context skins, a context skin being a set of rules for graphical representation of context information; and h. a context composition engine (307) for composing during said communication session said context information in relation to said first user (301) in accordance with a context skin selected by said second user (302), and vice versa. 4. A communication system according to claim 3, CHARACTERIZED IN THAT said context composition engine (307) is integrated in said communication server (303). 5. A communication system according to claim 1, CHARACTERIZED IN THAT said context information comprises one or more of the following: location information; calendar information; electronic programming guide information; multimedia content; sensor information. 6. A communication system according to claim 1, CHARACTERIZED IN THAT said communication session corresponds to one of the following: a voice communication session between fixed and/or mobile phone users; a video communication session between fixed and/or mobile phone users; a text communication session between fixed and/or mobile phone users; a chat communication session between fixed and/or mobile phone users. 7. A context vault (104; 304) for use in the communication system of claim 1. 8. A community context manager (105; 305) for use in the communication system of claim 1. 9. A communication server (103; 203; 303) for use in the communication system of claim 1. 10. A location context vault (204) for use in the communication system of claim 2. 11. A location context manager (205) for use in the communication system of claim 2. 12. A context skin vault (306) for use in the communication system of claim 3. 13. A context composition engine (307) for use in the communication system of claim 3. 14. A communication method in a communication network having a plurality of users, said communication method comprising establishing a communication session between at least a first user (101; 201; 301) and a second user (102; 202; 302) through a communication server (103; 203; 303), CHARACTERIZED IN THAT said communication method further comprises: a. retrieving context information related to said first user (101; 201; 301) through a context vault (104; 204; 304) that maintains context information and/or context information locators related to one or more of said plurality of users; and b. retrieving access rights to said context information related to said first user (101; 201; 301) from a context community manager (105; 305) that maintains access rights in relation to said context information related to one or more of said plurality of users; and c. providing said context information related to said first user (101; 201; 301) or parts thereof during said communication session to said second user (102; 202; 302) in accordance with said access rights; and vice versa.
A communication system according to the current invention contains a context vault ( 104 ) and context community manager ( 105 ) for enriching a communication session between a first user ( 101 ) and second user ( 102 ) with context information. The context vault ( 104 ) maintains context information, e.g. location or agenda information, and/or context information locators in relation to users. The community context manager ( 105 ) maintains access rights in relation to the context information. During the communication session between the first user ( 101 ) and a second user ( 102 ), the communication server ( 103 ) retrieves context information in relation to the first user ( 101 ) from the context vault ( 104 ) and provides that context information or parts thereof to the second user ( 102 ) in accordance with the access rights kept in the community context manager ( 105 ), and vice versa.1. A communication system comprising a communication network for interconnecting a plurality of users and a communication server (103; 203; 303) for establishing a communication session between at least a first user (101; 201; 301) and a second user (102; 202; 302) of said plurality of users, CHARACTERIZED IN THAT said communication system further comprises: a. a context vault (104; 204; 304) for maintaining context information and/or context locators in relation to one or more of said plurality of users; and b. a community context manager (105; 205; 305) for maintaining access rights in relation to said context information; and further in that: c. said communication server (103; 203; 303) is adapted to retrieve context information in relation to said first user (101; 201; 301) from said context vault (104; 304) and provide said context information or parts thereof during said communication session to said second user (102; 202; 302) in accordance with said access rights, and vice versa. 2. A communication system according to claim 1, CHARACTERISED IN THAT said communication system further comprises: d. said context vault is a location context vault (204) for maintaining location context information and/or location context locators in relation to locations; and e. said community context manager is a location context manager (205) further adapted to determine the location of a user; and further in that: f. said communication server (203) is adapted to retrieve location context information in relation to the location of said first user (201) from said location context vault (204) and provide said location context information or parts thereof during said communication session to said second user (202), and vice versa. 3. A communication system according to claim 1 CHARACTERISED IN THAT said communication system further comprises: g. a context skin vault (306) for maintaining a plurality of context skins, a context skin being a set of rules for graphical representation of context information; and h. a context composition engine (307) for composing during said communication session said context information in relation to said first user (301) in accordance with a context skin selected by said second user (302), and vice versa. 4. A communication system according to claim 3, CHARACTERIZED IN THAT said context composition engine (307) is integrated in said communication server (303). 5. A communication system according to claim 1, CHARACTERIZED IN THAT said context information comprises one or more of the following: location information; calendar information; electronic programming guide information; multimedia content; sensor information. 6. A communication system according to claim 1, CHARACTERIZED IN THAT said communication session corresponds to one of the following: a voice communication session between fixed and/or mobile phone users; a video communication session between fixed and/or mobile phone users; a text communication session between fixed and/or mobile phone users; a chat communication session between fixed and/or mobile phone users. 7. A context vault (104; 304) for use in the communication system of claim 1. 8. A community context manager (105; 305) for use in the communication system of claim 1. 9. A communication server (103; 203; 303) for use in the communication system of claim 1. 10. A location context vault (204) for use in the communication system of claim 2. 11. A location context manager (205) for use in the communication system of claim 2. 12. A context skin vault (306) for use in the communication system of claim 3. 13. A context composition engine (307) for use in the communication system of claim 3. 14. A communication method in a communication network having a plurality of users, said communication method comprising establishing a communication session between at least a first user (101; 201; 301) and a second user (102; 202; 302) through a communication server (103; 203; 303), CHARACTERIZED IN THAT said communication method further comprises: a. retrieving context information related to said first user (101; 201; 301) through a context vault (104; 204; 304) that maintains context information and/or context information locators related to one or more of said plurality of users; and b. retrieving access rights to said context information related to said first user (101; 201; 301) from a context community manager (105; 305) that maintains access rights in relation to said context information related to one or more of said plurality of users; and c. providing said context information related to said first user (101; 201; 301) or parts thereof during said communication session to said second user (102; 202; 302) in accordance with said access rights; and vice versa.
2,400
6,974
6,974
13,965,833
2,488
A system and method for operating a network security system implementing security cameras, motion sensors, access control systems, security door locks, and mobile panic button devices within a monitored area. Security cameras transmit video to a network video recorder and the video is analyzed by a video analytics system to determine if a security event is occurring. If a security event occurs, a security control system calls a dispatch service, which transmits a notification to only those security guards who are within a given area of the event.
1. A security system comprising: one or more security cameras that capture image data; a network video recorder for storing and distributing the image data from the security cameras; and a security control system that receives position information from mobile user devices and provides access to the image data at the mobile user devices based on the position information relative to locations of alarm conditions. 2. The security system as claimed in claim 1, wherein the network video recorder includes a video analytics system that analyzes the image data from the security cameras for security events and generates the alarm conditions in response to detecting the security events in the image data. 3. The security system as claimed in claim 2, wherein the security control system determines the locations of the alarm conditions by accessing position information for the security cameras that generated the image data that gave rise to the alarm conditions. 4. The security system as claimed in claim 1, wherein the security control system monitors security and/or safety devices for alarm conditions. 5. The security system as claimed in claim 4, wherein the security control system extracts position information from the security and/or safety devices that generated the alarm conditions to determine the locations of the alarm conditions. 6. The security system as claimed in claim 1, wherein the security control system includes a dispatch service that distributes a reference to the image data to one or more mobile user devices in response to the alarm conditions. 7. The security system as claimed in claim 6, wherein the dispatch service distributes the reference by transmitting a message to the one or more mobile user devices. 8. The security system as claimed in claim 1 further including one or more mobile panic button devices that enable users to selectively generate an alarm condition. 9. The security system as claimed in claim 8, wherein for the mobile panic button devices, the location of the alarm condition is based on position information for the mobile panic button devices. 10. The security system as claimed in claim 1, wherein the mobile user devices determine their respective locations and periodically transmit the position information to the security control system. 11. The security system as claimed in claim 1, wherein the security control system stores the position information in a database. 12. The security system as claimed in claim 1, wherein the security control system determines a predicted path of a subject that generated the alarm condition and provides access to the image data at the mobile user devices based on the position information relative to the predicted path of the subject. 13. A method for distributing security image data, comprising: capturing image data; receiving position information from mobile user devices; and providing access to the image data at the mobile user devices based on the position information relative to locations of alarm conditions. 14. The method according to claim 13, further comprising analyzing the image data for security events and generating the alarm conditions in response to detecting the security events. 15. The method according to claim 14, further comprising determining the locations of the alarm conditions by accessing position information for the security camera. 16. The method according to claim 13, further comprising monitoring security and/or safety devices for alarm conditions. 17. The method according to claim 16, further comprising extracting position information from the security and/or safety devices that generated the alarm conditions to determine the locations of the alarm conditions. 18. The method according to claim 13, further comprising distributing a reference to the image data to one or more mobile user devices in response to the alarm conditions. 19. The method according to claim 18, further comprising distributing the reference by transmitting a message to the one or more mobile user devices. 20. The method according to claim 13, further comprising enabling users to selectively generate alarm condition with mobile panic button devices. 21. The method according to claim 20, further comprising determining the locations of the alarm conditions based on position information for the mobile panic button devices. 22. The method according to claim 13, further comprising periodically determining the location of the mobile user devices and storing the location information in a database. 23. The method according to claim 13, further comprising determining a predicted path of a subject that generated the alarm condition and providing access to the image data at the mobile user devices based on the position information relative to the predicted path of the subject.
A system and method for operating a network security system implementing security cameras, motion sensors, access control systems, security door locks, and mobile panic button devices within a monitored area. Security cameras transmit video to a network video recorder and the video is analyzed by a video analytics system to determine if a security event is occurring. If a security event occurs, a security control system calls a dispatch service, which transmits a notification to only those security guards who are within a given area of the event.1. A security system comprising: one or more security cameras that capture image data; a network video recorder for storing and distributing the image data from the security cameras; and a security control system that receives position information from mobile user devices and provides access to the image data at the mobile user devices based on the position information relative to locations of alarm conditions. 2. The security system as claimed in claim 1, wherein the network video recorder includes a video analytics system that analyzes the image data from the security cameras for security events and generates the alarm conditions in response to detecting the security events in the image data. 3. The security system as claimed in claim 2, wherein the security control system determines the locations of the alarm conditions by accessing position information for the security cameras that generated the image data that gave rise to the alarm conditions. 4. The security system as claimed in claim 1, wherein the security control system monitors security and/or safety devices for alarm conditions. 5. The security system as claimed in claim 4, wherein the security control system extracts position information from the security and/or safety devices that generated the alarm conditions to determine the locations of the alarm conditions. 6. The security system as claimed in claim 1, wherein the security control system includes a dispatch service that distributes a reference to the image data to one or more mobile user devices in response to the alarm conditions. 7. The security system as claimed in claim 6, wherein the dispatch service distributes the reference by transmitting a message to the one or more mobile user devices. 8. The security system as claimed in claim 1 further including one or more mobile panic button devices that enable users to selectively generate an alarm condition. 9. The security system as claimed in claim 8, wherein for the mobile panic button devices, the location of the alarm condition is based on position information for the mobile panic button devices. 10. The security system as claimed in claim 1, wherein the mobile user devices determine their respective locations and periodically transmit the position information to the security control system. 11. The security system as claimed in claim 1, wherein the security control system stores the position information in a database. 12. The security system as claimed in claim 1, wherein the security control system determines a predicted path of a subject that generated the alarm condition and provides access to the image data at the mobile user devices based on the position information relative to the predicted path of the subject. 13. A method for distributing security image data, comprising: capturing image data; receiving position information from mobile user devices; and providing access to the image data at the mobile user devices based on the position information relative to locations of alarm conditions. 14. The method according to claim 13, further comprising analyzing the image data for security events and generating the alarm conditions in response to detecting the security events. 15. The method according to claim 14, further comprising determining the locations of the alarm conditions by accessing position information for the security camera. 16. The method according to claim 13, further comprising monitoring security and/or safety devices for alarm conditions. 17. The method according to claim 16, further comprising extracting position information from the security and/or safety devices that generated the alarm conditions to determine the locations of the alarm conditions. 18. The method according to claim 13, further comprising distributing a reference to the image data to one or more mobile user devices in response to the alarm conditions. 19. The method according to claim 18, further comprising distributing the reference by transmitting a message to the one or more mobile user devices. 20. The method according to claim 13, further comprising enabling users to selectively generate alarm condition with mobile panic button devices. 21. The method according to claim 20, further comprising determining the locations of the alarm conditions based on position information for the mobile panic button devices. 22. The method according to claim 13, further comprising periodically determining the location of the mobile user devices and storing the location information in a database. 23. The method according to claim 13, further comprising determining a predicted path of a subject that generated the alarm condition and providing access to the image data at the mobile user devices based on the position information relative to the predicted path of the subject.
2,400
6,975
6,975
13,946,457
2,483
A method for noise shaping includes: reducing a bit-depth of an input signal to obtain a quantized input signal; feeding a quantization error corresponding to the bit-depth reduction of the input signal into a feedback loop to the input signal, the feedback loop comprising a first quantization stage, a second quantization stage and a correction stage, both the first and second quantization stages operating at the bit-depth of the input signal and the correction stage operating at a bit-depth of the quantization error; and generating a noise-shaped output signal at lower clock rate than the input signal based on the feedback loop.
1. A method for noise shaping, the method comprising: reducing a bit-depth of an input signal to obtain a quantized input signal; feeding a quantization error corresponding to the bit-depth reduction of the input signal into a feedback loop to the input signal, the feedback loop comprising a first quantization stage, a second quantization stage and a correction stage, both the first and second quantization stages operating at the bit-depth of the input signal and the correction stage operating at a bit-depth of the quantization error; and generating a noise-shaped output signal at lower clock rate than the input signal based on the feedback loop. 2. The method of claim 1, wherein a bit-depth reduction of the first quantization stage corresponds to a bit-depth reduction of the second quantization stage. 3. The method of claim 1, comprising: reducing a bit-depth of an input to the first quantization stage to a bit-depth of the quantization error when passing the input through the first quantization stage. 4. The method of claim 1, wherein an input to the first quantization stage corresponds to an input to the correction stage. 5. The method of claim 1, wherein an input to the second quantization stage is different from an input to the correction stage. 6. The method of claim 1, comprising: using an additive property for the combination of the first and second quantization stages and the correction stage. 7. The method of claim 6, wherein the additive property is according to the following: Q(a1+Q(a2))=Q(a1)+Q(a2)+delta(a1), where Q(a1) denotes the first quantization stage, Q(a2) denotes the second quantization stage, delta(a1) denotes the correction stage, a1 denotes an input to both the first quantization stage and the correction stage and a2 denotes an input to the second quantization stage. 8. The method of claim 1, wherein the correction stage outputs a one if an input to the correction stage is smaller than zero and a fractional part of that input corresponds to two to the half bit-depth of the quantization error and otherwise outputs a zero. 9. The method of claim 8, comprising: determining the fractional part of the input of the correction stage by applying a modulo operation to the input of the correction stage, the modulo operation with respect to two to the bit-depth of the quantization error. 10. The method of claim 1, comprising: implementing the combination of the first quantization stage and the correction stage based on a lookup table. 11. The method of claim 10, wherein a size of the lookup table corresponds to two to a bit-depth of the quantization error. 12. The method of claim 10, wherein a bit-depth of an output of the lookup table is by one bit greater than a bit-depth of an input to the lookup table. 13. The method of claim 1, wherein the feedback loop comprises a filtering of the quantization error with filter coefficients whose real and imaginary parts are integers. 14. A noise shaping filter, comprising: a quantizer configured to reduce a bit-depth of an input signal to obtain a quantized input signal; a feedback loop configured to combine a quantization error of the quantizer with the input signal to obtain a noise-shaped output signal, wherein the feedback loop comprises a combination of a first and a second quantization stage operating at the bit-depth of the input signal and a correction stage operating at a bit-depth of the quantization error. 15. The noise shaping filter of claim 14, wherein the feedback loop is configured to provide the noise-shaped output signal in a lower clock rate than the input signal. 16. The noise shaping filter of claim 14, comprising a lookup table configured to implement the combination of the first quantization stage and the correction stage. 17. The noise shaping filter of claim 16, configured to combine a first and a second clock sample of the input signal providing one clock sample of the noise-shaped output signal. 18. The noise shaping filter of claim 17, wherein a bit-depth of the combination of the first and second clock samples of the input signal is by one bit larger than a bit-depth of the first or the second clock sample of the input signal. 19. A noise shaper, comprising: a first and a second noise shaping filter, each of them comprising: a quantizer configured to reduce a bit-depth of an input signal to obtain a quantized input signal; a feedback loop configured to combine a quantization error of the quantizer with the input signal to obtain a noise-shaped output signal, wherein the feedback loop comprises a combination of a first and a second quantization stage operating at the bit-depth of the input signal and a correction stage operating at a bit-depth of the quantization error. 20. The noise shaper of claim 19, wherein the feedback loops of the first and second noise shaping filters are configured to provide the noise-shaped output signal in a lower clock rate than the input signal. 21. The noise shaper of claim 19, configured to provide two clock samples of the noise-shaped output signal in every two clocks. 22. The noise shaper of claim 19, configured to receive two clock samples of the input signal in every clock. 23. The noise shaper of claim 19, wherein the first noise shaping filter is configured to combine a first and a second clock sample of the input signal providing a first clock sample of the noise-shaped output signal; and wherein the second noise shaping filter is configured to combine the second and a third clock sample of the input signal providing a second clock sample of the noise-shaped output signal. 24. The noise shaper of claim 23, comprising a shift register configured to store the first, second and third clock samples of the input signal. 25. The noise shaper of claim 23, comprising a bit adder configured to transform a range of the input signal to positive numbers or to negative numbers before being processed by the first and second noise shaping filters. 26. A mobile device, comprising: a baseband processor configured to provide a baseband signal; and a transmitter configured to modulate the baseband signal on a radio frequency carrier and to transmit the modulated baseband signal through an air link to a base station, wherein the transmitter comprises a noise shaper configured to noise-shape the baseband signal, the noise shaper comprising: a first and a second noise shaping filter, each of them comprising: a quantizer configured to reduce a bit-depth of the baseband signal to obtain a quantized baseband signal; a feedback loop configured to combine a quantization error of the quantizer with the baseband signal to obtain a noise-shaped baseband signal, wherein the feedback loop comprises a combination of a first and a second quantization stage operating at the bit-depth of the baseband signal and a correction stage operating at a bit-depth of the quantization error. 27. The mobile device of claim 26, wherein the transmitter further comprises: a digital-to-analog converter configured to convert the noise-shaped baseband signal to an analog baseband signal; and a modulator configured to modulate the analog baseband signal to the radio frequency carrier.
A method for noise shaping includes: reducing a bit-depth of an input signal to obtain a quantized input signal; feeding a quantization error corresponding to the bit-depth reduction of the input signal into a feedback loop to the input signal, the feedback loop comprising a first quantization stage, a second quantization stage and a correction stage, both the first and second quantization stages operating at the bit-depth of the input signal and the correction stage operating at a bit-depth of the quantization error; and generating a noise-shaped output signal at lower clock rate than the input signal based on the feedback loop.1. A method for noise shaping, the method comprising: reducing a bit-depth of an input signal to obtain a quantized input signal; feeding a quantization error corresponding to the bit-depth reduction of the input signal into a feedback loop to the input signal, the feedback loop comprising a first quantization stage, a second quantization stage and a correction stage, both the first and second quantization stages operating at the bit-depth of the input signal and the correction stage operating at a bit-depth of the quantization error; and generating a noise-shaped output signal at lower clock rate than the input signal based on the feedback loop. 2. The method of claim 1, wherein a bit-depth reduction of the first quantization stage corresponds to a bit-depth reduction of the second quantization stage. 3. The method of claim 1, comprising: reducing a bit-depth of an input to the first quantization stage to a bit-depth of the quantization error when passing the input through the first quantization stage. 4. The method of claim 1, wherein an input to the first quantization stage corresponds to an input to the correction stage. 5. The method of claim 1, wherein an input to the second quantization stage is different from an input to the correction stage. 6. The method of claim 1, comprising: using an additive property for the combination of the first and second quantization stages and the correction stage. 7. The method of claim 6, wherein the additive property is according to the following: Q(a1+Q(a2))=Q(a1)+Q(a2)+delta(a1), where Q(a1) denotes the first quantization stage, Q(a2) denotes the second quantization stage, delta(a1) denotes the correction stage, a1 denotes an input to both the first quantization stage and the correction stage and a2 denotes an input to the second quantization stage. 8. The method of claim 1, wherein the correction stage outputs a one if an input to the correction stage is smaller than zero and a fractional part of that input corresponds to two to the half bit-depth of the quantization error and otherwise outputs a zero. 9. The method of claim 8, comprising: determining the fractional part of the input of the correction stage by applying a modulo operation to the input of the correction stage, the modulo operation with respect to two to the bit-depth of the quantization error. 10. The method of claim 1, comprising: implementing the combination of the first quantization stage and the correction stage based on a lookup table. 11. The method of claim 10, wherein a size of the lookup table corresponds to two to a bit-depth of the quantization error. 12. The method of claim 10, wherein a bit-depth of an output of the lookup table is by one bit greater than a bit-depth of an input to the lookup table. 13. The method of claim 1, wherein the feedback loop comprises a filtering of the quantization error with filter coefficients whose real and imaginary parts are integers. 14. A noise shaping filter, comprising: a quantizer configured to reduce a bit-depth of an input signal to obtain a quantized input signal; a feedback loop configured to combine a quantization error of the quantizer with the input signal to obtain a noise-shaped output signal, wherein the feedback loop comprises a combination of a first and a second quantization stage operating at the bit-depth of the input signal and a correction stage operating at a bit-depth of the quantization error. 15. The noise shaping filter of claim 14, wherein the feedback loop is configured to provide the noise-shaped output signal in a lower clock rate than the input signal. 16. The noise shaping filter of claim 14, comprising a lookup table configured to implement the combination of the first quantization stage and the correction stage. 17. The noise shaping filter of claim 16, configured to combine a first and a second clock sample of the input signal providing one clock sample of the noise-shaped output signal. 18. The noise shaping filter of claim 17, wherein a bit-depth of the combination of the first and second clock samples of the input signal is by one bit larger than a bit-depth of the first or the second clock sample of the input signal. 19. A noise shaper, comprising: a first and a second noise shaping filter, each of them comprising: a quantizer configured to reduce a bit-depth of an input signal to obtain a quantized input signal; a feedback loop configured to combine a quantization error of the quantizer with the input signal to obtain a noise-shaped output signal, wherein the feedback loop comprises a combination of a first and a second quantization stage operating at the bit-depth of the input signal and a correction stage operating at a bit-depth of the quantization error. 20. The noise shaper of claim 19, wherein the feedback loops of the first and second noise shaping filters are configured to provide the noise-shaped output signal in a lower clock rate than the input signal. 21. The noise shaper of claim 19, configured to provide two clock samples of the noise-shaped output signal in every two clocks. 22. The noise shaper of claim 19, configured to receive two clock samples of the input signal in every clock. 23. The noise shaper of claim 19, wherein the first noise shaping filter is configured to combine a first and a second clock sample of the input signal providing a first clock sample of the noise-shaped output signal; and wherein the second noise shaping filter is configured to combine the second and a third clock sample of the input signal providing a second clock sample of the noise-shaped output signal. 24. The noise shaper of claim 23, comprising a shift register configured to store the first, second and third clock samples of the input signal. 25. The noise shaper of claim 23, comprising a bit adder configured to transform a range of the input signal to positive numbers or to negative numbers before being processed by the first and second noise shaping filters. 26. A mobile device, comprising: a baseband processor configured to provide a baseband signal; and a transmitter configured to modulate the baseband signal on a radio frequency carrier and to transmit the modulated baseband signal through an air link to a base station, wherein the transmitter comprises a noise shaper configured to noise-shape the baseband signal, the noise shaper comprising: a first and a second noise shaping filter, each of them comprising: a quantizer configured to reduce a bit-depth of the baseband signal to obtain a quantized baseband signal; a feedback loop configured to combine a quantization error of the quantizer with the baseband signal to obtain a noise-shaped baseband signal, wherein the feedback loop comprises a combination of a first and a second quantization stage operating at the bit-depth of the baseband signal and a correction stage operating at a bit-depth of the quantization error. 27. The mobile device of claim 26, wherein the transmitter further comprises: a digital-to-analog converter configured to convert the noise-shaped baseband signal to an analog baseband signal; and a modulator configured to modulate the analog baseband signal to the radio frequency carrier.
2,400
6,976
6,976
14,278,254
2,461
A method, apparatus and computer program for providing scaled coverage. An example method for use in an access point or station may comprise causing operation in a reduced coverage mode, generating a beacon comprising an indication of a reduced coverage mode in a capability field and one or more coverage scaling parameters (CSP) in an information element, and causing the beacon to be provided to one or more stations (STAs).
1. A method for use in an access point (AP) for basic service set (BSS) coverage scaling, the method comprising: causing operation in a reduced coverage mode; generating a beacon comprising an indication of the reduced coverage mode in a capability field and one or more coverage sealing parameters (CSP) in an information element; and causing the beacon to be provided to one or more stations (STAs). 2. The method according to claim 1, further comprising: calculating a transmission power reduction; and providing an indication of the power transmission reduction in the CSP. 3. The method according to claim 1, wherein the CSP comprise one or more of a relative transmission (TX) power reduction, an indication of whether a current frame is transmitted with a maximum or current power, an indication of whether stations (STAs) are required to scale TX power, or an indication of which tower or sector identification (ID) to which the parameter set applies. 4. The method according to claim 1, further comprising: determining a duration of the coverage scaling; and providing an indication of the duration in the CSP. 5. The method according to claim 4, further comprising: causing transmission of one or more measurement probes to one or more other APs; determining one or more downlink scaling values; and providing a request to at least one of the one or more other APs for coverage scaling. 6. The method according to claim 1, further comprising: providing a probe request requesting a received power level; and utilizing a reply to the probe request to calculate a transmission power reduction. 7. The method according to claim 1, wherein reduced coverage operation is one specific basic service set (BSS) of one or more BSS or one of at least one direction, the method further comprising: providing an indication of one or more affected stations (STAs) of the reduced coverage while maintaining a previous coverage for non-affected STAs. 8-12. (canceled) 13. An apparatus for use in an access point (AP), the apparatus comprising a processing system, the processing system comprises at least one processor and at least one memory including computer program code, wherein the processing system is arranged to cause the apparatus to: cause operation in a reduced coverage mode; generate a beacon comprising an indication of the reduced coverage mode in a capability field and one or more coverage scaling parameters (CSP) in an information element; and cause the beacon to be provided to one or more stations (STAs). 14. The apparatus according to claim 13, wherein the processing system is arranged to cause the apparatus to: calculate a transmission power reduction; and provide an indication of the power transmission reduction in the CSP. 15. The apparatus according to claim 13: wherein the CSP comprise one or more of a relative transmission (TX) power reduction, an indication of whether a current frame is transmitted with a maximum or current power, an indication of whether stations (STAs) are required to scale TX power, or an indication of which tower or sector identification (ID) to which the parameter set applies. 16. The apparatus according to claim 13, wherein the processing system is arranged to cause the apparatus to: determine a duration of the coverage scaling; and provide an indication of the duration in the CSP. 17. The apparatus according to claim 16, wherein the processing system is arranged to cause the apparatus to: cause transmission of one or more measurement probes to one or more other APs; determine one or more downlink scaling values; and provide a request to at least one of the one or more other APs for coverage scaling. 18. The apparatus according to claim 13, wherein the processing system is arranged to cause the apparatus to: provide a probe request requesting a received power level; and utilize a reply to the probe request to calculate a transmission power reduction. 19. The apparatus according to claim 13, wherein reduced coverage operation is one specific basic service set (BSS) of one or more BSS or one of at least one direction, wherein the processing system is arranged to cause the apparatus to: provide an indication of one or more affected stations (STAs) of the reduced coverage while maintain a previous coverage for non-affected STAs. 20. An apparatus for use in a station (STA), the apparatus comprising a processing system, the processing system comprising at least one processor and at least one memory including computer program code, wherein the processing system is arranged to cause the apparatus to: receive a beacon comprising an indication of a reduced coverage mode in a capability field and one or more coverage scaling parameters (CSP) in an information element; and cause transmission of uplink (UL) communications in accordance with the CSP. 21. The apparatus according to claim 20, wherein the CSP comprises one or more of a relative transmission (TX) power reduction, an indication of whether a current frame is transmitted with a maximum or current power, an indication of whether stations (STAs) are required to scale TX power, or an indication of which tower or sector identification (ID) to which the parameter set applies. 22. The apparatus according to claim 20, wherein the processing system is arranged to cause the apparatus to: provide a probe request in accordance with the CSP to discover APs. 23. The apparatus according to claim 20, wherein the processing system is arranged to cause the apparatus to: determine it reception quality meets a minimum threshold; and in response to reception quality not meeting the minimum threshold, cause transmission of an indication of low quality to an AP. 24. The apparatus according to claim 20, wherein the processing system is arranged to cause the apparatus to provide a first probe request at a first power transmission level and a second a probe request at a second power transmission level, the second power transmission level being higher than the first power transmission level. 25-36. (canceled) 37. The apparatus according to claim 20, wherein the station (STA) is a user equipment.
A method, apparatus and computer program for providing scaled coverage. An example method for use in an access point or station may comprise causing operation in a reduced coverage mode, generating a beacon comprising an indication of a reduced coverage mode in a capability field and one or more coverage scaling parameters (CSP) in an information element, and causing the beacon to be provided to one or more stations (STAs).1. A method for use in an access point (AP) for basic service set (BSS) coverage scaling, the method comprising: causing operation in a reduced coverage mode; generating a beacon comprising an indication of the reduced coverage mode in a capability field and one or more coverage sealing parameters (CSP) in an information element; and causing the beacon to be provided to one or more stations (STAs). 2. The method according to claim 1, further comprising: calculating a transmission power reduction; and providing an indication of the power transmission reduction in the CSP. 3. The method according to claim 1, wherein the CSP comprise one or more of a relative transmission (TX) power reduction, an indication of whether a current frame is transmitted with a maximum or current power, an indication of whether stations (STAs) are required to scale TX power, or an indication of which tower or sector identification (ID) to which the parameter set applies. 4. The method according to claim 1, further comprising: determining a duration of the coverage scaling; and providing an indication of the duration in the CSP. 5. The method according to claim 4, further comprising: causing transmission of one or more measurement probes to one or more other APs; determining one or more downlink scaling values; and providing a request to at least one of the one or more other APs for coverage scaling. 6. The method according to claim 1, further comprising: providing a probe request requesting a received power level; and utilizing a reply to the probe request to calculate a transmission power reduction. 7. The method according to claim 1, wherein reduced coverage operation is one specific basic service set (BSS) of one or more BSS or one of at least one direction, the method further comprising: providing an indication of one or more affected stations (STAs) of the reduced coverage while maintaining a previous coverage for non-affected STAs. 8-12. (canceled) 13. An apparatus for use in an access point (AP), the apparatus comprising a processing system, the processing system comprises at least one processor and at least one memory including computer program code, wherein the processing system is arranged to cause the apparatus to: cause operation in a reduced coverage mode; generate a beacon comprising an indication of the reduced coverage mode in a capability field and one or more coverage scaling parameters (CSP) in an information element; and cause the beacon to be provided to one or more stations (STAs). 14. The apparatus according to claim 13, wherein the processing system is arranged to cause the apparatus to: calculate a transmission power reduction; and provide an indication of the power transmission reduction in the CSP. 15. The apparatus according to claim 13: wherein the CSP comprise one or more of a relative transmission (TX) power reduction, an indication of whether a current frame is transmitted with a maximum or current power, an indication of whether stations (STAs) are required to scale TX power, or an indication of which tower or sector identification (ID) to which the parameter set applies. 16. The apparatus according to claim 13, wherein the processing system is arranged to cause the apparatus to: determine a duration of the coverage scaling; and provide an indication of the duration in the CSP. 17. The apparatus according to claim 16, wherein the processing system is arranged to cause the apparatus to: cause transmission of one or more measurement probes to one or more other APs; determine one or more downlink scaling values; and provide a request to at least one of the one or more other APs for coverage scaling. 18. The apparatus according to claim 13, wherein the processing system is arranged to cause the apparatus to: provide a probe request requesting a received power level; and utilize a reply to the probe request to calculate a transmission power reduction. 19. The apparatus according to claim 13, wherein reduced coverage operation is one specific basic service set (BSS) of one or more BSS or one of at least one direction, wherein the processing system is arranged to cause the apparatus to: provide an indication of one or more affected stations (STAs) of the reduced coverage while maintain a previous coverage for non-affected STAs. 20. An apparatus for use in a station (STA), the apparatus comprising a processing system, the processing system comprising at least one processor and at least one memory including computer program code, wherein the processing system is arranged to cause the apparatus to: receive a beacon comprising an indication of a reduced coverage mode in a capability field and one or more coverage scaling parameters (CSP) in an information element; and cause transmission of uplink (UL) communications in accordance with the CSP. 21. The apparatus according to claim 20, wherein the CSP comprises one or more of a relative transmission (TX) power reduction, an indication of whether a current frame is transmitted with a maximum or current power, an indication of whether stations (STAs) are required to scale TX power, or an indication of which tower or sector identification (ID) to which the parameter set applies. 22. The apparatus according to claim 20, wherein the processing system is arranged to cause the apparatus to: provide a probe request in accordance with the CSP to discover APs. 23. The apparatus according to claim 20, wherein the processing system is arranged to cause the apparatus to: determine it reception quality meets a minimum threshold; and in response to reception quality not meeting the minimum threshold, cause transmission of an indication of low quality to an AP. 24. The apparatus according to claim 20, wherein the processing system is arranged to cause the apparatus to provide a first probe request at a first power transmission level and a second a probe request at a second power transmission level, the second power transmission level being higher than the first power transmission level. 25-36. (canceled) 37. The apparatus according to claim 20, wherein the station (STA) is a user equipment.
2,400
6,977
6,977
13,882,632
2,415
A transmitting node uses different reference signal sequences for different types of enhanced control channels. An example method begins with generating ( 1410 ) a first reference signal sequence, from a first initialization value, and generating ( 1420 ) a second reference signal sequence, from a second initialization value. These reference signal sequences are associated with two corresponding enhanced control transmissions. A first enhanced control channel and reference symbols taken from the first reference signal sequence are transmitted ( 1430 ), using first time-frequency resources and a first set of transmission points or a first set of antenna ports or both, and a second enhanced control channel and reference symbols taken from the second reference signal sequence are also transmitted ( 1440 ), using a differing second set of transmission points and/or a differing second set of antenna ports and/or a differing second set of time-frequency resources, in the same subframe or group of subframes.
1-38. (canceled) 39. A method, implemented by a wireless base station, for transmitting reference signals in a wireless network, the method comprising: generating a first reference signal sequence from a first initialization value; and generating a second reference signal sequence from a second initialization value; transmitting a first enhanced control channel and reference symbols taken from the first reference signal sequence, using a first set of time-frequency resources and using a first set of transmission points or a first set of antenna ports or both; and transmitting a second enhanced control channel and reference symbols taken from the second reference signal sequence, using a second set of transmission points, differing from the first set of transmission points, or a second set of antenna ports, differing from the first set of antenna ports, or a second set of time-frequency resources, differing from the first set of time-frequency resources, or using any combination of these second sets, in the same subframe in which the first enhanced control channels and reference symbols from the first reference signal sequence are transmitted. 40. The method of claim 39, wherein the first enhanced control channel is targeted to a common search space and the second enhanced control channel is targeted to a UE-specific search space. 41. The method of claim 39, wherein the first enhanced control channel is for a random access response, or a paging message, or a broadcast control message. 42. The method of claim 39, wherein the first enhanced control channel is distributed among two or more frequency-diverse enhanced control channel regions of the subframe, and the second enhanced control channel is transmitted in a single frequency-localized enhanced control channel region of the subframe or group of subframes. 43. The method of claim 39, wherein the first reference signal sequence is the same used for transmitting a channel-state-information reference signal. 44. The method of claim 39, wherein the second initialization value is the same as or is derived from an initialization value used to obtain demodulation reference signals for a traffic channel transmission. 45. The method of claim 39, wherein the first initialization value is derived from information contained in a synchronization sequence transmitted by the wireless base station. 46. A method, implemented by a wireless device, for demodulating an enhanced control channel, the method comprising: selecting from a first reference signal sequence generated from a first initialization value and a second reference signal sequence generated from a second initialization value; performing channel estimation for a received signal, using reference symbols taken from the selected reference signal sequence; and demodulating an enhanced control channel using the channel estimation results. 47. The method of claim 46, further comprising selecting the first reference signal sequence in response to a determination that the enhanced control channel is targeted to a common search space. 48. The method of claim 47, wherein the enhanced control channel is for receiving a random access response, or a paging message, or a broadcast control message. 49. The method of claim 46, further comprising selecting the second signal sequence in response to a determination that the enhanced control channel is targeted to a UE-specific search space. 50. The method of claim 46, further comprising selecting the first reference signal sequence in response to a determination that the enhanced control channel is a frequency-distributed transmission. 51. The method of claim 46, further comprising selecting the second reference signal sequence in response to a determination that the enhanced control channel is a frequency-localized transmission. 52. The method of claim 46, further comprising determining the first initialization value or the second initialization value, or both, based on information obtained by Radio Resource Control (RRC) signalling. 53. The method of claim 52, wherein the first initialization value or the second initialization value, or both, are further derived from a slot number, or a cyclic-prefix length, or both. 54. The method of claim 46, further comprising determining the first initialization value or the second initialization value, or both, based on the reference signal sequence used for channel-state-information reference signal transmission. 55. The method of claim 46, further comprising determining the first initialization value or the second initialization value, or both, based on the reference signal sequence used for a traffic channel transmission. 56. The method of claim 46, further comprising determining the first initialization value or the second initialization value, or both, based on information obtained from a synchronization signal included in the received signal. 57. The method of claim 46, further comprising: receiving configuration data identifying a set of initialization values; obtaining an index value from the demodulated enhanced control channel, the index value corresponding to a first value from the set of initialization values; performing channel estimation for a traffic channel transmission using reference symbols taken from a reference signal sequence generated from the first value; and demodulating the traffic channel transmission using the results of said channel estimation. 58. A wireless base station, comprising: a reference signal generation unit adapted to generate a first reference signal sequence from a first initialization value and to generate a second reference signal sequence from a second initialization value; and a transmission control unit adapted to transmit both a first enhanced control channel and reference symbols taken from the first reference signal sequence, using a first set of time-frequency resources and using a first set of transmission points or a first set of antenna ports or both, and, in the same subframe, to transmit both a second enhanced control channel and reference symbols taken from the second reference signal sequence, using a second set of transmission points, differing from the first set of transmission points, or a second set of antenna ports, differing from the first set of antenna ports, or a second set of time-frequency resources, differing from the first set of time-frequency resources, or using any combination of these second sets. 59. The wireless base station of claim 58, wherein the first enhanced control channel is targeted to a common search space and the second enhanced control channel is targeted to a UE-specific search space. 60. The wireless base station of claim 58, wherein the first enhanced control channel is for a random access response, or a paging message, or a broadcast control message. 61. The wireless base station of claim 58, wherein the transmission control unit is adapted to transmit the first enhanced control channel in a distributed fashion among two or more frequency-diverse enhanced control channel regions of the subframe or group of subframes, and to transmit the second enhanced control channel in a single frequency-localized enhanced control channel region of the subframe or group of subframes. 62. The wireless base station of claim 58, wherein the first reference signal sequence is the same used for transmitting a channel-state-information reference signal. 63. The wireless base station of claim 58, wherein the second initialization value is the same as or is derived from an initialization value used to obtain demodulation reference signals for a traffic channel transmission. 64. The wireless base station of claim 58, wherein the reference signal generation unit is adapted to derive the first initialization value from information contained in a synchronization sequence transmitted by the wireless base station. 65. A wireless device, comprising: a reference signal selection circuit adapted to select from a first reference signal sequence generated from a first initialization value and a second reference signal sequence generated from a second initialization value; a channel estimator circuit adapted to perform channel estimation for a received signal, using reference symbols taken from the selected reference signal sequence; and a demodulator circuit adapted to demodulate an enhanced control channel using the channel estimation results. 66. The wireless device of claim 65, wherein the reference signal selection circuit is adapted to select the first reference signal sequence in response to a determination that the enhanced control channel is targeted to a common search space. 67. The wireless device of claim 66, wherein the enhanced control channel is for receiving a random access response, or a paging message, or a broadcast control message. 68. The wireless device of claim 65, wherein the reference signal selection circuit is adapted to select the second signal sequence in response to a determination that the enhanced control channel is targeted to a UE-specific search space. 69. The wireless device of claim 65, wherein the reference signal selection circuit is adapted to select the first reference signal sequence in response to a determination that the enhanced control channel is a frequency-distributed transmission. 70. The wireless device of claim 65, wherein the reference signal selection circuit is adapted to select the second reference signal sequence in response to a determination that the enhanced control channel is a frequency-localized transmission. 71. The wireless device of claim 65, wherein the reference signal selection circuit is adapted to determine the first initialization value or the second initialization value, or both, based on information obtained by Radio Resource Control (RRC) signalling. 72. The wireless device of claim 71, wherein the reference signal selection circuit is adapted to further derive the first initialization value or the second initialization value, or both, from a slot number, or a cyclic-prefix length, or both. 73. The wireless device of claim 65, wherein the reference signal selection circuit is adapted to determine the first initialization value or the second initialization value, or both, based on the reference signal sequence used for channel-state-information reference signal transmission. 74. The wireless device of claim 65, wherein the reference signal selection circuit is adapted to determine the first initialization value or the second initialization value, or both, based on the reference signal sequence used for a traffic channel transmission. 75. The wireless device of claim 65, wherein the reference signal selection circuit is adapted to determine the first initialization value or the second initialization value, or both, based on information obtained from a synchronization signal included in the received signal. 76. The wireless device of claim 65, wherein: said reference signal selection circuit is adapted to receive configuration data identifying a set of initialization values and to obtain an index value from the demodulated enhanced control channel, the index value corresponding to a first value from the set of initialization values; said channel estimator circuit is adapted to perform channel estimation for a traffic channel transmission, using reference symbols taken from a reference signal sequence generated from the first value; and said demodulator circuit is adapted to demodulate the traffic channel transmission using the results of said channel estimation.
A transmitting node uses different reference signal sequences for different types of enhanced control channels. An example method begins with generating ( 1410 ) a first reference signal sequence, from a first initialization value, and generating ( 1420 ) a second reference signal sequence, from a second initialization value. These reference signal sequences are associated with two corresponding enhanced control transmissions. A first enhanced control channel and reference symbols taken from the first reference signal sequence are transmitted ( 1430 ), using first time-frequency resources and a first set of transmission points or a first set of antenna ports or both, and a second enhanced control channel and reference symbols taken from the second reference signal sequence are also transmitted ( 1440 ), using a differing second set of transmission points and/or a differing second set of antenna ports and/or a differing second set of time-frequency resources, in the same subframe or group of subframes.1-38. (canceled) 39. A method, implemented by a wireless base station, for transmitting reference signals in a wireless network, the method comprising: generating a first reference signal sequence from a first initialization value; and generating a second reference signal sequence from a second initialization value; transmitting a first enhanced control channel and reference symbols taken from the first reference signal sequence, using a first set of time-frequency resources and using a first set of transmission points or a first set of antenna ports or both; and transmitting a second enhanced control channel and reference symbols taken from the second reference signal sequence, using a second set of transmission points, differing from the first set of transmission points, or a second set of antenna ports, differing from the first set of antenna ports, or a second set of time-frequency resources, differing from the first set of time-frequency resources, or using any combination of these second sets, in the same subframe in which the first enhanced control channels and reference symbols from the first reference signal sequence are transmitted. 40. The method of claim 39, wherein the first enhanced control channel is targeted to a common search space and the second enhanced control channel is targeted to a UE-specific search space. 41. The method of claim 39, wherein the first enhanced control channel is for a random access response, or a paging message, or a broadcast control message. 42. The method of claim 39, wherein the first enhanced control channel is distributed among two or more frequency-diverse enhanced control channel regions of the subframe, and the second enhanced control channel is transmitted in a single frequency-localized enhanced control channel region of the subframe or group of subframes. 43. The method of claim 39, wherein the first reference signal sequence is the same used for transmitting a channel-state-information reference signal. 44. The method of claim 39, wherein the second initialization value is the same as or is derived from an initialization value used to obtain demodulation reference signals for a traffic channel transmission. 45. The method of claim 39, wherein the first initialization value is derived from information contained in a synchronization sequence transmitted by the wireless base station. 46. A method, implemented by a wireless device, for demodulating an enhanced control channel, the method comprising: selecting from a first reference signal sequence generated from a first initialization value and a second reference signal sequence generated from a second initialization value; performing channel estimation for a received signal, using reference symbols taken from the selected reference signal sequence; and demodulating an enhanced control channel using the channel estimation results. 47. The method of claim 46, further comprising selecting the first reference signal sequence in response to a determination that the enhanced control channel is targeted to a common search space. 48. The method of claim 47, wherein the enhanced control channel is for receiving a random access response, or a paging message, or a broadcast control message. 49. The method of claim 46, further comprising selecting the second signal sequence in response to a determination that the enhanced control channel is targeted to a UE-specific search space. 50. The method of claim 46, further comprising selecting the first reference signal sequence in response to a determination that the enhanced control channel is a frequency-distributed transmission. 51. The method of claim 46, further comprising selecting the second reference signal sequence in response to a determination that the enhanced control channel is a frequency-localized transmission. 52. The method of claim 46, further comprising determining the first initialization value or the second initialization value, or both, based on information obtained by Radio Resource Control (RRC) signalling. 53. The method of claim 52, wherein the first initialization value or the second initialization value, or both, are further derived from a slot number, or a cyclic-prefix length, or both. 54. The method of claim 46, further comprising determining the first initialization value or the second initialization value, or both, based on the reference signal sequence used for channel-state-information reference signal transmission. 55. The method of claim 46, further comprising determining the first initialization value or the second initialization value, or both, based on the reference signal sequence used for a traffic channel transmission. 56. The method of claim 46, further comprising determining the first initialization value or the second initialization value, or both, based on information obtained from a synchronization signal included in the received signal. 57. The method of claim 46, further comprising: receiving configuration data identifying a set of initialization values; obtaining an index value from the demodulated enhanced control channel, the index value corresponding to a first value from the set of initialization values; performing channel estimation for a traffic channel transmission using reference symbols taken from a reference signal sequence generated from the first value; and demodulating the traffic channel transmission using the results of said channel estimation. 58. A wireless base station, comprising: a reference signal generation unit adapted to generate a first reference signal sequence from a first initialization value and to generate a second reference signal sequence from a second initialization value; and a transmission control unit adapted to transmit both a first enhanced control channel and reference symbols taken from the first reference signal sequence, using a first set of time-frequency resources and using a first set of transmission points or a first set of antenna ports or both, and, in the same subframe, to transmit both a second enhanced control channel and reference symbols taken from the second reference signal sequence, using a second set of transmission points, differing from the first set of transmission points, or a second set of antenna ports, differing from the first set of antenna ports, or a second set of time-frequency resources, differing from the first set of time-frequency resources, or using any combination of these second sets. 59. The wireless base station of claim 58, wherein the first enhanced control channel is targeted to a common search space and the second enhanced control channel is targeted to a UE-specific search space. 60. The wireless base station of claim 58, wherein the first enhanced control channel is for a random access response, or a paging message, or a broadcast control message. 61. The wireless base station of claim 58, wherein the transmission control unit is adapted to transmit the first enhanced control channel in a distributed fashion among two or more frequency-diverse enhanced control channel regions of the subframe or group of subframes, and to transmit the second enhanced control channel in a single frequency-localized enhanced control channel region of the subframe or group of subframes. 62. The wireless base station of claim 58, wherein the first reference signal sequence is the same used for transmitting a channel-state-information reference signal. 63. The wireless base station of claim 58, wherein the second initialization value is the same as or is derived from an initialization value used to obtain demodulation reference signals for a traffic channel transmission. 64. The wireless base station of claim 58, wherein the reference signal generation unit is adapted to derive the first initialization value from information contained in a synchronization sequence transmitted by the wireless base station. 65. A wireless device, comprising: a reference signal selection circuit adapted to select from a first reference signal sequence generated from a first initialization value and a second reference signal sequence generated from a second initialization value; a channel estimator circuit adapted to perform channel estimation for a received signal, using reference symbols taken from the selected reference signal sequence; and a demodulator circuit adapted to demodulate an enhanced control channel using the channel estimation results. 66. The wireless device of claim 65, wherein the reference signal selection circuit is adapted to select the first reference signal sequence in response to a determination that the enhanced control channel is targeted to a common search space. 67. The wireless device of claim 66, wherein the enhanced control channel is for receiving a random access response, or a paging message, or a broadcast control message. 68. The wireless device of claim 65, wherein the reference signal selection circuit is adapted to select the second signal sequence in response to a determination that the enhanced control channel is targeted to a UE-specific search space. 69. The wireless device of claim 65, wherein the reference signal selection circuit is adapted to select the first reference signal sequence in response to a determination that the enhanced control channel is a frequency-distributed transmission. 70. The wireless device of claim 65, wherein the reference signal selection circuit is adapted to select the second reference signal sequence in response to a determination that the enhanced control channel is a frequency-localized transmission. 71. The wireless device of claim 65, wherein the reference signal selection circuit is adapted to determine the first initialization value or the second initialization value, or both, based on information obtained by Radio Resource Control (RRC) signalling. 72. The wireless device of claim 71, wherein the reference signal selection circuit is adapted to further derive the first initialization value or the second initialization value, or both, from a slot number, or a cyclic-prefix length, or both. 73. The wireless device of claim 65, wherein the reference signal selection circuit is adapted to determine the first initialization value or the second initialization value, or both, based on the reference signal sequence used for channel-state-information reference signal transmission. 74. The wireless device of claim 65, wherein the reference signal selection circuit is adapted to determine the first initialization value or the second initialization value, or both, based on the reference signal sequence used for a traffic channel transmission. 75. The wireless device of claim 65, wherein the reference signal selection circuit is adapted to determine the first initialization value or the second initialization value, or both, based on information obtained from a synchronization signal included in the received signal. 76. The wireless device of claim 65, wherein: said reference signal selection circuit is adapted to receive configuration data identifying a set of initialization values and to obtain an index value from the demodulated enhanced control channel, the index value corresponding to a first value from the set of initialization values; said channel estimator circuit is adapted to perform channel estimation for a traffic channel transmission, using reference symbols taken from a reference signal sequence generated from the first value; and said demodulator circuit is adapted to demodulate the traffic channel transmission using the results of said channel estimation.
2,400
6,978
6,978
14,581,636
2,413
Multi-user channel quality, information (MU-CQI) indicating demodulation interference at the user equipment between co-channel signals within a multi-user, multiple input multiple output (MU-MIMO) transmission is derived utilizing a demodulation interference measurement resource (DM-IMR) and based upon a demodulation reference signal (DMRS). Derivation of signal, interference, and signal-plus-interference parts of the MU-CQI is configurable, as is the MU-CQI reporting, selection of physical resource blocks (PRBs) to be employed, and periods, subframes and/or antenna ports for determining MU-CQI. The interfering transmission may originate from the same transmission point as the desired signal or from a different transmission point.
1. A user equipment, comprising: a receiver configured to receive, via a first set of demodulation reference signal (DMRS) antenna ports, a set of physical resource blocks (PRBs) in a single subframe on a physical downlink shared channel (PDSCH) from a transmission point in a wireless communication system, each of the PRBs including a demodulation interference measurement resource (DM-IMR) received via at least one DMRS antenna port other than the first set of DMRS antenna ports; a controller configured to demodulate the PDSCH, to estimate a signal part of channel quality information (CQI) from a PRB in the set of PRBs received via the first set of DMRS ports, and to determine an interference part of the CQI based upon DM-IMRs within PRBs in the set of PRBs received via the at least one other DMRS antenna port; and a transmitter configured to transmit, to the transmission point, an indication of the CQI. 2. The user equipment according to claim 1, wherein the first set of DMRS antenna ports comprises a subset of a predetermined group of DMRS antenna ports and the at least one other DMRS antenna port comprises all DMRS antenna ports within the predetermined group other than the first set of DMRS antenna ports. 3. The user equipment according to claim 1, wherein the DM-IMR is DMRS other than those scrambled according to a specified scrambling initialization parameter. 4. The user equipment according to claim 1, wherein the DM-IMR is configured by a higher layer. 5. The user equipment according to claim 1, wherein information regarding physical resource blocks (PRBs) containing the DM-IMR is signaled to the user equipment. 6. The user equipment according to claim 1, wherein information regarding a set of subframes containing the DM-IMR is signaled to the user equipment. 7. The user equipment according to claim 1, wherein the DM-IMR is determined according to a downlink assignment resource allocation in a downlink subframe. 8. The user equipment according to claim 1, wherein the user equipment is selectively configured to report one of CQI without interference measurement and DMRS-CQI. 9. The user equipment according to claim 1, wherein the user equipment is configured to report DMRS-CQI together with a hybrid automatic repeat request-acknowledge (HARQ-ACK) feedback on a physical uplink control channel (PUCCH), and wherein the DMRS-CQI is estimated in a subframe in which the user equipment received the set of PRBs. 10. The user equipment according to claim 1, wherein the user equipment is configured with a port mapping table designed to support simultaneous transmission of up to eight streams. 11. A base station, comprising: a transmitter configured to transmit, for reception at a user equipment via a first set of demodulation reference signal (DMRS) antenna ports, a set of physical resource blocks (PRBs) in a single subframe on a physical downlink shared channel (PDSCH) in a wireless communication system, each of the PRBs including a demodulation interference measurement resource (DM-IMR) for reception at the user equipment via at least one DMRS antenna port other than the first set of DMRS antenna ports; a receiver configured to receive, from the user equipment, an indication of channel quality information (CQI) determined by the user equipment by estimating a signal part of the CQI from a PRB in the set of PRBs received at the user equipment via the first set of DMRS ports and by determining an interference part of the CQI based upon DM-IMRs within PRBs in the set of PRBs received at the user equipment via the at least one other DMRS antenna port. 12. The base station according to claim 11, wherein the first set of DMRS antenna ports comprises a subset of a predetermined group of DMRS antenna ports and the at least one other DMRS antenna port comprises all DMRS antenna ports within the predetermined group other than the first set of DMRS ports. 13. The base station according to claim 11, wherein the DM-IMR is DMRS other than those scrambled according to a specified scrambling initialization parameter. 14. The base station according to claim 11, wherein the DM-IMR is configured by a higher layer. 15. The base station according to claim 11, wherein information regarding physical resource blocks (PRBs) containing the DM-IMR is signaled to the user equipment. 16. The base station according to claim 11, wherein information regarding a set of subframes containing the DM-IMR is signaled to the user equipment. 17. The base station according to claim 11, wherein the DM-IMR is determined according to a downlink assignment resource allocation in a downlink subframe. 18. The base station according to claim 11, wherein the base station is configured to receive one of CQI without interference measurement and DMRS-CQI. 19. The base station according to claim 11, wherein the base station is configured to receive the DRMS-CQI together with a hybrid automatic repeat request-acknowledge (HARQ-ACK) feedback on a physical uplink control channel (PUCCH), and wherein the DRMS-CQI is estimated in a subframe in which the user equipment received the PRBs. 20. The base station according to claim 11, wherein the base station is configured to employ a port mapping table designed to support simultaneous transmission of up to eight streams.
Multi-user channel quality, information (MU-CQI) indicating demodulation interference at the user equipment between co-channel signals within a multi-user, multiple input multiple output (MU-MIMO) transmission is derived utilizing a demodulation interference measurement resource (DM-IMR) and based upon a demodulation reference signal (DMRS). Derivation of signal, interference, and signal-plus-interference parts of the MU-CQI is configurable, as is the MU-CQI reporting, selection of physical resource blocks (PRBs) to be employed, and periods, subframes and/or antenna ports for determining MU-CQI. The interfering transmission may originate from the same transmission point as the desired signal or from a different transmission point.1. A user equipment, comprising: a receiver configured to receive, via a first set of demodulation reference signal (DMRS) antenna ports, a set of physical resource blocks (PRBs) in a single subframe on a physical downlink shared channel (PDSCH) from a transmission point in a wireless communication system, each of the PRBs including a demodulation interference measurement resource (DM-IMR) received via at least one DMRS antenna port other than the first set of DMRS antenna ports; a controller configured to demodulate the PDSCH, to estimate a signal part of channel quality information (CQI) from a PRB in the set of PRBs received via the first set of DMRS ports, and to determine an interference part of the CQI based upon DM-IMRs within PRBs in the set of PRBs received via the at least one other DMRS antenna port; and a transmitter configured to transmit, to the transmission point, an indication of the CQI. 2. The user equipment according to claim 1, wherein the first set of DMRS antenna ports comprises a subset of a predetermined group of DMRS antenna ports and the at least one other DMRS antenna port comprises all DMRS antenna ports within the predetermined group other than the first set of DMRS antenna ports. 3. The user equipment according to claim 1, wherein the DM-IMR is DMRS other than those scrambled according to a specified scrambling initialization parameter. 4. The user equipment according to claim 1, wherein the DM-IMR is configured by a higher layer. 5. The user equipment according to claim 1, wherein information regarding physical resource blocks (PRBs) containing the DM-IMR is signaled to the user equipment. 6. The user equipment according to claim 1, wherein information regarding a set of subframes containing the DM-IMR is signaled to the user equipment. 7. The user equipment according to claim 1, wherein the DM-IMR is determined according to a downlink assignment resource allocation in a downlink subframe. 8. The user equipment according to claim 1, wherein the user equipment is selectively configured to report one of CQI without interference measurement and DMRS-CQI. 9. The user equipment according to claim 1, wherein the user equipment is configured to report DMRS-CQI together with a hybrid automatic repeat request-acknowledge (HARQ-ACK) feedback on a physical uplink control channel (PUCCH), and wherein the DMRS-CQI is estimated in a subframe in which the user equipment received the set of PRBs. 10. The user equipment according to claim 1, wherein the user equipment is configured with a port mapping table designed to support simultaneous transmission of up to eight streams. 11. A base station, comprising: a transmitter configured to transmit, for reception at a user equipment via a first set of demodulation reference signal (DMRS) antenna ports, a set of physical resource blocks (PRBs) in a single subframe on a physical downlink shared channel (PDSCH) in a wireless communication system, each of the PRBs including a demodulation interference measurement resource (DM-IMR) for reception at the user equipment via at least one DMRS antenna port other than the first set of DMRS antenna ports; a receiver configured to receive, from the user equipment, an indication of channel quality information (CQI) determined by the user equipment by estimating a signal part of the CQI from a PRB in the set of PRBs received at the user equipment via the first set of DMRS ports and by determining an interference part of the CQI based upon DM-IMRs within PRBs in the set of PRBs received at the user equipment via the at least one other DMRS antenna port. 12. The base station according to claim 11, wherein the first set of DMRS antenna ports comprises a subset of a predetermined group of DMRS antenna ports and the at least one other DMRS antenna port comprises all DMRS antenna ports within the predetermined group other than the first set of DMRS ports. 13. The base station according to claim 11, wherein the DM-IMR is DMRS other than those scrambled according to a specified scrambling initialization parameter. 14. The base station according to claim 11, wherein the DM-IMR is configured by a higher layer. 15. The base station according to claim 11, wherein information regarding physical resource blocks (PRBs) containing the DM-IMR is signaled to the user equipment. 16. The base station according to claim 11, wherein information regarding a set of subframes containing the DM-IMR is signaled to the user equipment. 17. The base station according to claim 11, wherein the DM-IMR is determined according to a downlink assignment resource allocation in a downlink subframe. 18. The base station according to claim 11, wherein the base station is configured to receive one of CQI without interference measurement and DMRS-CQI. 19. The base station according to claim 11, wherein the base station is configured to receive the DRMS-CQI together with a hybrid automatic repeat request-acknowledge (HARQ-ACK) feedback on a physical uplink control channel (PUCCH), and wherein the DRMS-CQI is estimated in a subframe in which the user equipment received the PRBs. 20. The base station according to claim 11, wherein the base station is configured to employ a port mapping table designed to support simultaneous transmission of up to eight streams.
2,400
6,979
6,979
14,868,924
2,488
A security system notifies a user of a security event when a movable barrier operator light turns on. The security system includes a camera in communication with control circuitry and a communication module. The control circuitry is configured to control operation of the camera. The communication module communicates with a light status detector that determines the status of an operator light associated with a movable barrier operator. When the operator light turns on, the light status detector sends a signal to the communication module, effecting the control circuitry to operate the camera to capture security data. The communication module then transmits the captured security data over a network to be accessible by a mobile device.
1. A security apparatus installable with respect to a movable barrier operator at a building entryway, the movable barrier operator having an operator light, the apparatus comprising: a camera configured to capture security data, a light status detector configured to detect an operating status of the operator light; a communication module configured to communicate with the camera and the light status detector, the communication module further configured to communicate with over a network; and control circuitry in communication with the communication module and the camera, the control circuitry configured to control operation of the camera, wherein, the control circuitry is configured to operate the camera to capture security data in response to the light status detector determining that the operator light was turned on, and wherein the communication module is configured to transmit the captured security data via the network. 2. The apparatus of claim 1, wherein the light status detector is a light sensor configured to determine the status of the operator light based on the detection of light generated the operator light. 3. The apparatus of claim 1, wherein the light status detector comprises a socket relay configured to be installed in, and to receive electrical power from, the movable barrier operator, the socket relay further configured to receive the operator light and to conduct electrical power from the movable barrier operator to the operator light. 4. The apparatus of claim 3, wherein the socket relay further comprises a transmitter configured to communicate the operating status of the operator light to the communication module. 5. The apparatus of claim 4, wherein the transmitter is configured to communicate with the communication module via a wireless communication protocol. 6. The apparatus of claim 4, wherein the transmitter is configured to communicate a status that the operator light has turned on in response to the light status detector determining that the socket relay has provided power from the movable barrier operator to the operator light. 7. The apparatus of claim 1, wherein the movable barrier operator controls the status of the operator light based upon an operating mode of the movable barrier operator, and wherein the light status detector is configured to detect the operating status of the operator light based at least in part on the operating mode of the movable barrier operator. 8. The apparatus of claim 7, wherein the light status detector is configured to detect the movable barrier operator attempting to turn the operator light on in response to a movable barrier operator operating mode indicating at least one of the following: a barrier operated by the movable barrier operator is moving; the movable barrier operator detected motion within a proximity of the movable barrier operator; or the movable barrier operator detected that a safety beam installed about the building entryway has been broken. 9. The apparatus of claim 1, wherein the communication module is configured to send communications to, and receive communications from, a mobile device operating a mobile application with a user interface via the network. 10. The apparatus of claim 9, wherein the communication module is configured to communicate information in a format so that the mobile device can display the captured security data via the user interface. 11. The apparatus of claim 10, wherein the control circuitry is configured to effect the communication of notification information from the communication module to the mobile device in response to the light status detector determining that the operator light has turned on, wherein the notification information is configured to effect the mobile application generating a notification upon receipt of the notification information by the mobile device. 12. The apparatus of claim 1, further comprising a power adapter configured to connect to a power source and to provide electrical power to the camera via a cord, wherein the communication module and the control circuitry are integrated into the power adaptor. 13. The apparatus of claim 12, further comprising a cable manager configured to manage slack in the cord between the camera and the power adapter. 14. The apparatus of claim 1, further comprising at least one second camera in communication with, and operably by, the control circuitry. 15. The apparatus of claim 14, wherein the control circuitry is configured to operate the at least one second camera to capture security data in response to the communication module receiving a security signal from the movable barrier operator corresponding to the detection of a security event. 16. The apparatus of claim 15, wherein the movable barrier operator is configured to transmit a security signal in response to at least one of a motion detector detecting motion within the building, or a photo beam sensor installed in the building detects that a photo beam has broken. 17. A security apparatus configured to operate with a garage door operator installed in a garage, the garage door operator having an operator light, the apparatus comprising: a camera configured to capture security data, the security data including at least one of a visual image, a video file, or an audio file; a light status detector configured to detect a status of the operator light; and a wireless transceiver in communication with the camera and the light status detector, the wireless transceiver configured to communicate with one or more remote devices via a wireless signal; wherein the wireless transceiver is configured to receive a signal from the light status detector regarding the status of the operator light and in response to a determination that the operator light was turned on or intended to be turned on, to control operation of the camera to capture security data and to wirelessly transmit the captured security data to a remote device. 18. The apparatus of claim 17, wherein the light status detector is a socket relay installed in the garage door operator, the socket relay comprising a transmitter configured to communicate the status of the operator light to the wireless transceiver. 19. The apparatus of claim 18, wherein the socket relay is installable in a light socket on the garage door operator, wherein the socket relay is configured to receive the operator light, to provide power to the light, and to detect the status of the light. 20. The apparatus of claim 17, wherein the light status detector is a light sensor configured to determine the status of the operator light based on the detection of light generated the operator light. 21. The apparatus of claim 17, wherein the garage door operator controls the status of the garage door operator light, and wherein the garage door operator turns the operator light on in response to at least one of the following: a door operated by the garage door operator opening or closing; the garage door operator detecting motion within the garage; and the garage door operator detecting that a safety beam installed about an entrance to the garage has been broken. 22. The apparatus of claim 17, further comprising a power adapter configured to connect to a power source and to provide electrical power to the camera, wherein the wireless transceiver is integrated into the power adaptor. 23. A method for monitoring security in a garage, the garage equipped with a garage door and a garage door operator, the garage door operator having an operator light, the operator light configured to turn on in response to at least one of the garage door opening and/or closing, detecting motion within the garage, and an object breaking a safety beam generated about an entrance to the garage, the method comprising: detecting an occurrence of a security event with the garage door operator, attempting to turn on the operator light in response to the detection of the security event, detecting the status of the operator light with a light status detector, communicating the detected status of the operator light to a wireless transceiver; operating a camera to obtain security data based on the detected status of the operator light, the security data comprising at least one of visual images, video files, and audio files; and transmitting security data via the wireless transceiver to a remote wireless communication device.
A security system notifies a user of a security event when a movable barrier operator light turns on. The security system includes a camera in communication with control circuitry and a communication module. The control circuitry is configured to control operation of the camera. The communication module communicates with a light status detector that determines the status of an operator light associated with a movable barrier operator. When the operator light turns on, the light status detector sends a signal to the communication module, effecting the control circuitry to operate the camera to capture security data. The communication module then transmits the captured security data over a network to be accessible by a mobile device.1. A security apparatus installable with respect to a movable barrier operator at a building entryway, the movable barrier operator having an operator light, the apparatus comprising: a camera configured to capture security data, a light status detector configured to detect an operating status of the operator light; a communication module configured to communicate with the camera and the light status detector, the communication module further configured to communicate with over a network; and control circuitry in communication with the communication module and the camera, the control circuitry configured to control operation of the camera, wherein, the control circuitry is configured to operate the camera to capture security data in response to the light status detector determining that the operator light was turned on, and wherein the communication module is configured to transmit the captured security data via the network. 2. The apparatus of claim 1, wherein the light status detector is a light sensor configured to determine the status of the operator light based on the detection of light generated the operator light. 3. The apparatus of claim 1, wherein the light status detector comprises a socket relay configured to be installed in, and to receive electrical power from, the movable barrier operator, the socket relay further configured to receive the operator light and to conduct electrical power from the movable barrier operator to the operator light. 4. The apparatus of claim 3, wherein the socket relay further comprises a transmitter configured to communicate the operating status of the operator light to the communication module. 5. The apparatus of claim 4, wherein the transmitter is configured to communicate with the communication module via a wireless communication protocol. 6. The apparatus of claim 4, wherein the transmitter is configured to communicate a status that the operator light has turned on in response to the light status detector determining that the socket relay has provided power from the movable barrier operator to the operator light. 7. The apparatus of claim 1, wherein the movable barrier operator controls the status of the operator light based upon an operating mode of the movable barrier operator, and wherein the light status detector is configured to detect the operating status of the operator light based at least in part on the operating mode of the movable barrier operator. 8. The apparatus of claim 7, wherein the light status detector is configured to detect the movable barrier operator attempting to turn the operator light on in response to a movable barrier operator operating mode indicating at least one of the following: a barrier operated by the movable barrier operator is moving; the movable barrier operator detected motion within a proximity of the movable barrier operator; or the movable barrier operator detected that a safety beam installed about the building entryway has been broken. 9. The apparatus of claim 1, wherein the communication module is configured to send communications to, and receive communications from, a mobile device operating a mobile application with a user interface via the network. 10. The apparatus of claim 9, wherein the communication module is configured to communicate information in a format so that the mobile device can display the captured security data via the user interface. 11. The apparatus of claim 10, wherein the control circuitry is configured to effect the communication of notification information from the communication module to the mobile device in response to the light status detector determining that the operator light has turned on, wherein the notification information is configured to effect the mobile application generating a notification upon receipt of the notification information by the mobile device. 12. The apparatus of claim 1, further comprising a power adapter configured to connect to a power source and to provide electrical power to the camera via a cord, wherein the communication module and the control circuitry are integrated into the power adaptor. 13. The apparatus of claim 12, further comprising a cable manager configured to manage slack in the cord between the camera and the power adapter. 14. The apparatus of claim 1, further comprising at least one second camera in communication with, and operably by, the control circuitry. 15. The apparatus of claim 14, wherein the control circuitry is configured to operate the at least one second camera to capture security data in response to the communication module receiving a security signal from the movable barrier operator corresponding to the detection of a security event. 16. The apparatus of claim 15, wherein the movable barrier operator is configured to transmit a security signal in response to at least one of a motion detector detecting motion within the building, or a photo beam sensor installed in the building detects that a photo beam has broken. 17. A security apparatus configured to operate with a garage door operator installed in a garage, the garage door operator having an operator light, the apparatus comprising: a camera configured to capture security data, the security data including at least one of a visual image, a video file, or an audio file; a light status detector configured to detect a status of the operator light; and a wireless transceiver in communication with the camera and the light status detector, the wireless transceiver configured to communicate with one or more remote devices via a wireless signal; wherein the wireless transceiver is configured to receive a signal from the light status detector regarding the status of the operator light and in response to a determination that the operator light was turned on or intended to be turned on, to control operation of the camera to capture security data and to wirelessly transmit the captured security data to a remote device. 18. The apparatus of claim 17, wherein the light status detector is a socket relay installed in the garage door operator, the socket relay comprising a transmitter configured to communicate the status of the operator light to the wireless transceiver. 19. The apparatus of claim 18, wherein the socket relay is installable in a light socket on the garage door operator, wherein the socket relay is configured to receive the operator light, to provide power to the light, and to detect the status of the light. 20. The apparatus of claim 17, wherein the light status detector is a light sensor configured to determine the status of the operator light based on the detection of light generated the operator light. 21. The apparatus of claim 17, wherein the garage door operator controls the status of the garage door operator light, and wherein the garage door operator turns the operator light on in response to at least one of the following: a door operated by the garage door operator opening or closing; the garage door operator detecting motion within the garage; and the garage door operator detecting that a safety beam installed about an entrance to the garage has been broken. 22. The apparatus of claim 17, further comprising a power adapter configured to connect to a power source and to provide electrical power to the camera, wherein the wireless transceiver is integrated into the power adaptor. 23. A method for monitoring security in a garage, the garage equipped with a garage door and a garage door operator, the garage door operator having an operator light, the operator light configured to turn on in response to at least one of the garage door opening and/or closing, detecting motion within the garage, and an object breaking a safety beam generated about an entrance to the garage, the method comprising: detecting an occurrence of a security event with the garage door operator, attempting to turn on the operator light in response to the detection of the security event, detecting the status of the operator light with a light status detector, communicating the detected status of the operator light to a wireless transceiver; operating a camera to obtain security data based on the detected status of the operator light, the security data comprising at least one of visual images, video files, and audio files; and transmitting security data via the wireless transceiver to a remote wireless communication device.
2,400
6,980
6,980
12,814,197
2,433
A system and method is provided for using a DNS server operating on a wide area network to enable an authorized reception device to receive (or be provided with) restricted content data associated with a particular wide area network address and redefine the domain name associated with a particular wide area network address. In a preferred embodiment of the present invention, an authorization application is adapted to provide the reception device with user-verification data, receive from the reception device verification data, and provide the filtering application with authorization data. The filtering application, which operates similarly to prior art DNS server systems, is further adapted to receive filtered data (i.e., password-required data and/or pseudo-domain-name data) and authorization data in order to provide an IP address of the content server to the reception device via a wide area network, such as the Internet.
1. A method for directing access to content, the method comprising: receiving, at a computing system, requests for content from a plurality of network-connected computing devices, each of the requests comprising a domain name, wherein the computing system is operably associated with a memory holding a data structure that associates IP addresses for network content servers with domain names; determining for ones of the requests a network address based on associations of respective domain names in the requests to network addresses in the data structure, wherein the network address comprises at least one of an IP address and at least one of a redirected domain name; and providing the network addresses to requesting ones of the plurality of network-connected computing devices. 2. The method of claim 1, further comprising operating an authorization server in communication with the computing system and with the plurality of network devices, wherein the authorization server is operably associated with a second memory holding an authorization application, the authorization application operable to verify user access privileges for each of the requests. 3. The method of claim 2, wherein the authorization is further configured to obtain verification data from ones of the network devices for verifying user access privileges. 4. The method of claim 3, wherein the authorization server is further configured to provide authorization data to the computing system. 5. The method of claim 4, wherein the providing further comprises providing the IP address together with the redirected domain name in response to requests for which the authorization data indicates that the user is not authorized to receive unfiltered information. 6. The method of claim 4, wherein the providing further comprises providing a message indicating that access to requested content is not authorized in response to requests for which the authorization data indicates that the user is not authorized to receive requested information. 7. The method of claim 4, wherein the providing further comprises providing the IP address together with the redirected domain name in response to requests for which the authorization data matching authorization data in the domain name table is not received. 8. The method of claim 3, wherein the obtaining verification data further comprises obtaining payment information from users requesting access to specified content. 9. The method of claim 3, wherein the obtaining verification data further comprises obtaining information from users, the information selected from the group consisting of a user password and user identifying information. 10. The method of claim 1, further comprising rewarding users for designating the computing system as their default name server for handling domain name requests. 11. The method of claim 1, further comprising communicating an authorization status to content servers via the redirected domain names provided in the responding step. 12. A computing system for directing access to content, the computing system comprising: a processor; a memory holding a data structure that associates IP addresses for network content servers with domain names; and one or more modules configured for execution on the processor in order to cause the computing system to: receive requests for content from a plurality of network-connected computing devices, each of the requests comprising a domain name; determine for ones of the requests a network address based on associations of respective domain names in the requests to network addresses in the domain name data structure, wherein the network address comprises at least one of an IP address and a redirected domain name; and respond to the requests by providing the network addresses to requesting ones of the plurality of network devices. 13. The computing system of claim 12, wherein the computing system communicates with an authorization server, wherein the authorization server is operably associated with a second memory holding an authorization application, the authorization application operable to verify user access privileges for each of the requests. 14. The computing system of claim 13, wherein the computing system receives authorization data from the authorization server. 15. The computing system of claim 14, wherein one or modules further cause the computing system to provide the IP address together with the redirected domain name in response to requests for which the authorization data indicates that the user is not authorized to receive unfiltered information. 16. The computing system of claim 14, wherein one or modules further cause the computing system to provide a message indicating that access to requested content is not authorized in response to requests for which the authorization data indicates that the user is not authorized to receive requested information. 17. A tangible computer-readable medium having instructions stored thereon that, in response to execution by a computing system, cause the computing system to perform operations comprising: receiving, at a computing system, requests for content from a plurality of network-connected computing devices, each of the requests comprising a domain name, wherein the computing system is operably associated with a memory holding a data structure that associates IP addresses for network content servers with domain names; determining for ones of the requests a network address based on an associations of respective domain names in the requests to network addresses in the data structure, wherein the network address comprises at least one of an IP address and a redirected domain name; and responding to the requests by providing the network addresses to requesting ones of the plurality of network devices. 18. The computer-readable medium of claim 17, wherein the operations further comprise operating an authorization server in communication with the computing system and with the plurality of network devices, wherein the authorization server is operably associated with a second memory holding an authorization application, the authorization application operable to verify user access privileges for each of the requests 19. The computer-readable medium of claim 17, wherein the operations further comprise rewarding users for designating the computing system as their default name server for handling domain name requests. 20. The computer-readable medium of claim 17, wherein the operations further comprise communicating an authorization status to content servers via the redirected domain names provided in the responding step.
A system and method is provided for using a DNS server operating on a wide area network to enable an authorized reception device to receive (or be provided with) restricted content data associated with a particular wide area network address and redefine the domain name associated with a particular wide area network address. In a preferred embodiment of the present invention, an authorization application is adapted to provide the reception device with user-verification data, receive from the reception device verification data, and provide the filtering application with authorization data. The filtering application, which operates similarly to prior art DNS server systems, is further adapted to receive filtered data (i.e., password-required data and/or pseudo-domain-name data) and authorization data in order to provide an IP address of the content server to the reception device via a wide area network, such as the Internet.1. A method for directing access to content, the method comprising: receiving, at a computing system, requests for content from a plurality of network-connected computing devices, each of the requests comprising a domain name, wherein the computing system is operably associated with a memory holding a data structure that associates IP addresses for network content servers with domain names; determining for ones of the requests a network address based on associations of respective domain names in the requests to network addresses in the data structure, wherein the network address comprises at least one of an IP address and at least one of a redirected domain name; and providing the network addresses to requesting ones of the plurality of network-connected computing devices. 2. The method of claim 1, further comprising operating an authorization server in communication with the computing system and with the plurality of network devices, wherein the authorization server is operably associated with a second memory holding an authorization application, the authorization application operable to verify user access privileges for each of the requests. 3. The method of claim 2, wherein the authorization is further configured to obtain verification data from ones of the network devices for verifying user access privileges. 4. The method of claim 3, wherein the authorization server is further configured to provide authorization data to the computing system. 5. The method of claim 4, wherein the providing further comprises providing the IP address together with the redirected domain name in response to requests for which the authorization data indicates that the user is not authorized to receive unfiltered information. 6. The method of claim 4, wherein the providing further comprises providing a message indicating that access to requested content is not authorized in response to requests for which the authorization data indicates that the user is not authorized to receive requested information. 7. The method of claim 4, wherein the providing further comprises providing the IP address together with the redirected domain name in response to requests for which the authorization data matching authorization data in the domain name table is not received. 8. The method of claim 3, wherein the obtaining verification data further comprises obtaining payment information from users requesting access to specified content. 9. The method of claim 3, wherein the obtaining verification data further comprises obtaining information from users, the information selected from the group consisting of a user password and user identifying information. 10. The method of claim 1, further comprising rewarding users for designating the computing system as their default name server for handling domain name requests. 11. The method of claim 1, further comprising communicating an authorization status to content servers via the redirected domain names provided in the responding step. 12. A computing system for directing access to content, the computing system comprising: a processor; a memory holding a data structure that associates IP addresses for network content servers with domain names; and one or more modules configured for execution on the processor in order to cause the computing system to: receive requests for content from a plurality of network-connected computing devices, each of the requests comprising a domain name; determine for ones of the requests a network address based on associations of respective domain names in the requests to network addresses in the domain name data structure, wherein the network address comprises at least one of an IP address and a redirected domain name; and respond to the requests by providing the network addresses to requesting ones of the plurality of network devices. 13. The computing system of claim 12, wherein the computing system communicates with an authorization server, wherein the authorization server is operably associated with a second memory holding an authorization application, the authorization application operable to verify user access privileges for each of the requests. 14. The computing system of claim 13, wherein the computing system receives authorization data from the authorization server. 15. The computing system of claim 14, wherein one or modules further cause the computing system to provide the IP address together with the redirected domain name in response to requests for which the authorization data indicates that the user is not authorized to receive unfiltered information. 16. The computing system of claim 14, wherein one or modules further cause the computing system to provide a message indicating that access to requested content is not authorized in response to requests for which the authorization data indicates that the user is not authorized to receive requested information. 17. A tangible computer-readable medium having instructions stored thereon that, in response to execution by a computing system, cause the computing system to perform operations comprising: receiving, at a computing system, requests for content from a plurality of network-connected computing devices, each of the requests comprising a domain name, wherein the computing system is operably associated with a memory holding a data structure that associates IP addresses for network content servers with domain names; determining for ones of the requests a network address based on an associations of respective domain names in the requests to network addresses in the data structure, wherein the network address comprises at least one of an IP address and a redirected domain name; and responding to the requests by providing the network addresses to requesting ones of the plurality of network devices. 18. The computer-readable medium of claim 17, wherein the operations further comprise operating an authorization server in communication with the computing system and with the plurality of network devices, wherein the authorization server is operably associated with a second memory holding an authorization application, the authorization application operable to verify user access privileges for each of the requests 19. The computer-readable medium of claim 17, wherein the operations further comprise rewarding users for designating the computing system as their default name server for handling domain name requests. 20. The computer-readable medium of claim 17, wherein the operations further comprise communicating an authorization status to content servers via the redirected domain names provided in the responding step.
2,400
6,981
6,981
13,883,410
2,463
There is provided configuration of a communications link. The configuration involves wirelessly receiving control signalling from a user equipment by a network node functional unit. The control signalling relates to an uplink communications resource between the user equipment and the network node functional unit. The configuration further involves notifying, in response to receiving the control signalling and prior to receiving any user data associated with the control signalling from the user equipment on the uplink communications resource, a backhaul client functional unit to configure a communications link to a backhaul hub.
1. A method for configuring a communications link, the method being performed by a network node functional unit, comprising the steps of: wirelessly receiving control signalling from a user equipment, the control signalling relating to an uplink communications resource between the user equipment and the network node functional unit; and notifying in response to receiving said control signalling and prior to receiving any user data associated with said control signalling from said user equipment on said uplink communications resource, a backhaul client functional unit to configure a communications link to a backhaul hub. 2. The method according to claim 1, wherein the communications resource refers to a communications link to be established between the user equipment and the network node functional unit. 3. The method according to claim 1, wherein the control signalling comprises a random access preamble or a response to the random access preamble. 4. The method according to claim 1, further comprising: notifying the backhaul client functional unit to initiate a random access procedure with the backhaul hub in response to the network node functional unit receiving the control signalling. 5. The method according to claim 4, further comprising: notifying the backhaul client functional unit to interrupt the initiated random access procedure by the backhaul client functional unit by not transmitting any L2 and/or L3 messages to the backhaul hub. 6. The method according to claim 4, wherein, if the random access procedure has been completed, the method further comprises: notifying the backhaul client functional unit to interrupt further communications with the backhaul hub by not requesting any transmission on the communications link to the backhaul hub or by transmitting an empty buffer status report to the backhaul hub. 7. The method according to claim 1, wherein if case the backhaul client functional unit has established the communication link to the backhaul hub, the method further comprises: notifying, upon having received the control signalling, the backhaul client functional unit to transmit a scheduling request, SR, or buffer status report, BSR, to the backhaul hub. 8. The method according to claim 1, further comprising: predicting based on the received control signalling, a backhaul capacity need for transmitting user data from said backhaul client functional unit to said backhaul hub; and notifying in response to receiving said control signalling and prior to receiving said user data corresponding to said control signalling from said user equipment on said uplink communications resource, the backhaul client functional unit of the predicted backhaul capacity need. 9. The method according to claim 8, further comprising: determining a reliability measure of the prediction; and notifying the backhaul client functional unit of the determined reliability measure to the backhaul client functional unit in conjunction with the predicted backhaul capacity need. 10. The method according to claim 7, wherein the user data to be transmitted is associated with at least two priority classes, and wherein the control signalling from the user equipment comprises buffer status information from at least one of said at least two priority classes. 11. The method according to claim 8, further comprising: transmitting a scheduling grant to the user equipment in conjunction with notifying the backhaul hub functional unit of the predicted backhaul capacity need. 12. The method according to claim 8, further comprising: wirelessly receiving further control signalling from at least one further user equipment, the further control signalling relating to user data to be transmitted between the at least one further user equipment and the network node functional unit; and predicting said backhaul capacity need also based on said further control signalling. 13. A method for configuring a communications link, the method being performed by a backhaul client functional unit, comprising the steps of: receiving a notification from a network node functional unit to configure a communications link to a backhaul hub, wherein the notification was issued in response to control signalling wirelessly received by the network node functional unit from a user equipment, the control signalling relating to an uplink communications resource between the user equipment and the network node functional unit, the notification having been issued prior to the network node functional unit receiving any user data associated with said control signalling from said user equipment on said uplink communications resource; and initiating configuration of said communications link to the backhaul hub. 14. The method according to claim 13, wherein the communications resource refers to a communications link to be established between the user equipment and the network node functional unit. 15. The method according to claim 13, further comprising: receiving a notification from the network node functional unit to configure the communications link by initiating a random access procedure with the backhaul hub, the notification having been issued in response to the network node functional unit receiving the control signalling; and initiating said random access procedure with the backhaul hub. 16. The method according to claim 13, further comprising: receiving a notification from the network node functional unit to interrupt the initiated random access procedure by not transmitting any L2 and/or L3 messages to the backhaul hub; and interrupting said initiated random access procedure according to said received notification. 17. The method according to claim 13, wherein if the backhaul client functional unit has established the communication link to the backhaul hub, the method further comprises: receiving a notification from the network node functional unit to transmit a scheduling request, SR, or buffer status report, BSR, to the backhaul hub, wherein the notification has been issued in response to the network node functional unit having received the control signalling from the user equipment. 18. The method according to claim 13, further comprising: receiving a notification from the network node functional unit, the notification comprising a predicted backhaul capacity need, the predicted backhaul capacity need being based on the control signalling received by the network node functional unit and relating to a backhaul capacity need for transmitting user data from said backhaul client functional unit to said backhaul hub, which user data is to be transmitted using said uplink communications resource, wherein the notification has been issued in response to the network node functional unit having received said control signalling and prior to the network node functional unit having received user data corresponding to said control signalling from said user equipment on said uplink communications resource; and wirelessly transmitting the predicted backhaul capacity need to the backhaul hub. 19. The method according to claim 18, further comprising: receiving a further notification from a further network node functional unit, the further notification comprising a further predicted backhaul capacity need, the further predicted backhaul capacity need being based on further control signalling received by the further network node functional unit and relating to a further backhaul capacity need for transmitting further user data from said backhaul client functional unit to said backhaul hub, wherein the further notification has been issued in response to the further network node functional unit having received said further control signalling and prior to the further network node functional unit having received said further user data corresponding to said further control signalling from at least one further user equipment; and determining the predicted backhaul capacity need to be wirelessly transmitted to the backhaul hub also based on said further predicted backhaul capacity need. 20. The method according to claim 17, further comprising: wirelessly receiving a backhaul capacity grant from the backhaul hub, the backhaul capacity grant being based on actual and/or said predicted capacity need from all backhaul client functional units operatively connected to the backhaul hub. 21. A network node or configuring a communications link, comprising: a network node functional unit arranged to wirelessly receive control signalling from a user equipment, the control signalling relating to an uplink communications resource between the user equipment and the network node functional unit; and to notify, in response to receiving said control signalling and prior to receiving any user data associated with said control signalling from said user equipment on said uplink communications resource, a backhaul client functional unit to configure a communications link to a backhaul hub. 22. A non-transitory computer program for configuring a communications link, the computer program comprising computer program code which, when run on a network node functional unit, causes the network node functional unit to: wirelessly receive control signalling from a user equipment, the control signalling relating to an uplink communications resource between the user equipment and the network node functional unit; and notify, in response to receiving said control signalling and prior to receiving any user data associated with said control signalling from said user equipment on said uplink communications resource, a backhaul client functional unit, to configure a communications link to a backhaul hub. 23. A non-transitory computer program product comprising a computer program according to claim 22 and a computer readable medium on which the computer program is stored. 24. A network node for configuring a communications link, comprising: a backhaul client functional unit arranged to receive a notification from a network node functional unit to configure a communications link to a backhaul hub, wherein the notification was issued in response to control signalling wirelessly received by the network node functional unit from a user equipment, the control signalling relating to an uplink communications resource between the user equipment and the network node functional unit, the notification having been issued prior to the network node functional unit receiving any user data associated with said control signalling from said user equipment on said uplink communications resource; and to initiate configuration of said communications link to the backhaul hub. 25. A non-transitory computer program for configuring a communications link, the computer program comprising computer program code which, when run on a backhaul client functional unit, causes the backhaul client functional unit to: receive a notification from a network node functional unit to configure a communications link to a backhaul hub, wherein the notification was issued in response to control signalling wirelessly received by the network node functional unit from a user equipment, the control signalling relating to an uplink communications resource between the user equipment and the network node functional unit, the notification having been issued prior to the network node functional unit receiving any user data associated with said control signalling from said user equipment on said uplink communications resource; and initiate configuration of said communications link to the backhaul hub. 26. A non-transitory computer program product comprising a computer program according to claim 25 and a computer readable medium on which the computer program is stored.
There is provided configuration of a communications link. The configuration involves wirelessly receiving control signalling from a user equipment by a network node functional unit. The control signalling relates to an uplink communications resource between the user equipment and the network node functional unit. The configuration further involves notifying, in response to receiving the control signalling and prior to receiving any user data associated with the control signalling from the user equipment on the uplink communications resource, a backhaul client functional unit to configure a communications link to a backhaul hub.1. A method for configuring a communications link, the method being performed by a network node functional unit, comprising the steps of: wirelessly receiving control signalling from a user equipment, the control signalling relating to an uplink communications resource between the user equipment and the network node functional unit; and notifying in response to receiving said control signalling and prior to receiving any user data associated with said control signalling from said user equipment on said uplink communications resource, a backhaul client functional unit to configure a communications link to a backhaul hub. 2. The method according to claim 1, wherein the communications resource refers to a communications link to be established between the user equipment and the network node functional unit. 3. The method according to claim 1, wherein the control signalling comprises a random access preamble or a response to the random access preamble. 4. The method according to claim 1, further comprising: notifying the backhaul client functional unit to initiate a random access procedure with the backhaul hub in response to the network node functional unit receiving the control signalling. 5. The method according to claim 4, further comprising: notifying the backhaul client functional unit to interrupt the initiated random access procedure by the backhaul client functional unit by not transmitting any L2 and/or L3 messages to the backhaul hub. 6. The method according to claim 4, wherein, if the random access procedure has been completed, the method further comprises: notifying the backhaul client functional unit to interrupt further communications with the backhaul hub by not requesting any transmission on the communications link to the backhaul hub or by transmitting an empty buffer status report to the backhaul hub. 7. The method according to claim 1, wherein if case the backhaul client functional unit has established the communication link to the backhaul hub, the method further comprises: notifying, upon having received the control signalling, the backhaul client functional unit to transmit a scheduling request, SR, or buffer status report, BSR, to the backhaul hub. 8. The method according to claim 1, further comprising: predicting based on the received control signalling, a backhaul capacity need for transmitting user data from said backhaul client functional unit to said backhaul hub; and notifying in response to receiving said control signalling and prior to receiving said user data corresponding to said control signalling from said user equipment on said uplink communications resource, the backhaul client functional unit of the predicted backhaul capacity need. 9. The method according to claim 8, further comprising: determining a reliability measure of the prediction; and notifying the backhaul client functional unit of the determined reliability measure to the backhaul client functional unit in conjunction with the predicted backhaul capacity need. 10. The method according to claim 7, wherein the user data to be transmitted is associated with at least two priority classes, and wherein the control signalling from the user equipment comprises buffer status information from at least one of said at least two priority classes. 11. The method according to claim 8, further comprising: transmitting a scheduling grant to the user equipment in conjunction with notifying the backhaul hub functional unit of the predicted backhaul capacity need. 12. The method according to claim 8, further comprising: wirelessly receiving further control signalling from at least one further user equipment, the further control signalling relating to user data to be transmitted between the at least one further user equipment and the network node functional unit; and predicting said backhaul capacity need also based on said further control signalling. 13. A method for configuring a communications link, the method being performed by a backhaul client functional unit, comprising the steps of: receiving a notification from a network node functional unit to configure a communications link to a backhaul hub, wherein the notification was issued in response to control signalling wirelessly received by the network node functional unit from a user equipment, the control signalling relating to an uplink communications resource between the user equipment and the network node functional unit, the notification having been issued prior to the network node functional unit receiving any user data associated with said control signalling from said user equipment on said uplink communications resource; and initiating configuration of said communications link to the backhaul hub. 14. The method according to claim 13, wherein the communications resource refers to a communications link to be established between the user equipment and the network node functional unit. 15. The method according to claim 13, further comprising: receiving a notification from the network node functional unit to configure the communications link by initiating a random access procedure with the backhaul hub, the notification having been issued in response to the network node functional unit receiving the control signalling; and initiating said random access procedure with the backhaul hub. 16. The method according to claim 13, further comprising: receiving a notification from the network node functional unit to interrupt the initiated random access procedure by not transmitting any L2 and/or L3 messages to the backhaul hub; and interrupting said initiated random access procedure according to said received notification. 17. The method according to claim 13, wherein if the backhaul client functional unit has established the communication link to the backhaul hub, the method further comprises: receiving a notification from the network node functional unit to transmit a scheduling request, SR, or buffer status report, BSR, to the backhaul hub, wherein the notification has been issued in response to the network node functional unit having received the control signalling from the user equipment. 18. The method according to claim 13, further comprising: receiving a notification from the network node functional unit, the notification comprising a predicted backhaul capacity need, the predicted backhaul capacity need being based on the control signalling received by the network node functional unit and relating to a backhaul capacity need for transmitting user data from said backhaul client functional unit to said backhaul hub, which user data is to be transmitted using said uplink communications resource, wherein the notification has been issued in response to the network node functional unit having received said control signalling and prior to the network node functional unit having received user data corresponding to said control signalling from said user equipment on said uplink communications resource; and wirelessly transmitting the predicted backhaul capacity need to the backhaul hub. 19. The method according to claim 18, further comprising: receiving a further notification from a further network node functional unit, the further notification comprising a further predicted backhaul capacity need, the further predicted backhaul capacity need being based on further control signalling received by the further network node functional unit and relating to a further backhaul capacity need for transmitting further user data from said backhaul client functional unit to said backhaul hub, wherein the further notification has been issued in response to the further network node functional unit having received said further control signalling and prior to the further network node functional unit having received said further user data corresponding to said further control signalling from at least one further user equipment; and determining the predicted backhaul capacity need to be wirelessly transmitted to the backhaul hub also based on said further predicted backhaul capacity need. 20. The method according to claim 17, further comprising: wirelessly receiving a backhaul capacity grant from the backhaul hub, the backhaul capacity grant being based on actual and/or said predicted capacity need from all backhaul client functional units operatively connected to the backhaul hub. 21. A network node or configuring a communications link, comprising: a network node functional unit arranged to wirelessly receive control signalling from a user equipment, the control signalling relating to an uplink communications resource between the user equipment and the network node functional unit; and to notify, in response to receiving said control signalling and prior to receiving any user data associated with said control signalling from said user equipment on said uplink communications resource, a backhaul client functional unit to configure a communications link to a backhaul hub. 22. A non-transitory computer program for configuring a communications link, the computer program comprising computer program code which, when run on a network node functional unit, causes the network node functional unit to: wirelessly receive control signalling from a user equipment, the control signalling relating to an uplink communications resource between the user equipment and the network node functional unit; and notify, in response to receiving said control signalling and prior to receiving any user data associated with said control signalling from said user equipment on said uplink communications resource, a backhaul client functional unit, to configure a communications link to a backhaul hub. 23. A non-transitory computer program product comprising a computer program according to claim 22 and a computer readable medium on which the computer program is stored. 24. A network node for configuring a communications link, comprising: a backhaul client functional unit arranged to receive a notification from a network node functional unit to configure a communications link to a backhaul hub, wherein the notification was issued in response to control signalling wirelessly received by the network node functional unit from a user equipment, the control signalling relating to an uplink communications resource between the user equipment and the network node functional unit, the notification having been issued prior to the network node functional unit receiving any user data associated with said control signalling from said user equipment on said uplink communications resource; and to initiate configuration of said communications link to the backhaul hub. 25. A non-transitory computer program for configuring a communications link, the computer program comprising computer program code which, when run on a backhaul client functional unit, causes the backhaul client functional unit to: receive a notification from a network node functional unit to configure a communications link to a backhaul hub, wherein the notification was issued in response to control signalling wirelessly received by the network node functional unit from a user equipment, the control signalling relating to an uplink communications resource between the user equipment and the network node functional unit, the notification having been issued prior to the network node functional unit receiving any user data associated with said control signalling from said user equipment on said uplink communications resource; and initiate configuration of said communications link to the backhaul hub. 26. A non-transitory computer program product comprising a computer program according to claim 25 and a computer readable medium on which the computer program is stored.
2,400
6,982
6,982
13,925,166
2,443
A terminator node is provided that acts as termination on one end of the communication channel and links to the SAP server on the other end. A server device is also provided that monitors communications between the SAP server and a client. The server device condenses SAP application screens to streamline user interaction with the SAP server. The server device simulates certain types of required responses to the SAP server to allow for a persistent session between a client and the SAP server when the actual connection may be intermittent. The server device stores required records for a transaction and provides them to a client for offline processing and then synchronizes stored offline transaction data from the client with the SAP server. The system may include a client device that optionally implements the terminator node to communicate either with the server device or directly to the SAP server.
1. A computer-implemented method for facilitating communications between a client mobile device and a SAP server, comprising: receiving a communication directed to the client mobile device from the SAP server; parsing the communication with a processor into one or more requests; determining if each of the one or more requests requires a response to maintain a session between the client mobile device and the SAP server; and sending a simulated response to the SAP server in response to each of the determined ones of the one or more requests that require the response to maintain the session between the client mobile device and the SAP server. 2. The computer-implemented method of claim 1, wherein the determining if each of the one or more requests requires the response to maintain the session between the client mobile device and the SAP server further comprises determining if the each of the one or more requests is a remote function call (RFC) request; and wherein the computer-implemented method further comprises forwarding ones of the one or more requests that are determined not to be a RFC request to the client mobile device. 3. The computer-implemented method of claim 2, wherein the determining if each of the one or more requests requires the response to maintain the session between the client mobile device and the SAP server further comprises determining if each determined RFC request requires the response to maintain the session between the client mobile device and the SAP server; and wherein the computer-implemented method further comprises generating the simulated response for the each determined RFC request that is determined to require the response to maintain the session between the client mobile device and the SAP server. 4. The computer-implemented method of claim 1, further comprising forwarding remaining ones of the one or more requests that do not require the response to maintain the session between the client mobile device and the SAP server to the client mobile device, and forwarding a client response from the client mobile device to the SAP server for the remaining ones of the one or more requests. 5. The computer-implemented method of claim 1, further comprising executing an action for the each of the determined ones of the one or more requests that require the response to maintain the session between the client mobile device and the SAP server after sending the simulated response to the SAP server. 6. The computer-implemented method of claim 1, further comprising translating the communication from the SAP server into a format used by the client mobile device. 7. The computer implemented method of claim 1, wherein the simulated response is sent to obtain a full range of available data from the SAP server. 8. The computer-implemented method of claim 2, where the RFC request is an OLE_FLUSH_CALL associated with a plurality of discrete actions, wherein the simulated response is based on each of the plurality of discrete actions. 9. The computer-implemented method of claim 8, wherein the simulated response comprises one or more handles associated with ones of the plurality of discrete actions that require a handle. 10. The computer-implemented method of claim 9, wherein the client mobile device generates the one or more handles. 11. A client mobile device, comprising: a processor configured to: parse a communication from a SAP server into one or more requests; determine if each of the one or more requests requires a response to maintain a session between the client mobile device and the SAP server; and send a simulated response to the SAP server in response to each of the determined ones of the one or more requests that require the response to maintain the session between the client mobile device and the SAP server. 12. The client mobile device of claim 11, wherein the processor is configured to determine if each of the one or more requests requires the response to maintain the session between the client mobile device and the SAP server by determining if the each of the one or more requests is a remote function call (RFC) request; and wherein the processor is further configured to designate ones of the one or more requests that are determined not to be a RFC request as a lower priority. 13. The client mobile device of claim 12, wherein the processor is configured to determine if each of the one or more requests requires the response to maintain the session between the client mobile device and the SAP server by determining if each determined RFC request requires the response to maintain the session between the client mobile device and the SAP server; and wherein the processor is further configured to generate the simulated response for the each determined RFC request that is determined to require the response to maintain the session between the client mobile device and the SAP server. 14. The client mobile device of claim 11, wherein the processor is further configured to designate remaining ones of the one or more requests that do not require the response to maintain the session between the client mobile device and the SAP server as having a lower priority. 15. The client mobile device of claim 11, wherein the processor is further configured to execute an action for the each of the determined ones of the one or more requests that require the response to maintain the session between the client mobile device and the SAP server after sending the simulated response to the SAP server. 16. The client mobile device of claim 11, wherein the processor is further configured to translate the communication from the SAP server into a format used by the client mobile device. 17. The client mobile device of claim 11, wherein the processor is further configured to send the simulated response to receive a full range of available data from the SAP server. 18. The client mobile device of claim 12, where the RFC request is an OLE_FLUSH_CALL associated with a plurality of discrete actions, wherein the simulated response is based on each of the plurality of discrete actions. 19. The client mobile device of claim 18, wherein the simulated response comprises one or more handles associated with ones of the plurality of discrete actions that require a handle. 20. The client mobile device of claim 19, wherein the client mobile device generates the one or more handles. 21. A method for a client mobile device, comprising: parsing a communication from a SAP server with a processor into one or more requests; determining if each of the one or more requests requires a response to maintain a session between the client mobile device and the SAP server; and sending a simulated response to the SAP server in response to each of the determined ones of the one or more requests that require the response to maintain the session between the client mobile device and the SAP server. 22. The method of claim 21, wherein the determining if each of the one or more requests requires the response to maintain the session between the client mobile device and the SAP server further comprises determining if the each of the one or more requests is a remote function call (RFC) request; and wherein the method further comprises designating ones of the one or more requests that are determined not to be a RFC request as a lower priority. 23. The method of claim 22, wherein the determining if each of the one or more requests requires the response to maintain the session between the client mobile device and the SAP server further comprises determining if each determined RFC request requires the response to maintain the session between the client mobile device and the SAP server; and wherein the method further comprises generating the simulated response for the each determined RFC request that is determined to require the response to maintain the session between the client mobile device and the SAP server. 24. The method of claim 21, further comprising designating remaining ones of the one or more requests that do not require the response to maintain the session between the client mobile device and the SAP server as having a lower priority. 25. The method of claim 21, further comprising executing an action for the each of the determined ones of the one or more requests that require the response to maintain the session between the client mobile device and the SAP server after sending the simulated response to the SAP server. 26. The method of claim 21, further comprising translating the communication from the SAP server into a format used by the client mobile device. 27. The method of claim 21, further comprising maintaining the simulated response until a full range of available data from the SAP server is obtained. 28. The method of claim 22, where the RFC request is an OLE_FLUSH_CALL associated with a plurality of discrete actions, wherein the simulated response is based on each of the plurality of discrete actions. 29. The method of claim 28, wherein the simulated response comprises one or more handles associated with ones of the plurality of discrete actions that require a handle. 30. The method of claim 29, further comprising generating and simulating the one or more handles.
A terminator node is provided that acts as termination on one end of the communication channel and links to the SAP server on the other end. A server device is also provided that monitors communications between the SAP server and a client. The server device condenses SAP application screens to streamline user interaction with the SAP server. The server device simulates certain types of required responses to the SAP server to allow for a persistent session between a client and the SAP server when the actual connection may be intermittent. The server device stores required records for a transaction and provides them to a client for offline processing and then synchronizes stored offline transaction data from the client with the SAP server. The system may include a client device that optionally implements the terminator node to communicate either with the server device or directly to the SAP server.1. A computer-implemented method for facilitating communications between a client mobile device and a SAP server, comprising: receiving a communication directed to the client mobile device from the SAP server; parsing the communication with a processor into one or more requests; determining if each of the one or more requests requires a response to maintain a session between the client mobile device and the SAP server; and sending a simulated response to the SAP server in response to each of the determined ones of the one or more requests that require the response to maintain the session between the client mobile device and the SAP server. 2. The computer-implemented method of claim 1, wherein the determining if each of the one or more requests requires the response to maintain the session between the client mobile device and the SAP server further comprises determining if the each of the one or more requests is a remote function call (RFC) request; and wherein the computer-implemented method further comprises forwarding ones of the one or more requests that are determined not to be a RFC request to the client mobile device. 3. The computer-implemented method of claim 2, wherein the determining if each of the one or more requests requires the response to maintain the session between the client mobile device and the SAP server further comprises determining if each determined RFC request requires the response to maintain the session between the client mobile device and the SAP server; and wherein the computer-implemented method further comprises generating the simulated response for the each determined RFC request that is determined to require the response to maintain the session between the client mobile device and the SAP server. 4. The computer-implemented method of claim 1, further comprising forwarding remaining ones of the one or more requests that do not require the response to maintain the session between the client mobile device and the SAP server to the client mobile device, and forwarding a client response from the client mobile device to the SAP server for the remaining ones of the one or more requests. 5. The computer-implemented method of claim 1, further comprising executing an action for the each of the determined ones of the one or more requests that require the response to maintain the session between the client mobile device and the SAP server after sending the simulated response to the SAP server. 6. The computer-implemented method of claim 1, further comprising translating the communication from the SAP server into a format used by the client mobile device. 7. The computer implemented method of claim 1, wherein the simulated response is sent to obtain a full range of available data from the SAP server. 8. The computer-implemented method of claim 2, where the RFC request is an OLE_FLUSH_CALL associated with a plurality of discrete actions, wherein the simulated response is based on each of the plurality of discrete actions. 9. The computer-implemented method of claim 8, wherein the simulated response comprises one or more handles associated with ones of the plurality of discrete actions that require a handle. 10. The computer-implemented method of claim 9, wherein the client mobile device generates the one or more handles. 11. A client mobile device, comprising: a processor configured to: parse a communication from a SAP server into one or more requests; determine if each of the one or more requests requires a response to maintain a session between the client mobile device and the SAP server; and send a simulated response to the SAP server in response to each of the determined ones of the one or more requests that require the response to maintain the session between the client mobile device and the SAP server. 12. The client mobile device of claim 11, wherein the processor is configured to determine if each of the one or more requests requires the response to maintain the session between the client mobile device and the SAP server by determining if the each of the one or more requests is a remote function call (RFC) request; and wherein the processor is further configured to designate ones of the one or more requests that are determined not to be a RFC request as a lower priority. 13. The client mobile device of claim 12, wherein the processor is configured to determine if each of the one or more requests requires the response to maintain the session between the client mobile device and the SAP server by determining if each determined RFC request requires the response to maintain the session between the client mobile device and the SAP server; and wherein the processor is further configured to generate the simulated response for the each determined RFC request that is determined to require the response to maintain the session between the client mobile device and the SAP server. 14. The client mobile device of claim 11, wherein the processor is further configured to designate remaining ones of the one or more requests that do not require the response to maintain the session between the client mobile device and the SAP server as having a lower priority. 15. The client mobile device of claim 11, wherein the processor is further configured to execute an action for the each of the determined ones of the one or more requests that require the response to maintain the session between the client mobile device and the SAP server after sending the simulated response to the SAP server. 16. The client mobile device of claim 11, wherein the processor is further configured to translate the communication from the SAP server into a format used by the client mobile device. 17. The client mobile device of claim 11, wherein the processor is further configured to send the simulated response to receive a full range of available data from the SAP server. 18. The client mobile device of claim 12, where the RFC request is an OLE_FLUSH_CALL associated with a plurality of discrete actions, wherein the simulated response is based on each of the plurality of discrete actions. 19. The client mobile device of claim 18, wherein the simulated response comprises one or more handles associated with ones of the plurality of discrete actions that require a handle. 20. The client mobile device of claim 19, wherein the client mobile device generates the one or more handles. 21. A method for a client mobile device, comprising: parsing a communication from a SAP server with a processor into one or more requests; determining if each of the one or more requests requires a response to maintain a session between the client mobile device and the SAP server; and sending a simulated response to the SAP server in response to each of the determined ones of the one or more requests that require the response to maintain the session between the client mobile device and the SAP server. 22. The method of claim 21, wherein the determining if each of the one or more requests requires the response to maintain the session between the client mobile device and the SAP server further comprises determining if the each of the one or more requests is a remote function call (RFC) request; and wherein the method further comprises designating ones of the one or more requests that are determined not to be a RFC request as a lower priority. 23. The method of claim 22, wherein the determining if each of the one or more requests requires the response to maintain the session between the client mobile device and the SAP server further comprises determining if each determined RFC request requires the response to maintain the session between the client mobile device and the SAP server; and wherein the method further comprises generating the simulated response for the each determined RFC request that is determined to require the response to maintain the session between the client mobile device and the SAP server. 24. The method of claim 21, further comprising designating remaining ones of the one or more requests that do not require the response to maintain the session between the client mobile device and the SAP server as having a lower priority. 25. The method of claim 21, further comprising executing an action for the each of the determined ones of the one or more requests that require the response to maintain the session between the client mobile device and the SAP server after sending the simulated response to the SAP server. 26. The method of claim 21, further comprising translating the communication from the SAP server into a format used by the client mobile device. 27. The method of claim 21, further comprising maintaining the simulated response until a full range of available data from the SAP server is obtained. 28. The method of claim 22, where the RFC request is an OLE_FLUSH_CALL associated with a plurality of discrete actions, wherein the simulated response is based on each of the plurality of discrete actions. 29. The method of claim 28, wherein the simulated response comprises one or more handles associated with ones of the plurality of discrete actions that require a handle. 30. The method of claim 29, further comprising generating and simulating the one or more handles.
2,400
6,983
6,983
13,920,635
2,446
A method begins by a processing module identifying one or more devices of a dispersed storage network (DSN) potentially contributing to a DSN performance issue. For a device of the identified one or more devices, the method continues where the processing module determines a potential performance issue of the device and determines a performance test based on the potential performance issue. The method continues where the processing module issues a message to the device that includes test information specific for the device to execute the performance test and receives a response message that includes a specific test result data generated based on the test information. The method continues where the processing module determines, based on the specific test result data, whether the device has the potential performance issue and is contributing to the DSN performance issue.
1. A method for execution by one or more processing modules of one or more requesting devices of a dispersed storage network (DSN), the method comprises: when a DSN performance issue is detected, identifying one or more devices of the DSN potentially contributing to the DSN performance issue; and for a device of the identified one or more devices: determining a potential performance issue of the device based on how the device is potentially contributing to the DSN performance issue; determining a performance test based on the potential performance issue; generating a message that includes a protocol header and a payload, wherein the protocol header includes an indication to identify the message as a test request message and the payload includes test information specific for the device to execute the performance test; sending the message to the device; receiving, from the device, a response message that includes a response header and a response payload, wherein the response header includes an indication to identify the response message as a test response message and the response payload includes a specific test result data generated based on the test information; and determining, based on the specific test result data, whether the device has the potential performance issue and is contributing to the DSN performance issue. 2. The method of claim 1 further comprises: for a second device of the identified one or more devices: determining a second potential performance issue of the second device based on how the second device is potentially contributing to the DSN performance issue; determining a second performance test based on the second potential performance issue; generating a second message that includes a second protocol header and a second payload, wherein the second protocol header includes an indication to identify the second message as another test request message and the second payload includes second test information specific for the second device to execute the second performance test; sending the second message to the second device; receiving, from the second device, a second response message that includes a second response header and a second response payload, wherein the second response header includes an indication to identify the second response message as another test response message and the second response payload includes a second specific test result data generated based on the second test information; and determining, based on the second specific test result data, whether the second device has the second potential performance issue and is contributing to the DSN performance issue. 3. The method of claim 2 further comprises: when the potential performance issue and the second potential performance issue are not individually contributing to the DSN performance issue, determining whether a combination of the potential performance issue and the second potential performance issues are collectively contributing to the DSN performance issue. 4. The method of claim 1 further comprises: detecting the DSN performance issue based on one or more of: detecting a communication error to, from, or between the one or more devices; detecting a storage error indication regarding the one or more devices; detecting a reading error indication regarding the one or more devices; in response to performing a general test in accordance with a DSN test schedule; detecting a reliability issue regarding the one or more devices; and receiving a potential failing performance indicator regarding the one or more devices. 5. The method of claim 1, wherein the identifying the one or more devices comprises one or more of: when the DSN performance issue is based on a communication error, identifying the one or more devices based on a failure to send a communication or to acknowledge receipt of the communication; when the DSN performance issue is based on a storage error, identifying the one or more devices based on a failure to provide confirmation of successfully completing a storage request; when the DSN performance issue is based on a read error, identifying the one or more devices based on a failure to provide retrieved data in accordance with a read request; receiving a message identifying the one or more devices as having a potential reliability issue; and receiving a message identifying the one or more devices as having the potential performance issue. 6. The method of claim 1, wherein the device comprises one of: a dispersed storage (DS) unit; a DS processing unit; a DS processing module; a DS managing module; a DS rebuilding module; and a user device. 7. The method of claim 1, wherein the generating the message further comprises: generating the protocol header to include: an operation code field to identify the message as a test message; a request/response field to identify the message as a request message; a request number field to identify the message as a particular test request message; and a payload length field. 8. The method of claim 1, wherein the generating the message further comprises at least one of: generating the payload to test data transfer speed, wherein the payload includes: a response length field to indicate a desired length of the response message or portion thereof; and the test information specific for the device that includes an indication of the data transfer speed test and minimal data for transferring between the device and the one or more requesting devices to test speed; generating the payload to test data transfer bandwidth, wherein the payload includes: the response length field to indicate the desired length of the response message or the portion thereof; and the test information specific for the device that includes an indication of the data transfer bandwidth test and a large amount of data for transferring between the device and the one or more requesting devices to test bandwidth; generating the payload to test data transfer latency, wherein the payload includes: the response length field to indicate the desired length of the response message or the portion thereof; and the test information specific for the device that includes an indication of the data transfer latency test and data for transferring between the device and the one or more requesting devices to test latency; and generating the payload to test error rate of data transfer, wherein the payload includes: the response length field to indicate the desired length of the response message or the portion thereof; and the test information specific for the device that includes an indication of the data transfer error rate test and control data for transferring between the device and the one or more requesting devices to test error rate. 9. A computer of a dispersed storage network (DSN) comprises: an interface; a memory; and a processing module operably coupled to the interface and to the memory, where the processing module is operable to: when a DSN performance issue is detected, identify one or more devices of the DSN potentially contributing to the DSN performance issue; and for a device of the identified one or more devices: determine a potential performance issue of the device based on how the device is potentially contributing to the DSN performance issue; determine a performance test based on the potential performance issue; generate a message that includes a protocol header and a payload, wherein the protocol header includes an indication to identify the message as a test request message and the payload includes test information specific for the device to execute the performance test; send, via the interface, the message to the device; receive, from the device via the interface, a response message that includes a response header and a response payload, wherein the response header includes an indication to identify the response message as a test response message and the response payload includes a specific test result data generated based on the test information; and determine, based on the specific test result data, whether the device has the potential performance issue and is contributing to the DSN performance issue. 10. The computer of claim 9 further comprises: the processing module is further operable to, for a second device of the identified one or more devices: determine a second potential performance issue of the second device based on how the second device is potentially contributing to the DSN performance issue; determine a second performance test based on the second potential performance issue; generate a second message that includes a second protocol header and a second payload, wherein the second protocol header includes an indication to identify the second message as another test request message and the second payload includes second test information specific for the second device to execute the second performance test; send, via the interface, the second message to the second device; receive, from the second device via the interface, a second response message that includes a second response header and a second response payload, wherein the second response header includes an indication to identify the second response message as another test response message and the second response payload includes a second specific test result data generated based on the second test information; and determine, based on the second specific test result data, whether the second device has the second potential performance issue and is contributing to the DSN performance issue. 11. The computer of claim 10 further comprises: the processing module is further operable to, when the potential performance issue and the second potential performance issue are not individually contributing to the DSN performance issue, determine whether a combination of the potential performance issue and the second potential performance issue are collectively contributing to the DSN performance issue. 12. The computer of claim 9 further comprises: the processing module is further operable to detect the DSN performance issue based on one or more of: detecting a communication error to, from, or between the one or more devices; detecting a storage error indication regarding the one or more devices; detecting a reading error indication regarding the one or more devices; in response to performing a general test in accordance with a DSN test schedule; detecting a reliability issue regarding the one or more devices; and receiving, via the interface, a potential failing performance indicator regarding the one or more devices. 13. The computer of claim 9, wherein the processing module identifies the one or more devices by one or more of: when the DSN performance issue is based on a communication error, identifying the one or more devices based on a failure to send a communication or to acknowledge receipt of the communication; when the DSN performance issue is based on a storage error, identifying the one or more devices based on a failure to provide confirmation of successfully completing a storage request; when the DSN performance issue is based on a read error, identifying the one or more devices based on a failure to provide retrieved data in accordance with a read request; receiving, via the interface, a message identifying the one or more devices as having a potential reliability issue; and receiving, via the interface, a message identifying the one or more devices as having the potential performance issue. 14. The computer of claim 9, wherein the device comprises one of: a dispersed storage (DS) unit; a DS processing unit; a DS processing module; a DS managing module; a DS rebuilding module; and a user device. 15. The computer of claim 9, wherein the processing module further functions to generate the message by: generating the protocol header to include: an operation code field to identify the message as a test message; a request/response field to identify the message as a request message; a request number field to identify the message as a particular test request message; and a payload length field. 16. The computer of claim 9, wherein the processing module further functions to generate the message by at least one of: generating the payload to test data transfer speed, wherein the payload includes: a response length field to indicate a desired length of the response message or portion thereof; and the test information specific for the device that includes an indication of the data transfer speed test and minimal data for transferring between the device and one or more requesting devices to test speed; generating the payload to test data transfer bandwidth, wherein the payload includes: the response length field to indicate the desired length of the response message or the portion thereof; and the test information specific for the device that includes an indication of the data transfer bandwidth test and a large amount of data for transferring between the device and the one or more requesting devices to test bandwidth; generating the payload to test data transfer latency, wherein the payload includes: the response length field to indicate the desired length of the response message or the portion thereof; and the test information specific for the device that includes an indication of the data transfer latency test and data for transferring between the device and the one or more requesting devices to test latency; and generating the payload to test error rate of data transfer, wherein the payload includes: the response length field to indicate the desired length of the response message or the portion thereof; and the test information specific for the device that includes an indication of the data transfer error rate test and control data for transferring between the device and the one or more requesting devices to test error rate.
A method begins by a processing module identifying one or more devices of a dispersed storage network (DSN) potentially contributing to a DSN performance issue. For a device of the identified one or more devices, the method continues where the processing module determines a potential performance issue of the device and determines a performance test based on the potential performance issue. The method continues where the processing module issues a message to the device that includes test information specific for the device to execute the performance test and receives a response message that includes a specific test result data generated based on the test information. The method continues where the processing module determines, based on the specific test result data, whether the device has the potential performance issue and is contributing to the DSN performance issue.1. A method for execution by one or more processing modules of one or more requesting devices of a dispersed storage network (DSN), the method comprises: when a DSN performance issue is detected, identifying one or more devices of the DSN potentially contributing to the DSN performance issue; and for a device of the identified one or more devices: determining a potential performance issue of the device based on how the device is potentially contributing to the DSN performance issue; determining a performance test based on the potential performance issue; generating a message that includes a protocol header and a payload, wherein the protocol header includes an indication to identify the message as a test request message and the payload includes test information specific for the device to execute the performance test; sending the message to the device; receiving, from the device, a response message that includes a response header and a response payload, wherein the response header includes an indication to identify the response message as a test response message and the response payload includes a specific test result data generated based on the test information; and determining, based on the specific test result data, whether the device has the potential performance issue and is contributing to the DSN performance issue. 2. The method of claim 1 further comprises: for a second device of the identified one or more devices: determining a second potential performance issue of the second device based on how the second device is potentially contributing to the DSN performance issue; determining a second performance test based on the second potential performance issue; generating a second message that includes a second protocol header and a second payload, wherein the second protocol header includes an indication to identify the second message as another test request message and the second payload includes second test information specific for the second device to execute the second performance test; sending the second message to the second device; receiving, from the second device, a second response message that includes a second response header and a second response payload, wherein the second response header includes an indication to identify the second response message as another test response message and the second response payload includes a second specific test result data generated based on the second test information; and determining, based on the second specific test result data, whether the second device has the second potential performance issue and is contributing to the DSN performance issue. 3. The method of claim 2 further comprises: when the potential performance issue and the second potential performance issue are not individually contributing to the DSN performance issue, determining whether a combination of the potential performance issue and the second potential performance issues are collectively contributing to the DSN performance issue. 4. The method of claim 1 further comprises: detecting the DSN performance issue based on one or more of: detecting a communication error to, from, or between the one or more devices; detecting a storage error indication regarding the one or more devices; detecting a reading error indication regarding the one or more devices; in response to performing a general test in accordance with a DSN test schedule; detecting a reliability issue regarding the one or more devices; and receiving a potential failing performance indicator regarding the one or more devices. 5. The method of claim 1, wherein the identifying the one or more devices comprises one or more of: when the DSN performance issue is based on a communication error, identifying the one or more devices based on a failure to send a communication or to acknowledge receipt of the communication; when the DSN performance issue is based on a storage error, identifying the one or more devices based on a failure to provide confirmation of successfully completing a storage request; when the DSN performance issue is based on a read error, identifying the one or more devices based on a failure to provide retrieved data in accordance with a read request; receiving a message identifying the one or more devices as having a potential reliability issue; and receiving a message identifying the one or more devices as having the potential performance issue. 6. The method of claim 1, wherein the device comprises one of: a dispersed storage (DS) unit; a DS processing unit; a DS processing module; a DS managing module; a DS rebuilding module; and a user device. 7. The method of claim 1, wherein the generating the message further comprises: generating the protocol header to include: an operation code field to identify the message as a test message; a request/response field to identify the message as a request message; a request number field to identify the message as a particular test request message; and a payload length field. 8. The method of claim 1, wherein the generating the message further comprises at least one of: generating the payload to test data transfer speed, wherein the payload includes: a response length field to indicate a desired length of the response message or portion thereof; and the test information specific for the device that includes an indication of the data transfer speed test and minimal data for transferring between the device and the one or more requesting devices to test speed; generating the payload to test data transfer bandwidth, wherein the payload includes: the response length field to indicate the desired length of the response message or the portion thereof; and the test information specific for the device that includes an indication of the data transfer bandwidth test and a large amount of data for transferring between the device and the one or more requesting devices to test bandwidth; generating the payload to test data transfer latency, wherein the payload includes: the response length field to indicate the desired length of the response message or the portion thereof; and the test information specific for the device that includes an indication of the data transfer latency test and data for transferring between the device and the one or more requesting devices to test latency; and generating the payload to test error rate of data transfer, wherein the payload includes: the response length field to indicate the desired length of the response message or the portion thereof; and the test information specific for the device that includes an indication of the data transfer error rate test and control data for transferring between the device and the one or more requesting devices to test error rate. 9. A computer of a dispersed storage network (DSN) comprises: an interface; a memory; and a processing module operably coupled to the interface and to the memory, where the processing module is operable to: when a DSN performance issue is detected, identify one or more devices of the DSN potentially contributing to the DSN performance issue; and for a device of the identified one or more devices: determine a potential performance issue of the device based on how the device is potentially contributing to the DSN performance issue; determine a performance test based on the potential performance issue; generate a message that includes a protocol header and a payload, wherein the protocol header includes an indication to identify the message as a test request message and the payload includes test information specific for the device to execute the performance test; send, via the interface, the message to the device; receive, from the device via the interface, a response message that includes a response header and a response payload, wherein the response header includes an indication to identify the response message as a test response message and the response payload includes a specific test result data generated based on the test information; and determine, based on the specific test result data, whether the device has the potential performance issue and is contributing to the DSN performance issue. 10. The computer of claim 9 further comprises: the processing module is further operable to, for a second device of the identified one or more devices: determine a second potential performance issue of the second device based on how the second device is potentially contributing to the DSN performance issue; determine a second performance test based on the second potential performance issue; generate a second message that includes a second protocol header and a second payload, wherein the second protocol header includes an indication to identify the second message as another test request message and the second payload includes second test information specific for the second device to execute the second performance test; send, via the interface, the second message to the second device; receive, from the second device via the interface, a second response message that includes a second response header and a second response payload, wherein the second response header includes an indication to identify the second response message as another test response message and the second response payload includes a second specific test result data generated based on the second test information; and determine, based on the second specific test result data, whether the second device has the second potential performance issue and is contributing to the DSN performance issue. 11. The computer of claim 10 further comprises: the processing module is further operable to, when the potential performance issue and the second potential performance issue are not individually contributing to the DSN performance issue, determine whether a combination of the potential performance issue and the second potential performance issue are collectively contributing to the DSN performance issue. 12. The computer of claim 9 further comprises: the processing module is further operable to detect the DSN performance issue based on one or more of: detecting a communication error to, from, or between the one or more devices; detecting a storage error indication regarding the one or more devices; detecting a reading error indication regarding the one or more devices; in response to performing a general test in accordance with a DSN test schedule; detecting a reliability issue regarding the one or more devices; and receiving, via the interface, a potential failing performance indicator regarding the one or more devices. 13. The computer of claim 9, wherein the processing module identifies the one or more devices by one or more of: when the DSN performance issue is based on a communication error, identifying the one or more devices based on a failure to send a communication or to acknowledge receipt of the communication; when the DSN performance issue is based on a storage error, identifying the one or more devices based on a failure to provide confirmation of successfully completing a storage request; when the DSN performance issue is based on a read error, identifying the one or more devices based on a failure to provide retrieved data in accordance with a read request; receiving, via the interface, a message identifying the one or more devices as having a potential reliability issue; and receiving, via the interface, a message identifying the one or more devices as having the potential performance issue. 14. The computer of claim 9, wherein the device comprises one of: a dispersed storage (DS) unit; a DS processing unit; a DS processing module; a DS managing module; a DS rebuilding module; and a user device. 15. The computer of claim 9, wherein the processing module further functions to generate the message by: generating the protocol header to include: an operation code field to identify the message as a test message; a request/response field to identify the message as a request message; a request number field to identify the message as a particular test request message; and a payload length field. 16. The computer of claim 9, wherein the processing module further functions to generate the message by at least one of: generating the payload to test data transfer speed, wherein the payload includes: a response length field to indicate a desired length of the response message or portion thereof; and the test information specific for the device that includes an indication of the data transfer speed test and minimal data for transferring between the device and one or more requesting devices to test speed; generating the payload to test data transfer bandwidth, wherein the payload includes: the response length field to indicate the desired length of the response message or the portion thereof; and the test information specific for the device that includes an indication of the data transfer bandwidth test and a large amount of data for transferring between the device and the one or more requesting devices to test bandwidth; generating the payload to test data transfer latency, wherein the payload includes: the response length field to indicate the desired length of the response message or the portion thereof; and the test information specific for the device that includes an indication of the data transfer latency test and data for transferring between the device and the one or more requesting devices to test latency; and generating the payload to test error rate of data transfer, wherein the payload includes: the response length field to indicate the desired length of the response message or the portion thereof; and the test information specific for the device that includes an indication of the data transfer error rate test and control data for transferring between the device and the one or more requesting devices to test error rate.
2,400
6,984
6,984
13,052,676
2,493
Described herein are methods, systems, apparatuses and products for automatic detection of non-compliant content in user actions. An aspect provides a method including, responsive to receiving a user selection to share data via an electronic device, analyzing the data to be shared; and automatically identifying non-compliant content within the data prior to sharing the data. Other embodiments are disclosed.
1. A computer program product comprising: a computer readable storage medium having computer readable program code embodied therewith, the computer readable program code comprising: computer readable program code configured to, responsive to receiving a user selection to share data, analyze the data to be shared; and computer readable program code configured to automatically identify non-compliant content within the data prior to sharing the data. 2. The computer program product according to claim 1, further comprising computer readable program code configured to provide at least one recommendation for modifying the data prior to sharing the data. 3. The computer program product according to claim 2, wherein modifying the data prior to sharing the data comprises at least one of: masking the non-compliant content within the data, removing the non-compliant content within the data, and augmenting the data with a privacy note. 4. The computer program product according to claim 1, further comprising computer readable program code configured to use historical data to establish content defined as non-compliant content. 5. The computer program product according to claim 1, further comprising computer readable program code configured to use historical data to establish at least one recommendation for modifying the data prior to sharing the data. 6. The computer program product according to claim 2, further comprising computer readable program code configured to validate that the at least one recommendation complies with a policy associated with at least one type of non-compliant content contained within the data. 7. The computer program product according to claim 1, further comprising computer readable program code configured to automatically modify the data to conform the data to at least one policy. 8. The computer program product according to claim 7, wherein modifying the data to conform the data to at least one policy comprises at least one of: masking the non-compliant content within the data, removing the non-compliant content within the data, and augmenting the data with a privacy note. 9. The computer program product according to claim 1, further comprising computer readable program code configured to share the data according to the user selection responsive to modifying the non-compliant content within the data. 10. The computer program product according to claim 1, further comprising computer readable program code configured to ascertain feedback on a user action performed after the non-compliant content has been identified. 11. The computer program product according to claim 10, further comprising computer readable program code configured to use the feedback to provide at least one recommendation for modifying similar data prior to sharing the similar data. 12. The computer program product according to claim 1, wherein: the data comprises an electronic document; the non-compliant data comprises confidential information embedded within the electronic document; and sharing comprises at least one of live sharing, printing, displaying, projecting, e-mailing, and instant messaging. 13. A method comprising: responsive to receiving a user selection to share data via an electronic device, analyzing the data to be shared; and automatically identifying non-compliant content within the data prior to sharing the data. 14. The method according to claim 13, further comprising providing at least one recommendation for modifying the data prior to sharing the data. 15. The method according to claim 14, wherein modifying the data prior to sharing the data comprises at least one of: masking the non-compliant content within the data, removing the non-compliant content within the data, and augmenting the data with a privacy note. 16. The method according to claim 13, further comprising using historical data to establish content defined as non-compliant content. 17. The method according to claim 13, further comprising using historical data to establish at least one recommendation for modifying the data prior to sharing the data. 18. The method according to claim 14, further comprising validating that the at least one recommendation complies with a policy associated with at least one type of non-compliant content contained within the data. 19. The method according to claim 13, further comprising automatically modifying the data to conform the data to at least one policy. 20. The method according to claim 19, wherein modifying the data to conform the data to at least one policy comprises at least one of: masking the non-compliant content within the data, removing the non-compliant content within the data, and augmenting the data with a privacy note. 21. The method according to claim 13, further comprising sharing the data according to the user selection responsive to modifying the non-compliant content within the data. 22. The method according to claim 13, further comprising ascertaining feedback on a user action performed after the non-compliant content has been identified. 23. The method according to claim 22, further comprising using the feedback to provide at least one recommendation for modifying similar data prior to sharing the similar data. 24. The method according to claim 13, wherein: the data comprises an electronic document; the non-compliant data comprises confidential information embedded within the electronic document; and sharing comprises at least one of live sharing, printing, displaying, projecting, e-mailing, and instant messaging. 25. A system comprising: at least one processor; and a memory device operatively connected to the at least one processor; wherein, responsive to execution of program instructions accessible to the at least one processor, the at least one processor is configured to: responsive to receiving a user selection to share data, analyze the data to be shared; and automatically identify non-compliant content within the data prior to sharing the data.
Described herein are methods, systems, apparatuses and products for automatic detection of non-compliant content in user actions. An aspect provides a method including, responsive to receiving a user selection to share data via an electronic device, analyzing the data to be shared; and automatically identifying non-compliant content within the data prior to sharing the data. Other embodiments are disclosed.1. A computer program product comprising: a computer readable storage medium having computer readable program code embodied therewith, the computer readable program code comprising: computer readable program code configured to, responsive to receiving a user selection to share data, analyze the data to be shared; and computer readable program code configured to automatically identify non-compliant content within the data prior to sharing the data. 2. The computer program product according to claim 1, further comprising computer readable program code configured to provide at least one recommendation for modifying the data prior to sharing the data. 3. The computer program product according to claim 2, wherein modifying the data prior to sharing the data comprises at least one of: masking the non-compliant content within the data, removing the non-compliant content within the data, and augmenting the data with a privacy note. 4. The computer program product according to claim 1, further comprising computer readable program code configured to use historical data to establish content defined as non-compliant content. 5. The computer program product according to claim 1, further comprising computer readable program code configured to use historical data to establish at least one recommendation for modifying the data prior to sharing the data. 6. The computer program product according to claim 2, further comprising computer readable program code configured to validate that the at least one recommendation complies with a policy associated with at least one type of non-compliant content contained within the data. 7. The computer program product according to claim 1, further comprising computer readable program code configured to automatically modify the data to conform the data to at least one policy. 8. The computer program product according to claim 7, wherein modifying the data to conform the data to at least one policy comprises at least one of: masking the non-compliant content within the data, removing the non-compliant content within the data, and augmenting the data with a privacy note. 9. The computer program product according to claim 1, further comprising computer readable program code configured to share the data according to the user selection responsive to modifying the non-compliant content within the data. 10. The computer program product according to claim 1, further comprising computer readable program code configured to ascertain feedback on a user action performed after the non-compliant content has been identified. 11. The computer program product according to claim 10, further comprising computer readable program code configured to use the feedback to provide at least one recommendation for modifying similar data prior to sharing the similar data. 12. The computer program product according to claim 1, wherein: the data comprises an electronic document; the non-compliant data comprises confidential information embedded within the electronic document; and sharing comprises at least one of live sharing, printing, displaying, projecting, e-mailing, and instant messaging. 13. A method comprising: responsive to receiving a user selection to share data via an electronic device, analyzing the data to be shared; and automatically identifying non-compliant content within the data prior to sharing the data. 14. The method according to claim 13, further comprising providing at least one recommendation for modifying the data prior to sharing the data. 15. The method according to claim 14, wherein modifying the data prior to sharing the data comprises at least one of: masking the non-compliant content within the data, removing the non-compliant content within the data, and augmenting the data with a privacy note. 16. The method according to claim 13, further comprising using historical data to establish content defined as non-compliant content. 17. The method according to claim 13, further comprising using historical data to establish at least one recommendation for modifying the data prior to sharing the data. 18. The method according to claim 14, further comprising validating that the at least one recommendation complies with a policy associated with at least one type of non-compliant content contained within the data. 19. The method according to claim 13, further comprising automatically modifying the data to conform the data to at least one policy. 20. The method according to claim 19, wherein modifying the data to conform the data to at least one policy comprises at least one of: masking the non-compliant content within the data, removing the non-compliant content within the data, and augmenting the data with a privacy note. 21. The method according to claim 13, further comprising sharing the data according to the user selection responsive to modifying the non-compliant content within the data. 22. The method according to claim 13, further comprising ascertaining feedback on a user action performed after the non-compliant content has been identified. 23. The method according to claim 22, further comprising using the feedback to provide at least one recommendation for modifying similar data prior to sharing the similar data. 24. The method according to claim 13, wherein: the data comprises an electronic document; the non-compliant data comprises confidential information embedded within the electronic document; and sharing comprises at least one of live sharing, printing, displaying, projecting, e-mailing, and instant messaging. 25. A system comprising: at least one processor; and a memory device operatively connected to the at least one processor; wherein, responsive to execution of program instructions accessible to the at least one processor, the at least one processor is configured to: responsive to receiving a user selection to share data, analyze the data to be shared; and automatically identify non-compliant content within the data prior to sharing the data.
2,400
6,985
6,985
13,803,871
2,498
Systems and methods are provided for notifying users within protected network about various events and information. According to one embodiment, a method includes receiving, by a filtering device, a request originated by an application running on a client device. The method further includes making a determination, by the filtering device, whether the request is to be blocked or allowed, based on the one or more policies. If the request is to be blocked, a notification is provided to a user of the client device regarding the determination by causing the application to display a predefined message.
1. A method comprising: receiving, by a filtering device, a request originated by an application running on a client device; and based on one or more policies, making a determination, by the filtering device, whether the request is to be blocked or allowed; and if the request is to be blocked, providing a notification to a user of the client device regarding the determination by causing the application to display a predefined message. 2. The method of claim 1, further comprising authenticating the user of the client device. 3. The method of claim 1, further comprising selecting the one or more policies of a plurality of policies. 4. The method of claim 3, further comprising applying the selected policies. 5. The method of claim 1, wherein the request includes a packet having information—source address, destination address, protocol, communication port, or type of the application. 6. The method of claim 5, further comprising dropping the packet associated with the request, if the request is blocked. 7. The method of claim 5, further comprising recording the dropped packet. 8. The method of claim 5, further comprising checking whether the information included in the request matches the one or more policies. 9. The method of claim 1, further comprising storing a plurality of policies, information related to violations, blocked content, dropped packets, authorized users, or unauthorized users, and pre-defined messages. 10. The method of claim 1, further comprising forwarding the request to a gateway device, if the request is allowed. 11. The method of claim 10, wherein the gateway device forwards the request to a web server. 12. The method of claim 1, further comprising modifying the request response to insert the pre-defined message in the application, if the request is blocked. 13. The method of claim 1, further comprising identifying a pre-defined message to be included based on the applied policies. 14. The method of claim 1, wherein the pre-defined message is included in real time, based on the blocked content. 15. The method of claim 14, wherein the pre-defined message is displayed through a toolbar. 16. The method of claim 14, wherein the pre-defined message is displayed through a pop-up window. 17. The method of claim 1, further comprising displaying the pre-defined message to the user in the application. 18. The method of claim 1, further comprising intercepting the request within a pre-determined time interval. 19. The method of claim 1, further comprising executing appropriate actions based on the blocked content. 20. The method of claim 1, wherein the request is originated to access certain content over a network. 21. The method of claim 1, wherein the request is at least one of: HyperText Transfer Protocol (HTTP), File Transfer Protocol (FTP), Simple Mail Transfer Protocol (SMTP), Post Office Protocol 3 (POP3), Internet Message Access Protocol (IMAP) and Server Message Block/Common Internet File System (SMB/CIFS). 22. The method of claim 1, wherein the application is at least one of web browsing application, instant messaging application, file transfer application, and email application. 23. A network security device configured for informing users about various events and information, comprising: a. a receiving module configured to receive a request originated from an application running on a client device; b. a policy determination module configured to, i. select one or more policies of a plurality of policies; ii. based on the one or more policies, determine whether the request to be blocked or allowed; and c. a notifying module configured to notify a user about the blocked content by displaying a pre-defined message in the application, if the request to be blocked. 24. The network security device of claim 23, wherein the network security device comprises a firewall, a proxy, unified threat management (UTM) appliance or a gateway device. 25. The network security device of claim 23, further comprising a storage module containing therein the plurality of policies, information related to violations, blocked content, authorized users, unauthorized users, or a plurality of pre-defined messages. 26. The network security device of claim 23, further comprising a module configured to forward the request to a web server, if the request is allowed. 27. The network security device of claim 23, further comprising a communication module configured to allow communication between the network security device and the client device. 28. The network security device of claim 23, wherein the request comprises a HyperText Transfer Protocol (HTTP) request, a File Transfer Protocol (FTP) request, a Simple Mail Transfer Protocol (SMTP) request, a Post Office Protocol 3 (POP3) request, an Internet Message Access Protocol (IMAP) request or a Server Message Block/Common Internet File System (SMB/CIFS) request. 29. The network security device of claim 23, wherein the application comprises a web browsing application, an instant messaging application, a file transfer application or an email application. 30. The network security device of claim 23, wherein the pre-defined message is included in the application using one or more scripting languages. 31. The network security device of claim 23, wherein the pre-defined message is included in the application after a pre-defined time interval. 32. The network security device of claim 23, wherein the pre-defined message includes information relating to application control violations, an endpoint control violation, a web browsing quota, user authenticated information, SSL VPN (Secure Socket Layer Virtual Private Network) bookmarks, firewall violations or Data Loss Prevention (DLP) violations. 33. A non-transitory computer-readable storage medium tangibly embodying instructions, which when executed by a firewall module, cause the firewall module to perform a method for notifying users about blocked content, the method comprising: receiving a request originated from an application running on a client device; based on one or more policies, determining whether the request to be blocked or allowed; and if the request to be blocked, notifying a user about the blocked content by including a pre-defined message in the application. 34. The non-transitory computer-readable storage medium of claim 33, wherein the method further comprises authenticating the user of the client device. 35. The non-transitory computer-readable storage medium of claim 33, wherein the method further comprises selecting one or more policies of a plurality of policies. 36. The non-transitory computer-readable storage medium of claim 33, wherein the method further comprises checking whether information included in the request matches the one or more policies. 37. The non-transitory computer-readable storage medium of claim 33, wherein the method further comprises storing a plurality of policies, information related to violations, blocked content, authorized users, or unauthorized users, pre-defined messages. 38. The non-transitory computer-readable storage medium of claim 33, wherein the method further comprises forwarding the request to a web server, if the is allowed. 39. The non-transitory computer-readable storage medium of claim 33, wherein the pre-defined message is included in real time, instantly when the request is blocked. 40. The non-transitory computer-readable storage medium of claim 33, wherein the method further comprises intercepting the request within a pre-determined time interval, if the request is blocked. 41. The non-transitory computer-readable storage medium of claim 33, wherein the method further comprises executing appropriate actions based on the blocked content. 42. The non-transitory computer-readable storage medium of claim 33, wherein the request is originated to access certain content over a network. 43. The non-transitory computer-readable storage medium of claim 33, wherein the request comprises a HyperText Transfer Protocol (HTTP) request, a File Transfer Protocol (FTP) request, a Simple Mail Transfer Protocol (SMTP) request, a Post Office Protocol 3 (POP3) request, an Internet Message Access Protocol (IMAP) request or a Server Message Block/Common Internet File System (SMB/CIFS) request. 44. The non-transitory computer-readable storage medium of claim 33, wherein the application comprises a web browsing application, an instant messaging application, a file transfer application or an email application. 45. A system for informing users about blocked content, comprising: a client device initiating a request to access certain content over a network; a firewall module configured to receive the request from the client device; based on one or more policies, determine the request is blocked or allowed; and a notification module configured to inform users about the blocked content by including a pre-defined message in the application. 46. The system of claim 45, wherein the pre-defined message is included in the application instantly when the request is blocked. 47. The system of claim 45, wherein the pre-defined is included in the application after a pre-defined time interval. 48. The system of claim 45, wherein the notification module notifies the user about application control violations, endpoint control violation, web browsing quota, user authenticated information, SSLVPN (Secure Socket Layer Virtual Private Network) bookmarks, firewall violations, or Data Loss Prevention (DLP) violations. 49. A method for notifying users about various events, comprising: receiving a request from an application running on a client device; selecting one or more policies matching information included in the request; applying the selected policies to determine whether the request is blocked or allowed; and based on the above, inserting a toolbar in the application to display various events including application control violations, endpoint control violation, web browsing quota, user authenticated information, SSL VPN (Secure Socket Layer Virtual Private Network) bookmarks, firewall violations, or Data Loss Prevention (DLP) violations.
Systems and methods are provided for notifying users within protected network about various events and information. According to one embodiment, a method includes receiving, by a filtering device, a request originated by an application running on a client device. The method further includes making a determination, by the filtering device, whether the request is to be blocked or allowed, based on the one or more policies. If the request is to be blocked, a notification is provided to a user of the client device regarding the determination by causing the application to display a predefined message.1. A method comprising: receiving, by a filtering device, a request originated by an application running on a client device; and based on one or more policies, making a determination, by the filtering device, whether the request is to be blocked or allowed; and if the request is to be blocked, providing a notification to a user of the client device regarding the determination by causing the application to display a predefined message. 2. The method of claim 1, further comprising authenticating the user of the client device. 3. The method of claim 1, further comprising selecting the one or more policies of a plurality of policies. 4. The method of claim 3, further comprising applying the selected policies. 5. The method of claim 1, wherein the request includes a packet having information—source address, destination address, protocol, communication port, or type of the application. 6. The method of claim 5, further comprising dropping the packet associated with the request, if the request is blocked. 7. The method of claim 5, further comprising recording the dropped packet. 8. The method of claim 5, further comprising checking whether the information included in the request matches the one or more policies. 9. The method of claim 1, further comprising storing a plurality of policies, information related to violations, blocked content, dropped packets, authorized users, or unauthorized users, and pre-defined messages. 10. The method of claim 1, further comprising forwarding the request to a gateway device, if the request is allowed. 11. The method of claim 10, wherein the gateway device forwards the request to a web server. 12. The method of claim 1, further comprising modifying the request response to insert the pre-defined message in the application, if the request is blocked. 13. The method of claim 1, further comprising identifying a pre-defined message to be included based on the applied policies. 14. The method of claim 1, wherein the pre-defined message is included in real time, based on the blocked content. 15. The method of claim 14, wherein the pre-defined message is displayed through a toolbar. 16. The method of claim 14, wherein the pre-defined message is displayed through a pop-up window. 17. The method of claim 1, further comprising displaying the pre-defined message to the user in the application. 18. The method of claim 1, further comprising intercepting the request within a pre-determined time interval. 19. The method of claim 1, further comprising executing appropriate actions based on the blocked content. 20. The method of claim 1, wherein the request is originated to access certain content over a network. 21. The method of claim 1, wherein the request is at least one of: HyperText Transfer Protocol (HTTP), File Transfer Protocol (FTP), Simple Mail Transfer Protocol (SMTP), Post Office Protocol 3 (POP3), Internet Message Access Protocol (IMAP) and Server Message Block/Common Internet File System (SMB/CIFS). 22. The method of claim 1, wherein the application is at least one of web browsing application, instant messaging application, file transfer application, and email application. 23. A network security device configured for informing users about various events and information, comprising: a. a receiving module configured to receive a request originated from an application running on a client device; b. a policy determination module configured to, i. select one or more policies of a plurality of policies; ii. based on the one or more policies, determine whether the request to be blocked or allowed; and c. a notifying module configured to notify a user about the blocked content by displaying a pre-defined message in the application, if the request to be blocked. 24. The network security device of claim 23, wherein the network security device comprises a firewall, a proxy, unified threat management (UTM) appliance or a gateway device. 25. The network security device of claim 23, further comprising a storage module containing therein the plurality of policies, information related to violations, blocked content, authorized users, unauthorized users, or a plurality of pre-defined messages. 26. The network security device of claim 23, further comprising a module configured to forward the request to a web server, if the request is allowed. 27. The network security device of claim 23, further comprising a communication module configured to allow communication between the network security device and the client device. 28. The network security device of claim 23, wherein the request comprises a HyperText Transfer Protocol (HTTP) request, a File Transfer Protocol (FTP) request, a Simple Mail Transfer Protocol (SMTP) request, a Post Office Protocol 3 (POP3) request, an Internet Message Access Protocol (IMAP) request or a Server Message Block/Common Internet File System (SMB/CIFS) request. 29. The network security device of claim 23, wherein the application comprises a web browsing application, an instant messaging application, a file transfer application or an email application. 30. The network security device of claim 23, wherein the pre-defined message is included in the application using one or more scripting languages. 31. The network security device of claim 23, wherein the pre-defined message is included in the application after a pre-defined time interval. 32. The network security device of claim 23, wherein the pre-defined message includes information relating to application control violations, an endpoint control violation, a web browsing quota, user authenticated information, SSL VPN (Secure Socket Layer Virtual Private Network) bookmarks, firewall violations or Data Loss Prevention (DLP) violations. 33. A non-transitory computer-readable storage medium tangibly embodying instructions, which when executed by a firewall module, cause the firewall module to perform a method for notifying users about blocked content, the method comprising: receiving a request originated from an application running on a client device; based on one or more policies, determining whether the request to be blocked or allowed; and if the request to be blocked, notifying a user about the blocked content by including a pre-defined message in the application. 34. The non-transitory computer-readable storage medium of claim 33, wherein the method further comprises authenticating the user of the client device. 35. The non-transitory computer-readable storage medium of claim 33, wherein the method further comprises selecting one or more policies of a plurality of policies. 36. The non-transitory computer-readable storage medium of claim 33, wherein the method further comprises checking whether information included in the request matches the one or more policies. 37. The non-transitory computer-readable storage medium of claim 33, wherein the method further comprises storing a plurality of policies, information related to violations, blocked content, authorized users, or unauthorized users, pre-defined messages. 38. The non-transitory computer-readable storage medium of claim 33, wherein the method further comprises forwarding the request to a web server, if the is allowed. 39. The non-transitory computer-readable storage medium of claim 33, wherein the pre-defined message is included in real time, instantly when the request is blocked. 40. The non-transitory computer-readable storage medium of claim 33, wherein the method further comprises intercepting the request within a pre-determined time interval, if the request is blocked. 41. The non-transitory computer-readable storage medium of claim 33, wherein the method further comprises executing appropriate actions based on the blocked content. 42. The non-transitory computer-readable storage medium of claim 33, wherein the request is originated to access certain content over a network. 43. The non-transitory computer-readable storage medium of claim 33, wherein the request comprises a HyperText Transfer Protocol (HTTP) request, a File Transfer Protocol (FTP) request, a Simple Mail Transfer Protocol (SMTP) request, a Post Office Protocol 3 (POP3) request, an Internet Message Access Protocol (IMAP) request or a Server Message Block/Common Internet File System (SMB/CIFS) request. 44. The non-transitory computer-readable storage medium of claim 33, wherein the application comprises a web browsing application, an instant messaging application, a file transfer application or an email application. 45. A system for informing users about blocked content, comprising: a client device initiating a request to access certain content over a network; a firewall module configured to receive the request from the client device; based on one or more policies, determine the request is blocked or allowed; and a notification module configured to inform users about the blocked content by including a pre-defined message in the application. 46. The system of claim 45, wherein the pre-defined message is included in the application instantly when the request is blocked. 47. The system of claim 45, wherein the pre-defined is included in the application after a pre-defined time interval. 48. The system of claim 45, wherein the notification module notifies the user about application control violations, endpoint control violation, web browsing quota, user authenticated information, SSLVPN (Secure Socket Layer Virtual Private Network) bookmarks, firewall violations, or Data Loss Prevention (DLP) violations. 49. A method for notifying users about various events, comprising: receiving a request from an application running on a client device; selecting one or more policies matching information included in the request; applying the selected policies to determine whether the request is blocked or allowed; and based on the above, inserting a toolbar in the application to display various events including application control violations, endpoint control violation, web browsing quota, user authenticated information, SSL VPN (Secure Socket Layer Virtual Private Network) bookmarks, firewall violations, or Data Loss Prevention (DLP) violations.
2,400
6,986
6,986
13,336,682
2,423
A video encoder may transform residual data by using a transform selected from a group of transforms. The transform is applied to the residual data to create a two-dimensional array of transform coefficients. A scanning mode is selected to scan the transform coefficients in the two-dimensional array into a one-dimensional array of transform coefficients. The combination of transform and scanning mode may be selected from a subset of combinations that is based on an intra-prediction mode. The scanning mode may also be selected based on the transform used to create the two-dimensional array. The transforms and/or scanning modes used may be signaled to a video decoder.
1. A method of encoding video data comprising: determining a subset of transform and scanning mode combinations based on an intra-prediction mode; selecting a transform and a scanning mode combination from the subset of transform and scanning mode combinations; applying the selected transform to residual data associated with predicting a block based on the intra-prediction mode so as to generate a two-dimensional array of transform coefficients; and applying the selected scanning mode to the two-dimensional array of transform coefficients to generate a one-dimensional array of transform coefficients. 2. The method of claim 1, further comprising: quantizing the transform coefficients in at least one of the one-dimensional array of transform coefficients and the two-dimensional array of transform coefficients; and entropy coding the one-dimensional array of transform coefficients. 3. The method of claim 1, further comprising: signaling an index in an encoded video bitstream, wherein the index indicates the selected transform and scanning mode combination. 4. The method of claim 3, wherein the index is represented by a fixed number of bits and wherein the index is entropy coded using CABAC or CAVLC. 5. The method of claim 1, further comprising: signaling an index in an encoded video bitstream, wherein the index indicates the selected transform, and wherein the subset of transform and scanning mode combinations are determined such that a transform is mapped to a specific scanning mode. 6. The method of claim 1, further comprising: signaling an index in an encoded video bitstream, wherein the index indicates the selected transform, and wherein each of the scanning modes in the subset of transform and scanning mode combinations is based on the intra-prediction mode. 7. The method of claim 1, wherein the subset of transform and scanning mode combinations are determined based on the intra-prediction mode and a block size. 8. A method of decoding video data comprising: receiving encoded video data, wherein the encoded video data was encoded according to an intra-prediction mode; entropy decoding the encoded video data, thereby creating a one-dimensional array of transform coefficients; determining a transform from a subset of transform and scanning mode combinations, wherein the subset is based on the intra-prediction mode; determining a scanning mode from the subset of transform and scanning mode combinations; scanning the one-dimensional array of transform coefficients with the determined scanning mode to produce a two-dimensional array of transform coefficients; and inverse transforming the two-dimensional array of transform coefficients with the determined transform to produce residual video data associated with predicting a block based on the intra-prediction mode. 9. The method of claim 8, further comprising: performing an intra-predictive video coding process on the residual video data according to the intra-prediction mode to produce decoded video data. 10. The method of claim 8, further comprising: receiving an index indicating the determined transform and the determined scanning mode; and entropy decoding the index using CABAC or CAVLC. 11. The method of claim 10, wherein the index is a 2-bit index. 12. The method of claim 8, further comprising: receiving an index indicating the determined transform, wherein the scanning mode is determined based on the determined transform. 13. The method of claim 8, further comprising: receiving an index indicating the determined transform, wherein the scanning mode is determined based on the intra-prediction mode. 14. An apparatus configured to encode video data comprising: a video encoder configured to: determine a subset of transform and scanning mode combinations based on an intra-prediction mode; select a transform and a scanning mode combination from the subset of transform and scanning mode combinations; apply the selected transform to residual data associated with predicting a block based on the intra-prediction mode so as to generate a two-dimensional array of transform coefficients; and apply the selected scanning mode to the two-dimensional array of transform coefficients to generate a one-dimensional array of transform coefficients. 15. The apparatus of claim 14, wherein the video encoder is further configured to: quantize the transform coefficients in at least one of the one-dimensional array of transform coefficients and the two-dimensional array of transform coefficients; and entropy code the one-dimensional array of transform coefficients. 16. The apparatus of claim 14, wherein the video encoder is further configured to: signal an index in an encoded video bitstream, wherein the index indicates the selected transform and scanning mode combination. 17. The apparatus of claim 16, wherein the index is represented by a fixed number of bits and wherein the index is entropy coded using CABAC or CAVLC. 18. The apparatus of claim 14, wherein the video encoder is further configured to: signal an index in an encoded video bitstream, wherein the index indicates the selected transform, and wherein the subset of transform and scanning mode combinations are determined such that a transform is mapped to a specific scanning mode. 19. The apparatus of claim 14, wherein the video encoder is further configured to: signal an index in an encoded video bitstream, wherein the index indicates the selected transform, and wherein each of the scanning modes in the subset of transform and scanning mode combinations is based on the intra-prediction mode. 20. The apparatus of claim 14, wherein the subset of transform and scanning mode combinations are determined based on the intra-prediction mode and a block size. 21. An apparatus configured to decode video data comprising: a video decoder configured to: receive encoded video data, wherein the encoded video data was encoded according to an intra-prediction mode; entropy decode the encoded video data, thereby creating a one-dimensional array of transform coefficients; determine a transform from a subset of transform and scanning mode combinations, wherein the subset is based on the intra-prediction mode; determine a scanning mode from the subset of transform and scanning mode combinations; scan the one-dimensional array of transform coefficients with the determined scanning mode to produce a two-dimensional array of transform coefficients; and inverse transform the two-dimensional array of transform coefficients with the determined transform to produce residual video data associated with predicting a block based on the intra-prediction mode. 22. The apparatus of claim 21, wherein the video decoder is further configure to: perform an intra-predictive video coding process on the residual video data according to the intra-prediction mode to produce decoded video data. 23. The apparatus of claim 21, wherein the video decoder is further configure to: receive an index indicating the determined transform and the determined scanning mode; and entropy decode the index using CABAC or CAVLC. 24. The apparatus of claim 23, wherein the index is a 2-bit index. 25. The apparatus of claim 21, wherein the video decoder is further configure to: receive an index indicating the determined transform, wherein the scanning mode is determined based on the determined transform. 26. The apparatus of claim 21, wherein the video decoder is further configure to: receive an index indicating the determined transform, wherein the scanning mode is determined based on the intra-prediction mode. 27. An apparatus configured to encode video data comprising: means for determining a subset of transform and scanning mode combinations based on an intra-prediction mode; means for selecting a transform and a scanning mode combination from the subset of transform and scanning mode combinations; means for applying the selected transform to residual data associated with predicting a block based on the intra-prediction mode so as to generate a two-dimensional array of transform coefficients; and means for applying the selected scanning mode to the two-dimensional array of transform coefficients to generate a one-dimensional array of transform coefficients. 28. An apparatus configured to decode video data comprising: means for receiving encoded video data, wherein the encoded video data was encoded according to an intra-prediction mode; means for entropy decoding the encoded video data, thereby creating a one-dimensional array of transform coefficients; means for determining a transform from a subset of transform and scanning mode combinations, wherein the subset is based on the intra-prediction mode; means for determining a scanning mode from the subset of transform and scanning mode combinations; means for scanning the one-dimensional array of transform coefficients with the determined scanning mode to produce a two-dimensional array of transform coefficients; and means for inverse transforming the two-dimensional array of transform coefficients with the determined transform to produce residual video data associated with predicting a block based on the intra-prediction mode. 29. A computer program product comprising a computer-readable medium having stored thereon instructions that, when executed, cause a processor of a device for encoding video data to: determine a subset of transform and scanning mode combinations based on an intra-prediction mode; select a transform and a scanning mode combination from the subset of transform and scanning mode combinations; apply the selected transform to residual data associated with predicting a block based on the intra-prediction mode so as to generate a two-dimensional array of transform coefficients; and apply the selected scanning mode to the two-dimensional array of transform coefficients to generate a one-dimensional array of transform coefficients. 30. A computer program product comprising a computer-readable medium having stored thereon instructions that, when executed, cause a processor of a device for decoding video data to: receive encoded video data, wherein the encoded video data was encoded according to an intra-prediction mode; entropy decode the encoded video data, thereby creating a one-dimensional array of transform coefficients; determine a transform from a subset of transform and scanning mode combinations, wherein the subset is based on the intra-prediction mode; determine a scanning mode from the subset of transform and scanning mode combinations; scan the one-dimensional array of transform coefficients with the determined scanning mode to produce a two-dimensional array of transform coefficients; and inverse transform the two-dimensional array of transform coefficients with the determined transform to produce residual video data associated with predicting a block based on the intra-prediction mode. 31. A method of encoding video data comprising at least one frame, the method comprising: calculating residual data corresponding to a portion of the at least one frame; selecting a transform from a plurality of transforms; applying the selected transform to the residual data so as to generate a two-dimensional array of transform coefficients; selecting a scanning mode from a plurality of scanning modes, wherein the selected scanning mode is mapped from the selected transform; and applying the selected scanning mode to the two-dimensional array of transform coefficients to generate a one-dimensional array of transform coefficients. 32. The method of claim 31, further comprising: mapping each of the plurality of transforms to a respective one of the plurality of scanning modes. 33. The method of claim 31, wherein selecting the scanning mode includes accessing configuration data that indicates the how the selected scanning mode is mapped from the selected transform. 34. The method of claim 31, wherein applying the selected scanning mode to the two-dimensional array comprises applying only the selected scanning mode to the two-dimensional array without applying any other ones of the plurality of scanning modes to the two-dimensional array to generate the one-dimensional array of transform coefficients. 35. The method of claim 31, wherein the selected transform is separable transform including a horizontal discrete cosine transform applied in a horizontal direction across the residual data and a vertical discrete cosine transform applied in a vertical direction across the residual data, and wherein the separable transform including the horizontal discrete cosine transform and the vertical discrete cosine transform are mapped to a diagonal scanning mode. 36. The method of claim 31, wherein the selected transform is a separable transform including a designed transform component applied in a horizontal direction across the residual data and a discrete cosine transform component applied in a vertical direction across the residual data, and wherein the separable transform including the designed transform component applied in a horizontal direction and the discrete cosine transform component applied in a vertical direction is mapped to a vertical scanning mode. 37. The method of claim 31, wherein the selected transform is a separable transform including a designed transform component applied in a vertical direction across the residual data and a discrete cosine transform component applied in a horizontal direction across the residual data, and wherein the separable transform including the designed transform component applied in a vertical direction and the discrete cosine transform component applied in a horizontal direction is mapped to a horizontal scanning mode. 38. The method of claim 31, wherein the selected transform is a separable transform including a first designed transform component applied in a horizontal direction across the residual data and a second designed transform component applied in a vertical direction across residual data, and wherein the separable transform including the first designed transform component and the second designed transform component is mapped to a horizontal scanning mode. 39. The method of claim 31, wherein the selected transform is separable transform including a horizontal discrete sine transform applied in a horizontal direction across the residual data and a vertical discrete cosine transform applied in a vertical direction across the residual data, and wherein the separable transform including the horizontal discrete sine transform and the vertical discrete cosine transform are mapped to a vertical scanning mode. 40. The method of claim 31, wherein the selected transform is separable transform including a horizontal discrete cosine transform applied in a horizontal direction across the residual data and a vertical discrete sine transform applied in a vertical direction across the residual data, and wherein the separable transform including the horizontal discrete cosine transform and the vertical discrete sine transform are mapped to a horizontal scanning mode. 41. The method of claim 31, wherein the selected transform is a separable transform including a third designed transform component applied in a horizontal direction across the residual data and a fourth designed transform component applied in a vertical direction across the residual data, and wherein the separable transform including the third designed transform component and the fourth designed transform component is mapped to a vertical scanning mode. 42. The method of claim 31, further comprising: quantizing the transform coefficients in at least one of the one-dimensional array of transform coefficients and the two-dimensional array of transform coefficients; and entropy encoding the one-dimensional array of transform coefficients. 43. A method of decoding video data comprising at least one frame, the method comprising: entropy decoding encoded video data corresponding to a portion of the at least one frame, thereby creating a one-dimensional array of transform coefficients; determining a transform from a plurality of transforms; selecting a scanning mode from a plurality of scanning modes, wherein the selected scanning mode is mapped from the determined transform; and applying the selected scanning mode to the one-dimensional array of transform coefficients to generate a two-dimensional array of transform coefficients. 44. The method of claim 43, wherein selecting the scanning mode includes accessing configuration data that indicates the mapping of the determined transform to one of the plurality of scanning modes. 45. The method of claim 43, wherein the selected transform is separable transform including a horizontal discrete cosine transform applied in a horizontal direction across the residual data and a vertical discrete cosine transform applied in a vertical direction across the residual data, and wherein the separable transform including the horizontal discrete cosine transform and the vertical discrete cosine transform are mapped to a diagonal scanning mode. 46. The method of claim 43, wherein the selected transform is a separable transform including a designed transform component applied in a horizontal direction across the residual data and a discrete cosine transform component applied in a vertical direction across the residual data, and wherein the separable transform including the designed transform component applied in a horizontal direction and the discrete cosine transform component applied in a vertical direction is mapped to a vertical scanning mode. 47. The method of claim 43, wherein the selected transform is a separable transform including a designed transform component applied in a vertical direction across the residual data and a discrete cosine transform component applied in a horizontal direction across the residual data, and wherein the separable transform including the designed transform component applied in a vertical direction and the discrete cosine transform component applied in a horizontal direction is mapped to a horizontal scanning mode. 48. The method of claim 43, wherein the selected transform is a separable transform including a first designed transform component applied in a horizontal direction across the residual data and a second designed transform component applied in a vertical direction across residual data, and wherein the separable transform including the first designed transform component and the second designed transform component is mapped to a horizontal scanning mode. 49. The method of claim 43, wherein the selected transform is separable transform including a horizontal discrete sine transform applied in a horizontal direction across the residual data and a vertical discrete cosine transform applied in a vertical direction across the residual data, and wherein the separable transform including the horizontal discrete sine transform and the vertical discrete cosine transform are mapped to a vertical scanning mode. 50. The method of claim 43, wherein the selected transform is separable transform including a horizontal discrete cosine transform applied in a horizontal direction across the residual data and a vertical discrete sine transform applied in a vertical direction across the residual data, and wherein the separable transform including the horizontal discrete cosine transform and the vertical discrete sine transform are mapped to a horizontal scanning mode. 51. The method of claim 43, wherein the selected transform is a separable transform including a third designed transform component applied in a horizontal direction across the residual data and a fourth designed transform component applied in a vertical direction across the residual data, and wherein the separable transform including the third designed transform component and the fourth designed transform component is mapped to a vertical scanning mode. 52. The method of claim 43, further comprising: inverse quantizing the transform coefficients defined in the two-dimensional array of transform coefficients; and applying an inverse transform to the inverse quantized transform coefficients, wherein the inverse transform is based on the determined transform. 53. An apparatus configured to encode video data comprising at least one frame, the apparatus comprising: a video encoder configured to: calculate residual data corresponding to a portion of the at least one frame; select a transform from a plurality of transforms; apply the selected transform to the residual data so as to generate a two-dimensional array of transform coefficients; select a scanning mode from a plurality of scanning modes, wherein the selected scanning mode is mapped from the selected transform; and apply the selected scanning mode to the two-dimensional array of transform coefficients to generate a one-dimensional array of transform coefficients. 54. The apparatus of claim 53, wherein the video encoder is further configured to apply only the selected scanning mode to the two-dimensional array without applying any other ones of the plurality of scanning modes to the two-dimensional array to generate the one-dimensional array of transform coefficients. 55. The apparatus of claim 53, wherein video encoder is further configured to access configuration data that indicates the mapping of the selected transform to one of the plurality of scanning modes. 56. The apparatus of claim 53, wherein the selected transform is separable transform including a horizontal discrete cosine transform applied in a horizontal direction across the residual data and a vertical discrete cosine transform applied in a vertical direction across the residual data, and wherein the separable transform including the horizontal discrete cosine transform and the vertical discrete cosine transform are mapped to a diagonal scanning mode. 57. The apparatus of claim 53, wherein the selected transform is a separable transform including a designed transform component applied in a horizontal direction across the residual data and a discrete cosine transform component applied in a vertical direction across the residual data, and wherein the separable transform including the designed transform component applied in a horizontal direction and the discrete cosine transform component applied in a vertical direction is mapped to a vertical scanning mode. 58. The apparatus of claim 53, wherein the selected transform is a separable transform including a designed transform component applied in a vertical direction across the residual data and a discrete cosine transform component applied in a horizontal direction across the residual data, and wherein the separable transform including the designed transform component applied in a vertical direction and the discrete cosine transform component applied in a horizontal direction is mapped to a horizontal scanning mode. 59. The apparatus of claim 53, wherein the selected transform is a separable transform including a first designed transform component applied in a horizontal direction across the residual data and a second designed transform component applied in a vertical direction across residual data, and wherein the separable transform including the first designed transform component and the second designed transform component is mapped to a horizontal scanning mode. 60. The apparatus of claim 53, wherein the selected transform is separable transform including a horizontal discrete sine transform applied in a horizontal direction across the residual data and a vertical discrete cosine transform applied in a vertical direction across the residual data, and wherein the separable transform including the horizontal discrete sine transform and the vertical discrete cosine transform are mapped to a vertical scanning mode. 61. The apparatus of claim 53, wherein the selected transform is separable transform including a horizontal discrete cosine transform applied in a horizontal direction across the residual data and a vertical discrete sine transform applied in a vertical direction across the residual data, and wherein the separable transform including the horizontal discrete cosine transform and the vertical discrete sine transform are mapped to a horizontal scanning mode. 62. The apparatus of claim 53, wherein the selected transform is a separable transform including a third designed transform component applied in a horizontal direction across the residual data and a fourth designed transform component applied in a vertical direction across the residual data, and wherein the separable transform including the third designed transform component and the fourth designed transform component is mapped to a vertical scanning mode. 63. The apparatus of claim 53, wherein the video encoder is further configured to: quantize the transform coefficients in at least one of the one-dimensional array of transform coefficients and the two-dimensional array of transform coefficients, entropy encode the one-dimensional array of transform coefficients. 64. An apparatus configured to decode video data comprising at least one frame, the apparatus comprising: a video decoder configured to: entropy decode encoded video data corresponding to a portion of the at least one frame, thereby creating a one-dimensional array of transform coefficients; determine a transform from a plurality of transforms; select a scanning mode from a plurality of scanning modes, whe'rein the selected scanning mode is mapped from the determined transform; and apply the selected scanning mode to the one-dimensional array of transform coefficients to generate a two-dimensional array of transform coefficients. 65. The apparatus of claim 64, wherein video decoder is further configured to access configuration data that indicates the mapping of the determined transform to one of the plurality of scanning modes 66. The apparatus of claim 64, wherein video encoder is further configured to access configuration data that indicates the mapping of the selected transform to one of the plurality of scanning modes. 67. The apparatus of claim 64, wherein the selected transform is separable transform including a horizontal discrete cosine transform applied in a horizontal direction across the residual data and a vertical discrete cosine transform applied in a vertical direction across the residual data, and wherein the separable transform including the horizontal discrete cosine transform and the vertical discrete cosine transform are mapped to a diagonal scanning mode. 68. The apparatus of claim 64, wherein the selected transform is a separable transform including a designed transform component applied in a horizontal direction across the residual data and a discrete cosine transform component applied in a vertical direction across the residual data, and wherein the separable transform including the designed transform component applied in a horizontal direction and the discrete cosine transform component applied in a vertical direction is mapped to a vertical scanning mode. 69. The apparatus of claim 64, wherein the selected transform is a separable transform including a designed transform component applied in a vertical direction across the residual data and a discrete cosine transform component applied in a horizontal direction across the residual data, and wherein the separable transform including the designed transform component applied in a vertical direction and the discrete cosine transform component applied in a horizontal direction is mapped to a horizontal scanning mode. 70. The apparatus of claim 64, wherein the selected transform is a separable transform including a first designed transform component applied in a horizontal direction across the residual data and a second designed transform component applied in a vertical direction across residual data, and wherein the separable transform including the first designed transform component and the second designed transform component is mapped to a horizontal scanning mode. 71. The apparatus of claim 64, wherein the selected transform is separable transform including a horizontal discrete sine transform applied in a horizontal direction across the residual data and a vertical discrete cosine transform applied in a vertical direction across the residual data, and wherein the separable transform including the horizontal discrete sine transform and the vertical discrete cosine transform are mapped to a vertical scanning mode. 72. The apparatus of claim 64, wherein the selected transform is separable transform including a horizontal discrete cosine transform applied in a horizontal direction across the residual data and a vertical discrete sine transform applied in a vertical direction across the residual data, and wherein the separable transform including the horizontal discrete cosine transform and the vertical discrete sine transform are mapped to a horizontal scanning mode. 73. The apparatus of claim 64, wherein the selected transform is a separable transform including a third designed transform component applied in a horizontal direction across the residual data and a fourth designed transform component applied in a vertical direction across the residual data, and wherein the separable transform including the third designed transform component and the fourth designed transform component is mapped to a vertical scanning mode. 74. The apparatus of claim 64, wherein the video decoder is further configured to: inverse quantize the transform coefficients defined in the two-dimensional array of transform coefficients; and apply an inverse transform to the inverse quantized transform coefficients, wherein the inverse transform is based on the determined transform. 75. An apparatus configured to encode video data comprising at least one frame, the apparatus comprising: means for calculating residual data corresponding to a portion of the at least one frame; means for selecting a transform from a plurality of transforms; means for applying the selected transform to the residual data so as to generate a two-dimensional array of transform coefficients; means for selecting a scanning mode from a plurality of scanning modes, wherein the selected scanning mode is mapped from the selected transform; and means for applying the selected scanning mode to the two-dimensional array of transform coefficients to generate a one-dimensional array of transform coefficients. 76. An apparatus configured to decode video data comprising at least one frame, the apparatus comprising: means for entropy decoding encoded video data corresponding to a portion of the at least one frame, thereby creating a one-dimensional array of transform coefficients; means for determining a transform from a plurality of transforms; means for selecting a scanning mode from a plurality of scanning modes, wherein the selected scanning mode is mapped from the determined transform; and means for applying the selected scanning mode to the one-dimensional array of transform coefficients to generate a two-dimensional array of transform coefficients. 77. A computer program product comprising a computer-readable storage medium having stored thereon instructions that, when executed, cause a processor of a device for encoding video data comprising at least one frame to: calculate residual data corresponding to a portion of the at least one frame; select a transform from a plurality of transforms; apply the selected transform to the residual data so as to generate a two-dimensional array of transform coefficients; select a scanning mode from a plurality of scanning modes, wherein the selected scanning mode is mapped from the selected transform; and apply the selected scanning mode to the two-dimensional array of transform coefficients to generate a one-dimensional array of transform coefficients. 78. A computer program product comprising a computer-readable storage medium having stored thereon instructions that, when executed, cause a processor of a device for decoding video data comprising at least one frame to: entropy decode encoded video data corresponding to a portion of the at least one frame, thereby creating a one-dimensional array of transform coefficients; determine a transform from a plurality of transforms; select a scanning mode from a plurality of scanning modes, wherein the selected scanning mode is mapped from the determined transform; and apply the selected scanning mode to the one-dimensional array of transform coefficients to generate a two-dimensional array of transform coefficients.
A video encoder may transform residual data by using a transform selected from a group of transforms. The transform is applied to the residual data to create a two-dimensional array of transform coefficients. A scanning mode is selected to scan the transform coefficients in the two-dimensional array into a one-dimensional array of transform coefficients. The combination of transform and scanning mode may be selected from a subset of combinations that is based on an intra-prediction mode. The scanning mode may also be selected based on the transform used to create the two-dimensional array. The transforms and/or scanning modes used may be signaled to a video decoder.1. A method of encoding video data comprising: determining a subset of transform and scanning mode combinations based on an intra-prediction mode; selecting a transform and a scanning mode combination from the subset of transform and scanning mode combinations; applying the selected transform to residual data associated with predicting a block based on the intra-prediction mode so as to generate a two-dimensional array of transform coefficients; and applying the selected scanning mode to the two-dimensional array of transform coefficients to generate a one-dimensional array of transform coefficients. 2. The method of claim 1, further comprising: quantizing the transform coefficients in at least one of the one-dimensional array of transform coefficients and the two-dimensional array of transform coefficients; and entropy coding the one-dimensional array of transform coefficients. 3. The method of claim 1, further comprising: signaling an index in an encoded video bitstream, wherein the index indicates the selected transform and scanning mode combination. 4. The method of claim 3, wherein the index is represented by a fixed number of bits and wherein the index is entropy coded using CABAC or CAVLC. 5. The method of claim 1, further comprising: signaling an index in an encoded video bitstream, wherein the index indicates the selected transform, and wherein the subset of transform and scanning mode combinations are determined such that a transform is mapped to a specific scanning mode. 6. The method of claim 1, further comprising: signaling an index in an encoded video bitstream, wherein the index indicates the selected transform, and wherein each of the scanning modes in the subset of transform and scanning mode combinations is based on the intra-prediction mode. 7. The method of claim 1, wherein the subset of transform and scanning mode combinations are determined based on the intra-prediction mode and a block size. 8. A method of decoding video data comprising: receiving encoded video data, wherein the encoded video data was encoded according to an intra-prediction mode; entropy decoding the encoded video data, thereby creating a one-dimensional array of transform coefficients; determining a transform from a subset of transform and scanning mode combinations, wherein the subset is based on the intra-prediction mode; determining a scanning mode from the subset of transform and scanning mode combinations; scanning the one-dimensional array of transform coefficients with the determined scanning mode to produce a two-dimensional array of transform coefficients; and inverse transforming the two-dimensional array of transform coefficients with the determined transform to produce residual video data associated with predicting a block based on the intra-prediction mode. 9. The method of claim 8, further comprising: performing an intra-predictive video coding process on the residual video data according to the intra-prediction mode to produce decoded video data. 10. The method of claim 8, further comprising: receiving an index indicating the determined transform and the determined scanning mode; and entropy decoding the index using CABAC or CAVLC. 11. The method of claim 10, wherein the index is a 2-bit index. 12. The method of claim 8, further comprising: receiving an index indicating the determined transform, wherein the scanning mode is determined based on the determined transform. 13. The method of claim 8, further comprising: receiving an index indicating the determined transform, wherein the scanning mode is determined based on the intra-prediction mode. 14. An apparatus configured to encode video data comprising: a video encoder configured to: determine a subset of transform and scanning mode combinations based on an intra-prediction mode; select a transform and a scanning mode combination from the subset of transform and scanning mode combinations; apply the selected transform to residual data associated with predicting a block based on the intra-prediction mode so as to generate a two-dimensional array of transform coefficients; and apply the selected scanning mode to the two-dimensional array of transform coefficients to generate a one-dimensional array of transform coefficients. 15. The apparatus of claim 14, wherein the video encoder is further configured to: quantize the transform coefficients in at least one of the one-dimensional array of transform coefficients and the two-dimensional array of transform coefficients; and entropy code the one-dimensional array of transform coefficients. 16. The apparatus of claim 14, wherein the video encoder is further configured to: signal an index in an encoded video bitstream, wherein the index indicates the selected transform and scanning mode combination. 17. The apparatus of claim 16, wherein the index is represented by a fixed number of bits and wherein the index is entropy coded using CABAC or CAVLC. 18. The apparatus of claim 14, wherein the video encoder is further configured to: signal an index in an encoded video bitstream, wherein the index indicates the selected transform, and wherein the subset of transform and scanning mode combinations are determined such that a transform is mapped to a specific scanning mode. 19. The apparatus of claim 14, wherein the video encoder is further configured to: signal an index in an encoded video bitstream, wherein the index indicates the selected transform, and wherein each of the scanning modes in the subset of transform and scanning mode combinations is based on the intra-prediction mode. 20. The apparatus of claim 14, wherein the subset of transform and scanning mode combinations are determined based on the intra-prediction mode and a block size. 21. An apparatus configured to decode video data comprising: a video decoder configured to: receive encoded video data, wherein the encoded video data was encoded according to an intra-prediction mode; entropy decode the encoded video data, thereby creating a one-dimensional array of transform coefficients; determine a transform from a subset of transform and scanning mode combinations, wherein the subset is based on the intra-prediction mode; determine a scanning mode from the subset of transform and scanning mode combinations; scan the one-dimensional array of transform coefficients with the determined scanning mode to produce a two-dimensional array of transform coefficients; and inverse transform the two-dimensional array of transform coefficients with the determined transform to produce residual video data associated with predicting a block based on the intra-prediction mode. 22. The apparatus of claim 21, wherein the video decoder is further configure to: perform an intra-predictive video coding process on the residual video data according to the intra-prediction mode to produce decoded video data. 23. The apparatus of claim 21, wherein the video decoder is further configure to: receive an index indicating the determined transform and the determined scanning mode; and entropy decode the index using CABAC or CAVLC. 24. The apparatus of claim 23, wherein the index is a 2-bit index. 25. The apparatus of claim 21, wherein the video decoder is further configure to: receive an index indicating the determined transform, wherein the scanning mode is determined based on the determined transform. 26. The apparatus of claim 21, wherein the video decoder is further configure to: receive an index indicating the determined transform, wherein the scanning mode is determined based on the intra-prediction mode. 27. An apparatus configured to encode video data comprising: means for determining a subset of transform and scanning mode combinations based on an intra-prediction mode; means for selecting a transform and a scanning mode combination from the subset of transform and scanning mode combinations; means for applying the selected transform to residual data associated with predicting a block based on the intra-prediction mode so as to generate a two-dimensional array of transform coefficients; and means for applying the selected scanning mode to the two-dimensional array of transform coefficients to generate a one-dimensional array of transform coefficients. 28. An apparatus configured to decode video data comprising: means for receiving encoded video data, wherein the encoded video data was encoded according to an intra-prediction mode; means for entropy decoding the encoded video data, thereby creating a one-dimensional array of transform coefficients; means for determining a transform from a subset of transform and scanning mode combinations, wherein the subset is based on the intra-prediction mode; means for determining a scanning mode from the subset of transform and scanning mode combinations; means for scanning the one-dimensional array of transform coefficients with the determined scanning mode to produce a two-dimensional array of transform coefficients; and means for inverse transforming the two-dimensional array of transform coefficients with the determined transform to produce residual video data associated with predicting a block based on the intra-prediction mode. 29. A computer program product comprising a computer-readable medium having stored thereon instructions that, when executed, cause a processor of a device for encoding video data to: determine a subset of transform and scanning mode combinations based on an intra-prediction mode; select a transform and a scanning mode combination from the subset of transform and scanning mode combinations; apply the selected transform to residual data associated with predicting a block based on the intra-prediction mode so as to generate a two-dimensional array of transform coefficients; and apply the selected scanning mode to the two-dimensional array of transform coefficients to generate a one-dimensional array of transform coefficients. 30. A computer program product comprising a computer-readable medium having stored thereon instructions that, when executed, cause a processor of a device for decoding video data to: receive encoded video data, wherein the encoded video data was encoded according to an intra-prediction mode; entropy decode the encoded video data, thereby creating a one-dimensional array of transform coefficients; determine a transform from a subset of transform and scanning mode combinations, wherein the subset is based on the intra-prediction mode; determine a scanning mode from the subset of transform and scanning mode combinations; scan the one-dimensional array of transform coefficients with the determined scanning mode to produce a two-dimensional array of transform coefficients; and inverse transform the two-dimensional array of transform coefficients with the determined transform to produce residual video data associated with predicting a block based on the intra-prediction mode. 31. A method of encoding video data comprising at least one frame, the method comprising: calculating residual data corresponding to a portion of the at least one frame; selecting a transform from a plurality of transforms; applying the selected transform to the residual data so as to generate a two-dimensional array of transform coefficients; selecting a scanning mode from a plurality of scanning modes, wherein the selected scanning mode is mapped from the selected transform; and applying the selected scanning mode to the two-dimensional array of transform coefficients to generate a one-dimensional array of transform coefficients. 32. The method of claim 31, further comprising: mapping each of the plurality of transforms to a respective one of the plurality of scanning modes. 33. The method of claim 31, wherein selecting the scanning mode includes accessing configuration data that indicates the how the selected scanning mode is mapped from the selected transform. 34. The method of claim 31, wherein applying the selected scanning mode to the two-dimensional array comprises applying only the selected scanning mode to the two-dimensional array without applying any other ones of the plurality of scanning modes to the two-dimensional array to generate the one-dimensional array of transform coefficients. 35. The method of claim 31, wherein the selected transform is separable transform including a horizontal discrete cosine transform applied in a horizontal direction across the residual data and a vertical discrete cosine transform applied in a vertical direction across the residual data, and wherein the separable transform including the horizontal discrete cosine transform and the vertical discrete cosine transform are mapped to a diagonal scanning mode. 36. The method of claim 31, wherein the selected transform is a separable transform including a designed transform component applied in a horizontal direction across the residual data and a discrete cosine transform component applied in a vertical direction across the residual data, and wherein the separable transform including the designed transform component applied in a horizontal direction and the discrete cosine transform component applied in a vertical direction is mapped to a vertical scanning mode. 37. The method of claim 31, wherein the selected transform is a separable transform including a designed transform component applied in a vertical direction across the residual data and a discrete cosine transform component applied in a horizontal direction across the residual data, and wherein the separable transform including the designed transform component applied in a vertical direction and the discrete cosine transform component applied in a horizontal direction is mapped to a horizontal scanning mode. 38. The method of claim 31, wherein the selected transform is a separable transform including a first designed transform component applied in a horizontal direction across the residual data and a second designed transform component applied in a vertical direction across residual data, and wherein the separable transform including the first designed transform component and the second designed transform component is mapped to a horizontal scanning mode. 39. The method of claim 31, wherein the selected transform is separable transform including a horizontal discrete sine transform applied in a horizontal direction across the residual data and a vertical discrete cosine transform applied in a vertical direction across the residual data, and wherein the separable transform including the horizontal discrete sine transform and the vertical discrete cosine transform are mapped to a vertical scanning mode. 40. The method of claim 31, wherein the selected transform is separable transform including a horizontal discrete cosine transform applied in a horizontal direction across the residual data and a vertical discrete sine transform applied in a vertical direction across the residual data, and wherein the separable transform including the horizontal discrete cosine transform and the vertical discrete sine transform are mapped to a horizontal scanning mode. 41. The method of claim 31, wherein the selected transform is a separable transform including a third designed transform component applied in a horizontal direction across the residual data and a fourth designed transform component applied in a vertical direction across the residual data, and wherein the separable transform including the third designed transform component and the fourth designed transform component is mapped to a vertical scanning mode. 42. The method of claim 31, further comprising: quantizing the transform coefficients in at least one of the one-dimensional array of transform coefficients and the two-dimensional array of transform coefficients; and entropy encoding the one-dimensional array of transform coefficients. 43. A method of decoding video data comprising at least one frame, the method comprising: entropy decoding encoded video data corresponding to a portion of the at least one frame, thereby creating a one-dimensional array of transform coefficients; determining a transform from a plurality of transforms; selecting a scanning mode from a plurality of scanning modes, wherein the selected scanning mode is mapped from the determined transform; and applying the selected scanning mode to the one-dimensional array of transform coefficients to generate a two-dimensional array of transform coefficients. 44. The method of claim 43, wherein selecting the scanning mode includes accessing configuration data that indicates the mapping of the determined transform to one of the plurality of scanning modes. 45. The method of claim 43, wherein the selected transform is separable transform including a horizontal discrete cosine transform applied in a horizontal direction across the residual data and a vertical discrete cosine transform applied in a vertical direction across the residual data, and wherein the separable transform including the horizontal discrete cosine transform and the vertical discrete cosine transform are mapped to a diagonal scanning mode. 46. The method of claim 43, wherein the selected transform is a separable transform including a designed transform component applied in a horizontal direction across the residual data and a discrete cosine transform component applied in a vertical direction across the residual data, and wherein the separable transform including the designed transform component applied in a horizontal direction and the discrete cosine transform component applied in a vertical direction is mapped to a vertical scanning mode. 47. The method of claim 43, wherein the selected transform is a separable transform including a designed transform component applied in a vertical direction across the residual data and a discrete cosine transform component applied in a horizontal direction across the residual data, and wherein the separable transform including the designed transform component applied in a vertical direction and the discrete cosine transform component applied in a horizontal direction is mapped to a horizontal scanning mode. 48. The method of claim 43, wherein the selected transform is a separable transform including a first designed transform component applied in a horizontal direction across the residual data and a second designed transform component applied in a vertical direction across residual data, and wherein the separable transform including the first designed transform component and the second designed transform component is mapped to a horizontal scanning mode. 49. The method of claim 43, wherein the selected transform is separable transform including a horizontal discrete sine transform applied in a horizontal direction across the residual data and a vertical discrete cosine transform applied in a vertical direction across the residual data, and wherein the separable transform including the horizontal discrete sine transform and the vertical discrete cosine transform are mapped to a vertical scanning mode. 50. The method of claim 43, wherein the selected transform is separable transform including a horizontal discrete cosine transform applied in a horizontal direction across the residual data and a vertical discrete sine transform applied in a vertical direction across the residual data, and wherein the separable transform including the horizontal discrete cosine transform and the vertical discrete sine transform are mapped to a horizontal scanning mode. 51. The method of claim 43, wherein the selected transform is a separable transform including a third designed transform component applied in a horizontal direction across the residual data and a fourth designed transform component applied in a vertical direction across the residual data, and wherein the separable transform including the third designed transform component and the fourth designed transform component is mapped to a vertical scanning mode. 52. The method of claim 43, further comprising: inverse quantizing the transform coefficients defined in the two-dimensional array of transform coefficients; and applying an inverse transform to the inverse quantized transform coefficients, wherein the inverse transform is based on the determined transform. 53. An apparatus configured to encode video data comprising at least one frame, the apparatus comprising: a video encoder configured to: calculate residual data corresponding to a portion of the at least one frame; select a transform from a plurality of transforms; apply the selected transform to the residual data so as to generate a two-dimensional array of transform coefficients; select a scanning mode from a plurality of scanning modes, wherein the selected scanning mode is mapped from the selected transform; and apply the selected scanning mode to the two-dimensional array of transform coefficients to generate a one-dimensional array of transform coefficients. 54. The apparatus of claim 53, wherein the video encoder is further configured to apply only the selected scanning mode to the two-dimensional array without applying any other ones of the plurality of scanning modes to the two-dimensional array to generate the one-dimensional array of transform coefficients. 55. The apparatus of claim 53, wherein video encoder is further configured to access configuration data that indicates the mapping of the selected transform to one of the plurality of scanning modes. 56. The apparatus of claim 53, wherein the selected transform is separable transform including a horizontal discrete cosine transform applied in a horizontal direction across the residual data and a vertical discrete cosine transform applied in a vertical direction across the residual data, and wherein the separable transform including the horizontal discrete cosine transform and the vertical discrete cosine transform are mapped to a diagonal scanning mode. 57. The apparatus of claim 53, wherein the selected transform is a separable transform including a designed transform component applied in a horizontal direction across the residual data and a discrete cosine transform component applied in a vertical direction across the residual data, and wherein the separable transform including the designed transform component applied in a horizontal direction and the discrete cosine transform component applied in a vertical direction is mapped to a vertical scanning mode. 58. The apparatus of claim 53, wherein the selected transform is a separable transform including a designed transform component applied in a vertical direction across the residual data and a discrete cosine transform component applied in a horizontal direction across the residual data, and wherein the separable transform including the designed transform component applied in a vertical direction and the discrete cosine transform component applied in a horizontal direction is mapped to a horizontal scanning mode. 59. The apparatus of claim 53, wherein the selected transform is a separable transform including a first designed transform component applied in a horizontal direction across the residual data and a second designed transform component applied in a vertical direction across residual data, and wherein the separable transform including the first designed transform component and the second designed transform component is mapped to a horizontal scanning mode. 60. The apparatus of claim 53, wherein the selected transform is separable transform including a horizontal discrete sine transform applied in a horizontal direction across the residual data and a vertical discrete cosine transform applied in a vertical direction across the residual data, and wherein the separable transform including the horizontal discrete sine transform and the vertical discrete cosine transform are mapped to a vertical scanning mode. 61. The apparatus of claim 53, wherein the selected transform is separable transform including a horizontal discrete cosine transform applied in a horizontal direction across the residual data and a vertical discrete sine transform applied in a vertical direction across the residual data, and wherein the separable transform including the horizontal discrete cosine transform and the vertical discrete sine transform are mapped to a horizontal scanning mode. 62. The apparatus of claim 53, wherein the selected transform is a separable transform including a third designed transform component applied in a horizontal direction across the residual data and a fourth designed transform component applied in a vertical direction across the residual data, and wherein the separable transform including the third designed transform component and the fourth designed transform component is mapped to a vertical scanning mode. 63. The apparatus of claim 53, wherein the video encoder is further configured to: quantize the transform coefficients in at least one of the one-dimensional array of transform coefficients and the two-dimensional array of transform coefficients, entropy encode the one-dimensional array of transform coefficients. 64. An apparatus configured to decode video data comprising at least one frame, the apparatus comprising: a video decoder configured to: entropy decode encoded video data corresponding to a portion of the at least one frame, thereby creating a one-dimensional array of transform coefficients; determine a transform from a plurality of transforms; select a scanning mode from a plurality of scanning modes, whe'rein the selected scanning mode is mapped from the determined transform; and apply the selected scanning mode to the one-dimensional array of transform coefficients to generate a two-dimensional array of transform coefficients. 65. The apparatus of claim 64, wherein video decoder is further configured to access configuration data that indicates the mapping of the determined transform to one of the plurality of scanning modes 66. The apparatus of claim 64, wherein video encoder is further configured to access configuration data that indicates the mapping of the selected transform to one of the plurality of scanning modes. 67. The apparatus of claim 64, wherein the selected transform is separable transform including a horizontal discrete cosine transform applied in a horizontal direction across the residual data and a vertical discrete cosine transform applied in a vertical direction across the residual data, and wherein the separable transform including the horizontal discrete cosine transform and the vertical discrete cosine transform are mapped to a diagonal scanning mode. 68. The apparatus of claim 64, wherein the selected transform is a separable transform including a designed transform component applied in a horizontal direction across the residual data and a discrete cosine transform component applied in a vertical direction across the residual data, and wherein the separable transform including the designed transform component applied in a horizontal direction and the discrete cosine transform component applied in a vertical direction is mapped to a vertical scanning mode. 69. The apparatus of claim 64, wherein the selected transform is a separable transform including a designed transform component applied in a vertical direction across the residual data and a discrete cosine transform component applied in a horizontal direction across the residual data, and wherein the separable transform including the designed transform component applied in a vertical direction and the discrete cosine transform component applied in a horizontal direction is mapped to a horizontal scanning mode. 70. The apparatus of claim 64, wherein the selected transform is a separable transform including a first designed transform component applied in a horizontal direction across the residual data and a second designed transform component applied in a vertical direction across residual data, and wherein the separable transform including the first designed transform component and the second designed transform component is mapped to a horizontal scanning mode. 71. The apparatus of claim 64, wherein the selected transform is separable transform including a horizontal discrete sine transform applied in a horizontal direction across the residual data and a vertical discrete cosine transform applied in a vertical direction across the residual data, and wherein the separable transform including the horizontal discrete sine transform and the vertical discrete cosine transform are mapped to a vertical scanning mode. 72. The apparatus of claim 64, wherein the selected transform is separable transform including a horizontal discrete cosine transform applied in a horizontal direction across the residual data and a vertical discrete sine transform applied in a vertical direction across the residual data, and wherein the separable transform including the horizontal discrete cosine transform and the vertical discrete sine transform are mapped to a horizontal scanning mode. 73. The apparatus of claim 64, wherein the selected transform is a separable transform including a third designed transform component applied in a horizontal direction across the residual data and a fourth designed transform component applied in a vertical direction across the residual data, and wherein the separable transform including the third designed transform component and the fourth designed transform component is mapped to a vertical scanning mode. 74. The apparatus of claim 64, wherein the video decoder is further configured to: inverse quantize the transform coefficients defined in the two-dimensional array of transform coefficients; and apply an inverse transform to the inverse quantized transform coefficients, wherein the inverse transform is based on the determined transform. 75. An apparatus configured to encode video data comprising at least one frame, the apparatus comprising: means for calculating residual data corresponding to a portion of the at least one frame; means for selecting a transform from a plurality of transforms; means for applying the selected transform to the residual data so as to generate a two-dimensional array of transform coefficients; means for selecting a scanning mode from a plurality of scanning modes, wherein the selected scanning mode is mapped from the selected transform; and means for applying the selected scanning mode to the two-dimensional array of transform coefficients to generate a one-dimensional array of transform coefficients. 76. An apparatus configured to decode video data comprising at least one frame, the apparatus comprising: means for entropy decoding encoded video data corresponding to a portion of the at least one frame, thereby creating a one-dimensional array of transform coefficients; means for determining a transform from a plurality of transforms; means for selecting a scanning mode from a plurality of scanning modes, wherein the selected scanning mode is mapped from the determined transform; and means for applying the selected scanning mode to the one-dimensional array of transform coefficients to generate a two-dimensional array of transform coefficients. 77. A computer program product comprising a computer-readable storage medium having stored thereon instructions that, when executed, cause a processor of a device for encoding video data comprising at least one frame to: calculate residual data corresponding to a portion of the at least one frame; select a transform from a plurality of transforms; apply the selected transform to the residual data so as to generate a two-dimensional array of transform coefficients; select a scanning mode from a plurality of scanning modes, wherein the selected scanning mode is mapped from the selected transform; and apply the selected scanning mode to the two-dimensional array of transform coefficients to generate a one-dimensional array of transform coefficients. 78. A computer program product comprising a computer-readable storage medium having stored thereon instructions that, when executed, cause a processor of a device for decoding video data comprising at least one frame to: entropy decode encoded video data corresponding to a portion of the at least one frame, thereby creating a one-dimensional array of transform coefficients; determine a transform from a plurality of transforms; select a scanning mode from a plurality of scanning modes, wherein the selected scanning mode is mapped from the determined transform; and apply the selected scanning mode to the one-dimensional array of transform coefficients to generate a two-dimensional array of transform coefficients.
2,400
6,987
6,987
14,817,724
2,463
A communication management resource associated with a wireless access point in a network environment allocates use of a wireless channel and sub-channels over time to multiple communication devices in communication with the wireless access point. For example, during use, from a first communication device of the multiple communication devices competing for wireless bandwidth, the communication management resource receives a request for allocation of wireless bandwidth to communicate over a wireless communication link with the wireless access point. Subsequent to receiving the request, the communication management resource identifies an appropriate amount of wireless bandwidth suitable to satisfy the request for bandwidth from the first communication device. In accordance with the identified amount of wireless bandwidth needed to satisfy the request, the communication management resource subdivides the wireless channel for use by the first communication device and potentially other communication devices that request use of the available wireless bandwidth.
1. A method comprising: at a communication management resource in a network environment that allocates use of a wireless channel over time to multiple communication devices in communication with a wireless access point: from a first communication device of the multiple communication devices, receiving a request for allocation of wireless bandwidth to communicate over a wireless communication link; identifying an amount of wireless bandwidth suitable to satisfy the request for bandwidth from the first communication device; and based on the identified amount of wireless bandwidth, subdividing the wireless channel for use by the first communication device. 2. The method as in claim 1, wherein the wireless channel is a predetermined bandwidth available for use by multiple communication devices in the network environment. 3. The method as in claim 1 further comprising: based on the identified amount of wireless bandwidth, allocating a less-than-all portion of the wireless channel to the first communication device to communicate data over the wireless communication link to the wireless access point. 4. The method as in claim 3, wherein the less-than-all portion of the wireless channel is a first portion of the wireless channel, the method further comprising: allocating a second portion of the wireless channel for use by a second communication device of the multiple communication devices, the second portion of the wireless channel allocated for use by the second communication device to simultaneously communicate with the wireless access point while the first communication device uses the first portion of the wireless channel to communicate with the wireless access point. 5. The method as in claim 2, wherein the wireless channel is initially allocated for use by a second communication device to communicate with the wireless access point at a time of receiving the request; and wherein allocating the less-than-all portion of the wireless channel to the communication device includes: reducing an amount of bandwidth in the wireless channel that is assigned for use by the second communication device to communicate with the wireless access point, the reduced amount of bandwidth being the less-than-all portion of bandwidth reassigned for use by the first communication device. 6. The method as in claim 3 further comprising: in response to detecting completion of the first communication device using the less-than-all portion of the channel to transmit a data payload, reallocating the less-than-all portion of the channel for use by another communication device. 7. The method as in claim 3, wherein allocating the less-than-all portion of the wireless channel to the first communication device further comprises: allocating the less-than-all portion of the wireless channel to the first communication device for a time span, the method further comprising: for a first duration of time overlapping with the time span, allocating a second portion of the wireless channel for use by a second communication device in the network environment to communicate with the wireless access point; and for a second duration of time following the first duration of time and overlapping with the time span, allocating the second portion of the wireless channel for use by a third communication device in the network environment to communicate with the wireless access point. 8. The method as in claim 1, wherein identifying the amount of wireless bandwidth further comprises: identifying a classification type of an application on the first communication device generating the request for allocation of the wireless bandwidth; mapping the classification type to flow service settings associated with the application; and as specified by the flow service settings, transmitting communications over a subdivided portion of the wireless channel allocated for use by the first communication device. 9. The method as in claim 1 further comprising: at the wireless access point, receiving notification that the first communication device is in wireless communication with a second communication device; transmitting the first communications from the wireless access point to the first communication device, the first communications addressed for delivery to the first communication device; and transmitting second communications from the wireless access point to the first communication device, the second communications addressed for delivery to the second communication device, the first communication device forwarding the second communications to the second communication device. 10. The method as in claim 9 further comprising: varying an amount of bandwidth allocated on the wireless communication link to convey the first communications and second communications to the first communication device. 11. The method as in claim 3 further comprising: in response to detecting completion of the first communication device using the less-than-all portion of the channel to transmit a data payload to the wireless access point, reallocating all of the wireless channel for use by another communication device. 12. The method as in claim 1, wherein identifying the amount of wireless bandwidth further comprises: utilizing a network address received from the first communication device to identify a classification type assigned to the first communication device; and utilizing the classification type assigned to the first communication device to identify wireless bandwidth eligibility assigned to the first communication device. 13. The method as in claim 12, wherein identifying the amount of wireless bandwidth further comprises: identifying service level settings associated with an application generating the request for the wireless bandwidth; and wherein a subdivided portion of the wireless channel allocated for use by the first communication device supports conveyance of communications as specified by the service level settings. 14. A method comprising: at a communication management resource managing communications associated with a wireless access point in a wireless network environment: in response to receiving a first bandwidth request from a first communication device and a second bandwidth request from a second communication device for simultaneous use of wireless bandwidth, subdividing an available wireless spectrum to include a first wireless sub-channel and a second wireless sub-channel; allocating the first wireless sub-channel for use by the first communication device; and allocating the second wireless sub-channel for use by the second communication device. 15. The method as in claim 14 further comprising: allocating the first wireless sub-channel to the first communication device and the second wireless sub-channel to the second communication device for use in a given time frame. 16. The method as in claim 14 further comprising: simultaneously receiving first communications over the first sub-channel from the first communication device and second communications over the second sub-channel from the second communication device. 17. The method as in claim 16 further comprising: producing the first sub-channel to support conveyance of data at a substantially lower rate than the second sub-channel. 18. The method as in claim 17 further comprising: sizing the first sub-channel and the second sub-channel based at least in part on network addresses assigned to the first communication device and the second communication device. 19. The method as in claim 14, wherein subdividing the available wireless spectrum further comprises: subdividing a wireless channel of predetermined bandwidth into the first wireless sub-channel and the second wireless sub-channel; and prior to subdividing the wireless channel, allocating the wireless channel for use by a third communication device, the third communication device using the wireless channel prior to the first communication device of the second communication device simultaneously using the first wireless sub-channel and the second wireless sub-channel. 20. The method as in claim 14, wherein the wireless channel is a WiFi™ channel dynamically allocated for use by multiple communication devices in the network environment. 21. A computer system comprising: computer processor hardware; and a hardware storage resource coupled to the computer processor hardware, the hardware storage resource storing instructions that, when executed by the computer processor hardware, causes the computer processor hardware to perform operations of: from a first communication device of multiple communication devices in a network environment, receiving a request for allocation of wireless bandwidth to communicate over a wireless communication link; identifying an amount of wireless bandwidth suitable to satisfy the request for bandwidth from the first communication device; and based on the identified amount of wireless bandwidth, subdividing a wireless channel for use by the first communication device. 22. The computer system as in claim 21, wherein the wireless channel is a predetermined bandwidth available for use by the multiple communication devices in the network environment. 23. The computer system as in claim 21, wherein the computer processor hardware further performs operations of: based on the identified amount of wireless bandwidth, allocating a less-than-all portion of the wireless channel to the first communication device to communicate data over the wireless communication link to the wireless access point. 24. The computer system as in claim 23, wherein the less-than-all portion of the wireless channel is a first portion of the wireless channel, the computer processor hardware further performing operations of: allocating a second portion of the wireless channel for use by a second communication device of the multiple communication devices, the second portion of the wireless channel allocated for use by the second communication device to simultaneously communicate with the wireless access point while the first communication device uses the first portion of the wireless channel to communicate with the wireless access point. 25. The computer system as in claim 22, wherein the wireless channel is initially allocated for use by a second communication device to communicate with the wireless access point at a time of receiving the request; and wherein allocating the less-than-all portion of the wireless channel to the communication device includes: reducing an amount of bandwidth in the wireless channel that is assigned for use by the second communication device to communicate with the wireless access point, the reduced amount of bandwidth being the less-than-all portion of bandwidth reassigned for use by the first communication device. 26. The computer system as in claim 23, wherein the computer processor hardware further performs operations of: in response to detecting completion of the first communication device using the less-than-all portion of the channel to transmit a data payload, reallocating the less-than-all portion of the channel for use by another communication device. 27. The computer system as in claim 23, wherein allocating the less-than-all portion of the wireless channel to the first communication device further comprises: allocating the less-than-all portion of the wireless channel to the first communication device for a time span; wherein the computer processor hardware further performs operations of: for a first duration of time overlapping with the time span, allocating a second portion of the wireless channel for use by a second communication device in the network environment to communicate with the wireless access point; and for a second duration of time following the first duration of time and overlapping with the time span, allocating the second portion of the wireless channel for use by a third communication device in the network environment to communicate with the wireless access point. 28. The computer system as in claim 21, wherein identifying the amount of wireless bandwidth further comprises: identifying a classification type of an application on the first communication device generating the request for allocation of the wireless bandwidth; mapping the classification type to flow service settings associated with the application; and as specified by the flow service settings, transmitting communications over a subdivided portion of the wireless channel allocated for use by the first communication device. 29. The computer system as in claim 21, wherein the computer processor hardware further performs operations of: at the wireless access point, receiving notification that the first communication device is in wireless communication with a second communication device; transmitting the first communications from the wireless access point to the first communication device, the first communications addressed for delivery to the first communication device; and transmitting second communications from the wireless access point to the first communication device, the second communications addressed for delivery to the second communication device, the first communication device forwarding the second communications to the second communication device. 30. The computer system as in claim 29, wherein the computer processor hardware further performs operations of: varying an amount of bandwidth allocated on the wireless communication link to convey the first communications and second communications to the first communication device. 31. The computer system as in claim 23, wherein the computer processor hardware further performs operations of: in response to detecting completion of the first communication device using the less-than-all portion of the channel to transmit a data payload to the wireless access point, reallocating all of the wireless channel for use by another communication device. 32. Computer-readable storage hardware having instructions stored thereon, the instructions, when carried out by computer processor hardware, causes the computer processor hardware to perform operations of: from a first communication device of multiple communication devices, receiving a request for allocation of wireless bandwidth to communicate over a wireless communication link; identifying an amount of wireless bandwidth suitable to satisfy the request for bandwidth from the first communication device; and based on the identified amount of wireless bandwidth, subdividing a wireless channel for use by the first communication device. 33. The method as in claim 1 further comprising: allocating use of subdivided portions of the wireless channel in accordance with space division multiple access techniques to provide spatial isolation amongst the multiple communication devices. 34. The method as in claim 1 further comprising: identifying a classification type associated with the first communication device generating the request for allocation of the wireless bandwidth; identifying security setting information assigned to the identified classification type; and as specified by the identified security setting information, transmitting communications over a subdivided portion of the wireless channel to the first communication device in accordance with security settings as specified by the identified security setting information.
A communication management resource associated with a wireless access point in a network environment allocates use of a wireless channel and sub-channels over time to multiple communication devices in communication with the wireless access point. For example, during use, from a first communication device of the multiple communication devices competing for wireless bandwidth, the communication management resource receives a request for allocation of wireless bandwidth to communicate over a wireless communication link with the wireless access point. Subsequent to receiving the request, the communication management resource identifies an appropriate amount of wireless bandwidth suitable to satisfy the request for bandwidth from the first communication device. In accordance with the identified amount of wireless bandwidth needed to satisfy the request, the communication management resource subdivides the wireless channel for use by the first communication device and potentially other communication devices that request use of the available wireless bandwidth.1. A method comprising: at a communication management resource in a network environment that allocates use of a wireless channel over time to multiple communication devices in communication with a wireless access point: from a first communication device of the multiple communication devices, receiving a request for allocation of wireless bandwidth to communicate over a wireless communication link; identifying an amount of wireless bandwidth suitable to satisfy the request for bandwidth from the first communication device; and based on the identified amount of wireless bandwidth, subdividing the wireless channel for use by the first communication device. 2. The method as in claim 1, wherein the wireless channel is a predetermined bandwidth available for use by multiple communication devices in the network environment. 3. The method as in claim 1 further comprising: based on the identified amount of wireless bandwidth, allocating a less-than-all portion of the wireless channel to the first communication device to communicate data over the wireless communication link to the wireless access point. 4. The method as in claim 3, wherein the less-than-all portion of the wireless channel is a first portion of the wireless channel, the method further comprising: allocating a second portion of the wireless channel for use by a second communication device of the multiple communication devices, the second portion of the wireless channel allocated for use by the second communication device to simultaneously communicate with the wireless access point while the first communication device uses the first portion of the wireless channel to communicate with the wireless access point. 5. The method as in claim 2, wherein the wireless channel is initially allocated for use by a second communication device to communicate with the wireless access point at a time of receiving the request; and wherein allocating the less-than-all portion of the wireless channel to the communication device includes: reducing an amount of bandwidth in the wireless channel that is assigned for use by the second communication device to communicate with the wireless access point, the reduced amount of bandwidth being the less-than-all portion of bandwidth reassigned for use by the first communication device. 6. The method as in claim 3 further comprising: in response to detecting completion of the first communication device using the less-than-all portion of the channel to transmit a data payload, reallocating the less-than-all portion of the channel for use by another communication device. 7. The method as in claim 3, wherein allocating the less-than-all portion of the wireless channel to the first communication device further comprises: allocating the less-than-all portion of the wireless channel to the first communication device for a time span, the method further comprising: for a first duration of time overlapping with the time span, allocating a second portion of the wireless channel for use by a second communication device in the network environment to communicate with the wireless access point; and for a second duration of time following the first duration of time and overlapping with the time span, allocating the second portion of the wireless channel for use by a third communication device in the network environment to communicate with the wireless access point. 8. The method as in claim 1, wherein identifying the amount of wireless bandwidth further comprises: identifying a classification type of an application on the first communication device generating the request for allocation of the wireless bandwidth; mapping the classification type to flow service settings associated with the application; and as specified by the flow service settings, transmitting communications over a subdivided portion of the wireless channel allocated for use by the first communication device. 9. The method as in claim 1 further comprising: at the wireless access point, receiving notification that the first communication device is in wireless communication with a second communication device; transmitting the first communications from the wireless access point to the first communication device, the first communications addressed for delivery to the first communication device; and transmitting second communications from the wireless access point to the first communication device, the second communications addressed for delivery to the second communication device, the first communication device forwarding the second communications to the second communication device. 10. The method as in claim 9 further comprising: varying an amount of bandwidth allocated on the wireless communication link to convey the first communications and second communications to the first communication device. 11. The method as in claim 3 further comprising: in response to detecting completion of the first communication device using the less-than-all portion of the channel to transmit a data payload to the wireless access point, reallocating all of the wireless channel for use by another communication device. 12. The method as in claim 1, wherein identifying the amount of wireless bandwidth further comprises: utilizing a network address received from the first communication device to identify a classification type assigned to the first communication device; and utilizing the classification type assigned to the first communication device to identify wireless bandwidth eligibility assigned to the first communication device. 13. The method as in claim 12, wherein identifying the amount of wireless bandwidth further comprises: identifying service level settings associated with an application generating the request for the wireless bandwidth; and wherein a subdivided portion of the wireless channel allocated for use by the first communication device supports conveyance of communications as specified by the service level settings. 14. A method comprising: at a communication management resource managing communications associated with a wireless access point in a wireless network environment: in response to receiving a first bandwidth request from a first communication device and a second bandwidth request from a second communication device for simultaneous use of wireless bandwidth, subdividing an available wireless spectrum to include a first wireless sub-channel and a second wireless sub-channel; allocating the first wireless sub-channel for use by the first communication device; and allocating the second wireless sub-channel for use by the second communication device. 15. The method as in claim 14 further comprising: allocating the first wireless sub-channel to the first communication device and the second wireless sub-channel to the second communication device for use in a given time frame. 16. The method as in claim 14 further comprising: simultaneously receiving first communications over the first sub-channel from the first communication device and second communications over the second sub-channel from the second communication device. 17. The method as in claim 16 further comprising: producing the first sub-channel to support conveyance of data at a substantially lower rate than the second sub-channel. 18. The method as in claim 17 further comprising: sizing the first sub-channel and the second sub-channel based at least in part on network addresses assigned to the first communication device and the second communication device. 19. The method as in claim 14, wherein subdividing the available wireless spectrum further comprises: subdividing a wireless channel of predetermined bandwidth into the first wireless sub-channel and the second wireless sub-channel; and prior to subdividing the wireless channel, allocating the wireless channel for use by a third communication device, the third communication device using the wireless channel prior to the first communication device of the second communication device simultaneously using the first wireless sub-channel and the second wireless sub-channel. 20. The method as in claim 14, wherein the wireless channel is a WiFi™ channel dynamically allocated for use by multiple communication devices in the network environment. 21. A computer system comprising: computer processor hardware; and a hardware storage resource coupled to the computer processor hardware, the hardware storage resource storing instructions that, when executed by the computer processor hardware, causes the computer processor hardware to perform operations of: from a first communication device of multiple communication devices in a network environment, receiving a request for allocation of wireless bandwidth to communicate over a wireless communication link; identifying an amount of wireless bandwidth suitable to satisfy the request for bandwidth from the first communication device; and based on the identified amount of wireless bandwidth, subdividing a wireless channel for use by the first communication device. 22. The computer system as in claim 21, wherein the wireless channel is a predetermined bandwidth available for use by the multiple communication devices in the network environment. 23. The computer system as in claim 21, wherein the computer processor hardware further performs operations of: based on the identified amount of wireless bandwidth, allocating a less-than-all portion of the wireless channel to the first communication device to communicate data over the wireless communication link to the wireless access point. 24. The computer system as in claim 23, wherein the less-than-all portion of the wireless channel is a first portion of the wireless channel, the computer processor hardware further performing operations of: allocating a second portion of the wireless channel for use by a second communication device of the multiple communication devices, the second portion of the wireless channel allocated for use by the second communication device to simultaneously communicate with the wireless access point while the first communication device uses the first portion of the wireless channel to communicate with the wireless access point. 25. The computer system as in claim 22, wherein the wireless channel is initially allocated for use by a second communication device to communicate with the wireless access point at a time of receiving the request; and wherein allocating the less-than-all portion of the wireless channel to the communication device includes: reducing an amount of bandwidth in the wireless channel that is assigned for use by the second communication device to communicate with the wireless access point, the reduced amount of bandwidth being the less-than-all portion of bandwidth reassigned for use by the first communication device. 26. The computer system as in claim 23, wherein the computer processor hardware further performs operations of: in response to detecting completion of the first communication device using the less-than-all portion of the channel to transmit a data payload, reallocating the less-than-all portion of the channel for use by another communication device. 27. The computer system as in claim 23, wherein allocating the less-than-all portion of the wireless channel to the first communication device further comprises: allocating the less-than-all portion of the wireless channel to the first communication device for a time span; wherein the computer processor hardware further performs operations of: for a first duration of time overlapping with the time span, allocating a second portion of the wireless channel for use by a second communication device in the network environment to communicate with the wireless access point; and for a second duration of time following the first duration of time and overlapping with the time span, allocating the second portion of the wireless channel for use by a third communication device in the network environment to communicate with the wireless access point. 28. The computer system as in claim 21, wherein identifying the amount of wireless bandwidth further comprises: identifying a classification type of an application on the first communication device generating the request for allocation of the wireless bandwidth; mapping the classification type to flow service settings associated with the application; and as specified by the flow service settings, transmitting communications over a subdivided portion of the wireless channel allocated for use by the first communication device. 29. The computer system as in claim 21, wherein the computer processor hardware further performs operations of: at the wireless access point, receiving notification that the first communication device is in wireless communication with a second communication device; transmitting the first communications from the wireless access point to the first communication device, the first communications addressed for delivery to the first communication device; and transmitting second communications from the wireless access point to the first communication device, the second communications addressed for delivery to the second communication device, the first communication device forwarding the second communications to the second communication device. 30. The computer system as in claim 29, wherein the computer processor hardware further performs operations of: varying an amount of bandwidth allocated on the wireless communication link to convey the first communications and second communications to the first communication device. 31. The computer system as in claim 23, wherein the computer processor hardware further performs operations of: in response to detecting completion of the first communication device using the less-than-all portion of the channel to transmit a data payload to the wireless access point, reallocating all of the wireless channel for use by another communication device. 32. Computer-readable storage hardware having instructions stored thereon, the instructions, when carried out by computer processor hardware, causes the computer processor hardware to perform operations of: from a first communication device of multiple communication devices, receiving a request for allocation of wireless bandwidth to communicate over a wireless communication link; identifying an amount of wireless bandwidth suitable to satisfy the request for bandwidth from the first communication device; and based on the identified amount of wireless bandwidth, subdividing a wireless channel for use by the first communication device. 33. The method as in claim 1 further comprising: allocating use of subdivided portions of the wireless channel in accordance with space division multiple access techniques to provide spatial isolation amongst the multiple communication devices. 34. The method as in claim 1 further comprising: identifying a classification type associated with the first communication device generating the request for allocation of the wireless bandwidth; identifying security setting information assigned to the identified classification type; and as specified by the identified security setting information, transmitting communications over a subdivided portion of the wireless channel to the first communication device in accordance with security settings as specified by the identified security setting information.
2,400
6,988
6,988
14,400,529
2,434
Methods, systems, and computer program products are provided for protecting data stored on a device based on user input patterns. The device may have one or more types of user interfaces. The user interacts with a user interface of the device according to a pattern. The interaction pattern is monitored, and compared to one or more stored acceptable user interface patterns associated with sensitive data. If the interaction pattern of the user does not match an acceptable user interface pattern, a data protection response assigned to the data is enacted.
1. A system in a computing device to protect data stored by the computing device, comprising: a user input pattern monitor configured to determine whether a detected user interaction pattern with a user interface of the computing device indicates an interaction by an unauthorized user; and a data protection enactor configured to discretely enact a data protection response associated with data when the detected user interaction pattern is determined by the user input pattern monitor to indicate an interaction by an unauthorized user. 2. The system of claim 1, wherein the user input pattern monitor is configured to compare the detected user interaction pattern with an acceptable user interaction pattern to determine whether the detected user interaction pattern indicates an interaction by an unauthorized user. 3. The system of claim 2, further comprising: a user input pattern manager configured to receive detected user interaction patterns with the user interface, and to process the detected user interaction patterns to generate the acceptable user interaction pattern for the user interface. 4. The system of claim 2, wherein the user interface is a keyboard. 5. The system of claim 4, wherein the acceptable user interaction pattern for the keyboard includes at least one of an average typing speed range, an average typing speed for a particular word, or a predetermined typographical error. 6. The system of claim 2, wherein the user interface is a pointing device. 7. The system of claim 6, wherein the acceptable user interaction pattern for the pointing device includes at least one of a movement of a pointer within a determined screen area or an amount of file and/or folder exploration less than a predetermined threshold. 8. The system of claim 2, wherein the user interface is a touch screen. 9. The system of claim 8, wherein the acceptable user interaction pattern for the touch screen includes at least one of an average touch area or an average touch pressure range. 10. The system of claim 1, further comprising: a user interface module that enables a data sensitivity level, the data protection response, and a contextual trigger to be associated with the data. 11. A method in a computing device to protect data stored by the computing device, comprising: determining whether a detected user interaction pattern with a user interface of the computing device indicates an interaction by an unauthorized user; and discretely enacting a data protection response associated with data when the detected user interaction pattern is determined to indicate an interaction by an unauthorized user. 12. The method of claim 11, wherein said determining comprises: comparing the detected user interaction pattern with an acceptable user interaction pattern to determine whether the detected user interaction pattern indicates an interaction by an unauthorized user. 13. The method of claim 12, further comprising: receiving detected user interaction patterns with the user interface; and processing the detected user interaction patterns to generate the acceptable user interaction pattern for the user interface. 14. The method of claim 12, wherein the user interface is a keyboard, and the acceptable user interaction pattern for the keyboard includes at least one of an average typing speed range, an average typing speed for a particular word, or a predetermined typographical error. 15. The method of claim 12, wherein the user interface is a pointing device, and the acceptable user interaction pattern for the pointing device includes at least one of a movement of a pointer within a determined screen area or an amount of file and/or folder exploration less than a predetermined threshold. 16. The method of claim 12, wherein the user interface is a touch screen, and the acceptable user interaction pattern for the touch screen includes at least one of an average touch area or an average touch pressure range. 17. A method in a computing device to protect data stored by the computing device, comprising: enabling data to be selected, and a data sensitivity level, a data protection response, and a contextual trigger to be associated with the data; receiving detected user interaction patterns with a user interface of the computing device; processing the detected user interaction patterns to generate an acceptable user interaction pattern for the user interface; determining whether a detected user interaction pattern with the user interface indicates an interaction by an unauthorized user by comparison with the acceptable user interaction pattern; and discretely enacting the data protection response when the detected user interaction pattern is determined to indicate an interaction by an unauthorized user. 18. The method of claim 12, wherein the user interface is a keyboard, and the acceptable user interaction pattern for the keyboard includes at least one of an average typing speed range, an average typing speed for a particular word, or a predetermined typographical error. 19. The method of claim 12, wherein the user interface is a pointing device, and the acceptable user interaction pattern for the pointing device includes at least one of a movement of a pointer within a determined screen area or an amount of file and/or folder exploration less than a predetermined threshold. 20. The method of claim 12, wherein the user interface is a touch screen, and the acceptable user interaction pattern for the touch screen includes at least one of an average touch area or an average touch pressure range.
Methods, systems, and computer program products are provided for protecting data stored on a device based on user input patterns. The device may have one or more types of user interfaces. The user interacts with a user interface of the device according to a pattern. The interaction pattern is monitored, and compared to one or more stored acceptable user interface patterns associated with sensitive data. If the interaction pattern of the user does not match an acceptable user interface pattern, a data protection response assigned to the data is enacted.1. A system in a computing device to protect data stored by the computing device, comprising: a user input pattern monitor configured to determine whether a detected user interaction pattern with a user interface of the computing device indicates an interaction by an unauthorized user; and a data protection enactor configured to discretely enact a data protection response associated with data when the detected user interaction pattern is determined by the user input pattern monitor to indicate an interaction by an unauthorized user. 2. The system of claim 1, wherein the user input pattern monitor is configured to compare the detected user interaction pattern with an acceptable user interaction pattern to determine whether the detected user interaction pattern indicates an interaction by an unauthorized user. 3. The system of claim 2, further comprising: a user input pattern manager configured to receive detected user interaction patterns with the user interface, and to process the detected user interaction patterns to generate the acceptable user interaction pattern for the user interface. 4. The system of claim 2, wherein the user interface is a keyboard. 5. The system of claim 4, wherein the acceptable user interaction pattern for the keyboard includes at least one of an average typing speed range, an average typing speed for a particular word, or a predetermined typographical error. 6. The system of claim 2, wherein the user interface is a pointing device. 7. The system of claim 6, wherein the acceptable user interaction pattern for the pointing device includes at least one of a movement of a pointer within a determined screen area or an amount of file and/or folder exploration less than a predetermined threshold. 8. The system of claim 2, wherein the user interface is a touch screen. 9. The system of claim 8, wherein the acceptable user interaction pattern for the touch screen includes at least one of an average touch area or an average touch pressure range. 10. The system of claim 1, further comprising: a user interface module that enables a data sensitivity level, the data protection response, and a contextual trigger to be associated with the data. 11. A method in a computing device to protect data stored by the computing device, comprising: determining whether a detected user interaction pattern with a user interface of the computing device indicates an interaction by an unauthorized user; and discretely enacting a data protection response associated with data when the detected user interaction pattern is determined to indicate an interaction by an unauthorized user. 12. The method of claim 11, wherein said determining comprises: comparing the detected user interaction pattern with an acceptable user interaction pattern to determine whether the detected user interaction pattern indicates an interaction by an unauthorized user. 13. The method of claim 12, further comprising: receiving detected user interaction patterns with the user interface; and processing the detected user interaction patterns to generate the acceptable user interaction pattern for the user interface. 14. The method of claim 12, wherein the user interface is a keyboard, and the acceptable user interaction pattern for the keyboard includes at least one of an average typing speed range, an average typing speed for a particular word, or a predetermined typographical error. 15. The method of claim 12, wherein the user interface is a pointing device, and the acceptable user interaction pattern for the pointing device includes at least one of a movement of a pointer within a determined screen area or an amount of file and/or folder exploration less than a predetermined threshold. 16. The method of claim 12, wherein the user interface is a touch screen, and the acceptable user interaction pattern for the touch screen includes at least one of an average touch area or an average touch pressure range. 17. A method in a computing device to protect data stored by the computing device, comprising: enabling data to be selected, and a data sensitivity level, a data protection response, and a contextual trigger to be associated with the data; receiving detected user interaction patterns with a user interface of the computing device; processing the detected user interaction patterns to generate an acceptable user interaction pattern for the user interface; determining whether a detected user interaction pattern with the user interface indicates an interaction by an unauthorized user by comparison with the acceptable user interaction pattern; and discretely enacting the data protection response when the detected user interaction pattern is determined to indicate an interaction by an unauthorized user. 18. The method of claim 12, wherein the user interface is a keyboard, and the acceptable user interaction pattern for the keyboard includes at least one of an average typing speed range, an average typing speed for a particular word, or a predetermined typographical error. 19. The method of claim 12, wherein the user interface is a pointing device, and the acceptable user interaction pattern for the pointing device includes at least one of a movement of a pointer within a determined screen area or an amount of file and/or folder exploration less than a predetermined threshold. 20. The method of claim 12, wherein the user interface is a touch screen, and the acceptable user interaction pattern for the touch screen includes at least one of an average touch area or an average touch pressure range.
2,400
6,989
6,989
14,883,793
2,424
Media content presentation systems and methods are operable to present media content received by a media device, wherein the media device comprises a plurality of tuner systems. An exemplary embodiment tunes the plurality of tuners to receive different broadcasting media content streams each comprising a streaming media content event; communicates the streaming media content events from the receiving tuner to a corresponding tuner buffer of the tuner system; and stores a portion of the streaming media content events into the corresponding tuner buffers. When a user selection is received for presentation of one of the streaming media content events, the selected one of the streaming media content events are presented to a user of the media device.
1. A media device, comprising: a plurality of tuner systems, wherein each tuner system comprises: a tuner configured to receive a media content stream, wherein the media content stream includes at least a selected media content event of interest that the tuner is configured to receive; and a tuner buffer configured to store the selected media content event of interest, wherein the selected media content event of interest includes at least a video portion and an audio portion; a buffer manager configured to manage operation of each of the plurality of tuner systems; and a primary content buffer communicatively coupled to the plurality of tuner systems, wherein the buffer manager controls a selected one of the plurality of tuner systems to output its stored selected media content event of interest to the primary content buffer, wherein the primary content buffer stores the selected media content event of interest received from the selected one of the plurality of tuner systems, and wherein the video portion of the received selected media content event of interest stored in the primary content buffer is communicated from the primary content buffer to a display and is presentable on the display, and wherein the audio portion of the received selected media content event of interest stored in the primary content buffer is communicated from the primary content buffer to one or more speakers and is reproducible by the one or more speakers. 2. The media device of claim 1, wherein the media content stream comprises a plurality of different streaming media content events multiplexed together into the media content stream, and wherein at least one of the tuner systems further comprises: a de-multiplexor that is configured to: receive the media content stream received by the tuner, de-multiplex the media content event of interest from the plurality of different streaming media content events, and output the media content event of interest to an input of the tuner buffer. 3. The media device of claim 1, wherein the media device receives the one or more media content streams, wherein the media content streams each comprise a plurality of different streaming media content events multiplexed together into the media content stream, and wherein each of the tuner systems comprise: a de-multiplexor that is configured to: receive the media content stream received by the associated tuner of the tuner system, de-multiplex the media content event of interest from the plurality of different streaming media content events, and output the media content event of interest to an input of the associated tuner buffer of the tuner system. 4. The media device of claim 1, wherein the tuner buffer of each one of the plurality of tuner systems is a first memory medium, wherein the primary content buffer is a second memory medium that is separate from the first memory mediums of the tuner buffers in each of the plurality of tuner systems. 5. The media device of claim 1, wherein the tuner buffer of each one of the plurality of tuner systems is a portion of a memory medium of the primary content buffer. 6. The media device of claim 1, further comprising: a remote interface configured to receive user instructions from a remote control, wherein a received first user instruction causes the media device to generate an electronic program guide (EPG) that is presented to a user, and wherein a received second user instruction made by the user via the presented EPG specifies the selected media content event of interest that is selected by the buffer manager to be received by one of the plurality of tuner systems. 7. The media device of claim 6, wherein the EPG presents at least one icon that identifies at least one media content event indicated on the EPG, and wherein the icon indicates that the identified media content event is currently being received by one of the plurality of tuner systems. 8. The media device of claim 6, wherein the EPG presents a listing that identifies at least one of a channel or a media content event, wherein the listing indicates that the at least one of a channel or a media content event is currently being received by one of the plurality of tuner systems. 9. A method for presenting media content received by a media device, wherein the media device comprises a plurality of tuner systems that includes at least a first tuner system and a second tuner system, the method comprising: tuning a first tuner of the first tuner system to receive a first broadcasting media content stream comprising a streaming first media content event; communicating the streaming first media content event from the first tuner to a first tuner buffer of the first tuner system; storing a portion of the streaming first media content event into the first tuner buffer of the first tuner system; tuning a second tuner of the second tuner system to receive a second broadcasting stream comprising a streaming second media content event, wherein the streaming second media content event is different from the streaming first media content event; communicating the streaming second media content event from the second tuner to a second tuner buffer of the second tuner system; storing a portion of the streaming second media content event into the second tuner buffer of the second tuner system; and receiving a user selection for presentation of one of the streaming first media content event and the streaming second media content event, wherein the selected one of the streaming first media content event and the streaming second media content event is presented to a user of the media device. 10. The method of claim 9, wherein the media device comprises a primary content buffer, the method further comprising: communicating the portion of the stored streaming first media content event from the first tuner buffer of the first tuner system to the primary content buffer in response to the user selection of the streaming first media content event, wherein the communicated portion of the streaming first media content event is stored in the primary content buffer; communicating the portion of the stored streaming second media content event from the second tuner buffer of the second tuner system to the primary content buffer in response to the user selection of the streaming second media content event, wherein the communicated portion of the streaming second media content event is stored in the primary content buffer; communicating a video portion of the received one of the streaming first media content event and the streaming second media content event that has been stored in the primary content buffer from the primary content buffer to a display; and communicating an audio portion of the received one of the streaming first media content event and the streaming second media content event that has been stored in the primary content buffer from the primary content buffer to one or more speakers. 11. The method of claim 10, wherein storing the portion of the streaming first media content event into the first tuner buffer of the first tuner system comprises storing the portion of the streaming first media content event into a first memory medium of the first tuner buffer, wherein storing the portion of the streaming second media content event into the second tuner buffer of the second tuner system comprises storing the portion of the streaming second media content event into a second memory medium of the second tuner buffer, wherein the primary content buffer comprises a third memory medium, and wherein the first memory medium, the second memory medium and the third memory medium are different memory mediums. 12. The method of claim 9, wherein receiving the user selection for presentation of one of the streaming first media content event and the streaming second media content event comprises: initially receiving a first user selection for presentation of the streaming first media content event, wherein only the stored portion of the streaming first media content event is communicated from the first tuner buffer of the first tuner system to a primary content buffer in response to the user selection of the streaming first media content event; and continuing to receive at the second tuner the second broadcasting stream comprising the streaming second media content event while the streaming first media content event is presented to the user; continuing to communicate the streaming second media content event from the second tuner to the second tuner buffer of the second tuner system while the streaming first media content event is presented to the user; and continuing to store the received portion of the streaming second media content event into the second tuner buffer of the second tuner system while the streaming first media content event is presented to the user. 13. The method of claim 12, wherein after receiving the first user selection for presentation of the streaming first media content event, the method further comprising: receiving a second user selection for presentation of the streaming second media content event, wherein the stored portion of the streaming second media content event is communicated from the second tuner buffer of the second tuner system to the primary content buffer in response to the second user selection of the streaming second media content event; continuing to receive at the first tuner the first broadcasting stream comprising the streaming first media content event while the streaming second media content event is presented to the user; continuing to communicate the streaming first media content event from the first tuner to the first tuner buffer of the first tuner system while the streaming second media content event is presented to the user; and continuing to store the portion of the streaming first media content event into the first tuner buffer of the first tuner system while the streaming second media content event is presented to the user. 14. The method of claim 13, further comprising: generating a pointer with location information that identifies a storage location of a last presented video image frame in the first tuner buffer, wherein the last presented video image frame is the last video image frame of the streaming first media content event that was presented prior to receiving the second user selection; and storing the pointer in a memory of the media device. 15. The method of claim 14, wherein after receiving the second user selection for presentation of the streaming second media content event, the method further comprising: receiving a third user selection that specifies a request to resume presentation of the streaming first media content event, wherein the third user selection is received after the second user selection; retrieving the stored pointer with the location information of the last presented video image frame of the streaming first media content event, wherein the streaming first media content event is communicated from the first tuner buffer of the first tuner system to the primary content buffer based on the retrieved pointer having the stored location information of the last presented video image frame of the streaming first media content event. 16. The method of claim 15, wherein presentation of the streaming first media content event resumes at a presentation time corresponding to the last presented video image frame of the streaming first media content event. 17. The method of claim 15, wherein presentation of the streaming first media content event resumes at a presentation time corresponding to a currently received portion of the streaming first media content event. 18. The method of claim 14, continuing to receive at the second tuner the second broadcasting stream comprising the streaming second media content event while the streaming first media content event is presented to the user; continuing to communicate the streaming second media content event from the second tuner to the second tuner buffer of the second tuner system while the streaming first media content event is presented to the user; and continuing to store the portion of the streaming second media content event into the second tuner buffer of the second tuner system while the streaming first media content event is presented to the user. 19. The method of claim 14, wherein the pointer is a first pointer, and wherein after receiving the second user selection for presentation of the streaming second media content event, the method further comprising: receiving a third user selection that specifies one of a plurality of presentation trick functions that controls presentation of the streaming second media content event; generating a second pointer with the location information that identifies the storage location of a currently presented video image frame of the presenting streaming second media content event; performing the selected one of the plurality of presentation trick functions on the presenting streaming second media content event; updating the location information of the second pointer to identify the storage location of the currently presented video image frame as the selected one of the plurality of presentation trick functions controls the ongoing presentation of the streaming second media content event; receiving a fourth user selection that concludes operation of the selected one of the plurality of presentation trick functions; and storing the second pointer in the memory of the media device, wherein the second pointer indicates the stored location information of the last presented video image frame of the streaming second media content event when the selected one of the plurality of presentation trick functions concludes. 20. The method of claim 9, wherein storing the portion of the streaming first media content event into the first tuner buffer of the first tuner system comprises storing the portion of the streaming first media content event into a first memory medium of the first tuner buffer, wherein storing the portion of the streaming second media content event into the second tuner buffer of the second tuner system comprises storing the portion of the streaming second media content event into a second memory medium of the second tuner buffer, and wherein the first memory medium and the second memory mediums are different memory mediums.
Media content presentation systems and methods are operable to present media content received by a media device, wherein the media device comprises a plurality of tuner systems. An exemplary embodiment tunes the plurality of tuners to receive different broadcasting media content streams each comprising a streaming media content event; communicates the streaming media content events from the receiving tuner to a corresponding tuner buffer of the tuner system; and stores a portion of the streaming media content events into the corresponding tuner buffers. When a user selection is received for presentation of one of the streaming media content events, the selected one of the streaming media content events are presented to a user of the media device.1. A media device, comprising: a plurality of tuner systems, wherein each tuner system comprises: a tuner configured to receive a media content stream, wherein the media content stream includes at least a selected media content event of interest that the tuner is configured to receive; and a tuner buffer configured to store the selected media content event of interest, wherein the selected media content event of interest includes at least a video portion and an audio portion; a buffer manager configured to manage operation of each of the plurality of tuner systems; and a primary content buffer communicatively coupled to the plurality of tuner systems, wherein the buffer manager controls a selected one of the plurality of tuner systems to output its stored selected media content event of interest to the primary content buffer, wherein the primary content buffer stores the selected media content event of interest received from the selected one of the plurality of tuner systems, and wherein the video portion of the received selected media content event of interest stored in the primary content buffer is communicated from the primary content buffer to a display and is presentable on the display, and wherein the audio portion of the received selected media content event of interest stored in the primary content buffer is communicated from the primary content buffer to one or more speakers and is reproducible by the one or more speakers. 2. The media device of claim 1, wherein the media content stream comprises a plurality of different streaming media content events multiplexed together into the media content stream, and wherein at least one of the tuner systems further comprises: a de-multiplexor that is configured to: receive the media content stream received by the tuner, de-multiplex the media content event of interest from the plurality of different streaming media content events, and output the media content event of interest to an input of the tuner buffer. 3. The media device of claim 1, wherein the media device receives the one or more media content streams, wherein the media content streams each comprise a plurality of different streaming media content events multiplexed together into the media content stream, and wherein each of the tuner systems comprise: a de-multiplexor that is configured to: receive the media content stream received by the associated tuner of the tuner system, de-multiplex the media content event of interest from the plurality of different streaming media content events, and output the media content event of interest to an input of the associated tuner buffer of the tuner system. 4. The media device of claim 1, wherein the tuner buffer of each one of the plurality of tuner systems is a first memory medium, wherein the primary content buffer is a second memory medium that is separate from the first memory mediums of the tuner buffers in each of the plurality of tuner systems. 5. The media device of claim 1, wherein the tuner buffer of each one of the plurality of tuner systems is a portion of a memory medium of the primary content buffer. 6. The media device of claim 1, further comprising: a remote interface configured to receive user instructions from a remote control, wherein a received first user instruction causes the media device to generate an electronic program guide (EPG) that is presented to a user, and wherein a received second user instruction made by the user via the presented EPG specifies the selected media content event of interest that is selected by the buffer manager to be received by one of the plurality of tuner systems. 7. The media device of claim 6, wherein the EPG presents at least one icon that identifies at least one media content event indicated on the EPG, and wherein the icon indicates that the identified media content event is currently being received by one of the plurality of tuner systems. 8. The media device of claim 6, wherein the EPG presents a listing that identifies at least one of a channel or a media content event, wherein the listing indicates that the at least one of a channel or a media content event is currently being received by one of the plurality of tuner systems. 9. A method for presenting media content received by a media device, wherein the media device comprises a plurality of tuner systems that includes at least a first tuner system and a second tuner system, the method comprising: tuning a first tuner of the first tuner system to receive a first broadcasting media content stream comprising a streaming first media content event; communicating the streaming first media content event from the first tuner to a first tuner buffer of the first tuner system; storing a portion of the streaming first media content event into the first tuner buffer of the first tuner system; tuning a second tuner of the second tuner system to receive a second broadcasting stream comprising a streaming second media content event, wherein the streaming second media content event is different from the streaming first media content event; communicating the streaming second media content event from the second tuner to a second tuner buffer of the second tuner system; storing a portion of the streaming second media content event into the second tuner buffer of the second tuner system; and receiving a user selection for presentation of one of the streaming first media content event and the streaming second media content event, wherein the selected one of the streaming first media content event and the streaming second media content event is presented to a user of the media device. 10. The method of claim 9, wherein the media device comprises a primary content buffer, the method further comprising: communicating the portion of the stored streaming first media content event from the first tuner buffer of the first tuner system to the primary content buffer in response to the user selection of the streaming first media content event, wherein the communicated portion of the streaming first media content event is stored in the primary content buffer; communicating the portion of the stored streaming second media content event from the second tuner buffer of the second tuner system to the primary content buffer in response to the user selection of the streaming second media content event, wherein the communicated portion of the streaming second media content event is stored in the primary content buffer; communicating a video portion of the received one of the streaming first media content event and the streaming second media content event that has been stored in the primary content buffer from the primary content buffer to a display; and communicating an audio portion of the received one of the streaming first media content event and the streaming second media content event that has been stored in the primary content buffer from the primary content buffer to one or more speakers. 11. The method of claim 10, wherein storing the portion of the streaming first media content event into the first tuner buffer of the first tuner system comprises storing the portion of the streaming first media content event into a first memory medium of the first tuner buffer, wherein storing the portion of the streaming second media content event into the second tuner buffer of the second tuner system comprises storing the portion of the streaming second media content event into a second memory medium of the second tuner buffer, wherein the primary content buffer comprises a third memory medium, and wherein the first memory medium, the second memory medium and the third memory medium are different memory mediums. 12. The method of claim 9, wherein receiving the user selection for presentation of one of the streaming first media content event and the streaming second media content event comprises: initially receiving a first user selection for presentation of the streaming first media content event, wherein only the stored portion of the streaming first media content event is communicated from the first tuner buffer of the first tuner system to a primary content buffer in response to the user selection of the streaming first media content event; and continuing to receive at the second tuner the second broadcasting stream comprising the streaming second media content event while the streaming first media content event is presented to the user; continuing to communicate the streaming second media content event from the second tuner to the second tuner buffer of the second tuner system while the streaming first media content event is presented to the user; and continuing to store the received portion of the streaming second media content event into the second tuner buffer of the second tuner system while the streaming first media content event is presented to the user. 13. The method of claim 12, wherein after receiving the first user selection for presentation of the streaming first media content event, the method further comprising: receiving a second user selection for presentation of the streaming second media content event, wherein the stored portion of the streaming second media content event is communicated from the second tuner buffer of the second tuner system to the primary content buffer in response to the second user selection of the streaming second media content event; continuing to receive at the first tuner the first broadcasting stream comprising the streaming first media content event while the streaming second media content event is presented to the user; continuing to communicate the streaming first media content event from the first tuner to the first tuner buffer of the first tuner system while the streaming second media content event is presented to the user; and continuing to store the portion of the streaming first media content event into the first tuner buffer of the first tuner system while the streaming second media content event is presented to the user. 14. The method of claim 13, further comprising: generating a pointer with location information that identifies a storage location of a last presented video image frame in the first tuner buffer, wherein the last presented video image frame is the last video image frame of the streaming first media content event that was presented prior to receiving the second user selection; and storing the pointer in a memory of the media device. 15. The method of claim 14, wherein after receiving the second user selection for presentation of the streaming second media content event, the method further comprising: receiving a third user selection that specifies a request to resume presentation of the streaming first media content event, wherein the third user selection is received after the second user selection; retrieving the stored pointer with the location information of the last presented video image frame of the streaming first media content event, wherein the streaming first media content event is communicated from the first tuner buffer of the first tuner system to the primary content buffer based on the retrieved pointer having the stored location information of the last presented video image frame of the streaming first media content event. 16. The method of claim 15, wherein presentation of the streaming first media content event resumes at a presentation time corresponding to the last presented video image frame of the streaming first media content event. 17. The method of claim 15, wherein presentation of the streaming first media content event resumes at a presentation time corresponding to a currently received portion of the streaming first media content event. 18. The method of claim 14, continuing to receive at the second tuner the second broadcasting stream comprising the streaming second media content event while the streaming first media content event is presented to the user; continuing to communicate the streaming second media content event from the second tuner to the second tuner buffer of the second tuner system while the streaming first media content event is presented to the user; and continuing to store the portion of the streaming second media content event into the second tuner buffer of the second tuner system while the streaming first media content event is presented to the user. 19. The method of claim 14, wherein the pointer is a first pointer, and wherein after receiving the second user selection for presentation of the streaming second media content event, the method further comprising: receiving a third user selection that specifies one of a plurality of presentation trick functions that controls presentation of the streaming second media content event; generating a second pointer with the location information that identifies the storage location of a currently presented video image frame of the presenting streaming second media content event; performing the selected one of the plurality of presentation trick functions on the presenting streaming second media content event; updating the location information of the second pointer to identify the storage location of the currently presented video image frame as the selected one of the plurality of presentation trick functions controls the ongoing presentation of the streaming second media content event; receiving a fourth user selection that concludes operation of the selected one of the plurality of presentation trick functions; and storing the second pointer in the memory of the media device, wherein the second pointer indicates the stored location information of the last presented video image frame of the streaming second media content event when the selected one of the plurality of presentation trick functions concludes. 20. The method of claim 9, wherein storing the portion of the streaming first media content event into the first tuner buffer of the first tuner system comprises storing the portion of the streaming first media content event into a first memory medium of the first tuner buffer, wherein storing the portion of the streaming second media content event into the second tuner buffer of the second tuner system comprises storing the portion of the streaming second media content event into a second memory medium of the second tuner buffer, and wherein the first memory medium and the second memory mediums are different memory mediums.
2,400
6,990
6,990
13,414,393
2,489
Apparatus and methods are provided to minimize waste and improve quality and production in web processing operations. The apparatus and methods provide defect detection in deposition of acquisition material, which on current machines frequently flips and is difficult to detect when it has flipped causing manufacturers to scrap thousands of products. Using the present invention, defects are able to be detected by discerning a difference in the appearance from side to side with a vision camera, and an acquisition inverter can flip the material to a correct orientation.
1. An apparatus for correcting a misfeed in an incoming web having a first side and a second side, the apparatus comprising: a vision system for inspecting whether an incoming web is properly oriented or improperly oriented, said vision system coupled to a controller; a web guide carrying said incoming web; said vision system communicatively coupled to said web guide; said web guide receiving a signal from said controller to initiate a correction sequence when said vision system detects an improperly oriented condition.
Apparatus and methods are provided to minimize waste and improve quality and production in web processing operations. The apparatus and methods provide defect detection in deposition of acquisition material, which on current machines frequently flips and is difficult to detect when it has flipped causing manufacturers to scrap thousands of products. Using the present invention, defects are able to be detected by discerning a difference in the appearance from side to side with a vision camera, and an acquisition inverter can flip the material to a correct orientation.1. An apparatus for correcting a misfeed in an incoming web having a first side and a second side, the apparatus comprising: a vision system for inspecting whether an incoming web is properly oriented or improperly oriented, said vision system coupled to a controller; a web guide carrying said incoming web; said vision system communicatively coupled to said web guide; said web guide receiving a signal from said controller to initiate a correction sequence when said vision system detects an improperly oriented condition.
2,400
6,991
6,991
15,409,120
2,494
Session-specific information stored to a cookie or other secure token can be selected and/or caused to vary over time, such that older copies will become less useful over time. Such an approach reduces the ability of entities obtaining a copy of the cookie from performing unauthorized tasks on a session. A cookie received with a request can contain a timestamp and an operation count for a session that may need to fall within an acceptable range of the current values in order for the request to be processed. A cookie returned with a response can be set to the correct value or incremented from the previous value based on various factors. The allowable bands can decrease with age of the session, and various parameter values such as a badness factor for a session can be updated continually based on the events for the session.
1. A system, comprising: at least one processor; and memory storing instructions that, when executed by the at least one processor, cause the system to: receive, from a client, a first request seeking access to at least one resource using at least one security credential; authenticate the client based at least in part on the at least one security credential; send the client a session token that includes a first value for a session initiated based in part on the authentication; receive, from the client, a second request along withand the session token; determine a measure of acceptance based at least in part on a comparison of the first value of the session token and a second value that is associated with a reference computer; process the second request based in part on the measure of acceptance; and send, to the client, an updated session token including an updated first value, the updated first value differing from the second value by an amount based at least in part on the measure of acceptance. 2. The system of claim 1, wherein the instructions when executed further cause the system to: receive a third request from the client, the third request including the updated session token; determine an updated measure of acceptance based at least in part on a comparison between a third value associated with the updated session token and a fourth value that is associated with the reference computer; determine that the updated measure of acceptance is below a threshold; determine an operation count associated with the updated session token and a current operation count associated with the session; and increase the updated measure of acceptance by an amount based at least in part on an amount of difference between the operation count and the current operation count. 3. The system of claim 1, wherein multiple clients are capable of submitting requests for the session, and wherein the instructions when executed further cause the system to: determine an age of the session; and determine an inactivity limit for the session based at least in part on the age of the session, wherein the session stays active as long as a request is processed within the inactivity limit, regardless of the age of the session. 4. The system of claim 1, wherein the instructions when executed further cause the system to: store information for up to a determined number of most recently received requests, the information capable of identifying a source of individual one of the most recently received requests; and determine an inactivity limit for a particular request of the most recently received requests, the inactivity limit for the particular request based at least in part upon a number of the most recently received requests corresponding to a source of the particular request. 5. The system of claim 4, wherein the instructions when executed further cause the system to: determine that the number of the most recently received requests corresponding to the source of the particular request is less than a request threshold; and determine a modification of the measure of acceptance based at least in part on a difference between the number of the most recently received requests and the request threshold. 6. The system of claim 1, wherein the client comprises at least one of an application executing in a virtual computing instance, a computing device operating as part of a distributed computing environment, an application programming interface (API), an interface of a network interface layer of a resource provider in a multi-tenant computing environment, an application executing on a mobile computing device, or a web application. 7. The system of claim 1, wherein the measure of acceptance is further based at least in part on a determination of a number of different clients that are submitting requests associated with the session or a determination of accuracy with regard to information associated with the session token received from the client. 8. A computer-implemented method, comprising: receiving, from a client, a first request seeking access to at least one resource using at least one security credential; authenticating the client based at least in part on the at least one security credential; sending the client a session token that includes a first value for a session initiated based in part on the authentication; receiving, from the client, a second request along withand the session token; determining a measure of acceptance based at least in part on a comparison of the first value of the session token and a second value that is associated with a reference computer; processing the second request based in part on the measure of acceptance; and sending, to the client, an updated session token including an updated first value, the updated first value differing from the second value by an amount based at least in part on the measure of acceptance. 9. The computer-implemented method of claim 8, further comprising: receiving a third request from the client, the third request including the updated session token; determining an updated measure of acceptance based at least in part on a comparison between a third value associated with the updated session token and a fourth value that is associated with the reference computer; determining that the updated measure of acceptance is below a threshold; determining an operation count associated with the updated session token and a current operation count associated with the session; and increasing the updated measure of acceptance by an amount based at least in part on an amount of difference between the operation count and the current operation count. 10. The computer-implemented method of claim 8, wherein multiple clients are capable of submitting requests for the session, and further comprising: determining an age of the session; and determining an inactivity limit for the session based at least in part on the age of the session, wherein the session stays active as long as a request is processed within the inactivity limit, regardless of the age of the session. 11. The computer-implemented method of claim of claim 8, further comprising: storing information for up to a determined number of most recently received requests, the information capable of identifying a source of individual one of the most recently received requests; and determining an inactivity limit for a particular request of the most recently received requests, the inactivity limit for the particular request based at least in part upon a number of the most recently received requests corresponding to a source of the particular request. 12. The computer-implemented method of claim 11, further comprising: determining that the number of the most recently received requests corresponding to the source of the particular request is less than a request threshold; and determining a modification of the measure of acceptance based at least in part on a difference between the number of the most recently received requests and the request threshold. 13. The computer-implemented method of claim 8, wherein the client comprises at least one of an application executing in a virtual computing instance, a computing device operating as part of a distributed computing environment, an application programming interface (API), an interface of a network interface layer of a resource provider in a multi-tenant computing environment, an application executing on a mobile computing device, or a web application. 14. The computer-implemented method of claim 8, wherein the measure of acceptance is further based at least in part on a determination of a number of different clients that are submitting requests associated with the session or a determination of accuracy with regard to information associated with the session token received from the client. 15. A non-transitory computer-readable storage medium including instructions that, when executed by at least one processor of a computing device, cause the computing device to: receive, from a client, a first request seeking access to at least one resource using at least one security credential; authenticate the client based at least in part on the at least one security credential; send the client a session token that includes a first value for a session initiated based in part on the authentication; receive, from the client, a second request along withand the session token; determine a measure of acceptance based at least in part on a comparison of the first value of the session token and a second value that is associated with a reference computer; process the second request based in part on the measure of acceptance; and send, to the client, an updated session token including an updated first value, the updated first value differing from the second value by an amount based at least in part on the measure of acceptance. 16. The non-transitory computer-readable storage medium of claim 15, wherein the instructions when executed further cause the computing device to: receive a third request from the client, the third request including the updated session token; determine an updated measure of acceptance based at least in part on a comparison between a third value associated with the updated session token and a fourth value that is associated with the reference computer; determine that the updated measure of acceptance is below a threshold; determine an operation count associated with the updated session token and a current operation count associated with the session; and increase the updated measure of acceptance by an amount based at least in part on an amount of difference between the operation count and the current operation count. 17. The non-transitory computer-readable storage medium of claim 15, wherein the instructions when executed further cause the computing device to: determine an age of the session; and determine an inactivity limit for the session based at least in part on the age of the session, wherein the session stays active as long as a request is processed within the inactivity limit, regardless of the age of the session. 18. The non-transitory computer-readable storage medium of claim 15, wherein the instructions when executed further cause the computing device to: store information for up to a determined number of most recently received requests, the information capable of identifying a source of individual one of the most recently received requests; and determine an inactivity limit for a particular request of the most recently received requests, the inactivity limit for the particular request based at least in part upon a number of the most recently received requests corresponding to a source of the particular request. 19. The non-transitory computer-readable storage medium of claim 18, wherein the instructions when executed further cause the computing device to: determine that the number of the most recently received requests corresponding to the source of the particular request is less than a request threshold; and determine a modification of the measure of acceptance based at least in part on a difference between the number of the most recently received requests and the request threshold. 20. The non-transitory computer-readable storage medium of claim 15, wherein the client comprises at least one of an application executing in a virtual computing instance, a computing device operating as part of a distributed computing environment, an application programming interface (API), an interface of a network interface layer of a resource provider in a multi-tenant computing environment, an application executing on a mobile computing device, or a web application.
Session-specific information stored to a cookie or other secure token can be selected and/or caused to vary over time, such that older copies will become less useful over time. Such an approach reduces the ability of entities obtaining a copy of the cookie from performing unauthorized tasks on a session. A cookie received with a request can contain a timestamp and an operation count for a session that may need to fall within an acceptable range of the current values in order for the request to be processed. A cookie returned with a response can be set to the correct value or incremented from the previous value based on various factors. The allowable bands can decrease with age of the session, and various parameter values such as a badness factor for a session can be updated continually based on the events for the session.1. A system, comprising: at least one processor; and memory storing instructions that, when executed by the at least one processor, cause the system to: receive, from a client, a first request seeking access to at least one resource using at least one security credential; authenticate the client based at least in part on the at least one security credential; send the client a session token that includes a first value for a session initiated based in part on the authentication; receive, from the client, a second request along withand the session token; determine a measure of acceptance based at least in part on a comparison of the first value of the session token and a second value that is associated with a reference computer; process the second request based in part on the measure of acceptance; and send, to the client, an updated session token including an updated first value, the updated first value differing from the second value by an amount based at least in part on the measure of acceptance. 2. The system of claim 1, wherein the instructions when executed further cause the system to: receive a third request from the client, the third request including the updated session token; determine an updated measure of acceptance based at least in part on a comparison between a third value associated with the updated session token and a fourth value that is associated with the reference computer; determine that the updated measure of acceptance is below a threshold; determine an operation count associated with the updated session token and a current operation count associated with the session; and increase the updated measure of acceptance by an amount based at least in part on an amount of difference between the operation count and the current operation count. 3. The system of claim 1, wherein multiple clients are capable of submitting requests for the session, and wherein the instructions when executed further cause the system to: determine an age of the session; and determine an inactivity limit for the session based at least in part on the age of the session, wherein the session stays active as long as a request is processed within the inactivity limit, regardless of the age of the session. 4. The system of claim 1, wherein the instructions when executed further cause the system to: store information for up to a determined number of most recently received requests, the information capable of identifying a source of individual one of the most recently received requests; and determine an inactivity limit for a particular request of the most recently received requests, the inactivity limit for the particular request based at least in part upon a number of the most recently received requests corresponding to a source of the particular request. 5. The system of claim 4, wherein the instructions when executed further cause the system to: determine that the number of the most recently received requests corresponding to the source of the particular request is less than a request threshold; and determine a modification of the measure of acceptance based at least in part on a difference between the number of the most recently received requests and the request threshold. 6. The system of claim 1, wherein the client comprises at least one of an application executing in a virtual computing instance, a computing device operating as part of a distributed computing environment, an application programming interface (API), an interface of a network interface layer of a resource provider in a multi-tenant computing environment, an application executing on a mobile computing device, or a web application. 7. The system of claim 1, wherein the measure of acceptance is further based at least in part on a determination of a number of different clients that are submitting requests associated with the session or a determination of accuracy with regard to information associated with the session token received from the client. 8. A computer-implemented method, comprising: receiving, from a client, a first request seeking access to at least one resource using at least one security credential; authenticating the client based at least in part on the at least one security credential; sending the client a session token that includes a first value for a session initiated based in part on the authentication; receiving, from the client, a second request along withand the session token; determining a measure of acceptance based at least in part on a comparison of the first value of the session token and a second value that is associated with a reference computer; processing the second request based in part on the measure of acceptance; and sending, to the client, an updated session token including an updated first value, the updated first value differing from the second value by an amount based at least in part on the measure of acceptance. 9. The computer-implemented method of claim 8, further comprising: receiving a third request from the client, the third request including the updated session token; determining an updated measure of acceptance based at least in part on a comparison between a third value associated with the updated session token and a fourth value that is associated with the reference computer; determining that the updated measure of acceptance is below a threshold; determining an operation count associated with the updated session token and a current operation count associated with the session; and increasing the updated measure of acceptance by an amount based at least in part on an amount of difference between the operation count and the current operation count. 10. The computer-implemented method of claim 8, wherein multiple clients are capable of submitting requests for the session, and further comprising: determining an age of the session; and determining an inactivity limit for the session based at least in part on the age of the session, wherein the session stays active as long as a request is processed within the inactivity limit, regardless of the age of the session. 11. The computer-implemented method of claim of claim 8, further comprising: storing information for up to a determined number of most recently received requests, the information capable of identifying a source of individual one of the most recently received requests; and determining an inactivity limit for a particular request of the most recently received requests, the inactivity limit for the particular request based at least in part upon a number of the most recently received requests corresponding to a source of the particular request. 12. The computer-implemented method of claim 11, further comprising: determining that the number of the most recently received requests corresponding to the source of the particular request is less than a request threshold; and determining a modification of the measure of acceptance based at least in part on a difference between the number of the most recently received requests and the request threshold. 13. The computer-implemented method of claim 8, wherein the client comprises at least one of an application executing in a virtual computing instance, a computing device operating as part of a distributed computing environment, an application programming interface (API), an interface of a network interface layer of a resource provider in a multi-tenant computing environment, an application executing on a mobile computing device, or a web application. 14. The computer-implemented method of claim 8, wherein the measure of acceptance is further based at least in part on a determination of a number of different clients that are submitting requests associated with the session or a determination of accuracy with regard to information associated with the session token received from the client. 15. A non-transitory computer-readable storage medium including instructions that, when executed by at least one processor of a computing device, cause the computing device to: receive, from a client, a first request seeking access to at least one resource using at least one security credential; authenticate the client based at least in part on the at least one security credential; send the client a session token that includes a first value for a session initiated based in part on the authentication; receive, from the client, a second request along withand the session token; determine a measure of acceptance based at least in part on a comparison of the first value of the session token and a second value that is associated with a reference computer; process the second request based in part on the measure of acceptance; and send, to the client, an updated session token including an updated first value, the updated first value differing from the second value by an amount based at least in part on the measure of acceptance. 16. The non-transitory computer-readable storage medium of claim 15, wherein the instructions when executed further cause the computing device to: receive a third request from the client, the third request including the updated session token; determine an updated measure of acceptance based at least in part on a comparison between a third value associated with the updated session token and a fourth value that is associated with the reference computer; determine that the updated measure of acceptance is below a threshold; determine an operation count associated with the updated session token and a current operation count associated with the session; and increase the updated measure of acceptance by an amount based at least in part on an amount of difference between the operation count and the current operation count. 17. The non-transitory computer-readable storage medium of claim 15, wherein the instructions when executed further cause the computing device to: determine an age of the session; and determine an inactivity limit for the session based at least in part on the age of the session, wherein the session stays active as long as a request is processed within the inactivity limit, regardless of the age of the session. 18. The non-transitory computer-readable storage medium of claim 15, wherein the instructions when executed further cause the computing device to: store information for up to a determined number of most recently received requests, the information capable of identifying a source of individual one of the most recently received requests; and determine an inactivity limit for a particular request of the most recently received requests, the inactivity limit for the particular request based at least in part upon a number of the most recently received requests corresponding to a source of the particular request. 19. The non-transitory computer-readable storage medium of claim 18, wherein the instructions when executed further cause the computing device to: determine that the number of the most recently received requests corresponding to the source of the particular request is less than a request threshold; and determine a modification of the measure of acceptance based at least in part on a difference between the number of the most recently received requests and the request threshold. 20. The non-transitory computer-readable storage medium of claim 15, wherein the client comprises at least one of an application executing in a virtual computing instance, a computing device operating as part of a distributed computing environment, an application programming interface (API), an interface of a network interface layer of a resource provider in a multi-tenant computing environment, an application executing on a mobile computing device, or a web application.
2,400
6,992
6,992
13,831,375
2,457
A system and/or method is provided that includes at least one server computer configured to receive user submissions from remote end users including both a) user created topics, each user created topic having user-selected alphanumeric data of a user-selected length, and b) a corresponding user selected valuation associated with each user-created topic, each user-selected valuation having an alphanumeric value from a set of at least three potential values. The server computer being configured to store user submissions along with associated data, including associated time data, and along with end user data, and being configured to determine an average or mean value of the user-selected valuations for corresponding topics, and being configured to create historical reports, graphs or charts depicting variations in the average or means value of the user-selected valuations for corresponding topics over a time period.
1. A computer system, comprising: a) at least one server computer configured to receive user submissions from remote end users including both a) user-created topics, each said user created topic having user-selected alphanumeric data of a user-selected length, and b) a corresponding user-selected valuation associated with each said user-created topic, each said user-selected valuation having an alphanumeric value from a set of at least three potential alphanumeric values; b) said server computer being configured to store said user submissions along with associated data, including associated time data, and along with end user data; c) said server computer being configured to determine an average or mean value of said user-selected valuations for corresponding topics; d) said server computer being configured to create historical reports, graphs or charts depicting variations in said average or means value of said user-selected valuations for corresponding topics over a time period and to transmit such reports, graphs or charts for the end users. 2. The computer system of claim 1, wherein said at least one server is configured to receive said user submissions as email messages and to identify corresponding portions of said email messages as said user created topics and as said user-selected valuations. 3. The computer system of claim 1, wherein said at least one server is configured to receive said user submissions as text messages and to identify corresponding portions of said text messages as said user created topics and as said user-selected valuations. 4. The computer system of claim 1, wherein said at least one server is configured to receive said user submissions as an input into a form via browser software. 5. The computer system of claim 1, wherein said at least one server is configured to receive said user submissions as Twitter messages and to identify corresponding portions of said Twitter messages as said user created topics and as said user-selected valuations. 6. The computer system of claim 5, wherein said Twitter messages are configured with the format *tg#, wherein # is a variable representing an integer no less than 0 and no greater than 10. 7. The computer system of claim 1, wherein said at least one server is configured to enable users to their respective user submissions to friends via Facebook. 8. The computer system of claim 1, wherein said at least one server is configured to enable a user to enter registration data, including demographic information related to said user. 9. The computer system of claim 8, wherein said computer is configured to create historical reports, graphs or charts depicting correlations of said submissions with respect to said user data. 10. The computer system of claim 1, wherein said at least one server is configured to enable a user to select said time period such as to be able to customize said reports, graphs or charts. 11. A method, comprising: a) having at least one server computer receive user submissions from remote end users including both a) user-created topics, each said user created topic having user-selected alphanumeric data of a user-selected length, and b) a corresponding user-selected valuation associated with each said user-created topic, each said user-selected valuation having an alphanumeric value from a set of at least three potential alphanumeric values; b) having said server computer store said user submissions along with associated data, including associated time data, and along with end user data; c) having said server computer determine an average or mean value of said user-selected valuations for corresponding topics; d) having said server computer create historical reports, graphs or charts depicting variations in said average or means value of said user-selected valuations for corresponding topics over a time period and to transmit such reports, graphs or charts for the end users. 12. The method of claim 11, wherein said at least one server is configured to receive said user submissions as email messages and to identify corresponding portions of said email messages as said user created topics and as said user-selected valuations. 13. The method of claim 11, wherein said at least one server is configured to receive said user submissions as text messages and to identify corresponding portions of said text messages as said user created topics and as said user-selected valuations. 14. The method of claim 11, wherein said at least one server is configured to receive said user submissions as an input into a form via browser software. 15. The method of claim 11, wherein said at least one server is configured to receive said user submissions as Twitter messages and to identify corresponding portions of said Twitter messages as said user created topics and as said user-selected valuations. 16. The method of claim 11, wherein said at least one server is configured to enable users to their respective user submissions to friends via Facebook. 17. The method of claim 11, wherein said at least one server is configured to enable a user to enter registration data, including demographic information related to said user. 18. The method of claim 17, wherein said computer is configured to create historical reports, graphs or charts depicting correlations of said submissions with respect to said user data. 19. The method of claim 11, further including modifying corporate activities based on said historical reports, graphs or charts depicting variations in said average or means value of said user-selected valuations for corresponding topics over a time period. 20. The method of claim 19, further including correlating said historical reports, graphs or charts depicting variations in said average or means value of said user-selected valuations for corresponding topics over a time period with external matters, including news, events, and/or company activities. 21. The method of claim 20, wherein said external matters are entered into the server and the server is configured to automatically correlate such time based external matters within said historical reports, graphs or charts. 22. A computer system, comprising: a) at least one server computer configured to receive user submissions from remote end users including both a) user-created topics, each said user created topic having user-selected alphanumeric data of a user-selected length, and b) a corresponding user-selected valuation associated with each said user-created topic, each said user-selected valuation having an alphanumeric value from a set of at least three potential alphanumeric values; b) said server computer being configured to store in at least one electronic database said user submissions along with associated data, including associated time data, and along with end user data; c) said server computer being configured to receive requests for information regarding submissions from other users, wherein said requests include the following conditions i) identification one or more individual user and/or one or more user group and ii) identification of a time period; d) said server computer being configured to filter the data stored in said at least one electronic database and to create a visual representation of the filtered data and for display to a user that transmitted a corresponding said request. 23. The computer system of claim 22, wherein said requests include identification of a group of users, wherein said group corresponds to a group or sub-group of Facebook friends, Twitter followers and/or other friends associated with a particular a social web site. 24. The computer system of claim 22, wherein said computer is configured to create visual representation of the filtered data having a vertical arrangement with topics of higher like value displayed vertically displaced above or below topics of lower like values. 25. The computer system of claim 24, wherein said computer is configured to create visual representation of the filtered data having a tornado-type vertical arrangement with topics of higher like value displayed vertically displaced above or below topics of lower like values. wherein topics are presented within rotated discs, wherein said discs vary in diameter in accordance with the number of topics at a particular rating value.
A system and/or method is provided that includes at least one server computer configured to receive user submissions from remote end users including both a) user created topics, each user created topic having user-selected alphanumeric data of a user-selected length, and b) a corresponding user selected valuation associated with each user-created topic, each user-selected valuation having an alphanumeric value from a set of at least three potential values. The server computer being configured to store user submissions along with associated data, including associated time data, and along with end user data, and being configured to determine an average or mean value of the user-selected valuations for corresponding topics, and being configured to create historical reports, graphs or charts depicting variations in the average or means value of the user-selected valuations for corresponding topics over a time period.1. A computer system, comprising: a) at least one server computer configured to receive user submissions from remote end users including both a) user-created topics, each said user created topic having user-selected alphanumeric data of a user-selected length, and b) a corresponding user-selected valuation associated with each said user-created topic, each said user-selected valuation having an alphanumeric value from a set of at least three potential alphanumeric values; b) said server computer being configured to store said user submissions along with associated data, including associated time data, and along with end user data; c) said server computer being configured to determine an average or mean value of said user-selected valuations for corresponding topics; d) said server computer being configured to create historical reports, graphs or charts depicting variations in said average or means value of said user-selected valuations for corresponding topics over a time period and to transmit such reports, graphs or charts for the end users. 2. The computer system of claim 1, wherein said at least one server is configured to receive said user submissions as email messages and to identify corresponding portions of said email messages as said user created topics and as said user-selected valuations. 3. The computer system of claim 1, wherein said at least one server is configured to receive said user submissions as text messages and to identify corresponding portions of said text messages as said user created topics and as said user-selected valuations. 4. The computer system of claim 1, wherein said at least one server is configured to receive said user submissions as an input into a form via browser software. 5. The computer system of claim 1, wherein said at least one server is configured to receive said user submissions as Twitter messages and to identify corresponding portions of said Twitter messages as said user created topics and as said user-selected valuations. 6. The computer system of claim 5, wherein said Twitter messages are configured with the format *tg#, wherein # is a variable representing an integer no less than 0 and no greater than 10. 7. The computer system of claim 1, wherein said at least one server is configured to enable users to their respective user submissions to friends via Facebook. 8. The computer system of claim 1, wherein said at least one server is configured to enable a user to enter registration data, including demographic information related to said user. 9. The computer system of claim 8, wherein said computer is configured to create historical reports, graphs or charts depicting correlations of said submissions with respect to said user data. 10. The computer system of claim 1, wherein said at least one server is configured to enable a user to select said time period such as to be able to customize said reports, graphs or charts. 11. A method, comprising: a) having at least one server computer receive user submissions from remote end users including both a) user-created topics, each said user created topic having user-selected alphanumeric data of a user-selected length, and b) a corresponding user-selected valuation associated with each said user-created topic, each said user-selected valuation having an alphanumeric value from a set of at least three potential alphanumeric values; b) having said server computer store said user submissions along with associated data, including associated time data, and along with end user data; c) having said server computer determine an average or mean value of said user-selected valuations for corresponding topics; d) having said server computer create historical reports, graphs or charts depicting variations in said average or means value of said user-selected valuations for corresponding topics over a time period and to transmit such reports, graphs or charts for the end users. 12. The method of claim 11, wherein said at least one server is configured to receive said user submissions as email messages and to identify corresponding portions of said email messages as said user created topics and as said user-selected valuations. 13. The method of claim 11, wherein said at least one server is configured to receive said user submissions as text messages and to identify corresponding portions of said text messages as said user created topics and as said user-selected valuations. 14. The method of claim 11, wherein said at least one server is configured to receive said user submissions as an input into a form via browser software. 15. The method of claim 11, wherein said at least one server is configured to receive said user submissions as Twitter messages and to identify corresponding portions of said Twitter messages as said user created topics and as said user-selected valuations. 16. The method of claim 11, wherein said at least one server is configured to enable users to their respective user submissions to friends via Facebook. 17. The method of claim 11, wherein said at least one server is configured to enable a user to enter registration data, including demographic information related to said user. 18. The method of claim 17, wherein said computer is configured to create historical reports, graphs or charts depicting correlations of said submissions with respect to said user data. 19. The method of claim 11, further including modifying corporate activities based on said historical reports, graphs or charts depicting variations in said average or means value of said user-selected valuations for corresponding topics over a time period. 20. The method of claim 19, further including correlating said historical reports, graphs or charts depicting variations in said average or means value of said user-selected valuations for corresponding topics over a time period with external matters, including news, events, and/or company activities. 21. The method of claim 20, wherein said external matters are entered into the server and the server is configured to automatically correlate such time based external matters within said historical reports, graphs or charts. 22. A computer system, comprising: a) at least one server computer configured to receive user submissions from remote end users including both a) user-created topics, each said user created topic having user-selected alphanumeric data of a user-selected length, and b) a corresponding user-selected valuation associated with each said user-created topic, each said user-selected valuation having an alphanumeric value from a set of at least three potential alphanumeric values; b) said server computer being configured to store in at least one electronic database said user submissions along with associated data, including associated time data, and along with end user data; c) said server computer being configured to receive requests for information regarding submissions from other users, wherein said requests include the following conditions i) identification one or more individual user and/or one or more user group and ii) identification of a time period; d) said server computer being configured to filter the data stored in said at least one electronic database and to create a visual representation of the filtered data and for display to a user that transmitted a corresponding said request. 23. The computer system of claim 22, wherein said requests include identification of a group of users, wherein said group corresponds to a group or sub-group of Facebook friends, Twitter followers and/or other friends associated with a particular a social web site. 24. The computer system of claim 22, wherein said computer is configured to create visual representation of the filtered data having a vertical arrangement with topics of higher like value displayed vertically displaced above or below topics of lower like values. 25. The computer system of claim 24, wherein said computer is configured to create visual representation of the filtered data having a tornado-type vertical arrangement with topics of higher like value displayed vertically displaced above or below topics of lower like values. wherein topics are presented within rotated discs, wherein said discs vary in diameter in accordance with the number of topics at a particular rating value.
2,400
6,993
6,993
14,528,526
2,446
In various implementations, a computer-implemented method for remotely managing settings of applications includes receiving a network communication from a managed device, the received network communication including a client-side hash value. The method further includes identifying settings for an application on the managed device in response to the receiving of the network communication, where the identified settings include configuration instructions for the application. Based on a comparison between the received client-side hash value and a server-side hash value that corresponds to the identified settings, at least some of the identified settings are transmitted to the managed device. The transmitting of the at least some of the identified settings can be based on the comparison indicating a mismatch between the received client-side hash value and the server-side hash value. The method may also include completing processing of the received network communication after the transmitting of the at least some of the identified settings.
1. A computer-implemented method for remotely managing settings of applications, the method comprising: receiving a network communication from a managed device, the received network communication comprising a client-side hash value; identifying settings for an application on the managed device in response to the receiving of the network communication, wherein the identified settings comprise configuration instructions for the application; and based on a comparison between the received client-side hash value and a server-side hash value that corresponds to the identified settings, transmitting at least some of the identified settings to the managed device. 2. The computer-implemented method of claim 1, further comprising generating the server-side hash value prior to the receiving of the network communication. 3. The computer-implemented method of claim 1, wherein the configuration instructions comprise a plurality of key-value pairs. 4. The computer-implemented method of claim 1, wherein the transmitting of the at least some of the identified settings is based on the comparison indicating a mismatch between the received client-side hash value and the server-side hash value. 5. The computer-implemented method of claim 1, wherein the transmitting of the at least some of the identified settings is based on the comparison indicating a match between the received client-side hash value and the server-side hash value. 6. The computer-implemented method of claim 1, further comprising completing processing of the received network communication after the transmitting of the at least some of the identified settings. 7. The computer-implemented method of claim 1, further comprising completing decoding of encoded payload data of the received network communication after the transmitting of the at least some of the identified settings. 8. The computer-implemented method of claim 1, determining to use the server-side hash value in the comparison based on an application identifier in the received network communication. 9. The computer-implemented method of claim 1, wherein the identified settings were modified in response to input from an administrator of the application prior to the receiving of the network communication, and the server-side hash value was generated based on the modification. 10. The computer-implemented method of claim 1, wherein at least some of the configuration instructions correspond to a logging routine of the application. 11. The computer-implemented method of claim 1, wherein one or more settings of the at least some of the identified settings comprise attributes that define whether or not the managed device is to apply the one or more settings to the application. 12. The computer-implemented method of claim 1, further comprising assigning attributes to one or more settings of the at least some of the identified settings, wherein the attributes define whether or not the managed device is to apply the one or more settings to the application. 13. The computer-implemented method of claim 1, wherein one or more settings of the at least some of the identified settings comprise attributes that define that the managed device is not to apply the one or more settings to the application. 14. The computer-implemented method of claim 1, further comprising the managed device sending the network communication as part of a startup routine of the application. 15. The computer-implemented method of claim 1, wherein the at least some of the identified settings includes a setting that disables or enables a routine of the application. 16. The computer-implemented method of claim 1, wherein the at least some of the identified settings includes a setting that changes a routine of the application. 17. The computer-implemented method of claim 1, wherein the at least some of the identified settings includes a setting that changes a level of detail for logging in the application. 18. The computer-implemented method of claim 1, wherein the at least some of the identified settings includes a setting that disables or enables a logging routine of the application. 19. The computer-implemented method of claim 1, wherein the configuration instructions for a setting of the at least some of the identified settings comprises one or more variables for one or more functions of the application. 20. The computer-implemented method of claim 1, further comprising the managed device sending the network communication as part of a routine of a software development kit (SDK). 21. The computer-implemented method of claim 1, wherein the at least some of the identified settings includes a setting that disables or enables at least one paid feature, function, or routine of the application. 22. A system for remotely managing settings of applications, the system comprising: one or more data processors; and one or more computer-readable storage media containing instructions which when executed on the one or more data processors, cause the one or more processors to perform operations including: receiving a network communication from a managed device, the received network communication comprising a client-side hash value; identifying settings for an application on the managed device in response to the receiving of the network communication, wherein the identified settings comprise configuration instructions for the application; and based on a comparison between the received client-side hash value and a server-side hash value that corresponds to the identified settings, transmitting at least some of the identified settings to the managed device. 23. The system of claim 22, further comprising generating the server-side hash value based on the settings. 24. The system of claim 22, wherein the configuration instructions comprise a plurality of key-value pairs. 25. The system of claim 22, wherein the transmitting of the at least some of the identified settings is based on the comparison indicating a mismatch between the received client-side hash value and the server-side hash value. 26. The system of claim 22, further comprising completing processing of the received network communication after the transmitting of the at least some of the identified settings. 27. The system of claim 22, further comprising completing decoding of encoded payload data of the received network communication after the transmitting of the at least some of the identified settings. 28. One or more computer-storage media storing computer-useable instructions that, when executed by a computing device, perform a method for remotely managing settings of applications, the method comprising: receiving a network communication from a managed device, the received network communication comprising a client-side hash value; identifying settings for an application on the managed device in response to the receiving of the network communication, wherein the identified settings comprise configuration instructions for the application; and based on a comparison between the received client-side hash value and a server-side hash value that corresponds to the identified settings, transmitting at least some of the identified settings to the managed device. 29. The one or more computer-storage media of claim 28, further comprising generating the server-side hash value based on the settings. 30. The one or more computer-storage media of claim 28, wherein the configuration instructions comprise a plurality of key-value pairs.
In various implementations, a computer-implemented method for remotely managing settings of applications includes receiving a network communication from a managed device, the received network communication including a client-side hash value. The method further includes identifying settings for an application on the managed device in response to the receiving of the network communication, where the identified settings include configuration instructions for the application. Based on a comparison between the received client-side hash value and a server-side hash value that corresponds to the identified settings, at least some of the identified settings are transmitted to the managed device. The transmitting of the at least some of the identified settings can be based on the comparison indicating a mismatch between the received client-side hash value and the server-side hash value. The method may also include completing processing of the received network communication after the transmitting of the at least some of the identified settings.1. A computer-implemented method for remotely managing settings of applications, the method comprising: receiving a network communication from a managed device, the received network communication comprising a client-side hash value; identifying settings for an application on the managed device in response to the receiving of the network communication, wherein the identified settings comprise configuration instructions for the application; and based on a comparison between the received client-side hash value and a server-side hash value that corresponds to the identified settings, transmitting at least some of the identified settings to the managed device. 2. The computer-implemented method of claim 1, further comprising generating the server-side hash value prior to the receiving of the network communication. 3. The computer-implemented method of claim 1, wherein the configuration instructions comprise a plurality of key-value pairs. 4. The computer-implemented method of claim 1, wherein the transmitting of the at least some of the identified settings is based on the comparison indicating a mismatch between the received client-side hash value and the server-side hash value. 5. The computer-implemented method of claim 1, wherein the transmitting of the at least some of the identified settings is based on the comparison indicating a match between the received client-side hash value and the server-side hash value. 6. The computer-implemented method of claim 1, further comprising completing processing of the received network communication after the transmitting of the at least some of the identified settings. 7. The computer-implemented method of claim 1, further comprising completing decoding of encoded payload data of the received network communication after the transmitting of the at least some of the identified settings. 8. The computer-implemented method of claim 1, determining to use the server-side hash value in the comparison based on an application identifier in the received network communication. 9. The computer-implemented method of claim 1, wherein the identified settings were modified in response to input from an administrator of the application prior to the receiving of the network communication, and the server-side hash value was generated based on the modification. 10. The computer-implemented method of claim 1, wherein at least some of the configuration instructions correspond to a logging routine of the application. 11. The computer-implemented method of claim 1, wherein one or more settings of the at least some of the identified settings comprise attributes that define whether or not the managed device is to apply the one or more settings to the application. 12. The computer-implemented method of claim 1, further comprising assigning attributes to one or more settings of the at least some of the identified settings, wherein the attributes define whether or not the managed device is to apply the one or more settings to the application. 13. The computer-implemented method of claim 1, wherein one or more settings of the at least some of the identified settings comprise attributes that define that the managed device is not to apply the one or more settings to the application. 14. The computer-implemented method of claim 1, further comprising the managed device sending the network communication as part of a startup routine of the application. 15. The computer-implemented method of claim 1, wherein the at least some of the identified settings includes a setting that disables or enables a routine of the application. 16. The computer-implemented method of claim 1, wherein the at least some of the identified settings includes a setting that changes a routine of the application. 17. The computer-implemented method of claim 1, wherein the at least some of the identified settings includes a setting that changes a level of detail for logging in the application. 18. The computer-implemented method of claim 1, wherein the at least some of the identified settings includes a setting that disables or enables a logging routine of the application. 19. The computer-implemented method of claim 1, wherein the configuration instructions for a setting of the at least some of the identified settings comprises one or more variables for one or more functions of the application. 20. The computer-implemented method of claim 1, further comprising the managed device sending the network communication as part of a routine of a software development kit (SDK). 21. The computer-implemented method of claim 1, wherein the at least some of the identified settings includes a setting that disables or enables at least one paid feature, function, or routine of the application. 22. A system for remotely managing settings of applications, the system comprising: one or more data processors; and one or more computer-readable storage media containing instructions which when executed on the one or more data processors, cause the one or more processors to perform operations including: receiving a network communication from a managed device, the received network communication comprising a client-side hash value; identifying settings for an application on the managed device in response to the receiving of the network communication, wherein the identified settings comprise configuration instructions for the application; and based on a comparison between the received client-side hash value and a server-side hash value that corresponds to the identified settings, transmitting at least some of the identified settings to the managed device. 23. The system of claim 22, further comprising generating the server-side hash value based on the settings. 24. The system of claim 22, wherein the configuration instructions comprise a plurality of key-value pairs. 25. The system of claim 22, wherein the transmitting of the at least some of the identified settings is based on the comparison indicating a mismatch between the received client-side hash value and the server-side hash value. 26. The system of claim 22, further comprising completing processing of the received network communication after the transmitting of the at least some of the identified settings. 27. The system of claim 22, further comprising completing decoding of encoded payload data of the received network communication after the transmitting of the at least some of the identified settings. 28. One or more computer-storage media storing computer-useable instructions that, when executed by a computing device, perform a method for remotely managing settings of applications, the method comprising: receiving a network communication from a managed device, the received network communication comprising a client-side hash value; identifying settings for an application on the managed device in response to the receiving of the network communication, wherein the identified settings comprise configuration instructions for the application; and based on a comparison between the received client-side hash value and a server-side hash value that corresponds to the identified settings, transmitting at least some of the identified settings to the managed device. 29. The one or more computer-storage media of claim 28, further comprising generating the server-side hash value based on the settings. 30. The one or more computer-storage media of claim 28, wherein the configuration instructions comprise a plurality of key-value pairs.
2,400
6,994
6,994
13,645,823
2,459
Embodiments disclosed herein provide systems and methods for evaluating performance stress in a multi-modal network notification service. In a particular embodiment, a method provides generating a covering array of test factors corresponding to a plurality of modes and a plurality of test level values for each mode and determining an escalation hierarchy of the covering array comprising a plurality of nodes, wherein each node corresponds to a set of test factors in the covering array. The method further provides performing a notification test run of the set of test factors for each node in the escalation hierarchy to determine performance stress for each set of test factors. The method further provides generating a first factor-level-run table with the notification test runs corresponding to each of n-wise test factors and possible test level values and indicating which of the notification test runs in the factor-level-run table resulted in performance stress.
1. A method of operating a notification test system, comprising: generating a covering array of test factors corresponding to a plurality of modes and a plurality of test level values for each node; determining an escalation hierarchy of the covering array comprising a plurality of nodes, wherein each node corresponds to a set of test factors in the covering array; performing a notification test run of the set of test factors for each node in the escalation hierarchy to determine performance stress for each set of test factors; generating a first factor-level-run table with the notification test runs corresponding to each of n-wise test factors and possible test level values; and indicating which of the notification test runs in the factor-level-run table resulted in performance stress. 2. The method of claim 1, further comprising: generating a second factor-level-run table with a number of notification test runs corresponding to each of the n-wise test factors and possible test level values. 3. The method of claim 1, wherein determining the escalation hierarchy comprises: generating a plurality of escalation hierarchies of the covering array each comprising a plurality of nodes; selecting the escalation hierarchy from the plurality of escalation hierarchies based on a degree of escalation for each escalation hierarchy, wherein the degree of escalation comprises a percentage of possible escalation for each escalation hierarchy. 4. The method of claim 3, wherein selecting the escalation hierarchy from the plurality of escalation hierarchies based on the degree of escalation for each escalation hierarchy comprises: selecting the escalation hierarchy from the plurality of escalation hierarchies that has the highest degree of escalation. 5. The method of claim 1, further comprising: determining a response time value for each node in the escalation hierarchy during the notification test runs; if a response-time value for a higher node is less than a response-time value for a lower node, indicating that the escalation hierarchy is inconsistent for further analysis. 6. The method of claim 1, wherein the performance stress is caused by a notification capacity overload. 7. The method of claim 1, wherein the plurality of modes comprises at least two of audio phone, video conferencing, instant messaging, email, and text messaging. 8. The method of claim 1, further comprising: analyzing the factor-level-run table to determine which of the test factors caused the performance stress. 9. The method of claim 8, wherein analyzing the factor-level-run table comprises: eliminating test factors that have been verified by other test runs as not being test factors that caused the performance stress. 10. A non-transitory computer readable medium having instructions stored thereon for operating a notification test system, wherein the instructions, when executed by the notification test system, direct the notification test system to: generate a covering array of test factors corresponding to a plurality of modes and a plurality of test level values for each node; determine an escalation hierarchy of the covering array comprising a plurality of nodes, wherein each node corresponds to a set of test factors in the covering array; perform a notification test run of the set of test factors for each node in the escalation hierarchy to determine performance stress for each set of test factors; generate a first factor-level-run table with the notification test runs corresponding to each of n-wise test factors and possible test level values; and indicate which of the notification test runs in the factor-level-run table resulted in performance stress. 11. The non-transitory computer readable medium of claim 10, wherein the instructions further direct the notification test system to: generate a second factor-level-run table with a number of notification test runs corresponding to each of the n-wise test factors and possible test level values. 12. The non-transitory computer readable medium of claim 10, wherein the instructions direct the notification test system to determine the escalation hierarchy by: generating a plurality of escalation hierarchies of the covering array each comprising a plurality of nodes; selecting the escalation hierarchy from the plurality of escalation hierarchies based on a degree of escalation for each escalation hierarchy, wherein the degree of escalation comprises a percentage of possible escalation for each escalation hierarchy. 13. The non-transitory computer readable medium of claim 12, wherein the instructions direct the notification test system to select the escalation hierarchy from the plurality of escalation hierarchies based on the degree of escalation for each escalation hierarchy by: selecting the escalation hierarchy from the plurality of escalation hierarchies that has the highest degree of escalation. 14. The non-transitory computer readable medium of claim 10, wherein the instructions further direct the notification test system to: determine a response time value for each node in the escalation hierarchy during the notification test runs; if a response-time value for a higher node is less than a response-time value for a lower node, indicate that the escalation hierarchy is inconsistent for further analysis. 15. The non-transitory computer readable medium of claim 10, wherein the performance stress is caused by a notification capacity overload. 16. The non-transitory computer readable medium of claim 10, wherein the plurality of modes comprises at least two of audio phone, video conferencing, instant messaging, email, and text messaging. 17. The non-transitory computer readable medium of claim 10, wherein the instructions further direct the notification test system to: analyze the factor-level-run table to determine which of the test factors caused the performance stress. 18. The non-transitory computer readable medium of claim 17, wherein the instructions further direct the notification test system to analyze the factor-level-run table by: eliminating test factors that have been verified by other test runs as not being test factors that caused the performance stress. 19. A notification test system, comprising: processing circuitry configured to: generate a covering array of test factors corresponding to a plurality of modes and a plurality of test level values for each node; determine an escalation hierarchy of the covering array comprising a plurality of nodes, wherein each node corresponds to a set of test factors in the covering array; perform a notification test run of the set of test factors for each node in the escalation hierarchy to determine performance stress for each set of test factors; generate a first factor-level-run table with the notification test runs corresponding to each of n-wise test factors and possible test level values; and indicate which of the notification test runs in the factor-level-run table resulted in performance stress. 20. The notification test system of claim 19, wherein the processing circuitry is further configured to: generate a second factor-level-run table with a number of notification test runs corresponding to each of the n-wise test factors and possible test level values.
Embodiments disclosed herein provide systems and methods for evaluating performance stress in a multi-modal network notification service. In a particular embodiment, a method provides generating a covering array of test factors corresponding to a plurality of modes and a plurality of test level values for each mode and determining an escalation hierarchy of the covering array comprising a plurality of nodes, wherein each node corresponds to a set of test factors in the covering array. The method further provides performing a notification test run of the set of test factors for each node in the escalation hierarchy to determine performance stress for each set of test factors. The method further provides generating a first factor-level-run table with the notification test runs corresponding to each of n-wise test factors and possible test level values and indicating which of the notification test runs in the factor-level-run table resulted in performance stress.1. A method of operating a notification test system, comprising: generating a covering array of test factors corresponding to a plurality of modes and a plurality of test level values for each node; determining an escalation hierarchy of the covering array comprising a plurality of nodes, wherein each node corresponds to a set of test factors in the covering array; performing a notification test run of the set of test factors for each node in the escalation hierarchy to determine performance stress for each set of test factors; generating a first factor-level-run table with the notification test runs corresponding to each of n-wise test factors and possible test level values; and indicating which of the notification test runs in the factor-level-run table resulted in performance stress. 2. The method of claim 1, further comprising: generating a second factor-level-run table with a number of notification test runs corresponding to each of the n-wise test factors and possible test level values. 3. The method of claim 1, wherein determining the escalation hierarchy comprises: generating a plurality of escalation hierarchies of the covering array each comprising a plurality of nodes; selecting the escalation hierarchy from the plurality of escalation hierarchies based on a degree of escalation for each escalation hierarchy, wherein the degree of escalation comprises a percentage of possible escalation for each escalation hierarchy. 4. The method of claim 3, wherein selecting the escalation hierarchy from the plurality of escalation hierarchies based on the degree of escalation for each escalation hierarchy comprises: selecting the escalation hierarchy from the plurality of escalation hierarchies that has the highest degree of escalation. 5. The method of claim 1, further comprising: determining a response time value for each node in the escalation hierarchy during the notification test runs; if a response-time value for a higher node is less than a response-time value for a lower node, indicating that the escalation hierarchy is inconsistent for further analysis. 6. The method of claim 1, wherein the performance stress is caused by a notification capacity overload. 7. The method of claim 1, wherein the plurality of modes comprises at least two of audio phone, video conferencing, instant messaging, email, and text messaging. 8. The method of claim 1, further comprising: analyzing the factor-level-run table to determine which of the test factors caused the performance stress. 9. The method of claim 8, wherein analyzing the factor-level-run table comprises: eliminating test factors that have been verified by other test runs as not being test factors that caused the performance stress. 10. A non-transitory computer readable medium having instructions stored thereon for operating a notification test system, wherein the instructions, when executed by the notification test system, direct the notification test system to: generate a covering array of test factors corresponding to a plurality of modes and a plurality of test level values for each node; determine an escalation hierarchy of the covering array comprising a plurality of nodes, wherein each node corresponds to a set of test factors in the covering array; perform a notification test run of the set of test factors for each node in the escalation hierarchy to determine performance stress for each set of test factors; generate a first factor-level-run table with the notification test runs corresponding to each of n-wise test factors and possible test level values; and indicate which of the notification test runs in the factor-level-run table resulted in performance stress. 11. The non-transitory computer readable medium of claim 10, wherein the instructions further direct the notification test system to: generate a second factor-level-run table with a number of notification test runs corresponding to each of the n-wise test factors and possible test level values. 12. The non-transitory computer readable medium of claim 10, wherein the instructions direct the notification test system to determine the escalation hierarchy by: generating a plurality of escalation hierarchies of the covering array each comprising a plurality of nodes; selecting the escalation hierarchy from the plurality of escalation hierarchies based on a degree of escalation for each escalation hierarchy, wherein the degree of escalation comprises a percentage of possible escalation for each escalation hierarchy. 13. The non-transitory computer readable medium of claim 12, wherein the instructions direct the notification test system to select the escalation hierarchy from the plurality of escalation hierarchies based on the degree of escalation for each escalation hierarchy by: selecting the escalation hierarchy from the plurality of escalation hierarchies that has the highest degree of escalation. 14. The non-transitory computer readable medium of claim 10, wherein the instructions further direct the notification test system to: determine a response time value for each node in the escalation hierarchy during the notification test runs; if a response-time value for a higher node is less than a response-time value for a lower node, indicate that the escalation hierarchy is inconsistent for further analysis. 15. The non-transitory computer readable medium of claim 10, wherein the performance stress is caused by a notification capacity overload. 16. The non-transitory computer readable medium of claim 10, wherein the plurality of modes comprises at least two of audio phone, video conferencing, instant messaging, email, and text messaging. 17. The non-transitory computer readable medium of claim 10, wherein the instructions further direct the notification test system to: analyze the factor-level-run table to determine which of the test factors caused the performance stress. 18. The non-transitory computer readable medium of claim 17, wherein the instructions further direct the notification test system to analyze the factor-level-run table by: eliminating test factors that have been verified by other test runs as not being test factors that caused the performance stress. 19. A notification test system, comprising: processing circuitry configured to: generate a covering array of test factors corresponding to a plurality of modes and a plurality of test level values for each node; determine an escalation hierarchy of the covering array comprising a plurality of nodes, wherein each node corresponds to a set of test factors in the covering array; perform a notification test run of the set of test factors for each node in the escalation hierarchy to determine performance stress for each set of test factors; generate a first factor-level-run table with the notification test runs corresponding to each of n-wise test factors and possible test level values; and indicate which of the notification test runs in the factor-level-run table resulted in performance stress. 20. The notification test system of claim 19, wherein the processing circuitry is further configured to: generate a second factor-level-run table with a number of notification test runs corresponding to each of the n-wise test factors and possible test level values.
2,400
6,995
6,995
13,096,880
2,442
An option is presented with an electronic message to automatically upload and permission an attachment to the electronic message. A single click may be received to upload the attachment to a shared location (e.g. network share, online service, and the like). Permissions may be automatically set for the message recipients of the electronic message. For example, a default set of permissions and/or custom permissions may be set for each of the recipients listed on the To:/Cc:/Bcc: lines. A link to the shared location may also be automatically inserted into the electronic message along with or in place of the attachment.
1. A method for uploading an attachment to an electronic message to a shared location, comprising: detecting an attachment within an electronic message; displaying an upload option to upload the attachment to a shared location; and in response to receiving a selection of the upload option, uploading the attachment to the shared location and automatically setting permissions for the uploaded attachment at the shared location. 2. The method of claim 1, further comprising removing the attachment from the electronic message and inserting a link to the uploaded attachment at the shared location. 3. The method of claim 2, wherein automatically setting permissions for the uploaded attachment comprises setting default permissions for each recipient of the electronic message. 4. The method of claim 1, wherein automatically setting permissions for the uploaded attachment comprises receiving a custom permission for at least one of the recipients. 5. The method of claim 1, wherein automatically setting permissions for the uploaded attachment comprises displaying a change option within the electronic message that when selected presents options to change the permissions for the attachment at the shared location. 6. The method of claim 3, further comprising providing a warning when the default permissions are unable to be set. 7. The method of claim 1, further comprising sending the electronic message to the recipients and in response to sending the electronic message uploading the attachment to the shared location. 8. The method of claim 1, further comprising inserting an indication within the electronic message indicating that the attachment is stored at the shared location. 9. The method of claim 7, wherein displaying the upload option comprises displaying a choice of shared network locations when the upload option is selected. 10. A computer-readable storage medium storing computer-executable instructions for uploading an attachment to a shared location, comprising: detecting an attachment within an electronic message that is addressed to recipients; displaying an upload option to upload the attachment to a shared location; in response to receiving a selection of the upload option, uploading the attachment to the shared location and automatically setting permissions for the uploaded attachment at the shared location; and sending the message to the recipients. 11. The computer-readable storage medium of claim 10, further comprising removing the attachment from the electronic message and inserting a link to the uploaded attachment at the shared location. 12. The computer-readable storage medium of claim 10, wherein automatically setting permissions for the uploaded attachment comprises setting default permissions for each of the recipients. 13. The computer-readable storage medium of claim 10, wherein automatically setting permissions for the uploaded attachment comprises receiving a custom permission for at least one of the recipients. 14. The computer-readable storage medium of claim 10, wherein automatically setting permissions for the uploaded attachment comprises displaying a change option within the electronic message that when selected presents options to change the permissions for the attachment at the shared location. 15. The computer-readable storage medium of claim 10, wherein displaying the upload option comprises displaying a choice of shared network locations when the upload option is selected. 16. The computer-readable storage medium of claim 10, wherein automatically setting permissions for the uploaded attachment comprises selecting the permissions based on a type of attachment. 17. A system for uploading an attachment to a shared location, comprising: a network connection that is configured to connect to a network; a processor, memory, and a computer-readable storage medium; an operating environment stored on the computer-readable storage medium and executing on the processor; a messaging application; and an attachment manager operating in conjunction with the messaging application that is configured to perform actions comprising: detecting an attachment within an electronic message that is addressed to recipients; displaying an upload option to upload the attachment to a shared location; in response to receiving a selection of the upload option, uploading the attachment to the shared location and automatically setting permissions for the uploaded attachment at the shared location; and sending the message to the recipients. 18. The system of claim 17, further comprising removing the attachment from the electronic message and inserting a link to the uploaded attachment at the shared location. 19. The system of claim 17, wherein automatically setting permissions for the uploaded attachment comprises displaying a change option within the electronic message that when selected presents options to change the permissions for the attachment at the shared location. 20. The system of claim 17, wherein automatically setting permissions for the uploaded attachment comprises selecting the permissions based on a type of attachment.
An option is presented with an electronic message to automatically upload and permission an attachment to the electronic message. A single click may be received to upload the attachment to a shared location (e.g. network share, online service, and the like). Permissions may be automatically set for the message recipients of the electronic message. For example, a default set of permissions and/or custom permissions may be set for each of the recipients listed on the To:/Cc:/Bcc: lines. A link to the shared location may also be automatically inserted into the electronic message along with or in place of the attachment.1. A method for uploading an attachment to an electronic message to a shared location, comprising: detecting an attachment within an electronic message; displaying an upload option to upload the attachment to a shared location; and in response to receiving a selection of the upload option, uploading the attachment to the shared location and automatically setting permissions for the uploaded attachment at the shared location. 2. The method of claim 1, further comprising removing the attachment from the electronic message and inserting a link to the uploaded attachment at the shared location. 3. The method of claim 2, wherein automatically setting permissions for the uploaded attachment comprises setting default permissions for each recipient of the electronic message. 4. The method of claim 1, wherein automatically setting permissions for the uploaded attachment comprises receiving a custom permission for at least one of the recipients. 5. The method of claim 1, wherein automatically setting permissions for the uploaded attachment comprises displaying a change option within the electronic message that when selected presents options to change the permissions for the attachment at the shared location. 6. The method of claim 3, further comprising providing a warning when the default permissions are unable to be set. 7. The method of claim 1, further comprising sending the electronic message to the recipients and in response to sending the electronic message uploading the attachment to the shared location. 8. The method of claim 1, further comprising inserting an indication within the electronic message indicating that the attachment is stored at the shared location. 9. The method of claim 7, wherein displaying the upload option comprises displaying a choice of shared network locations when the upload option is selected. 10. A computer-readable storage medium storing computer-executable instructions for uploading an attachment to a shared location, comprising: detecting an attachment within an electronic message that is addressed to recipients; displaying an upload option to upload the attachment to a shared location; in response to receiving a selection of the upload option, uploading the attachment to the shared location and automatically setting permissions for the uploaded attachment at the shared location; and sending the message to the recipients. 11. The computer-readable storage medium of claim 10, further comprising removing the attachment from the electronic message and inserting a link to the uploaded attachment at the shared location. 12. The computer-readable storage medium of claim 10, wherein automatically setting permissions for the uploaded attachment comprises setting default permissions for each of the recipients. 13. The computer-readable storage medium of claim 10, wherein automatically setting permissions for the uploaded attachment comprises receiving a custom permission for at least one of the recipients. 14. The computer-readable storage medium of claim 10, wherein automatically setting permissions for the uploaded attachment comprises displaying a change option within the electronic message that when selected presents options to change the permissions for the attachment at the shared location. 15. The computer-readable storage medium of claim 10, wherein displaying the upload option comprises displaying a choice of shared network locations when the upload option is selected. 16. The computer-readable storage medium of claim 10, wherein automatically setting permissions for the uploaded attachment comprises selecting the permissions based on a type of attachment. 17. A system for uploading an attachment to a shared location, comprising: a network connection that is configured to connect to a network; a processor, memory, and a computer-readable storage medium; an operating environment stored on the computer-readable storage medium and executing on the processor; a messaging application; and an attachment manager operating in conjunction with the messaging application that is configured to perform actions comprising: detecting an attachment within an electronic message that is addressed to recipients; displaying an upload option to upload the attachment to a shared location; in response to receiving a selection of the upload option, uploading the attachment to the shared location and automatically setting permissions for the uploaded attachment at the shared location; and sending the message to the recipients. 18. The system of claim 17, further comprising removing the attachment from the electronic message and inserting a link to the uploaded attachment at the shared location. 19. The system of claim 17, wherein automatically setting permissions for the uploaded attachment comprises displaying a change option within the electronic message that when selected presents options to change the permissions for the attachment at the shared location. 20. The system of claim 17, wherein automatically setting permissions for the uploaded attachment comprises selecting the permissions based on a type of attachment.
2,400
6,996
6,996
15,344,977
2,457
A client database manager can cause a memory of a client device on a client side of a network to store a first component, a second component, and a relationship value representing a dependent relationship between the first component and the second component. A client processing module can cause a processor to receive, after the storing, a request to process the first component at the client device. The client database manager can send to the server side of the network a request for an update of at least one of the first component or the second component. The client processing module can cause the processor to process at the client device, before receiving a response to the request for the update from the server side of the network, at least a portion of the first component and at least a portion of the second component based on the relationship value.
1. A computer system including instructions stored on a non-transitory computer-readable storage medium, the computer system comprising: a client database manager configured to cause a memory of a client device on a client side of a network to store a first component, a second component, and a relationship value representing a dependent relationship between the first component and the second component; and a client processing module configured to cause a processor to receive, after the storing, a request to process the first component at the client device, the client database manager configured to send to the server side of the network, in response to the request to process the first component, a request for an update of at least one of the first component or the second component, the client processing module configured to cause the processor to process at the client device, in response to the request to process the first component and before receiving a response to the request for the update from the server side of the network, at least a portion of the first component and at least a portion of the second component based on the relationship value. 2. The computer system of claim 1, wherein the relationship value includes a first relationship value and the dependent relationship includes a first dependent relationship, the client database manager is configured to retrieve, in response to the request to process the first component, a third component based on a second relationship value representing a second dependent relationship between the third component and the first component, the client processing module is configured to cause the processor to process, before receiving the response to the request for the update from the server side of the network, at least a portion of the third component. 3. The computer system of claim 1, wherein the dependent relationship includes a first dependent relationship, the client processing module is configured to cause the processor to process, in response to the request to process the first component, at least a portion of a third component having a dependent relationship with the second component such that the first component, the second component, and the third component are hierachically related. 4. The computer system of claim 1, wherein the dependent relationship includes a first dependent relationship, the client processing module is configured to cause the processor to process, in response to the request to process the first component, at least a portion of a third component having a second dependent relationship with the second component, the client processing module is configured to cause the processor to start processing of the portion of the second component before the client processing module causes the processor to start processing of the portion of the third component when the first dependent relationship has a priority higher than a priority of the second dependent relationship. 5. The computer system of claim 1, wherein: the client database manager is configured to cause the memory of the client device to store a plurality of components, which includes at least the first component and the second component, in a component database of the client device, the client database manager is configured to cause the memory of the client device to store a plurality of relationship values, which includes the relationship value, in a relationship metadata database of the client device, the client database manager is configured to maintain the relationship metadata database of the client device and the component database of the client device so that the relationship metadata database of the client device and the component database of the client device mirror, respectively, a subset of a relationship metadata database on the server side of the network and a subset of a component database on the server side of the network. 6. The computer system of claim 1, wherein the first component includes a first user-interface component and the second component includes a second user-interface component. 7. The computer system of claim 1, wherein the dependent relationship includes a first dependent relationship, the client database manager is configured to identify a second dependent relationship between a third component and at least one of the first component or the second component, the client database manager is configured to send to the server side of the network a request for an update of the third component, the sending of the request for the update of the third component is performed by the client database manager after the sending of the request for the update of the at least one of the first component or the second component when the first dependent relationship has a priority higher than a priority of the second dependent relationship. 8. The computer system of claim 1, wherein the request for the update includes state information representing a state of the dependent relationship between the first component and the second component and an index value that is a pointer to at least one of the first component or the second component. 9. The computer system of claim 1, wherein: the client database manager is configured to receive an updated second component in response to the request for the update, the client processing module is configured to cause, in response to receipt of the updated second component, the processor to terminate processing of the first component and the second component, and cause the processor to process at least a portion of the first component and at least a portion of the updated second component. 10. The computer system of claim 1, wherein the client database manager is configured to send the request for the update in conjunction with the client processing module causing the processor to process the at least the portion of the first component and the at least the portion of the second component. 11. The computer system of claim 1, wherein the client database manager is configured to send the request for the update after the client processing module causes the processor to process the at least the portion of the first component and the at least the portion of the second component. 12. The computer system of claim 1, where the dependent relationship between the first component and the second component is defined such that the second component is triggered for processing only after at least a portion of the first component has been processed. 13. The system of claim 1, wherein: the dependent relationship includes a nested dependent relationship; and the memory of the client device includes a multi-level memory. 14. A non-transitory computer-readable storage medium storing code representing instructions that when executed are configured to cause a processor to perform a process, the code comprising code to: receive a request to process a component at a client device on a client side of a network; send, to a server device on a server side of the network, a request to retrieve the component; receive, in response to the request to retrieve the component, a plurality of relationship values and a plurality of components including the component, each relationship value from the plurality of relationship values representing at least a portion of a dependent relationship between one component from the plurality of components and another component from the plurality of components; and store the plurality of relationship values in a relationship metadata database in a memory of the client device, the relationship metadata database at the client device mirroring at least a portion of a relationship metadata database maintained at the server device. 15. The non-transitory computer-readable storage medium of claim 14, wherein the request to process the component is a first request to process the component, the first request is received at a first time at the client device, the code further comprising code to: access the plurality of relationship values in response to a second request to process the component, the second request being received at the client device at a second time after the first time, the plurality of relationship values representing a set of hierarchical relationships between the component and the remaining components from the plurality of components; send to the server side of the network, in response to the second request to process the component, a request for an update of at least a portion of at least one of the plurality of relationship values or the plurality of components; and trigger, before a response to the request for the update is received, processing of at least a portion of the remaining components from the plurality of components at the client device based on at least a portion of the plurality of relationship values. 16. The non-transitory computer-readable storage medium of claim 14, wherein the request to process the component is a first request to process the component, the code further comprising code to: trigger, starting at a time, processing of the plurality of components at the client device in an order based on the plurality of relationship values after the storing of the plurality of relationship values in the relationship metadata database of the client device; receive, after the time, a second request to process the component at the client device; trigger, in response to the second request to process the component, processing of the plurality of components at the client device in the order based on the plurality of relationship values stored in the relationship metadata database of the client device; send to the server side of the network, in response to the second request to process the component, a request for an update of at least a portion of at least one of the plurality of relationship values or the plurality of components; receive a response to the request for the update; and trigger re-processing of a portion of the plurality of components based on the response. 17. The non-transitory computer-readable storage medium of claim 14, wherein the request to process the component is a first request to process the component, the code further comprising code to: store the plurality of components in the memory of the client device in a component database; trigger, in response to a second request to process the component, processing of the plurality of components at the client device in an order defined based on the plurality of relationship values stored in the relationship metadata database of the client device; and send to the server side of the network, in response to the second request to process the component, a request for an update of at least a portion of at least one of the plurality of relationship values or the plurality of components; receive a response to the request for the update; and modify, at the client device and based on the response, at least one of (1) at least a portion of the plurality of components or (2) at least a portion of the plurality of relationship values. 18. A method including executing instructions recorded on a non-transitory computer-readable storage media using at least one processor, the method comprising: determining a plurality of hierarchical dependencies of a set of subsidiary components with respect to a primary component; defining on a server side of a network a set of relationship values collectively representing the plurality of hierarchical dependencies of the set of subsidiary components with respect to the primary component; receiving from the client side of the network a request for the primary component; and sending to the client side of the network, and in response to the request for the primary component, the primary component, the set of subsidiary components, and the set of relationship values. 19. The method of claim 18, further comprising: receiving, on the server side of the network, an indicator that at least a portion of the plurality of hierarchical dependencies has changed; modifying, on the server side of the network, the set of relationship values in response to the change; and sending, in response to a request for an update from the client side of the network, the modified set of relationship values. 20. The method of claim 18, wherein the determining the plurality of hierarchical dependencies includes iteratively identifying each dependent relationship of each subsidiary component from the set of subsidiary components starting with the primary component.
A client database manager can cause a memory of a client device on a client side of a network to store a first component, a second component, and a relationship value representing a dependent relationship between the first component and the second component. A client processing module can cause a processor to receive, after the storing, a request to process the first component at the client device. The client database manager can send to the server side of the network a request for an update of at least one of the first component or the second component. The client processing module can cause the processor to process at the client device, before receiving a response to the request for the update from the server side of the network, at least a portion of the first component and at least a portion of the second component based on the relationship value.1. A computer system including instructions stored on a non-transitory computer-readable storage medium, the computer system comprising: a client database manager configured to cause a memory of a client device on a client side of a network to store a first component, a second component, and a relationship value representing a dependent relationship between the first component and the second component; and a client processing module configured to cause a processor to receive, after the storing, a request to process the first component at the client device, the client database manager configured to send to the server side of the network, in response to the request to process the first component, a request for an update of at least one of the first component or the second component, the client processing module configured to cause the processor to process at the client device, in response to the request to process the first component and before receiving a response to the request for the update from the server side of the network, at least a portion of the first component and at least a portion of the second component based on the relationship value. 2. The computer system of claim 1, wherein the relationship value includes a first relationship value and the dependent relationship includes a first dependent relationship, the client database manager is configured to retrieve, in response to the request to process the first component, a third component based on a second relationship value representing a second dependent relationship between the third component and the first component, the client processing module is configured to cause the processor to process, before receiving the response to the request for the update from the server side of the network, at least a portion of the third component. 3. The computer system of claim 1, wherein the dependent relationship includes a first dependent relationship, the client processing module is configured to cause the processor to process, in response to the request to process the first component, at least a portion of a third component having a dependent relationship with the second component such that the first component, the second component, and the third component are hierachically related. 4. The computer system of claim 1, wherein the dependent relationship includes a first dependent relationship, the client processing module is configured to cause the processor to process, in response to the request to process the first component, at least a portion of a third component having a second dependent relationship with the second component, the client processing module is configured to cause the processor to start processing of the portion of the second component before the client processing module causes the processor to start processing of the portion of the third component when the first dependent relationship has a priority higher than a priority of the second dependent relationship. 5. The computer system of claim 1, wherein: the client database manager is configured to cause the memory of the client device to store a plurality of components, which includes at least the first component and the second component, in a component database of the client device, the client database manager is configured to cause the memory of the client device to store a plurality of relationship values, which includes the relationship value, in a relationship metadata database of the client device, the client database manager is configured to maintain the relationship metadata database of the client device and the component database of the client device so that the relationship metadata database of the client device and the component database of the client device mirror, respectively, a subset of a relationship metadata database on the server side of the network and a subset of a component database on the server side of the network. 6. The computer system of claim 1, wherein the first component includes a first user-interface component and the second component includes a second user-interface component. 7. The computer system of claim 1, wherein the dependent relationship includes a first dependent relationship, the client database manager is configured to identify a second dependent relationship between a third component and at least one of the first component or the second component, the client database manager is configured to send to the server side of the network a request for an update of the third component, the sending of the request for the update of the third component is performed by the client database manager after the sending of the request for the update of the at least one of the first component or the second component when the first dependent relationship has a priority higher than a priority of the second dependent relationship. 8. The computer system of claim 1, wherein the request for the update includes state information representing a state of the dependent relationship between the first component and the second component and an index value that is a pointer to at least one of the first component or the second component. 9. The computer system of claim 1, wherein: the client database manager is configured to receive an updated second component in response to the request for the update, the client processing module is configured to cause, in response to receipt of the updated second component, the processor to terminate processing of the first component and the second component, and cause the processor to process at least a portion of the first component and at least a portion of the updated second component. 10. The computer system of claim 1, wherein the client database manager is configured to send the request for the update in conjunction with the client processing module causing the processor to process the at least the portion of the first component and the at least the portion of the second component. 11. The computer system of claim 1, wherein the client database manager is configured to send the request for the update after the client processing module causes the processor to process the at least the portion of the first component and the at least the portion of the second component. 12. The computer system of claim 1, where the dependent relationship between the first component and the second component is defined such that the second component is triggered for processing only after at least a portion of the first component has been processed. 13. The system of claim 1, wherein: the dependent relationship includes a nested dependent relationship; and the memory of the client device includes a multi-level memory. 14. A non-transitory computer-readable storage medium storing code representing instructions that when executed are configured to cause a processor to perform a process, the code comprising code to: receive a request to process a component at a client device on a client side of a network; send, to a server device on a server side of the network, a request to retrieve the component; receive, in response to the request to retrieve the component, a plurality of relationship values and a plurality of components including the component, each relationship value from the plurality of relationship values representing at least a portion of a dependent relationship between one component from the plurality of components and another component from the plurality of components; and store the plurality of relationship values in a relationship metadata database in a memory of the client device, the relationship metadata database at the client device mirroring at least a portion of a relationship metadata database maintained at the server device. 15. The non-transitory computer-readable storage medium of claim 14, wherein the request to process the component is a first request to process the component, the first request is received at a first time at the client device, the code further comprising code to: access the plurality of relationship values in response to a second request to process the component, the second request being received at the client device at a second time after the first time, the plurality of relationship values representing a set of hierarchical relationships between the component and the remaining components from the plurality of components; send to the server side of the network, in response to the second request to process the component, a request for an update of at least a portion of at least one of the plurality of relationship values or the plurality of components; and trigger, before a response to the request for the update is received, processing of at least a portion of the remaining components from the plurality of components at the client device based on at least a portion of the plurality of relationship values. 16. The non-transitory computer-readable storage medium of claim 14, wherein the request to process the component is a first request to process the component, the code further comprising code to: trigger, starting at a time, processing of the plurality of components at the client device in an order based on the plurality of relationship values after the storing of the plurality of relationship values in the relationship metadata database of the client device; receive, after the time, a second request to process the component at the client device; trigger, in response to the second request to process the component, processing of the plurality of components at the client device in the order based on the plurality of relationship values stored in the relationship metadata database of the client device; send to the server side of the network, in response to the second request to process the component, a request for an update of at least a portion of at least one of the plurality of relationship values or the plurality of components; receive a response to the request for the update; and trigger re-processing of a portion of the plurality of components based on the response. 17. The non-transitory computer-readable storage medium of claim 14, wherein the request to process the component is a first request to process the component, the code further comprising code to: store the plurality of components in the memory of the client device in a component database; trigger, in response to a second request to process the component, processing of the plurality of components at the client device in an order defined based on the plurality of relationship values stored in the relationship metadata database of the client device; and send to the server side of the network, in response to the second request to process the component, a request for an update of at least a portion of at least one of the plurality of relationship values or the plurality of components; receive a response to the request for the update; and modify, at the client device and based on the response, at least one of (1) at least a portion of the plurality of components or (2) at least a portion of the plurality of relationship values. 18. A method including executing instructions recorded on a non-transitory computer-readable storage media using at least one processor, the method comprising: determining a plurality of hierarchical dependencies of a set of subsidiary components with respect to a primary component; defining on a server side of a network a set of relationship values collectively representing the plurality of hierarchical dependencies of the set of subsidiary components with respect to the primary component; receiving from the client side of the network a request for the primary component; and sending to the client side of the network, and in response to the request for the primary component, the primary component, the set of subsidiary components, and the set of relationship values. 19. The method of claim 18, further comprising: receiving, on the server side of the network, an indicator that at least a portion of the plurality of hierarchical dependencies has changed; modifying, on the server side of the network, the set of relationship values in response to the change; and sending, in response to a request for an update from the client side of the network, the modified set of relationship values. 20. The method of claim 18, wherein the determining the plurality of hierarchical dependencies includes iteratively identifying each dependent relationship of each subsidiary component from the set of subsidiary components starting with the primary component.
2,400
6,997
6,997
14,497,757
2,434
In an example, a classification engine compares two binary objects to determine whether they can be classified as belonging to a common family. As an example application, the classification engine may be used to detect malware objects derived from a common ancestor. To classify the object, the binary is disassembled and the resulting assembly code is normalized. Known “clean” functions, such as compiler-generated library code, are filtered out. Normalized blocks of assembly code may then be characterized, such as by forming N-grams, and checksumming each N-gram. These may be compared to known malware routines.
1. A computing apparatus comprising: a processor; and one or more logic elements comprising a classification engine operable for: disassembling an object under analysis; creating an assembly language listing of the object under analysis; comparing the assembly language listing to a known object, the known object belonging to a family in an object taxonomy; and classifying the object under analysis as belonging to the family in the object taxonomy. 2. The computing apparatus of claim 1, wherein the classification engine is further operable for filtering known clean functions from the assembly language listing. 3. The computing apparatus of claim 1, wherein the classification engine is further operable for: identifying at least one blacklisted function in the assembly language listing; and designating the object under analysis as a blacklisted object. 4. The computing apparatus of claim 1, wherein the classification engine is further operable for creating a call trace of the assembly language listing. 5. The computing apparatus of claim 1, wherein the classification engine is further operable for normalizing instructions of the assembly language listing. 6. The computing apparatus of claim 5, wherein normalizing the assembly language listing comprises: retaining operation codes or mnemonics; and classifying operands. 7. The computing apparatus of claim 6, wherein classifying operands comprises classifying at least some operands as one of register, memory address, and constant. 8. The computing apparatus of claim 5, wherein instructions for the assembly language include semantics for at least some instructions, and wherein normalizing the assembly language listing comprises discarding operands for the at least some instructions including semantics. 9. The computing apparatus of claim 1, wherein the classification engine is further operable for performing N-gram analysis on the assembly language listing. 10. The computing apparatus of claim 9, wherein the classification engine is further operable for generating a hash of each N-gram of the N-gram analysis. 11. The computing apparatus of claim 1, wherein the classification engine is further operable for performing a similarity analysis for the object under analysis and the known object. 12. The computing apparatus of claim 11, wherein the similarity analysis comprises computing a Jaccard index. 13. The computing apparatus of claim 1, wherein the known object is a malware object. 14. One or more computer-readable mediums having stored thereon executable instructions for instructing a processor for providing a classification engine operable for: disassembling an object under analysis; creating an assembly language listing of the object under analysis; comparing the assembly language listing to a known object, the known object belonging to a family in an object taxonomy; and classifying the object under analysis as belonging to the family in the object taxonomy. 15. The one or more computer-readable mediums of claim 14, wherein the classification engine is further operable for filtering known clean functions from the assembly language listing. 16. The one or more computer-readable mediums of claim 14, wherein the classification engine is further operable for: identifying at least one blacklisted function in the assembly language listing; and designating the object under analysis as a blacklisted object. 17. The one or more computer-readable mediums of claim 14, wherein the classification engine is further operable for creating a call trace of the object under analysis. 18. The one or more computer-readable mediums of claim 14, wherein the classification engine is further operable for normalizing instructions of the assembly language listing. 19. The one or more computer-readable mediums of claim 18, wherein normalizing the assembly language listing comprises: retaining operation codes or mnemonics; and classifying at least some operands as one of register, memory address, and constant. 20. The one or more computer-readable mediums of claim 18, wherein instructions for the assembly language include semantics for at least some instructions, and wherein normalizing the assembly language listing comprises discarding operands for the at least some instructions including semantics. 21. The one or more computer-readable mediums of claim 14, wherein the classification engine is further operable for performing N-gram analysis on the assembly language listing and generating a hash of each N-gram of the N-gram analysis. 22. The one or more computer-readable mediums of claim 14, wherein the classification engine is further operable for performing a similarity analysis for the object under analysis and the known object, wherein the similarity analysis comprises computing a Jaccard index. 23. The one or more computer-readable mediums of claim 14, wherein the known object is a malware object. 24. A computer-implemented method of providing a classification engine, comprising: disassembling an object under analysis; creating a call trace of the object under analysis; comparing the call trace to a known object, the known object belonging to a family in an object taxonomy; and generating a multigraph of the object under analysis. 25. The computer-implemented method of claim 24, further comprising: determining that the object under analysis does not match expectations according to the multigraph; and designating the object under analysis as not belonging to the family in the object taxonomy.
In an example, a classification engine compares two binary objects to determine whether they can be classified as belonging to a common family. As an example application, the classification engine may be used to detect malware objects derived from a common ancestor. To classify the object, the binary is disassembled and the resulting assembly code is normalized. Known “clean” functions, such as compiler-generated library code, are filtered out. Normalized blocks of assembly code may then be characterized, such as by forming N-grams, and checksumming each N-gram. These may be compared to known malware routines.1. A computing apparatus comprising: a processor; and one or more logic elements comprising a classification engine operable for: disassembling an object under analysis; creating an assembly language listing of the object under analysis; comparing the assembly language listing to a known object, the known object belonging to a family in an object taxonomy; and classifying the object under analysis as belonging to the family in the object taxonomy. 2. The computing apparatus of claim 1, wherein the classification engine is further operable for filtering known clean functions from the assembly language listing. 3. The computing apparatus of claim 1, wherein the classification engine is further operable for: identifying at least one blacklisted function in the assembly language listing; and designating the object under analysis as a blacklisted object. 4. The computing apparatus of claim 1, wherein the classification engine is further operable for creating a call trace of the assembly language listing. 5. The computing apparatus of claim 1, wherein the classification engine is further operable for normalizing instructions of the assembly language listing. 6. The computing apparatus of claim 5, wherein normalizing the assembly language listing comprises: retaining operation codes or mnemonics; and classifying operands. 7. The computing apparatus of claim 6, wherein classifying operands comprises classifying at least some operands as one of register, memory address, and constant. 8. The computing apparatus of claim 5, wherein instructions for the assembly language include semantics for at least some instructions, and wherein normalizing the assembly language listing comprises discarding operands for the at least some instructions including semantics. 9. The computing apparatus of claim 1, wherein the classification engine is further operable for performing N-gram analysis on the assembly language listing. 10. The computing apparatus of claim 9, wherein the classification engine is further operable for generating a hash of each N-gram of the N-gram analysis. 11. The computing apparatus of claim 1, wherein the classification engine is further operable for performing a similarity analysis for the object under analysis and the known object. 12. The computing apparatus of claim 11, wherein the similarity analysis comprises computing a Jaccard index. 13. The computing apparatus of claim 1, wherein the known object is a malware object. 14. One or more computer-readable mediums having stored thereon executable instructions for instructing a processor for providing a classification engine operable for: disassembling an object under analysis; creating an assembly language listing of the object under analysis; comparing the assembly language listing to a known object, the known object belonging to a family in an object taxonomy; and classifying the object under analysis as belonging to the family in the object taxonomy. 15. The one or more computer-readable mediums of claim 14, wherein the classification engine is further operable for filtering known clean functions from the assembly language listing. 16. The one or more computer-readable mediums of claim 14, wherein the classification engine is further operable for: identifying at least one blacklisted function in the assembly language listing; and designating the object under analysis as a blacklisted object. 17. The one or more computer-readable mediums of claim 14, wherein the classification engine is further operable for creating a call trace of the object under analysis. 18. The one or more computer-readable mediums of claim 14, wherein the classification engine is further operable for normalizing instructions of the assembly language listing. 19. The one or more computer-readable mediums of claim 18, wherein normalizing the assembly language listing comprises: retaining operation codes or mnemonics; and classifying at least some operands as one of register, memory address, and constant. 20. The one or more computer-readable mediums of claim 18, wherein instructions for the assembly language include semantics for at least some instructions, and wherein normalizing the assembly language listing comprises discarding operands for the at least some instructions including semantics. 21. The one or more computer-readable mediums of claim 14, wherein the classification engine is further operable for performing N-gram analysis on the assembly language listing and generating a hash of each N-gram of the N-gram analysis. 22. The one or more computer-readable mediums of claim 14, wherein the classification engine is further operable for performing a similarity analysis for the object under analysis and the known object, wherein the similarity analysis comprises computing a Jaccard index. 23. The one or more computer-readable mediums of claim 14, wherein the known object is a malware object. 24. A computer-implemented method of providing a classification engine, comprising: disassembling an object under analysis; creating a call trace of the object under analysis; comparing the call trace to a known object, the known object belonging to a family in an object taxonomy; and generating a multigraph of the object under analysis. 25. The computer-implemented method of claim 24, further comprising: determining that the object under analysis does not match expectations according to the multigraph; and designating the object under analysis as not belonging to the family in the object taxonomy.
2,400
6,998
6,998
14,684,552
2,457
A social networking system allows a user to create an event in the social networking system while viewing a web page from a third-party website from a domain different than the social networking system. A widget or other social plug-in is included in the web page, and user interaction with the widget communicates information from the web page to the social networking system. An event object is created in the social networking system from the information from the web page. The social networking system may perform various actions to increase user interaction with the created event object, such as identifying additional users to invite the event or identifying users attending the event to other users.
1. A method comprising: receiving a request for a web page at a web server, wherein the web page is within a domain of a third-party website that is different from a domain of a social networking system; providing to a user device a markup language document for the web page, the markup language document including an action button for presentation on the user device, the action button configured for receiving a user input for creating an event object within the domain of the social networking system corresponding to an event; receiving from the user device user input to the action button; and responsive to receiving the user input, providing to the social networking system a description of the event and an identification of a user associated with the user device for generating an event object in the social networking system. 2. The method of claim 1, wherein the user input to the action button identifies a group of social networking system users to invite to the event. 3. The method of claim 2, wherein the user input to the action button causes the generated event object to be provided to the identified group of social networking system users to invite to the event. 4. The method of claim 1, wherein the action button provided to the user device is included in an iframe. 5. The method of claim 1, wherein the event description includes a time and a location corresponding to the event. 6. The method of claim 1, wherein the event description includes at least one of a theme, at least one keyword, and an activity corresponding to the event. 7. A computer program product stored on a non-transitory computer-readable medium that includes instructions that, when loaded into memory, cause a processor to perform a method, the method comprising: receiving a request for a web page at a web server, wherein the web page is within a domain of a third-party website that is different from a domain of a social networking system; providing to a user device a markup language document for the web page, the markup language document including an action button for presentation on the user device, the action button configured for receiving a user input for creating an event object within the domain of the social networking system corresponding to an event; receiving from the user device user input to the action button; and responsive to receiving the user input, providing to the social networking system a description of the event and an identification of a user associated with the user device for generating an event object in the social networking system. 8. The computer program product of claim 7, wherein the user input to the action button identifies a group of social networking system users to invite to the event. 9. The computer program product of claim 8, wherein the user input to the action button causes the generated event object to be provided to the identified group of social networking system users to invite to the event. 10. The computer program product of claim 7, wherein the action button provided to the user device is included in an iframe. 11. The computer program product of claim 7, wherein the event description includes a time and a location corresponding to the event. 12. The computer program product of claim 7, wherein the event description includes at least one of a theme, at least one keyword, and an activity corresponding to the event. 13. A system comprising: a web server configured for: receiving a request for a web page, wherein the web page is within a domain of a third-party website that is different from a domain of a social networking system; providing to a user device a markup language document for the web page, the markup language document including an action button for presentation on the user device, the action button configured for receiving a user input for creating an event object within the domain of the social networking system corresponding to an event; receiving from the user device user input to the action button; and responsive to receiving the user input, providing to the social networking system a description of the event and an identification of a user associated with the user device for generating an event object in the social networking system. 14. The server of claim 13, wherein the user input to the action button identifies a group of social networking system users to invite to the event. 15. The server of claim 14, wherein the user input to the action button causes the generated event object to be provided to the identified group of social networking system users to invite to the event. 16. The server of claim 13, wherein the action button provided to the user device is included in an iframe. 17. The server of claim 13, wherein the event description includes a time and a location corresponding to the event. 18. The server of claim 13, wherein the event description includes at least one of a theme, at least one keyword, and an activity corresponding to the event.
A social networking system allows a user to create an event in the social networking system while viewing a web page from a third-party website from a domain different than the social networking system. A widget or other social plug-in is included in the web page, and user interaction with the widget communicates information from the web page to the social networking system. An event object is created in the social networking system from the information from the web page. The social networking system may perform various actions to increase user interaction with the created event object, such as identifying additional users to invite the event or identifying users attending the event to other users.1. A method comprising: receiving a request for a web page at a web server, wherein the web page is within a domain of a third-party website that is different from a domain of a social networking system; providing to a user device a markup language document for the web page, the markup language document including an action button for presentation on the user device, the action button configured for receiving a user input for creating an event object within the domain of the social networking system corresponding to an event; receiving from the user device user input to the action button; and responsive to receiving the user input, providing to the social networking system a description of the event and an identification of a user associated with the user device for generating an event object in the social networking system. 2. The method of claim 1, wherein the user input to the action button identifies a group of social networking system users to invite to the event. 3. The method of claim 2, wherein the user input to the action button causes the generated event object to be provided to the identified group of social networking system users to invite to the event. 4. The method of claim 1, wherein the action button provided to the user device is included in an iframe. 5. The method of claim 1, wherein the event description includes a time and a location corresponding to the event. 6. The method of claim 1, wherein the event description includes at least one of a theme, at least one keyword, and an activity corresponding to the event. 7. A computer program product stored on a non-transitory computer-readable medium that includes instructions that, when loaded into memory, cause a processor to perform a method, the method comprising: receiving a request for a web page at a web server, wherein the web page is within a domain of a third-party website that is different from a domain of a social networking system; providing to a user device a markup language document for the web page, the markup language document including an action button for presentation on the user device, the action button configured for receiving a user input for creating an event object within the domain of the social networking system corresponding to an event; receiving from the user device user input to the action button; and responsive to receiving the user input, providing to the social networking system a description of the event and an identification of a user associated with the user device for generating an event object in the social networking system. 8. The computer program product of claim 7, wherein the user input to the action button identifies a group of social networking system users to invite to the event. 9. The computer program product of claim 8, wherein the user input to the action button causes the generated event object to be provided to the identified group of social networking system users to invite to the event. 10. The computer program product of claim 7, wherein the action button provided to the user device is included in an iframe. 11. The computer program product of claim 7, wherein the event description includes a time and a location corresponding to the event. 12. The computer program product of claim 7, wherein the event description includes at least one of a theme, at least one keyword, and an activity corresponding to the event. 13. A system comprising: a web server configured for: receiving a request for a web page, wherein the web page is within a domain of a third-party website that is different from a domain of a social networking system; providing to a user device a markup language document for the web page, the markup language document including an action button for presentation on the user device, the action button configured for receiving a user input for creating an event object within the domain of the social networking system corresponding to an event; receiving from the user device user input to the action button; and responsive to receiving the user input, providing to the social networking system a description of the event and an identification of a user associated with the user device for generating an event object in the social networking system. 14. The server of claim 13, wherein the user input to the action button identifies a group of social networking system users to invite to the event. 15. The server of claim 14, wherein the user input to the action button causes the generated event object to be provided to the identified group of social networking system users to invite to the event. 16. The server of claim 13, wherein the action button provided to the user device is included in an iframe. 17. The server of claim 13, wherein the event description includes a time and a location corresponding to the event. 18. The server of claim 13, wherein the event description includes at least one of a theme, at least one keyword, and an activity corresponding to the event.
2,400
6,999
6,999
13,678,522
2,443
A controller of a network control system for configuring several middlebox instances is described. The middlebox instances implement a middlebox in a distributed manner in several hosts. The controller configures a first middlebox instance to obtain status of a set of servers and disseminate the obtained status to a second middlebox instance. The controller configures the second middlebox instance to use the status to select a server from the set of servers.
1. A non-transitory machine readable medium of a controller of a network control system for configuring a plurality of middlebox instances to implement a middlebox in a distributed manner in a plurality of hosts, the non-transitory machine readable medium storing sets of instructions for: configuring a first middlebox instance to (i) obtain status of a set of servers and (ii) disseminate the obtained status to a second middlebox instance; and configuring the second middlebox instance to use the status to select a server from the set of servers. 2. The non-transitory machine readable medium of claim 1, wherein the second middlebox instance does not obtain the status of the set of servers directly from the set of servers. 3. The non-transitory machine readable medium of claim 1, wherein the status includes an amount of workload that each server of the set of servers has. 4. The non-transitory machine readable medium of claim 1, wherein the status includes whether each server of the set of servers is running 5. The non-transitory machine readable medium of claim 1, wherein the first middlebox instance and the second middlebox instance are hosted in separate host machines. 6. A non-transitory machine readable medium of a controller of a network control system for configuring a plurality of middlebox instances to implement a middlebox in a distributed manner in a plurality of hosts, the non-transitory machine readable medium storing sets of instructions for: configuring a first middlebox instance to (i) obtain status of a first set of servers and (ii) disseminate the obtained status to a second middlebox instance; configuring a third middlebox instance to (i) obtain status of a second set of servers and (ii) disseminate the obtained status to the second middlebox instance; and configuring the second middlebox instance to use the status of the first set of servers and the status of the second set of servers to select a server from the first and second sets of servers. 7. The non-transitory machine readable medium of claim 6, wherein the first and second sets of servers are represented by a single virtual network address. 8. The non-transitory machine readable medium of claim 6, wherein the first and second sets of servers collectively provide a service. 9. The non-transitory machine readable medium of claim 6, wherein the first, second, and third middlebox instances are hosted in separate host machines. 10. A non-transitory machine readable medium of a controller of a network control system for configuring a plurality of middlebox instances to implement a middlebox in a distributed manner in a plurality of hosts, the non-transitory machine readable medium storing sets of instructions for: configuring, in a host, a middlebox instance to (i) select a server from a set of servers providing a service and (ii) create a set of flow entries using a network address of the selected server; configuring, in the host, a managed switching element to forward a packet based on the set of flow entries created by the first middlebox instance. 11. The non-transitory machine readable medium of claim 10, wherein the set of instructions for configuring the managed switching element comprises a set of instructions for sending a set of template flow entries to the middlebox instance, wherein the set of instructions for configuring the middlebox instance comprises a set of instructions for using the set of template flow entries to create the set of flow entries. 12. The non-transitory machine readable medium of claim 10, wherein the set of flow entries causes the managed switching element to replace a destination network address of the packet with the network addresses of the selected server. 13. The non-transitory machine readable medium of claim 10, wherein the host is a first host, wherein the managed switching element is the first switching element, wherein the packet is a first packet, wherein the sets of instructions further comprise a set of instructions for configuring, in a second host, a second managed forwarding element to (i) forward a second packet to the first managed switching element without performing a logical L3 processing on the second packet, and (ii) performing the logical L3 processing on a third packet to forward to a third managed switching element. 14. A non-transitory machine readable medium of a first controller of a network control system for configuring a plurality of middlebox instances to implement a middlebox in a distributed manner in a plurality of hosts, the network control system comprising a plurality of controllers, the non-transitory machine readable medium storing sets of instructions for: receiving configuration data for configuring the middlebox instances to select a server from a set of servers into which to forward packets coming to the middlebox instances; identifying a set of other controllers in the network control system that manage the middlebox instances; and directing the identified set of other controllers to send the configuration data to the middlebox instances. 15. The non-transitory machine readable medium of claim 14, wherein the configuration data includes a set of network addresses of the set of servers. 16. The non-transitory machine readable medium of claim 14, wherein the configuration data includes a set of selection rules based on which to select a server from the set of servers. 17. The non-transitory machine readable medium of claim 14, wherein a middlebox instance replaces a destination network address of a packet with a network address of a selected server. 18. The non-transitory machine readable medium of claim 14, wherein the first controller is a logical controller and the identified set of other controllers are physical controllers. 19. The non-transitory machine readable medium of claim 14, wherein the network control system is for generating physical control plane data for managing first and second managed forwarding elements that implement forwarding operations associated with a first logical datapath set, wherein the sets of instructions further comprise a set of instructions for converting logical control plane data for the first logical datapath set to universal physical control plane data. 20. The non-transitory machine readable medium of claim 19, wherein the first controller is a master controller for the first logical datapath set, wherein each of the identified set of other controllers is a master controller for a set of managed forwarding elements that are hosted in the same middlebox instances in which the middlebox instances are hosted.
A controller of a network control system for configuring several middlebox instances is described. The middlebox instances implement a middlebox in a distributed manner in several hosts. The controller configures a first middlebox instance to obtain status of a set of servers and disseminate the obtained status to a second middlebox instance. The controller configures the second middlebox instance to use the status to select a server from the set of servers.1. A non-transitory machine readable medium of a controller of a network control system for configuring a plurality of middlebox instances to implement a middlebox in a distributed manner in a plurality of hosts, the non-transitory machine readable medium storing sets of instructions for: configuring a first middlebox instance to (i) obtain status of a set of servers and (ii) disseminate the obtained status to a second middlebox instance; and configuring the second middlebox instance to use the status to select a server from the set of servers. 2. The non-transitory machine readable medium of claim 1, wherein the second middlebox instance does not obtain the status of the set of servers directly from the set of servers. 3. The non-transitory machine readable medium of claim 1, wherein the status includes an amount of workload that each server of the set of servers has. 4. The non-transitory machine readable medium of claim 1, wherein the status includes whether each server of the set of servers is running 5. The non-transitory machine readable medium of claim 1, wherein the first middlebox instance and the second middlebox instance are hosted in separate host machines. 6. A non-transitory machine readable medium of a controller of a network control system for configuring a plurality of middlebox instances to implement a middlebox in a distributed manner in a plurality of hosts, the non-transitory machine readable medium storing sets of instructions for: configuring a first middlebox instance to (i) obtain status of a first set of servers and (ii) disseminate the obtained status to a second middlebox instance; configuring a third middlebox instance to (i) obtain status of a second set of servers and (ii) disseminate the obtained status to the second middlebox instance; and configuring the second middlebox instance to use the status of the first set of servers and the status of the second set of servers to select a server from the first and second sets of servers. 7. The non-transitory machine readable medium of claim 6, wherein the first and second sets of servers are represented by a single virtual network address. 8. The non-transitory machine readable medium of claim 6, wherein the first and second sets of servers collectively provide a service. 9. The non-transitory machine readable medium of claim 6, wherein the first, second, and third middlebox instances are hosted in separate host machines. 10. A non-transitory machine readable medium of a controller of a network control system for configuring a plurality of middlebox instances to implement a middlebox in a distributed manner in a plurality of hosts, the non-transitory machine readable medium storing sets of instructions for: configuring, in a host, a middlebox instance to (i) select a server from a set of servers providing a service and (ii) create a set of flow entries using a network address of the selected server; configuring, in the host, a managed switching element to forward a packet based on the set of flow entries created by the first middlebox instance. 11. The non-transitory machine readable medium of claim 10, wherein the set of instructions for configuring the managed switching element comprises a set of instructions for sending a set of template flow entries to the middlebox instance, wherein the set of instructions for configuring the middlebox instance comprises a set of instructions for using the set of template flow entries to create the set of flow entries. 12. The non-transitory machine readable medium of claim 10, wherein the set of flow entries causes the managed switching element to replace a destination network address of the packet with the network addresses of the selected server. 13. The non-transitory machine readable medium of claim 10, wherein the host is a first host, wherein the managed switching element is the first switching element, wherein the packet is a first packet, wherein the sets of instructions further comprise a set of instructions for configuring, in a second host, a second managed forwarding element to (i) forward a second packet to the first managed switching element without performing a logical L3 processing on the second packet, and (ii) performing the logical L3 processing on a third packet to forward to a third managed switching element. 14. A non-transitory machine readable medium of a first controller of a network control system for configuring a plurality of middlebox instances to implement a middlebox in a distributed manner in a plurality of hosts, the network control system comprising a plurality of controllers, the non-transitory machine readable medium storing sets of instructions for: receiving configuration data for configuring the middlebox instances to select a server from a set of servers into which to forward packets coming to the middlebox instances; identifying a set of other controllers in the network control system that manage the middlebox instances; and directing the identified set of other controllers to send the configuration data to the middlebox instances. 15. The non-transitory machine readable medium of claim 14, wherein the configuration data includes a set of network addresses of the set of servers. 16. The non-transitory machine readable medium of claim 14, wherein the configuration data includes a set of selection rules based on which to select a server from the set of servers. 17. The non-transitory machine readable medium of claim 14, wherein a middlebox instance replaces a destination network address of a packet with a network address of a selected server. 18. The non-transitory machine readable medium of claim 14, wherein the first controller is a logical controller and the identified set of other controllers are physical controllers. 19. The non-transitory machine readable medium of claim 14, wherein the network control system is for generating physical control plane data for managing first and second managed forwarding elements that implement forwarding operations associated with a first logical datapath set, wherein the sets of instructions further comprise a set of instructions for converting logical control plane data for the first logical datapath set to universal physical control plane data. 20. The non-transitory machine readable medium of claim 19, wherein the first controller is a master controller for the first logical datapath set, wherein each of the identified set of other controllers is a master controller for a set of managed forwarding elements that are hosted in the same middlebox instances in which the middlebox instances are hosted.
2,400