Unnamed: 0
int64
0
350k
level_0
int64
0
351k
ApplicationNumber
int64
9.75M
96.1M
ArtUnit
int64
1.6k
3.99k
Abstract
stringlengths
1
8.37k
Claims
stringlengths
3
292k
abstract-claims
stringlengths
68
293k
TechCenter
int64
1.6k
3.9k
7,000
7,000
14,673,705
2,431
A system and approach for providing software device or secure digital (SD) cards for computing devices. An SD card may be programmed with a unique card identification register (CID) value during a manufacture of the card. The CID value cannot necessarily be changed by a card host such as a computing device. A securely signed license may be generated with the CID value (or a hash of the CID value) as part of the license's plaintext. The license may be stored on the card with the CID value. The card may be installed in virtually any computing device that supports the card. The card may be easily removed from the computing device and installed in another computing device or be placed in a storage mechanism. The license may be treated as portable like the card.
1. A card system comprising: a secure digital (SD) card having a unique card identification register value that is programmed into the SD card during a manufacturing of the secure digital card; and a license stored on the SD card with the card identification register value; and wherein: the license is generated using the card identification register value, or a hash of the card identification register value, as part of a plaintext of the license in a secure signing process; the license is a secure software license; and unique is one or less than one out of one hundred. 2. The system of claim 1, wherein the SD card is removable from one computing device and installable in another computing device provided that the SD card is supported by the computing device. 3. The system of claim 1, wherein the card identification register value is virtually unchangeable by a computing device that is a host for the SD card. 4. The system of claim 3, wherein the license is portable from one computing device to another computing device. 5. A method for providing a card, comprising: manufacturing a card; generating a unique card identification register value; programming the card identification register value in the card; and generating a license in the card using the card identification register value, or a hash of the card identification register value, as part of a plaintext of the license in a secure signing process on the card; and wherein: the license is generated using the card having the card identification register value; and unique is one or less than one out of one hundred. 6. The method of claim 5, further comprising storing the license on the card using the card identification register value. 7. The method of claim 5, wherein the card is removable from one computing device and insertable in another computing device. 8. The method of claim 7, wherein the license is portable from one computing device to another computing device. 9. The method of claim 5, wherein the card identification register value that is programmed in the card during the manufacture of the card is unchangeable by a computing device that acts as a host for the card. 10. The method of claim 5, wherein the card is installable on any computing device that provides card support. 11. The method of claim 5, wherein the license is a securely signed license. 12. The method of claim 5, wherein the license is a software license. 13. The method of claim 5, wherein the card is a secure digital or software device card. 14. A card mechanism comprising: a card having a card identification register value programmed in the card during a manufacture of the card; and wherein: the card identification register value is unique; and a license is generated using the card identification register value, or a hash of the card identification register value, as part of a plaintext of the license in a secure signing process of the license on the card. 15. The mechanism of claim 14, wherein the card is a software device or secure digital (SD) card. 16. The mechanism of claim 14, wherein unique is one or less than one out of one hundred. 17. The mechanism of claim 14, wherein the card identification register value that is programmed in the card during the manufacture of the card is unchangeable by a computing device that acts as a host for the card. 18. The mechanism of claim 14, wherein the card is installable on virtually any computing device that provides support for the card. 19. The mechanism of claim 14, wherein the license is stored on the card with the card identification register value. 20. The mechanism of claim 14, wherein the license is a software license. 21. The mechanism of claim 14, wherein the license is a securely signed license. 22. The mechanism of claim 15, wherein the card is removable from one computing device and insertable in another computing device. 23. The mechanism of claim 21, wherein the license is portable from one computing device to the other computing device.
A system and approach for providing software device or secure digital (SD) cards for computing devices. An SD card may be programmed with a unique card identification register (CID) value during a manufacture of the card. The CID value cannot necessarily be changed by a card host such as a computing device. A securely signed license may be generated with the CID value (or a hash of the CID value) as part of the license's plaintext. The license may be stored on the card with the CID value. The card may be installed in virtually any computing device that supports the card. The card may be easily removed from the computing device and installed in another computing device or be placed in a storage mechanism. The license may be treated as portable like the card.1. A card system comprising: a secure digital (SD) card having a unique card identification register value that is programmed into the SD card during a manufacturing of the secure digital card; and a license stored on the SD card with the card identification register value; and wherein: the license is generated using the card identification register value, or a hash of the card identification register value, as part of a plaintext of the license in a secure signing process; the license is a secure software license; and unique is one or less than one out of one hundred. 2. The system of claim 1, wherein the SD card is removable from one computing device and installable in another computing device provided that the SD card is supported by the computing device. 3. The system of claim 1, wherein the card identification register value is virtually unchangeable by a computing device that is a host for the SD card. 4. The system of claim 3, wherein the license is portable from one computing device to another computing device. 5. A method for providing a card, comprising: manufacturing a card; generating a unique card identification register value; programming the card identification register value in the card; and generating a license in the card using the card identification register value, or a hash of the card identification register value, as part of a plaintext of the license in a secure signing process on the card; and wherein: the license is generated using the card having the card identification register value; and unique is one or less than one out of one hundred. 6. The method of claim 5, further comprising storing the license on the card using the card identification register value. 7. The method of claim 5, wherein the card is removable from one computing device and insertable in another computing device. 8. The method of claim 7, wherein the license is portable from one computing device to another computing device. 9. The method of claim 5, wherein the card identification register value that is programmed in the card during the manufacture of the card is unchangeable by a computing device that acts as a host for the card. 10. The method of claim 5, wherein the card is installable on any computing device that provides card support. 11. The method of claim 5, wherein the license is a securely signed license. 12. The method of claim 5, wherein the license is a software license. 13. The method of claim 5, wherein the card is a secure digital or software device card. 14. A card mechanism comprising: a card having a card identification register value programmed in the card during a manufacture of the card; and wherein: the card identification register value is unique; and a license is generated using the card identification register value, or a hash of the card identification register value, as part of a plaintext of the license in a secure signing process of the license on the card. 15. The mechanism of claim 14, wherein the card is a software device or secure digital (SD) card. 16. The mechanism of claim 14, wherein unique is one or less than one out of one hundred. 17. The mechanism of claim 14, wherein the card identification register value that is programmed in the card during the manufacture of the card is unchangeable by a computing device that acts as a host for the card. 18. The mechanism of claim 14, wherein the card is installable on virtually any computing device that provides support for the card. 19. The mechanism of claim 14, wherein the license is stored on the card with the card identification register value. 20. The mechanism of claim 14, wherein the license is a software license. 21. The mechanism of claim 14, wherein the license is a securely signed license. 22. The mechanism of claim 15, wherein the card is removable from one computing device and insertable in another computing device. 23. The mechanism of claim 21, wherein the license is portable from one computing device to the other computing device.
2,400
7,001
7,001
14,597,116
2,468
Certain aspects of the present disclosure generally relate to methods and apparatus for performing channel usage indication in a wireless communication environment. A transmitting apparatus may be configured to determine a residual length of an ongoing transmission burst including a plurality of segments. The transmitting apparatus may transmit, in at least one segment of the transmission burst, control information indicating the residual length of the ongoing transmission burst. A receiving apparatus may be configured to monitor a segment of the ongoing transmission burst, and to determine the residual length of the transmission burst, based on control information transmitted in the monitored segment.
1. A method for wireless communication by an apparatus, comprising: monitoring a segment of an ongoing transmission burst comprising a plurality of segments; and determining a residual length of the ongoing transmission burst, based on control information transmitted in the monitored segment. 2. The method of claim 1, wherein the control information transmitted in the monitored segment indicates the residual length as a number of segments remaining in the transmission burst. 3. The method of claim 1, wherein: the control information is transmitted periodically but not in each segment; and monitoring the segment comprises monitoring a segment in which the control information is transmitted. 4. The method of claim 1, wherein a segment comprises a minimum time-unit over which a waveform of the transmission burst is transmitted. 5. The method of claim 1, further comprising: power down one or more radio components during the residual length of the transmission burst. 6. The method of claim 1, further comprising: communicating at a reduced spectral efficiency, relative to a spectral efficiency of communications between transmission bursts, during the residual length of the transmission burst. 7. The method of claim 1, wherein the control information included in the monitored segment comprises a counter indicating the remaining number of segments of the interfering transmission burst, the counter decremented each successive segment of a transmission burst. 8. The method of claim 1, comprising: monitoring only one segment in a transmission burst; and powering down one or more radio components for remaining segments of the transmission burst. 9. The method of claim 1, further comprising: monitoring a last segment of the transmission burst; and determining a duration between transmission bursts, based on control information included in the last segment. 10. The method of claim 9, wherein the control information included in the last segment indicates the duration between transmission bursts as a number of segments between transmission bursts. 11. The method of claim 9, further comprising: communicating at an increased spectral efficiency, relative to a spectral efficiency of communications during transmission bursts, during one or more of the segments between transmission bursts. 12. The method of claim 1, further comprising: determining a priority of the ongoing transmission burst, based on control information transmitted in the monitored segment. 13. An apparatus for wireless communication, comprising: means for monitoring a segment of an ongoing transmission burst comprising a plurality of segments; and means for determining a residual length of the ongoing transmission burst, based on control information transmitted in the monitored segment 14. A computer-readable medium comprising code executable by one or more processors for: monitoring a segment of an ongoing transmission burst comprising a plurality of segments; and determining a residual length of the ongoing transmission burst, based on control information transmitted in the monitored segment. 15. A method for wireless communication by an apparatus, comprising: determining a residual length of an ongoing transmission burst comprising a plurality of segments; and transmitting, in at least one segment of the transmission burst, control information indicating the residual length of the ongoing transmission burst. 16. The method of claim 15, wherein the control information transmitted in the at least one segment indicates the residual length of the transmission burst as a number of segments remaining in the transmission burst. 17. The method of claim 15, wherein: the control information is transmitted periodically, but not in each segment. 18. The method of claim 15, wherein a segment comprises a minimum time-unit over which a waveform of the transmission burst is transmitted. 19. The method of claim 15, wherein control information indicating the residual length of the transmission burst is transmitted in each segment of the transmission burst. 20. The method of claim 19, wherein the control information indicating the residual length of the transmission burst comprises a counter indicating the remaining number of segments of the interfering transmission burst, the counter decremented each successive segment of the transmission burst. 21. The method of claim 15, further comprising: determining a duration between transmission bursts; and transmitting, in a last segment of the transmission burst, control information indicating the duration before a start of a next transmission burst. 22. The method of claim 21, wherein the control information transmitted in the last segment indicates the duration before the start of the next transmission burst as a number of segments between transmission bursts. 23. The method of claim 15, further comprising: transmitting, in the at least one segment of the ongoing transmission burst, a priority of the ongoing transmission burst. 24. An apparatus for wireless communication, comprising: means for determining a residual length of an ongoing transmission burst comprising a plurality of segments; and means for transmitting, in at least one segment of the transmission burst, control information indicating the residual length of the ongoing transmission burst. 25. A computer-readable medium for wireless communication comprising code executable by one or more processors for: determining a residual length of an ongoing transmission burst comprising a plurality of segments; and transmitting, in at least one segment of the transmission burst, control information indicating the residual length of the ongoing transmission burst.
Certain aspects of the present disclosure generally relate to methods and apparatus for performing channel usage indication in a wireless communication environment. A transmitting apparatus may be configured to determine a residual length of an ongoing transmission burst including a plurality of segments. The transmitting apparatus may transmit, in at least one segment of the transmission burst, control information indicating the residual length of the ongoing transmission burst. A receiving apparatus may be configured to monitor a segment of the ongoing transmission burst, and to determine the residual length of the transmission burst, based on control information transmitted in the monitored segment.1. A method for wireless communication by an apparatus, comprising: monitoring a segment of an ongoing transmission burst comprising a plurality of segments; and determining a residual length of the ongoing transmission burst, based on control information transmitted in the monitored segment. 2. The method of claim 1, wherein the control information transmitted in the monitored segment indicates the residual length as a number of segments remaining in the transmission burst. 3. The method of claim 1, wherein: the control information is transmitted periodically but not in each segment; and monitoring the segment comprises monitoring a segment in which the control information is transmitted. 4. The method of claim 1, wherein a segment comprises a minimum time-unit over which a waveform of the transmission burst is transmitted. 5. The method of claim 1, further comprising: power down one or more radio components during the residual length of the transmission burst. 6. The method of claim 1, further comprising: communicating at a reduced spectral efficiency, relative to a spectral efficiency of communications between transmission bursts, during the residual length of the transmission burst. 7. The method of claim 1, wherein the control information included in the monitored segment comprises a counter indicating the remaining number of segments of the interfering transmission burst, the counter decremented each successive segment of a transmission burst. 8. The method of claim 1, comprising: monitoring only one segment in a transmission burst; and powering down one or more radio components for remaining segments of the transmission burst. 9. The method of claim 1, further comprising: monitoring a last segment of the transmission burst; and determining a duration between transmission bursts, based on control information included in the last segment. 10. The method of claim 9, wherein the control information included in the last segment indicates the duration between transmission bursts as a number of segments between transmission bursts. 11. The method of claim 9, further comprising: communicating at an increased spectral efficiency, relative to a spectral efficiency of communications during transmission bursts, during one or more of the segments between transmission bursts. 12. The method of claim 1, further comprising: determining a priority of the ongoing transmission burst, based on control information transmitted in the monitored segment. 13. An apparatus for wireless communication, comprising: means for monitoring a segment of an ongoing transmission burst comprising a plurality of segments; and means for determining a residual length of the ongoing transmission burst, based on control information transmitted in the monitored segment 14. A computer-readable medium comprising code executable by one or more processors for: monitoring a segment of an ongoing transmission burst comprising a plurality of segments; and determining a residual length of the ongoing transmission burst, based on control information transmitted in the monitored segment. 15. A method for wireless communication by an apparatus, comprising: determining a residual length of an ongoing transmission burst comprising a plurality of segments; and transmitting, in at least one segment of the transmission burst, control information indicating the residual length of the ongoing transmission burst. 16. The method of claim 15, wherein the control information transmitted in the at least one segment indicates the residual length of the transmission burst as a number of segments remaining in the transmission burst. 17. The method of claim 15, wherein: the control information is transmitted periodically, but not in each segment. 18. The method of claim 15, wherein a segment comprises a minimum time-unit over which a waveform of the transmission burst is transmitted. 19. The method of claim 15, wherein control information indicating the residual length of the transmission burst is transmitted in each segment of the transmission burst. 20. The method of claim 19, wherein the control information indicating the residual length of the transmission burst comprises a counter indicating the remaining number of segments of the interfering transmission burst, the counter decremented each successive segment of the transmission burst. 21. The method of claim 15, further comprising: determining a duration between transmission bursts; and transmitting, in a last segment of the transmission burst, control information indicating the duration before a start of a next transmission burst. 22. The method of claim 21, wherein the control information transmitted in the last segment indicates the duration before the start of the next transmission burst as a number of segments between transmission bursts. 23. The method of claim 15, further comprising: transmitting, in the at least one segment of the ongoing transmission burst, a priority of the ongoing transmission burst. 24. An apparatus for wireless communication, comprising: means for determining a residual length of an ongoing transmission burst comprising a plurality of segments; and means for transmitting, in at least one segment of the transmission burst, control information indicating the residual length of the ongoing transmission burst. 25. A computer-readable medium for wireless communication comprising code executable by one or more processors for: determining a residual length of an ongoing transmission burst comprising a plurality of segments; and transmitting, in at least one segment of the transmission burst, control information indicating the residual length of the ongoing transmission burst.
2,400
7,002
7,002
13,784,335
2,426
The present invention relates to methods and apparatus relating to content streaming, e.g., in a home network, in a manner that reduces the chance of streaming of content to a device which is not authorized to receive the content. In an exemplary method of controlling content streaming on a home network in accordance with one embodiment of the present invention, the method involves receiving at a home network gateway a first video on demand service request message from a first device coupled to the home network, storing a portion of said first video on demand service request message in memory, receiving at said home network gateway a second message, and determining based on a portion of said second message and a portion of said stored first video on demand service request message whether to provide the requested video on demand service.
1. A method of controlling content streaming on a home network, the method comprising: receiving at a home network gateway, located at a customer premise, a first video on demand service request message from a first device coupled to the home network; storing a portion of said first video on demand service request message in memory included in said home network gateway; receiving at said home network gateway a second message; and determining, at said home network gateway, based on a portion of said second message and a portion of said stored first video on demand service request message whether to provide the requested video on demand service to a sender of said second message. 2. The method of claim 1, wherein said first video on demand service request message includes a first destination address of a first web server included in said home network gateway and is received at the first web server; and wherein said second message includes a second destination address which is different than said first destination address. 3. The method of claim 2, wherein said second destination address is a destination address of a second web server which is different from said first web server; and wherein said first video on demand service request message includes a first source identifier, said first source identifier identifying said first device, said first source identifier being part of said portion of said first video on demand service request message that is stored in memory. 4. The method of claim 3, wherein said second message received at said home network gateway includes a second source identifier, said second source identifier identifying said sender from which the second message originated. 5. The method of claim 4, wherein said second message is generated in response to said home network gateway publishing an address at which the video on demand service requested is available. 6. The method of claim 4, wherein said determining based on a portion of said second message and a portion of said stored first message whether to provide the requested video on demand service to said sender of said second message includes: comparing said first source identifier with said second source identifier to determine if they match or if they do not match. 7. The method of claim 6, wherein when said comparing determines that said first source identifier and said second source identifier do not match the method further includes: denying providing said requested video on demand service to said sender of said second message. 8. The method of claim 6, wherein when said comparing determines that said first source identifier and said second source identifier do match: streaming from said home gateway network a content stream to said first device. 9. The method of claim 1, further comprising: transmitting in response to said first video on demand service request message a second video on demand service request message, said second video on demand service request message being from said home network gateway and being directed to a video on demand server. 10. The method of claim 9, wherein said second video on demand service request message is based upon said first video on demand service request message; and wherein said second video on demand service request message is transmitted over an external network to said video on demand server being located in a network node external to a customer premise at which said home network is located. 11. The method of claim 10, further including receiving at said home network gateway a content stream from said video on demand server in quadrature amplitude modulation format in response to said second video on demand service request message. 12. The method of claim 11, further including said home network gateway publishing the address at which said content stream is available on said home network. 13. The method of claim 12, further including streaming said content from said home network gateway to said first device when it is determined that said video on demand service requested is to be provided. 14. The method of claim 1, wherein said sender of said second message is one of the following: an IP set top box, an IPTV, or a mobile device. 15. A system for controlling content streaming on a home network, the system comprising: a home network interface, located at a customer premise, for communicating with devices coupled to said home network; a communication network interface, located at said customer premise, for communicating with a network node, located outside said customer premise, over a communication network; a first web server, located at said customer premise, configured to receive via said home network interface a first video on demand service request message from a first device coupled to the home network; a memory, located at said customer premise in a device which includes said first web server, said memory including a stored portion of said first video on demand service request message in memory; a second web server, located at said customer premise, configured to receive a second message addressed to said second web server, via said home network interface, said second web sever being different from said first web server; and said first server also being configured to determine based on a portion of said second message and a portion of said stored first video on demand service request message whether to provide the requested video on demand service to a sender of said second message. 16. The system of claim 15 wherein: said communication network is a Quadrature Amplitude Modulated (QAM) communication network; and wherein said second web server is a Digital Living Network Alliance (DLNA) web server which receives video on demand content from a video on demand server, located outside said customer premise, over said QAM communication network; and said first device and said sender of said second message are DLNA client devices. 17. The system of claim 16, wherein said stored portion of said first video on demand service request message includes a first source identifier, said first source identifier identifying said first device. 18. The system of claim 17, wherein said second message includes a second destination address and a second source identifier, said second destination address being different from a first destination address included in said first video on demand service request message, said second source identifier identifying said sender from which the second message originated. 19. The system of claim 18, wherein said first web server configured to determine based on a portion of said second message and a portion of said stored first message whether to provide the requested video on demand service to said sender of said second message includes being configured to: compare said first source identifier with said second source identifier to determine if they match or if they do not match; and to determine to provide said requested video on demand service to said sender of said second message when said first source identifier and said second source identifier are determined to match. 20. A non-transitory computer readable medium having machine executable instructions stored thereon for controlling a processor in a home network gateway located at a customer premise, the non-transitory computer readable medium including: code for controlling the processor to receive at said home network gateway a first video on demand service request message from a first device coupled to the home network; code for controlling the processor to store a portion of said first video on demand service request message in memory located in said home network gateway; code for controlling the processor to receive at said home network gateway a second message, said second message including a different destination address than a destination address included in said first video on demand service request message; and code for controlling the processor to determine based on a portion of said second message and a portion of said stored first video on demand service request message whether to provide the requested video on demand service to said sender of said second device.
The present invention relates to methods and apparatus relating to content streaming, e.g., in a home network, in a manner that reduces the chance of streaming of content to a device which is not authorized to receive the content. In an exemplary method of controlling content streaming on a home network in accordance with one embodiment of the present invention, the method involves receiving at a home network gateway a first video on demand service request message from a first device coupled to the home network, storing a portion of said first video on demand service request message in memory, receiving at said home network gateway a second message, and determining based on a portion of said second message and a portion of said stored first video on demand service request message whether to provide the requested video on demand service.1. A method of controlling content streaming on a home network, the method comprising: receiving at a home network gateway, located at a customer premise, a first video on demand service request message from a first device coupled to the home network; storing a portion of said first video on demand service request message in memory included in said home network gateway; receiving at said home network gateway a second message; and determining, at said home network gateway, based on a portion of said second message and a portion of said stored first video on demand service request message whether to provide the requested video on demand service to a sender of said second message. 2. The method of claim 1, wherein said first video on demand service request message includes a first destination address of a first web server included in said home network gateway and is received at the first web server; and wherein said second message includes a second destination address which is different than said first destination address. 3. The method of claim 2, wherein said second destination address is a destination address of a second web server which is different from said first web server; and wherein said first video on demand service request message includes a first source identifier, said first source identifier identifying said first device, said first source identifier being part of said portion of said first video on demand service request message that is stored in memory. 4. The method of claim 3, wherein said second message received at said home network gateway includes a second source identifier, said second source identifier identifying said sender from which the second message originated. 5. The method of claim 4, wherein said second message is generated in response to said home network gateway publishing an address at which the video on demand service requested is available. 6. The method of claim 4, wherein said determining based on a portion of said second message and a portion of said stored first message whether to provide the requested video on demand service to said sender of said second message includes: comparing said first source identifier with said second source identifier to determine if they match or if they do not match. 7. The method of claim 6, wherein when said comparing determines that said first source identifier and said second source identifier do not match the method further includes: denying providing said requested video on demand service to said sender of said second message. 8. The method of claim 6, wherein when said comparing determines that said first source identifier and said second source identifier do match: streaming from said home gateway network a content stream to said first device. 9. The method of claim 1, further comprising: transmitting in response to said first video on demand service request message a second video on demand service request message, said second video on demand service request message being from said home network gateway and being directed to a video on demand server. 10. The method of claim 9, wherein said second video on demand service request message is based upon said first video on demand service request message; and wherein said second video on demand service request message is transmitted over an external network to said video on demand server being located in a network node external to a customer premise at which said home network is located. 11. The method of claim 10, further including receiving at said home network gateway a content stream from said video on demand server in quadrature amplitude modulation format in response to said second video on demand service request message. 12. The method of claim 11, further including said home network gateway publishing the address at which said content stream is available on said home network. 13. The method of claim 12, further including streaming said content from said home network gateway to said first device when it is determined that said video on demand service requested is to be provided. 14. The method of claim 1, wherein said sender of said second message is one of the following: an IP set top box, an IPTV, or a mobile device. 15. A system for controlling content streaming on a home network, the system comprising: a home network interface, located at a customer premise, for communicating with devices coupled to said home network; a communication network interface, located at said customer premise, for communicating with a network node, located outside said customer premise, over a communication network; a first web server, located at said customer premise, configured to receive via said home network interface a first video on demand service request message from a first device coupled to the home network; a memory, located at said customer premise in a device which includes said first web server, said memory including a stored portion of said first video on demand service request message in memory; a second web server, located at said customer premise, configured to receive a second message addressed to said second web server, via said home network interface, said second web sever being different from said first web server; and said first server also being configured to determine based on a portion of said second message and a portion of said stored first video on demand service request message whether to provide the requested video on demand service to a sender of said second message. 16. The system of claim 15 wherein: said communication network is a Quadrature Amplitude Modulated (QAM) communication network; and wherein said second web server is a Digital Living Network Alliance (DLNA) web server which receives video on demand content from a video on demand server, located outside said customer premise, over said QAM communication network; and said first device and said sender of said second message are DLNA client devices. 17. The system of claim 16, wherein said stored portion of said first video on demand service request message includes a first source identifier, said first source identifier identifying said first device. 18. The system of claim 17, wherein said second message includes a second destination address and a second source identifier, said second destination address being different from a first destination address included in said first video on demand service request message, said second source identifier identifying said sender from which the second message originated. 19. The system of claim 18, wherein said first web server configured to determine based on a portion of said second message and a portion of said stored first message whether to provide the requested video on demand service to said sender of said second message includes being configured to: compare said first source identifier with said second source identifier to determine if they match or if they do not match; and to determine to provide said requested video on demand service to said sender of said second message when said first source identifier and said second source identifier are determined to match. 20. A non-transitory computer readable medium having machine executable instructions stored thereon for controlling a processor in a home network gateway located at a customer premise, the non-transitory computer readable medium including: code for controlling the processor to receive at said home network gateway a first video on demand service request message from a first device coupled to the home network; code for controlling the processor to store a portion of said first video on demand service request message in memory located in said home network gateway; code for controlling the processor to receive at said home network gateway a second message, said second message including a different destination address than a destination address included in said first video on demand service request message; and code for controlling the processor to determine based on a portion of said second message and a portion of said stored first video on demand service request message whether to provide the requested video on demand service to said sender of said second device.
2,400
7,003
7,003
14,580,837
2,413
Mobile devices implement a ranging mechanism that includes a lead responder receiving ranging measurement requests from two different initiators in the same DW cycle. At the beginning of the DW cycle the lead responder broadcasts and/or publishes a channel availability map that includes a list of slots and channels in which to respond to the ranging measurement requests based on a number of ranging operations supported in each slot within the DW cycle and based on an autonomously determined response sequence. If the lead responder responds to all ranging requests by all initiators in a DW cycle, secondary responders can perform ranging in the same or subsequent DW cycles. Upon exhausting all initiators paired with the lead responder, a secondary responder becomes the “active” responder that is chosen based on a prioritization scheme that is universal among the group of devices in the ranging operation.
1. A method for ranging in a communication network, the method comprising: receiving an N×N ranging measurement request from an upper layer entity; responding to the N×N ranging measurement request by advertising a channel availability map at a beginning of a DW cycle, wherein the channel availability map includes a list of slots and channels; receiving one or more ranging measurement requests from one or more initiators based on an initiator prioritization scheme and the channel availability map; and responding to the ranging measurement requests from the one or more initiators. 2. The method of claim 1, further comprising receiving the one or more ranging measurement requests from the one or more initiators after the ranging measurement request from the upper layer entity in an order determined autonomously by a first initiator of the one or more initiators and the one or more initiators, wherein the order that is determined autonomously by the first initiator and the one or more initiators is selected from an ascending order, a descending order, an order selected using one or more hash function, an implicit priority order, or an importance order based on a service running on the initiator. 3. The method of claim 2, wherein the order that is determined autonomously by the first initiator and the one or more initiators is based on a MAC address for the first initiator and a MAC address for the second initiator. 4. The method of claim 1, wherein a secondary responder awakens to respond to initiator requests to it based on the channel availability map and information relating to the N devices. 5. The method of claim 4, wherein if the ranging measurements are not concluded during the DW cycle while at least one of a second, third, or fourth responder is still ranging to initiators, then the second, third, or fourth responder will advertise a channel availability map at the beginning of the next DW cycle. 6. The method of claim 1, wherein the ranging measurement requests from the first initiator and the one or more initiators are received substantially simultaneously. 7. The method of claim 1, further comprising communicating a ranging measurement value to the initiator using a vendor-specific Information Element. 8. The method of claim 7, wherein the vendor-specific Information Element is included in an FTMStop frame. 9. The method of claim 1, wherein responding to the ranging measurement requests from the one or more initiators is based on a responder prioritization scheme. 10. An apparatus for ranging in a communication network, the apparatus comprising: logic configured to receive an N×N ranging measurement request from an upper layer entity; logic configured to respond to the N×N ranging measurement request by advertising a channel availability map at a beginning of a DW cycle, wherein the channel availability map includes a list of slots and channels; logic configured to receive one or more ranging measurement requests from one or more initiators based on an initiator prioritization scheme and the channel availability map; and logic configured to respond to the ranging measurement requests from the one or more initiators. 11. The apparatus of claim 10, further comprising logic configured to receive the one or more ranging measurement requests from the one or more initiators after the ranging measurement request from the upper layer entity in an order determined autonomously by a first initiator of the one or more initiators and the one or more initiators, wherein the order that is determined autonomously by the first initiator and the one or more initiators is selected from an ascending order, a descending order, an order selected using one or more hash function, an implicit priority order, or an importance order based on a service running on the initiator. 12. The apparatus of claim 11, wherein the order that is determined autonomously by the first initiator and the one or more initiators is based on a MAC address for the first initiator and a MAC address for the second initiator. 13. The apparatus of claim 10, wherein a secondary responder is configured to awaken to respond to initiator requests to it based on the channel availability map and information relating to the N devices. 14. The apparatus of claim 13, wherein if the ranging measurements are not concluded during the DW cycle while at least one of a second, third, or fourth responder is still ranging to initiators, then the second, third, or fourth responder are configured to advertise a channel availability map at the beginning of the next DW cycle. 15. The apparatus of claim 10, wherein the ranging measurement requests from the first initiator and the one or more initiators are received substantially simultaneously. 16. The apparatus of claim 10, further comprising logic configured to communicate a ranging measurement value to the initiator using a vendor-specific Information Element. 17. The apparatus of claim 16, wherein the vendor-specific Information Element is included in an FTMStop frame. 18. The apparatus of claim 10, wherein responding to the ranging measurement requests from the one or more initiators is based on a responder prioritization scheme. 19. An apparatus for ranging in a communication network, the method comprising: means for receiving an N×N ranging measurement request from an upper layer entity; means for responding to the N×N ranging measurement request by advertising a channel availability map at a beginning of a DW cycle, wherein the channel availability map includes a list of slots and channels; means for receiving one or more ranging measurement requests from one or more initiators based on an initiator prioritization scheme and the channel availability map; and means for responding to the ranging measurement requests from the one or more initiators. 20. The apparatus of claim 19, further comprising means for receiving the one or more ranging measurement requests from the one or more initiators after the ranging measurement request from the upper layer entity in an order determined autonomously by a first initiator of the one or more initiators and the one or more initiators, wherein the order that is determined autonomously by the first initiator and the one or more initiators is selected from an ascending order, a descending order, an order selected using one or more hash function, an implicit priority order, or an importance order based on a service running on the initiator. 21. The apparatus of claim 20, wherein the order that is determined autonomously by the first initiator and the one or more initiators is based on a MAC address for the first initiator and a MAC address for the second initiator. 22. The apparatus of claim 19, wherein a secondary responder awakens to respond to initiator requests to it based on the channel availability map and information relating to the N devices. 23. The apparatus of claim 22, wherein if the ranging measurements are not concluded during the DW cycle while at least one of a second, third, or fourth responder is still ranging to initiators, then the second, third, or fourth responder further comprise means for advertising a channel availability map at the beginning of the next DW cycle. 24. The apparatus of claim 19, wherein the ranging measurement requests from the first initiator and the one or more initiators are received substantially simultaneously. 25. The apparatus of claim 19, further comprising means for communicating a ranging measurement value to the initiator using a vendor-specific Information Element. 26. The apparatus of claim 25, wherein the vendor-specific Information Element is included in an FTMStop frame. 27. The apparatus of claim 19, wherein the means for responding to the ranging measurement requests from the one or more initiators is based on a responder prioritization scheme. 28. A computer-readable storage medium including data that, when accessed by a machine, cause the machine to perform operations in a wireless communication network, the operations comprising: receiving an N×N ranging measurement request from an upper layer entity; responding to the N×N ranging measurement request by advertising a channel availability map at a beginning of a DW cycle, wherein the channel availability map includes a list of slots and channels; receiving one or more ranging measurement requests from one or more initiators based on an initiator prioritization scheme and the channel availability map; and responding to the ranging measurement requests from the one or more initiators. 29. The computer-readable storage medium of claim 28, further comprising data that, when accessed by the machine, cause the machine to perform operations comprising receiving the one or more ranging measurement requests from the one or more initiators after the ranging measurement request from the upper layer entity in an order determined autonomously by a first initiator of the one or more initiators and the one or more initiators, wherein the order that is determined autonomously by the first initiator and the one or more initiators is selected from an ascending order, a descending order, an order selected using one or more hash function, an implicit priority order, or an importance order based on a service running on the initiator. 30. The computer-readable storage medium of claim 29, wherein the order that is determined autonomously by the first initiator and the one or more initiators is based on a MAC address for the first initiator and a MAC address for the second initiator.
Mobile devices implement a ranging mechanism that includes a lead responder receiving ranging measurement requests from two different initiators in the same DW cycle. At the beginning of the DW cycle the lead responder broadcasts and/or publishes a channel availability map that includes a list of slots and channels in which to respond to the ranging measurement requests based on a number of ranging operations supported in each slot within the DW cycle and based on an autonomously determined response sequence. If the lead responder responds to all ranging requests by all initiators in a DW cycle, secondary responders can perform ranging in the same or subsequent DW cycles. Upon exhausting all initiators paired with the lead responder, a secondary responder becomes the “active” responder that is chosen based on a prioritization scheme that is universal among the group of devices in the ranging operation.1. A method for ranging in a communication network, the method comprising: receiving an N×N ranging measurement request from an upper layer entity; responding to the N×N ranging measurement request by advertising a channel availability map at a beginning of a DW cycle, wherein the channel availability map includes a list of slots and channels; receiving one or more ranging measurement requests from one or more initiators based on an initiator prioritization scheme and the channel availability map; and responding to the ranging measurement requests from the one or more initiators. 2. The method of claim 1, further comprising receiving the one or more ranging measurement requests from the one or more initiators after the ranging measurement request from the upper layer entity in an order determined autonomously by a first initiator of the one or more initiators and the one or more initiators, wherein the order that is determined autonomously by the first initiator and the one or more initiators is selected from an ascending order, a descending order, an order selected using one or more hash function, an implicit priority order, or an importance order based on a service running on the initiator. 3. The method of claim 2, wherein the order that is determined autonomously by the first initiator and the one or more initiators is based on a MAC address for the first initiator and a MAC address for the second initiator. 4. The method of claim 1, wherein a secondary responder awakens to respond to initiator requests to it based on the channel availability map and information relating to the N devices. 5. The method of claim 4, wherein if the ranging measurements are not concluded during the DW cycle while at least one of a second, third, or fourth responder is still ranging to initiators, then the second, third, or fourth responder will advertise a channel availability map at the beginning of the next DW cycle. 6. The method of claim 1, wherein the ranging measurement requests from the first initiator and the one or more initiators are received substantially simultaneously. 7. The method of claim 1, further comprising communicating a ranging measurement value to the initiator using a vendor-specific Information Element. 8. The method of claim 7, wherein the vendor-specific Information Element is included in an FTMStop frame. 9. The method of claim 1, wherein responding to the ranging measurement requests from the one or more initiators is based on a responder prioritization scheme. 10. An apparatus for ranging in a communication network, the apparatus comprising: logic configured to receive an N×N ranging measurement request from an upper layer entity; logic configured to respond to the N×N ranging measurement request by advertising a channel availability map at a beginning of a DW cycle, wherein the channel availability map includes a list of slots and channels; logic configured to receive one or more ranging measurement requests from one or more initiators based on an initiator prioritization scheme and the channel availability map; and logic configured to respond to the ranging measurement requests from the one or more initiators. 11. The apparatus of claim 10, further comprising logic configured to receive the one or more ranging measurement requests from the one or more initiators after the ranging measurement request from the upper layer entity in an order determined autonomously by a first initiator of the one or more initiators and the one or more initiators, wherein the order that is determined autonomously by the first initiator and the one or more initiators is selected from an ascending order, a descending order, an order selected using one or more hash function, an implicit priority order, or an importance order based on a service running on the initiator. 12. The apparatus of claim 11, wherein the order that is determined autonomously by the first initiator and the one or more initiators is based on a MAC address for the first initiator and a MAC address for the second initiator. 13. The apparatus of claim 10, wherein a secondary responder is configured to awaken to respond to initiator requests to it based on the channel availability map and information relating to the N devices. 14. The apparatus of claim 13, wherein if the ranging measurements are not concluded during the DW cycle while at least one of a second, third, or fourth responder is still ranging to initiators, then the second, third, or fourth responder are configured to advertise a channel availability map at the beginning of the next DW cycle. 15. The apparatus of claim 10, wherein the ranging measurement requests from the first initiator and the one or more initiators are received substantially simultaneously. 16. The apparatus of claim 10, further comprising logic configured to communicate a ranging measurement value to the initiator using a vendor-specific Information Element. 17. The apparatus of claim 16, wherein the vendor-specific Information Element is included in an FTMStop frame. 18. The apparatus of claim 10, wherein responding to the ranging measurement requests from the one or more initiators is based on a responder prioritization scheme. 19. An apparatus for ranging in a communication network, the method comprising: means for receiving an N×N ranging measurement request from an upper layer entity; means for responding to the N×N ranging measurement request by advertising a channel availability map at a beginning of a DW cycle, wherein the channel availability map includes a list of slots and channels; means for receiving one or more ranging measurement requests from one or more initiators based on an initiator prioritization scheme and the channel availability map; and means for responding to the ranging measurement requests from the one or more initiators. 20. The apparatus of claim 19, further comprising means for receiving the one or more ranging measurement requests from the one or more initiators after the ranging measurement request from the upper layer entity in an order determined autonomously by a first initiator of the one or more initiators and the one or more initiators, wherein the order that is determined autonomously by the first initiator and the one or more initiators is selected from an ascending order, a descending order, an order selected using one or more hash function, an implicit priority order, or an importance order based on a service running on the initiator. 21. The apparatus of claim 20, wherein the order that is determined autonomously by the first initiator and the one or more initiators is based on a MAC address for the first initiator and a MAC address for the second initiator. 22. The apparatus of claim 19, wherein a secondary responder awakens to respond to initiator requests to it based on the channel availability map and information relating to the N devices. 23. The apparatus of claim 22, wherein if the ranging measurements are not concluded during the DW cycle while at least one of a second, third, or fourth responder is still ranging to initiators, then the second, third, or fourth responder further comprise means for advertising a channel availability map at the beginning of the next DW cycle. 24. The apparatus of claim 19, wherein the ranging measurement requests from the first initiator and the one or more initiators are received substantially simultaneously. 25. The apparatus of claim 19, further comprising means for communicating a ranging measurement value to the initiator using a vendor-specific Information Element. 26. The apparatus of claim 25, wherein the vendor-specific Information Element is included in an FTMStop frame. 27. The apparatus of claim 19, wherein the means for responding to the ranging measurement requests from the one or more initiators is based on a responder prioritization scheme. 28. A computer-readable storage medium including data that, when accessed by a machine, cause the machine to perform operations in a wireless communication network, the operations comprising: receiving an N×N ranging measurement request from an upper layer entity; responding to the N×N ranging measurement request by advertising a channel availability map at a beginning of a DW cycle, wherein the channel availability map includes a list of slots and channels; receiving one or more ranging measurement requests from one or more initiators based on an initiator prioritization scheme and the channel availability map; and responding to the ranging measurement requests from the one or more initiators. 29. The computer-readable storage medium of claim 28, further comprising data that, when accessed by the machine, cause the machine to perform operations comprising receiving the one or more ranging measurement requests from the one or more initiators after the ranging measurement request from the upper layer entity in an order determined autonomously by a first initiator of the one or more initiators and the one or more initiators, wherein the order that is determined autonomously by the first initiator and the one or more initiators is selected from an ascending order, a descending order, an order selected using one or more hash function, an implicit priority order, or an importance order based on a service running on the initiator. 30. The computer-readable storage medium of claim 29, wherein the order that is determined autonomously by the first initiator and the one or more initiators is based on a MAC address for the first initiator and a MAC address for the second initiator.
2,400
7,004
7,004
14,485,891
2,455
The described unified service management system provides a unified console to perform functions of individual management specialists. A unified console facilitates an administrator to perform the complex tasks that were performed by the individual management specialists. The unified console provides a “wizard” based approach to the administrator to design all aspects of the complex tasks including placement of components or computing devices, deciding on policies of the components or computing devices, deciding on health policies of components or computing devices, fixing data protection policies of components or computing devices, etc.
1-20. (canceled) 21. A method performed using a unified console implemented by one or more management servers that are coupled to one or more managed nodes via a network, the method comprising: receiving input from a user, via the unified console, defining an application model that includes rules for development of an application before the application is written; applying constraints specified by the application model, by one or more processors in at least one of the one or more management servers, to guide the development of the application in accordance with the rules; and managing a life cycle of the application based on the application model. 22. The method of claim 21, wherein the application model defines a configuration of system in which the application is to execute. 23. The method of claim 21, wherein the application model defines roles for respective portions of a system in which the application is to execute. 24. The method of claim 21, further comprising: validating the development of the application in accordance with the rules, which are included in the application model. 25. The method of claim 21, wherein applying the constraints comprises: comparing a selected environment in which the application is to be executed to one or more environments in which the application is authorized by the application model to be executed to determine whether the selected environment is included in the one or more environments. 26. The method of claim 21, wherein applying the constraints comprises: comparing a selected number of users who are to utilize the application with a threshold number of users that is specified by the model to determine whether the selected number of users exceeds the threshold number of users. 27. The method of claim 21, wherein managing the life cycle comprises: applying other constraints specified by the application model to manage operations of the application. 28. One or more management servers coupled to one or more managed nodes via a network, the one or more management servers comprising: one or more processors; an authoring section configured to receive input from a user defining an application model that includes rules for development of an application before the application is written; an engine section, implemented using at least one of the one or more processors, configured to apply constraints specified by the application model to guide the development of the application in accordance with the rules; and one or more modules configured to manage a life cycle of the application based on the application model. 29. The one or more management servers of claim 28, wherein the application model defines a configuration of a system in which the application is to execute. 30. The one or more management servers of claim 28, wherein the application model defines roles for respective portions of a system in which the application is to execute. 31. The one or more management servers of claim 28, wherein the authoring section is further configured to validate software application documents created in reference to the application model. 32. The one or more management servers of claim 28, comprising: a configuration management module configured to present one or more criteria regarding the application, the one or more criteria including one or more environments in which the application is authorized by the application model to be executed. 33. The one or more management servers of claim 28, comprising: a configuration management module configured to present one or more criteria regarding the application, the one or more criteria including a threshold number of users that is specified by the application model to use the application. 34. The one or more management servers of claim 28, wherein at least one of the one or more modules is configured to apply other constraints specified by the application model to manage deployment of the application. 35. A method performed by one or more management servers that are coupled to one or more managed nodes via a network, the method comprising: implementing a unified console, which facilitates a user to design an application model that includes rules for development of an application before the application is written; applying constraints specified by the application model, by one or more processors in at least one of the one or more management servers, to guide the development of the application to be in compliance with the rules; and managing a life cycle of the application based on the application model. 36. The method of claim 35, wherein the application model defines a configuration of a system in which the application is to execute. 37. The method of claim 35, wherein the application model defines roles for respective portions of a system in which the application is to execute. 38. The method of claim 35, further comprising: validating software application documents created in reference to the application model. 39. The method of claim 35, further comprising: presenting one or more criteria regarding the application, the one or more criteria including one or more environments in which the application is authorized by the application model to be executed. 40. The method of claim 35, further comprising: presenting one or more criteria regarding the application, the one or more criteria including a threshold number of users that is specified by the application model to use the application.
The described unified service management system provides a unified console to perform functions of individual management specialists. A unified console facilitates an administrator to perform the complex tasks that were performed by the individual management specialists. The unified console provides a “wizard” based approach to the administrator to design all aspects of the complex tasks including placement of components or computing devices, deciding on policies of the components or computing devices, deciding on health policies of components or computing devices, fixing data protection policies of components or computing devices, etc.1-20. (canceled) 21. A method performed using a unified console implemented by one or more management servers that are coupled to one or more managed nodes via a network, the method comprising: receiving input from a user, via the unified console, defining an application model that includes rules for development of an application before the application is written; applying constraints specified by the application model, by one or more processors in at least one of the one or more management servers, to guide the development of the application in accordance with the rules; and managing a life cycle of the application based on the application model. 22. The method of claim 21, wherein the application model defines a configuration of system in which the application is to execute. 23. The method of claim 21, wherein the application model defines roles for respective portions of a system in which the application is to execute. 24. The method of claim 21, further comprising: validating the development of the application in accordance with the rules, which are included in the application model. 25. The method of claim 21, wherein applying the constraints comprises: comparing a selected environment in which the application is to be executed to one or more environments in which the application is authorized by the application model to be executed to determine whether the selected environment is included in the one or more environments. 26. The method of claim 21, wherein applying the constraints comprises: comparing a selected number of users who are to utilize the application with a threshold number of users that is specified by the model to determine whether the selected number of users exceeds the threshold number of users. 27. The method of claim 21, wherein managing the life cycle comprises: applying other constraints specified by the application model to manage operations of the application. 28. One or more management servers coupled to one or more managed nodes via a network, the one or more management servers comprising: one or more processors; an authoring section configured to receive input from a user defining an application model that includes rules for development of an application before the application is written; an engine section, implemented using at least one of the one or more processors, configured to apply constraints specified by the application model to guide the development of the application in accordance with the rules; and one or more modules configured to manage a life cycle of the application based on the application model. 29. The one or more management servers of claim 28, wherein the application model defines a configuration of a system in which the application is to execute. 30. The one or more management servers of claim 28, wherein the application model defines roles for respective portions of a system in which the application is to execute. 31. The one or more management servers of claim 28, wherein the authoring section is further configured to validate software application documents created in reference to the application model. 32. The one or more management servers of claim 28, comprising: a configuration management module configured to present one or more criteria regarding the application, the one or more criteria including one or more environments in which the application is authorized by the application model to be executed. 33. The one or more management servers of claim 28, comprising: a configuration management module configured to present one or more criteria regarding the application, the one or more criteria including a threshold number of users that is specified by the application model to use the application. 34. The one or more management servers of claim 28, wherein at least one of the one or more modules is configured to apply other constraints specified by the application model to manage deployment of the application. 35. A method performed by one or more management servers that are coupled to one or more managed nodes via a network, the method comprising: implementing a unified console, which facilitates a user to design an application model that includes rules for development of an application before the application is written; applying constraints specified by the application model, by one or more processors in at least one of the one or more management servers, to guide the development of the application to be in compliance with the rules; and managing a life cycle of the application based on the application model. 36. The method of claim 35, wherein the application model defines a configuration of a system in which the application is to execute. 37. The method of claim 35, wherein the application model defines roles for respective portions of a system in which the application is to execute. 38. The method of claim 35, further comprising: validating software application documents created in reference to the application model. 39. The method of claim 35, further comprising: presenting one or more criteria regarding the application, the one or more criteria including one or more environments in which the application is authorized by the application model to be executed. 40. The method of claim 35, further comprising: presenting one or more criteria regarding the application, the one or more criteria including a threshold number of users that is specified by the application model to use the application.
2,400
7,005
7,005
15,219,985
2,419
A method, operable by a service registry in a service orientated architecture system, for providing a service within the system. A service request is received from a service requester in the system. The status of the service is checked as registered in the service registry. In response to the service not having a registered service endpoint or a property of the service falling below a defined threshold, a request is sent to service providers or subsequent service registries to provide a new service and according to the defined threshold. In response to a service provider providing the new service according to the defined standard, the service registry is updated with the new service and responding to the service requester that the service is available. The embodiments allow both direct interaction between the requester and provider or indirect interaction via a service management layer.
1. A method, operable by a service registry in a service oriented environment for provisioning a service within the environment, the method comprising: receiving a request for a service from a service requester in the environment; checking details of the requested service as registered in the service registry; characterized by; in response to the service requested not being registered, sending the request to one or more service providers to provide a new service; and in response to a service provider providing the new service, updating, by a processor, the service registry with the new service and responding to the service requester that the service is available. 2. A method according to claim 1, wherein the service request includes a required standard of service and in response to the service being registered but not having the required standard, sending a request to one or more service providers to provide a service having the required standard; and in response to a service provider providing the service having the required standard, updating the service registry with the new service and standard of service. 3. A method according to claim 2, where the standard of service is a service property meeting a required threshold. 4. A method according to claim 3, wherein the service property is one or more of the following: a rate of performing the service; a cost of the service; and a number of service instances provided. 5. A method according to claim 1 further comprising: in response to the service requested not being registered, sending the service request to one or more subsequent service registries to provide a service provider for the service. 6. A method according to claim 5 further comprising: sending located service information to the one or more subsequent service registries so that the one or more subsequent service registries can use previously located service information and subsequently locate service information to choose the service provider. 7. A method according to claim 1 further comprising: mediating between the service requester and the service provider, wherein the service requester does not receive a service endpoint of the service provider but uses the service through a service management layer. 8. A method according to claim 7, wherein the service requester receives the service endpoint and requests the service directly from the service provider. 9. A method according to claim 1, wherein the service provider is provided as a virtual server. 10. A method according to claim 1, wherein the service is provided as a virtual application.
A method, operable by a service registry in a service orientated architecture system, for providing a service within the system. A service request is received from a service requester in the system. The status of the service is checked as registered in the service registry. In response to the service not having a registered service endpoint or a property of the service falling below a defined threshold, a request is sent to service providers or subsequent service registries to provide a new service and according to the defined threshold. In response to a service provider providing the new service according to the defined standard, the service registry is updated with the new service and responding to the service requester that the service is available. The embodiments allow both direct interaction between the requester and provider or indirect interaction via a service management layer.1. A method, operable by a service registry in a service oriented environment for provisioning a service within the environment, the method comprising: receiving a request for a service from a service requester in the environment; checking details of the requested service as registered in the service registry; characterized by; in response to the service requested not being registered, sending the request to one or more service providers to provide a new service; and in response to a service provider providing the new service, updating, by a processor, the service registry with the new service and responding to the service requester that the service is available. 2. A method according to claim 1, wherein the service request includes a required standard of service and in response to the service being registered but not having the required standard, sending a request to one or more service providers to provide a service having the required standard; and in response to a service provider providing the service having the required standard, updating the service registry with the new service and standard of service. 3. A method according to claim 2, where the standard of service is a service property meeting a required threshold. 4. A method according to claim 3, wherein the service property is one or more of the following: a rate of performing the service; a cost of the service; and a number of service instances provided. 5. A method according to claim 1 further comprising: in response to the service requested not being registered, sending the service request to one or more subsequent service registries to provide a service provider for the service. 6. A method according to claim 5 further comprising: sending located service information to the one or more subsequent service registries so that the one or more subsequent service registries can use previously located service information and subsequently locate service information to choose the service provider. 7. A method according to claim 1 further comprising: mediating between the service requester and the service provider, wherein the service requester does not receive a service endpoint of the service provider but uses the service through a service management layer. 8. A method according to claim 7, wherein the service requester receives the service endpoint and requests the service directly from the service provider. 9. A method according to claim 1, wherein the service provider is provided as a virtual server. 10. A method according to claim 1, wherein the service is provided as a virtual application.
2,400
7,006
7,006
13,926,864
2,488
A hand product use benchmark is determined for a target institution based on observations of hand product use in a studied institution and relationships between the number of observed hand product uses and characteristics of the studied institution. The benchmark for the target institution is determined based on target institution characteristics and the relationships between institution characteristics and observed hand product uses of the studied institution. The benchmark for the target institution may be adjusted based on direct observation of hand product uses in the target institution and based on actual conditions on which the benchmark is based. Compliance with the benchmark is determined by comparison of activity within the target institution to the benchmark.
1. A method for predetermining the benchmark number of hand product uses for a target facility comprising: identifying best practice recommendations for use of a hand product within a studied facility; determining a study benchmark number of hand product uses in a studied facility during an observation period; identifying studied facility characteristics of the studied facility during the observation period; identifying study relationships between studied facility characteristics and the study number of hand product uses; determining target facility characteristics for the target facility; and determining a benchmark number of hand product uses for the target facility based on study relationships and target facility characteristics. 2. The method for predetermining the benchmark number of hand product uses for a target facility of claim 1, wherein the studied facility and the target facility are healthcare facilities. 3. The method for predetermining the benchmark number of hand product uses for a target facility of claim 2, wherein the hand product is a hand hygiene product and the best practice recommendations are recommendations for hand hygiene in a healthcare facility. 4. The method for predetermining the benchmark number of hand product uses for a target facility of claim 2, wherein the hand product is a glove and the best practice recommendations are recommendations for glove use for healthcare. 5. The method for predetermining the benchmark number of hand product uses for a target facility of claim 4, wherein the study benchmark number of hand product uses are based on one or more of the recommendations by the World Health Organization for glove use. 6. The method for predetermining the benchmark number of hand product uses for a target facility of claim 1, wherein study relationships are identified based on linear regression analysis. 7. The method for predetermining the benchmark number of hand product uses for a target facility of claim 1, wherein the studied facility and the target facility are food handling facilities. 8. The method for predetermining the benchmark number of hand product uses for a target facility of claim 7, wherein the hand product is a hand hygiene product and the best practice recommendations are recommendations for hand hygiene in a food handling facility. 9. The method for predetermining the benchmark number of hand product uses for a target facility of claim 7, wherein the hand product is a hand hygiene product and the study benchmark number of hand product uses is based on one or more of the FDA recommended circumstances when a food worker should wash his or her hands. 10. The method for predetermining the benchmark number of hand product uses for a target facility of claim 7, wherein the hand product is a glove and the best practice recommendations are recommendations for glove use during food handling. 11. A method for monitoring compliance with best practice for use of a hand product within a target facility comprising: identifying best practice indications within the target facility for which use of a hand product is recommended; monitoring occurrences within the target facility of indications for which use of the hand product is recommended; determining a benchmark use of the hand product based at least in part on the monitored indications; monitoring use of the hand product in the target facility; and comparing the use of the hand product in the target facility to the benchmark use in the target facility. 12. A method for monitoring compliance with best practice for use of a hand product within a target facility of claim 11, wherein the hand product is a skin care product and the indication for which use of the skin care product is recommended is use of a cleanser. 13. A method for monitoring compliance with best practice for use of a hand product within a target facility of claim 11: the hand product is a hand hygiene product; the indication for which the hand hygiene product is recommended to be used is use of gloves. 14. A method for monitoring compliance with best practice for use of a hand product within a target facility of claim 11: the hand product is a hand washing product; the indication for which the hand hygiene product is recommended to be used is use of a pre-work cream. 15. A method for monitoring compliance with best practice for use of a hand product within a target facility of claim 11: the hand product is a skin care product; the indication for which the hand hygiene product is recommended to be used is use of a hand washing product.
A hand product use benchmark is determined for a target institution based on observations of hand product use in a studied institution and relationships between the number of observed hand product uses and characteristics of the studied institution. The benchmark for the target institution is determined based on target institution characteristics and the relationships between institution characteristics and observed hand product uses of the studied institution. The benchmark for the target institution may be adjusted based on direct observation of hand product uses in the target institution and based on actual conditions on which the benchmark is based. Compliance with the benchmark is determined by comparison of activity within the target institution to the benchmark.1. A method for predetermining the benchmark number of hand product uses for a target facility comprising: identifying best practice recommendations for use of a hand product within a studied facility; determining a study benchmark number of hand product uses in a studied facility during an observation period; identifying studied facility characteristics of the studied facility during the observation period; identifying study relationships between studied facility characteristics and the study number of hand product uses; determining target facility characteristics for the target facility; and determining a benchmark number of hand product uses for the target facility based on study relationships and target facility characteristics. 2. The method for predetermining the benchmark number of hand product uses for a target facility of claim 1, wherein the studied facility and the target facility are healthcare facilities. 3. The method for predetermining the benchmark number of hand product uses for a target facility of claim 2, wherein the hand product is a hand hygiene product and the best practice recommendations are recommendations for hand hygiene in a healthcare facility. 4. The method for predetermining the benchmark number of hand product uses for a target facility of claim 2, wherein the hand product is a glove and the best practice recommendations are recommendations for glove use for healthcare. 5. The method for predetermining the benchmark number of hand product uses for a target facility of claim 4, wherein the study benchmark number of hand product uses are based on one or more of the recommendations by the World Health Organization for glove use. 6. The method for predetermining the benchmark number of hand product uses for a target facility of claim 1, wherein study relationships are identified based on linear regression analysis. 7. The method for predetermining the benchmark number of hand product uses for a target facility of claim 1, wherein the studied facility and the target facility are food handling facilities. 8. The method for predetermining the benchmark number of hand product uses for a target facility of claim 7, wherein the hand product is a hand hygiene product and the best practice recommendations are recommendations for hand hygiene in a food handling facility. 9. The method for predetermining the benchmark number of hand product uses for a target facility of claim 7, wherein the hand product is a hand hygiene product and the study benchmark number of hand product uses is based on one or more of the FDA recommended circumstances when a food worker should wash his or her hands. 10. The method for predetermining the benchmark number of hand product uses for a target facility of claim 7, wherein the hand product is a glove and the best practice recommendations are recommendations for glove use during food handling. 11. A method for monitoring compliance with best practice for use of a hand product within a target facility comprising: identifying best practice indications within the target facility for which use of a hand product is recommended; monitoring occurrences within the target facility of indications for which use of the hand product is recommended; determining a benchmark use of the hand product based at least in part on the monitored indications; monitoring use of the hand product in the target facility; and comparing the use of the hand product in the target facility to the benchmark use in the target facility. 12. A method for monitoring compliance with best practice for use of a hand product within a target facility of claim 11, wherein the hand product is a skin care product and the indication for which use of the skin care product is recommended is use of a cleanser. 13. A method for monitoring compliance with best practice for use of a hand product within a target facility of claim 11: the hand product is a hand hygiene product; the indication for which the hand hygiene product is recommended to be used is use of gloves. 14. A method for monitoring compliance with best practice for use of a hand product within a target facility of claim 11: the hand product is a hand washing product; the indication for which the hand hygiene product is recommended to be used is use of a pre-work cream. 15. A method for monitoring compliance with best practice for use of a hand product within a target facility of claim 11: the hand product is a skin care product; the indication for which the hand hygiene product is recommended to be used is use of a hand washing product.
2,400
7,007
7,007
15,247,141
2,419
A method, operable by a service registry in a service orientated architecture system, for providing a service within the system. A service request is received from a service requester in the system. The status of the service is checked as registered in the service registry. In response to the service not having a registered service endpoint or a property of the service falling below a defined threshold, a request is sent to service providers or subsequent service registries to provide a new service and according to the defined threshold. In response to a service provider providing the new service according to the defined standard, the service registry is updated with the new service and responding to the service requester that the service is available. The embodiments allow both direct interaction between the requester and provider or indirect interaction via a service management layer.
1. A computer program product for operating a service registry in a service oriented architecture system and managing a service within the system, the computer program product comprising a computer readable storage medium having program code embodied therewith, the program code comprising the programming instructions for: receiving a request for a service from a service requester in the environment; checking details of the requested service as registered in the service registry; characterized by; in response to the service requested not being registered, sending the request to one or more service providers to provide a new service; and in response to a service provider providing the new service, updating the service registry with the new service and responding to the service requester that the service is available. 2. The computer program product as recited in claim 1, wherein the service request includes a required standard of service, wherein the program code further comprises the programming instructions for: in response to the service being registered but not having the required standard, sending a request to one or more service providers to provide a service having the required standard; and in response to a service provider providing the service having the required standard, updating the service registry with the new service and standard of service. 3. The computer program product as recited in claim 2, where the standard of service is a service property meeting a required threshold. 4. The computer program product as recited in claim 3, wherein the service property is one or more of the following: a rate of performing the service; a cost of the service; and a number of service instances provided. 5. The computer program product as recited in claim 1, wherein the program code further comprises the programming instructions for: in response to the service requested not being registered, sending the service request to one or more subsequent service registries to provide a service provider for the service. 6. The computer program product as recited in claim 5, wherein the program code further comprises the programming instructions for: sending located service information to the one or more subsequent service registries so that the one or more subsequent service registries can use previously located service information and subsequently locate service information to choose the service provider. 7. The computer program product as recited in claim 1, wherein the program code further comprises the programming instructions for: mediating between the service requester and the service provider, wherein the service requester does not receive a service endpoint of the service provider but uses the service through a service management layer. 8. The computer program product as recited in claim 1, wherein the service requester receives a service endpoint and requests the service directly from the service provider. 9. A system, comprising: a memory unit for storing a computer program for operating a service registry in a service oriented architecture and managing a service within the service oriented architecture; and a processor coupled to the memory unit, wherein the processor is configured to execute the program instructions of the computer program comprising: receiving a request for a service from a service requester in the environment; checking details of the requested service as registered in the service registry; characterized by; in response to the service requested not being registered, sending the request to one or more service providers to provide a new service; and in response to a service provider providing the new service, updating the service registry with the new service and responding to the service requester that the service is available. 10. The system as recited in claim 9, wherein the service request includes a required standard of service, wherein the program instructions of the computer program further comprise: in response to the service being registered but not having the required standard, sending a request to one or more service providers to provide a service having the required standard; and in response to a service provider providing the service having the required standard, updating the service registry with the new service and standard of service. 11. The system as recited in claim 10, where the standard of service is a service property meeting a required threshold. 12. The system as recited in claim 11, wherein the service property is one or more of the following: a rate of performing the service; a cost of the service; and a number of service instances provided. 13. The system as recited in claim 9, wherein the program instructions of the computer program further comprise: in response to the service requested not being registered, sending the service request to one or more subsequent service registries to provide a service provider for the service. 14. The system as recited in claim 13, wherein the program instructions of the computer program further comprise: sending located service information to the one or more subsequent service registries so that the one or more subsequent service registries can use previously located service information and subsequently locate service information to choose the service provider. 15. The system as recited in claim 9, wherein the program instructions of the computer program further comprise: mediating between the service requester and the service provider, wherein the service requester does not receive a service endpoint of the service provider but uses the service through a service management layer. 16. The system as recited in claim 9, wherein the service requester receives a service endpoint and requests the service directly from the service provider.
A method, operable by a service registry in a service orientated architecture system, for providing a service within the system. A service request is received from a service requester in the system. The status of the service is checked as registered in the service registry. In response to the service not having a registered service endpoint or a property of the service falling below a defined threshold, a request is sent to service providers or subsequent service registries to provide a new service and according to the defined threshold. In response to a service provider providing the new service according to the defined standard, the service registry is updated with the new service and responding to the service requester that the service is available. The embodiments allow both direct interaction between the requester and provider or indirect interaction via a service management layer.1. A computer program product for operating a service registry in a service oriented architecture system and managing a service within the system, the computer program product comprising a computer readable storage medium having program code embodied therewith, the program code comprising the programming instructions for: receiving a request for a service from a service requester in the environment; checking details of the requested service as registered in the service registry; characterized by; in response to the service requested not being registered, sending the request to one or more service providers to provide a new service; and in response to a service provider providing the new service, updating the service registry with the new service and responding to the service requester that the service is available. 2. The computer program product as recited in claim 1, wherein the service request includes a required standard of service, wherein the program code further comprises the programming instructions for: in response to the service being registered but not having the required standard, sending a request to one or more service providers to provide a service having the required standard; and in response to a service provider providing the service having the required standard, updating the service registry with the new service and standard of service. 3. The computer program product as recited in claim 2, where the standard of service is a service property meeting a required threshold. 4. The computer program product as recited in claim 3, wherein the service property is one or more of the following: a rate of performing the service; a cost of the service; and a number of service instances provided. 5. The computer program product as recited in claim 1, wherein the program code further comprises the programming instructions for: in response to the service requested not being registered, sending the service request to one or more subsequent service registries to provide a service provider for the service. 6. The computer program product as recited in claim 5, wherein the program code further comprises the programming instructions for: sending located service information to the one or more subsequent service registries so that the one or more subsequent service registries can use previously located service information and subsequently locate service information to choose the service provider. 7. The computer program product as recited in claim 1, wherein the program code further comprises the programming instructions for: mediating between the service requester and the service provider, wherein the service requester does not receive a service endpoint of the service provider but uses the service through a service management layer. 8. The computer program product as recited in claim 1, wherein the service requester receives a service endpoint and requests the service directly from the service provider. 9. A system, comprising: a memory unit for storing a computer program for operating a service registry in a service oriented architecture and managing a service within the service oriented architecture; and a processor coupled to the memory unit, wherein the processor is configured to execute the program instructions of the computer program comprising: receiving a request for a service from a service requester in the environment; checking details of the requested service as registered in the service registry; characterized by; in response to the service requested not being registered, sending the request to one or more service providers to provide a new service; and in response to a service provider providing the new service, updating the service registry with the new service and responding to the service requester that the service is available. 10. The system as recited in claim 9, wherein the service request includes a required standard of service, wherein the program instructions of the computer program further comprise: in response to the service being registered but not having the required standard, sending a request to one or more service providers to provide a service having the required standard; and in response to a service provider providing the service having the required standard, updating the service registry with the new service and standard of service. 11. The system as recited in claim 10, where the standard of service is a service property meeting a required threshold. 12. The system as recited in claim 11, wherein the service property is one or more of the following: a rate of performing the service; a cost of the service; and a number of service instances provided. 13. The system as recited in claim 9, wherein the program instructions of the computer program further comprise: in response to the service requested not being registered, sending the service request to one or more subsequent service registries to provide a service provider for the service. 14. The system as recited in claim 13, wherein the program instructions of the computer program further comprise: sending located service information to the one or more subsequent service registries so that the one or more subsequent service registries can use previously located service information and subsequently locate service information to choose the service provider. 15. The system as recited in claim 9, wherein the program instructions of the computer program further comprise: mediating between the service requester and the service provider, wherein the service requester does not receive a service endpoint of the service provider but uses the service through a service management layer. 16. The system as recited in claim 9, wherein the service requester receives a service endpoint and requests the service directly from the service provider.
2,400
7,008
7,008
13,927,524
2,468
A unified messaging system, method and user interface is provided for a handheld mobile communication device. The method may include the following steps: (a) receiving a notification signal at the wireless device via the wireless data channel indicating that the unified messaging system received and stored a voice mail message intended for a user of the wireless device; (b) transmitting a command signal from the wireless device to the unified messaging system via the wireless data channel, the command signal including a message retrieval command; (c) receiving via the wireless voice channel a voice call initiated by a voice mail system component of the unified messaging system in response to the message retrieval command transmitted from the wireless device; and (d) receiving the voice mail message from the unified messaging system via the wireless voice channel.
1. A method of multi-party communication using a wireless device, the method comprising: transmitting a conference request command over a data network to a unified messaging system; receiving a voice call at the wireless device from the unified messaging system, the voice call initiated by the unified messaging system in response to the transmitted conference request command from the wireless device; and receiving a voice call connection with a second wireless device and a third wireless device. 2. The method according to claim 1, wherein receiving a voice call connection with a second wireless device and a third wireless device comprises: receiving a voice connection between the second wireless device and the unified messaging system; and receiving a voice connection between the third wireless device and the unified messaging system. 3. The method according to claim 2, wherein the voice connection between the second wireless device and the unified messaging system was initiated by the unified messaging system and the voice connection between the third wireless device and the unified messaging system was initiated by the unified messaging system. 4. The method according to claim 1, wherein the conference request command includes a telephone number associated with the wireless device. 5. The method according to claim 1, wherein the conference request command includes a telephone number associated with the second wireless device and a telephone number associated with a third wireless device. 6. A method of multi-party communication using a unified messaging system, the method comprising: receiving a conference request command at the unified messaging center from a wireless device over a data network; making a voice call to the wireless device from the unified messaging system, the voice call initiated by the unified messaging system in response to the transmitted conference request command from the wireless device; and connecting a second wireless device and a third wireless device to the voice call. 7. The method according to claim 6, wherein connecting a second wireless device and a third wireless device to the voice call comprises: connecting to the voice call a voice connection between the second wireless device and the unified messaging system; and connecting to the voice call a voice connection between the third wireless device and the unified messaging system. 8. The method according to claim 6, wherein connecting a second wireless device and a third wireless device to the voice call comprises: making a second voice call to the second wireless device; and making a third voice call to the third wireless device. 9. The method according to claim 6, wherein the conference request command includes a telephone number associated with the wireless device. 10. The method according to claim 6, wherein the conference request command includes a telephone number associated with the second wireless device and a telephone number associated with a third wireless device. 11. A method of multi-party communication using a wireless device, the method comprising: receiving at a wireless device from a unified messaging system via a data network a voice call notification signal indicating that a voice call is on hold; transmitting an instruction command to the unified messaging system via the data network directing the unified messaging system on how to handle the call; and receiving the voice call from the unified messaging system when the instruction command requests that the voice call be redirected to the wireless device. 12. The method according to claim 11, wherein the instruction command can instruct the unified messaging system to send the voice call to voice mail. 13. The method according to claim 11, wherein the instruction command can instruct the unified messaging system to disconnect the voice call. 14. The method according to claim 11, wherein the voice call notification signal includes the caller ID of the caller. 15. The method according to claim 11, wherein the voice call notification signal includes matching name information from a locally stored address book. 16. A method of multi-party communication using a unified messaging system, the method comprising: transmitting to a wireless device from a unified messaging system via a data network a voice call notification signal indicating that a voice call is on hold; receiving from the wireless device via the data network an instruction command with instructions on how to handle the voice call; and redirecting the voice call to the wireless device when the instruction command requests that the voice call be redirected to the wireless device. 17. The method according to claim 16, wherein the instruction command can instruct the unified messaging system to send the voice call to voice mail. 18. The method according to claim 16, wherein the instruction command can instruct the unified messaging system to disconnect the voice call. 19. The method according to claim 16, further comprising: receiving the voice call; and placing the voice call on hold. 20. The method accord to claim 19, further comprising: playing a message to the calling party while the voice call is on hold.
A unified messaging system, method and user interface is provided for a handheld mobile communication device. The method may include the following steps: (a) receiving a notification signal at the wireless device via the wireless data channel indicating that the unified messaging system received and stored a voice mail message intended for a user of the wireless device; (b) transmitting a command signal from the wireless device to the unified messaging system via the wireless data channel, the command signal including a message retrieval command; (c) receiving via the wireless voice channel a voice call initiated by a voice mail system component of the unified messaging system in response to the message retrieval command transmitted from the wireless device; and (d) receiving the voice mail message from the unified messaging system via the wireless voice channel.1. A method of multi-party communication using a wireless device, the method comprising: transmitting a conference request command over a data network to a unified messaging system; receiving a voice call at the wireless device from the unified messaging system, the voice call initiated by the unified messaging system in response to the transmitted conference request command from the wireless device; and receiving a voice call connection with a second wireless device and a third wireless device. 2. The method according to claim 1, wherein receiving a voice call connection with a second wireless device and a third wireless device comprises: receiving a voice connection between the second wireless device and the unified messaging system; and receiving a voice connection between the third wireless device and the unified messaging system. 3. The method according to claim 2, wherein the voice connection between the second wireless device and the unified messaging system was initiated by the unified messaging system and the voice connection between the third wireless device and the unified messaging system was initiated by the unified messaging system. 4. The method according to claim 1, wherein the conference request command includes a telephone number associated with the wireless device. 5. The method according to claim 1, wherein the conference request command includes a telephone number associated with the second wireless device and a telephone number associated with a third wireless device. 6. A method of multi-party communication using a unified messaging system, the method comprising: receiving a conference request command at the unified messaging center from a wireless device over a data network; making a voice call to the wireless device from the unified messaging system, the voice call initiated by the unified messaging system in response to the transmitted conference request command from the wireless device; and connecting a second wireless device and a third wireless device to the voice call. 7. The method according to claim 6, wherein connecting a second wireless device and a third wireless device to the voice call comprises: connecting to the voice call a voice connection between the second wireless device and the unified messaging system; and connecting to the voice call a voice connection between the third wireless device and the unified messaging system. 8. The method according to claim 6, wherein connecting a second wireless device and a third wireless device to the voice call comprises: making a second voice call to the second wireless device; and making a third voice call to the third wireless device. 9. The method according to claim 6, wherein the conference request command includes a telephone number associated with the wireless device. 10. The method according to claim 6, wherein the conference request command includes a telephone number associated with the second wireless device and a telephone number associated with a third wireless device. 11. A method of multi-party communication using a wireless device, the method comprising: receiving at a wireless device from a unified messaging system via a data network a voice call notification signal indicating that a voice call is on hold; transmitting an instruction command to the unified messaging system via the data network directing the unified messaging system on how to handle the call; and receiving the voice call from the unified messaging system when the instruction command requests that the voice call be redirected to the wireless device. 12. The method according to claim 11, wherein the instruction command can instruct the unified messaging system to send the voice call to voice mail. 13. The method according to claim 11, wherein the instruction command can instruct the unified messaging system to disconnect the voice call. 14. The method according to claim 11, wherein the voice call notification signal includes the caller ID of the caller. 15. The method according to claim 11, wherein the voice call notification signal includes matching name information from a locally stored address book. 16. A method of multi-party communication using a unified messaging system, the method comprising: transmitting to a wireless device from a unified messaging system via a data network a voice call notification signal indicating that a voice call is on hold; receiving from the wireless device via the data network an instruction command with instructions on how to handle the voice call; and redirecting the voice call to the wireless device when the instruction command requests that the voice call be redirected to the wireless device. 17. The method according to claim 16, wherein the instruction command can instruct the unified messaging system to send the voice call to voice mail. 18. The method according to claim 16, wherein the instruction command can instruct the unified messaging system to disconnect the voice call. 19. The method according to claim 16, further comprising: receiving the voice call; and placing the voice call on hold. 20. The method accord to claim 19, further comprising: playing a message to the calling party while the voice call is on hold.
2,400
7,009
7,009
15,363,449
2,491
An information processing device including a communication interface that exchanges data with a first device and a second device; and a processor that performs authentication of the first device; receives content data from the first device via the communication interface; and controls the communication interface to send the content data in real time to the second device based on an access control setting, which indicates a restriction on sending the content data.
1. One or more servers comprising: circuitry configured to transmit, to a client device corresponding to a first user, one or more interface screens comprising an input item corresponding to content, the input item including at least an access control setting corresponding to the content, wherein the access control setting is independently selectable from at least a first access control setting, a second access control setting and a third access control setting, each corresponding to a different access control setting, one of the first access control setting, the second access control setting or the third access control setting corresponds to a public access control setting, and the circuitry is further configured to receive, from the client device, information corresponding to the input item; and update a webpage associated with the content when the public access control setting is selected. 2. The one or more server of claim 1, wherein the webpage includes a link to access the content. 3. The one or more server of claim 1, wherein one of the first access control setting, the second access control setting or the third access control setting corresponds to a friend access control setting, a list of friends are permitted to access the content when the friend access control setting is selected. 4. The one or more server of claim 1, wherein the content is image data. 5. The one or more servers of claim 1, wherein the input items further include a category corresponding to the content. 6. The one or more servers of claim 1, wherein the input items further comprise a text description corresponding to the content. 7. The one or more servers of claim 6, wherein the text description is limited to a predetermined number of characters. 8. The one or more servers of claim 1, wherein one of the first access control setting, the second access control setting or the third access control setting corresponds to a control setting requiring a password to access the content. 9. The one or more servers of claim 8, wherein entry of a valid password is required to access the content when the control setting requiring the password to access the content is selected. 10. The one or more servers of claim 1, wherein the input items further include a category corresponding to the content and a text description corresponding to the content, the text description is limited to a predetermined number of characters, and the circuitry is configured to update the webpage by incorporating the text description corresponding to the content. 11. The one or more servers of claim 1, wherein the one or more servers is one single server. 12. The one or more servers of claim 1, wherein the one or more servers includes a plurality of servers. 13. The one or more servers of claim 1, wherein the first access control setting corresponds to a public access control setting, and the second access control setting corresponds to a private access control setting. 14. The one or more servers of claim 1, wherein the one or more interface screens are configured to simultaneously display selection items corresponding to the first access control setting, the second access control setting and the third access control setting. 15. One or more servers comprising: circuitry configured to transmit, to a client device of a first user, one or more interface screens comprising input items corresponding to content, the input items including at least a text description corresponding to the content and an access control setting corresponding to the content, wherein the text description is limited to a predetermined number of characters, the access control setting is independently selectable from at least a first access control setting, a second access control setting and a third access control setting, each corresponding to a different access control setting, one of the first access control setting, the second access control setting or the third access control setting corresponds to a public access control setting, and the circuitry is further configured to receive, from the client device, information corresponding to the input items; and update a webpage associated with the content when the public access control setting is selected. 16. The one or more server of claim 15, wherein one of the first access control setting, the second access control setting or the third access control setting corresponds to a friend access control setting, a list of friends are permitted to access the content when the friend access control setting is selected. 17. A method performed by one or more servers, the method comprising: transmitting, to a client device of a first user, one or more interface screens comprising an input item corresponding to content, the input item including at least an access control setting corresponding to the content, wherein the access control setting is independently selectable from at least a first access control setting, a second access control setting and a third access control setting, each corresponding to a different access control setting, and one of the first access control setting, the second access control setting or the third access control setting corresponds to a public access control setting; receiving, from the client device, information corresponding to the input item; and updating a webpage associated with the content when the public access control setting is selected. 18. The method of claim 17, wherein the webpage includes a link to access the content. 19. The method of claim 17, wherein one of the first access control setting, the second access control setting or the third access control setting corresponds to a friend access control setting, a list of friends are permitted to access the content when the friend access control setting is selected. 20. The method of claim 17, wherein the content is image data.
An information processing device including a communication interface that exchanges data with a first device and a second device; and a processor that performs authentication of the first device; receives content data from the first device via the communication interface; and controls the communication interface to send the content data in real time to the second device based on an access control setting, which indicates a restriction on sending the content data.1. One or more servers comprising: circuitry configured to transmit, to a client device corresponding to a first user, one or more interface screens comprising an input item corresponding to content, the input item including at least an access control setting corresponding to the content, wherein the access control setting is independently selectable from at least a first access control setting, a second access control setting and a third access control setting, each corresponding to a different access control setting, one of the first access control setting, the second access control setting or the third access control setting corresponds to a public access control setting, and the circuitry is further configured to receive, from the client device, information corresponding to the input item; and update a webpage associated with the content when the public access control setting is selected. 2. The one or more server of claim 1, wherein the webpage includes a link to access the content. 3. The one or more server of claim 1, wherein one of the first access control setting, the second access control setting or the third access control setting corresponds to a friend access control setting, a list of friends are permitted to access the content when the friend access control setting is selected. 4. The one or more server of claim 1, wherein the content is image data. 5. The one or more servers of claim 1, wherein the input items further include a category corresponding to the content. 6. The one or more servers of claim 1, wherein the input items further comprise a text description corresponding to the content. 7. The one or more servers of claim 6, wherein the text description is limited to a predetermined number of characters. 8. The one or more servers of claim 1, wherein one of the first access control setting, the second access control setting or the third access control setting corresponds to a control setting requiring a password to access the content. 9. The one or more servers of claim 8, wherein entry of a valid password is required to access the content when the control setting requiring the password to access the content is selected. 10. The one or more servers of claim 1, wherein the input items further include a category corresponding to the content and a text description corresponding to the content, the text description is limited to a predetermined number of characters, and the circuitry is configured to update the webpage by incorporating the text description corresponding to the content. 11. The one or more servers of claim 1, wherein the one or more servers is one single server. 12. The one or more servers of claim 1, wherein the one or more servers includes a plurality of servers. 13. The one or more servers of claim 1, wherein the first access control setting corresponds to a public access control setting, and the second access control setting corresponds to a private access control setting. 14. The one or more servers of claim 1, wherein the one or more interface screens are configured to simultaneously display selection items corresponding to the first access control setting, the second access control setting and the third access control setting. 15. One or more servers comprising: circuitry configured to transmit, to a client device of a first user, one or more interface screens comprising input items corresponding to content, the input items including at least a text description corresponding to the content and an access control setting corresponding to the content, wherein the text description is limited to a predetermined number of characters, the access control setting is independently selectable from at least a first access control setting, a second access control setting and a third access control setting, each corresponding to a different access control setting, one of the first access control setting, the second access control setting or the third access control setting corresponds to a public access control setting, and the circuitry is further configured to receive, from the client device, information corresponding to the input items; and update a webpage associated with the content when the public access control setting is selected. 16. The one or more server of claim 15, wherein one of the first access control setting, the second access control setting or the third access control setting corresponds to a friend access control setting, a list of friends are permitted to access the content when the friend access control setting is selected. 17. A method performed by one or more servers, the method comprising: transmitting, to a client device of a first user, one or more interface screens comprising an input item corresponding to content, the input item including at least an access control setting corresponding to the content, wherein the access control setting is independently selectable from at least a first access control setting, a second access control setting and a third access control setting, each corresponding to a different access control setting, and one of the first access control setting, the second access control setting or the third access control setting corresponds to a public access control setting; receiving, from the client device, information corresponding to the input item; and updating a webpage associated with the content when the public access control setting is selected. 18. The method of claim 17, wherein the webpage includes a link to access the content. 19. The method of claim 17, wherein one of the first access control setting, the second access control setting or the third access control setting corresponds to a friend access control setting, a list of friends are permitted to access the content when the friend access control setting is selected. 20. The method of claim 17, wherein the content is image data.
2,400
7,010
7,010
13,146,776
2,466
The present invention relates to a method for providing a communication connection, comprising determining a unique connection ID, storing the unique connection ID in a first communication entity and providing the unique connection ID to a second communication entity for establishing of a communication connection.
1. Method (30) for providing a communication connection, comprising: determining (31) a unique connection ID; storing (32) the unique connection ID in a first communication entity; and providing (33) the unique connection ID to a second communication entity for establishing of a communication connection identified by the unique connection ID. 2. Method according to claim 1, comprising: providing (34) to the second communication entity an indication for a handover of the communication connection identified by the unique connection ID; handover (35) of the communication connection identified by the unique connection ID between the first communication entity and a third communication entity. 3. Method according to claim 1, wherein at least one communication entity is one out of the group consisting of a mobile communication device, a network node, a routing device, a gateway, a user equipment, a mobility management entity, a serving gateway and a packet data network gateway. 4. Method according to claim 1, wherein the unique connection ID comprises a mobile node ID, an access point name and at least one element out of the group consisting of a packet data network connection information, a packet data network connection tag, a bearer ID, a GREkey and an uplink GREkey. 5. Method according to claim 1, wherein the communication connection is a communication connection according to the Proxy Mobile IP protocol. 6. Method according to claim 1, wherein the transmission of the indication for establishing and/or handover of a communication connection identified by the unique connection ID is performed by using a Proxy Binding Update message. 7. Method according to claim 6, wherein the transmission of the indication for establishing and/or handover of a communication connection identified by the unique connection ID is performed at least in part by using a Vendor Specific Mobility Option of the Proxy Binding Update message. 8. Communication entity (20), comprising: a determination unit (21) for determining a unique connection ID; a storing unit (22) for storing the unique connection ID; and a sending and receiving unit (23) adapted to transmit an indication for establishing or handover of a communication connection (24) identified by the unique connection ID. 9. Communication entity according to claim 8, wherein the communication entity (20) is at least one out of the group consisting of a mobile communication device, a network node, a routing device, a gateway, a user equipment, a mobility management entity, a serving gateway and a packet data network gateway. 10. Communication entity according to claim 8, wherein the unique connection ID comprises a mobile node ID, an access point name and at least one element out of the group consisting of a packet data network connection information, a packet data network connection tag, a bearer ID, a GREkey and an uplink GREkey. 11. Communication entity according to claim 8, wherein the communication connection (24) is a communication connection (24) according to the Proxy Mobile IP protocol. 12. Communication entity according to claim 8, wherein the sending and receiving unit (23) is further adapted to transmit an indication for handover of a communication connection (24) identified by the unique connection ID. 13. Use of a unique connection ID for identifying a communication connection according to the Proxy Mobile IP protocol between a serving gateway and a packet data network gateway. 14. A computer-readable medium, in which a computer program is stored, which, when being executed by a processor, is adapted to carry out the method according to claim 1. 15. A program element, which, when being executed by a processor, is adapted to carry out the method according to claim 1.
The present invention relates to a method for providing a communication connection, comprising determining a unique connection ID, storing the unique connection ID in a first communication entity and providing the unique connection ID to a second communication entity for establishing of a communication connection.1. Method (30) for providing a communication connection, comprising: determining (31) a unique connection ID; storing (32) the unique connection ID in a first communication entity; and providing (33) the unique connection ID to a second communication entity for establishing of a communication connection identified by the unique connection ID. 2. Method according to claim 1, comprising: providing (34) to the second communication entity an indication for a handover of the communication connection identified by the unique connection ID; handover (35) of the communication connection identified by the unique connection ID between the first communication entity and a third communication entity. 3. Method according to claim 1, wherein at least one communication entity is one out of the group consisting of a mobile communication device, a network node, a routing device, a gateway, a user equipment, a mobility management entity, a serving gateway and a packet data network gateway. 4. Method according to claim 1, wherein the unique connection ID comprises a mobile node ID, an access point name and at least one element out of the group consisting of a packet data network connection information, a packet data network connection tag, a bearer ID, a GREkey and an uplink GREkey. 5. Method according to claim 1, wherein the communication connection is a communication connection according to the Proxy Mobile IP protocol. 6. Method according to claim 1, wherein the transmission of the indication for establishing and/or handover of a communication connection identified by the unique connection ID is performed by using a Proxy Binding Update message. 7. Method according to claim 6, wherein the transmission of the indication for establishing and/or handover of a communication connection identified by the unique connection ID is performed at least in part by using a Vendor Specific Mobility Option of the Proxy Binding Update message. 8. Communication entity (20), comprising: a determination unit (21) for determining a unique connection ID; a storing unit (22) for storing the unique connection ID; and a sending and receiving unit (23) adapted to transmit an indication for establishing or handover of a communication connection (24) identified by the unique connection ID. 9. Communication entity according to claim 8, wherein the communication entity (20) is at least one out of the group consisting of a mobile communication device, a network node, a routing device, a gateway, a user equipment, a mobility management entity, a serving gateway and a packet data network gateway. 10. Communication entity according to claim 8, wherein the unique connection ID comprises a mobile node ID, an access point name and at least one element out of the group consisting of a packet data network connection information, a packet data network connection tag, a bearer ID, a GREkey and an uplink GREkey. 11. Communication entity according to claim 8, wherein the communication connection (24) is a communication connection (24) according to the Proxy Mobile IP protocol. 12. Communication entity according to claim 8, wherein the sending and receiving unit (23) is further adapted to transmit an indication for handover of a communication connection (24) identified by the unique connection ID. 13. Use of a unique connection ID for identifying a communication connection according to the Proxy Mobile IP protocol between a serving gateway and a packet data network gateway. 14. A computer-readable medium, in which a computer program is stored, which, when being executed by a processor, is adapted to carry out the method according to claim 1. 15. A program element, which, when being executed by a processor, is adapted to carry out the method according to claim 1.
2,400
7,011
7,011
14,267,808
2,454
Disclosed are systems, methods, and non-transitory computer-readable storage media for sharing a media station. A user can share a media station with one or more other users. The sharing user can transmit a share request to share the media station with receiving users. A share link configured to provide access to the shared media station can then be sent to each receiving user. In some embodiments, the shared media station can be tailored or customized for the receiving user. For example, the shared media station can be tailored based on user preference data for the receiving user. To customize the shared media station, a new version of the shared media station can be generated based on one or more media station seeds that define the media station, as well as the user preference data. The newly generated version of the media station can then be provided to the receiving user.
1. A method comprising: receiving, by a processor, from a first client device, a share request to share a first media station with a second client device, wherein: the first media station is defined by at least one media station seed, and the first client device is presented with a first version of the first media station that was generated based on the at least one media station seed and a first set of user preferences associated with the first client device; generating, by the processor, a second version of the first media station based on the at least one media station seed and a second set of user preferences associated with the second client device; and providing, by the processor, the second version of the first media station to the second client device. 2. The method of claim 1, further comprising: identifying a user account associated with the second client device; and gathering the second set of user preferences from the user account associated with the second client device. 3. The method of claim 2, further comprising: receiving, from the second client device, a request to add the second version of the first media station to the second user account; and adding the second version of the first media station to the second user account, wherein when added to the second user account, the second version of the first media station is made available to client devices authorized to access the second user account. 4. The method of claim 1, further comprising: receiving, from the second client device, a suggested media station seed; generating a first version of a second media station based on the at least one media station seed defining the first media station, the suggested media station seed and the first set of user preferences; and providing the first version of the second media station to the first client device. 5. The method of claim 4, further comprising: generating a second version of a second media station based on the at least one media station seed defining the first media station, the suggested media station seed and the second set of user preferences; and providing the second version of the second media station to the second client device. 6. The method of claim 1, wherein generating the second version of the first media station comprises: determining, from the second set of user preferences, that a first artist should be excluded from the first media station, wherein the second version of the first media station is generated to exclude media items authored by the first artist. 7. The method of claim 1, further comprising: determining, based on the second set of user preferences, that an artist included in second version of the first media station is liked by a user of the second client device; selecting an image of the artist included in the second version of the first media station; and providing, to the second client device, the image of the artist along with the second version of the first media station, wherein the image is presented by the second client device along with the second version of the first media station. 8. A system comprising: a processor; and a memory containing instructions that, when executed, cause the processor to: receive, from a first client device, a share request to share a first media station with a second client device, wherein: the first media station is defined by at least one media station seed, and the first client device is presented with a first version of the first media station that was generated based on the at least one media station seed and a first set of user preferences associated with the first client device; generate a second version of the first media station based on the at least one media station seed and a second set of user preferences associated with the second client device; and provide the second version of the first media station to the second client device. 9. The system of claim 8, wherein the instructions further cause the processor to: identify a user account associated with the second client device; and gather the second set of user preferences from the user account associated with the second client device. 10. The system of claim 9, wherein the instructions further cause the processor to: receive, from the second client device, a request to add the second version of the first media station to the second user account; and add the second version of the first media station to the second user account, wherein when added to the second user account, the second version of the first media station is made available to client devices authorized to access the second user account. 11. The system of claim 8, wherein the instructions further cause the processor to: receiving, from the second client device, a suggested media station seed; generating a first version of a second media station based on the at least one media station seed defining the first media station, the suggested media station seed and the first set of user preferences; and provide the first version of the second media station to the first client device. 12. The system of claim 11, wherein the instructions further cause the processor to: generate a second version of a second media station based on the at least one media station seed defining the first media station, the suggested media station seed and the second set of user preferences; and provide the second version of the second media station to the second client device. 13. The system of claim 8, wherein generating the second version of the first media station comprises: determining, from the second set of user preferences, that a first artist should be excluded from the first media station, wherein the second version of the first media station is generated to exclude media items authored by the first artist. 14. The system of claim 8, wherein the instructions further cause the processor to: determine, based on the second set of user preferences, that an artist included in second version of the first media station is liked by a user of the second client device; select an image of the artist included in the second version of the first media station; and provide, to the second client device, the image of the artist along with the second version of the first media station, wherein the image is presented by the second client device along with the second version of the first media station. 15. A non-transitory computer-readable medium containing instructions that, when executed by a computing device, cause the computing device to: receive, from a first client device, a share request to share a first media station with a second client device, wherein: the first media station is defined by at least one media station seed, and the first client device is presented with a first version of the first media station that was generated based on the at least one media station seed and a first set of user preferences associated with the first client device; generate a second version of the first media station based on the at least one media station seed and a second set of user preferences associated with the second client device; and provide the second version of the first media station to the second client device. 16. The non-transitory computer-readable medium of claim 15, wherein the instructions further cause the computing device to: identify a user account associated with the second client device; and gather the second set of user preferences from the user account associated with the second client device. 17. The non-transitory computer-readable medium of claim 16, wherein the instructions further cause the computing device to: receive, from the second client device, a request to add the second version of the first media station to the second user account; and add the second version of the first media station to the second user account, wherein when added to the second user account, the second version of the first media station is made available to client devices authorized to access the second user account. 18. The non-transitory computer-readable medium of claim 15, wherein the instructions further cause the computing device to: receiving, from the second client device, a suggested media station seed; generating a first version of a second media station based on the at least one media station seed defining the first media station, the suggested media station seed and the first set of user preferences; and provide the first version of the second media station to the first client device. 19. The non-transitory computer-readable medium of claim 18, wherein the instructions further cause the computing device to: generate a second version of a second media station based on the at least one media station seed defining the first media station, the suggested media station seed and the second set of user preferences; and provide the second version of the second media station to the second client device. 20. The non-transitory computer-readable medium of claim 15, wherein generating the second version of the first media station comprises: determining, from the second set of user preferences, that a first artist should be excluded from the first media station, wherein the second version of the first media station is generated to exclude media items authored by the first artist. 21. A method comprising: receiving, from a media station service, by a second client device authorized on a second user account, a second version of a first media station that was shared with the second user account by a first user account, wherein: the first media station is defined by at least one media station seed, a first client device authorized on the first user account is presented with a first version of the first media station that was generated based on the at least one media station seed and a first set of user preferences associated with the first user account, and the second version of the first media station was generated based on the at least one media station seed and a second set of user preferences associated with the second user account; and presenting, by the second client device, the second version of the first media station. 22. The method of claim 21, further comprising: transmitting, to the media station server, a first suggested media station seed; and receiving, from the media station server, a first version of a second media station, wherein the first version of the second media station was generated from the one or media station seeds, the first suggested media station seed and the second set of user preferences. 23. The method of claim 22, wherein, after transmission of the suggested media station seed, the first client device is presented with a second version of the second media station, wherein the second version of the second media station was generated from the one or more media station seeds, the first suggested media station seed and the first set of user preferences. 24. The method of claim 23, further comprising: receiving, from the media station server, a second version of a third media station, wherein: the second version of the third media station was generated based on the one or media station seeds, the first suggested media station seed and a second suggested media station seed received by the media station server from the first client device; and presenting the second version of the third media station. 25. The method of claim 21, further comprising: transmitting, to the media station server, a request to add the second version of the first media station to the second user account, wherein when added to the second user account, the second version of the first media station is made available to client devices authorized to access the second user account.
Disclosed are systems, methods, and non-transitory computer-readable storage media for sharing a media station. A user can share a media station with one or more other users. The sharing user can transmit a share request to share the media station with receiving users. A share link configured to provide access to the shared media station can then be sent to each receiving user. In some embodiments, the shared media station can be tailored or customized for the receiving user. For example, the shared media station can be tailored based on user preference data for the receiving user. To customize the shared media station, a new version of the shared media station can be generated based on one or more media station seeds that define the media station, as well as the user preference data. The newly generated version of the media station can then be provided to the receiving user.1. A method comprising: receiving, by a processor, from a first client device, a share request to share a first media station with a second client device, wherein: the first media station is defined by at least one media station seed, and the first client device is presented with a first version of the first media station that was generated based on the at least one media station seed and a first set of user preferences associated with the first client device; generating, by the processor, a second version of the first media station based on the at least one media station seed and a second set of user preferences associated with the second client device; and providing, by the processor, the second version of the first media station to the second client device. 2. The method of claim 1, further comprising: identifying a user account associated with the second client device; and gathering the second set of user preferences from the user account associated with the second client device. 3. The method of claim 2, further comprising: receiving, from the second client device, a request to add the second version of the first media station to the second user account; and adding the second version of the first media station to the second user account, wherein when added to the second user account, the second version of the first media station is made available to client devices authorized to access the second user account. 4. The method of claim 1, further comprising: receiving, from the second client device, a suggested media station seed; generating a first version of a second media station based on the at least one media station seed defining the first media station, the suggested media station seed and the first set of user preferences; and providing the first version of the second media station to the first client device. 5. The method of claim 4, further comprising: generating a second version of a second media station based on the at least one media station seed defining the first media station, the suggested media station seed and the second set of user preferences; and providing the second version of the second media station to the second client device. 6. The method of claim 1, wherein generating the second version of the first media station comprises: determining, from the second set of user preferences, that a first artist should be excluded from the first media station, wherein the second version of the first media station is generated to exclude media items authored by the first artist. 7. The method of claim 1, further comprising: determining, based on the second set of user preferences, that an artist included in second version of the first media station is liked by a user of the second client device; selecting an image of the artist included in the second version of the first media station; and providing, to the second client device, the image of the artist along with the second version of the first media station, wherein the image is presented by the second client device along with the second version of the first media station. 8. A system comprising: a processor; and a memory containing instructions that, when executed, cause the processor to: receive, from a first client device, a share request to share a first media station with a second client device, wherein: the first media station is defined by at least one media station seed, and the first client device is presented with a first version of the first media station that was generated based on the at least one media station seed and a first set of user preferences associated with the first client device; generate a second version of the first media station based on the at least one media station seed and a second set of user preferences associated with the second client device; and provide the second version of the first media station to the second client device. 9. The system of claim 8, wherein the instructions further cause the processor to: identify a user account associated with the second client device; and gather the second set of user preferences from the user account associated with the second client device. 10. The system of claim 9, wherein the instructions further cause the processor to: receive, from the second client device, a request to add the second version of the first media station to the second user account; and add the second version of the first media station to the second user account, wherein when added to the second user account, the second version of the first media station is made available to client devices authorized to access the second user account. 11. The system of claim 8, wherein the instructions further cause the processor to: receiving, from the second client device, a suggested media station seed; generating a first version of a second media station based on the at least one media station seed defining the first media station, the suggested media station seed and the first set of user preferences; and provide the first version of the second media station to the first client device. 12. The system of claim 11, wherein the instructions further cause the processor to: generate a second version of a second media station based on the at least one media station seed defining the first media station, the suggested media station seed and the second set of user preferences; and provide the second version of the second media station to the second client device. 13. The system of claim 8, wherein generating the second version of the first media station comprises: determining, from the second set of user preferences, that a first artist should be excluded from the first media station, wherein the second version of the first media station is generated to exclude media items authored by the first artist. 14. The system of claim 8, wherein the instructions further cause the processor to: determine, based on the second set of user preferences, that an artist included in second version of the first media station is liked by a user of the second client device; select an image of the artist included in the second version of the first media station; and provide, to the second client device, the image of the artist along with the second version of the first media station, wherein the image is presented by the second client device along with the second version of the first media station. 15. A non-transitory computer-readable medium containing instructions that, when executed by a computing device, cause the computing device to: receive, from a first client device, a share request to share a first media station with a second client device, wherein: the first media station is defined by at least one media station seed, and the first client device is presented with a first version of the first media station that was generated based on the at least one media station seed and a first set of user preferences associated with the first client device; generate a second version of the first media station based on the at least one media station seed and a second set of user preferences associated with the second client device; and provide the second version of the first media station to the second client device. 16. The non-transitory computer-readable medium of claim 15, wherein the instructions further cause the computing device to: identify a user account associated with the second client device; and gather the second set of user preferences from the user account associated with the second client device. 17. The non-transitory computer-readable medium of claim 16, wherein the instructions further cause the computing device to: receive, from the second client device, a request to add the second version of the first media station to the second user account; and add the second version of the first media station to the second user account, wherein when added to the second user account, the second version of the first media station is made available to client devices authorized to access the second user account. 18. The non-transitory computer-readable medium of claim 15, wherein the instructions further cause the computing device to: receiving, from the second client device, a suggested media station seed; generating a first version of a second media station based on the at least one media station seed defining the first media station, the suggested media station seed and the first set of user preferences; and provide the first version of the second media station to the first client device. 19. The non-transitory computer-readable medium of claim 18, wherein the instructions further cause the computing device to: generate a second version of a second media station based on the at least one media station seed defining the first media station, the suggested media station seed and the second set of user preferences; and provide the second version of the second media station to the second client device. 20. The non-transitory computer-readable medium of claim 15, wherein generating the second version of the first media station comprises: determining, from the second set of user preferences, that a first artist should be excluded from the first media station, wherein the second version of the first media station is generated to exclude media items authored by the first artist. 21. A method comprising: receiving, from a media station service, by a second client device authorized on a second user account, a second version of a first media station that was shared with the second user account by a first user account, wherein: the first media station is defined by at least one media station seed, a first client device authorized on the first user account is presented with a first version of the first media station that was generated based on the at least one media station seed and a first set of user preferences associated with the first user account, and the second version of the first media station was generated based on the at least one media station seed and a second set of user preferences associated with the second user account; and presenting, by the second client device, the second version of the first media station. 22. The method of claim 21, further comprising: transmitting, to the media station server, a first suggested media station seed; and receiving, from the media station server, a first version of a second media station, wherein the first version of the second media station was generated from the one or media station seeds, the first suggested media station seed and the second set of user preferences. 23. The method of claim 22, wherein, after transmission of the suggested media station seed, the first client device is presented with a second version of the second media station, wherein the second version of the second media station was generated from the one or more media station seeds, the first suggested media station seed and the first set of user preferences. 24. The method of claim 23, further comprising: receiving, from the media station server, a second version of a third media station, wherein: the second version of the third media station was generated based on the one or media station seeds, the first suggested media station seed and a second suggested media station seed received by the media station server from the first client device; and presenting the second version of the third media station. 25. The method of claim 21, further comprising: transmitting, to the media station server, a request to add the second version of the first media station to the second user account, wherein when added to the second user account, the second version of the first media station is made available to client devices authorized to access the second user account.
2,400
7,012
7,012
13,662,173
2,439
Techniques for signer-initiated electronic document signing via an electronic signature service using a mobile or other client device are described. Example embodiments provide an electronic signature service (“ESS”) configured to facilitate the creation, storage, and management of documents and corresponding electronic signatures. In some embodiments, when a signer user receives a hard copy (e.g., paper) signature document, the signer may capture an image of the signature document with a camera of a mobile device. The signer can then import the captured image into the ESS for signature, storage, and/or transmission to other parties.
1. A method for facilitating electronic signatures on a client device that is operated by a signer and that is communicatively coupled to a camera, comprising: by the client device, capturing an image of a signature document with the camera; causing the captured image of the signature document to be stored at a remote electronic signature service as an electronic signature document; and causing an electronic signature of the signer to be stored in association with the electronic signature document stored at the remote electronic signature service. 2. The method of claim 1, wherein capturing an image of a signature document includes receiving image data from the camera, the image data representing at least one page of the signature document. 3. The method of claim 1, further comprising presenting the captured image on a display of the client device for review by the signer. 4. The method of claim 1, wherein the captured image is an image of a first page of the signature document, and further comprising: capturing an image that represents a second page of the signature document; and causing the captured image that represents the second page of the signature document to be stored at the electronic signature service as part of the electronic signature document. 5. The method of claim 1, wherein causing an electronic signature of the signer to be stored in association with the electronic signature document includes: receiving signature data from the signer; and causing the signature data to be stored by the electronic signature service along with the electronic signature document. 6. The method of claim 5, wherein causing the signature data to be stored by the electronic signature service includes transmitting the signature data along with the captured image to the electronic signature service. 7. The method of claim 5, wherein causing the signature data to be stored by the electronic signature service includes: receiving an image of the electronic signature document from the electronic signature service; presenting the image for review by the user; and receiving the signature data after the image is reviewed by the user; and transmitting the signature data to the electronic signature service. 8. The method of claim 1, further comprising causing the remote electronic signature service to provide access to the stored electronic signature document. 9. The method of claim 8, wherein causing the remote electronic signature service to provide access to the stored electronic signature document includes causing the electronic signature service to transmit to a recipient a message that includes a copy of the electronic signature document. 10. The method of claim 8, wherein causing the causing the remote electronic signature service to provide access to the stored electronic signature document includes causing the electronic signature service to transmit to a recipient a message that includes a link that can be used by the recipient to view the electronic signature document and/or the associated electronic signature of the signer. 11. The method of claim 1 wherein capturing the image of the signature document includes capturing an image of a paper document. 12. The method of claim 1, further comprising using a Web browser executing on the client device to access the electronic signature document stored at the remote electronic signature service and to cause the electronic signature of the signer to be stored in association with the electronic signature document. 13. The method of claim 1, further comprising automatically populating form fields in the electronic signature document based on prior form entries made by the signer. 14. A non-transitory computer-readable medium having contents that, when executed by a client device, facilitate electronic signatures via the client device by performing a method comprising: capturing an image of a signature document with an image capture device that is communicatively coupled to the client device; causing the captured image of the signature document to be stored at a remote electronic signature service as an electronic signature document; and causing an electronic signature of a signer to be stored in association with the electronic signature document stored at the remote electronic signature service. 15. The non-transitory computer-readable medium of claim 14, wherein the method further comprises: causing the electronic signature service to provide access to the electronic signature document to a person who is not an operator of the client device; causing the electronic signature service to receive signature data from the person. 16. A computing system configured to facilitate electronic signatures, comprising: a client device that has a memory and that is communicatively coupled to an image capture device; and a module stored on the memory that is configured, when executed by the client device, to: capture an image of a signature document with the image capture device; cause the captured image of the signature document to be stored at a remote electronic signature service as an electronic signature document; and cause an electronic signature of a signer to be stored in association with the electronic signature document stored at the remote electronic signature service. 17. The computing system of claim 16, wherein the image capture device is a scanner that is separate from the client device. 18. The computing system of claim 16, wherein the client device is a mobile computing device, and wherein the image capture device is a camera that is part of the client device. 19. The computing system of claim 18, wherein the mobile computing device is one of a smart phone, a tablet computer, or a laptop computer. 20. The computing system of claim 19, further comprising: an electronic signature service that is remote from the client device and that is configured to perform electronic signature management functions and to provide access to the electronic signature management functions via a Web browser executing on the client device.
Techniques for signer-initiated electronic document signing via an electronic signature service using a mobile or other client device are described. Example embodiments provide an electronic signature service (“ESS”) configured to facilitate the creation, storage, and management of documents and corresponding electronic signatures. In some embodiments, when a signer user receives a hard copy (e.g., paper) signature document, the signer may capture an image of the signature document with a camera of a mobile device. The signer can then import the captured image into the ESS for signature, storage, and/or transmission to other parties.1. A method for facilitating electronic signatures on a client device that is operated by a signer and that is communicatively coupled to a camera, comprising: by the client device, capturing an image of a signature document with the camera; causing the captured image of the signature document to be stored at a remote electronic signature service as an electronic signature document; and causing an electronic signature of the signer to be stored in association with the electronic signature document stored at the remote electronic signature service. 2. The method of claim 1, wherein capturing an image of a signature document includes receiving image data from the camera, the image data representing at least one page of the signature document. 3. The method of claim 1, further comprising presenting the captured image on a display of the client device for review by the signer. 4. The method of claim 1, wherein the captured image is an image of a first page of the signature document, and further comprising: capturing an image that represents a second page of the signature document; and causing the captured image that represents the second page of the signature document to be stored at the electronic signature service as part of the electronic signature document. 5. The method of claim 1, wherein causing an electronic signature of the signer to be stored in association with the electronic signature document includes: receiving signature data from the signer; and causing the signature data to be stored by the electronic signature service along with the electronic signature document. 6. The method of claim 5, wherein causing the signature data to be stored by the electronic signature service includes transmitting the signature data along with the captured image to the electronic signature service. 7. The method of claim 5, wherein causing the signature data to be stored by the electronic signature service includes: receiving an image of the electronic signature document from the electronic signature service; presenting the image for review by the user; and receiving the signature data after the image is reviewed by the user; and transmitting the signature data to the electronic signature service. 8. The method of claim 1, further comprising causing the remote electronic signature service to provide access to the stored electronic signature document. 9. The method of claim 8, wherein causing the remote electronic signature service to provide access to the stored electronic signature document includes causing the electronic signature service to transmit to a recipient a message that includes a copy of the electronic signature document. 10. The method of claim 8, wherein causing the causing the remote electronic signature service to provide access to the stored electronic signature document includes causing the electronic signature service to transmit to a recipient a message that includes a link that can be used by the recipient to view the electronic signature document and/or the associated electronic signature of the signer. 11. The method of claim 1 wherein capturing the image of the signature document includes capturing an image of a paper document. 12. The method of claim 1, further comprising using a Web browser executing on the client device to access the electronic signature document stored at the remote electronic signature service and to cause the electronic signature of the signer to be stored in association with the electronic signature document. 13. The method of claim 1, further comprising automatically populating form fields in the electronic signature document based on prior form entries made by the signer. 14. A non-transitory computer-readable medium having contents that, when executed by a client device, facilitate electronic signatures via the client device by performing a method comprising: capturing an image of a signature document with an image capture device that is communicatively coupled to the client device; causing the captured image of the signature document to be stored at a remote electronic signature service as an electronic signature document; and causing an electronic signature of a signer to be stored in association with the electronic signature document stored at the remote electronic signature service. 15. The non-transitory computer-readable medium of claim 14, wherein the method further comprises: causing the electronic signature service to provide access to the electronic signature document to a person who is not an operator of the client device; causing the electronic signature service to receive signature data from the person. 16. A computing system configured to facilitate electronic signatures, comprising: a client device that has a memory and that is communicatively coupled to an image capture device; and a module stored on the memory that is configured, when executed by the client device, to: capture an image of a signature document with the image capture device; cause the captured image of the signature document to be stored at a remote electronic signature service as an electronic signature document; and cause an electronic signature of a signer to be stored in association with the electronic signature document stored at the remote electronic signature service. 17. The computing system of claim 16, wherein the image capture device is a scanner that is separate from the client device. 18. The computing system of claim 16, wherein the client device is a mobile computing device, and wherein the image capture device is a camera that is part of the client device. 19. The computing system of claim 18, wherein the mobile computing device is one of a smart phone, a tablet computer, or a laptop computer. 20. The computing system of claim 19, further comprising: an electronic signature service that is remote from the client device and that is configured to perform electronic signature management functions and to provide access to the electronic signature management functions via a Web browser executing on the client device.
2,400
7,013
7,013
14,263,734
2,461
A first access network in which a bearer transfer path that guarantees a predetermined QoS has been established and a second access network in which a transfer path which is different from that in the first access network has been established are provided, and PCRF 60 transmits to a mobile station an uplink traffic switching request including information of a flow of which the access system type is switched, out of flows in which a UE 10 performs communication, and information of an access system type to be a switching destination of the flow, and the UE 10 , upon receiving the uplink traffic switching request, switches a transfer path of the flow included in the uplink traffic switching request to that of the access system type. This makes it possible to provide a mobile communication system or the like in which a transmission path of a flow established by a mobile station capable of being simultaneously connected to a plurality of radio access networks is able to be switched without making alterations to all the radio access networks, with initiative taken by a control station installed in a core network.
1. A mobile station apparatus comprising: a control portion; and a transmission/reception portion, wherein the control portion is configured to: establish a first communication path connecting with a core network via a first access network based on an Access Point Name (APN), and establish a second communication path connecting with the core network via a second access network based on the APN, and the transmission/reception portion is configured to: transmit or receive a first flow and a second flow by using the first communication path, receive, from the core network, a switching request containing at least an identification information of the first flow and information indicating a switch to the second access network, transmit or receive the first flow by switching to use the second communication path, based on a reception of the switching request, and maintain transmission or reception of the second flow by using the first communication path. 2. The mobile station apparatus according to claim 1, further comprising: a storage portion configured to store a mobile station policy for determining a communication path to be used for communications of a flow, wherein the transmission/reception portion is configured to transmit and receive the first flow and the second flow using the first communication path, based on the mobile station policy until receiving the switching request. 3. The mobile station apparatus according to claim 1, wherein the identification information of the first flow and the information indicating the switch to the second access network, contained in the switching request, are determined based on an operator policy for determining a communication path which is used for communications of a flow by a mobile system provider. 4. The mobile station apparatus according to claim 1, wherein the control portion is configured to establish the first communication path to a gateway that is selected based the APN and connect the core network with a Packet Data Network (PDN). 5. A control station apparatus being configured in a core network, the control station apparatus comprising: a transmission/reception portion configured to: transmit/receive a first flow and a second flow by using a first communication path connecting a mobile station apparatus and a core network via a first access network, the first communication path being established based on an Access Point Name (APN), and transmit a switching request containing at least an identification information of the first flow and information indicating a switch to a second access network, in order to switch communications of the first flow to use a second communication path connecting a mobile station apparatus and a core network via a second access network, the first communication path being established based on the APN. 6. The control station apparatus according to claim 5, wherein the identification information indicating the switch to the second access network, contained in the switching request, are determined based on an operator policy for determining a communication path which is used for communications of a flow by a mobile communication system provider. 7. The control station apparatus according to claim 5, wherein the transmission/reception portion is configured to transmit the switching request to the mobile station apparatus via a first gateway connecting a base station configured in the first access network with the core network. 8. The control station apparatus according to claim 5, wherein the transmission/reception portion is configured to transmit the switching request to the mobile station apparatus via a second gateway connecting a base station configured in the second access network with the core network. 9. The control station apparatus according to claim 5, wherein the control station apparatus is configured to establish the first communication path and the second communication path with the mobile station apparatus, and is a third gateway connecting the core network with a Packet Data Network (PDN), the gateway being selected based on the APN. 10. A communication method in a mobile station apparatus, the communication method comprising: establishing a first communication path connecting with a core network via a first access network, based on an Access Point Name (APN), establishing a second communication path connecting with the core network via a second access network, based on the APN, transmitting or receiving a first flow and a second flow by using the first communication path, receiving, from the core network, a switching request containing at least an identification information of the first flow and information indicating a switch to the second access network, transmitting or receiving the first flow by switching to use the second communication path, based on a reception of the switching request, and maintaining transmission or reception of the second flow by using the first communication path.
A first access network in which a bearer transfer path that guarantees a predetermined QoS has been established and a second access network in which a transfer path which is different from that in the first access network has been established are provided, and PCRF 60 transmits to a mobile station an uplink traffic switching request including information of a flow of which the access system type is switched, out of flows in which a UE 10 performs communication, and information of an access system type to be a switching destination of the flow, and the UE 10 , upon receiving the uplink traffic switching request, switches a transfer path of the flow included in the uplink traffic switching request to that of the access system type. This makes it possible to provide a mobile communication system or the like in which a transmission path of a flow established by a mobile station capable of being simultaneously connected to a plurality of radio access networks is able to be switched without making alterations to all the radio access networks, with initiative taken by a control station installed in a core network.1. A mobile station apparatus comprising: a control portion; and a transmission/reception portion, wherein the control portion is configured to: establish a first communication path connecting with a core network via a first access network based on an Access Point Name (APN), and establish a second communication path connecting with the core network via a second access network based on the APN, and the transmission/reception portion is configured to: transmit or receive a first flow and a second flow by using the first communication path, receive, from the core network, a switching request containing at least an identification information of the first flow and information indicating a switch to the second access network, transmit or receive the first flow by switching to use the second communication path, based on a reception of the switching request, and maintain transmission or reception of the second flow by using the first communication path. 2. The mobile station apparatus according to claim 1, further comprising: a storage portion configured to store a mobile station policy for determining a communication path to be used for communications of a flow, wherein the transmission/reception portion is configured to transmit and receive the first flow and the second flow using the first communication path, based on the mobile station policy until receiving the switching request. 3. The mobile station apparatus according to claim 1, wherein the identification information of the first flow and the information indicating the switch to the second access network, contained in the switching request, are determined based on an operator policy for determining a communication path which is used for communications of a flow by a mobile system provider. 4. The mobile station apparatus according to claim 1, wherein the control portion is configured to establish the first communication path to a gateway that is selected based the APN and connect the core network with a Packet Data Network (PDN). 5. A control station apparatus being configured in a core network, the control station apparatus comprising: a transmission/reception portion configured to: transmit/receive a first flow and a second flow by using a first communication path connecting a mobile station apparatus and a core network via a first access network, the first communication path being established based on an Access Point Name (APN), and transmit a switching request containing at least an identification information of the first flow and information indicating a switch to a second access network, in order to switch communications of the first flow to use a second communication path connecting a mobile station apparatus and a core network via a second access network, the first communication path being established based on the APN. 6. The control station apparatus according to claim 5, wherein the identification information indicating the switch to the second access network, contained in the switching request, are determined based on an operator policy for determining a communication path which is used for communications of a flow by a mobile communication system provider. 7. The control station apparatus according to claim 5, wherein the transmission/reception portion is configured to transmit the switching request to the mobile station apparatus via a first gateway connecting a base station configured in the first access network with the core network. 8. The control station apparatus according to claim 5, wherein the transmission/reception portion is configured to transmit the switching request to the mobile station apparatus via a second gateway connecting a base station configured in the second access network with the core network. 9. The control station apparatus according to claim 5, wherein the control station apparatus is configured to establish the first communication path and the second communication path with the mobile station apparatus, and is a third gateway connecting the core network with a Packet Data Network (PDN), the gateway being selected based on the APN. 10. A communication method in a mobile station apparatus, the communication method comprising: establishing a first communication path connecting with a core network via a first access network, based on an Access Point Name (APN), establishing a second communication path connecting with the core network via a second access network, based on the APN, transmitting or receiving a first flow and a second flow by using the first communication path, receiving, from the core network, a switching request containing at least an identification information of the first flow and information indicating a switch to the second access network, transmitting or receiving the first flow by switching to use the second communication path, based on a reception of the switching request, and maintaining transmission or reception of the second flow by using the first communication path.
2,400
7,014
7,014
14,433,288
2,477
In a communication system that includes at least a first base station ( 206 ) having a first geographical service area ( 12 ) and second base station ( 210 ) having a second geographical service area ( 16 ) that overlaps at least partially with the first geographical service area ( 12 ), a relaying mobile wireless communication device ( 202 ) receiving service from the second base station ( 210 ) receives and forwards scheduling information ( 204 ) to the second base station ( 210 ), where the scheduling information (204) is transmitted by the first base station ( 206 ) and identifies communication resources that will be used for wireless communication with the first base station. Based at least on the scheduling information, the second base station ( 210 ) schedules communication resources to mobile wireless communication devices ( 202, 212 ) receiving service from the second base station ( 210 ) such that interference is reduced, minimized, or eliminated.
1. A system comprising: a small service area (SSA) base station having a SSA geographical service area and configured to exchange communication data with SSA user equipment devices (SUEs); and a large service area (LSA) base station having a LSA geographical service area at least partially overlapping the SSA geographical service area and configured to exchange communication data with LSA user equipment devices (LUEs), the LSA base station configured to transmit, to a relaying SUE (RSUE) of the SUEs, LSA scheduling information indicating communication resources that will be used for communication by the LSA base station, the SSA base station configured to receive resource information indicative of the LSA scheduling information from the RSUE and to schedule communication resources to the SUEs based on the resource information. 2. The system of claim 1, wherein the communication resources comprise a plurality of frequency subcarriers divided in time to form time-frequency blocks 3. The system of claim 2, wherein the SSA base station is configured to refrain from scheduling the time-frequency blocks indicated in the LSA scheduling information to the SUEs. 4. The system of claim 2, wherein the SSA base station is configured to schedule the time-frequency blocks indicated in the LSA scheduling information when scheduling communication resources for the SUEs for transmission identified as able to tolerate interference. 5. The system of claim 4, wherein a lower quality of service (QoS) SUE requires a lower QoS than another SUE and the SSA base station is configured to schedule the time-frequency blocks indicated in the LSA scheduling information to the at lower QoS SUE. 6. The system of claim 4, wherein a proximate SUE is closer to the SSA base station than another SUE and the SSA base station is configured to schedule the time-frequency blocks indicated in the LSA scheduling information to the proximate SUE. 7. The system of claim 1, wherein the communication resources are at least one of downlink communication resources and uplink communication resources. 8. The system of claim 1, wherein LSA bases station and the SSA base station transmit and receive signals in accordance with a 3GPP LTE communication specification. 9. The system of claim 8, wherein the LSA base station is configured to transmit the LSA scheduling information in a system information block (SIB). 10. The system of claim 8, wherein the LSA base station is configured to transmit the LSA scheduling information in a multicast-broadcast single-frequency network (MBSFN) subframe. 11. The system of claim 1, wherein the resource information is the LSA scheduling information. 12. The system of claim 1, wherein the LSA base station is further configured to: determine a potential for interference at one or more LUEs due to SSA downlink signals transmitted from the SSA base station; determine a potential for interference at the SSA base station from uplink signals transmitted from one or more LUEs; and transmit the LSA scheduling information only when it is determined there is potential for information either at the one or more LUEs or the SSA base station. 13. The system of claim 12 wherein the LSA base station is configured to determine the potential for interference at one or more LUEs and the potential for interference at the SSA base station based on based on measurement reports provided by the LUEs. 14. The system of claim 12 wherein the LSA base station is configured to determine the potential for interference at one or more LUEs and the potential for interference at the SSA base station based on at least one of a number of HARQ retransmissions, a number of Radio Link Failures, and a number of filed handovers. 15. A small service area (SSA) base station providing wireless service to SSA user equipment devices (SUEs) within a SSA that is within a large service area (LSA) of a LSA base station providing wireless service within the LSA, the SSA base station comprising: a receiver configured to receive LSA resource information identifying communication resources that will be used by the LSA base station; a processor configured to allocate communication resources to the SUEs based on the LSA resource information. 16. The SSA base station of claim 15, wherein the LSA resource information is based on LSA scheduling information transmitted by the LSA base station. 17. The SSA base station of claim 15, wherein the communication resources comprise a plurality of frequency subcarriers divided in time to form time-frequency blocks 18. The SSA base station of claim 17, wherein the processor is configured to refrain from scheduling the time-frequency blocks indicated in the LSA scheduling information to the SUEs. 19. The SSA base station of claim 17, wherein the processor is configured to apply a lower priority to the time-frequency blocks indicated in the LSA scheduling information when scheduling communication resources for the SUEs. 20. The SSA base station of claim 19, wherein a lower quality of service (QoS) SUE requires a lower QoS than another SUE and the SSA base station is configured to schedule the time-frequency blocks indicated in the LSA scheduling information to the at lower QoS SUE. 21. The SSA base station of claim 19, wherein a proximate SUE is closer to the SSA base station than another SUE and the SSA base station is configured to schedule the time-frequency blocks indicated in the LSA scheduling information to the proximate SUE. 22. The SSA base station of claim 15, wherein the communication resources are at least one of downlink communication resources and uplink communication resources. 23. The SSA base station of claim 15, wherein the LSA base station and the SSA base station transmit and receive signals in accordance with a 3GPP LTE communication specification. 24. The SSA base station of claim 15, wherein the LSA resource information is the LSA scheduling information. 25. A mobile wireless communication device comprising: a receiver configured to receive, from a large service area (LSA) base station, LSA scheduling information identifying wireless communication resources that will be sued by the LSA base station; and a transmitter configured to transmit, to a small service area (SSA) base station, LSA resource information based on the LSA scheduling information, the SSA base station providing wireless communication service within a SSA service area that at least partially overlaps and is smaller than a LSA service area of the LSA base station. 26. The mobile wireless communication device of claim 25, wherein the LSA scheduling information is received within a system information block (SIB). 27. The mobile wireless communication device of claim 25, wherein the LSA scheduling information is received within a multicast-broadcast single-frequency network (MBSFN) subframe.
In a communication system that includes at least a first base station ( 206 ) having a first geographical service area ( 12 ) and second base station ( 210 ) having a second geographical service area ( 16 ) that overlaps at least partially with the first geographical service area ( 12 ), a relaying mobile wireless communication device ( 202 ) receiving service from the second base station ( 210 ) receives and forwards scheduling information ( 204 ) to the second base station ( 210 ), where the scheduling information (204) is transmitted by the first base station ( 206 ) and identifies communication resources that will be used for wireless communication with the first base station. Based at least on the scheduling information, the second base station ( 210 ) schedules communication resources to mobile wireless communication devices ( 202, 212 ) receiving service from the second base station ( 210 ) such that interference is reduced, minimized, or eliminated.1. A system comprising: a small service area (SSA) base station having a SSA geographical service area and configured to exchange communication data with SSA user equipment devices (SUEs); and a large service area (LSA) base station having a LSA geographical service area at least partially overlapping the SSA geographical service area and configured to exchange communication data with LSA user equipment devices (LUEs), the LSA base station configured to transmit, to a relaying SUE (RSUE) of the SUEs, LSA scheduling information indicating communication resources that will be used for communication by the LSA base station, the SSA base station configured to receive resource information indicative of the LSA scheduling information from the RSUE and to schedule communication resources to the SUEs based on the resource information. 2. The system of claim 1, wherein the communication resources comprise a plurality of frequency subcarriers divided in time to form time-frequency blocks 3. The system of claim 2, wherein the SSA base station is configured to refrain from scheduling the time-frequency blocks indicated in the LSA scheduling information to the SUEs. 4. The system of claim 2, wherein the SSA base station is configured to schedule the time-frequency blocks indicated in the LSA scheduling information when scheduling communication resources for the SUEs for transmission identified as able to tolerate interference. 5. The system of claim 4, wherein a lower quality of service (QoS) SUE requires a lower QoS than another SUE and the SSA base station is configured to schedule the time-frequency blocks indicated in the LSA scheduling information to the at lower QoS SUE. 6. The system of claim 4, wherein a proximate SUE is closer to the SSA base station than another SUE and the SSA base station is configured to schedule the time-frequency blocks indicated in the LSA scheduling information to the proximate SUE. 7. The system of claim 1, wherein the communication resources are at least one of downlink communication resources and uplink communication resources. 8. The system of claim 1, wherein LSA bases station and the SSA base station transmit and receive signals in accordance with a 3GPP LTE communication specification. 9. The system of claim 8, wherein the LSA base station is configured to transmit the LSA scheduling information in a system information block (SIB). 10. The system of claim 8, wherein the LSA base station is configured to transmit the LSA scheduling information in a multicast-broadcast single-frequency network (MBSFN) subframe. 11. The system of claim 1, wherein the resource information is the LSA scheduling information. 12. The system of claim 1, wherein the LSA base station is further configured to: determine a potential for interference at one or more LUEs due to SSA downlink signals transmitted from the SSA base station; determine a potential for interference at the SSA base station from uplink signals transmitted from one or more LUEs; and transmit the LSA scheduling information only when it is determined there is potential for information either at the one or more LUEs or the SSA base station. 13. The system of claim 12 wherein the LSA base station is configured to determine the potential for interference at one or more LUEs and the potential for interference at the SSA base station based on based on measurement reports provided by the LUEs. 14. The system of claim 12 wherein the LSA base station is configured to determine the potential for interference at one or more LUEs and the potential for interference at the SSA base station based on at least one of a number of HARQ retransmissions, a number of Radio Link Failures, and a number of filed handovers. 15. A small service area (SSA) base station providing wireless service to SSA user equipment devices (SUEs) within a SSA that is within a large service area (LSA) of a LSA base station providing wireless service within the LSA, the SSA base station comprising: a receiver configured to receive LSA resource information identifying communication resources that will be used by the LSA base station; a processor configured to allocate communication resources to the SUEs based on the LSA resource information. 16. The SSA base station of claim 15, wherein the LSA resource information is based on LSA scheduling information transmitted by the LSA base station. 17. The SSA base station of claim 15, wherein the communication resources comprise a plurality of frequency subcarriers divided in time to form time-frequency blocks 18. The SSA base station of claim 17, wherein the processor is configured to refrain from scheduling the time-frequency blocks indicated in the LSA scheduling information to the SUEs. 19. The SSA base station of claim 17, wherein the processor is configured to apply a lower priority to the time-frequency blocks indicated in the LSA scheduling information when scheduling communication resources for the SUEs. 20. The SSA base station of claim 19, wherein a lower quality of service (QoS) SUE requires a lower QoS than another SUE and the SSA base station is configured to schedule the time-frequency blocks indicated in the LSA scheduling information to the at lower QoS SUE. 21. The SSA base station of claim 19, wherein a proximate SUE is closer to the SSA base station than another SUE and the SSA base station is configured to schedule the time-frequency blocks indicated in the LSA scheduling information to the proximate SUE. 22. The SSA base station of claim 15, wherein the communication resources are at least one of downlink communication resources and uplink communication resources. 23. The SSA base station of claim 15, wherein the LSA base station and the SSA base station transmit and receive signals in accordance with a 3GPP LTE communication specification. 24. The SSA base station of claim 15, wherein the LSA resource information is the LSA scheduling information. 25. A mobile wireless communication device comprising: a receiver configured to receive, from a large service area (LSA) base station, LSA scheduling information identifying wireless communication resources that will be sued by the LSA base station; and a transmitter configured to transmit, to a small service area (SSA) base station, LSA resource information based on the LSA scheduling information, the SSA base station providing wireless communication service within a SSA service area that at least partially overlaps and is smaller than a LSA service area of the LSA base station. 26. The mobile wireless communication device of claim 25, wherein the LSA scheduling information is received within a system information block (SIB). 27. The mobile wireless communication device of claim 25, wherein the LSA scheduling information is received within a multicast-broadcast single-frequency network (MBSFN) subframe.
2,400
7,015
7,015
14,293,553
2,483
The present invention relates to an encoding device and a method, a decoding device and a method, an editing device and a method, a storage medium, and a program which can perform encoding and decoding so that buffer failure does not occur. Information, such as a minimum bit rate, a minimum buffer size, and a minimum initial delay time, is contained in a random access point header contained in an accessible point in a bitstream. A bitstream analyzing unit 72 analyzes an input bitstream, sets the above-mentioned information, and outputs the resulting information to a buffer-information adding unit 73. The buffer-information adding unit 73 adds the input information to the input bitstream and outputs the resulting bitstream. The present invention is applicable to an encoding device and a decoding device which process bitstreams.
1. (canceled) 2. An encoding device, comprising: circuitry configured to: encode an input image signal to generate a bitstream; generate buffer characteristics information, which includes a plurality of combinations of buffer size information and bit rate information as criteria for determining whether the bitstream is decodable using a decoder buffer size and a decoding bit rate, the buffer size information indicating a required buffer size of a buffer that stores the bitstream during decoding of the bitstream and the bit rate information indicating an input bit rate of the buffer; and transfer the generated buffer characteristics information and the generated bitstream. 3. The encoding device according to claim 2, further comprising: a memory to store data. 4. The encoding device according to claim 3, wherein the circuitry is further configured to: control a behavior of a quantizer in accordance with an amount of transform coefficient data stored in the memory. 5. The encoding device according to claim 2, wherein the circuitry is further configured to: rearrange frames of the input image signal in accordance with a group of pictures (GOP) structure. 6. The encoding device according to claim 2, wherein the circuitry is further configured to: convert the input image signal from an analog signal to a digital signal. 7. An encoding method, comprising: encoding an input image signal to generate a bitstream; generating buffer characteristics information, which includes a plurality of combinations of buffer size information and bit rate information as criteria for determining whether the bitstream is decodable using a decoder buffer size and a decoding bit rate, the buffer size information indicating a required buffer size of a buffer that stores the bitstream during decoding of the bitstream and the bit rate information indicating an input bit rate of the buffer; and transferring the generated buffer characteristics information and the generated bitstream. 8. The encoding method according to claim 7, further comprising: storing data in a memory. 9. The encoding method according to claim 8, further comprising: controlling a behavior of a quantizer in accordance with an amount of transform coefficient data stored in the memory. 10. The encoding method according to claim 7, further comprising: rearranging frames of the input image signal in accordance with a group of pictures (GOP) structure. 11. The encoding method according to claim 7, further comprising: converting the input image signal from an analog signal to a digital signal. 12. A non-transitory computer readable storage device that includes computer readable instructions that when executed by processing circuitry performs an encoding program, the encoding program comprising: encoding an input image signal to generate a bitstream; generating buffer characteristics information, which includes a plurality of combinations of buffer size information and bit rate information as criteria for determining whether the bitstream is decodable using a decoder buffer size and a decoding bit rate, the buffer size information indicating a required buffer size of a buffer that stores the bitstream during decoding of the bitstream and the bit rate information indicating an input bit rate of the buffer; and transferring the generated buffer characteristics information and the generated bitstream. 13. The encoding program according to claim 12, further comprising: storing data in a memory. 14. The encoding program according to claim 13, further comprising: controlling a behavior of a quantizer in accordance with an amount of transform coefficient data stored in the memory. 15. The encoding program according to claim 12, further comprising: rearranging frames of the input image signal in accordance with a group of pictures (GOP) structure. 16. The encoding program according to claim 12, further comprising: converting the input image signal from an analog signal to a digital signal.
The present invention relates to an encoding device and a method, a decoding device and a method, an editing device and a method, a storage medium, and a program which can perform encoding and decoding so that buffer failure does not occur. Information, such as a minimum bit rate, a minimum buffer size, and a minimum initial delay time, is contained in a random access point header contained in an accessible point in a bitstream. A bitstream analyzing unit 72 analyzes an input bitstream, sets the above-mentioned information, and outputs the resulting information to a buffer-information adding unit 73. The buffer-information adding unit 73 adds the input information to the input bitstream and outputs the resulting bitstream. The present invention is applicable to an encoding device and a decoding device which process bitstreams.1. (canceled) 2. An encoding device, comprising: circuitry configured to: encode an input image signal to generate a bitstream; generate buffer characteristics information, which includes a plurality of combinations of buffer size information and bit rate information as criteria for determining whether the bitstream is decodable using a decoder buffer size and a decoding bit rate, the buffer size information indicating a required buffer size of a buffer that stores the bitstream during decoding of the bitstream and the bit rate information indicating an input bit rate of the buffer; and transfer the generated buffer characteristics information and the generated bitstream. 3. The encoding device according to claim 2, further comprising: a memory to store data. 4. The encoding device according to claim 3, wherein the circuitry is further configured to: control a behavior of a quantizer in accordance with an amount of transform coefficient data stored in the memory. 5. The encoding device according to claim 2, wherein the circuitry is further configured to: rearrange frames of the input image signal in accordance with a group of pictures (GOP) structure. 6. The encoding device according to claim 2, wherein the circuitry is further configured to: convert the input image signal from an analog signal to a digital signal. 7. An encoding method, comprising: encoding an input image signal to generate a bitstream; generating buffer characteristics information, which includes a plurality of combinations of buffer size information and bit rate information as criteria for determining whether the bitstream is decodable using a decoder buffer size and a decoding bit rate, the buffer size information indicating a required buffer size of a buffer that stores the bitstream during decoding of the bitstream and the bit rate information indicating an input bit rate of the buffer; and transferring the generated buffer characteristics information and the generated bitstream. 8. The encoding method according to claim 7, further comprising: storing data in a memory. 9. The encoding method according to claim 8, further comprising: controlling a behavior of a quantizer in accordance with an amount of transform coefficient data stored in the memory. 10. The encoding method according to claim 7, further comprising: rearranging frames of the input image signal in accordance with a group of pictures (GOP) structure. 11. The encoding method according to claim 7, further comprising: converting the input image signal from an analog signal to a digital signal. 12. A non-transitory computer readable storage device that includes computer readable instructions that when executed by processing circuitry performs an encoding program, the encoding program comprising: encoding an input image signal to generate a bitstream; generating buffer characteristics information, which includes a plurality of combinations of buffer size information and bit rate information as criteria for determining whether the bitstream is decodable using a decoder buffer size and a decoding bit rate, the buffer size information indicating a required buffer size of a buffer that stores the bitstream during decoding of the bitstream and the bit rate information indicating an input bit rate of the buffer; and transferring the generated buffer characteristics information and the generated bitstream. 13. The encoding program according to claim 12, further comprising: storing data in a memory. 14. The encoding program according to claim 13, further comprising: controlling a behavior of a quantizer in accordance with an amount of transform coefficient data stored in the memory. 15. The encoding program according to claim 12, further comprising: rearranging frames of the input image signal in accordance with a group of pictures (GOP) structure. 16. The encoding program according to claim 12, further comprising: converting the input image signal from an analog signal to a digital signal.
2,400
7,016
7,016
14,749,732
2,473
The present invention relates to methods and apparatuses for providing selective network access, wherein a cell type indication is provided based on at least one of a preamble and a header portion of a broadcast signal. At the receiving end, it is checked based on at least one of the preamble and the header portion, whether broadcast signals are received from different first and second cell types. The first cell type is selected for network access, if both broadcast signals from the first and second cell types are received with sufficient strength.
1. A method comprising: providing a cell type indication based at least one of a preamble and a header portion of a broadcast signal; and transmitting said broadcast signal with a cell type indication set by the preamble or the header portion of the broadcast signal in accordance with one of a first cell type or a second cell type of a cell of a wireless network from which said broadcast signal is transmitted. 2. The method according to claim 1, wherein said first cell type has a cell size smaller than said second cell type. 3. The method according to claim 2, wherein said first cell type is a femto cell and said second cell type is a macro cell. 4. The method according to claim 1, wherein said cell type indication is provided by a predetermined cell type specific preamble or a predetermined cell type specific flag or a predetermined cell type specific header repetition pattern. 5. The method according to claim 4, wherein said cell type specific preamble is identified by a predetermined allocated preamble modulation series. 6. The method according to claim 4, wherein said cell type specific flag is provided in a frame control header. 7. The method according to claim 4, wherein said cell type specific header repetition is performed with a frame control header. 8. The method according to claim 4, wherein said cell type specific header repetition involves a predetermined polarity change. 9. The method according to claim 1, wherein the cell type indication is based on preambles of the broadcast signals, wherein a certain amount of a preamble modulation series is allocated to indicate the first cell type and others of the preamble modulation series are allocated to indicate the second cell type, and wherein transmitting further comprises transmitting said broadcast signal with the cell type indication set by the preamble of the broadcast signal in accordance with the one of the first cell type or the second cell type of the cell of the wireless network from which said broadcast signal is transmitted. 10. An apparatus comprising one or more processors and one or more memories including computer program code, the one or more memories and the computer program code configured, with the one or more processors, to cause the apparatus to perform at least the following: providing a cell type indication based at least one of a preamble and a header portion of a broadcast signal; and transmitting said broadcast signal with a cell type indication set by the preamble or the header portion of the broadcast signal in accordance with one of a first or second cell type of a cell of a wireless network from which said broadcast signal is transmitted. 11. The apparatus according to claim 10, wherein said first cell type has a cell size smaller than said second cell type. 12. The apparatus according to claim 11, wherein said first cell type is a femto cell and said second cell type is a macro cell. 13. The apparatus according to claim 10, wherein said cell type indication is provided by a predetermined cell type specific preamble or a predetermined cell type specific flag or a predetermined cell type specific header repetition pattern. 14. The apparatus according to claim 13, wherein said cell type specific preamble is identified by a predetermined allocated preamble modulation series. 15. The apparatus according to claim 13, wherein said cell type specific flag is provided in a frame control header. 16. The apparatus according to claim 13, wherein said cell type specific header repetition is performed with a frame control header. 17. The apparatus according to claim 13, wherein said cell type specific header repetition involves a predetermined polarity change. 18. The apparatus according to claim 10, wherein the cell type indication is based on preambles of the broadcast signals, wherein a certain amount of a preamble modulation series is allocated to indicate the first cell type and others of the preamble modulation series are allocated to indicate the second cell type, and wherein transmitting further comprises transmitting said broadcast signal with the cell type indication set by the preamble of the broadcast signal in accordance with the one of the first cell type or the second cell type of the cell of the wireless network from which said broadcast signal is transmitted.
The present invention relates to methods and apparatuses for providing selective network access, wherein a cell type indication is provided based on at least one of a preamble and a header portion of a broadcast signal. At the receiving end, it is checked based on at least one of the preamble and the header portion, whether broadcast signals are received from different first and second cell types. The first cell type is selected for network access, if both broadcast signals from the first and second cell types are received with sufficient strength.1. A method comprising: providing a cell type indication based at least one of a preamble and a header portion of a broadcast signal; and transmitting said broadcast signal with a cell type indication set by the preamble or the header portion of the broadcast signal in accordance with one of a first cell type or a second cell type of a cell of a wireless network from which said broadcast signal is transmitted. 2. The method according to claim 1, wherein said first cell type has a cell size smaller than said second cell type. 3. The method according to claim 2, wherein said first cell type is a femto cell and said second cell type is a macro cell. 4. The method according to claim 1, wherein said cell type indication is provided by a predetermined cell type specific preamble or a predetermined cell type specific flag or a predetermined cell type specific header repetition pattern. 5. The method according to claim 4, wherein said cell type specific preamble is identified by a predetermined allocated preamble modulation series. 6. The method according to claim 4, wherein said cell type specific flag is provided in a frame control header. 7. The method according to claim 4, wherein said cell type specific header repetition is performed with a frame control header. 8. The method according to claim 4, wherein said cell type specific header repetition involves a predetermined polarity change. 9. The method according to claim 1, wherein the cell type indication is based on preambles of the broadcast signals, wherein a certain amount of a preamble modulation series is allocated to indicate the first cell type and others of the preamble modulation series are allocated to indicate the second cell type, and wherein transmitting further comprises transmitting said broadcast signal with the cell type indication set by the preamble of the broadcast signal in accordance with the one of the first cell type or the second cell type of the cell of the wireless network from which said broadcast signal is transmitted. 10. An apparatus comprising one or more processors and one or more memories including computer program code, the one or more memories and the computer program code configured, with the one or more processors, to cause the apparatus to perform at least the following: providing a cell type indication based at least one of a preamble and a header portion of a broadcast signal; and transmitting said broadcast signal with a cell type indication set by the preamble or the header portion of the broadcast signal in accordance with one of a first or second cell type of a cell of a wireless network from which said broadcast signal is transmitted. 11. The apparatus according to claim 10, wherein said first cell type has a cell size smaller than said second cell type. 12. The apparatus according to claim 11, wherein said first cell type is a femto cell and said second cell type is a macro cell. 13. The apparatus according to claim 10, wherein said cell type indication is provided by a predetermined cell type specific preamble or a predetermined cell type specific flag or a predetermined cell type specific header repetition pattern. 14. The apparatus according to claim 13, wherein said cell type specific preamble is identified by a predetermined allocated preamble modulation series. 15. The apparatus according to claim 13, wherein said cell type specific flag is provided in a frame control header. 16. The apparatus according to claim 13, wherein said cell type specific header repetition is performed with a frame control header. 17. The apparatus according to claim 13, wherein said cell type specific header repetition involves a predetermined polarity change. 18. The apparatus according to claim 10, wherein the cell type indication is based on preambles of the broadcast signals, wherein a certain amount of a preamble modulation series is allocated to indicate the first cell type and others of the preamble modulation series are allocated to indicate the second cell type, and wherein transmitting further comprises transmitting said broadcast signal with the cell type indication set by the preamble of the broadcast signal in accordance with the one of the first cell type or the second cell type of the cell of the wireless network from which said broadcast signal is transmitted.
2,400
7,017
7,017
14,314,018
2,437
Determining whether to allow access to a message is disclosed. A message is received from a sender. The message is associated with a first time-to-live (TTL) value. A determination is made that the first time-to-live value has not been exceeded. The determination is made at least in part by obtaining an external master clock time. In response to the determination, access is allowed to the message.
1. A system, comprising: an interface configured to: receive a secure communication from a sender, wherein the secure communication includes an encrypted message, an encrypted message key, and an encrypted time-to-live value; a processor configured to: decrypt the encrypted message key using a first key; decrypt the encrypted first time-to-live value with the decrypted message key to obtain a first time-to-live value; store the first time-to-live value in a secure database to prevent the first time-to-live value from being tampered with; determine an expiration time of the encrypted message based, in part, on the first time-to-live value; in response to a user's attempt to access the encrypted message, obtain an external master clock time to prevent circumvention of the first time-to-live value; determine whether the external master clock time is greater than the expiration time; and in response to a determination that the external master clock time is not greater than the expiration time, allow access to the encrypted message; and a memory coupled to the processor and configured to provide the processor with instructions. 2. The system of claim 1 wherein the first time-to-live value is configurable by the sender. 3. The system of claim 1 wherein the processor is further configured to: decrypt the encrypted message with the decrypted message key when allowing access to the encrypted message. 4. The system of claim 1 wherein allowing access to the message includes displaying the message. 5. (canceled) 6. The system of claim 1 wherein determining whether the external master clock time is greater than the expiration time includes comparing a local device time to the external master clock time. 7. The system of claim 1 wherein the processor is further configured to initiate a time counter. 8. The system of claim 7 wherein the time counter is initiated in conjunction with allowing access to the message. 9. The system of claim 7 wherein determining whether the external master clock time is greater than the expiration time includes determining whether the time counter has reached a termination point. 10. The system of claim 9 wherein, upon the time counter reaching the termination point, allowance of access to the message is ceased. 11. The system of claim 1 wherein the processor is further configured to: cease allowing access to the message when a determination is made that the external master clock time is greater than the expiration time. 12. The system of claim 11 wherein ceasing allowing access to the message includes deleting the message. 13. The system of claim 11 wherein ceasing allowing access to the message includes deleting the decrypted message key. 14. The system of claim 1 wherein the message is further associated with a second time-to-live value. 15. The system of claim 14 wherein the second time-to-live value is associated with an embargo time, before which the message cannot be opened. 16. A method, comprising: receiving a secure communication from a sender, wherein the secure communication includes an encrypted message, an encrypted message key, and an encrypted time-to-live value; decrypting the encrypted message key using a first key; decrypting the encrypted first time-to-live value with the decrypted message key to obtain a first time-to-live value; storing the first time-to-live value in a secure database to prevent the first time-to-live value from being tampered with; determining an expiration time of the encrypted message based, in part, on the first time-to-live value; in response to a user's attempt to access the encrypted message, obtaining an external master clock time to prevent circumvention of the first time-to-live value; determining whether the external master clock time is greater than the expiration time; and in response to a determination that the external master clock time is not greater than the expiration time, allowing access to the encrypted message. 17. A computer program product embodied in a non-transitory tangible computer readable storage medium and comprising computer instructions for: receiving a secure communication from a sender, wherein the secure communication includes an encrypted message, an encrypted message key, and an encrypted time-to-live value; decrypting the encrypted message key using a first key; decrypting the encrypted first time-to-live value with the decrypted message key to obtain a first time-to-live value; storing the first time-to-live value in a secure database to prevent the first time-to-live value from being tampered with; determining an expiration time of the encrypted message based, in part, on the first time-to-live value; in response to a user's attempt to access the encrypted message, obtaining an external master clock time to prevent circumvention of the first time-to-live value; determining whether the external master clock time is greater than the expiration time; and in response to a determination that the external master clock time is not greater than the expiration time, allowing access to the encrypted message. 18. The method of claim 16 further comprising: ceasing access to the message when a determination is made that the external master clock time is greater than the expiration time. 19. The method of claim 18 wherein ceasing access to the message includes deleting the message. 20. The method of claim 18 wherein ceasing access to the message includes deleting the decrypted message key. 21. The method of claim 16 wherein the message is further associated with a second time-to-live value. 22. The method of claim 21 wherein the second time-to-live value is associated with an embargo time, before which the message cannot be opened.
Determining whether to allow access to a message is disclosed. A message is received from a sender. The message is associated with a first time-to-live (TTL) value. A determination is made that the first time-to-live value has not been exceeded. The determination is made at least in part by obtaining an external master clock time. In response to the determination, access is allowed to the message.1. A system, comprising: an interface configured to: receive a secure communication from a sender, wherein the secure communication includes an encrypted message, an encrypted message key, and an encrypted time-to-live value; a processor configured to: decrypt the encrypted message key using a first key; decrypt the encrypted first time-to-live value with the decrypted message key to obtain a first time-to-live value; store the first time-to-live value in a secure database to prevent the first time-to-live value from being tampered with; determine an expiration time of the encrypted message based, in part, on the first time-to-live value; in response to a user's attempt to access the encrypted message, obtain an external master clock time to prevent circumvention of the first time-to-live value; determine whether the external master clock time is greater than the expiration time; and in response to a determination that the external master clock time is not greater than the expiration time, allow access to the encrypted message; and a memory coupled to the processor and configured to provide the processor with instructions. 2. The system of claim 1 wherein the first time-to-live value is configurable by the sender. 3. The system of claim 1 wherein the processor is further configured to: decrypt the encrypted message with the decrypted message key when allowing access to the encrypted message. 4. The system of claim 1 wherein allowing access to the message includes displaying the message. 5. (canceled) 6. The system of claim 1 wherein determining whether the external master clock time is greater than the expiration time includes comparing a local device time to the external master clock time. 7. The system of claim 1 wherein the processor is further configured to initiate a time counter. 8. The system of claim 7 wherein the time counter is initiated in conjunction with allowing access to the message. 9. The system of claim 7 wherein determining whether the external master clock time is greater than the expiration time includes determining whether the time counter has reached a termination point. 10. The system of claim 9 wherein, upon the time counter reaching the termination point, allowance of access to the message is ceased. 11. The system of claim 1 wherein the processor is further configured to: cease allowing access to the message when a determination is made that the external master clock time is greater than the expiration time. 12. The system of claim 11 wherein ceasing allowing access to the message includes deleting the message. 13. The system of claim 11 wherein ceasing allowing access to the message includes deleting the decrypted message key. 14. The system of claim 1 wherein the message is further associated with a second time-to-live value. 15. The system of claim 14 wherein the second time-to-live value is associated with an embargo time, before which the message cannot be opened. 16. A method, comprising: receiving a secure communication from a sender, wherein the secure communication includes an encrypted message, an encrypted message key, and an encrypted time-to-live value; decrypting the encrypted message key using a first key; decrypting the encrypted first time-to-live value with the decrypted message key to obtain a first time-to-live value; storing the first time-to-live value in a secure database to prevent the first time-to-live value from being tampered with; determining an expiration time of the encrypted message based, in part, on the first time-to-live value; in response to a user's attempt to access the encrypted message, obtaining an external master clock time to prevent circumvention of the first time-to-live value; determining whether the external master clock time is greater than the expiration time; and in response to a determination that the external master clock time is not greater than the expiration time, allowing access to the encrypted message. 17. A computer program product embodied in a non-transitory tangible computer readable storage medium and comprising computer instructions for: receiving a secure communication from a sender, wherein the secure communication includes an encrypted message, an encrypted message key, and an encrypted time-to-live value; decrypting the encrypted message key using a first key; decrypting the encrypted first time-to-live value with the decrypted message key to obtain a first time-to-live value; storing the first time-to-live value in a secure database to prevent the first time-to-live value from being tampered with; determining an expiration time of the encrypted message based, in part, on the first time-to-live value; in response to a user's attempt to access the encrypted message, obtaining an external master clock time to prevent circumvention of the first time-to-live value; determining whether the external master clock time is greater than the expiration time; and in response to a determination that the external master clock time is not greater than the expiration time, allowing access to the encrypted message. 18. The method of claim 16 further comprising: ceasing access to the message when a determination is made that the external master clock time is greater than the expiration time. 19. The method of claim 18 wherein ceasing access to the message includes deleting the message. 20. The method of claim 18 wherein ceasing access to the message includes deleting the decrypted message key. 21. The method of claim 16 wherein the message is further associated with a second time-to-live value. 22. The method of claim 21 wherein the second time-to-live value is associated with an embargo time, before which the message cannot be opened.
2,400
7,018
7,018
15,044,874
2,443
An embodiment of the invention provides a system and method for managing computing resources in a cloud computing environment, wherein the system includes a data analysis module connected to a processor. The data analysis module predicts the demand for the computing resources, wherein the demand is predicted based on internet user activity. The internet user activity includes: the number of web pages that include at least one select term a predetermined amount of times, the number of times the web pages that include the at least one select term a predetermined amount of times are viewed, and the number of times the select term is entered into an internet search engine. The processor increases resource capacity in the cloud computing environment when the predicted demand is above a first threshold. The processor decreases resource capacity in the cloud computing environment when the predicted demand is below a second threshold.
1. A method for managing computing resources, said method comprising: predicting demand for the computing resources with a data analysis module based on a number of web pages that include at least one select term a predetermined amount of times; and at least one of increasing resource capacity with a processor when the predicted demand is above a first threshold, and decreasing resource capacity with the processor when the predicted demand is below a second threshold. 2. The method according to claim 1, wherein said increasing of the resource capacity includes provisioning at least one additional computing resource. 3. The method according to claim 1, wherein said increasing of the resource capacity includes adding physical memory, virtual memory, physical CPU, virtual CPU, network capacity, instances of middleware on a virtual machine, instances of applications on a virtual machine, and storage space to the computing resources. 4. The method according to claim 1, wherein said increasing of the resource capacity includes adding at least one of physical memory, virtual memory, physical CPU, virtual CPU, network capacity, instances of middleware on a virtual machine, instances of applications on a virtual machine, and storage space to the computing resources. 5. The method according to claim 1, wherein said decreasing of the resource capacity includes deprovisioning at least one computing resource. 6. The method according to claim 1, wherein said decreasing of the resource capacity includes removing physical memory, virtual memory, physical CPU, virtual CPU, network capacity, instances of middleware on a virtual machine, instances of applications on a virtual machine, and storage space from the computing resources. 7. The method according to claim 1, wherein said decreasing of the resource capacity includes removing at least one of physical memory, virtual memory, physical CPU, virtual CPU, network capacity, instances of middleware on a virtual machine, instances of applications on a virtual machine, and storage space from the computing resources. 8. The method according to claim 1, wherein said computing resources includes a server, a virtual machine, an application, and middleware. 9. The method according to claim 1, wherein said computing resources includes at least one of a server, a virtual machine, an application, and middleware. 10. The method according to claim 1, wherein the web pages include social networking websites, business networking websites, news stories, discussion forums, and advertisements. 11. The method according to claim 1, wherein the web pages include at least one of social networking websites, business networking websites, news stories, discussion forums, and advertisements. 12. The method according to claim 1, wherein said increasing of the resource capacity includes sending an instruction to a computing resources managing module to: provision at least one additional computing resource; and add physical memory, virtual memory, physical CPU, virtual CPU, network capacity, and storage space to the computing resources. 13. The method according to claim 1, wherein said increasing of the resource capacity includes sending an instruction to a computing resources managing module to at least one of: provision at least one additional computing resource; and add at least one of physical memory, virtual memory, physical CPU, virtual CPU, network capacity, and storage space to the computing resources. 14. The method according to claim 1, wherein said decreasing of the resource capacity includes sending an instruction to a computing resources managing module to: deprovision at least one computing resource; and remove physical memory, virtual memory, physical CPU, virtual CPU, network capacity, and storage space to the computing resources. 15. The method according to claim 1, wherein said decreasing of the resource capacity includes sending an instruction to a computing resources managing module to at least one of: deprovision at least one computing resource; and remove at least one of physical memory, virtual memory, physical CPU, virtual CPU, network capacity, and storage space to the computing resources. 16. The method according to claim 1, further comprising, prior to said increasing of the resource capacity and said decreasing of the resource capacity, identifying a current capacity of the computing resources. 17. The method according to claim 1, further comprising, prior to at least one of said increasing of the resource capacity and said decreasing of the resource capacity, identifying a current capacity of the computing resources. 18. A method for managing computing resources, said method comprising: predicting demand for the computing resources with a data analysis module based on a number of times that web pages that include at least one select term a predetermined amount of times are viewed; and at least one of increasing resource capacity with a processor when the predicted demand is above a first threshold, and decreasing resource capacity with the processor when the predicted demand is below a second threshold. 19. The method according to claim 18, wherein said increasing of the resource capacity includes adding at least one of physical memory, virtual memory, physical CPU, virtual CPU, network capacity, instances of middleware on a virtual machine, instances of applications on a virtual machine, and storage space to the computing resources. 20. A computer program product comprising: a computer readable storage medium having stored thereon: first program instructions executable by a device to cause the device predict demand for the computing resources based on at least one of: a number of web pages that include at least one select term a predetermined amount of times, and a number of times the web pages that include the at least one select term a predetermined amount of times are viewed; and second program instructions executable by the device to cause the device to at least one of increase resource capacity when the predicted demand is above a first threshold, and decrease resource capacity when the predicted demand is below a second threshold.
An embodiment of the invention provides a system and method for managing computing resources in a cloud computing environment, wherein the system includes a data analysis module connected to a processor. The data analysis module predicts the demand for the computing resources, wherein the demand is predicted based on internet user activity. The internet user activity includes: the number of web pages that include at least one select term a predetermined amount of times, the number of times the web pages that include the at least one select term a predetermined amount of times are viewed, and the number of times the select term is entered into an internet search engine. The processor increases resource capacity in the cloud computing environment when the predicted demand is above a first threshold. The processor decreases resource capacity in the cloud computing environment when the predicted demand is below a second threshold.1. A method for managing computing resources, said method comprising: predicting demand for the computing resources with a data analysis module based on a number of web pages that include at least one select term a predetermined amount of times; and at least one of increasing resource capacity with a processor when the predicted demand is above a first threshold, and decreasing resource capacity with the processor when the predicted demand is below a second threshold. 2. The method according to claim 1, wherein said increasing of the resource capacity includes provisioning at least one additional computing resource. 3. The method according to claim 1, wherein said increasing of the resource capacity includes adding physical memory, virtual memory, physical CPU, virtual CPU, network capacity, instances of middleware on a virtual machine, instances of applications on a virtual machine, and storage space to the computing resources. 4. The method according to claim 1, wherein said increasing of the resource capacity includes adding at least one of physical memory, virtual memory, physical CPU, virtual CPU, network capacity, instances of middleware on a virtual machine, instances of applications on a virtual machine, and storage space to the computing resources. 5. The method according to claim 1, wherein said decreasing of the resource capacity includes deprovisioning at least one computing resource. 6. The method according to claim 1, wherein said decreasing of the resource capacity includes removing physical memory, virtual memory, physical CPU, virtual CPU, network capacity, instances of middleware on a virtual machine, instances of applications on a virtual machine, and storage space from the computing resources. 7. The method according to claim 1, wherein said decreasing of the resource capacity includes removing at least one of physical memory, virtual memory, physical CPU, virtual CPU, network capacity, instances of middleware on a virtual machine, instances of applications on a virtual machine, and storage space from the computing resources. 8. The method according to claim 1, wherein said computing resources includes a server, a virtual machine, an application, and middleware. 9. The method according to claim 1, wherein said computing resources includes at least one of a server, a virtual machine, an application, and middleware. 10. The method according to claim 1, wherein the web pages include social networking websites, business networking websites, news stories, discussion forums, and advertisements. 11. The method according to claim 1, wherein the web pages include at least one of social networking websites, business networking websites, news stories, discussion forums, and advertisements. 12. The method according to claim 1, wherein said increasing of the resource capacity includes sending an instruction to a computing resources managing module to: provision at least one additional computing resource; and add physical memory, virtual memory, physical CPU, virtual CPU, network capacity, and storage space to the computing resources. 13. The method according to claim 1, wherein said increasing of the resource capacity includes sending an instruction to a computing resources managing module to at least one of: provision at least one additional computing resource; and add at least one of physical memory, virtual memory, physical CPU, virtual CPU, network capacity, and storage space to the computing resources. 14. The method according to claim 1, wherein said decreasing of the resource capacity includes sending an instruction to a computing resources managing module to: deprovision at least one computing resource; and remove physical memory, virtual memory, physical CPU, virtual CPU, network capacity, and storage space to the computing resources. 15. The method according to claim 1, wherein said decreasing of the resource capacity includes sending an instruction to a computing resources managing module to at least one of: deprovision at least one computing resource; and remove at least one of physical memory, virtual memory, physical CPU, virtual CPU, network capacity, and storage space to the computing resources. 16. The method according to claim 1, further comprising, prior to said increasing of the resource capacity and said decreasing of the resource capacity, identifying a current capacity of the computing resources. 17. The method according to claim 1, further comprising, prior to at least one of said increasing of the resource capacity and said decreasing of the resource capacity, identifying a current capacity of the computing resources. 18. A method for managing computing resources, said method comprising: predicting demand for the computing resources with a data analysis module based on a number of times that web pages that include at least one select term a predetermined amount of times are viewed; and at least one of increasing resource capacity with a processor when the predicted demand is above a first threshold, and decreasing resource capacity with the processor when the predicted demand is below a second threshold. 19. The method according to claim 18, wherein said increasing of the resource capacity includes adding at least one of physical memory, virtual memory, physical CPU, virtual CPU, network capacity, instances of middleware on a virtual machine, instances of applications on a virtual machine, and storage space to the computing resources. 20. A computer program product comprising: a computer readable storage medium having stored thereon: first program instructions executable by a device to cause the device predict demand for the computing resources based on at least one of: a number of web pages that include at least one select term a predetermined amount of times, and a number of times the web pages that include the at least one select term a predetermined amount of times are viewed; and second program instructions executable by the device to cause the device to at least one of increase resource capacity when the predicted demand is above a first threshold, and decrease resource capacity when the predicted demand is below a second threshold.
2,400
7,019
7,019
14,288,207
2,454
A social networking system provides a user with a feed of content items associated with other users connected to the user via the social networking system. Additionally, the social networking system identifies additional content items for presentation to the user and generates an additional feed including the additional content items. The additional content items may be determined by identifying content items having various characteristics and scoring the content items based on the characteristics. Content items having at least a threshold score are identified as additional content items. Examples of characteristics of content items include users providing content items to the social networking system, locations associated with social networking system users, and interaction with content items by social networking system users. In some embodiments, the additional feed modifies presentation of the additional content items based on their associated scores.
1. A method comprising: retrieving information associated with a user of a social networking system, the information maintained by the social networking system; generating a feed of content items for presentation to the user, the feed including content items associated with one or more additional users connected to the user; retrieving content items having one or more characteristics from a set of characteristics; generating a score for each of the retrieved content items having the one or more characteristics from the set, a score for a content item representing a measure of interest of the user in the content item and based at least in part on the retrieved information associated with the user and one or more characteristics of the content item; selecting one or more of the content items having the one or more characteristics based at least in part on the generated scores; generating an additional feed of content items including the selected one or more of the content items; and communicating the additional feed of content items to a client device for presentation to the user. 2. The method of claim 1, wherein the retrieved information associated with the user includes information describing one or more selected from a group consisting of: demographic information associated with the user, connections between the user and one or more other users of the social networking system, interactions between the user and one or more content items, demographic information associated with users connected to the user by the social networking system, and any combination thereof. 3. The method of claim 1, wherein the retrieved information associated with the user includes information describing one or more selected from a group consisting of: a location of the user associated with one or more interactions between the user and one or more content items, a type of device associated with an interaction between a user and a content item, and any combination thereof. 4. The method of claim 1, wherein a characteristic of a content item is selected from a group consisting of: information associated with a user providing the content item to the social networking system, indications of preference for the content item, comments associated with the content item, interactions with the content item by one or more users of the social networking system, information identifying users that interacted with the content item, information identifying users connected to at least one user that interacted with the content item, metadata associated with the content item, textual data associated with the content item, and any combination thereof. 5. The method of claim 1, wherein a characteristic of a content item is selected from a group consisting of: a location associated with the content item, a type of device used to provide the content item to the social networking system, a type of device associated with interactions with the content item, a time when a threshold number of users interacted with the content item, and any combination thereof. 6. The method of claim 1, wherein the score of the content item is based at least in part on a percentage of characteristics of the content item matching one or more attributes of the user determined form the retrieved information. 7. The method of claim 1, wherein the score is based at least in part on a number of characteristics of the content item matching one or more attributes of the user determined form the retrieved information. 8. The method of claim 1, wherein communicating the additional feed of content items to a client device for presentation to the user further comprises: retrieving a template for presenting the additional feed, the template including a plurality of slots, each slot specifying a location for presentation of a content item; and determining a slot for presenting a content item in the additional feed based at least in part on a score associated with the content item. 9. The method of claim 1, wherein communicating the additional feed of content items to a client device for presentation to the user further comprises: retrieving a template for presenting the additional feed, the template including a plurality of slots, each slot specifying a location for presentation of a content item; identifying a slot for presenting a content item in the additional feed; and modifying a dimension of the identified slot based at least in part on a score associated with the content item. 10. A method comprising: retrieving information associated with a user of a social networking system, the information maintained by the social networking system; identifying one or more additional users of the social networking system based at least in part on the retrieved information associated with the user; selecting an additional user based at least in part on characteristics of content items associated with the additional user; retrieving content items associated with the selected additional user; selecting one or more of the content items associated with the selected additional user based at least in part on the retrieved information associated with the user; and communicating the selected one or more content items and an identifier associated with the selected additional user to a client device for presentation to the user. 11. The method of claim 10, wherein identifying one or more additional users of the social networking system based at least in part on the retrieved information associated with the user comprises: determining attributes associated with the user from the retrieved information associated with the user; and selecting one or more additional users each having at least a threshold percentage of attributes matching one or more attributes associated with the user. 12. The method of claim 11, wherein identifying one or more additional users of the social networking system based at least in part on the retrieved information associated with the further comprises: determining interactions with content items by each of the selected one or more additional users; and identifying one or more of the selected one or more additional users that interacted with at least a threshold number of content items having a characteristic that is not associated with at least a threshold number of content items with which the user has interacted. 13. The method of claim 11, wherein a characteristic of a content item associated with the additional user is selected from a group consisting of: information associated with a user providing the content item to the social networking system, indications of preference for the content item, comments associated with the content item, interactions with the content item by one or more users of the social networking system, information identifying users that interacted with the content item, information identifying users connected to at least one user that interacted with the content item, metadata associated with the content item, textual data associated with the content item, a location associated with the content item, a type of device used to provide the content item to the social networking system, a type of device associated with interactions with the content item, a time when a threshold number of users interacted with the content item, and any combination thereof. 14. The method of claim 10, wherein selecting one or more of the content items associated with the selected additional user based at least in part on the retrieved information associated with the user comprises: selecting one or more content items having at least a threshold number of characteristics matching attributes of the user determined from the retrieved information associated with the user. 15. A method comprising: retrieving information associated with a user of a social networking system, the information maintained by the social networking system; determining a set of attributes associated with the user based on the retrieved information; identifying one or more additional users of the social networking system based at least in part on the set of attributes; selecting an additional user based at least in part on information associated with the additional user and the set of attributes associated with the user; retrieving content items associated with the selected additional user; selecting one or more of the content items associated with the selected additional user based at least in part on characteristics of the content items and the set of attributes associated with the user; and communicating the selected one or more content items and an identifier associated with the selected additional user to a client device for presentation to the user. 16. The method of claim 15, wherein an attribute associated with the user is selected from a group consisting of: a location of the user associated with one or more interactions between the user and one or more content items, a type of device associated with an interaction between a user and a content item, and any combination thereof. 17. The method of claim 15, wherein an attribute associated with the user is selected from a group consisting of: demographic information associated with the user, connections between the user and one or more other users of the social networking system, interactions between the user and one or more content items, demographic information associated with users connected to the user by the social networking system, and any combination thereof. 18. The method of claim 15, wherein a characteristic of a content item is selected from a group consisting of: information associated with a user providing the content item to the social networking system, indications of preference for the content item, comments associated with the content item, interactions with the content item by one or more users of the social networking system, information identifying users that interacted with the content item, information identifying users connected to at least one user that interacted with the content item, metadata associated with the content item, textual data associated with the content item, and any combination thereof. 19. The method of claim 15, wherein selecting the additional user based at least in part on information associated with the additional user and the set of attributes associated with the user comprises: selecting one or more additional users each having at least a threshold percentage of attributes matching attributes from the set of attributes. 20. The method of claim 15, wherein selecting one or more of the content items associated with the selected additional user comprises: selecting one or more content items having at least a threshold number of characteristics matching attributes from the set of attributes.
A social networking system provides a user with a feed of content items associated with other users connected to the user via the social networking system. Additionally, the social networking system identifies additional content items for presentation to the user and generates an additional feed including the additional content items. The additional content items may be determined by identifying content items having various characteristics and scoring the content items based on the characteristics. Content items having at least a threshold score are identified as additional content items. Examples of characteristics of content items include users providing content items to the social networking system, locations associated with social networking system users, and interaction with content items by social networking system users. In some embodiments, the additional feed modifies presentation of the additional content items based on their associated scores.1. A method comprising: retrieving information associated with a user of a social networking system, the information maintained by the social networking system; generating a feed of content items for presentation to the user, the feed including content items associated with one or more additional users connected to the user; retrieving content items having one or more characteristics from a set of characteristics; generating a score for each of the retrieved content items having the one or more characteristics from the set, a score for a content item representing a measure of interest of the user in the content item and based at least in part on the retrieved information associated with the user and one or more characteristics of the content item; selecting one or more of the content items having the one or more characteristics based at least in part on the generated scores; generating an additional feed of content items including the selected one or more of the content items; and communicating the additional feed of content items to a client device for presentation to the user. 2. The method of claim 1, wherein the retrieved information associated with the user includes information describing one or more selected from a group consisting of: demographic information associated with the user, connections between the user and one or more other users of the social networking system, interactions between the user and one or more content items, demographic information associated with users connected to the user by the social networking system, and any combination thereof. 3. The method of claim 1, wherein the retrieved information associated with the user includes information describing one or more selected from a group consisting of: a location of the user associated with one or more interactions between the user and one or more content items, a type of device associated with an interaction between a user and a content item, and any combination thereof. 4. The method of claim 1, wherein a characteristic of a content item is selected from a group consisting of: information associated with a user providing the content item to the social networking system, indications of preference for the content item, comments associated with the content item, interactions with the content item by one or more users of the social networking system, information identifying users that interacted with the content item, information identifying users connected to at least one user that interacted with the content item, metadata associated with the content item, textual data associated with the content item, and any combination thereof. 5. The method of claim 1, wherein a characteristic of a content item is selected from a group consisting of: a location associated with the content item, a type of device used to provide the content item to the social networking system, a type of device associated with interactions with the content item, a time when a threshold number of users interacted with the content item, and any combination thereof. 6. The method of claim 1, wherein the score of the content item is based at least in part on a percentage of characteristics of the content item matching one or more attributes of the user determined form the retrieved information. 7. The method of claim 1, wherein the score is based at least in part on a number of characteristics of the content item matching one or more attributes of the user determined form the retrieved information. 8. The method of claim 1, wherein communicating the additional feed of content items to a client device for presentation to the user further comprises: retrieving a template for presenting the additional feed, the template including a plurality of slots, each slot specifying a location for presentation of a content item; and determining a slot for presenting a content item in the additional feed based at least in part on a score associated with the content item. 9. The method of claim 1, wherein communicating the additional feed of content items to a client device for presentation to the user further comprises: retrieving a template for presenting the additional feed, the template including a plurality of slots, each slot specifying a location for presentation of a content item; identifying a slot for presenting a content item in the additional feed; and modifying a dimension of the identified slot based at least in part on a score associated with the content item. 10. A method comprising: retrieving information associated with a user of a social networking system, the information maintained by the social networking system; identifying one or more additional users of the social networking system based at least in part on the retrieved information associated with the user; selecting an additional user based at least in part on characteristics of content items associated with the additional user; retrieving content items associated with the selected additional user; selecting one or more of the content items associated with the selected additional user based at least in part on the retrieved information associated with the user; and communicating the selected one or more content items and an identifier associated with the selected additional user to a client device for presentation to the user. 11. The method of claim 10, wherein identifying one or more additional users of the social networking system based at least in part on the retrieved information associated with the user comprises: determining attributes associated with the user from the retrieved information associated with the user; and selecting one or more additional users each having at least a threshold percentage of attributes matching one or more attributes associated with the user. 12. The method of claim 11, wherein identifying one or more additional users of the social networking system based at least in part on the retrieved information associated with the further comprises: determining interactions with content items by each of the selected one or more additional users; and identifying one or more of the selected one or more additional users that interacted with at least a threshold number of content items having a characteristic that is not associated with at least a threshold number of content items with which the user has interacted. 13. The method of claim 11, wherein a characteristic of a content item associated with the additional user is selected from a group consisting of: information associated with a user providing the content item to the social networking system, indications of preference for the content item, comments associated with the content item, interactions with the content item by one or more users of the social networking system, information identifying users that interacted with the content item, information identifying users connected to at least one user that interacted with the content item, metadata associated with the content item, textual data associated with the content item, a location associated with the content item, a type of device used to provide the content item to the social networking system, a type of device associated with interactions with the content item, a time when a threshold number of users interacted with the content item, and any combination thereof. 14. The method of claim 10, wherein selecting one or more of the content items associated with the selected additional user based at least in part on the retrieved information associated with the user comprises: selecting one or more content items having at least a threshold number of characteristics matching attributes of the user determined from the retrieved information associated with the user. 15. A method comprising: retrieving information associated with a user of a social networking system, the information maintained by the social networking system; determining a set of attributes associated with the user based on the retrieved information; identifying one or more additional users of the social networking system based at least in part on the set of attributes; selecting an additional user based at least in part on information associated with the additional user and the set of attributes associated with the user; retrieving content items associated with the selected additional user; selecting one or more of the content items associated with the selected additional user based at least in part on characteristics of the content items and the set of attributes associated with the user; and communicating the selected one or more content items and an identifier associated with the selected additional user to a client device for presentation to the user. 16. The method of claim 15, wherein an attribute associated with the user is selected from a group consisting of: a location of the user associated with one or more interactions between the user and one or more content items, a type of device associated with an interaction between a user and a content item, and any combination thereof. 17. The method of claim 15, wherein an attribute associated with the user is selected from a group consisting of: demographic information associated with the user, connections between the user and one or more other users of the social networking system, interactions between the user and one or more content items, demographic information associated with users connected to the user by the social networking system, and any combination thereof. 18. The method of claim 15, wherein a characteristic of a content item is selected from a group consisting of: information associated with a user providing the content item to the social networking system, indications of preference for the content item, comments associated with the content item, interactions with the content item by one or more users of the social networking system, information identifying users that interacted with the content item, information identifying users connected to at least one user that interacted with the content item, metadata associated with the content item, textual data associated with the content item, and any combination thereof. 19. The method of claim 15, wherein selecting the additional user based at least in part on information associated with the additional user and the set of attributes associated with the user comprises: selecting one or more additional users each having at least a threshold percentage of attributes matching attributes from the set of attributes. 20. The method of claim 15, wherein selecting one or more of the content items associated with the selected additional user comprises: selecting one or more content items having at least a threshold number of characteristics matching attributes from the set of attributes.
2,400
7,020
7,020
14,385,950
2,473
The existing technology focuses on the case of the same timing advance (TA) in carrier aggregation, not supporting randomly accessing a SCell in the multi-TA carrier aggregation. The invention provides a method of randomly accessing a SCell and receiving data. For a procedure of randomly accessing a secondary cell (SCell), the UE has accessed a primary cell (PCell), the PCell and the SCell belong to different timing advance groups, the first cell transmits (A, A′, B) a random access command to the UE, the command is used for instructing the UE to access the SCell; According to the random access command, the UE transmits (C) a random access preamble to the SCell. Preferably, the first cell comprises another cell which cross-carrier schedules the SCell or the SCell. The invention provides a technical solution of randomly accessing a SCell in a multi-TA scenario, which fills the gaps in the existing technology.
1. A method in a UE used for randomly accessing a secondary cell, wherein the UE has accessed a primary cell, and the primary cell and the secondary cell belong to different timing advance groups, the method comprising: receiving a random access command from the first cell, the command being used for instructing the UE to access the secondary cell; transmitting a random access preamble to the secondary cell, according to the random access command. 2. A method of claim 1, wherein, in the receiving, the received random access command is any one of the followings: downlink control information 1A instructing random access, which comprises instruction information instructing accessing secondary cells; downlink control information dedicated for instructing randomly accessing secondary cells. 3. A method of claim 2, wherein, when the random access command is the downlink control information 1A instructing random access, the instruction information comprises any of the following fields that are configured with specific values used for instructing randomly accessing secondary cells: a carrier indicator; a dedicated information element; an information element of modulation and coding scheme; an information element of HARQ procedure number. 4. A method of claim 1, wherein, the secondary cell is configured with cross-carrier scheduling by a base station, the random access command further comprises indication information indicating the secondary cell, and in the receiving, another cell that cross-carrier schedules the secondary cell is the first cell, and the random access command is transmitted by the another cell. 5. A method of claim 1, wherein, the secondary cell is not configured with cross-carrier scheduling by a base station, and in the receiving, the secondary cell is taken as the first cell to transmit the random access command, and the random access command is transmitted by the secondary cell. 6. A method of claim 1, wherein, the receivinq obtains preamble information and mask information of a physical random access channel from the command, and the transmitting transmits the preamble to the secondary cell to request random access, according to a configuration of the physical random access channel. 7. A method of claim 1, before the transmitting, further comprising: verifying if the random access command is valid; and implementing the transmitting when the validity of the command is verified. 8. A method of claim 7, further comprising: determining the timing advance groups to which the primary cell and each of secondary cells respectively belong; verifying that the random access command is valid comprises: determining that the timing advance group to which the secondary cell belongs is different from the timing advance group of the primary cell; determining that the secondary cell is activated; and determining that the preamble is a dedicated random access preamble, and the physical random access channel is valid. 9. A method used for instructing a UE to randomly access a secondary cell, in a base station to which the first cell belongs, wherein the UE has accessed a primary cell, and the primary cell and the secondary cell belong to different timing advance groups, the method comprising: transmitting a random access command to the UE, the command is used for instructing the UE to access the secondary cell. 10. A method of claim 9, wherein, the transmitting a random access command to the UE puts indication information indicating the secondary cell in the random access command for transmitting; and/or, the first cell comprises any cell of the following: the secondary cell; the primary cell; another cell that cross-carrier schedules the secondary cell. 11. A method of receiving data in a UE, wherein the UE has accessed a primary cell, and is randomly accessing a secondary cell, and the secondary cell and the primary cell belong to different timing advance groups, the method comprising: receiving a random access response from the secondary cell in a certain subframe; continuing receiving and decoding a physical downlink channel transmitted by other cells in the subframe. 12. A method of claim 11, wherein, in the continuing, the other cells comprise: the primary cell; and/or other secondary cells belong to the same timing advance groups with the primary cell; and/or other cells belong to different timing advance groups with the secondary cell. 13. A method of claim 12, wherein, in the receiving a random access response from the secondary cell in a certain subframe, the random access response is scrambled by a random access RNTI; and in the continuing, the UE needs decoding, in PDCCH, downlink control information scrambled by the UE's C-RNTI, and/or decoding, in PDCCH of a primary cell, downlink control information scrambled by the UE's semi-persistent scheduling RNTI, and/or decoding, in PDSCH of a primary cell, the data information scrambled by the UE's semi-persistent scheduling RNTI.
The existing technology focuses on the case of the same timing advance (TA) in carrier aggregation, not supporting randomly accessing a SCell in the multi-TA carrier aggregation. The invention provides a method of randomly accessing a SCell and receiving data. For a procedure of randomly accessing a secondary cell (SCell), the UE has accessed a primary cell (PCell), the PCell and the SCell belong to different timing advance groups, the first cell transmits (A, A′, B) a random access command to the UE, the command is used for instructing the UE to access the SCell; According to the random access command, the UE transmits (C) a random access preamble to the SCell. Preferably, the first cell comprises another cell which cross-carrier schedules the SCell or the SCell. The invention provides a technical solution of randomly accessing a SCell in a multi-TA scenario, which fills the gaps in the existing technology.1. A method in a UE used for randomly accessing a secondary cell, wherein the UE has accessed a primary cell, and the primary cell and the secondary cell belong to different timing advance groups, the method comprising: receiving a random access command from the first cell, the command being used for instructing the UE to access the secondary cell; transmitting a random access preamble to the secondary cell, according to the random access command. 2. A method of claim 1, wherein, in the receiving, the received random access command is any one of the followings: downlink control information 1A instructing random access, which comprises instruction information instructing accessing secondary cells; downlink control information dedicated for instructing randomly accessing secondary cells. 3. A method of claim 2, wherein, when the random access command is the downlink control information 1A instructing random access, the instruction information comprises any of the following fields that are configured with specific values used for instructing randomly accessing secondary cells: a carrier indicator; a dedicated information element; an information element of modulation and coding scheme; an information element of HARQ procedure number. 4. A method of claim 1, wherein, the secondary cell is configured with cross-carrier scheduling by a base station, the random access command further comprises indication information indicating the secondary cell, and in the receiving, another cell that cross-carrier schedules the secondary cell is the first cell, and the random access command is transmitted by the another cell. 5. A method of claim 1, wherein, the secondary cell is not configured with cross-carrier scheduling by a base station, and in the receiving, the secondary cell is taken as the first cell to transmit the random access command, and the random access command is transmitted by the secondary cell. 6. A method of claim 1, wherein, the receivinq obtains preamble information and mask information of a physical random access channel from the command, and the transmitting transmits the preamble to the secondary cell to request random access, according to a configuration of the physical random access channel. 7. A method of claim 1, before the transmitting, further comprising: verifying if the random access command is valid; and implementing the transmitting when the validity of the command is verified. 8. A method of claim 7, further comprising: determining the timing advance groups to which the primary cell and each of secondary cells respectively belong; verifying that the random access command is valid comprises: determining that the timing advance group to which the secondary cell belongs is different from the timing advance group of the primary cell; determining that the secondary cell is activated; and determining that the preamble is a dedicated random access preamble, and the physical random access channel is valid. 9. A method used for instructing a UE to randomly access a secondary cell, in a base station to which the first cell belongs, wherein the UE has accessed a primary cell, and the primary cell and the secondary cell belong to different timing advance groups, the method comprising: transmitting a random access command to the UE, the command is used for instructing the UE to access the secondary cell. 10. A method of claim 9, wherein, the transmitting a random access command to the UE puts indication information indicating the secondary cell in the random access command for transmitting; and/or, the first cell comprises any cell of the following: the secondary cell; the primary cell; another cell that cross-carrier schedules the secondary cell. 11. A method of receiving data in a UE, wherein the UE has accessed a primary cell, and is randomly accessing a secondary cell, and the secondary cell and the primary cell belong to different timing advance groups, the method comprising: receiving a random access response from the secondary cell in a certain subframe; continuing receiving and decoding a physical downlink channel transmitted by other cells in the subframe. 12. A method of claim 11, wherein, in the continuing, the other cells comprise: the primary cell; and/or other secondary cells belong to the same timing advance groups with the primary cell; and/or other cells belong to different timing advance groups with the secondary cell. 13. A method of claim 12, wherein, in the receiving a random access response from the secondary cell in a certain subframe, the random access response is scrambled by a random access RNTI; and in the continuing, the UE needs decoding, in PDCCH, downlink control information scrambled by the UE's C-RNTI, and/or decoding, in PDCCH of a primary cell, downlink control information scrambled by the UE's semi-persistent scheduling RNTI, and/or decoding, in PDSCH of a primary cell, the data information scrambled by the UE's semi-persistent scheduling RNTI.
2,400
7,021
7,021
13,959,885
2,487
Provided are an image encoding method and device. When carrying out image encoding for a block within a slice, at least one block in a restored block of the slice is set as a reference block. When this is done, the encoding parameters of the reference block are distinguished, and the block to be encoded is encoded adaptively based on the encoding parameters.
1. A video decoding device performing intra-prediction, which comprises: a receiving unit which receives a bit stream; and a control unit which performs adaptive decoding based on the bit stream received, wherein the adaptive decoding process determines intra-prediction direction of the decoding target block based on the intra-prediction direction of one of previously reconstructed blocks, and decodes the decoding target block based on the intra-prediction direction determined, the referencing block being one of the reconstructed blocks which are most adjacent to the decoding target block in a current picture. 2. The video decoding device of claim 1, wherein the bit stream includes information on a referencing block identifier and the referencing block identifier indicates intra-prediction direction of the referencing block, and the controlling unit determines intra-prediction direction of the decoding target block based on the referencing block identifier. 3. The video decoding device of claim 2, wherein the referencing block identifier indicates the intra-prediction direction of the referencing block from a set of limited mode candidates including the intra-prediction direction of at least one previously reconstructed block. 4. The video decoding device of claim 1, wherein the controlling unit determines the intra-prediction direction of the referencing block as the intra-prediction direction to be applied to the decoding target block, and performs decoding of the decoding target block based on the intra-prediction direction determined. 5. The video decoding device of claim 1, wherein the controlling unit does not determine the intra-prediction direction of the referencing block as the intra-prediction direction to be applied to the decoding target block if the referencing block is located outside the boundary of the slice to which the decoding target block belongs. 6. The video decoding device of claim 1, wherein the bit stream includes information on a coding method indicator, and the coding method indicator indicates the coding mode corresponding to the decoding target block, and wherein the controlling unit determines the coding mode corresponding to the decoding target block based on the coding method indicator, and determines performing the adaptive decoding according to the coding mode determined.
Provided are an image encoding method and device. When carrying out image encoding for a block within a slice, at least one block in a restored block of the slice is set as a reference block. When this is done, the encoding parameters of the reference block are distinguished, and the block to be encoded is encoded adaptively based on the encoding parameters.1. A video decoding device performing intra-prediction, which comprises: a receiving unit which receives a bit stream; and a control unit which performs adaptive decoding based on the bit stream received, wherein the adaptive decoding process determines intra-prediction direction of the decoding target block based on the intra-prediction direction of one of previously reconstructed blocks, and decodes the decoding target block based on the intra-prediction direction determined, the referencing block being one of the reconstructed blocks which are most adjacent to the decoding target block in a current picture. 2. The video decoding device of claim 1, wherein the bit stream includes information on a referencing block identifier and the referencing block identifier indicates intra-prediction direction of the referencing block, and the controlling unit determines intra-prediction direction of the decoding target block based on the referencing block identifier. 3. The video decoding device of claim 2, wherein the referencing block identifier indicates the intra-prediction direction of the referencing block from a set of limited mode candidates including the intra-prediction direction of at least one previously reconstructed block. 4. The video decoding device of claim 1, wherein the controlling unit determines the intra-prediction direction of the referencing block as the intra-prediction direction to be applied to the decoding target block, and performs decoding of the decoding target block based on the intra-prediction direction determined. 5. The video decoding device of claim 1, wherein the controlling unit does not determine the intra-prediction direction of the referencing block as the intra-prediction direction to be applied to the decoding target block if the referencing block is located outside the boundary of the slice to which the decoding target block belongs. 6. The video decoding device of claim 1, wherein the bit stream includes information on a coding method indicator, and the coding method indicator indicates the coding mode corresponding to the decoding target block, and wherein the controlling unit determines the coding mode corresponding to the decoding target block based on the coding method indicator, and determines performing the adaptive decoding according to the coding mode determined.
2,400
7,022
7,022
12,363,391
2,423
Information may be provided via a display panel of a television receiving device by determining satisfaction of at least one condition while at least one television program is selected, and displaying information other than the information regarding the selected at least one television program via the display panel of the television receiving device when satisfaction of the at least one condition is determined. Determining satisfaction of the condition may involve: determining an elapse of a predetermined period of time without user input after the information regarding the selected at least one television program is initially displayed; determining an elapse of a predetermined period of time without a change of the selected at least one television program after the information regarding the selected at least one television program is initially displayed; determining a standby state of the television receiving device; or determining an off state of the television receiving device.
1. A method of providing information via a display panel of a television receiving device, the method comprising: receiving a television signal including at least one television program at the television receiving device; selecting the at least one television program for output by the television receiving device; displaying information regarding the selected at least one television program via the display panel of the television receiving device; determining satisfaction of at least one condition while the at least one television program is selected; and displaying information other than the information regarding the selected at least one television program via the display panel of the television receiving device when satisfaction of the at least one condition is determined. 2. The method of claim 1, wherein determining satisfaction of at least one condition comprises determining an elapse of a predetermined period of time without user input after the information regarding the selected at least one television program is initially displayed. 3. The method of claim 1, wherein determining satisfaction of at least one condition comprises determining an elapse of a predetermined period of time without a change of the selected at least one television program after the information regarding the selected at least one television program is initially displayed. 4. The method of claim 1, wherein determining satisfaction of at least one condition comprises determining a standby state of the television receiving device. 5. The method of claim 1, wherein determining satisfaction of at least one condition comprises determining an off state of the television receiving device. 6. The method of claim 1, wherein displaying information other than the information regarding the selected at least one television program comprises displaying information regarding a television program to be aired in the future. 7. The method of claim 6, wherein displaying information regarding a television program to be aired in the future comprises displaying information regarding a next television program to be aired on a same channel as the selected at least one television program. 8. The method of claim 7, wherein the information displayed regarding a next television program includes a time until airing. 9. The method of claim 6, wherein displaying information regarding a television program to be aired in the future comprises displaying information regarding a television program that the television receiver device is set to display. 10. The method of claim 6, wherein displaying information regarding a television program to be aired in the future comprises displaying information regarding a television program that the television receiver device is set to record. 11. The method of claim 6, wherein displaying information regarding a television program to be aired in the future comprises displaying information regarding a television program available for purchase. 12. The method of claim 1, wherein displaying information other than the information regarding the selected at least one television program comprises displaying information regarding a message received by the television receiving device. 13. The method of claim 12, wherein the displayed notification is regarding a message received from a television service provider. 14. The method of claim 12, wherein the displayed notification is regarding a message received from another television receiving device. 15. The method of claim 1, wherein displaying information other than the information regarding the selected at least one television program comprises displaying a message received by the television receiving device. 16. The method of claim 15, wherein the displayed message is received from a television service provider. 17. The method of claim 15, wherein the displayed message is received from another television receiving device. 18. A television receiving device for receiving a television signal including a plurality of channels of television programs, the device comprising: a tuner configured to select one of the plurality of channels included in the television signal; an output configured to provide the television programs of the selected one of the plurality of channels to a television display device; a display panel configured to display textual information; and a processor configured to cause the display panel to display information regarding a current television program of the television programs of the selected one of the plurality of channels and to display information other than the information regarding the current television program when at least one condition is satisfied. 19. The device of claim 18, wherein the processor is configured to determine satisfaction of the at least one condition by determining an elapse of a predetermined period of time without user input after the information regarding the selected at least one television program is initially displayed. 20. The device of claim 18, further comprising a counter in communication with the processor, the counter configured to set the predetermined period of time.
Information may be provided via a display panel of a television receiving device by determining satisfaction of at least one condition while at least one television program is selected, and displaying information other than the information regarding the selected at least one television program via the display panel of the television receiving device when satisfaction of the at least one condition is determined. Determining satisfaction of the condition may involve: determining an elapse of a predetermined period of time without user input after the information regarding the selected at least one television program is initially displayed; determining an elapse of a predetermined period of time without a change of the selected at least one television program after the information regarding the selected at least one television program is initially displayed; determining a standby state of the television receiving device; or determining an off state of the television receiving device.1. A method of providing information via a display panel of a television receiving device, the method comprising: receiving a television signal including at least one television program at the television receiving device; selecting the at least one television program for output by the television receiving device; displaying information regarding the selected at least one television program via the display panel of the television receiving device; determining satisfaction of at least one condition while the at least one television program is selected; and displaying information other than the information regarding the selected at least one television program via the display panel of the television receiving device when satisfaction of the at least one condition is determined. 2. The method of claim 1, wherein determining satisfaction of at least one condition comprises determining an elapse of a predetermined period of time without user input after the information regarding the selected at least one television program is initially displayed. 3. The method of claim 1, wherein determining satisfaction of at least one condition comprises determining an elapse of a predetermined period of time without a change of the selected at least one television program after the information regarding the selected at least one television program is initially displayed. 4. The method of claim 1, wherein determining satisfaction of at least one condition comprises determining a standby state of the television receiving device. 5. The method of claim 1, wherein determining satisfaction of at least one condition comprises determining an off state of the television receiving device. 6. The method of claim 1, wherein displaying information other than the information regarding the selected at least one television program comprises displaying information regarding a television program to be aired in the future. 7. The method of claim 6, wherein displaying information regarding a television program to be aired in the future comprises displaying information regarding a next television program to be aired on a same channel as the selected at least one television program. 8. The method of claim 7, wherein the information displayed regarding a next television program includes a time until airing. 9. The method of claim 6, wherein displaying information regarding a television program to be aired in the future comprises displaying information regarding a television program that the television receiver device is set to display. 10. The method of claim 6, wherein displaying information regarding a television program to be aired in the future comprises displaying information regarding a television program that the television receiver device is set to record. 11. The method of claim 6, wherein displaying information regarding a television program to be aired in the future comprises displaying information regarding a television program available for purchase. 12. The method of claim 1, wherein displaying information other than the information regarding the selected at least one television program comprises displaying information regarding a message received by the television receiving device. 13. The method of claim 12, wherein the displayed notification is regarding a message received from a television service provider. 14. The method of claim 12, wherein the displayed notification is regarding a message received from another television receiving device. 15. The method of claim 1, wherein displaying information other than the information regarding the selected at least one television program comprises displaying a message received by the television receiving device. 16. The method of claim 15, wherein the displayed message is received from a television service provider. 17. The method of claim 15, wherein the displayed message is received from another television receiving device. 18. A television receiving device for receiving a television signal including a plurality of channels of television programs, the device comprising: a tuner configured to select one of the plurality of channels included in the television signal; an output configured to provide the television programs of the selected one of the plurality of channels to a television display device; a display panel configured to display textual information; and a processor configured to cause the display panel to display information regarding a current television program of the television programs of the selected one of the plurality of channels and to display information other than the information regarding the current television program when at least one condition is satisfied. 19. The device of claim 18, wherein the processor is configured to determine satisfaction of the at least one condition by determining an elapse of a predetermined period of time without user input after the information regarding the selected at least one television program is initially displayed. 20. The device of claim 18, further comprising a counter in communication with the processor, the counter configured to set the predetermined period of time.
2,400
7,023
7,023
14,853,868
2,423
Audio and video streams of a media file are transcoded just-in-time by keeping the transcoding process synchronized to a wall clock. The transcoding is initially configured slightly faster than real-time. The transcoded frames are pushed from the transcoder through a variable bandwidth connection as soon as they are transcoded. Transcoding is then monitored periodically to assess the bandwidth that was available during the transmission of a transcoded buffer. Two time intervals are measured: a buffer interval which is the difference in the transcoded buffer timestamps of the previous two transmissions, and a clock interval corresponding to the real time transmission time of the last transcoded buffer. If a significant difference is observed, the transcoder bit rate is adjusted by a factor that is derived from that difference.
1. A method for encoding a media file or part thereof for transmission in real time over a varying bandwidth link to a mobile unit, comprising: employing at least one processor of a transcoder for: (i) encoding one or more fragments of the media file into transcoded media fragments to form a stream fragment; (ii) sending the stream fragment to a transmission buffer of the transcoder; (iii) determining an estimated transmit time of a previously formed stream fragment, the estimated transmit time being a time interval required for said previously formed stream fragment to be conveyed from the transmission buffer and consumed by the varying bandwidth link; (iv) determining an estimated display time of said stream fragment; and (v) adjusting a current encoding rate of the transcoded media fragments as a function of the estimated transmit time and the estimated display time.
Audio and video streams of a media file are transcoded just-in-time by keeping the transcoding process synchronized to a wall clock. The transcoding is initially configured slightly faster than real-time. The transcoded frames are pushed from the transcoder through a variable bandwidth connection as soon as they are transcoded. Transcoding is then monitored periodically to assess the bandwidth that was available during the transmission of a transcoded buffer. Two time intervals are measured: a buffer interval which is the difference in the transcoded buffer timestamps of the previous two transmissions, and a clock interval corresponding to the real time transmission time of the last transcoded buffer. If a significant difference is observed, the transcoder bit rate is adjusted by a factor that is derived from that difference.1. A method for encoding a media file or part thereof for transmission in real time over a varying bandwidth link to a mobile unit, comprising: employing at least one processor of a transcoder for: (i) encoding one or more fragments of the media file into transcoded media fragments to form a stream fragment; (ii) sending the stream fragment to a transmission buffer of the transcoder; (iii) determining an estimated transmit time of a previously formed stream fragment, the estimated transmit time being a time interval required for said previously formed stream fragment to be conveyed from the transmission buffer and consumed by the varying bandwidth link; (iv) determining an estimated display time of said stream fragment; and (v) adjusting a current encoding rate of the transcoded media fragments as a function of the estimated transmit time and the estimated display time.
2,400
7,024
7,024
12,403,347
2,463
A method for handling a contention-based random access procedure in a user equipment (UE) of a wireless communication system is disclosed. The method includes steps of sending a Scheduled Transmission message, which applies an HARQ (Hybrid Automatic Repeat request) process for transmission, starting a Contention Resolution Timer and monitoring a PDCCH (Physical Downlink Control Channel), and flushing a buffer of the HARQ process used for transmission of the Scheduled Transmission message when a contention result of the random access procedure is determined.
1. A method for handling a contention-based random access procedure in a user equipment (UE) of a wireless communication system, the method comprising: sending a Scheduled Transmission message, the Scheduled Transmission message applying a Hybrid Automatic Repeat reQuest (HARQ) process for transmission; starting a Contention Resolution Timer and monitoring a Physical Downlink Control Channel (PDCCH); and flushing a buffer of the HARQ process used for transmission of the Scheduled Transmission message when a contention result of the random access procedure is determined. 2. The method of claim 1, wherein the contention result of the random access procedure is successful. 3. The method of claim 1, wherein the contention result of the random access procedure is unsuccessful. 4. The method of claim 1, wherein the Scheduled Transmission message comprises a Cell Radio Network Temporary Identifier (C-RNTI) Media Access Control (MAC) control element. 5. The method of claim 4, wherein the step of determining the contention result of the random access procedure comprises: determining the contention result of the random access procedure to be successful when a PDCCH transmission addressed to a C-RNTI of the UE is received. 6. The method of claim 4, wherein the step of determining the contention result of the random access procedure comprises: determining the contention result of the random access procedure to be unsuccessful when the Contention Resolution Timer expires. 7. The method of claim 1, wherein the Scheduled Transmission message comprises a Common Control Channel (CCCH) message, the CCCH message further comprising an UE Contention Resolution Identity provided by an upper layer. 8. The method of claim 7, wherein the step of determining the contention result of the random access procedure comprises: determining the contention result of the random access procedure to be successful when a MAC Packet Data Unit (PDU) received by the UE contains an UE Contention Resolution Identity MAC control element which matches the UE Contention Resolution Identity provided by the upper layer. 9. The method of claim 7, wherein the step of determining the contention result of the random access procedure comprises: determining the contention result of the random access procedure to be unsuccessful when a MAC Packet Data Unit (PDU) received by the UE contains an UE Contention Resolution Identity MAC control element which does not match the UE Contention Resolution Identity provided by the upper layer or when the Contention Resolution Timer expires. 10. A communication device for handling a contention-based random access procedure in a user equipment (UE) of a wireless communication system, the communication device comprising: a processor for executing a program code; and a memory, coupled to the processor, for storing the program code; wherein the program code comprises: sending a Scheduled Transmission message, the Scheduled Transmission message applying a Hybrid Automatic Repeat reQuest (HARQ) process for transmission; starting a Contention Resolution Timer and monitoring a Physical Downlink Control Channel (PDCCH); and flushing a buffer of the HARQ process used for transmission of the Scheduled Transmission message when a contention result of the random access procedure is determined. 11. The communication device of claim 10, wherein the contention result of the random access procedure is successful. 12. The communication device of claim 10, wherein the contention result of the random access procedure is unsuccessful. 13. The communication device of claim 10, wherein the Scheduled Transmission message comprises a Cell Radio Network Temporary Identifier (C-RNTI) Media Access Control (MAC) control element. 14. The communication device of claim 13, wherein the step of determining the contention result of the random access procedure comprises: determining the contention result of the random access procedure to be successful when a PDCCH transmission addressed to a C-RNTI of the UE is received. 15. The communication device of claim 13, wherein the step of determining the contention result of the random access procedure comprises: determining the contention result of the random access procedure to be unsuccessful when the Contention Resolution Timer expires. 16. The communication device of claim 10, wherein the Scheduled Transmission message comprises a Common Control Channel (CCCH) message, the CCCH further comprising an UE Contention Resolution Identity provided by an upper layer. 17. The communication device of claim 16, wherein the step of determining the contention result of the random access procedure comprises: determining the contention result of the random access procedure to be successful when a MAC Packet Data Unit (PDU) received by the UE contains an UE Contention Resolution Identity MAC control element which matches the UE Contention Resolution Identity provided by the upper layer. 18. The communication device of claim 16, wherein the step of determining the contention result of the random access procedure comprises: determining the contention result of the random access procedure to be unsuccessful when a MAC Packet Data Unit (PDU) received by the UE contains an UE Contention Resolution Identity MAC control element which does not match the UE Contention Resolution Identity provided by the upper layer or when the Contention Resolution Timer expires.
A method for handling a contention-based random access procedure in a user equipment (UE) of a wireless communication system is disclosed. The method includes steps of sending a Scheduled Transmission message, which applies an HARQ (Hybrid Automatic Repeat request) process for transmission, starting a Contention Resolution Timer and monitoring a PDCCH (Physical Downlink Control Channel), and flushing a buffer of the HARQ process used for transmission of the Scheduled Transmission message when a contention result of the random access procedure is determined.1. A method for handling a contention-based random access procedure in a user equipment (UE) of a wireless communication system, the method comprising: sending a Scheduled Transmission message, the Scheduled Transmission message applying a Hybrid Automatic Repeat reQuest (HARQ) process for transmission; starting a Contention Resolution Timer and monitoring a Physical Downlink Control Channel (PDCCH); and flushing a buffer of the HARQ process used for transmission of the Scheduled Transmission message when a contention result of the random access procedure is determined. 2. The method of claim 1, wherein the contention result of the random access procedure is successful. 3. The method of claim 1, wherein the contention result of the random access procedure is unsuccessful. 4. The method of claim 1, wherein the Scheduled Transmission message comprises a Cell Radio Network Temporary Identifier (C-RNTI) Media Access Control (MAC) control element. 5. The method of claim 4, wherein the step of determining the contention result of the random access procedure comprises: determining the contention result of the random access procedure to be successful when a PDCCH transmission addressed to a C-RNTI of the UE is received. 6. The method of claim 4, wherein the step of determining the contention result of the random access procedure comprises: determining the contention result of the random access procedure to be unsuccessful when the Contention Resolution Timer expires. 7. The method of claim 1, wherein the Scheduled Transmission message comprises a Common Control Channel (CCCH) message, the CCCH message further comprising an UE Contention Resolution Identity provided by an upper layer. 8. The method of claim 7, wherein the step of determining the contention result of the random access procedure comprises: determining the contention result of the random access procedure to be successful when a MAC Packet Data Unit (PDU) received by the UE contains an UE Contention Resolution Identity MAC control element which matches the UE Contention Resolution Identity provided by the upper layer. 9. The method of claim 7, wherein the step of determining the contention result of the random access procedure comprises: determining the contention result of the random access procedure to be unsuccessful when a MAC Packet Data Unit (PDU) received by the UE contains an UE Contention Resolution Identity MAC control element which does not match the UE Contention Resolution Identity provided by the upper layer or when the Contention Resolution Timer expires. 10. A communication device for handling a contention-based random access procedure in a user equipment (UE) of a wireless communication system, the communication device comprising: a processor for executing a program code; and a memory, coupled to the processor, for storing the program code; wherein the program code comprises: sending a Scheduled Transmission message, the Scheduled Transmission message applying a Hybrid Automatic Repeat reQuest (HARQ) process for transmission; starting a Contention Resolution Timer and monitoring a Physical Downlink Control Channel (PDCCH); and flushing a buffer of the HARQ process used for transmission of the Scheduled Transmission message when a contention result of the random access procedure is determined. 11. The communication device of claim 10, wherein the contention result of the random access procedure is successful. 12. The communication device of claim 10, wherein the contention result of the random access procedure is unsuccessful. 13. The communication device of claim 10, wherein the Scheduled Transmission message comprises a Cell Radio Network Temporary Identifier (C-RNTI) Media Access Control (MAC) control element. 14. The communication device of claim 13, wherein the step of determining the contention result of the random access procedure comprises: determining the contention result of the random access procedure to be successful when a PDCCH transmission addressed to a C-RNTI of the UE is received. 15. The communication device of claim 13, wherein the step of determining the contention result of the random access procedure comprises: determining the contention result of the random access procedure to be unsuccessful when the Contention Resolution Timer expires. 16. The communication device of claim 10, wherein the Scheduled Transmission message comprises a Common Control Channel (CCCH) message, the CCCH further comprising an UE Contention Resolution Identity provided by an upper layer. 17. The communication device of claim 16, wherein the step of determining the contention result of the random access procedure comprises: determining the contention result of the random access procedure to be successful when a MAC Packet Data Unit (PDU) received by the UE contains an UE Contention Resolution Identity MAC control element which matches the UE Contention Resolution Identity provided by the upper layer. 18. The communication device of claim 16, wherein the step of determining the contention result of the random access procedure comprises: determining the contention result of the random access procedure to be unsuccessful when a MAC Packet Data Unit (PDU) received by the UE contains an UE Contention Resolution Identity MAC control element which does not match the UE Contention Resolution Identity provided by the upper layer or when the Contention Resolution Timer expires.
2,400
7,025
7,025
12,915,678
2,466
Provided is a radio communication device which includes a communication unit that communicates with a connected radio communication device operating as a master unit, and a control unit that, when a prescribed inquiry packet sent from another radio communication device is received by the communication unit, controls the communication unit to send a response packet containing service information indicating a service with which the radio communication device is compatible to said another radio communication device.
1. A radio communication device comprising: a communication unit that communicates with a connected radio communication device operating as a master unit; and a control unit that, when a prescribed inquiry packet sent from another radio communication device is received by the communication unit, controls the communication unit to send a response packet containing service information indicating a service with which the radio communication device is compatible to said another radio communication device. 2. The radio communication device according to claim 1, wherein the inquiry packet contains the service information, and the control unit controls the communication unit to send the response packet when the radio communication device is compatible with the service indicated by the service information. 3. The radio communication device according to claim 1, wherein the inquiry packet contains the service information, and the control unit performs control of sending the response packet without depending on whether the radio communication device is compatible with the service indicated by the service information. 4. The radio communication device according to claim 2, wherein the control unit performs control of sending the response packet without depending on a connection state and an authentication state of the radio communication device. 5. The radio communication device according to claim 4, wherein the service information contained in the inquiry packet and the service information contained in the response packet are interpreted in the data link layer. 6. The radio communication device according to claim 5, wherein the inquiry packet and the response packet conform to an action frame specified by IEEE Std 802.11-2007. 7. The radio communication device according to claim 6, wherein the response packet is used for selection of a device at another end of communication by said another radio communication device. 8. The radio communication device according to claim 3, wherein the control unit performs control of sending the response packet without depending on a connection state and an authentication state of the radio communication device. 9. A radio communication system comprising: a first radio communication device that sends a prescribed inquiry packet; and a second radio communication device that communicates with a connected radio communication device operating as a master unit, wherein the second radio communication device includes a communication unit that communicates with the connected radio communication device, and a control unit that, when the prescribed inquiry packet sent from the first radio communication device is received by the communication unit, controls the communication unit to send a response packet containing service information indicating a service with which the second radio communication device is compatible to the first radio communication device. 10. A program causing a computer to function as a radio communication device comprising: a communication unit that communicates with a connected radio communication device operating as a master unit; and a control unit that, when a prescribed inquiry packet sent from another radio communication device is received by the communication unit, controls the communication unit to send a response packet containing service information indicating a service with which the radio communication device is compatible to said another radio communication device. 11. A radio communication method comprising the steps of: sending a prescribed inquiry packet from a first radio communication device; receiving the inquiry packet by a second radio communication device that communicates with a connected radio communication device operating as a master unit; and sending a response packet containing service information indicating a service with which the second radio communication device is compatible from the second radio communication device to the first radio communication device.
Provided is a radio communication device which includes a communication unit that communicates with a connected radio communication device operating as a master unit, and a control unit that, when a prescribed inquiry packet sent from another radio communication device is received by the communication unit, controls the communication unit to send a response packet containing service information indicating a service with which the radio communication device is compatible to said another radio communication device.1. A radio communication device comprising: a communication unit that communicates with a connected radio communication device operating as a master unit; and a control unit that, when a prescribed inquiry packet sent from another radio communication device is received by the communication unit, controls the communication unit to send a response packet containing service information indicating a service with which the radio communication device is compatible to said another radio communication device. 2. The radio communication device according to claim 1, wherein the inquiry packet contains the service information, and the control unit controls the communication unit to send the response packet when the radio communication device is compatible with the service indicated by the service information. 3. The radio communication device according to claim 1, wherein the inquiry packet contains the service information, and the control unit performs control of sending the response packet without depending on whether the radio communication device is compatible with the service indicated by the service information. 4. The radio communication device according to claim 2, wherein the control unit performs control of sending the response packet without depending on a connection state and an authentication state of the radio communication device. 5. The radio communication device according to claim 4, wherein the service information contained in the inquiry packet and the service information contained in the response packet are interpreted in the data link layer. 6. The radio communication device according to claim 5, wherein the inquiry packet and the response packet conform to an action frame specified by IEEE Std 802.11-2007. 7. The radio communication device according to claim 6, wherein the response packet is used for selection of a device at another end of communication by said another radio communication device. 8. The radio communication device according to claim 3, wherein the control unit performs control of sending the response packet without depending on a connection state and an authentication state of the radio communication device. 9. A radio communication system comprising: a first radio communication device that sends a prescribed inquiry packet; and a second radio communication device that communicates with a connected radio communication device operating as a master unit, wherein the second radio communication device includes a communication unit that communicates with the connected radio communication device, and a control unit that, when the prescribed inquiry packet sent from the first radio communication device is received by the communication unit, controls the communication unit to send a response packet containing service information indicating a service with which the second radio communication device is compatible to the first radio communication device. 10. A program causing a computer to function as a radio communication device comprising: a communication unit that communicates with a connected radio communication device operating as a master unit; and a control unit that, when a prescribed inquiry packet sent from another radio communication device is received by the communication unit, controls the communication unit to send a response packet containing service information indicating a service with which the radio communication device is compatible to said another radio communication device. 11. A radio communication method comprising the steps of: sending a prescribed inquiry packet from a first radio communication device; receiving the inquiry packet by a second radio communication device that communicates with a connected radio communication device operating as a master unit; and sending a response packet containing service information indicating a service with which the second radio communication device is compatible from the second radio communication device to the first radio communication device.
2,400
7,026
7,026
14,392,294
2,464
A base station and a user equipment device and a method for sending data from the user equipment device to the base station is proposed. The method for transmitting data comprises the steps of determining disadvantageous transmission conditions for the user equipment device and if such disadvantageous transmission conditions are determined, transmitting data in a reserved frame.
1. Method for transmitting data in a frame structure comprising at least one regular frame and at least one reserved frame, the method comprising: determining disadvantageous transmission conditions, if no disadvantageous transmission condition is determined, transmitting data in a regular frame within the frame structure, and if disadvantageous transmission conditions are determined, transmitting data in a reserved frame within the frame structure. 2. Method for transmitting data according to claim 1, wherein disadvantageous transmission conditions are determined if a signal received from the base station is below a threshold. 3. Method for transmitting data according to claim 1, wherein disadvantageous transmission conditions are determined if a number of unsuccessful transmission attempts have been made within a predefined time. 4. Method for transmitting data according to claim 1, wherein transmitting data in the reserved frame further includes: requesting access to the reserved frames. 5. Method for transmitting data according to of claim 4, wherein a request for accessing the reserved frames is sent on an uplink control channel. 6. Method for transmitting data according to claim 1, wherein parameters for determining disadvantageous transmission conditions are broadcast. 7. Method for transmitting data according to claim 1, wherein the reserved frames have lower packet error rate than other frames. 8. Method for transmitting data according to claim 1, wherein the reserved frames are longer than other frames. 9. Method for transmitting data according to claim 1, wherein a multi-carrier transmission system is used and the reserved frames are a set of physical resource blocks. 10. Method for transmitting data according to claim 1, wherein a slotted ALOHA protocol for random access based transmission is used and at least one first time slot is provided for transmitting data of user equipment devices which are not disadvantageous in regular frames and at least one second time slot is provided for transmitting data of user equipment devices which are disadvantageous in reserved frames. 11. Method for receiving data, comprising: receiving a data stream in a frame structure comprising at least one regular frame and at least one reserved frame, determining if the received data stream contains data from devices with disadvantageous transmission conditions in a reserved frame, and if so, processing the data received in the reserved frame. 12. Method for receiving data according to claim 11, further comprising: receiving a request for accessing reserved frames by a user equipment device, and granting access to the reserved frames if the conditions are fulfilled. 13. Method for receiving data according to claim 11, further comprising: broadcasting parameters for determining disadvantageous transmission conditions. 14. Device for transmitting data, comprising: a transmission condition controller for determining disadvantageous transmission conditions, a decision means for deciding to transmit data in a reserved frame of a frame structure comprising at least one regular frame and at least one reserved frame if disadvantageous transmission conditions are determined, and a transmitter for transmitting data in a reserved frame. 15. A base station, comprising: a receiver for receiving a data stream, a data controller for determining if the received data stream contains data in reserved frames of a frame structure comprising at least one regular frame and at least one reserved frame, and a processor for processing the data received in the reserved frame.
A base station and a user equipment device and a method for sending data from the user equipment device to the base station is proposed. The method for transmitting data comprises the steps of determining disadvantageous transmission conditions for the user equipment device and if such disadvantageous transmission conditions are determined, transmitting data in a reserved frame.1. Method for transmitting data in a frame structure comprising at least one regular frame and at least one reserved frame, the method comprising: determining disadvantageous transmission conditions, if no disadvantageous transmission condition is determined, transmitting data in a regular frame within the frame structure, and if disadvantageous transmission conditions are determined, transmitting data in a reserved frame within the frame structure. 2. Method for transmitting data according to claim 1, wherein disadvantageous transmission conditions are determined if a signal received from the base station is below a threshold. 3. Method for transmitting data according to claim 1, wherein disadvantageous transmission conditions are determined if a number of unsuccessful transmission attempts have been made within a predefined time. 4. Method for transmitting data according to claim 1, wherein transmitting data in the reserved frame further includes: requesting access to the reserved frames. 5. Method for transmitting data according to of claim 4, wherein a request for accessing the reserved frames is sent on an uplink control channel. 6. Method for transmitting data according to claim 1, wherein parameters for determining disadvantageous transmission conditions are broadcast. 7. Method for transmitting data according to claim 1, wherein the reserved frames have lower packet error rate than other frames. 8. Method for transmitting data according to claim 1, wherein the reserved frames are longer than other frames. 9. Method for transmitting data according to claim 1, wherein a multi-carrier transmission system is used and the reserved frames are a set of physical resource blocks. 10. Method for transmitting data according to claim 1, wherein a slotted ALOHA protocol for random access based transmission is used and at least one first time slot is provided for transmitting data of user equipment devices which are not disadvantageous in regular frames and at least one second time slot is provided for transmitting data of user equipment devices which are disadvantageous in reserved frames. 11. Method for receiving data, comprising: receiving a data stream in a frame structure comprising at least one regular frame and at least one reserved frame, determining if the received data stream contains data from devices with disadvantageous transmission conditions in a reserved frame, and if so, processing the data received in the reserved frame. 12. Method for receiving data according to claim 11, further comprising: receiving a request for accessing reserved frames by a user equipment device, and granting access to the reserved frames if the conditions are fulfilled. 13. Method for receiving data according to claim 11, further comprising: broadcasting parameters for determining disadvantageous transmission conditions. 14. Device for transmitting data, comprising: a transmission condition controller for determining disadvantageous transmission conditions, a decision means for deciding to transmit data in a reserved frame of a frame structure comprising at least one regular frame and at least one reserved frame if disadvantageous transmission conditions are determined, and a transmitter for transmitting data in a reserved frame. 15. A base station, comprising: a receiver for receiving a data stream, a data controller for determining if the received data stream contains data in reserved frames of a frame structure comprising at least one regular frame and at least one reserved frame, and a processor for processing the data received in the reserved frame.
2,400
7,027
7,027
14,573,992
2,438
Systems and techniques for extension of trust in a body area network are described herein. A device that may be a potential participant of the body area network may be identified. It may be determined that the device is worn by the body of the body area network based on a set of models of the body. The device may be promoted from potential participant to trusted participant of the body area network in response to determining that the device is on the body.
1. A system for extension of trust in a body area network; the system comprising: a detector to identify a device that is a potential participant of the body area network; a selector to determine that the device is worn on a body associated with the body area network based on a set of models of the body; and an authenticator to promote the device from potential participant to trusted participant of the body area network in response to the determination that the device is on the body. 2. The system of claim 1, wherein the set of models of the body include a body-coupled-communication model, and wherein to determine that the device is worn by the body includes the selector to communicate with the device from a member of the body area network using body coupled communication, the member being a trusted participant of the body area network. 3. The system of claim 1, wherein the set of models of the body include a motion model, and wherein to determine that the device is worn by the body includes the selector to: obtain first motion data from the device; obtain second motion data from a member of the body area network that is a trusted participant of the body area network; and determine that a first function of first motion data correlates to a second function of the second motion data within a threshold. 4. The system of any of claim 1, wherein the set of models of the body include a shape model, and wherein to determine that the device is worn on the body includes the selector to: obtain a physical relationship between a member of the body area network and the device, the member of the body area network being a trusted participant of the body area network; and determine that the physical relationship satisfies a shape of a body. 5. The system of any of claim 1, wherein to determine that the device is worn on a body of the body area network based on a set of models of the body includes the selector to use a plurality of members from the set of models of the body. 6. The system of claim 1, wherein the body area network includes an external interface member that is a trusted participant of the body area network and also an external trusted member, external trusted members including a trust component for an entity that is not part of the body area network. 7. The system of claim 6, wherein the external interface member includes: a user interface to receive physical interactions between the body and the external interface member, in order to authenticate the external interface member; and a verifier to join the external interface member to the entity using the physical interactions. 8. The system of claim 1, wherein the selector is to: monitor that the device is worn on the body after the device is promoted from potential participant to trusted participant based on a set of models of the body; and remove the trusted participant designation of the device when the device is not worn on the body. 9. A method for extension of trust in a body area network, the method comprising: identifying a device that is a potential participant of the body area network; determining that the device is worn by a body of the body area network based on a set of models of the body; and promoting the device from potential participant to trusted participant of the body area network in response to the determination that the device is on the body. 10. The method of claim 9, wherein the set of models of the body include a body-coupled-communication model, and wherein determining that the device is worn by the body includes communicating with the device from a member of the body area network using body coupled communication, the member being a trusted participant of the body area network. 11. The method of claim 9, wherein the set of models of the body include a motion model, and wherein determining that the device is worn by the body includes: obtaining first motion data from the device; obtaining second motion data from a member of the body are network that is a trusted participant of the body area network; and determining that a first function of first motion data matches a second function of the second motion data within a threshold. 12. The method of claim 9, wherein the set of models of the body include a shape model, and wherein determining that the device is worn by the body includes: obtaining a physical relationship between a member of the body area network and the device, the member of the body area network that is a trusted participant of the body area network; and determining that the physical relationship satisfies a shape of a body. 13. The method of claim 9, wherein determining that the device is worn by the body of the body area network based on a set of models of the body includes using a plurality of members from the set of models of the body. 14. The method of claim 9, wherein the body area network includes an external interface member that is a trusted participant of the body area network and also an external trusted member, external trusted members including a trust component for an entity that is not part of the body area network. 15. The method of claim 14, wherein the external interface member includes: a user interface to receive physical interactions, between a person of the body and the external interface member, to authenticate the external interface member; and a verifier to join the external interface member to the entity using the physical interactions. 16. The method of claim 9, comprising monitoring the device after the device is promoted from potential participant to trusted participant based on a set of models of the body and remove the trusted participant designation of the device when the device is not worn on the body. 17. At least one machine readable medium including instructions that, when executed by a machine, cause the machine to perform operations for extension of trust in a body area network, the operations comprising: identifying a device that is a potential participant of the body area network; determining that the device is worn by a body of the body area network based on a set of models of the body; and promoting the device from potential participant to trusted participant of the body area network in response to the determination that the device is on the body. 18. The at least one machine readable medium of claim 17, wherein the set of models of the body include a body-coupled-communication model, and wherein determining that the device is worn by the body includes communicating with the device from a member of the body area network using body coupled communication, the member being a trusted participant of the body area network. 19. The at least one machine readable medium of claim 17, wherein the set of models of the body include a motion model, and wherein determining that the device is worn by the body includes: obtaining first motion data from the device; obtaining second motion data from a member of the body are network that is a trusted participant of the body area network; and determining that a first function of first motion data matches a second function of the second motion data within a threshold. 20. The at least one machine readable medium of claim 17, wherein the set of models of the body include a shape model, and wherein determining that the device is worn by the body includes: obtaining a physical relationship between a member of the body area network and the device, the member of the body area network that is a trusted participant of the body area network; and determining that the physical relationship satisfies a shape of a body. 21. The at least one machine readable medium of claim 17, wherein determining that the device is worn by the body of the body area network based on a set of models of the body includes using a plurality of members from the set of models of the body. 22. The at least one machine readable medium of claim 17, wherein the body area network includes an external interface member that is a trusted participant of the body area network and also an external trusted member, external trusted members including a trust component for an entity that is not part of the body area network. 23. The at least one machine readable medium of claim 22, wherein the external interface member includes: a user interface to receive physical interactions, between a person of the body and the external interface member, to authenticate the external interface member; and a verifier to join the external interface member to the entity using the physical interactions. 24. The at least one machine readable medium of claim 17, wherein the operations further comprise monitoring the device after the device is promoted from potential participant to trusted participant based on a set of models of the body and remove the trusted participant designation of the device when the device is not worn on the body.
Systems and techniques for extension of trust in a body area network are described herein. A device that may be a potential participant of the body area network may be identified. It may be determined that the device is worn by the body of the body area network based on a set of models of the body. The device may be promoted from potential participant to trusted participant of the body area network in response to determining that the device is on the body.1. A system for extension of trust in a body area network; the system comprising: a detector to identify a device that is a potential participant of the body area network; a selector to determine that the device is worn on a body associated with the body area network based on a set of models of the body; and an authenticator to promote the device from potential participant to trusted participant of the body area network in response to the determination that the device is on the body. 2. The system of claim 1, wherein the set of models of the body include a body-coupled-communication model, and wherein to determine that the device is worn by the body includes the selector to communicate with the device from a member of the body area network using body coupled communication, the member being a trusted participant of the body area network. 3. The system of claim 1, wherein the set of models of the body include a motion model, and wherein to determine that the device is worn by the body includes the selector to: obtain first motion data from the device; obtain second motion data from a member of the body area network that is a trusted participant of the body area network; and determine that a first function of first motion data correlates to a second function of the second motion data within a threshold. 4. The system of any of claim 1, wherein the set of models of the body include a shape model, and wherein to determine that the device is worn on the body includes the selector to: obtain a physical relationship between a member of the body area network and the device, the member of the body area network being a trusted participant of the body area network; and determine that the physical relationship satisfies a shape of a body. 5. The system of any of claim 1, wherein to determine that the device is worn on a body of the body area network based on a set of models of the body includes the selector to use a plurality of members from the set of models of the body. 6. The system of claim 1, wherein the body area network includes an external interface member that is a trusted participant of the body area network and also an external trusted member, external trusted members including a trust component for an entity that is not part of the body area network. 7. The system of claim 6, wherein the external interface member includes: a user interface to receive physical interactions between the body and the external interface member, in order to authenticate the external interface member; and a verifier to join the external interface member to the entity using the physical interactions. 8. The system of claim 1, wherein the selector is to: monitor that the device is worn on the body after the device is promoted from potential participant to trusted participant based on a set of models of the body; and remove the trusted participant designation of the device when the device is not worn on the body. 9. A method for extension of trust in a body area network, the method comprising: identifying a device that is a potential participant of the body area network; determining that the device is worn by a body of the body area network based on a set of models of the body; and promoting the device from potential participant to trusted participant of the body area network in response to the determination that the device is on the body. 10. The method of claim 9, wherein the set of models of the body include a body-coupled-communication model, and wherein determining that the device is worn by the body includes communicating with the device from a member of the body area network using body coupled communication, the member being a trusted participant of the body area network. 11. The method of claim 9, wherein the set of models of the body include a motion model, and wherein determining that the device is worn by the body includes: obtaining first motion data from the device; obtaining second motion data from a member of the body are network that is a trusted participant of the body area network; and determining that a first function of first motion data matches a second function of the second motion data within a threshold. 12. The method of claim 9, wherein the set of models of the body include a shape model, and wherein determining that the device is worn by the body includes: obtaining a physical relationship between a member of the body area network and the device, the member of the body area network that is a trusted participant of the body area network; and determining that the physical relationship satisfies a shape of a body. 13. The method of claim 9, wherein determining that the device is worn by the body of the body area network based on a set of models of the body includes using a plurality of members from the set of models of the body. 14. The method of claim 9, wherein the body area network includes an external interface member that is a trusted participant of the body area network and also an external trusted member, external trusted members including a trust component for an entity that is not part of the body area network. 15. The method of claim 14, wherein the external interface member includes: a user interface to receive physical interactions, between a person of the body and the external interface member, to authenticate the external interface member; and a verifier to join the external interface member to the entity using the physical interactions. 16. The method of claim 9, comprising monitoring the device after the device is promoted from potential participant to trusted participant based on a set of models of the body and remove the trusted participant designation of the device when the device is not worn on the body. 17. At least one machine readable medium including instructions that, when executed by a machine, cause the machine to perform operations for extension of trust in a body area network, the operations comprising: identifying a device that is a potential participant of the body area network; determining that the device is worn by a body of the body area network based on a set of models of the body; and promoting the device from potential participant to trusted participant of the body area network in response to the determination that the device is on the body. 18. The at least one machine readable medium of claim 17, wherein the set of models of the body include a body-coupled-communication model, and wherein determining that the device is worn by the body includes communicating with the device from a member of the body area network using body coupled communication, the member being a trusted participant of the body area network. 19. The at least one machine readable medium of claim 17, wherein the set of models of the body include a motion model, and wherein determining that the device is worn by the body includes: obtaining first motion data from the device; obtaining second motion data from a member of the body are network that is a trusted participant of the body area network; and determining that a first function of first motion data matches a second function of the second motion data within a threshold. 20. The at least one machine readable medium of claim 17, wherein the set of models of the body include a shape model, and wherein determining that the device is worn by the body includes: obtaining a physical relationship between a member of the body area network and the device, the member of the body area network that is a trusted participant of the body area network; and determining that the physical relationship satisfies a shape of a body. 21. The at least one machine readable medium of claim 17, wherein determining that the device is worn by the body of the body area network based on a set of models of the body includes using a plurality of members from the set of models of the body. 22. The at least one machine readable medium of claim 17, wherein the body area network includes an external interface member that is a trusted participant of the body area network and also an external trusted member, external trusted members including a trust component for an entity that is not part of the body area network. 23. The at least one machine readable medium of claim 22, wherein the external interface member includes: a user interface to receive physical interactions, between a person of the body and the external interface member, to authenticate the external interface member; and a verifier to join the external interface member to the entity using the physical interactions. 24. The at least one machine readable medium of claim 17, wherein the operations further comprise monitoring the device after the device is promoted from potential participant to trusted participant based on a set of models of the body and remove the trusted participant designation of the device when the device is not worn on the body.
2,400
7,028
7,028
10,682,088
2,476
In a packet-based wireless access network, packet route selection is made in a terminal which communicates with the network via a wireless link. The route selection process uses information provided by the network relating to links in the network, and information available in the terminal relating to its wireless link to the network. Consequently the selected route may be via a wireless link between the terminal and a network node that does not provide the best signal strength but has the best prospect of providing a required Quality-of-Service (QoS) for a traffic flow. Monitoring enables the terminal to update the route selection to maintain the required QoS, despite changing conditions and handover, without a need for signalling messages.
1. A method of routing packets from a wireless communications terminal, comprising the steps of, in the terminal: receiving, via a respective wireless link from at least one of a plurality of wireless access nodes forming a network, network information relating to links between the nodes; selecting a route via the network for packets from the terminal in dependence upon the network information and information dependent upon wireless communications between the terminal and at least one of the nodes; and supplying packets with information relating to the selected route. 2. A method as claimed in claim 1 and further comprising the step of, in the terminal, monitoring a status of the selected route. 3. A method as claimed in claim 1 and further comprising the steps of, in the terminal, receiving and monitoring network information to determine a status of the selected route and, selectively in dependence upon the determined status, selecting a new route via the network for packets from the terminal. 4. A method as claimed in claim 3 wherein the step of selecting a new route comprises selecting a route including wireless communications between the terminal and a different one of the nodes. 5. A method as claimed in claim 4 wherein the links between the nodes comprise wireless communications links. 6. A method as claimed in claim 1 wherein the links between the nodes comprise wireless communications links. 7. A method as claimed in claim 6 wherein said network information comprises Quality-of-Service parameters. 8. A method as claimed in claim 6 wherein said network information comprises an available bandwidth for each link between nodes in at least a part of the network. 9. A method as claimed in claim 6 wherein said network information comprises a current delay for each link between nodes in at least a part of the network. 10. A method as claimed in claim 6 wherein said network information comprises an error rate for each link between nodes in at least a part of the network. 11. A wireless communications terminal arranged for operation in accordance with the method of claim 1. 12. A wireless communications terminal arranged for operation in accordance with the method of claim 4. 13. A wireless access network comprising a plurality of wireless access nodes, a plurality of links between nodes for packet communications in the network, and at least one wireless communications terminal as claimed in claim 12 for wireless communications with the wireless access nodes, the wireless access nodes being arranged for supplying to the terminal said network information relating to links between the nodes. 14. A method of routing packets from a wireless communications terminal via nodes of a network having wireless communications links between the nodes, comprising the steps of: supplying network information, relating to links between the nodes, from at least one node to the terminal; in the terminal, selecting a route via the network for packets from the terminal in dependence upon the network information and information dependent upon wireless communications between the terminal and at least one of the nodes; in the terminal, supplying packets with information relating to the selected route; and communicating packets from the terminal via the selected route via the nodes of the network in dependence upon the information in the packets relating to the selected route. 15. A method as claimed in claim 14 and further comprising the steps of, in the terminal, monitoring network information to determine a status of the selected route and, selectively in dependence upon the determined status, selecting a new route via the network for packets from the terminal. 16. A method as claimed in claim 15 wherein the step of selecting a new route comprises selecting a route including wireless communications between the terminal and a different one of the nodes. 17. A method as claimed in claim 14 wherein said network information comprises Quality-of-Service parameters. 18. A method as claimed in claim 14 wherein said network information comprises an available bandwidth for each link between nodes in at least a part of the network. 19. A method as claimed in claim 14 wherein said network information comprises a current delay for each link between nodes in at least a part of the network. 20. A method as claimed in claim 14 wherein said network information comprises an error rate for each link between nodes in at least a part of the network. 21. A method as claimed in claim 1 wherein the step of selecting a route via the network for packets from the terminal is also dependent upon at least one Quality-of-Service parameter for said packets. 22. A wireless communications terminal arranged for operation in accordance with the method of claim 21. 23. A method as claimed in claim 14 wherein the step of selecting a route via the network for packets from the terminal is also dependent upon at least one Quality-of-Service parameter for said packets. 24. A method of routing packets from a wireless communications terminal, comprising the steps of, in the terminal: receiving, via a respective wireless link from at least one of a plurality of wireless access nodes forming a network, network information relating to links between the nodes; selecting a route via the network for packets from the terminal in dependence upon at least one Quality-of-Service parameter for said packets, the network information, and information dependent upon wireless communications between the terminal and at least one of the nodes; and supplying packets with information relating to the selected route. 25. A wireless communications terminal arranged for operation in accordance with the method of claim 24. 26. A wireless access network comprising a plurality of wireless access nodes, a plurality of links between nodes for packet communications in the network, and at least one wireless communications terminal as claimed in claim 25 for wireless communications with the wireless access nodes, the wireless access nodes being arranged for supplying to the terminal said network information relating to links between the nodes. 27. A method of routing packets from a wireless communications terminal via nodes of a network having wireless communications links between the nodes, comprising the steps of: supplying network information, relating to links between the nodes, from at least one node to the terminal; in the terminal, selecting a route via the network for packets from the terminal in dependence upon at least one Quality-of-Service parameter for said packets, the network information, and information dependent upon wireless communications between the terminal and at least one of the nodes; in the terminal, supplying packets with information relating to the selected route; and communicating packets from the terminal via the selected route via the nodes of the network in dependence the information in the packets relating to the selected route.
In a packet-based wireless access network, packet route selection is made in a terminal which communicates with the network via a wireless link. The route selection process uses information provided by the network relating to links in the network, and information available in the terminal relating to its wireless link to the network. Consequently the selected route may be via a wireless link between the terminal and a network node that does not provide the best signal strength but has the best prospect of providing a required Quality-of-Service (QoS) for a traffic flow. Monitoring enables the terminal to update the route selection to maintain the required QoS, despite changing conditions and handover, without a need for signalling messages.1. A method of routing packets from a wireless communications terminal, comprising the steps of, in the terminal: receiving, via a respective wireless link from at least one of a plurality of wireless access nodes forming a network, network information relating to links between the nodes; selecting a route via the network for packets from the terminal in dependence upon the network information and information dependent upon wireless communications between the terminal and at least one of the nodes; and supplying packets with information relating to the selected route. 2. A method as claimed in claim 1 and further comprising the step of, in the terminal, monitoring a status of the selected route. 3. A method as claimed in claim 1 and further comprising the steps of, in the terminal, receiving and monitoring network information to determine a status of the selected route and, selectively in dependence upon the determined status, selecting a new route via the network for packets from the terminal. 4. A method as claimed in claim 3 wherein the step of selecting a new route comprises selecting a route including wireless communications between the terminal and a different one of the nodes. 5. A method as claimed in claim 4 wherein the links between the nodes comprise wireless communications links. 6. A method as claimed in claim 1 wherein the links between the nodes comprise wireless communications links. 7. A method as claimed in claim 6 wherein said network information comprises Quality-of-Service parameters. 8. A method as claimed in claim 6 wherein said network information comprises an available bandwidth for each link between nodes in at least a part of the network. 9. A method as claimed in claim 6 wherein said network information comprises a current delay for each link between nodes in at least a part of the network. 10. A method as claimed in claim 6 wherein said network information comprises an error rate for each link between nodes in at least a part of the network. 11. A wireless communications terminal arranged for operation in accordance with the method of claim 1. 12. A wireless communications terminal arranged for operation in accordance with the method of claim 4. 13. A wireless access network comprising a plurality of wireless access nodes, a plurality of links between nodes for packet communications in the network, and at least one wireless communications terminal as claimed in claim 12 for wireless communications with the wireless access nodes, the wireless access nodes being arranged for supplying to the terminal said network information relating to links between the nodes. 14. A method of routing packets from a wireless communications terminal via nodes of a network having wireless communications links between the nodes, comprising the steps of: supplying network information, relating to links between the nodes, from at least one node to the terminal; in the terminal, selecting a route via the network for packets from the terminal in dependence upon the network information and information dependent upon wireless communications between the terminal and at least one of the nodes; in the terminal, supplying packets with information relating to the selected route; and communicating packets from the terminal via the selected route via the nodes of the network in dependence upon the information in the packets relating to the selected route. 15. A method as claimed in claim 14 and further comprising the steps of, in the terminal, monitoring network information to determine a status of the selected route and, selectively in dependence upon the determined status, selecting a new route via the network for packets from the terminal. 16. A method as claimed in claim 15 wherein the step of selecting a new route comprises selecting a route including wireless communications between the terminal and a different one of the nodes. 17. A method as claimed in claim 14 wherein said network information comprises Quality-of-Service parameters. 18. A method as claimed in claim 14 wherein said network information comprises an available bandwidth for each link between nodes in at least a part of the network. 19. A method as claimed in claim 14 wherein said network information comprises a current delay for each link between nodes in at least a part of the network. 20. A method as claimed in claim 14 wherein said network information comprises an error rate for each link between nodes in at least a part of the network. 21. A method as claimed in claim 1 wherein the step of selecting a route via the network for packets from the terminal is also dependent upon at least one Quality-of-Service parameter for said packets. 22. A wireless communications terminal arranged for operation in accordance with the method of claim 21. 23. A method as claimed in claim 14 wherein the step of selecting a route via the network for packets from the terminal is also dependent upon at least one Quality-of-Service parameter for said packets. 24. A method of routing packets from a wireless communications terminal, comprising the steps of, in the terminal: receiving, via a respective wireless link from at least one of a plurality of wireless access nodes forming a network, network information relating to links between the nodes; selecting a route via the network for packets from the terminal in dependence upon at least one Quality-of-Service parameter for said packets, the network information, and information dependent upon wireless communications between the terminal and at least one of the nodes; and supplying packets with information relating to the selected route. 25. A wireless communications terminal arranged for operation in accordance with the method of claim 24. 26. A wireless access network comprising a plurality of wireless access nodes, a plurality of links between nodes for packet communications in the network, and at least one wireless communications terminal as claimed in claim 25 for wireless communications with the wireless access nodes, the wireless access nodes being arranged for supplying to the terminal said network information relating to links between the nodes. 27. A method of routing packets from a wireless communications terminal via nodes of a network having wireless communications links between the nodes, comprising the steps of: supplying network information, relating to links between the nodes, from at least one node to the terminal; in the terminal, selecting a route via the network for packets from the terminal in dependence upon at least one Quality-of-Service parameter for said packets, the network information, and information dependent upon wireless communications between the terminal and at least one of the nodes; in the terminal, supplying packets with information relating to the selected route; and communicating packets from the terminal via the selected route via the nodes of the network in dependence the information in the packets relating to the selected route.
2,400
7,029
7,029
13,918,153
2,486
A camera system ( 10 ) for the detection of a flow of objects ( 14 ) moving relative to the camera system ( 10 ) is provided, wherein the camera system ( 10 ) comprises a plurality of detection units ( 18 a - b ) which respectively have an image sensor for the recording of image data from a detection zone ( 18 a - b ) which partly overlap and together cover the width of the flow of objects ( 14 ) and comprising an evaluation unit ( 28 ) for the combination of image data from the detection units ( 18 a - b ) to a common image, as well as for the identification of regions of interest in the image data. In this connection the evaluation unit ( 28 ) is configured, on combination, to only use image data of the same detection unit ( 18 a - b ) within a region of interest for the common image.
1. A camera system (10) for the detection of a flow of objects (14) moved relative to the camera system, the camera system (10) comprising a plurality of detection units (18 a-b), said detection units respectively having an image sensor for the reception of image data from a detection zone (20 a-b), said image data partially overlapping and said sensors together covering the width of the flow of objects (14), and the camera system further comprising an evaluation unit (28) for the combination of image data of the detection units (18 a-b) to a common image as well as for the identification of regions of interest in the image data, said evaluation unit (28) being configured to only use image data of the same detection unit (18 a-b) within one region of interest for the common image on combining. 2. The camera system (10) in accordance with claim 1, the evaluation unit (28) being configured to draw a connection line (34) in the overlap region of two detection zones (20 a-b) of two detection units (18 a-b) and, on combination of the common image, to use image data of the one detection unit (18 a) at the one side of the connection line (34) and to use image data of the other detection unit (18 b) at the other side of the connection line (34). 3. The camera system (10) in accordance with claim 2, the evaluation unit (28) being configured to draw the connection line (34) outside of regions of interest. 4. The camera system (10) in accordance with claim 1, said at least one detection unit (18 a-b) being configured as a camera-based code reader. 5. The camera system (10) in accordance with claim 1, the camera system (10) having at least one geometry detection sensor (22) in order to detect a contour of the flow of objects (14) in advance. 6. The camera system (10) in accordance with claim 5, the evaluation unit (28) being configured to determine regions of interest by means of the contour. 7. The camera system (10) in accordance with claim 1, the evaluation unit (28) being configured to consolidate regions of interest in an enveloping region of interest. 8. The camera system (10) in accordance with claim 1, the evaluation unit (28) being configured to output image data and additional information which permits a checking of the combination or a subsequent combination. 9. The camera system (10) in accordance claim 8, the evaluation unit (28) being configured to output image data and additional information in a common structured file. 10. The camera system (10) in accordance with claim 9, said structured file comprising an XML file. 11. The camera system (10) in accordance with claim 8, the evaluation unit (28) being configured to output image data line-wise with additional information respectively associated to a line. 12. The camera system (10) in accordance with claim 8, the additional information being selected from the group of members comprising at least one of the following pieces of information, content or position of a code (16), positions of regions of interest, object geometries and recording parameters. 13. A method for the detection of a flow of objects (14) by means of a plurality of detection units (18 a-b), said detection units respectively recording image data of the objects (14) in a detection zone (20 a-b), the detection zones (20 a-b) partly overlapping and together cover the width of the flow of objects (14), said method comprising the steps of identifying regions of interest in the image data; combining image data of the detection units (18 a-b) to a common image, and on combination, only using image data of the same detection unit (18 ab) for the common image within a region of interest. 14. The method in accordance with claim 13, further comprising the steps of initially outputting image data of the individual detection units (18 a-b) and additional information and then subsequently combining the image data to the common image by means of the additional information. 15. The method in accordance with claim 13, further comprising the steps of determining the regions of interest in a subsequent step or redefining the regions of interest after the objects (14) have already been detected. 16. The method in accordance with claim 13, in which the detection units (18 a-b) individually track their recording parameters in order to achieve an ideal image quality and comprising the further step of subsequently normalizing the image data normalized in order to simplify the combination.
A camera system ( 10 ) for the detection of a flow of objects ( 14 ) moving relative to the camera system ( 10 ) is provided, wherein the camera system ( 10 ) comprises a plurality of detection units ( 18 a - b ) which respectively have an image sensor for the recording of image data from a detection zone ( 18 a - b ) which partly overlap and together cover the width of the flow of objects ( 14 ) and comprising an evaluation unit ( 28 ) for the combination of image data from the detection units ( 18 a - b ) to a common image, as well as for the identification of regions of interest in the image data. In this connection the evaluation unit ( 28 ) is configured, on combination, to only use image data of the same detection unit ( 18 a - b ) within a region of interest for the common image.1. A camera system (10) for the detection of a flow of objects (14) moved relative to the camera system, the camera system (10) comprising a plurality of detection units (18 a-b), said detection units respectively having an image sensor for the reception of image data from a detection zone (20 a-b), said image data partially overlapping and said sensors together covering the width of the flow of objects (14), and the camera system further comprising an evaluation unit (28) for the combination of image data of the detection units (18 a-b) to a common image as well as for the identification of regions of interest in the image data, said evaluation unit (28) being configured to only use image data of the same detection unit (18 a-b) within one region of interest for the common image on combining. 2. The camera system (10) in accordance with claim 1, the evaluation unit (28) being configured to draw a connection line (34) in the overlap region of two detection zones (20 a-b) of two detection units (18 a-b) and, on combination of the common image, to use image data of the one detection unit (18 a) at the one side of the connection line (34) and to use image data of the other detection unit (18 b) at the other side of the connection line (34). 3. The camera system (10) in accordance with claim 2, the evaluation unit (28) being configured to draw the connection line (34) outside of regions of interest. 4. The camera system (10) in accordance with claim 1, said at least one detection unit (18 a-b) being configured as a camera-based code reader. 5. The camera system (10) in accordance with claim 1, the camera system (10) having at least one geometry detection sensor (22) in order to detect a contour of the flow of objects (14) in advance. 6. The camera system (10) in accordance with claim 5, the evaluation unit (28) being configured to determine regions of interest by means of the contour. 7. The camera system (10) in accordance with claim 1, the evaluation unit (28) being configured to consolidate regions of interest in an enveloping region of interest. 8. The camera system (10) in accordance with claim 1, the evaluation unit (28) being configured to output image data and additional information which permits a checking of the combination or a subsequent combination. 9. The camera system (10) in accordance claim 8, the evaluation unit (28) being configured to output image data and additional information in a common structured file. 10. The camera system (10) in accordance with claim 9, said structured file comprising an XML file. 11. The camera system (10) in accordance with claim 8, the evaluation unit (28) being configured to output image data line-wise with additional information respectively associated to a line. 12. The camera system (10) in accordance with claim 8, the additional information being selected from the group of members comprising at least one of the following pieces of information, content or position of a code (16), positions of regions of interest, object geometries and recording parameters. 13. A method for the detection of a flow of objects (14) by means of a plurality of detection units (18 a-b), said detection units respectively recording image data of the objects (14) in a detection zone (20 a-b), the detection zones (20 a-b) partly overlapping and together cover the width of the flow of objects (14), said method comprising the steps of identifying regions of interest in the image data; combining image data of the detection units (18 a-b) to a common image, and on combination, only using image data of the same detection unit (18 ab) for the common image within a region of interest. 14. The method in accordance with claim 13, further comprising the steps of initially outputting image data of the individual detection units (18 a-b) and additional information and then subsequently combining the image data to the common image by means of the additional information. 15. The method in accordance with claim 13, further comprising the steps of determining the regions of interest in a subsequent step or redefining the regions of interest after the objects (14) have already been detected. 16. The method in accordance with claim 13, in which the detection units (18 a-b) individually track their recording parameters in order to achieve an ideal image quality and comprising the further step of subsequently normalizing the image data normalized in order to simplify the combination.
2,400
7,030
7,030
14,379,593
2,425
The invention relates to a method for aligning at least two image recording elements of two camera modules of a stereo camera system, in particular with respect to their roll angle relative to one another, as well as to a stereo camera system whose camera modules or image recording elements are aligned in accordance with such method.
1. A method for aligning at least two image recording elements of two camera modules of a stereo camera system, especially with respect to their roll angle relative to one another, comprising the following steps: arranging the image recording elements on mounting plates of the camera modules, wherein the image recording elements are each aligned with at least one outer reference edge of the mounting plates, especially with respect to their roll angle; arranging the camera modules within the stereo camera system, wherein the outer reference edges of the mounting plates are positioned against a common reference edge or against multiple reference edges that are aligned with one another. 2. The method according to claim 1, wherein when aligning the image recording elements with at least one outer reference edge of the mounting plates, the image recording elements are each positioned against one or several stop edges formed on the mounting plates. 3. The method according to claim 2, wherein the image recording elements are positioned against the one or several stop edges of the mounting plates using one or several elastic elements which are formed on the mounting plates and apply a spring force onto the image recording elements that forces them against the stop edges when they are arranged on the mounting plate. 4. The method according to claim 1, wherein when aligning the image recording elements with at least one outer reference edge of the mounting plates, the image recording elements are each positioned against one or several stop edges of an auxiliary device which is placed onto the mounting plates for arranging and aligning the image recording elements and removed after completing the arrangement and alignment of the image recording elements. 5. The method according to claim 1, wherein when arranging the image recording elements (6) on the mounting plates, the image recording elements are arranged on the mounting plates as unpackaged image recording elements. 6. The method according to claim 1, wherein the image recording elements are arranged on a front side of the mounting plates and contacted to circuit boards arranged on a rear side of the mounting plates using wire bonds through recesses in the mounting plates. 7. The method according to claim 1, wherein the mounting plates are circuit boards, and the image recording elements are contacted to the mounting plates using wire bonds. 8. The method according to claim 1, wherein when arranging the camera modules in the stereo camera system, outer reference edges of the mounting plates are positioned against a common reference edge or against multiple reference edges that are aligned with one another, of a support device that serves to receive the camera modules in the stereo camera system. 9. The method according to claim 1, wherein when arranging the camera modules in the stereo camera system, outer reference edges of the mounting plates are positioned against a common reference edge or against multiple reference edges that are aligned with one another, of an auxiliary device that is provided for positioning the camera modules in the stereo camera system and is removed after completing the positioning of the camera modules. 10. A stereo camera system, comprising at least two camera modules, each of which is formed with a mounting plate and an image recording element, wherein the camera modules or the image recording elements of the stereo camera system are aligned using a method according to claim 1, especially with respect to their roll angle relative to one another, and wherein the image recording elements are unpackaged image recording elements and the mounting plates of the camera modules are formed with at least one outer reference edge which is positioned against at least one reference edge of a support device within the stereo camera system. 11. The stereo camera system according to claim 10, wherein the mounting plates of the camera modules are each formed with one or several cutouts, and at least one inner edge inside said cutouts serves as the outer reference edge of the mounting plates. 12. The stereo camera system according to claim 10, wherein the mounting plates of the camera modules are each formed with one or several holes which serve as reference features of the mounting plates. 13. The stereo camera system according to claim 11, wherein the mounting plates of the camera modules are each formed with one or several holes which serve as reference features of the mounting plates.
The invention relates to a method for aligning at least two image recording elements of two camera modules of a stereo camera system, in particular with respect to their roll angle relative to one another, as well as to a stereo camera system whose camera modules or image recording elements are aligned in accordance with such method.1. A method for aligning at least two image recording elements of two camera modules of a stereo camera system, especially with respect to their roll angle relative to one another, comprising the following steps: arranging the image recording elements on mounting plates of the camera modules, wherein the image recording elements are each aligned with at least one outer reference edge of the mounting plates, especially with respect to their roll angle; arranging the camera modules within the stereo camera system, wherein the outer reference edges of the mounting plates are positioned against a common reference edge or against multiple reference edges that are aligned with one another. 2. The method according to claim 1, wherein when aligning the image recording elements with at least one outer reference edge of the mounting plates, the image recording elements are each positioned against one or several stop edges formed on the mounting plates. 3. The method according to claim 2, wherein the image recording elements are positioned against the one or several stop edges of the mounting plates using one or several elastic elements which are formed on the mounting plates and apply a spring force onto the image recording elements that forces them against the stop edges when they are arranged on the mounting plate. 4. The method according to claim 1, wherein when aligning the image recording elements with at least one outer reference edge of the mounting plates, the image recording elements are each positioned against one or several stop edges of an auxiliary device which is placed onto the mounting plates for arranging and aligning the image recording elements and removed after completing the arrangement and alignment of the image recording elements. 5. The method according to claim 1, wherein when arranging the image recording elements (6) on the mounting plates, the image recording elements are arranged on the mounting plates as unpackaged image recording elements. 6. The method according to claim 1, wherein the image recording elements are arranged on a front side of the mounting plates and contacted to circuit boards arranged on a rear side of the mounting plates using wire bonds through recesses in the mounting plates. 7. The method according to claim 1, wherein the mounting plates are circuit boards, and the image recording elements are contacted to the mounting plates using wire bonds. 8. The method according to claim 1, wherein when arranging the camera modules in the stereo camera system, outer reference edges of the mounting plates are positioned against a common reference edge or against multiple reference edges that are aligned with one another, of a support device that serves to receive the camera modules in the stereo camera system. 9. The method according to claim 1, wherein when arranging the camera modules in the stereo camera system, outer reference edges of the mounting plates are positioned against a common reference edge or against multiple reference edges that are aligned with one another, of an auxiliary device that is provided for positioning the camera modules in the stereo camera system and is removed after completing the positioning of the camera modules. 10. A stereo camera system, comprising at least two camera modules, each of which is formed with a mounting plate and an image recording element, wherein the camera modules or the image recording elements of the stereo camera system are aligned using a method according to claim 1, especially with respect to their roll angle relative to one another, and wherein the image recording elements are unpackaged image recording elements and the mounting plates of the camera modules are formed with at least one outer reference edge which is positioned against at least one reference edge of a support device within the stereo camera system. 11. The stereo camera system according to claim 10, wherein the mounting plates of the camera modules are each formed with one or several cutouts, and at least one inner edge inside said cutouts serves as the outer reference edge of the mounting plates. 12. The stereo camera system according to claim 10, wherein the mounting plates of the camera modules are each formed with one or several holes which serve as reference features of the mounting plates. 13. The stereo camera system according to claim 11, wherein the mounting plates of the camera modules are each formed with one or several holes which serve as reference features of the mounting plates.
2,400
7,031
7,031
14,923,365
2,455
A social graph, which records the actions of users in a social networking system platform, may be modeled at least in part as a collection of claims that may be exported to other systems, such as third party publishers, based on permissions granted by users and entities. The social networking system may also act as a publisher, enabling web applications and mobile applications to publish claims to a variety of audiences based on the permissions granted by users and entities, or agents of the social networking system. Permissions may be granted based on agreed-upon terms of service between agents, agents and publishers, agents and the social networking system platform, and publishers and the social networking system.
1. A method comprising: receiving a plurality of terms of service for an agent using a publisher to generate one or more claims in a platform system; generating a plurality of permissions for the agent based on the received plurality of terms of service; receiving a request to export one or more claims generated by the agent outside of the platform system; determining whether the one or more claims may be exported outside of the platform system according to the plurality of permissions; and responsive to a determination that the plurality of permissions allow the one or more claims to be exported outside of the platform system, exporting the one or more claims generated by the agent outside of the platform system responsive to the request. 2. The method of claim 1, wherein receiving a plurality of terms of service for an agent using a publisher to generate one or more claims in a social networking system platform further comprises: receiving the plurality of terms of service from the agent as a metadata object associated with the one or more claims generated by the agent through the publisher. 3. The method of claim 1, wherein receiving a plurality of terms of service for an agent using a publisher to generate one or more claims in a social networking system platform further comprises: receiving the plurality of terms of service from the agent as a metadata object associated with the agent. 4. The method of claim 1, wherein receiving a plurality of terms of service for an agent using a publisher to generate one or more claims in a social networking system platform further comprises: receiving the plurality of terms of service from the publisher as a metadata object associated with the one or more claims generated by the agent. 5. The method of claim 1, wherein receiving a plurality of terms of service for an agent using a publisher to generate one or more claims in a social networking system platform further comprises: receiving the plurality of terms of service from the publisher as a metadata object associated with the agent. 6. The method of claim 1, wherein receiving a plurality of terms of service for an agent using a publisher to generate one or more claims in a social networking system platform further comprises: receiving the plurality of terms of service as a metadata object associated with the one or more claims generated by the agent through an interface on the social networking system platform. 7. The method of claim 1, wherein receiving a terms of service agreement between an agent using a publisher further comprises: providing an application programming interface on the social networking system platform for receiving the plurality of terms; and receiving through the application programming interface the plurality of terms. 8. The method of claim 1, wherein receiving a claim from the publisher further comprises: receiving one or more additional terms for the terms of service agreement as one or more metadata objects included in the received claim, where the one or more additional terms update the terms of service agreement. 9. The method of claim 1, wherein the agent comprises an entity in the social networking system platform. 10. The method of claim 1, wherein the agent comprises a user in the social networking system platform. 11. A non-transitory computer readable medium having embedded thereon a program, the program being executable by a processor for performing a method comprising instructions, the instructions comprising: receiving a plurality of terms of service for an agent using a publisher to generate one or more claims in a platform system; generating a plurality of permissions for the agent based on the received plurality of terms of service; receiving a request to export one or more claims generated by the agent outside of the platform system; determining whether the one or more claims may be exported outside of the platform system according to the plurality of permissions; and responsive to a determination that the plurality of permissions allow the one or more claims to be exported outside of the platform system, exporting the one or more claims generated by the agent outside of the platform system responsive to the request. 12. The non-transitory computer readable medium of claim 11, wherein receiving a plurality of terms of service for an agent using a publisher to generate one or more claims in a social networking system platform further comprises: receiving the plurality of terms of service from the agent as a metadata object associated with the one or more claims generated by the agent through the publisher. 13. The non-transitory computer readable medium of claim 11, wherein receiving a plurality of terms of service for an agent using a publisher to generate one or more claims in a social networking system platform further comprises: receiving the plurality of terms of service from the agent as a metadata object associated with the agent. 14. The non-transitory computer readable medium of claim 11, wherein receiving a plurality of terms of service for an agent using a publisher to generate one or more claims in a social networking system platform further comprises: receiving the plurality of terms of service from the publisher as a metadata object associated with the one or more claims generated by the agent. 15. The non-transitory computer readable medium of claim 11, wherein receiving a plurality of terms of service for an agent using a publisher to generate one or more claims in a social networking system platform further comprises: receiving the plurality of terms of service from the publisher as a metadata object associated with the agent. 16. The non-transitory computer readable medium of claim 11, wherein receiving a plurality of terms of service for an agent using a publisher to generate one or more claims in a social networking system platform further comprises: receiving the plurality of terms of service as a metadata object associated with the one or more claims generated by the agent through an interface on the social networking system platform. 17. The non-transitory computer readable medium of claim 11, wherein receiving a terms of service agreement between an agent using a publisher further comprises: providing an application programming interface on the social networking system platform for receiving the plurality of terms; and receiving through the application programming interface the plurality of terms. 18. The non-transitory computer readable medium of claim 11, wherein receiving a claim from the publisher further comprises: receiving one or more additional terms for the terms of service agreement as one or more metadata objects included in the received claim, where the one or more additional terms update the terms of service agreement. 19. The non-transitory computer readable medium of claim 11, wherein the agent comprises an entity in the social networking system platform. 20. A system, comprising: a processor; a memory, comprising: a publisher interface module for receiving a plurality of terms of service for an agent using a publisher to generate one or more claims in a platform system; a permissions generating module for generating a plurality of permissions for the agent based on the received plurality of terms of service; a claim exporting module for receiving a request to export one or more claims generated by the agent outside of the platform system; an advertising permission module for determining whether the one or more claims may be exported outside of the platform system according to the plurality of permissions; and the claim exporting module configured to, responsive to a determination that the plurality of permissions allow the one or more claims to be exported outside of the platform system, exporting the one or more claims generated by the agent outside of the platform system responsive to the request.
A social graph, which records the actions of users in a social networking system platform, may be modeled at least in part as a collection of claims that may be exported to other systems, such as third party publishers, based on permissions granted by users and entities. The social networking system may also act as a publisher, enabling web applications and mobile applications to publish claims to a variety of audiences based on the permissions granted by users and entities, or agents of the social networking system. Permissions may be granted based on agreed-upon terms of service between agents, agents and publishers, agents and the social networking system platform, and publishers and the social networking system.1. A method comprising: receiving a plurality of terms of service for an agent using a publisher to generate one or more claims in a platform system; generating a plurality of permissions for the agent based on the received plurality of terms of service; receiving a request to export one or more claims generated by the agent outside of the platform system; determining whether the one or more claims may be exported outside of the platform system according to the plurality of permissions; and responsive to a determination that the plurality of permissions allow the one or more claims to be exported outside of the platform system, exporting the one or more claims generated by the agent outside of the platform system responsive to the request. 2. The method of claim 1, wherein receiving a plurality of terms of service for an agent using a publisher to generate one or more claims in a social networking system platform further comprises: receiving the plurality of terms of service from the agent as a metadata object associated with the one or more claims generated by the agent through the publisher. 3. The method of claim 1, wherein receiving a plurality of terms of service for an agent using a publisher to generate one or more claims in a social networking system platform further comprises: receiving the plurality of terms of service from the agent as a metadata object associated with the agent. 4. The method of claim 1, wherein receiving a plurality of terms of service for an agent using a publisher to generate one or more claims in a social networking system platform further comprises: receiving the plurality of terms of service from the publisher as a metadata object associated with the one or more claims generated by the agent. 5. The method of claim 1, wherein receiving a plurality of terms of service for an agent using a publisher to generate one or more claims in a social networking system platform further comprises: receiving the plurality of terms of service from the publisher as a metadata object associated with the agent. 6. The method of claim 1, wherein receiving a plurality of terms of service for an agent using a publisher to generate one or more claims in a social networking system platform further comprises: receiving the plurality of terms of service as a metadata object associated with the one or more claims generated by the agent through an interface on the social networking system platform. 7. The method of claim 1, wherein receiving a terms of service agreement between an agent using a publisher further comprises: providing an application programming interface on the social networking system platform for receiving the plurality of terms; and receiving through the application programming interface the plurality of terms. 8. The method of claim 1, wherein receiving a claim from the publisher further comprises: receiving one or more additional terms for the terms of service agreement as one or more metadata objects included in the received claim, where the one or more additional terms update the terms of service agreement. 9. The method of claim 1, wherein the agent comprises an entity in the social networking system platform. 10. The method of claim 1, wherein the agent comprises a user in the social networking system platform. 11. A non-transitory computer readable medium having embedded thereon a program, the program being executable by a processor for performing a method comprising instructions, the instructions comprising: receiving a plurality of terms of service for an agent using a publisher to generate one or more claims in a platform system; generating a plurality of permissions for the agent based on the received plurality of terms of service; receiving a request to export one or more claims generated by the agent outside of the platform system; determining whether the one or more claims may be exported outside of the platform system according to the plurality of permissions; and responsive to a determination that the plurality of permissions allow the one or more claims to be exported outside of the platform system, exporting the one or more claims generated by the agent outside of the platform system responsive to the request. 12. The non-transitory computer readable medium of claim 11, wherein receiving a plurality of terms of service for an agent using a publisher to generate one or more claims in a social networking system platform further comprises: receiving the plurality of terms of service from the agent as a metadata object associated with the one or more claims generated by the agent through the publisher. 13. The non-transitory computer readable medium of claim 11, wherein receiving a plurality of terms of service for an agent using a publisher to generate one or more claims in a social networking system platform further comprises: receiving the plurality of terms of service from the agent as a metadata object associated with the agent. 14. The non-transitory computer readable medium of claim 11, wherein receiving a plurality of terms of service for an agent using a publisher to generate one or more claims in a social networking system platform further comprises: receiving the plurality of terms of service from the publisher as a metadata object associated with the one or more claims generated by the agent. 15. The non-transitory computer readable medium of claim 11, wherein receiving a plurality of terms of service for an agent using a publisher to generate one or more claims in a social networking system platform further comprises: receiving the plurality of terms of service from the publisher as a metadata object associated with the agent. 16. The non-transitory computer readable medium of claim 11, wherein receiving a plurality of terms of service for an agent using a publisher to generate one or more claims in a social networking system platform further comprises: receiving the plurality of terms of service as a metadata object associated with the one or more claims generated by the agent through an interface on the social networking system platform. 17. The non-transitory computer readable medium of claim 11, wherein receiving a terms of service agreement between an agent using a publisher further comprises: providing an application programming interface on the social networking system platform for receiving the plurality of terms; and receiving through the application programming interface the plurality of terms. 18. The non-transitory computer readable medium of claim 11, wherein receiving a claim from the publisher further comprises: receiving one or more additional terms for the terms of service agreement as one or more metadata objects included in the received claim, where the one or more additional terms update the terms of service agreement. 19. The non-transitory computer readable medium of claim 11, wherein the agent comprises an entity in the social networking system platform. 20. A system, comprising: a processor; a memory, comprising: a publisher interface module for receiving a plurality of terms of service for an agent using a publisher to generate one or more claims in a platform system; a permissions generating module for generating a plurality of permissions for the agent based on the received plurality of terms of service; a claim exporting module for receiving a request to export one or more claims generated by the agent outside of the platform system; an advertising permission module for determining whether the one or more claims may be exported outside of the platform system according to the plurality of permissions; and the claim exporting module configured to, responsive to a determination that the plurality of permissions allow the one or more claims to be exported outside of the platform system, exporting the one or more claims generated by the agent outside of the platform system responsive to the request.
2,400
7,032
7,032
14,078,019
2,437
A flexible membrane for a carrier head of a chemical mechanical polisher includes a main portion, an annular outer portion, and three annular flaps. The main portion has a substrate mounting surface with a radius R. The annular outer portion extends upwardly from an outer edge of the main portion and has a lower edge connected to the main portion and an upper edge. The three annular flaps include a first annular flap joined to an inner surface of the main portion at a radial position between 75% and 95% of R, a second inwardly-extending annular flap joined to the annular outer portion at a position between the lower edge and the upper edge, and a third inwardly-extending annular flap joined to the upper edge of the annular outer portion.
1. A flexible membrane for a carrier head of a chemical mechanical polisher, comprising: a main portion with a lower surface to provide a substrate-mounting surface, the substrate mounting surface having a radius R; an annular outer portion extending upwardly from an outer edge of the main portion, the annular outer portion having a lower edge connected to the main portion and an upper edge; and exactly three annular flaps to divide a volume above the main portion into a plurality of chambers when the flexible membrane is secured to a carrier head, the three annular flaps including a first annular flap joined to an inner surface of the main portion at a radial position between 75% and 95% of R, a second annular flap joined to the annular outer portion at a position between the lower edge and the upper edge, the second annular flap extending inwardly from the outer annular portion, and a third annular flap joined to the upper edge of the annular outer portion, the third annular flap extending inwardly from the outer annular portion. 2. The flexible membrane of claim 1, wherein the substrate mounting surface has a diameter of about 150 mm. 3. The flexible membrane of claim 2, wherein the first annular flap is joined to the main portion about 10 mm from the outer edge of the main portion. 4. The flexible membrane of claim 2, wherein the first annular flap is joined to the main portion at a radial position between 85% and 90% of R. 5. The flexible membrane of claim 1, wherein the first annular flap includes a horizontally extending section and a vertically extending section connecting the laterally extending section to the main portion. 6. The flexible membrane of claim 5, comprising a notch at a junction between the horizontally extending section and the vertically extending section. 7. The flexible membrane of claim 5, wherein the horizontally extending section has a smaller thickness than the vertically extending section. 8. The flexible membrane of claim 1, wherein each of the flaps has a thickness smaller than a thickness of the main portion. 9. The flexible membrane of claim 8, wherein the annular outer portion comprises a body having a thickness greater than a thickness of the main portion. 10. The flexible membrane of claim 1, comprising a notch in an interior surface of the body of the annular outer portion at a junction of the body and the main portion. 11. The flexible membrane of claim 10, comprising an annular recess in an outer surface of the body between a lower edge and an upper edge of the body. 12. The flexible membrane of claim 11, wherein the outer surface of the body between the recess and the lower edge is a single vertical surface. 13. The flexible membrane of claim 12, wherein the outer surface of the body between the recess and the upper edge is a single vertical surface. 14. The flexible membrane of claim 13, wherein the outer surface of the body between the recess and the lower edge is laterally aligned with the outer surface of the body between the recess and the upper edge. 15. A chemical mechanical polishing head, comprising: a base assembly; a retaining ring secured to the base assembly; and a flexible membrane secured to the base assembly, the flexible membrane including a main portion with a lower surface to provide a substrate-mounting surface, the substrate mounting surface having a radius R, an annular outer portion extending upwardly from an outer edge of the main portion, the annular outer portion having a lower edge connected to the main portion and an upper edge, and exactly three annular flaps to divide a volume above the main portion into a plurality of chambers when the flexible membrane is secured to a carrier head, the three annular flaps including a first annular flap joined to an inner surface of the main portion at a radial position between 75% and 95% of R, a second annular flap joined to the annular outer portion at a position between the lower edge and the upper edge, the second annular flap extending inwardly from the outer annular portion, and a third annular flap joined to the upper edge of the annular outer portion, the third annular flap extending inwardly from the outer annular portion. 16. The flexible membrane of claim 1, wherein lower edge of the annular outer portion is laterally aligned the upper edge of the annular outer portion, and comprising exactly one annular recess of substantially uniform depth in the outer surface of the body. 17. The polishing head of claim 15, comprising a first notch in an interior surface of the body of the annular outer portion at a junction of the body and the main portion. 18. The polishing head of claim 17, comprising a second notch in the interior surface of the body at a junction of the second annular flap and the annular outer portion. 19. The polishing head of claim 18, comprising an internal ring having a lower portion extending into the first notch and an upper portion extending into the second notch. 20. The polishing head of claim 15, wherein lower edge of the annular outer portion is laterally aligned the upper edge of the annular outer portion, and comprising exactly one annular recess of substantially uniform depth in the outer surface of the body.
A flexible membrane for a carrier head of a chemical mechanical polisher includes a main portion, an annular outer portion, and three annular flaps. The main portion has a substrate mounting surface with a radius R. The annular outer portion extends upwardly from an outer edge of the main portion and has a lower edge connected to the main portion and an upper edge. The three annular flaps include a first annular flap joined to an inner surface of the main portion at a radial position between 75% and 95% of R, a second inwardly-extending annular flap joined to the annular outer portion at a position between the lower edge and the upper edge, and a third inwardly-extending annular flap joined to the upper edge of the annular outer portion.1. A flexible membrane for a carrier head of a chemical mechanical polisher, comprising: a main portion with a lower surface to provide a substrate-mounting surface, the substrate mounting surface having a radius R; an annular outer portion extending upwardly from an outer edge of the main portion, the annular outer portion having a lower edge connected to the main portion and an upper edge; and exactly three annular flaps to divide a volume above the main portion into a plurality of chambers when the flexible membrane is secured to a carrier head, the three annular flaps including a first annular flap joined to an inner surface of the main portion at a radial position between 75% and 95% of R, a second annular flap joined to the annular outer portion at a position between the lower edge and the upper edge, the second annular flap extending inwardly from the outer annular portion, and a third annular flap joined to the upper edge of the annular outer portion, the third annular flap extending inwardly from the outer annular portion. 2. The flexible membrane of claim 1, wherein the substrate mounting surface has a diameter of about 150 mm. 3. The flexible membrane of claim 2, wherein the first annular flap is joined to the main portion about 10 mm from the outer edge of the main portion. 4. The flexible membrane of claim 2, wherein the first annular flap is joined to the main portion at a radial position between 85% and 90% of R. 5. The flexible membrane of claim 1, wherein the first annular flap includes a horizontally extending section and a vertically extending section connecting the laterally extending section to the main portion. 6. The flexible membrane of claim 5, comprising a notch at a junction between the horizontally extending section and the vertically extending section. 7. The flexible membrane of claim 5, wherein the horizontally extending section has a smaller thickness than the vertically extending section. 8. The flexible membrane of claim 1, wherein each of the flaps has a thickness smaller than a thickness of the main portion. 9. The flexible membrane of claim 8, wherein the annular outer portion comprises a body having a thickness greater than a thickness of the main portion. 10. The flexible membrane of claim 1, comprising a notch in an interior surface of the body of the annular outer portion at a junction of the body and the main portion. 11. The flexible membrane of claim 10, comprising an annular recess in an outer surface of the body between a lower edge and an upper edge of the body. 12. The flexible membrane of claim 11, wherein the outer surface of the body between the recess and the lower edge is a single vertical surface. 13. The flexible membrane of claim 12, wherein the outer surface of the body between the recess and the upper edge is a single vertical surface. 14. The flexible membrane of claim 13, wherein the outer surface of the body between the recess and the lower edge is laterally aligned with the outer surface of the body between the recess and the upper edge. 15. A chemical mechanical polishing head, comprising: a base assembly; a retaining ring secured to the base assembly; and a flexible membrane secured to the base assembly, the flexible membrane including a main portion with a lower surface to provide a substrate-mounting surface, the substrate mounting surface having a radius R, an annular outer portion extending upwardly from an outer edge of the main portion, the annular outer portion having a lower edge connected to the main portion and an upper edge, and exactly three annular flaps to divide a volume above the main portion into a plurality of chambers when the flexible membrane is secured to a carrier head, the three annular flaps including a first annular flap joined to an inner surface of the main portion at a radial position between 75% and 95% of R, a second annular flap joined to the annular outer portion at a position between the lower edge and the upper edge, the second annular flap extending inwardly from the outer annular portion, and a third annular flap joined to the upper edge of the annular outer portion, the third annular flap extending inwardly from the outer annular portion. 16. The flexible membrane of claim 1, wherein lower edge of the annular outer portion is laterally aligned the upper edge of the annular outer portion, and comprising exactly one annular recess of substantially uniform depth in the outer surface of the body. 17. The polishing head of claim 15, comprising a first notch in an interior surface of the body of the annular outer portion at a junction of the body and the main portion. 18. The polishing head of claim 17, comprising a second notch in the interior surface of the body at a junction of the second annular flap and the annular outer portion. 19. The polishing head of claim 18, comprising an internal ring having a lower portion extending into the first notch and an upper portion extending into the second notch. 20. The polishing head of claim 15, wherein lower edge of the annular outer portion is laterally aligned the upper edge of the annular outer portion, and comprising exactly one annular recess of substantially uniform depth in the outer surface of the body.
2,400
7,033
7,033
14,322,887
2,484
A method of image processing in a structured light imaging device is provided that includes capturing a plurality of images of a scene into which a structured light pattern is projected by a projector in the structured light imaging device, extracting features in each of the captured images, finding feature matches between a reference image of the plurality of captured images and each of the other images in the plurality of captured images, rectifying each of the other images to align with the reference image, wherein each image of the other images is rectified based on feature matches between the image and the reference image, combining the rectified other images and the reference image using interpolation to generate a high resolution image, and generating a depth image using the high resolution image.
1. A method of image processing in a structured light imaging device, the method comprising: capturing a plurality of images of a scene into which a structured light pattern is projected by a projector in the structured light imaging device; extracting features in each of the captured images; finding feature matches between a reference image of the plurality of captured images and each of the other images in the plurality of captured images; rectifying each of the other images to align with the reference image, wherein each image of the other images is rectified based on feature matches between the image and the reference image; combining the rectified other images and the reference image using interpolation to generate a high resolution image; and generating a depth image using the high resolution image. 2. The method of claim 1, wherein capturing a plurality of images comprises capturing the plurality of images using a camera array in the structured light imaging device. 3. The method of claim 1, wherein capturing a plurality of images comprises capturing the plurality of images with a single camera in the structured light imaging device, wherein one image of the plurality of images includes the structured light pattern, and other images in the plurality of images include the structured light pattern shifted by a differing amount for each of the other images. 4. The method of claim 1, wherein capturing a plurality of images comprises capturing the plurality of images with a single camera in the structured light imaging device, wherein one image of the plurality of images includes the structured light pattern, and other images in the plurality of images include the structured light pattern shifted by moving the camera a differing amount for each of the other images. 5. The method of claim 1, wherein the interpolation used is a linear weighted average of neighboring pixels. 6. The method of claim 1, wherein combining the rectified other images and the reference image further comprises applying a prior based on the structured light pattern to interpolated pixel values to determine final pixel values in the high resolution image. 7. A structured light imaging device comprising: a projector configured to project a structured light pattern into a scene; and a memory configured to store software instructions that, when executed by at least one processor in the structured light imaging device, cause a method of image processing to be performed, the method comprising: capturing a plurality of images of a scene into which a structured light pattern is projected by the projector; extracting features in each of the captured images; finding feature matches between a reference image of the plurality of captured images and each of the other images in the plurality of captured images; rectifying each of the other images to align with the reference image, wherein each image of the other images is rectified based on feature matches between the image and the reference image; combining the rectified other images and the reference image using interpolation to generate a high resolution image; and generating a depth image using the high resolution image. 8. The structured light imaging device of claim 7, wherein the structured light imaging device comprises a camera array and capturing a plurality of images comprises capturing the plurality of images using the camera array. 9. The structured light imaging device of claim 7, wherein the structured light imaging device comprises a camera and capturing a plurality of images comprises capturing the plurality of images with the camera, wherein one image of the plurality of images includes the structured light pattern, and other images in the plurality of images include the structured light pattern shifted by a differing amount for each of the other images. 10. The structured light imaging device of claim 7, wherein the structured light imaging device comprises a camera and capturing a plurality of images comprises capturing the plurality of images with the camera, wherein one image of the plurality of images includes the structured light pattern, and other images in the plurality of images include the structured light pattern shifted by moving the camera a differing amount for each of the other images. 11. The structured light imaging device of claim 7, wherein the interpolation used is a linear weighted average of neighboring pixels. 12. The structured light imaging device of claim 7, wherein combining the rectified other images and the reference image further comprises applying a prior based on the structured light pattern to interpolated pixel values to determine final pixel values in the high resolution image.
A method of image processing in a structured light imaging device is provided that includes capturing a plurality of images of a scene into which a structured light pattern is projected by a projector in the structured light imaging device, extracting features in each of the captured images, finding feature matches between a reference image of the plurality of captured images and each of the other images in the plurality of captured images, rectifying each of the other images to align with the reference image, wherein each image of the other images is rectified based on feature matches between the image and the reference image, combining the rectified other images and the reference image using interpolation to generate a high resolution image, and generating a depth image using the high resolution image.1. A method of image processing in a structured light imaging device, the method comprising: capturing a plurality of images of a scene into which a structured light pattern is projected by a projector in the structured light imaging device; extracting features in each of the captured images; finding feature matches between a reference image of the plurality of captured images and each of the other images in the plurality of captured images; rectifying each of the other images to align with the reference image, wherein each image of the other images is rectified based on feature matches between the image and the reference image; combining the rectified other images and the reference image using interpolation to generate a high resolution image; and generating a depth image using the high resolution image. 2. The method of claim 1, wherein capturing a plurality of images comprises capturing the plurality of images using a camera array in the structured light imaging device. 3. The method of claim 1, wherein capturing a plurality of images comprises capturing the plurality of images with a single camera in the structured light imaging device, wherein one image of the plurality of images includes the structured light pattern, and other images in the plurality of images include the structured light pattern shifted by a differing amount for each of the other images. 4. The method of claim 1, wherein capturing a plurality of images comprises capturing the plurality of images with a single camera in the structured light imaging device, wherein one image of the plurality of images includes the structured light pattern, and other images in the plurality of images include the structured light pattern shifted by moving the camera a differing amount for each of the other images. 5. The method of claim 1, wherein the interpolation used is a linear weighted average of neighboring pixels. 6. The method of claim 1, wherein combining the rectified other images and the reference image further comprises applying a prior based on the structured light pattern to interpolated pixel values to determine final pixel values in the high resolution image. 7. A structured light imaging device comprising: a projector configured to project a structured light pattern into a scene; and a memory configured to store software instructions that, when executed by at least one processor in the structured light imaging device, cause a method of image processing to be performed, the method comprising: capturing a plurality of images of a scene into which a structured light pattern is projected by the projector; extracting features in each of the captured images; finding feature matches between a reference image of the plurality of captured images and each of the other images in the plurality of captured images; rectifying each of the other images to align with the reference image, wherein each image of the other images is rectified based on feature matches between the image and the reference image; combining the rectified other images and the reference image using interpolation to generate a high resolution image; and generating a depth image using the high resolution image. 8. The structured light imaging device of claim 7, wherein the structured light imaging device comprises a camera array and capturing a plurality of images comprises capturing the plurality of images using the camera array. 9. The structured light imaging device of claim 7, wherein the structured light imaging device comprises a camera and capturing a plurality of images comprises capturing the plurality of images with the camera, wherein one image of the plurality of images includes the structured light pattern, and other images in the plurality of images include the structured light pattern shifted by a differing amount for each of the other images. 10. The structured light imaging device of claim 7, wherein the structured light imaging device comprises a camera and capturing a plurality of images comprises capturing the plurality of images with the camera, wherein one image of the plurality of images includes the structured light pattern, and other images in the plurality of images include the structured light pattern shifted by moving the camera a differing amount for each of the other images. 11. The structured light imaging device of claim 7, wherein the interpolation used is a linear weighted average of neighboring pixels. 12. The structured light imaging device of claim 7, wherein combining the rectified other images and the reference image further comprises applying a prior based on the structured light pattern to interpolated pixel values to determine final pixel values in the high resolution image.
2,400
7,034
7,034
14,824,842
2,425
Metadata transmitted in parallel to the broadcast information shall be made accessible independent of Internet availability. Therefore, it is proposed to download and store the data located on an Internet address pointed at by metadata link information. The storage is performed in parallel to the recording and is typically done onto the same media; i.e. DVR, hard disk, etc. By playing back the recorded data it is possible to access the complete data including all Internet pages pointed at.
1. Device for processing broadcast data including user data preferably audio data and/or video data and additional information including linking information pointing to a data source with receiving means for receiving said broadcast data from a broadcast source and receiving supplementary data from said data source and storing means for storing said user data, characterised in that said storing means being capable of storing said supplementary data together with said user data. 2. Device according to claim 1, wherein the data source is the Internet web, an intranet, an internal or external memory device and/or transmission means like a broadcast channel or said broadcast source. 3. Device according to claim 1 or 2, wherein said storing means is a digital video recorder or a hard disc. 4. Device according to one of the claims 1 to 3, wherein said user data includes metadata links being adaptable by said storing means to point to locally stored supplementary data. 5. Device according to one of the claims 1 to 4, wherein the supplementary data contains linking information pointing to at least second level supplementary data and said storing means being able to also store said second level supplementary data. 6. Device according to claim 5, further including controlling means for hierarchically storing said supplementary data and said second level supplementary data on said storing means. 7. Device according to one of the claims 1 to 6, further including retrieving means for retrieving user data, supplementary data and/or second level supplementary data from said storing means. 8. Device according to one of the claims 1 to 7 further including editing means for editing said user data, said supplementary data and/or said second level supplementary data. 9. Device according to claim 8, wherein said editing means enables adding of further linking information. 10. Device according to one of the claims 1 to 9, further including analysing means for analysing said broadcast data during receiving in order to avoid redundant storage. 11. Method for processing broadcast data including user data, preferably audio data and/or video data, and additional information including linking information pointing to a data source by receiving said broadcast data from a broadcast source and receiving supplementary data from said data source and storing said user data, characterised by storing said supplementary data together with said user data. 12. Method according to claim 11, wherein the data source is the Internet web, an intranet, an internal or external memory device or transmission means like a broadcast channel or said broadcast source. 13. Method according to claim 11 or 12, wherein metadata links being included in said user data are adapted to point to locally stored supplementary data. 14. Method according to one of the claims 11 to 13, wherein said supplementary data contains linking information pointing to at least second level supplementary data and storing said second level supplementary data together with said user data and supplementary data. 15. Method according to claim 14, wherein said user data, supplementary data and second level supplementary data are hierarchically stored according to predetermined controlling information. 16. Method according to one of the claims 10 to 15, characterised by individually retrieving said user data, supplementary data and/or second level supplementary data from storing means. 17. Method according to one of the claims 10 to 16 characterised by editing said user data, supplementary data and/or second level supplementary data. 18. Method according to claim 17, wherein said editing includes adding of further linking information. 19. Method according to one of the claims 10 to 18, characterised by an analysing the content of said broadcast data during receiving in order to avoid redundant storage.
Metadata transmitted in parallel to the broadcast information shall be made accessible independent of Internet availability. Therefore, it is proposed to download and store the data located on an Internet address pointed at by metadata link information. The storage is performed in parallel to the recording and is typically done onto the same media; i.e. DVR, hard disk, etc. By playing back the recorded data it is possible to access the complete data including all Internet pages pointed at.1. Device for processing broadcast data including user data preferably audio data and/or video data and additional information including linking information pointing to a data source with receiving means for receiving said broadcast data from a broadcast source and receiving supplementary data from said data source and storing means for storing said user data, characterised in that said storing means being capable of storing said supplementary data together with said user data. 2. Device according to claim 1, wherein the data source is the Internet web, an intranet, an internal or external memory device and/or transmission means like a broadcast channel or said broadcast source. 3. Device according to claim 1 or 2, wherein said storing means is a digital video recorder or a hard disc. 4. Device according to one of the claims 1 to 3, wherein said user data includes metadata links being adaptable by said storing means to point to locally stored supplementary data. 5. Device according to one of the claims 1 to 4, wherein the supplementary data contains linking information pointing to at least second level supplementary data and said storing means being able to also store said second level supplementary data. 6. Device according to claim 5, further including controlling means for hierarchically storing said supplementary data and said second level supplementary data on said storing means. 7. Device according to one of the claims 1 to 6, further including retrieving means for retrieving user data, supplementary data and/or second level supplementary data from said storing means. 8. Device according to one of the claims 1 to 7 further including editing means for editing said user data, said supplementary data and/or said second level supplementary data. 9. Device according to claim 8, wherein said editing means enables adding of further linking information. 10. Device according to one of the claims 1 to 9, further including analysing means for analysing said broadcast data during receiving in order to avoid redundant storage. 11. Method for processing broadcast data including user data, preferably audio data and/or video data, and additional information including linking information pointing to a data source by receiving said broadcast data from a broadcast source and receiving supplementary data from said data source and storing said user data, characterised by storing said supplementary data together with said user data. 12. Method according to claim 11, wherein the data source is the Internet web, an intranet, an internal or external memory device or transmission means like a broadcast channel or said broadcast source. 13. Method according to claim 11 or 12, wherein metadata links being included in said user data are adapted to point to locally stored supplementary data. 14. Method according to one of the claims 11 to 13, wherein said supplementary data contains linking information pointing to at least second level supplementary data and storing said second level supplementary data together with said user data and supplementary data. 15. Method according to claim 14, wherein said user data, supplementary data and second level supplementary data are hierarchically stored according to predetermined controlling information. 16. Method according to one of the claims 10 to 15, characterised by individually retrieving said user data, supplementary data and/or second level supplementary data from storing means. 17. Method according to one of the claims 10 to 16 characterised by editing said user data, supplementary data and/or second level supplementary data. 18. Method according to claim 17, wherein said editing includes adding of further linking information. 19. Method according to one of the claims 10 to 18, characterised by an analysing the content of said broadcast data during receiving in order to avoid redundant storage.
2,400
7,035
7,035
12,978,265
2,453
A tunable affinity function serves one or more processes running in a social networking environment, where each process may request a measure of affinity for a particular user. A module that implements the affinity function computes the requested measure of affinity by combining (e.g., adding) a weighted set of predictor functions, where each predictor function predicts whether the user will perform a different action. The weights are provided by the process that requests the measure of affinity, which allows the requesting process to weight the predictor functions differently and thus tune the affinity function for its own purpose.
1. A method for providing a measure of affinity for a user of a social networking system, the method comprising: receiving a request for a measure of affinity for a user of a social networking system from a process, the request specifying one or more weights related to a plurality of actions in the social networking system; weighting each of a plurality of predictor functions using the received weights, wherein each predictor function predicts whether the user will perform an action associated with the weight applied thereto; computing a measure of affinity for the user by combining the weighted plurality of predictor functions; and providing the computed measure of affinity to the process. 2. The method of claim 1, wherein computing the measure of affinity for the user involves linearly combining the weighted set of predictor functions. 3. The method of claim 1, wherein the weights specified in the request are binary. 4. The method of claim 1, wherein the action is representative of a user's communication in the social networking system. 5. The method of claim 1, wherein the action is representative of a user's observation of content in the social networking system. 6. The method of claim 1, wherein the action is representative of two or more users' coincidence in the social networking system. 7. The method of claim 1, wherein the action is selected from a group consisting of: commenting on a content item, using a third party application, inviting a connection to perform an activity, playing a game, and expressing an affinity for an object in the social networking system. 8. The method of claim 1, wherein the predictor function predicts whether the user will perform an action associated with the weight based on the user's interest in the action. 9. The method of claim 1, wherein the predictor function predicts whether the user will perform an action associated with the weight based on the user's historical activity. 10. The method of claim 1, wherein the predictor functions are determined as functions of statistics on user's historical activity. 11. The method of claim 10, wherein the functions of statistics on user's historical activity implement time decay by assigning recent activity higher relative importance. 12. The method of claim 10, wherein the functions of statistics in the predictor functions are determined through machine learning algorithms. 13. The method of claim 1, wherein each of the plurality of predictor functions are determined as a ratio of a numerator affine function of statistics on user's historical activity and a denominator affine function of statistics on user's historical activity. 14. The method of claim 13, wherein the denominator affine function of statistics on user's historical activity represents a normalization of the numerator affine function of statistics on user's historical activity. 15. A method for obtaining a prediction of an action of a user of a social networking system, the method comprising: sending a request for a measure of affinity for a user of a social networking system from a process, the request specifying one or more weights related to a first plurality of actions in the social networking system; receiving the measure of affinity computed by combining a plurality of predictor functions corresponding to the first plurality of actions; and predicting a second plurality of actions the user will perform in the process according to the received measure of affinity. 16. The method of claim 15, wherein the process is executed within the social networking system. 17. The method of claim 15, wherein the process is executed by a server external to the social networking system. 18. The method of claim 15, wherein the process is performed by a platform application provided by third party and executed within the social networking system. 19. The method of claim 15, wherein the action comprises a user's communication to another user in the social networking system. 20. The method of claim 15, wherein the action comprises a user's observation of content in the social networking system. 21. The method of claim 15, wherein the action is selected from a group consisting of: commenting on a content item, using a third party application, inviting connections to perform an action, playing a game, and expressing an affinity for an object in the social networking system.
A tunable affinity function serves one or more processes running in a social networking environment, where each process may request a measure of affinity for a particular user. A module that implements the affinity function computes the requested measure of affinity by combining (e.g., adding) a weighted set of predictor functions, where each predictor function predicts whether the user will perform a different action. The weights are provided by the process that requests the measure of affinity, which allows the requesting process to weight the predictor functions differently and thus tune the affinity function for its own purpose.1. A method for providing a measure of affinity for a user of a social networking system, the method comprising: receiving a request for a measure of affinity for a user of a social networking system from a process, the request specifying one or more weights related to a plurality of actions in the social networking system; weighting each of a plurality of predictor functions using the received weights, wherein each predictor function predicts whether the user will perform an action associated with the weight applied thereto; computing a measure of affinity for the user by combining the weighted plurality of predictor functions; and providing the computed measure of affinity to the process. 2. The method of claim 1, wherein computing the measure of affinity for the user involves linearly combining the weighted set of predictor functions. 3. The method of claim 1, wherein the weights specified in the request are binary. 4. The method of claim 1, wherein the action is representative of a user's communication in the social networking system. 5. The method of claim 1, wherein the action is representative of a user's observation of content in the social networking system. 6. The method of claim 1, wherein the action is representative of two or more users' coincidence in the social networking system. 7. The method of claim 1, wherein the action is selected from a group consisting of: commenting on a content item, using a third party application, inviting a connection to perform an activity, playing a game, and expressing an affinity for an object in the social networking system. 8. The method of claim 1, wherein the predictor function predicts whether the user will perform an action associated with the weight based on the user's interest in the action. 9. The method of claim 1, wherein the predictor function predicts whether the user will perform an action associated with the weight based on the user's historical activity. 10. The method of claim 1, wherein the predictor functions are determined as functions of statistics on user's historical activity. 11. The method of claim 10, wherein the functions of statistics on user's historical activity implement time decay by assigning recent activity higher relative importance. 12. The method of claim 10, wherein the functions of statistics in the predictor functions are determined through machine learning algorithms. 13. The method of claim 1, wherein each of the plurality of predictor functions are determined as a ratio of a numerator affine function of statistics on user's historical activity and a denominator affine function of statistics on user's historical activity. 14. The method of claim 13, wherein the denominator affine function of statistics on user's historical activity represents a normalization of the numerator affine function of statistics on user's historical activity. 15. A method for obtaining a prediction of an action of a user of a social networking system, the method comprising: sending a request for a measure of affinity for a user of a social networking system from a process, the request specifying one or more weights related to a first plurality of actions in the social networking system; receiving the measure of affinity computed by combining a plurality of predictor functions corresponding to the first plurality of actions; and predicting a second plurality of actions the user will perform in the process according to the received measure of affinity. 16. The method of claim 15, wherein the process is executed within the social networking system. 17. The method of claim 15, wherein the process is executed by a server external to the social networking system. 18. The method of claim 15, wherein the process is performed by a platform application provided by third party and executed within the social networking system. 19. The method of claim 15, wherein the action comprises a user's communication to another user in the social networking system. 20. The method of claim 15, wherein the action comprises a user's observation of content in the social networking system. 21. The method of claim 15, wherein the action is selected from a group consisting of: commenting on a content item, using a third party application, inviting connections to perform an action, playing a game, and expressing an affinity for an object in the social networking system.
2,400
7,036
7,036
14,643,402
2,457
In various example embodiments, a method and system to monitor activities on a plurality of devices associated with a common user are provided. The system includes an index component coupled to receive activity data from respective monitors installed on each of the plurality of devices, the activity data being associated with the common user and including an identifier associated with the common user. An analytics component is configured to aggregate the activity data using the identifier associated with the common user to generate analytics data relating to the activities on the plurality of devices associated with the common user, and also to present in the analytics data.
1. A method to monitor activities on a plurality of devices associated with a common user, the method comprising: receiving, at an index component and from respective monitors installed on each of the plurality of devices, activity data associated with the common user, the activity data including an identifier associated with the common user; aggregating and analyzing, at an analytics component, the activity data using the identifier associated with the common user to generate analytics data relating to the activities on the plurality of devices associated with the common user; and presenting, using the analytics component, the analytics data. 2. The method of claim 1, wherein the identifier is a device identifier, and wherein the aggregating of the activity data includes determining that the device identifier is associated with the common user. 3. The method of claim 1, wherein the identifier is a user identifier, and wherein the aggregating of the activity data includes aggregating activity data that includes the user identifier. 4. The method of claim 1, including validating integrity of at least a first monitor installed on a first device of the plurality of devices. 5. The method of claim 4, wherein the validating of the integrity of the first monitor comprises detecting a discrepancy between an output of the first monitor and an output of a second monitor, both the first and second monitors being installed on a common machine but monitoring different activities of the common machine. 6. The method of claim 1, including receiving, at the index component, first activity data from a first monitor and second activity data from a second monitor, the first and second monitors being installed on a common device of the plurality of devices. 7. The method of claim 6, wherein the first activity data pertains to a first type of activity and the second activity data pertains to a second type of activity. 8. The method of claim 6, wherein the first activity data pertains to activity of a first application installed on the common device, and the second activity data pertains to activity of a second application installed on the common device. 9. The method of claim 1, wherein the activity data includes at least one of location data, network traffic data, browser URL data and media data associated with an activity performed using a first application installed on a first device of the plurality of devices. 10. The method of claim 1, wherein the aggregating of the activity data includes determining that a first monitor on a first device of the plurality of devices experienced a termination event. 11. The method of claim 10, wherein the determining of that the first monitor experienced a termination event includes determining that the first monitor failed to generate first activity data correlated to second activity data generated by a second monitor on the first device. 12. A system to monitor activities on a plurality of devices associated with a common user, the system comprising: an index component coupled to receive activity data from respective monitors installed on each of the plurality of devices, the activity data being associated with the common user and including an identifier associated with the common user; an analytics component to: aggregate the activity data using the identifier associated with the common user to generate analytics data relating to the activities on the plurality of devices associated with the common user; and present the analytics data. 13. The system of claim 12, wherein the identifier is a device identifier, the analytics component being configured to determine that the device identifier is associated with the common user. 14. The system of claim 12, wherein the identifier is a user identifier, the analytics component being configured to aggregate activity data that includes the user identifier. 15. The system of claim 12, wherein the analytics component is configured to validate at least a first monitor installed on a first device of the plurality of devices. 16. The system of claim 15, wherein the analytics component is configured to detect a discrepancy between an output of the first monitor and an output of a second monitor, both the first and second monitors being installed on a common machine but monitoring different activities of the common machine. 17. The system of claim 12, wherein the index component is configured to receive first activity data from a first monitor and second activity data from a second monitor, the first and second monitors being installed on a common device of the plurality of devices. 18. The system of claim 17, wherein the first activity data pertains to activity of a first application installed on the common device, and the second activity data pertains to activity of a second application installed on the common device.
In various example embodiments, a method and system to monitor activities on a plurality of devices associated with a common user are provided. The system includes an index component coupled to receive activity data from respective monitors installed on each of the plurality of devices, the activity data being associated with the common user and including an identifier associated with the common user. An analytics component is configured to aggregate the activity data using the identifier associated with the common user to generate analytics data relating to the activities on the plurality of devices associated with the common user, and also to present in the analytics data.1. A method to monitor activities on a plurality of devices associated with a common user, the method comprising: receiving, at an index component and from respective monitors installed on each of the plurality of devices, activity data associated with the common user, the activity data including an identifier associated with the common user; aggregating and analyzing, at an analytics component, the activity data using the identifier associated with the common user to generate analytics data relating to the activities on the plurality of devices associated with the common user; and presenting, using the analytics component, the analytics data. 2. The method of claim 1, wherein the identifier is a device identifier, and wherein the aggregating of the activity data includes determining that the device identifier is associated with the common user. 3. The method of claim 1, wherein the identifier is a user identifier, and wherein the aggregating of the activity data includes aggregating activity data that includes the user identifier. 4. The method of claim 1, including validating integrity of at least a first monitor installed on a first device of the plurality of devices. 5. The method of claim 4, wherein the validating of the integrity of the first monitor comprises detecting a discrepancy between an output of the first monitor and an output of a second monitor, both the first and second monitors being installed on a common machine but monitoring different activities of the common machine. 6. The method of claim 1, including receiving, at the index component, first activity data from a first monitor and second activity data from a second monitor, the first and second monitors being installed on a common device of the plurality of devices. 7. The method of claim 6, wherein the first activity data pertains to a first type of activity and the second activity data pertains to a second type of activity. 8. The method of claim 6, wherein the first activity data pertains to activity of a first application installed on the common device, and the second activity data pertains to activity of a second application installed on the common device. 9. The method of claim 1, wherein the activity data includes at least one of location data, network traffic data, browser URL data and media data associated with an activity performed using a first application installed on a first device of the plurality of devices. 10. The method of claim 1, wherein the aggregating of the activity data includes determining that a first monitor on a first device of the plurality of devices experienced a termination event. 11. The method of claim 10, wherein the determining of that the first monitor experienced a termination event includes determining that the first monitor failed to generate first activity data correlated to second activity data generated by a second monitor on the first device. 12. A system to monitor activities on a plurality of devices associated with a common user, the system comprising: an index component coupled to receive activity data from respective monitors installed on each of the plurality of devices, the activity data being associated with the common user and including an identifier associated with the common user; an analytics component to: aggregate the activity data using the identifier associated with the common user to generate analytics data relating to the activities on the plurality of devices associated with the common user; and present the analytics data. 13. The system of claim 12, wherein the identifier is a device identifier, the analytics component being configured to determine that the device identifier is associated with the common user. 14. The system of claim 12, wherein the identifier is a user identifier, the analytics component being configured to aggregate activity data that includes the user identifier. 15. The system of claim 12, wherein the analytics component is configured to validate at least a first monitor installed on a first device of the plurality of devices. 16. The system of claim 15, wherein the analytics component is configured to detect a discrepancy between an output of the first monitor and an output of a second monitor, both the first and second monitors being installed on a common machine but monitoring different activities of the common machine. 17. The system of claim 12, wherein the index component is configured to receive first activity data from a first monitor and second activity data from a second monitor, the first and second monitors being installed on a common device of the plurality of devices. 18. The system of claim 17, wherein the first activity data pertains to activity of a first application installed on the common device, and the second activity data pertains to activity of a second application installed on the common device.
2,400
7,037
7,037
14,371,816
2,487
In a sample, fluorescence emitters are repeatedly excited to emit fluorescence, and still images are produced of the sample by means of a microscope. At least a subset of the fluorescence emitters is isolated in each still image. The positions of the fluorescence emitters are localized in the still images with a location accuracy exceeding the optical resolution. A high-resolution composite image is generated therefrom. An adaptive mirror is arranged in the imaging beam path, and is adjusted in such a manner that it produces an astigmatism when at least one of the still images is produced. As a result, still images with astigmatism are captured. Depth position information for the fluorescence emitters is derived from the rotational asymmetry. The adaptive mirror is additionally adjusted in such a manner that it does not produce any astigmatism when some of the still images are produced.
1. A method for high-resolution 3D fluorescence microscopy, comprising (a) repeatedly exciting fluorescence emitters in a sample to emit fluorescence, and producing still images of the sample by means of a microscope having an imaging beam path with an optical resolution and a focal plane, said fluorescence emitters being stimulated to emit fluorescence in such a manner that at least a subset of the fluorescence emitters is isolated in each still image, so that the images of these fluorescence emitters can be separated in the still images within the optical resolution, (b) localizing the positions of the fluorescence emitters from the images of the isolated fluorescence emitters in the resulting still images, with a location accuracy exceeding the optical resolution, and generating a high-resolution composite image therefrom, (c) arranging an adaptive mirror in the imaging beam path of the microscope, and adjusting said mirror in such a manner that it produces an astigmatism when at least some of the still images are produced, thereby capturing still images with astigmatism, said images of the fluorescence emitters positioned above the focal plane having a first rotational asymmetry as a result of distortion in a first direction, and the images of fluorescence emitters positioned below the focal plane having a second rotational asymmetry as a result of distortion in a second direction, wherein depth position information for the fluorescence emitters is derived from the rotational asymmetry, (d) further adjusting said adaptive mirror in such a manner that it does not produce any astigmatism when at least some of the still images are produced, such that non-astigmatic still images are captured, and (e) detecting rotationally asymmetric images of fluorescence emitters in the non-astigmatic still images, and in the derivation process for the depth position information in the astigmatic still images these fluorescence emitters are either subjected to a depth position correction, or are suppressed. 2. The method according to claim 1, wherein the non-astigmatic still images produced in step (d) are carried out intermittently between step (c), in which astigmatic still images are produced. 3. The method according to claim 2, wherein said adaptive mirror is adjusted in such a manner that it images an astigmatic still image on a first image capture region and a non-astigmatic still image on a second image capture region at the same time. 4. The method according to claim 1, wherein in step (e), the images of the fluorescence emitters in the non-astigmatic still images are used as the starting point for the determination of the rotational asymmetry, for the depth position correction in the derivation of the depth position information. 5. The method according to claim 1, wherein a degree of astigmatism produced by the adaptive mirror is adjusted in order to adjust a depth resolution. 6. A fluorescence microscope for three-dimensional imaging of a sample with a location accuracy exceeding the optical resolution, comprising: an illumination device designed for repeatedly exciting fluorescence emitters in the sample to emit fluorescence, an imaging device having an imaging beam path with the optical resolution for producing still images of the sample at the optical resolution, a control device for controlling the illumination device and the imaging device in such a manner that multiple still images of the sample are produced, said fluorescence emitters being excited to emit fluorescence in such a manner that at least a subset of the fluorescence emitters in each still image is isolated so that the images of these fluorescence emitters can be separated in the still images within the optical resolution said control device being designed for localizing the positions of the isolated fluorescing fluorescence emitters in the generated still images with a location accuracy exceeding the optical resolution, and of generating a high-resolution composite image therefrom, the imaging device having an adaptive mirror, the control device for adjusting the adaptive mirror being designed to produce an astigmatism when at least some of the still images are produced, such that astigmatic still images are thereby captured, wherein the images of fluorescence emitters lying above the focal plane in said still images have a first rotational asymmetry as a result of distortion in a first direction, and the images of fluorescence emitters positioned below the focal plane have a second rotational asymmetry as a result of distortion in a second direction, wherein the control device is designed for the purpose of deriving depth position information for the fluorescence emitters from the rotational asymmetry, said control device additionally adjusting the adaptive mirror in such a manner that it does not produce any astigmatism when at least some of the still images are produced, such that non-astigmatic still images are captured, and the control device being designed for detecting rotationally asymmetric images of fluorescence emitters in the non-astigmatic still images, and of subjecting these fluorescence emitters either to a depth position correction, or suppressing the same, in the derivation process for the depth position information in the astigmatic still images. 7. The fluorescence microscope according to claim 6, wherein the control device for adjusting the adaptive mirror is designed in such a manner that non-astigmatic still images are produced intermittently between astigmatic still images. 8. The fluorescence microscope according to claim 6, wherein said imaging device has a first image capture region and a second image capture region, and the control device is designed for the purpose of adjusting the adaptive mirror in such a manner that it images an astigmatic still image on a first image capture region and a non-astigmatic still image on a second image capture region at the same time. 9. The fluorescence microscope according to claim 6, wherein said control device is designed for the purpose of using the images of the fluorescence emitters as the starting point for the determination of the rotational asymmetry, for the depth position correction in the derivation of the depth position information in the astigmatic still images. 10. The fluorescence microscope according to claim 6, wherein said control device is designed for the purpose of adjusting a degree of astigmatism produced by the adaptive mirror in order to adjust a depth resolution.
In a sample, fluorescence emitters are repeatedly excited to emit fluorescence, and still images are produced of the sample by means of a microscope. At least a subset of the fluorescence emitters is isolated in each still image. The positions of the fluorescence emitters are localized in the still images with a location accuracy exceeding the optical resolution. A high-resolution composite image is generated therefrom. An adaptive mirror is arranged in the imaging beam path, and is adjusted in such a manner that it produces an astigmatism when at least one of the still images is produced. As a result, still images with astigmatism are captured. Depth position information for the fluorescence emitters is derived from the rotational asymmetry. The adaptive mirror is additionally adjusted in such a manner that it does not produce any astigmatism when some of the still images are produced.1. A method for high-resolution 3D fluorescence microscopy, comprising (a) repeatedly exciting fluorescence emitters in a sample to emit fluorescence, and producing still images of the sample by means of a microscope having an imaging beam path with an optical resolution and a focal plane, said fluorescence emitters being stimulated to emit fluorescence in such a manner that at least a subset of the fluorescence emitters is isolated in each still image, so that the images of these fluorescence emitters can be separated in the still images within the optical resolution, (b) localizing the positions of the fluorescence emitters from the images of the isolated fluorescence emitters in the resulting still images, with a location accuracy exceeding the optical resolution, and generating a high-resolution composite image therefrom, (c) arranging an adaptive mirror in the imaging beam path of the microscope, and adjusting said mirror in such a manner that it produces an astigmatism when at least some of the still images are produced, thereby capturing still images with astigmatism, said images of the fluorescence emitters positioned above the focal plane having a first rotational asymmetry as a result of distortion in a first direction, and the images of fluorescence emitters positioned below the focal plane having a second rotational asymmetry as a result of distortion in a second direction, wherein depth position information for the fluorescence emitters is derived from the rotational asymmetry, (d) further adjusting said adaptive mirror in such a manner that it does not produce any astigmatism when at least some of the still images are produced, such that non-astigmatic still images are captured, and (e) detecting rotationally asymmetric images of fluorescence emitters in the non-astigmatic still images, and in the derivation process for the depth position information in the astigmatic still images these fluorescence emitters are either subjected to a depth position correction, or are suppressed. 2. The method according to claim 1, wherein the non-astigmatic still images produced in step (d) are carried out intermittently between step (c), in which astigmatic still images are produced. 3. The method according to claim 2, wherein said adaptive mirror is adjusted in such a manner that it images an astigmatic still image on a first image capture region and a non-astigmatic still image on a second image capture region at the same time. 4. The method according to claim 1, wherein in step (e), the images of the fluorescence emitters in the non-astigmatic still images are used as the starting point for the determination of the rotational asymmetry, for the depth position correction in the derivation of the depth position information. 5. The method according to claim 1, wherein a degree of astigmatism produced by the adaptive mirror is adjusted in order to adjust a depth resolution. 6. A fluorescence microscope for three-dimensional imaging of a sample with a location accuracy exceeding the optical resolution, comprising: an illumination device designed for repeatedly exciting fluorescence emitters in the sample to emit fluorescence, an imaging device having an imaging beam path with the optical resolution for producing still images of the sample at the optical resolution, a control device for controlling the illumination device and the imaging device in such a manner that multiple still images of the sample are produced, said fluorescence emitters being excited to emit fluorescence in such a manner that at least a subset of the fluorescence emitters in each still image is isolated so that the images of these fluorescence emitters can be separated in the still images within the optical resolution said control device being designed for localizing the positions of the isolated fluorescing fluorescence emitters in the generated still images with a location accuracy exceeding the optical resolution, and of generating a high-resolution composite image therefrom, the imaging device having an adaptive mirror, the control device for adjusting the adaptive mirror being designed to produce an astigmatism when at least some of the still images are produced, such that astigmatic still images are thereby captured, wherein the images of fluorescence emitters lying above the focal plane in said still images have a first rotational asymmetry as a result of distortion in a first direction, and the images of fluorescence emitters positioned below the focal plane have a second rotational asymmetry as a result of distortion in a second direction, wherein the control device is designed for the purpose of deriving depth position information for the fluorescence emitters from the rotational asymmetry, said control device additionally adjusting the adaptive mirror in such a manner that it does not produce any astigmatism when at least some of the still images are produced, such that non-astigmatic still images are captured, and the control device being designed for detecting rotationally asymmetric images of fluorescence emitters in the non-astigmatic still images, and of subjecting these fluorescence emitters either to a depth position correction, or suppressing the same, in the derivation process for the depth position information in the astigmatic still images. 7. The fluorescence microscope according to claim 6, wherein the control device for adjusting the adaptive mirror is designed in such a manner that non-astigmatic still images are produced intermittently between astigmatic still images. 8. The fluorescence microscope according to claim 6, wherein said imaging device has a first image capture region and a second image capture region, and the control device is designed for the purpose of adjusting the adaptive mirror in such a manner that it images an astigmatic still image on a first image capture region and a non-astigmatic still image on a second image capture region at the same time. 9. The fluorescence microscope according to claim 6, wherein said control device is designed for the purpose of using the images of the fluorescence emitters as the starting point for the determination of the rotational asymmetry, for the depth position correction in the derivation of the depth position information in the astigmatic still images. 10. The fluorescence microscope according to claim 6, wherein said control device is designed for the purpose of adjusting a degree of astigmatism produced by the adaptive mirror in order to adjust a depth resolution.
2,400
7,038
7,038
15,594,134
2,466
A machine, program product, and method for enabling interoperable and low-latency networking among service devices. The machine, program product and methods perform the tasks of automatically matching, upon the receipt of the incoming data transmission, the data transmission to a plurality of analog device protocols to determine the necessary instructions and transmission media to command and control the plurality of analog service devices according to the data transmission or a plurality of digital device protocols to determine the necessary instructions and transmission media to command and control the plurality of digital service devices according to the data transmission, determining an outgoing transmission media for the incoming data transmission, constructing outgoing data transmissions between any of the analog service devices and any of the digital service devices responsive to the matching of the analog and digital device protocols and the identification of the outgoing transmission media, and dynamically allocating frequency spectrum for data transmissions between any of the analog service devices and any of the digital service devices, the dynamic allocation being responsive to any of a service type, service demand, and quality of service threshold for the outgoing transmission media and digital and analog device protocols.
1. A hybrid communications device enabling networking among analog and digital service devices, the device comprising: a memory; and at least one processor coupled to the memory and configured to: receive a plurality of incoming data transmissions, the incoming data transmissions including a plurality of analog data transmissions comprising VUTP media from at least one analog service device and a plurality of digital data transmissions comprising Ethernet transmission media from at least one digital service device, wherein the analog service device and the digital service device each implement a unique device protocol; match, at a central control authority, each of the incoming data transmissions to first protocols for the at least one analog service device to determine instructions and transmission media to command and control the at least one analog service device or to second protocols for the at least one digital service device to determine instructions and transmission media to command and control the at least one digital service device, according to the corresponding incoming data transmission; determine an outgoing transmission media for the incoming data transmission; and construct outgoing data transmissions to command and control the at least one analog service device or the at least one digital service device based on the matching of the corresponding incoming data transmission to the first protocol or the second protocol. 2. The device of claim 1, wherein the plurality of analog data transmission are received via one of an impedance-matched twisted-pair copper wire or optical media. 3. The device of claim 1, wherein the plurality of digital data transmissions are received via one of a fiber medium, a twisted pair copper wire, or a wireless medium. 4. The device of claim 1, wherein the plurality of analog data transmissions are received via a twisted-pair copper wire and the plurality of digital data transmissions are received via a fiber medium. 5. The device of claim 1, wherein the plurality of analog data transmissions are received via a wired medium and the plurality of digital data transmissions are received via a wireless medium. 6. The device of claim 1, wherein the at least one processor is further configured to: dynamically allocate a frequency spectrum for outgoing data transmissions between any of a plurality of analog service devices and any of a plurality of digital service devices, the dynamic allocation being responsive to any of a service type, service demand, and quality of service threshold for the outgoing transmission media, digital device protocols, and analog device protocols. 7. The device of claim 6, wherein the frequency spectrum is allocated according to at least one selected from a group consisting of a quality-of-service threshold, a service demand, and a service type. 8. The device of claim 1, wherein the at least one analog service device includes at least one service device for a service selected from a group consisting of a heating ventilation and air-conditioning (HVAC) service, a lighting service, a door service, a security service, a mechanical service, an engineering service, and a fire protection service. 9. The device of claim 1, wherein the command and control comprises configuring at least one selected from a group consisting of a timer, an on/off schedule, and an alert parameter for the at least one analog service device or the digital service device. 10. The device of claim 1, wherein the transmission media, the first protocols for the at least one analog device, and the second protocols for the at least one digital device are stored in device libraries based on at least two of device name, device type, manufacturer, interface media type, and scheduling information. 11. The device of claim 1, wherein the at least one processor is further configured to: operatively couple to external transceiver devices using an analog interface via a first management component, the first management component having a first library comprising a plurality of equipment protocols for controlling a plurality of analog service devices; and operatively couple to external transceiver devices using a digital interface via a second management component, the second management component having a second library comprising a plurality of equipment protocols for controlling a plurality of digital service devices. 12. A non-transitory computer-readable medium storing computer executable code enabling networking among analog and digital service devices, comprising code to receive a plurality of incoming data transmissions, the incoming data transmissions including a plurality of analog data transmissions comprising VUTP media from at least one analog service device and a plurality of digital data transmissions comprising Ethernet transmission media from at least one digital service device, wherein the analog service device and the digital service device each implement a unique device protocol; match, at a central control authority, each of the incoming data transmissions to first protocols for the at least one analog service device to determine instructions and transmission media to command and control the at least one analog service device or to second protocols for the at least one digital service device to determine instructions and transmission media to command and control the at least one digital service device, according to the corresponding incoming data transmission; determine an outgoing transmission media for the incoming data transmission; and construct outgoing data transmissions to command and control the at least one analog service device or the at least one digital service device based on the matching of the corresponding incoming data transmission to the first protocol or the second protocol. 13. The non-transitory computer-readable medium of claim 12, wherein the plurality of analog data transmissions are received via a twisted-pair copper wire and the plurality of digital data transmissions are received via a fiber medium. 14. The non-transitory computer-readable medium of claim 12, wherein the plurality of analog data transmissions are received via a wired medium and the plurality of digital data transmissions are received via a wireless medium. 15. The non-transitory computer-readable medium of claim 12, further comprising code to: dynamically allocate a frequency spectrum for outgoing data transmissions between any of a plurality of analog service devices and any of a plurality of digital service devices, the dynamic allocation being responsive to any of a service type, service demand, and quality of service threshold for the outgoing transmission media, digital device protocols, and analog device protocols. 16. The non-transitory computer-readable medium of claim 12, wherein the transmission media, the first protocols for the at least one analog device, and the second protocols for the at least one digital device are stored in device libraries based on at least two of device name, device type, manufacturer, interface media type, and scheduling information. 17. The non-transitory computer-readable medium of claim 12, further comprising code to: operatively couple to external transceiver devices using an analog interface via a first management component, the first management component having a first library comprising a plurality of equipment protocols for controlling a plurality of analog service devices; and operatively couple to external transceiver devices using a digital interface via a second management component, the second management component having a second library comprising a plurality of equipment protocols for controlling a plurality of digital service devices. 18. A method for enabling networking among analog and digital service devices at a central command authority, comprising: receiving a plurality of incoming data transmissions, the incoming data transmissions including a plurality of analog data transmissions comprising VUTP media from at least one analog service device and a plurality of digital data transmissions comprising Ethernet transmission media from at least one digital service device, wherein the analog service device and the digital service device each implement a unique device protocol; matching, at a central control authority, each of the incoming data transmissions to first protocols for the at least one analog service device to determine instructions and transmission media to command and control the at least one analog service device or to second protocols for the at least one digital service device to determine instructions and transmission media to command and control the at least one digital service device, according to the corresponding incoming data transmission; determining an outgoing transmission media for the incoming data transmission; and constructing outgoing data transmissions to command and control the at least one analog service device or the at least one digital service device based on the matching of the corresponding incoming data transmission to the first protocol or the second protocol. 19. The method of claim 18, wherein the plurality of analog data transmissions are received via a twisted-pair copper wire and the plurality of digital data transmissions are received via a fiber medium. 20. The method of claim 18, wherein the plurality of analog data transmissions are received via a wired medium and the plurality of digital data transmissions are received via a wireless medium. 21. The method of claim 18, further comprising: dynamically allocating a frequency spectrum for outgoing data transmissions between any of a plurality of analog service devices and any of a plurality of digital service devices, the dynamic allocation being responsive to any of a service type, service demand, and quality of service threshold for the outgoing transmission media, digital device protocols, and analog device protocols. 22. The method of claim 18, wherein the transmission media, the first protocols for the at least one analog device, and the second protocols for the at least one digital device are stored in device libraries based on at least two of device name, device type, manufacturer, interface media type, and scheduling information. 23. The method of claim 18, further comprising: operatively coupling to external transceiver devices using an analog interface via a first management component, the first management component having a first library comprising a plurality of equipment protocols for controlling a plurality of analog service devices; and operatively coupling to external transceiver devices using a digital interface via a second management component, the second management component having a second library comprising a plurality of equipment protocols for controlling a plurality of digital service devices.
A machine, program product, and method for enabling interoperable and low-latency networking among service devices. The machine, program product and methods perform the tasks of automatically matching, upon the receipt of the incoming data transmission, the data transmission to a plurality of analog device protocols to determine the necessary instructions and transmission media to command and control the plurality of analog service devices according to the data transmission or a plurality of digital device protocols to determine the necessary instructions and transmission media to command and control the plurality of digital service devices according to the data transmission, determining an outgoing transmission media for the incoming data transmission, constructing outgoing data transmissions between any of the analog service devices and any of the digital service devices responsive to the matching of the analog and digital device protocols and the identification of the outgoing transmission media, and dynamically allocating frequency spectrum for data transmissions between any of the analog service devices and any of the digital service devices, the dynamic allocation being responsive to any of a service type, service demand, and quality of service threshold for the outgoing transmission media and digital and analog device protocols.1. A hybrid communications device enabling networking among analog and digital service devices, the device comprising: a memory; and at least one processor coupled to the memory and configured to: receive a plurality of incoming data transmissions, the incoming data transmissions including a plurality of analog data transmissions comprising VUTP media from at least one analog service device and a plurality of digital data transmissions comprising Ethernet transmission media from at least one digital service device, wherein the analog service device and the digital service device each implement a unique device protocol; match, at a central control authority, each of the incoming data transmissions to first protocols for the at least one analog service device to determine instructions and transmission media to command and control the at least one analog service device or to second protocols for the at least one digital service device to determine instructions and transmission media to command and control the at least one digital service device, according to the corresponding incoming data transmission; determine an outgoing transmission media for the incoming data transmission; and construct outgoing data transmissions to command and control the at least one analog service device or the at least one digital service device based on the matching of the corresponding incoming data transmission to the first protocol or the second protocol. 2. The device of claim 1, wherein the plurality of analog data transmission are received via one of an impedance-matched twisted-pair copper wire or optical media. 3. The device of claim 1, wherein the plurality of digital data transmissions are received via one of a fiber medium, a twisted pair copper wire, or a wireless medium. 4. The device of claim 1, wherein the plurality of analog data transmissions are received via a twisted-pair copper wire and the plurality of digital data transmissions are received via a fiber medium. 5. The device of claim 1, wherein the plurality of analog data transmissions are received via a wired medium and the plurality of digital data transmissions are received via a wireless medium. 6. The device of claim 1, wherein the at least one processor is further configured to: dynamically allocate a frequency spectrum for outgoing data transmissions between any of a plurality of analog service devices and any of a plurality of digital service devices, the dynamic allocation being responsive to any of a service type, service demand, and quality of service threshold for the outgoing transmission media, digital device protocols, and analog device protocols. 7. The device of claim 6, wherein the frequency spectrum is allocated according to at least one selected from a group consisting of a quality-of-service threshold, a service demand, and a service type. 8. The device of claim 1, wherein the at least one analog service device includes at least one service device for a service selected from a group consisting of a heating ventilation and air-conditioning (HVAC) service, a lighting service, a door service, a security service, a mechanical service, an engineering service, and a fire protection service. 9. The device of claim 1, wherein the command and control comprises configuring at least one selected from a group consisting of a timer, an on/off schedule, and an alert parameter for the at least one analog service device or the digital service device. 10. The device of claim 1, wherein the transmission media, the first protocols for the at least one analog device, and the second protocols for the at least one digital device are stored in device libraries based on at least two of device name, device type, manufacturer, interface media type, and scheduling information. 11. The device of claim 1, wherein the at least one processor is further configured to: operatively couple to external transceiver devices using an analog interface via a first management component, the first management component having a first library comprising a plurality of equipment protocols for controlling a plurality of analog service devices; and operatively couple to external transceiver devices using a digital interface via a second management component, the second management component having a second library comprising a plurality of equipment protocols for controlling a plurality of digital service devices. 12. A non-transitory computer-readable medium storing computer executable code enabling networking among analog and digital service devices, comprising code to receive a plurality of incoming data transmissions, the incoming data transmissions including a plurality of analog data transmissions comprising VUTP media from at least one analog service device and a plurality of digital data transmissions comprising Ethernet transmission media from at least one digital service device, wherein the analog service device and the digital service device each implement a unique device protocol; match, at a central control authority, each of the incoming data transmissions to first protocols for the at least one analog service device to determine instructions and transmission media to command and control the at least one analog service device or to second protocols for the at least one digital service device to determine instructions and transmission media to command and control the at least one digital service device, according to the corresponding incoming data transmission; determine an outgoing transmission media for the incoming data transmission; and construct outgoing data transmissions to command and control the at least one analog service device or the at least one digital service device based on the matching of the corresponding incoming data transmission to the first protocol or the second protocol. 13. The non-transitory computer-readable medium of claim 12, wherein the plurality of analog data transmissions are received via a twisted-pair copper wire and the plurality of digital data transmissions are received via a fiber medium. 14. The non-transitory computer-readable medium of claim 12, wherein the plurality of analog data transmissions are received via a wired medium and the plurality of digital data transmissions are received via a wireless medium. 15. The non-transitory computer-readable medium of claim 12, further comprising code to: dynamically allocate a frequency spectrum for outgoing data transmissions between any of a plurality of analog service devices and any of a plurality of digital service devices, the dynamic allocation being responsive to any of a service type, service demand, and quality of service threshold for the outgoing transmission media, digital device protocols, and analog device protocols. 16. The non-transitory computer-readable medium of claim 12, wherein the transmission media, the first protocols for the at least one analog device, and the second protocols for the at least one digital device are stored in device libraries based on at least two of device name, device type, manufacturer, interface media type, and scheduling information. 17. The non-transitory computer-readable medium of claim 12, further comprising code to: operatively couple to external transceiver devices using an analog interface via a first management component, the first management component having a first library comprising a plurality of equipment protocols for controlling a plurality of analog service devices; and operatively couple to external transceiver devices using a digital interface via a second management component, the second management component having a second library comprising a plurality of equipment protocols for controlling a plurality of digital service devices. 18. A method for enabling networking among analog and digital service devices at a central command authority, comprising: receiving a plurality of incoming data transmissions, the incoming data transmissions including a plurality of analog data transmissions comprising VUTP media from at least one analog service device and a plurality of digital data transmissions comprising Ethernet transmission media from at least one digital service device, wherein the analog service device and the digital service device each implement a unique device protocol; matching, at a central control authority, each of the incoming data transmissions to first protocols for the at least one analog service device to determine instructions and transmission media to command and control the at least one analog service device or to second protocols for the at least one digital service device to determine instructions and transmission media to command and control the at least one digital service device, according to the corresponding incoming data transmission; determining an outgoing transmission media for the incoming data transmission; and constructing outgoing data transmissions to command and control the at least one analog service device or the at least one digital service device based on the matching of the corresponding incoming data transmission to the first protocol or the second protocol. 19. The method of claim 18, wherein the plurality of analog data transmissions are received via a twisted-pair copper wire and the plurality of digital data transmissions are received via a fiber medium. 20. The method of claim 18, wherein the plurality of analog data transmissions are received via a wired medium and the plurality of digital data transmissions are received via a wireless medium. 21. The method of claim 18, further comprising: dynamically allocating a frequency spectrum for outgoing data transmissions between any of a plurality of analog service devices and any of a plurality of digital service devices, the dynamic allocation being responsive to any of a service type, service demand, and quality of service threshold for the outgoing transmission media, digital device protocols, and analog device protocols. 22. The method of claim 18, wherein the transmission media, the first protocols for the at least one analog device, and the second protocols for the at least one digital device are stored in device libraries based on at least two of device name, device type, manufacturer, interface media type, and scheduling information. 23. The method of claim 18, further comprising: operatively coupling to external transceiver devices using an analog interface via a first management component, the first management component having a first library comprising a plurality of equipment protocols for controlling a plurality of analog service devices; and operatively coupling to external transceiver devices using a digital interface via a second management component, the second management component having a second library comprising a plurality of equipment protocols for controlling a plurality of digital service devices.
2,400
7,039
7,039
14,070,427
2,488
Systems and methods for building a three-dimensional composite scene are disclosed. Certain embodiments of the systems and methods may include the use of a three-dimensional capture device that captures a plurality of three-dimensional images of an environment. Some embodiments may further include elements concerning aligning and/or mapping the captured images. Various embodiments may further include elements concerning reconstructing the environment from which the images were captured. The methods disclosed herein may be performed by a program embodied on a non-transitory computer-readable storage medium when executed the program is executed a processor.
1. A system for building a three-dimensional composite scene, the system comprising: a three-dimensional capture device for capturing a plurality of three-dimensional images of an environment; a processor for executing instructions stored in memory, wherein execution of the instructions by the processor aligns the plurality of three-dimensional images in a common space to obtain mapping data regarding the environment; and a rendering device for displaying a three-dimensional construction of the environment based on the mapping data.
Systems and methods for building a three-dimensional composite scene are disclosed. Certain embodiments of the systems and methods may include the use of a three-dimensional capture device that captures a plurality of three-dimensional images of an environment. Some embodiments may further include elements concerning aligning and/or mapping the captured images. Various embodiments may further include elements concerning reconstructing the environment from which the images were captured. The methods disclosed herein may be performed by a program embodied on a non-transitory computer-readable storage medium when executed the program is executed a processor.1. A system for building a three-dimensional composite scene, the system comprising: a three-dimensional capture device for capturing a plurality of three-dimensional images of an environment; a processor for executing instructions stored in memory, wherein execution of the instructions by the processor aligns the plurality of three-dimensional images in a common space to obtain mapping data regarding the environment; and a rendering device for displaying a three-dimensional construction of the environment based on the mapping data.
2,400
7,040
7,040
14,525,003
2,425
Systems and methods described provide ways to order channels surfed such that channels of likely greater interest to the user are presented to the user first, and channels of lesser interest are presented after. For examples, channels showing popular programs may be placed higher in a channel surfing lineup. The systems and methods may also take account of channels that are showing commercials during a time of channel surfing, and may skip over the same while surfing and/or may come back to the channel, or re-place or otherwise include the channel in the surfing lineup, at such time as the commercial has ended and regular programming has continued.
1. A method of providing a channel surfing functionality in which a channel controller controls a subsequent channel to be presented to a user when the user is channel surfing, comprising: a. during playback of streaming data on a content playback device, receiving at a channel controller popularity data about absolute or relative popularity of one or more channels constituting streaming data available to a user when channel surfing; b. receiving data at the channel controller, the data constituting a request to navigate to a subsequent channel on the content playback device, the subsequent channel streaming data for playback on the content playback device; c. within the channel controller, using the received popularity data in the determination of data constituting a prioritized list of one or more channels, whereby the data constituting the prioritized list of one or more channels describes data about an order of channels determined to be of likely interest of a user; d. within the channel controller, selecting a subsequent channel to be navigated to based on the prioritized list of one or more channels; and e. using the channel controller, navigating to the selected channel and displaying streaming data associated with the selected channel on the content playback device. 2. The method of claim 1, wherein the prioritized list contains only one channel. 3. The method of claim 1, wherein the popularity data is based on an overall popularity of the channel over a period of time. 4. The method of claim 1, wherein the popularity data is based on a current popularity of the channel, the current popularity determined while the channel is displaying a given content item. 5. The method of claim 1, further comprising, within the channel controller, basing a calculation of the order of the prioritized list at least partially on a status of playback of content items being displayed by the respective channels, wherein the status of playback is at least partially based on: a. a combination of system clock data, guide data, and metadata about a time remaining or time elapsed in the playback of the content item; b. an indication from a server that a number of systems viewing the channel has increased by at least a predetermined percentage. 6. The method of claim 1, further comprising basing an order of the prioritized list on a selected content type. 7. The method of claim 6, wherein the user is currently watching a channel, and further comprising receiving data at the channel controller about content preferences of other viewers watching the currently watched channel, and wherein the content type is determined by aggregating content type preferences of the other viewers watching the currently-watched channel. 8. The method of claim 1, wherein the navigating includes navigating from a cable, satellite, or over-the-air broadcast channel to a streaming internet channel or vice versa. 9. The method of claim 1, wherein the user is currently watching a channel, and further comprising displaying information about a subsequent channel in the prioritized list. 10. The method of claim 1, wherein the popularity data is based on historical statistics data or ratings services data, or on data received from a social networking site. 11. The method of claim 1, further comprising receiving user preferences data at the channel controller, and basing an order of the prioritized list at least partially on the user preferences data, wherein the user preferences data include one or more selected from the following group: a. a user indication of a desire to not channel surf to channels playing a content item past a predetermined point in the duration of the content item; b. a user indication of a desire to see content items of a predetermined genre; c. a user indication of favorite channels; or d. a user indication of a desire to not see content items of a predetermined genre. 12. The method of claim 11, wherein the user preferences data is determined by user content consumption analysis data, including data based on an analysis of channels frequently watched by the user. 13. The method of claim 1, wherein if the subsequent channel is displaying a commercial, then further comprising skipping the subsequent channel and determining a next subsequent channel to navigate to, and repeating the steps of: a. determining if the next subsequent channel is displaying a commercial; and b. if the next subsequent channel is not displaying a commercial, then navigating to the next subsequent channel. 14. The method of claim 1, wherein the popularity data is received from a server coupled to other systems running a method of providing channel surfing functionality. 15. A controller configured to perform the method of claim 1, where the controller is configured to receive a “next channel” signal from a remote control. 16. A method of providing a channel surfing functionality in which a channel controller controls a subsequent channel to be presented to a user when the user is channel surfing, comprising: a. during playback of streaming data on a content playback device, receiving data at a channel controller, the data corresponding to a request to navigate to a subsequent channel; b. at the channel controller, determining a subsequent channel to be navigated to; c. at the channel controller, receiving data about the determined subsequent channel, and using the received data about the subsequent channel to determine if the subsequent channel is displaying a commercial; and d. if the subsequent channel is not displaying a commercial, then navigating to the subsequent channel, and if the subsequent channel is displaying a commercial, then skipping the subsequent channel and determining a next subsequent channel to navigate to, and repeating the steps of: determining if the next subsequent channel is displaying a commercial; and if the next subsequent channel is not displaying a commercial, then navigating to the next subsequent channel. 17. The method of claim 16, further comprising receiving popularity data about a subsequent channel, and further comprising basing the determining of a subsequent channel to navigate to at least in part on the popularity data. 18. The method of claim 17, wherein the basing further comprises: a. receiving popularity data about absolute or relative popularity of one or more channels available to a user when channel surfing; b. using the received popularity data in the determination of a prioritized list of one or more channels, whereby the prioritized list of one or more channels describes a list of channels in an order determined to be of likely interest of a user; c. wherein the determining of a subsequent channel to navigate to is based at least in part on the prioritized list of one or more channels. 19. The method of claim 16, wherein the determining if the subsequent channel is displaying a commercial includes determining if a predetermined proportion of other users indicated that the subsequent channel is displaying a commercial. 20. The method of claim 19, wherein the determining if a predetermined proportion of other users indicated that the subsequent channel is displaying a commercial includes determining if a predetermined number, percentage, ratio, or proportion of other users indicated a commercial on the subsequent channel. 21. The method of claim 16, further comprising receiving metadata associated with the channel displaying a commercial at the channel controller and wherein the determination of the next subsequent channel is at least in part based on the received metadata, wherein the receiving metadata includes receiving metadata from a source selected from the group consisting of: a. a network source including a program listing in a programming guide; b. a network source sourcing a broadcast signal associated with the channel; c. at least one network source providing aggregate data from a subset of other users, the subset defined by other users who skipped over the channel; or d. combinations of the above. 22. A controller configured to perform the method of claim 16, wherein the controller is configured to receive a “next channel” signal from a remote control. 23. A method of providing a channel surfing functionality in which a channel controller controls a subsequent channel to be presented to a user when the user is channel surfing, comprising: a. during playback of streaming data on a content playback device, receiving data at a channel controller, the data corresponding to a request to navigate to a first subsequent channel; b. at the channel controller, determining a first subsequent channel to be navigated to; c. at the channel controller, navigating to the first subsequent channel; d. at the channel controller, receiving data indicating a user desire to delay subsequent navigation to the first subsequent channel for a predetermined time; e. at the channel controller, determining a second subsequent channel to be navigated to; f. at the channel controller, navigating to the second subsequent channel; and g. at the end of the duration of the predetermined time, and upon reception of a request at the channel controller to navigate to a subsequent channel, navigating to the first subsequent channel. 24. The method of claim 23, wherein the predetermined time is at least partially based on a time remaining in a program being displayed on the first subsequent channel. 25. The method of claim 23, further comprising basing the determining of a subsequent first or second channel to navigate to at least in part on the popularity of the first or second channel. 26. The method of claim 25, wherein the basing further comprises: a. at the channel controller, receiving popularity data about absolute or relative popularity of one or more channels available to a user when channel surfing; and b. using the received popularity data in the determination by the channel controller of data about a prioritized list of one or more channels, whereby the prioritized list of one or more channels describes a list of channels in an order determined to be of likely interest of a user; c. wherein the determining of a subsequent channel to navigate to is based at least in part on the data about the prioritized list of one or more channels. 27. The method of claim 23, further comprising receiving metadata associated with the playback of streaming data occurring on the channel, and wherein the determination of the first or second subsequent channel is based at least in part on the received metadata, and wherein the metadata is received from a source selected from the group consisting of: a. a program listing in a programming guide; b. a broadcast signal associated with the channel; c. aggregate data from a subset of other users, the subset defined by other users who skipped over the channel; or d. combinations of the above. 28. A controller configured to perform the method of claim 23, wherein the controller is configured to receive a “next channel” signal from a remote control. 29. A method of providing a channel surfing functionality in which a channel controller controls a subsequent channel to be presented to a user when the user is channel surfing, comprising: a. during playback of streamed data on a content playback device, receiving or retrieving guide data from a server about one or more channels available to a user when channel surfing; b. at the channel controller, receiving data corresponding to a request to navigate to a subsequent channel; c. at the channel controller, using the received or retrieved guide data in the determination of data corresponding to a prioritized list of one or more channels, whereby the prioritized list of one or more channels describes a list of channels in an order determined to be of likely interest of a user; d. at the channel controller, selecting a subsequent channel to be navigated to based on the data corresponding to the prioritized list of one or more channels; and e. navigating to the selected channel. 30. The method of claim 29, wherein the using the received or retrieved guide data includes using the guide data at least in part to determine if: a. a user has at a prior time viewed a portion of a content item on a channel during channel surfing and has not dwelled on the channel displaying the content item for more than a predetermined time; and b. the content item is being displayed at a current time, c. wherein if the above two conditions are met, the method further comprises removing the channel from the prioritized list until a new content item is being displayed by the channel. 31. The method of claim 29, wherein the using the received or retrieved guide data includes using the guide data to determine if: a. a user has at a prior time viewed a content item; and b. the content item is being displayed at a current time, c. wherein if the above two conditions are met, the method further comprises removing a channel displaying the content item from the prioritized list until a new content item is being displayed by the channel. 32. The method of claim 29, wherein the using the received or retrieved guide data includes using the guide data to determine a collection of channels, the collection grouped by a common theme, and ordering the prioritized list such that channels within the collection are channel surfed consecutively. 33. The method of claim 32, further comprising the steps of: a. receiving user input about a desired theme; and b. ordering the prioritized list such that channels in the collection are higher in the prioritized list than channels not in the collection, c. and wherein the theme is a genre, a series of episodic content, or a series of movies. 34. The method of claim 29, wherein the receiving or retrieving guide data includes receiving metadata transmitted from the network server sourcing the channel or obtained through a server corresponding to a third-party source. 35. A controller configured to perform the method of claim 29, where the controller is configured to receive a “next channel” signal from a remote control.
Systems and methods described provide ways to order channels surfed such that channels of likely greater interest to the user are presented to the user first, and channels of lesser interest are presented after. For examples, channels showing popular programs may be placed higher in a channel surfing lineup. The systems and methods may also take account of channels that are showing commercials during a time of channel surfing, and may skip over the same while surfing and/or may come back to the channel, or re-place or otherwise include the channel in the surfing lineup, at such time as the commercial has ended and regular programming has continued.1. A method of providing a channel surfing functionality in which a channel controller controls a subsequent channel to be presented to a user when the user is channel surfing, comprising: a. during playback of streaming data on a content playback device, receiving at a channel controller popularity data about absolute or relative popularity of one or more channels constituting streaming data available to a user when channel surfing; b. receiving data at the channel controller, the data constituting a request to navigate to a subsequent channel on the content playback device, the subsequent channel streaming data for playback on the content playback device; c. within the channel controller, using the received popularity data in the determination of data constituting a prioritized list of one or more channels, whereby the data constituting the prioritized list of one or more channels describes data about an order of channels determined to be of likely interest of a user; d. within the channel controller, selecting a subsequent channel to be navigated to based on the prioritized list of one or more channels; and e. using the channel controller, navigating to the selected channel and displaying streaming data associated with the selected channel on the content playback device. 2. The method of claim 1, wherein the prioritized list contains only one channel. 3. The method of claim 1, wherein the popularity data is based on an overall popularity of the channel over a period of time. 4. The method of claim 1, wherein the popularity data is based on a current popularity of the channel, the current popularity determined while the channel is displaying a given content item. 5. The method of claim 1, further comprising, within the channel controller, basing a calculation of the order of the prioritized list at least partially on a status of playback of content items being displayed by the respective channels, wherein the status of playback is at least partially based on: a. a combination of system clock data, guide data, and metadata about a time remaining or time elapsed in the playback of the content item; b. an indication from a server that a number of systems viewing the channel has increased by at least a predetermined percentage. 6. The method of claim 1, further comprising basing an order of the prioritized list on a selected content type. 7. The method of claim 6, wherein the user is currently watching a channel, and further comprising receiving data at the channel controller about content preferences of other viewers watching the currently watched channel, and wherein the content type is determined by aggregating content type preferences of the other viewers watching the currently-watched channel. 8. The method of claim 1, wherein the navigating includes navigating from a cable, satellite, or over-the-air broadcast channel to a streaming internet channel or vice versa. 9. The method of claim 1, wherein the user is currently watching a channel, and further comprising displaying information about a subsequent channel in the prioritized list. 10. The method of claim 1, wherein the popularity data is based on historical statistics data or ratings services data, or on data received from a social networking site. 11. The method of claim 1, further comprising receiving user preferences data at the channel controller, and basing an order of the prioritized list at least partially on the user preferences data, wherein the user preferences data include one or more selected from the following group: a. a user indication of a desire to not channel surf to channels playing a content item past a predetermined point in the duration of the content item; b. a user indication of a desire to see content items of a predetermined genre; c. a user indication of favorite channels; or d. a user indication of a desire to not see content items of a predetermined genre. 12. The method of claim 11, wherein the user preferences data is determined by user content consumption analysis data, including data based on an analysis of channels frequently watched by the user. 13. The method of claim 1, wherein if the subsequent channel is displaying a commercial, then further comprising skipping the subsequent channel and determining a next subsequent channel to navigate to, and repeating the steps of: a. determining if the next subsequent channel is displaying a commercial; and b. if the next subsequent channel is not displaying a commercial, then navigating to the next subsequent channel. 14. The method of claim 1, wherein the popularity data is received from a server coupled to other systems running a method of providing channel surfing functionality. 15. A controller configured to perform the method of claim 1, where the controller is configured to receive a “next channel” signal from a remote control. 16. A method of providing a channel surfing functionality in which a channel controller controls a subsequent channel to be presented to a user when the user is channel surfing, comprising: a. during playback of streaming data on a content playback device, receiving data at a channel controller, the data corresponding to a request to navigate to a subsequent channel; b. at the channel controller, determining a subsequent channel to be navigated to; c. at the channel controller, receiving data about the determined subsequent channel, and using the received data about the subsequent channel to determine if the subsequent channel is displaying a commercial; and d. if the subsequent channel is not displaying a commercial, then navigating to the subsequent channel, and if the subsequent channel is displaying a commercial, then skipping the subsequent channel and determining a next subsequent channel to navigate to, and repeating the steps of: determining if the next subsequent channel is displaying a commercial; and if the next subsequent channel is not displaying a commercial, then navigating to the next subsequent channel. 17. The method of claim 16, further comprising receiving popularity data about a subsequent channel, and further comprising basing the determining of a subsequent channel to navigate to at least in part on the popularity data. 18. The method of claim 17, wherein the basing further comprises: a. receiving popularity data about absolute or relative popularity of one or more channels available to a user when channel surfing; b. using the received popularity data in the determination of a prioritized list of one or more channels, whereby the prioritized list of one or more channels describes a list of channels in an order determined to be of likely interest of a user; c. wherein the determining of a subsequent channel to navigate to is based at least in part on the prioritized list of one or more channels. 19. The method of claim 16, wherein the determining if the subsequent channel is displaying a commercial includes determining if a predetermined proportion of other users indicated that the subsequent channel is displaying a commercial. 20. The method of claim 19, wherein the determining if a predetermined proportion of other users indicated that the subsequent channel is displaying a commercial includes determining if a predetermined number, percentage, ratio, or proportion of other users indicated a commercial on the subsequent channel. 21. The method of claim 16, further comprising receiving metadata associated with the channel displaying a commercial at the channel controller and wherein the determination of the next subsequent channel is at least in part based on the received metadata, wherein the receiving metadata includes receiving metadata from a source selected from the group consisting of: a. a network source including a program listing in a programming guide; b. a network source sourcing a broadcast signal associated with the channel; c. at least one network source providing aggregate data from a subset of other users, the subset defined by other users who skipped over the channel; or d. combinations of the above. 22. A controller configured to perform the method of claim 16, wherein the controller is configured to receive a “next channel” signal from a remote control. 23. A method of providing a channel surfing functionality in which a channel controller controls a subsequent channel to be presented to a user when the user is channel surfing, comprising: a. during playback of streaming data on a content playback device, receiving data at a channel controller, the data corresponding to a request to navigate to a first subsequent channel; b. at the channel controller, determining a first subsequent channel to be navigated to; c. at the channel controller, navigating to the first subsequent channel; d. at the channel controller, receiving data indicating a user desire to delay subsequent navigation to the first subsequent channel for a predetermined time; e. at the channel controller, determining a second subsequent channel to be navigated to; f. at the channel controller, navigating to the second subsequent channel; and g. at the end of the duration of the predetermined time, and upon reception of a request at the channel controller to navigate to a subsequent channel, navigating to the first subsequent channel. 24. The method of claim 23, wherein the predetermined time is at least partially based on a time remaining in a program being displayed on the first subsequent channel. 25. The method of claim 23, further comprising basing the determining of a subsequent first or second channel to navigate to at least in part on the popularity of the first or second channel. 26. The method of claim 25, wherein the basing further comprises: a. at the channel controller, receiving popularity data about absolute or relative popularity of one or more channels available to a user when channel surfing; and b. using the received popularity data in the determination by the channel controller of data about a prioritized list of one or more channels, whereby the prioritized list of one or more channels describes a list of channels in an order determined to be of likely interest of a user; c. wherein the determining of a subsequent channel to navigate to is based at least in part on the data about the prioritized list of one or more channels. 27. The method of claim 23, further comprising receiving metadata associated with the playback of streaming data occurring on the channel, and wherein the determination of the first or second subsequent channel is based at least in part on the received metadata, and wherein the metadata is received from a source selected from the group consisting of: a. a program listing in a programming guide; b. a broadcast signal associated with the channel; c. aggregate data from a subset of other users, the subset defined by other users who skipped over the channel; or d. combinations of the above. 28. A controller configured to perform the method of claim 23, wherein the controller is configured to receive a “next channel” signal from a remote control. 29. A method of providing a channel surfing functionality in which a channel controller controls a subsequent channel to be presented to a user when the user is channel surfing, comprising: a. during playback of streamed data on a content playback device, receiving or retrieving guide data from a server about one or more channels available to a user when channel surfing; b. at the channel controller, receiving data corresponding to a request to navigate to a subsequent channel; c. at the channel controller, using the received or retrieved guide data in the determination of data corresponding to a prioritized list of one or more channels, whereby the prioritized list of one or more channels describes a list of channels in an order determined to be of likely interest of a user; d. at the channel controller, selecting a subsequent channel to be navigated to based on the data corresponding to the prioritized list of one or more channels; and e. navigating to the selected channel. 30. The method of claim 29, wherein the using the received or retrieved guide data includes using the guide data at least in part to determine if: a. a user has at a prior time viewed a portion of a content item on a channel during channel surfing and has not dwelled on the channel displaying the content item for more than a predetermined time; and b. the content item is being displayed at a current time, c. wherein if the above two conditions are met, the method further comprises removing the channel from the prioritized list until a new content item is being displayed by the channel. 31. The method of claim 29, wherein the using the received or retrieved guide data includes using the guide data to determine if: a. a user has at a prior time viewed a content item; and b. the content item is being displayed at a current time, c. wherein if the above two conditions are met, the method further comprises removing a channel displaying the content item from the prioritized list until a new content item is being displayed by the channel. 32. The method of claim 29, wherein the using the received or retrieved guide data includes using the guide data to determine a collection of channels, the collection grouped by a common theme, and ordering the prioritized list such that channels within the collection are channel surfed consecutively. 33. The method of claim 32, further comprising the steps of: a. receiving user input about a desired theme; and b. ordering the prioritized list such that channels in the collection are higher in the prioritized list than channels not in the collection, c. and wherein the theme is a genre, a series of episodic content, or a series of movies. 34. The method of claim 29, wherein the receiving or retrieving guide data includes receiving metadata transmitted from the network server sourcing the channel or obtained through a server corresponding to a third-party source. 35. A controller configured to perform the method of claim 29, where the controller is configured to receive a “next channel” signal from a remote control.
2,400
7,041
7,041
15,080,169
2,441
A computer receives, from over an electronic network, a plurality of communications associated with a primary individual. The computer determines, based on analysis of the plurality of communications, at least one location associated with the primary individual. Moreover, the computer identifies other individuals associated with the primary individual. The computer retrieves, from one or more databases, information relating to the other individuals.
1. A computer-implemented system for analyzing electronic communications, comprising: one or more computer-readable storage media that store instructions; and one or more processors configured to execute the instructions to: receive, from over an electronic network, a plurality of communications associated with a primary individual; determine, based on analysis of the plurality of communications, at least one location associated with the primary individual; identify other individuals associated with the primary individual, the other individuals associated with the primary individual being identified based on a number of mutual contacts between the primary individual and each of the other individuals exceeding a threshold value; rank the other individuals based on quantity and type of communications between each other individual and the primary individual to compute a rank score for each other individual, the rank score being computed by assigning a weighting factor to each communication based on a type of the communication and based on a type of relationship and number of mutual contacts between the primary individual and the other individual; retrieve, from one or more databases, information relating to the other individuals; and generate a graphical user interface (GUI), the GUI comprising a first panel for presenting the at least one location associated with the primary individual, a second panel for presenting the retrieved information related to the other individuals, and a third panel for presenting at least one communication from the plurality of communications, the other individuals being arranged, in the second panel of the GUI, according to the computed rank score, the GUI comprising a flagged filter and a geotag filter for filtering the at least one communication. 2. The computer-implemented system of claim 1, wherein the one or more processors are configured to execute the instructions to determine at least one location associated with the primary individual by analyzing an Internet protocol (IP) addressed associated with at least one of the received plurality of communications. 3. The computer-implemented system of claim 1, wherein the one or more processors are configured to execute the instructions to determine at least one location associated with the primary individual by identifying a location name in the content of at least one of the received plurality of communications. 4. The computer-implemented system of claim 1, wherein the one or more processors are configured to execute the instructions to determine at least one location associated with the primary individual by analyzing data associated with at least one of the identified other individuals. 5. The computer-implemented system of claim 1, wherein the one or more processors are configured to execute the instructions to determine at least one location associated with the primary individual by: analyzing timestamps associated with the received plurality of communications; identifying a time period of low activity based on the analysis of the timestamps; and determining a potential time zone of the primary individual based on the identified time period. 6. The computer-implemented system of claim 1, wherein the one or more processors are further configured to execute the instructions to identify at least two related accounts associated with the primary individual. 7. The computer-implemented system of claim 6, wherein the one or more processors are configured to execute the instructions to identify at least two related accounts associated with the primary individual by: analyzing communications associated with a plurality of user accounts for similarities; and designating at least two user accounts as related based on the similarities. 8. The computer-implemented system of claim 1, wherein the information relating to the other individuals comprises information relating to communications associated with the other individuals. 9. The computer-implemented system of claim 1, wherein the information relating to the other individuals comprises information relating to relationships of the other individuals. 10. The computer-implemented system of claim 1, wherein the one or more processors are further configured to assign a score to each of the plurality of communications associated with the primary individual. 11. The computer-implemented system of claim 10, wherein the one or more processors are further configured to: determine a composite score based on the scores assigned to the plurality of communications associated with the primary individual; and assign the composite score to the primary individual. 12. The computer-implemented system of claim 11, wherein the composite score is determined based on the scores assigned to the plurality of communications associated with the primary individual and a score associated with at least one of the identified other individuals. 13. The computer-implemented system of claim 1, wherein the one or more processors are further configured to generate a graphical user interface including panels for presenting the at least one determined location, information relating to the identified other individuals, and at least one of the received plurality of communications. 14. The computer-implemented system of claim 13, wherein the one or more processors are further configured to assign a score to each of the plurality of communications associated with the primary individual, wherein the at least one of the received plurality of communications presented in the graphical user interface is sorted by score. 15. A computer-implemented method performed by one or more processors and comprising: receiving, from over an electronic network, a plurality of communications associated with a primary individual; determining, based on analysis of the plurality of communications, at least one location associated with the primary individual; identifying other individuals associated with the primary individual, the other individuals associated with the primary individual being identified based on a number of mutual contacts between the primary individual and each of the other individuals exceeding a threshold value; ranking the other individuals based on quantity and type of communications between each other individual and the primary individual to compute a rank score for each other individual, the rank score being computed by assigning a weighting factor to each communication based on a type of the communication and based on a type of relationship and number of mutual contacts between the primary individual and the other individual; retrieving, from one or more databases, information relating to the other individuals; and generating a graphical user interface (GUI), the GUI comprising a first panel for presenting the at least one location associated with the primary individual, a second panel for presenting the retrieved information related to the other individuals, and a third panel for presenting at least one communication from the plurality of communications, the other individuals being arranged, in the second panel of the GUI, according to the computed rank score, the GUI comprising a flagged filter and a geotag filter for filtering the at least one communication. 16. The computer-implemented method of claim 15, wherein determining at least one location associated with the primary individual comprises analyzing data associated with at least one of the identified other individuals. 17. The computer-implemented method of claim 15, further comprising generating a graphical user interface including panels for presenting the at least one determined location, information relating to the identified other individuals, and at least one of the received plurality of communications. 18. A non-transitory computer-readable medium storing a set of instructions that are executable by one or more processors to cause the one or more processors to perform operations comprising: receiving, from over an electronic network, a plurality of communications associated with a primary individual; determining, based on analysis of the plurality of communications, at least one location associated with the primary individual; identifying other individuals associated with the primary individual, the other individuals associated with the primary individual being identified based on a number of mutual contacts between the primary individual and each of the other individuals exceeding a threshold value; and ranking the other individuals based on quantity and type of communications between each other individual and the primary individual to compute a rank score for each other individual, the rank score being computed by assigning a weighting factor to each communication based on a type of the communication and based on a type of relationship and number of mutual contacts between the primary individual and the other individual; retrieving, from one or more databases, information relating to the other individuals; and generating a graphical user interface (GUI), the GUI comprising a first panel for presenting the at least one location associated with the primary individual, a second panel for presenting the retrieved information related to the other individuals, and a third panel for presenting at least one communication from the plurality of communications, the other individuals being arranged, in the second panel of the GUI, according to the computed rank score, the GUI comprising a flagged filter and a geotag filter for filtering the at least one communication. 19. The non-transitory computer-readable medium of claim 18, wherein determining at least one location associated with the primary individual comprises analyzing data associated with at least one of the identified other individuals. 20. The non-transitory computer-readable medium of claim 18, further comprising instructions executable by the one or more processors to cause the one or more processors to generate a graphical user interface including panels for presenting the at least one determined location, information relating to the identified other individuals, and at least one of the received plurality of communications. 21. The computer-implemented system of claim 1, wherein the type of communication comprises one or more of a direct communication, a post, a mention, and a picture tag. 22. The computer-implemented system of claim 1, wherein the type of relationship comprises a mutual relationship or a one-way relationship. 23. The computer-implemented system of claim 1, wherein the number of mutual contacts comprises a number of mutual friends or a number of mutual followers. 24. (canceled)
A computer receives, from over an electronic network, a plurality of communications associated with a primary individual. The computer determines, based on analysis of the plurality of communications, at least one location associated with the primary individual. Moreover, the computer identifies other individuals associated with the primary individual. The computer retrieves, from one or more databases, information relating to the other individuals.1. A computer-implemented system for analyzing electronic communications, comprising: one or more computer-readable storage media that store instructions; and one or more processors configured to execute the instructions to: receive, from over an electronic network, a plurality of communications associated with a primary individual; determine, based on analysis of the plurality of communications, at least one location associated with the primary individual; identify other individuals associated with the primary individual, the other individuals associated with the primary individual being identified based on a number of mutual contacts between the primary individual and each of the other individuals exceeding a threshold value; rank the other individuals based on quantity and type of communications between each other individual and the primary individual to compute a rank score for each other individual, the rank score being computed by assigning a weighting factor to each communication based on a type of the communication and based on a type of relationship and number of mutual contacts between the primary individual and the other individual; retrieve, from one or more databases, information relating to the other individuals; and generate a graphical user interface (GUI), the GUI comprising a first panel for presenting the at least one location associated with the primary individual, a second panel for presenting the retrieved information related to the other individuals, and a third panel for presenting at least one communication from the plurality of communications, the other individuals being arranged, in the second panel of the GUI, according to the computed rank score, the GUI comprising a flagged filter and a geotag filter for filtering the at least one communication. 2. The computer-implemented system of claim 1, wherein the one or more processors are configured to execute the instructions to determine at least one location associated with the primary individual by analyzing an Internet protocol (IP) addressed associated with at least one of the received plurality of communications. 3. The computer-implemented system of claim 1, wherein the one or more processors are configured to execute the instructions to determine at least one location associated with the primary individual by identifying a location name in the content of at least one of the received plurality of communications. 4. The computer-implemented system of claim 1, wherein the one or more processors are configured to execute the instructions to determine at least one location associated with the primary individual by analyzing data associated with at least one of the identified other individuals. 5. The computer-implemented system of claim 1, wherein the one or more processors are configured to execute the instructions to determine at least one location associated with the primary individual by: analyzing timestamps associated with the received plurality of communications; identifying a time period of low activity based on the analysis of the timestamps; and determining a potential time zone of the primary individual based on the identified time period. 6. The computer-implemented system of claim 1, wherein the one or more processors are further configured to execute the instructions to identify at least two related accounts associated with the primary individual. 7. The computer-implemented system of claim 6, wherein the one or more processors are configured to execute the instructions to identify at least two related accounts associated with the primary individual by: analyzing communications associated with a plurality of user accounts for similarities; and designating at least two user accounts as related based on the similarities. 8. The computer-implemented system of claim 1, wherein the information relating to the other individuals comprises information relating to communications associated with the other individuals. 9. The computer-implemented system of claim 1, wherein the information relating to the other individuals comprises information relating to relationships of the other individuals. 10. The computer-implemented system of claim 1, wherein the one or more processors are further configured to assign a score to each of the plurality of communications associated with the primary individual. 11. The computer-implemented system of claim 10, wherein the one or more processors are further configured to: determine a composite score based on the scores assigned to the plurality of communications associated with the primary individual; and assign the composite score to the primary individual. 12. The computer-implemented system of claim 11, wherein the composite score is determined based on the scores assigned to the plurality of communications associated with the primary individual and a score associated with at least one of the identified other individuals. 13. The computer-implemented system of claim 1, wherein the one or more processors are further configured to generate a graphical user interface including panels for presenting the at least one determined location, information relating to the identified other individuals, and at least one of the received plurality of communications. 14. The computer-implemented system of claim 13, wherein the one or more processors are further configured to assign a score to each of the plurality of communications associated with the primary individual, wherein the at least one of the received plurality of communications presented in the graphical user interface is sorted by score. 15. A computer-implemented method performed by one or more processors and comprising: receiving, from over an electronic network, a plurality of communications associated with a primary individual; determining, based on analysis of the plurality of communications, at least one location associated with the primary individual; identifying other individuals associated with the primary individual, the other individuals associated with the primary individual being identified based on a number of mutual contacts between the primary individual and each of the other individuals exceeding a threshold value; ranking the other individuals based on quantity and type of communications between each other individual and the primary individual to compute a rank score for each other individual, the rank score being computed by assigning a weighting factor to each communication based on a type of the communication and based on a type of relationship and number of mutual contacts between the primary individual and the other individual; retrieving, from one or more databases, information relating to the other individuals; and generating a graphical user interface (GUI), the GUI comprising a first panel for presenting the at least one location associated with the primary individual, a second panel for presenting the retrieved information related to the other individuals, and a third panel for presenting at least one communication from the plurality of communications, the other individuals being arranged, in the second panel of the GUI, according to the computed rank score, the GUI comprising a flagged filter and a geotag filter for filtering the at least one communication. 16. The computer-implemented method of claim 15, wherein determining at least one location associated with the primary individual comprises analyzing data associated with at least one of the identified other individuals. 17. The computer-implemented method of claim 15, further comprising generating a graphical user interface including panels for presenting the at least one determined location, information relating to the identified other individuals, and at least one of the received plurality of communications. 18. A non-transitory computer-readable medium storing a set of instructions that are executable by one or more processors to cause the one or more processors to perform operations comprising: receiving, from over an electronic network, a plurality of communications associated with a primary individual; determining, based on analysis of the plurality of communications, at least one location associated with the primary individual; identifying other individuals associated with the primary individual, the other individuals associated with the primary individual being identified based on a number of mutual contacts between the primary individual and each of the other individuals exceeding a threshold value; and ranking the other individuals based on quantity and type of communications between each other individual and the primary individual to compute a rank score for each other individual, the rank score being computed by assigning a weighting factor to each communication based on a type of the communication and based on a type of relationship and number of mutual contacts between the primary individual and the other individual; retrieving, from one or more databases, information relating to the other individuals; and generating a graphical user interface (GUI), the GUI comprising a first panel for presenting the at least one location associated with the primary individual, a second panel for presenting the retrieved information related to the other individuals, and a third panel for presenting at least one communication from the plurality of communications, the other individuals being arranged, in the second panel of the GUI, according to the computed rank score, the GUI comprising a flagged filter and a geotag filter for filtering the at least one communication. 19. The non-transitory computer-readable medium of claim 18, wherein determining at least one location associated with the primary individual comprises analyzing data associated with at least one of the identified other individuals. 20. The non-transitory computer-readable medium of claim 18, further comprising instructions executable by the one or more processors to cause the one or more processors to generate a graphical user interface including panels for presenting the at least one determined location, information relating to the identified other individuals, and at least one of the received plurality of communications. 21. The computer-implemented system of claim 1, wherein the type of communication comprises one or more of a direct communication, a post, a mention, and a picture tag. 22. The computer-implemented system of claim 1, wherein the type of relationship comprises a mutual relationship or a one-way relationship. 23. The computer-implemented system of claim 1, wherein the number of mutual contacts comprises a number of mutual friends or a number of mutual followers. 24. (canceled)
2,400
7,042
7,042
14,070,429
2,488
Systems and methods for building a three-dimensional composite scene are disclosed. Certain embodiments of the systems and methods may include the use of a three-dimensional capture device that captures a plurality of three-dimensional images of an environment. Some embodiments may further include elements concerning aligning and/or mapping the captured images. Various embodiments may further include elements concerning reconstructing the environment from which the images were captured. The methods disclosed herein may be performed by a program embodied on a non-transitory computer-readable storage medium when executed the program is executed a processor.
1. A system for building a three-dimensional composite scene, the system comprising: a three-dimensional capture device for capturing a plurality of three-dimensional images of an environment; a processor for executing instructions stored in memory, wherein execution of the instructions by the processor aligns the plurality of three-dimensional images in a common space to obtain mapping data regarding the environment; and a rendering device for displaying a three-dimensional construction of the environment based on the mapping data.
Systems and methods for building a three-dimensional composite scene are disclosed. Certain embodiments of the systems and methods may include the use of a three-dimensional capture device that captures a plurality of three-dimensional images of an environment. Some embodiments may further include elements concerning aligning and/or mapping the captured images. Various embodiments may further include elements concerning reconstructing the environment from which the images were captured. The methods disclosed herein may be performed by a program embodied on a non-transitory computer-readable storage medium when executed the program is executed a processor.1. A system for building a three-dimensional composite scene, the system comprising: a three-dimensional capture device for capturing a plurality of three-dimensional images of an environment; a processor for executing instructions stored in memory, wherein execution of the instructions by the processor aligns the plurality of three-dimensional images in a common space to obtain mapping data regarding the environment; and a rendering device for displaying a three-dimensional construction of the environment based on the mapping data.
2,400
7,043
7,043
14,358,131
2,465
Embodiments can provide an apparatus, a method and/or a computer program for routing data packets in a radio access network. The apparatus 10 comprises means for receiving 12 a data packet 804 from a source network node, the data packet comprises a data packet header and a data packet payload. The apparatus 10 further comprises means for inspecting 14 the data packet. The means for inspecting 14 is operative to perform a first packet inspection on the data packet header to determine information on a source or a destination of the data packet from the data packet header, and the means for inspecting 14 is operative to perform a second packet inspection on the data packet payload based on the information on the source or the destination of the data packet to determine information on an identification of the destination of the data packet. The apparatus 10 further comprises means for determining 16 information on a subsequent network node based on the information on the identification of the destination of the data packet.
1. An apparatus for routing data packets in a radio access network, the apparatus comprising means for receiving a data packet from a source network node, the data packet comprising a data packet header and a data packet payload; means for inspecting the data packet, the means for inspecting being operative to perform a first packet inspection on the data packet header to determine information on a source or a destination of the data packet from the data packet header, and the means for inspecting being operative to perform a second packet inspection on the data packet payload based on the information on the source or the destination of the data packet to determine information on an identification of the destination of the data packet; and means for determining information on a subsequent network node based on the information on the identification of the destination of the data packet. 2. The apparatus of claim 1, further comprising means for forwarding the data packet to the subsequent network node. 3. The apparatus of claim 1, wherein the source network node corresponds to one or more elements of the group of a network edge node, a network gateway, a mobility management entity, a radio network controller, a serving gateway, a control plane data packet processing entity, or a user plane data packet processing entity. 4. The apparatus of claim 1, wherein the radio access network comprises a plurality of baseband processing units for processing baseband data for subsequent radio transmission, wherein a baseband processing unit is assigned to process data of a service of the destination of the data packet, and wherein the subsequent network node corresponds to the baseband processing unit which is assigned to a service the data packet payload relates to. 5. The apparatus of claim 4, wherein the plurality of baseband processing units comprises control data processing units and payload data processing units, and wherein the means for inspecting is operative to determine whether the data packet is a control data packet or a payload data packet based on the information on the source or the destination of the data packet. 6. The apparatus of claim 1, wherein the means for inspecting is operative to perform one or more operations on the data packet as the second packet inspection based on the information on the source or destination of the data packet, wherein the one or more operations are in sequence, and wherein a subsequent operation is based on the result of a prior operation, wherein the one or more operations correspond to one or more elements of the group of a masking operation, a look-up operation in a look-up table, a replacement operation on address information, or a replacement of routing information. 7. The apparatus of claim 1, wherein the means for inspecting is operative to select one of one or more look-up tables, wherein the one or more look-up tables are selected based on the information on the source or the destination determined with the first packet inspection, wherein the means for inspecting is further operative to perform the second packet inspection based on the one look-up table. 8. The apparatus of claim 7, wherein the one or more look-up tables comprise information on a subsequent operation on the data packet and wherein the second packet inspection comprises the subsequent operation, wherein the operation corresponds to one or more elements of the group of a masking operation, a look-up operation in a look-up table, a replacement operation on address information, or a replacement of routing information. 9. The apparatus of claim 7, wherein a look-up table comprises multiple rows and wherein each row comprises a key-value as an input value, an action or operation to be performed as second packet inspection as a first output value, and a second output value as input value for the second packet inspection for the action or operation to be performed with. 10. The apparatus of claim 9, wherein the look-up table comprises at least two rows with differing entry sizes. 11. The apparatus of claim 1, wherein the means for inspecting comprises a look-up core unit, which is operative to look-up a subsequent operation and an input value for the subsequent operation from a look-up table based on a key-value, wherein the means for inspecting is operative to iteratively run the look-up core, starting with the information on the source or destination as a first key value determined with the first packet inspection, to determine the information on the identification of the destination. 12. The apparatus of claim 1, wherein the means for determining is operative to determine the subsequent network node using one of a plurality of look-up tables, the one look-up table being selected from the plurality of look-up tables based the information on the identification of the destination of the data packet. 13. A method for routing data packets in a radio access network, the method comprising receiving a data packet from a source network node, the data packet comprising a data packet header and a data packet payload; inspecting the data packet by performing a first packet inspection on the data packet header to determine information on a source or a destination of the data packet from the data packet header, and performing a second packet inspection on the data packet payload based on the information on the source or the destination of the data packet to determine information on an identification of the destination of the data packet; and determining information on a subsequent network node based on the information on the identification of the destination of the data packet. 14. A computer program having a program code for performing the method of claim 13, when the computer program is executed on a computer or processor.
Embodiments can provide an apparatus, a method and/or a computer program for routing data packets in a radio access network. The apparatus 10 comprises means for receiving 12 a data packet 804 from a source network node, the data packet comprises a data packet header and a data packet payload. The apparatus 10 further comprises means for inspecting 14 the data packet. The means for inspecting 14 is operative to perform a first packet inspection on the data packet header to determine information on a source or a destination of the data packet from the data packet header, and the means for inspecting 14 is operative to perform a second packet inspection on the data packet payload based on the information on the source or the destination of the data packet to determine information on an identification of the destination of the data packet. The apparatus 10 further comprises means for determining 16 information on a subsequent network node based on the information on the identification of the destination of the data packet.1. An apparatus for routing data packets in a radio access network, the apparatus comprising means for receiving a data packet from a source network node, the data packet comprising a data packet header and a data packet payload; means for inspecting the data packet, the means for inspecting being operative to perform a first packet inspection on the data packet header to determine information on a source or a destination of the data packet from the data packet header, and the means for inspecting being operative to perform a second packet inspection on the data packet payload based on the information on the source or the destination of the data packet to determine information on an identification of the destination of the data packet; and means for determining information on a subsequent network node based on the information on the identification of the destination of the data packet. 2. The apparatus of claim 1, further comprising means for forwarding the data packet to the subsequent network node. 3. The apparatus of claim 1, wherein the source network node corresponds to one or more elements of the group of a network edge node, a network gateway, a mobility management entity, a radio network controller, a serving gateway, a control plane data packet processing entity, or a user plane data packet processing entity. 4. The apparatus of claim 1, wherein the radio access network comprises a plurality of baseband processing units for processing baseband data for subsequent radio transmission, wherein a baseband processing unit is assigned to process data of a service of the destination of the data packet, and wherein the subsequent network node corresponds to the baseband processing unit which is assigned to a service the data packet payload relates to. 5. The apparatus of claim 4, wherein the plurality of baseband processing units comprises control data processing units and payload data processing units, and wherein the means for inspecting is operative to determine whether the data packet is a control data packet or a payload data packet based on the information on the source or the destination of the data packet. 6. The apparatus of claim 1, wherein the means for inspecting is operative to perform one or more operations on the data packet as the second packet inspection based on the information on the source or destination of the data packet, wherein the one or more operations are in sequence, and wherein a subsequent operation is based on the result of a prior operation, wherein the one or more operations correspond to one or more elements of the group of a masking operation, a look-up operation in a look-up table, a replacement operation on address information, or a replacement of routing information. 7. The apparatus of claim 1, wherein the means for inspecting is operative to select one of one or more look-up tables, wherein the one or more look-up tables are selected based on the information on the source or the destination determined with the first packet inspection, wherein the means for inspecting is further operative to perform the second packet inspection based on the one look-up table. 8. The apparatus of claim 7, wherein the one or more look-up tables comprise information on a subsequent operation on the data packet and wherein the second packet inspection comprises the subsequent operation, wherein the operation corresponds to one or more elements of the group of a masking operation, a look-up operation in a look-up table, a replacement operation on address information, or a replacement of routing information. 9. The apparatus of claim 7, wherein a look-up table comprises multiple rows and wherein each row comprises a key-value as an input value, an action or operation to be performed as second packet inspection as a first output value, and a second output value as input value for the second packet inspection for the action or operation to be performed with. 10. The apparatus of claim 9, wherein the look-up table comprises at least two rows with differing entry sizes. 11. The apparatus of claim 1, wherein the means for inspecting comprises a look-up core unit, which is operative to look-up a subsequent operation and an input value for the subsequent operation from a look-up table based on a key-value, wherein the means for inspecting is operative to iteratively run the look-up core, starting with the information on the source or destination as a first key value determined with the first packet inspection, to determine the information on the identification of the destination. 12. The apparatus of claim 1, wherein the means for determining is operative to determine the subsequent network node using one of a plurality of look-up tables, the one look-up table being selected from the plurality of look-up tables based the information on the identification of the destination of the data packet. 13. A method for routing data packets in a radio access network, the method comprising receiving a data packet from a source network node, the data packet comprising a data packet header and a data packet payload; inspecting the data packet by performing a first packet inspection on the data packet header to determine information on a source or a destination of the data packet from the data packet header, and performing a second packet inspection on the data packet payload based on the information on the source or the destination of the data packet to determine information on an identification of the destination of the data packet; and determining information on a subsequent network node based on the information on the identification of the destination of the data packet. 14. A computer program having a program code for performing the method of claim 13, when the computer program is executed on a computer or processor.
2,400
7,044
7,044
11,636,258
2,488
The invention relates to a device and a method for coding video data. The device comprising means for coding each picture in slices of pictures, each slice being coded independently of the other slices. According to the invention, the device comprises means for inserting into the data stream at least one message indicating the structure relating to the breakdown of the pictures into slices. The invention also relates to a system for decoding and a method for decoding video data, the said video data having been coded in slices, each of the slices being coded independently of the other slices. According to the invention, the coding system comprises means for analysing the video data in order to ascertain the breakdown of the data into slices, means for decoding the video data slice by slice, means for reconstructing the various video data after they have been decoded in order to reconstruct the decoded video data.
1. Video data coding device comprising means for coding each picture in slices of pictures, each slice being coded independently of the other slices, wherein it comprises means for inserting into the data stream at least one message indicating the structure relating to the breakdown of the pictures into slices. 2. Device according to claim 1, wherein the means for inserting the said message insert the said message for a group of pictures to be coded. 3. Device according to claim 2, wherein the means for inserting the said message insert the said message for each picture to be coded. 4. Video data coding method comprising a step for coding each picture in slices of pictures, each slice being coded independently of the other slices, wherein it comprises a step for inserting into the data stream at least one message indicating the structure relating to the breakdown of the pictures into slices. 5. Video data decoding system, the said video data having been coded in slices, each of the slices being coded independently of the other slices, wherein it comprises means for analysing the video data in order to ascertain the breakdown of the data into slices, means for decoding the video data slice by slice, means for reconstructing the various video data after they have been decoded in order to reconstruct the decoded video data. 6. Video data decoding system according to claim 5, wherein it comprises a plurality of means for decoding the video data slice by slice, means for orienting the various slices towards the plurality of decoding devices according to their availability, so that a plurality of slices is decoded simultaneously. 7. Decoding system according to claim 5, wherein the means for analysing the video data are capable of recognizing and extracting at least one message comprising the information relating to the breakdown into slices. 8. Video data decoding method, the said video data having been coded in slices, each of the slices being coded independently of the other slices, wherein it comprises the steps for analysing the video data so as to ascertain the breakdown of the data into slices, for orienting the various slices towards video decoding methods, according to the availability of the various methods, for decoding the video data slices in parallel, for reconstructing the various video data after they have been decoded in order to reconstruct the decoded video data.
The invention relates to a device and a method for coding video data. The device comprising means for coding each picture in slices of pictures, each slice being coded independently of the other slices. According to the invention, the device comprises means for inserting into the data stream at least one message indicating the structure relating to the breakdown of the pictures into slices. The invention also relates to a system for decoding and a method for decoding video data, the said video data having been coded in slices, each of the slices being coded independently of the other slices. According to the invention, the coding system comprises means for analysing the video data in order to ascertain the breakdown of the data into slices, means for decoding the video data slice by slice, means for reconstructing the various video data after they have been decoded in order to reconstruct the decoded video data.1. Video data coding device comprising means for coding each picture in slices of pictures, each slice being coded independently of the other slices, wherein it comprises means for inserting into the data stream at least one message indicating the structure relating to the breakdown of the pictures into slices. 2. Device according to claim 1, wherein the means for inserting the said message insert the said message for a group of pictures to be coded. 3. Device according to claim 2, wherein the means for inserting the said message insert the said message for each picture to be coded. 4. Video data coding method comprising a step for coding each picture in slices of pictures, each slice being coded independently of the other slices, wherein it comprises a step for inserting into the data stream at least one message indicating the structure relating to the breakdown of the pictures into slices. 5. Video data decoding system, the said video data having been coded in slices, each of the slices being coded independently of the other slices, wherein it comprises means for analysing the video data in order to ascertain the breakdown of the data into slices, means for decoding the video data slice by slice, means for reconstructing the various video data after they have been decoded in order to reconstruct the decoded video data. 6. Video data decoding system according to claim 5, wherein it comprises a plurality of means for decoding the video data slice by slice, means for orienting the various slices towards the plurality of decoding devices according to their availability, so that a plurality of slices is decoded simultaneously. 7. Decoding system according to claim 5, wherein the means for analysing the video data are capable of recognizing and extracting at least one message comprising the information relating to the breakdown into slices. 8. Video data decoding method, the said video data having been coded in slices, each of the slices being coded independently of the other slices, wherein it comprises the steps for analysing the video data so as to ascertain the breakdown of the data into slices, for orienting the various slices towards video decoding methods, according to the availability of the various methods, for decoding the video data slices in parallel, for reconstructing the various video data after they have been decoded in order to reconstruct the decoded video data.
2,400
7,045
7,045
14,070,428
2,488
Systems and methods for building a three-dimensional composite scene are disclosed. Certain embodiments of the systems and methods may include the use of a three-dimensional capture device that captures a plurality of three-dimensional images of an environment. Some embodiments may further include elements concerning aligning and/or mapping the captured images. Various embodiments may further include elements concerning reconstructing the environment from which the images were captured. The methods disclosed herein may be performed by a program embodied on a non-transitory computer-readable storage medium when executed the program is executed a processor.
1. A system for building a three-dimensional composite scene, the system comprising: a three-dimensional capture device for capturing a plurality of three-dimensional images of an environment; a processor for executing instructions stored in memory, wherein execution of the instructions by the processor aligns the plurality of three-dimensional images in a common space to obtain mapping data regarding the environment; and a rendering device for displaying a three-dimensional construction of the environment based on the mapping data.
Systems and methods for building a three-dimensional composite scene are disclosed. Certain embodiments of the systems and methods may include the use of a three-dimensional capture device that captures a plurality of three-dimensional images of an environment. Some embodiments may further include elements concerning aligning and/or mapping the captured images. Various embodiments may further include elements concerning reconstructing the environment from which the images were captured. The methods disclosed herein may be performed by a program embodied on a non-transitory computer-readable storage medium when executed the program is executed a processor.1. A system for building a three-dimensional composite scene, the system comprising: a three-dimensional capture device for capturing a plurality of three-dimensional images of an environment; a processor for executing instructions stored in memory, wherein execution of the instructions by the processor aligns the plurality of three-dimensional images in a common space to obtain mapping data regarding the environment; and a rendering device for displaying a three-dimensional construction of the environment based on the mapping data.
2,400
7,046
7,046
14,483,400
2,483
A system includes an antenna and a receiver. The antenna receives an encoded satellite signal having a plurality of frames. The receiver receives the satellite signal from the antenna and iteratively processes each frame a predetermined number of times. The number of times the frame is processed is based at least on part on a characteristic of the frame. Moreover, the receiver terminates frame processing earlier if a condition, associated with the processing of the frame, exists. An example receiver includes a decoder that decodes the satellite signal and extracts data from at least one frame by iteratively processing each frame the predetermined number of times. The receiver further includes a controller that generates a control signal representing the predetermined number of times the decoder is to iteratively process each frame. The controller generates the control signal based at least in part on a characteristic of the frame.
1. A system comprising: an antenna configured to receive an encoded satellite signal having a plurality of frames; a receiver configured to receive the encoded satellite signal from the antenna and processes each frame a predetermined number of iterations based at least on part on a characteristic of the frame, wherein the receiver is configured to terminate processing of at least one frame before executing the predetermined number of iterations in response to detecting at least one condition associated with the processing of the frame. 2. The system of claim 1, wherein the at least one condition includes at least one of: information bits and parity bits changing relative to a previous iteration of the frame; each bit node in the frame passes an even parity check; and a buffer fill level exceeding a threshold level. 3. The system of claim 1, wherein the characteristic is based at least in part on a modulation/coding number associated with the frame. 4. The system of claim 3, wherein the modulation/coding number is associated with a target signal-to-noise ratio. 5. The system of claim 1, wherein the receiver is configured to allocate iterations based on a modulation/coding number associated with each frame, wherein a first modulation/coding number is associated with a first signal-to-noise ratio and a second modulation/coding number is associated with a second signal-to-noise ratio. 6. The system of claim 5, wherein the receiver is configured to allocate more iterations to frames associated with the first signal-to-noise ratio and fewer iterations to frames associated with the second signal-to-noise ratio. 7. The system of claim 1, wherein the receiver is configured to allocate processing iterations associated with a first frame to the predetermined number of iterations associated with a second frame. 8. The system of claim 7, wherein the receiver is configured to determine a difference between the predetermined number of iterations and a number of iterations executed before terminating the processing of the second frame. 9. A receiver comprising: a decoder configured to decode a satellite signal and extract data from at least one frame by processing each frame a predetermined number of iterations; and a controller configured to generate a control signal representing the predetermined number of iterations, wherein the controller is configured to generate the control signal based at least in part on a characteristic of the frame and terminate processing of at least one frame before executing the predetermined number of iterations in response to detecting at least one condition associated with the processing of the frame. 10. The receiver of claim 9, wherein the at least one condition includes at least one of: information bits and parity bits changing relative to a previous iteration of the frame; each bit node in the frame passes an even parity check; and a buffer fill level exceeding a threshold level. 11. The receiver of claim 9, wherein the characteristic includes a modulation/coding number associated with the frame. 12. The receiver of claim 11, wherein the modulation/coding number is associated with a target signal-to-noise ratio. 13. The receiver of claim 9, wherein the controller is configured to allocate iterations based on a modulation/coding number associated with each frame, wherein a first modulation/coding number is associated with a first signal-to-noise ratio and a second modulation/coding number is associated with a second signal-to-noise ratio. 14. The receiver of claim 13, wherein the controller is configured to allocate more iterations to frames associated with the first signal-to-noise ratio and fewer iterations to frames associated with the second signal-to-noise ratio. 15. The receiver of claim 9, wherein the controller is configured to allocate processing iterations associated with a first frame to the predetermined number of iterations associated with a second frame. 16. The system of claim 15, wherein the controller is configured to determine a difference between the predetermined number of iterations and a number of iterations executed before terminating the processing of the second frame. 17. A method comprising: receiving an encoded satellite signal having data contained in at least one frame; determining a number of processing iterations based at least in part on a characteristic of the frame; commanding a decoder to process the frame the determined number of processing iterations; detecting at least one condition associated with the processing of the frame; and terminating the processing of the frame before executing the predetermined number of processing iterations if the at least one condition is detected. 18. The method of claim 17, wherein detecting the at least one condition includes detecting at least one of: information bits and parity bits changing relative to a previous iteration of the frame; each bit node in the frame passing an even parity check; and a buffer fill level exceeding a threshold level. 19. The method of claim 17, further comprising allocating processing iterations associated with a first frame to the predetermined number of iterations associated with a second frame. 20. The method of claim 19, wherein allocating processing iterations includes determining a difference between the predetermined number of iterations and a number of iterations executed before terminating the processing of the second frame.
A system includes an antenna and a receiver. The antenna receives an encoded satellite signal having a plurality of frames. The receiver receives the satellite signal from the antenna and iteratively processes each frame a predetermined number of times. The number of times the frame is processed is based at least on part on a characteristic of the frame. Moreover, the receiver terminates frame processing earlier if a condition, associated with the processing of the frame, exists. An example receiver includes a decoder that decodes the satellite signal and extracts data from at least one frame by iteratively processing each frame the predetermined number of times. The receiver further includes a controller that generates a control signal representing the predetermined number of times the decoder is to iteratively process each frame. The controller generates the control signal based at least in part on a characteristic of the frame.1. A system comprising: an antenna configured to receive an encoded satellite signal having a plurality of frames; a receiver configured to receive the encoded satellite signal from the antenna and processes each frame a predetermined number of iterations based at least on part on a characteristic of the frame, wherein the receiver is configured to terminate processing of at least one frame before executing the predetermined number of iterations in response to detecting at least one condition associated with the processing of the frame. 2. The system of claim 1, wherein the at least one condition includes at least one of: information bits and parity bits changing relative to a previous iteration of the frame; each bit node in the frame passes an even parity check; and a buffer fill level exceeding a threshold level. 3. The system of claim 1, wherein the characteristic is based at least in part on a modulation/coding number associated with the frame. 4. The system of claim 3, wherein the modulation/coding number is associated with a target signal-to-noise ratio. 5. The system of claim 1, wherein the receiver is configured to allocate iterations based on a modulation/coding number associated with each frame, wherein a first modulation/coding number is associated with a first signal-to-noise ratio and a second modulation/coding number is associated with a second signal-to-noise ratio. 6. The system of claim 5, wherein the receiver is configured to allocate more iterations to frames associated with the first signal-to-noise ratio and fewer iterations to frames associated with the second signal-to-noise ratio. 7. The system of claim 1, wherein the receiver is configured to allocate processing iterations associated with a first frame to the predetermined number of iterations associated with a second frame. 8. The system of claim 7, wherein the receiver is configured to determine a difference between the predetermined number of iterations and a number of iterations executed before terminating the processing of the second frame. 9. A receiver comprising: a decoder configured to decode a satellite signal and extract data from at least one frame by processing each frame a predetermined number of iterations; and a controller configured to generate a control signal representing the predetermined number of iterations, wherein the controller is configured to generate the control signal based at least in part on a characteristic of the frame and terminate processing of at least one frame before executing the predetermined number of iterations in response to detecting at least one condition associated with the processing of the frame. 10. The receiver of claim 9, wherein the at least one condition includes at least one of: information bits and parity bits changing relative to a previous iteration of the frame; each bit node in the frame passes an even parity check; and a buffer fill level exceeding a threshold level. 11. The receiver of claim 9, wherein the characteristic includes a modulation/coding number associated with the frame. 12. The receiver of claim 11, wherein the modulation/coding number is associated with a target signal-to-noise ratio. 13. The receiver of claim 9, wherein the controller is configured to allocate iterations based on a modulation/coding number associated with each frame, wherein a first modulation/coding number is associated with a first signal-to-noise ratio and a second modulation/coding number is associated with a second signal-to-noise ratio. 14. The receiver of claim 13, wherein the controller is configured to allocate more iterations to frames associated with the first signal-to-noise ratio and fewer iterations to frames associated with the second signal-to-noise ratio. 15. The receiver of claim 9, wherein the controller is configured to allocate processing iterations associated with a first frame to the predetermined number of iterations associated with a second frame. 16. The system of claim 15, wherein the controller is configured to determine a difference between the predetermined number of iterations and a number of iterations executed before terminating the processing of the second frame. 17. A method comprising: receiving an encoded satellite signal having data contained in at least one frame; determining a number of processing iterations based at least in part on a characteristic of the frame; commanding a decoder to process the frame the determined number of processing iterations; detecting at least one condition associated with the processing of the frame; and terminating the processing of the frame before executing the predetermined number of processing iterations if the at least one condition is detected. 18. The method of claim 17, wherein detecting the at least one condition includes detecting at least one of: information bits and parity bits changing relative to a previous iteration of the frame; each bit node in the frame passing an even parity check; and a buffer fill level exceeding a threshold level. 19. The method of claim 17, further comprising allocating processing iterations associated with a first frame to the predetermined number of iterations associated with a second frame. 20. The method of claim 19, wherein allocating processing iterations includes determining a difference between the predetermined number of iterations and a number of iterations executed before terminating the processing of the second frame.
2,400
7,047
7,047
14,422,017
2,491
In a method and apparatus for a data communication system data sessions provided in response to service requests are monitored. Based on the monitoring information regarding data communicated from at least one data source during the monitored sessions is determined. Statistical information is collected based on the determination(s). Performance of at least one operation is caused based on the statistical information.
1. A method for a data communication system, comprising monitoring data sessions provided in response to service requests, determining, based on the monitoring, information regarding data communicated from at least one data source during the monitored sessions, collecting statistical information based on the determining, and causing performance of at least one operation based on the statistical information. 2. A method as claimed in claim 1, wherein the at least one operation comprises at least one of controlling storing and/or deletion of content data; controlling local caching of content data and/or evicting of locally cached content data; publishing and/or un-publishing locally available content data; and determining possibility of a denial of service attack. 3. A method as claimed in claim 1, wherein the monitoring comprises monitoring for downloads in association with a local node of a radio system serving a requestor. 4. A method as claimed in claim 1, wherein the determining comprises reading header information from the data communicated during the session and using the header information in determining the proportion of a full data file that was actually communicated. 5. A method as claimed in claim 1, comprising analysing information contained within headers of content data to determine characteristics of downloaded content. 6. A method as claimed in claim 1, wherein the monitoring comprises identifying content data. 7. A method as claimed in claim 1, wherein the statistical information is based on information about actual usage of content data. 8. A method as claimed in claim 1, comprising providing information on use of different fractions of content data and causing at least one operation on at least one fraction of the content data. 9. A method as claimed in claim 1, comprising determining the proportion of data that was delivered of a full data file. 10. A method as claimed in claim 1, comprising monitoring data sessions by a plurality of information collection points and reporting information to a collection point. 11. A method as claimed in claim 1, comprising determining popularity of a particular data. 12. A method as claimed in claim 1, wherein the monitoring is provided on the data path between a content provider and a requestor, or the monitoring is provided off the data path between a content provider and the requestor based on a duplicate of content data downloaded by the requestor. 13. A method as claimed in claim 1, comprising selecting at least one local content storage and causing downloading or removing of content in the selected local data storage. 14. A method as claimed in claim 1, comprising analysing content data to create additional information for the control operations describing at least one characteristics of the content. 15. An apparatus for a data communication system, configured to determine, based on monitoring of data sessions provided in response to service requests, information regarding data communicated from at least one data source during the monitored sessions, collect statistical information based on the determining, and cause performance of at least one operation based on the statistical information. 16. An apparatus as claimed in claim 15, configured to cause at least one of storing and/or deletion of content data, local caching of content data and/or evicting of locally cached content data, publishing and/or un-publishing locally available content data, and determining possibility of a denial of service attack. 17. An apparatus as claimed in claim 15, configured to read header information from the data communicated during the session and use the header information in determining the proportion of a full data file that was actually communicated. 18. An apparatus as claimed in claim 15, configured to determine the statistical information based on information about actual usage of content data. 19. An apparatus as claimed in claim 15, configured to determine information on use of different fractions of content data and cause at least one operation on at least one fraction of the content data. 20. An apparatus as claimed in claim 15, configured to determine the proportion of data that was delivered of a full data file. 21. An apparatus as claimed in claim 15, configured to determine popularity of a particular data. 22. An apparatus as claimed in claim 15, configured to select at least one local content storage and cause downloading or removing of content in the selected local data storage. 23. A computer program comprising program code means adapted to perform the steps of claim 1 when the program is run on a data processing apparatus.
In a method and apparatus for a data communication system data sessions provided in response to service requests are monitored. Based on the monitoring information regarding data communicated from at least one data source during the monitored sessions is determined. Statistical information is collected based on the determination(s). Performance of at least one operation is caused based on the statistical information.1. A method for a data communication system, comprising monitoring data sessions provided in response to service requests, determining, based on the monitoring, information regarding data communicated from at least one data source during the monitored sessions, collecting statistical information based on the determining, and causing performance of at least one operation based on the statistical information. 2. A method as claimed in claim 1, wherein the at least one operation comprises at least one of controlling storing and/or deletion of content data; controlling local caching of content data and/or evicting of locally cached content data; publishing and/or un-publishing locally available content data; and determining possibility of a denial of service attack. 3. A method as claimed in claim 1, wherein the monitoring comprises monitoring for downloads in association with a local node of a radio system serving a requestor. 4. A method as claimed in claim 1, wherein the determining comprises reading header information from the data communicated during the session and using the header information in determining the proportion of a full data file that was actually communicated. 5. A method as claimed in claim 1, comprising analysing information contained within headers of content data to determine characteristics of downloaded content. 6. A method as claimed in claim 1, wherein the monitoring comprises identifying content data. 7. A method as claimed in claim 1, wherein the statistical information is based on information about actual usage of content data. 8. A method as claimed in claim 1, comprising providing information on use of different fractions of content data and causing at least one operation on at least one fraction of the content data. 9. A method as claimed in claim 1, comprising determining the proportion of data that was delivered of a full data file. 10. A method as claimed in claim 1, comprising monitoring data sessions by a plurality of information collection points and reporting information to a collection point. 11. A method as claimed in claim 1, comprising determining popularity of a particular data. 12. A method as claimed in claim 1, wherein the monitoring is provided on the data path between a content provider and a requestor, or the monitoring is provided off the data path between a content provider and the requestor based on a duplicate of content data downloaded by the requestor. 13. A method as claimed in claim 1, comprising selecting at least one local content storage and causing downloading or removing of content in the selected local data storage. 14. A method as claimed in claim 1, comprising analysing content data to create additional information for the control operations describing at least one characteristics of the content. 15. An apparatus for a data communication system, configured to determine, based on monitoring of data sessions provided in response to service requests, information regarding data communicated from at least one data source during the monitored sessions, collect statistical information based on the determining, and cause performance of at least one operation based on the statistical information. 16. An apparatus as claimed in claim 15, configured to cause at least one of storing and/or deletion of content data, local caching of content data and/or evicting of locally cached content data, publishing and/or un-publishing locally available content data, and determining possibility of a denial of service attack. 17. An apparatus as claimed in claim 15, configured to read header information from the data communicated during the session and use the header information in determining the proportion of a full data file that was actually communicated. 18. An apparatus as claimed in claim 15, configured to determine the statistical information based on information about actual usage of content data. 19. An apparatus as claimed in claim 15, configured to determine information on use of different fractions of content data and cause at least one operation on at least one fraction of the content data. 20. An apparatus as claimed in claim 15, configured to determine the proportion of data that was delivered of a full data file. 21. An apparatus as claimed in claim 15, configured to determine popularity of a particular data. 22. An apparatus as claimed in claim 15, configured to select at least one local content storage and cause downloading or removing of content in the selected local data storage. 23. A computer program comprising program code means adapted to perform the steps of claim 1 when the program is run on a data processing apparatus.
2,400
7,048
7,048
13,836,218
2,443
Method, system, and programs for measuring user engagement. In one example, a type of user activities with respect to a plurality pieces of content in a content stream is detected. A first depth measure with respect to the content stream is obtained based on the detected type of user activities. A function is generated based on the first depth measure and a second depth measure with respect to the content stream. A user engagement score is calculated for each of the plurality pieces of content in the content stream based on the function.
1. A method implemented on at least one machine, each of which has at least one processor, storage, and a communication platform connected to a network for measuring user engagement, comprising the steps of: detecting user activities with respect to a plurality pieces of content in a content stream; obtaining a first depth measure with respect to the content stream based on the detected user activities; generating a function based on the first depth measure and a second depth measure with respect to the content stream; and calculating a user engagement score for each of the plurality pieces of content in the content stream based on the function. 2-3. (canceled) 4. The method of claim 1, wherein the user activities include at least one of scrolling through the content stream and abandoning the content stream. 5. The method of claim 1, wherein first depth measure is the maximum of: a number of pieces of content that can be simultaneously presented to a user; a first position of a piece of content in the content stream at which the user explicitly interacts with the piece of content; and a second position of a piece of content in the content stream at which the user abandons the content stream. 6. The method of claim 1, wherein the second depth measure includes a third position in the content stream that is at least one of: a position pre-determined based on a number of pieces of content that can be simultaneously presented to a user; and a position dynamically determined based on the detected user activities. 7. The method of claim 6, wherein the third position is a tipping point. 8. The method of claim 6, wherein the third position is dynamically determined based on an intent inferred from the detected user activities including a speed and/or acceleration of scrolling the content stream. 9. The method of claim 1, wherein the function is generated further based on at least one of a decay rate and a growth rate. 10. The method of claim 1, wherein the user engagement score for each of the plurality pieces of content in the content stream is calculated further based on a respective relative position of the piece of content in the content stream. 11. A system having at least one processor for measuring user engagement, the system comprising: a user activity detection module implemented on the at least one processor and configured to detect user activities with respect to a plurality pieces of content in a content stream; a stream depth calculation unit implemented on the at least one processor and configured to obtain a first depth measure with respect to the content stream based on the detected user activities; and a user engagement score calculation unit implemented on the at least one processor and configured to generate a function based on the first depth measure and a second depth measure with respect to the content stream, and calculate a user engagement score for each of the plurality pieces of content in the content stream based on the function. 12. The system of claim 11, wherein the user activities include at least one of scrolling through the content stream and abandoning the content stream. 13. The system of claim 11, wherein first depth measure is the maximum of: a number of pieces of content that can be simultaneously presented to a user; a first position of a piece of content in the content stream at which the user explicitly interacts with the piece of content; and a second position of a piece of content in the content stream at which the user abandons the content stream. 14. The system of claim 11, wherein the second depth measure includes a third position in the content stream that is at least one of: a position pre-determined based on a number of pieces of content that can be simultaneously presented to a user; and a position dynamically determined based on the detected user activities. 15. The system of claim 14, wherein the third position is a tipping point. 16. The system of claim 14, wherein the third position is dynamically determined based on an intent inferred from the detected user activities including a speed and/or acceleration of scrolling the content stream. 17. The system of claim 11, wherein the function is generated further based on at least one of a decay rate and a growth rate. 18. The system of claim 11, wherein the user engagement score for each of the plurality pieces of content in the content stream is calculated further based on a respective relative position of the piece of content in the content stream. 19. A non-transitory machine-readable medium having information recorded thereon for measuring user engagement, wherein the information, when read by the machine, causes the machine to perform the following: detecting user activities with respect to a plurality pieces of content in a content stream; obtaining a first depth measure with respect to the content stream based on the detected user activities; generating a function based on the first depth measure and a second depth measure with respect to the content stream; and calculating a user engagement score for each of the plurality pieces of content in the content stream based on the function. 20. The medium of claim 19, wherein the user activities include at least one of scrolling through the content stream and abandoning the content stream. 21. The medium of claim 19, wherein first depth measure is the maximum of: a number of pieces of content that can be simultaneously presented to the user, a first position of a piece of content in the content stream at which the user explicitly interacts with the piece of content, and a second position of a piece of content in the content stream at which the user abandons the content stream. 22. The medium of claim 19, wherein the second depth measure includes a third position in the content stream that is at least one of: a position pre-determined based on a number of pieces of content that can be simultaneously presented to a user; and a position dynamically determined based on the detected user activities.
Method, system, and programs for measuring user engagement. In one example, a type of user activities with respect to a plurality pieces of content in a content stream is detected. A first depth measure with respect to the content stream is obtained based on the detected type of user activities. A function is generated based on the first depth measure and a second depth measure with respect to the content stream. A user engagement score is calculated for each of the plurality pieces of content in the content stream based on the function.1. A method implemented on at least one machine, each of which has at least one processor, storage, and a communication platform connected to a network for measuring user engagement, comprising the steps of: detecting user activities with respect to a plurality pieces of content in a content stream; obtaining a first depth measure with respect to the content stream based on the detected user activities; generating a function based on the first depth measure and a second depth measure with respect to the content stream; and calculating a user engagement score for each of the plurality pieces of content in the content stream based on the function. 2-3. (canceled) 4. The method of claim 1, wherein the user activities include at least one of scrolling through the content stream and abandoning the content stream. 5. The method of claim 1, wherein first depth measure is the maximum of: a number of pieces of content that can be simultaneously presented to a user; a first position of a piece of content in the content stream at which the user explicitly interacts with the piece of content; and a second position of a piece of content in the content stream at which the user abandons the content stream. 6. The method of claim 1, wherein the second depth measure includes a third position in the content stream that is at least one of: a position pre-determined based on a number of pieces of content that can be simultaneously presented to a user; and a position dynamically determined based on the detected user activities. 7. The method of claim 6, wherein the third position is a tipping point. 8. The method of claim 6, wherein the third position is dynamically determined based on an intent inferred from the detected user activities including a speed and/or acceleration of scrolling the content stream. 9. The method of claim 1, wherein the function is generated further based on at least one of a decay rate and a growth rate. 10. The method of claim 1, wherein the user engagement score for each of the plurality pieces of content in the content stream is calculated further based on a respective relative position of the piece of content in the content stream. 11. A system having at least one processor for measuring user engagement, the system comprising: a user activity detection module implemented on the at least one processor and configured to detect user activities with respect to a plurality pieces of content in a content stream; a stream depth calculation unit implemented on the at least one processor and configured to obtain a first depth measure with respect to the content stream based on the detected user activities; and a user engagement score calculation unit implemented on the at least one processor and configured to generate a function based on the first depth measure and a second depth measure with respect to the content stream, and calculate a user engagement score for each of the plurality pieces of content in the content stream based on the function. 12. The system of claim 11, wherein the user activities include at least one of scrolling through the content stream and abandoning the content stream. 13. The system of claim 11, wherein first depth measure is the maximum of: a number of pieces of content that can be simultaneously presented to a user; a first position of a piece of content in the content stream at which the user explicitly interacts with the piece of content; and a second position of a piece of content in the content stream at which the user abandons the content stream. 14. The system of claim 11, wherein the second depth measure includes a third position in the content stream that is at least one of: a position pre-determined based on a number of pieces of content that can be simultaneously presented to a user; and a position dynamically determined based on the detected user activities. 15. The system of claim 14, wherein the third position is a tipping point. 16. The system of claim 14, wherein the third position is dynamically determined based on an intent inferred from the detected user activities including a speed and/or acceleration of scrolling the content stream. 17. The system of claim 11, wherein the function is generated further based on at least one of a decay rate and a growth rate. 18. The system of claim 11, wherein the user engagement score for each of the plurality pieces of content in the content stream is calculated further based on a respective relative position of the piece of content in the content stream. 19. A non-transitory machine-readable medium having information recorded thereon for measuring user engagement, wherein the information, when read by the machine, causes the machine to perform the following: detecting user activities with respect to a plurality pieces of content in a content stream; obtaining a first depth measure with respect to the content stream based on the detected user activities; generating a function based on the first depth measure and a second depth measure with respect to the content stream; and calculating a user engagement score for each of the plurality pieces of content in the content stream based on the function. 20. The medium of claim 19, wherein the user activities include at least one of scrolling through the content stream and abandoning the content stream. 21. The medium of claim 19, wherein first depth measure is the maximum of: a number of pieces of content that can be simultaneously presented to the user, a first position of a piece of content in the content stream at which the user explicitly interacts with the piece of content, and a second position of a piece of content in the content stream at which the user abandons the content stream. 22. The medium of claim 19, wherein the second depth measure includes a third position in the content stream that is at least one of: a position pre-determined based on a number of pieces of content that can be simultaneously presented to a user; and a position dynamically determined based on the detected user activities.
2,400
7,049
7,049
13,950,819
2,458
The invention is a system for posting personal messages to a display device for an unknown audience, whereby the communicator does not know who will view the personal message. Messages are sent directly to the communicator's display device over a network and are not contained or “housed” in a virtual (server) context. The communicator is able to post a message when not at the device's location by “texting” the device via a variety of possible input devices. The invention displays a new message by replacing the previous message (or as determined by configuration preferences). The invention includes user preferences, security, and low power options. User preferences affect how a message is displayed. Security features protect the system from displaying unauthorized messages. And the low-power option is a dual device configuration wherein the display operates on battery power receiving data from a relay that is powered by an external source.
1. A remotely changeable, non-virtual personal message board comprising: a display device capable of receiving and displaying at least one message for an unknown audience; and an input device in connection with said display device that is capable of remotely changing said message. 2. The remotely changeable, non-virtual personal message board of claim 1 wherein said input device is connected with said display device by means of a network. 3. The remotely changeable, non-virtual personal message board of claim 1 further including an electronic relay capable of receiving messages and retransmitting messages over a short wireless distance and said display device is capable of receiving short distance wireless transmissions of data, such that a message can be delivered to said display device via the network and relay via an implied wireless network. 4. The remotely changeable, non-virtual personal message board of claim 3 wherein said relay is directly addressable on a network. 5. The remotely changeable, non-virtual personal message board of claim 3 wherein said display device is capable of storing user preferences. 6. The remotely changeable, non-virtual personal message board of claim 3 wherein said relay is capable of storing user preferences. 7. The remotely changeable, non-virtual personal message board of claim 5 wherein said display device authenticates incoming data in accordance with the stored user preferences. 8. The remotely changeable, non-virtual personal message board of claim 6 wherein said relay authenticates incoming data in accordance with the stored user preferences. 9. A non-virtual, remotely changeable display device capable of receiving at least one text message and displaying said at least one text message to an unknown audience. 10. The display device of claim 9 wherein said display device is directly addressable on a network. 11. The display device of claim 9 wherein said display device is capable of storing user preferences. 12. The display device of claim 11 wherein said display device is capable of displaying said message in accordance with said stored user preferences. 13. A remotely changeable, non-virtual personal message board comprising: a display device capable of receiving and displaying at least one message for an unknown audience; an input device in connection with said display device that is capable of remotely changing said message, said connection including a server system that routes said at least one message from said input device to said display device. 14. The remotely changeable, non-virtual personal message board of claim 13 wherein said server system is capable of storing user preferences. 15. The remotely changeable, non-virtual personal message board of claim 14 wherein said server system is coupled to said display and routes said at least one message to said display via a network. 16. The remotely changeable, non-virtual personal message board of claim 14 wherein said display device is configured to periodically relay said user preferences to said server system so that a said at least one message can be displayed in accordance with said preferences. 17. The remotely changeable, non-virtual personal message board of claim 16 wherein said input device can be used by a user to update said at least one message as displayed on said display device such that an updated message can be displayed on said display device. 18. The remotely changeable, non-virtual personal message board of claim 17 wherein said server is capable of authenticating incoming messages in accordance with said stored user preferences and routes only those messages that are authenticated in accordance therewith. 19. The remotely changeable, non-virtual personal message board of claim 17 further including an electronic relay capable of receiving messages and retransmitting messages over a short wireless distance and said display device is capable of receiving short distance wireless transmissions of data, such that a message can be delivered to said display device via the network and relay via an implied wireless network. 20. The remotely changeable, non-virtual personal message board of claim 19 wherein said relay is directly addressable on a network. 21. The remotely changeable, non-virtual personal message board of claim 19 wherein said display device is capable of storing user preferences. 22. The remotely changeable, non-virtual personal message board of claim 19 wherein said relay is capable of storing user preferences. 23. The remotely changeable, non-virtual personal message board of claim 21 wherein said display device authenticates incoming data in accordance with the stored user preferences. 24. The remotely changeable, non-virtual personal message board of claim 22 wherein said relay authenticates incoming data in accordance with the stored user preferences. 25. A method for displaying a message that can be updated to an unknown audience, said method comprising: providing an electronic message board in a position to be viewed by at least one member of an unknown audience, inputting a message to said electronic message board using an input device connected to a network, and displaying said message on said electronic message board such that at least one member of said unknown audience can view said message. 26. The method of claim 25 further comprising alerting a user that the message has been displayed on said personal message board. 27. The method of claim 25 further comprising inputting an updated message to said electronic message board wherein said original may be updated by said updated message and displayed on said electronic message board. 28. The method of claim 25 further comprising authenticating said electronic message such that said message will be displayed on said electronic message board only if it is authorized. 29. The method of claim 27 further comprising authenticating said updated message such that said updated message will be displayed on said electronic message board only if it is authorized. 30. The method of claim 27 for the comprising alerting a user that the updated message has been displayed on said personal message board.
The invention is a system for posting personal messages to a display device for an unknown audience, whereby the communicator does not know who will view the personal message. Messages are sent directly to the communicator's display device over a network and are not contained or “housed” in a virtual (server) context. The communicator is able to post a message when not at the device's location by “texting” the device via a variety of possible input devices. The invention displays a new message by replacing the previous message (or as determined by configuration preferences). The invention includes user preferences, security, and low power options. User preferences affect how a message is displayed. Security features protect the system from displaying unauthorized messages. And the low-power option is a dual device configuration wherein the display operates on battery power receiving data from a relay that is powered by an external source.1. A remotely changeable, non-virtual personal message board comprising: a display device capable of receiving and displaying at least one message for an unknown audience; and an input device in connection with said display device that is capable of remotely changing said message. 2. The remotely changeable, non-virtual personal message board of claim 1 wherein said input device is connected with said display device by means of a network. 3. The remotely changeable, non-virtual personal message board of claim 1 further including an electronic relay capable of receiving messages and retransmitting messages over a short wireless distance and said display device is capable of receiving short distance wireless transmissions of data, such that a message can be delivered to said display device via the network and relay via an implied wireless network. 4. The remotely changeable, non-virtual personal message board of claim 3 wherein said relay is directly addressable on a network. 5. The remotely changeable, non-virtual personal message board of claim 3 wherein said display device is capable of storing user preferences. 6. The remotely changeable, non-virtual personal message board of claim 3 wherein said relay is capable of storing user preferences. 7. The remotely changeable, non-virtual personal message board of claim 5 wherein said display device authenticates incoming data in accordance with the stored user preferences. 8. The remotely changeable, non-virtual personal message board of claim 6 wherein said relay authenticates incoming data in accordance with the stored user preferences. 9. A non-virtual, remotely changeable display device capable of receiving at least one text message and displaying said at least one text message to an unknown audience. 10. The display device of claim 9 wherein said display device is directly addressable on a network. 11. The display device of claim 9 wherein said display device is capable of storing user preferences. 12. The display device of claim 11 wherein said display device is capable of displaying said message in accordance with said stored user preferences. 13. A remotely changeable, non-virtual personal message board comprising: a display device capable of receiving and displaying at least one message for an unknown audience; an input device in connection with said display device that is capable of remotely changing said message, said connection including a server system that routes said at least one message from said input device to said display device. 14. The remotely changeable, non-virtual personal message board of claim 13 wherein said server system is capable of storing user preferences. 15. The remotely changeable, non-virtual personal message board of claim 14 wherein said server system is coupled to said display and routes said at least one message to said display via a network. 16. The remotely changeable, non-virtual personal message board of claim 14 wherein said display device is configured to periodically relay said user preferences to said server system so that a said at least one message can be displayed in accordance with said preferences. 17. The remotely changeable, non-virtual personal message board of claim 16 wherein said input device can be used by a user to update said at least one message as displayed on said display device such that an updated message can be displayed on said display device. 18. The remotely changeable, non-virtual personal message board of claim 17 wherein said server is capable of authenticating incoming messages in accordance with said stored user preferences and routes only those messages that are authenticated in accordance therewith. 19. The remotely changeable, non-virtual personal message board of claim 17 further including an electronic relay capable of receiving messages and retransmitting messages over a short wireless distance and said display device is capable of receiving short distance wireless transmissions of data, such that a message can be delivered to said display device via the network and relay via an implied wireless network. 20. The remotely changeable, non-virtual personal message board of claim 19 wherein said relay is directly addressable on a network. 21. The remotely changeable, non-virtual personal message board of claim 19 wherein said display device is capable of storing user preferences. 22. The remotely changeable, non-virtual personal message board of claim 19 wherein said relay is capable of storing user preferences. 23. The remotely changeable, non-virtual personal message board of claim 21 wherein said display device authenticates incoming data in accordance with the stored user preferences. 24. The remotely changeable, non-virtual personal message board of claim 22 wherein said relay authenticates incoming data in accordance with the stored user preferences. 25. A method for displaying a message that can be updated to an unknown audience, said method comprising: providing an electronic message board in a position to be viewed by at least one member of an unknown audience, inputting a message to said electronic message board using an input device connected to a network, and displaying said message on said electronic message board such that at least one member of said unknown audience can view said message. 26. The method of claim 25 further comprising alerting a user that the message has been displayed on said personal message board. 27. The method of claim 25 further comprising inputting an updated message to said electronic message board wherein said original may be updated by said updated message and displayed on said electronic message board. 28. The method of claim 25 further comprising authenticating said electronic message such that said message will be displayed on said electronic message board only if it is authorized. 29. The method of claim 27 further comprising authenticating said updated message such that said updated message will be displayed on said electronic message board only if it is authorized. 30. The method of claim 27 for the comprising alerting a user that the updated message has been displayed on said personal message board.
2,400
7,050
7,050
13,148,730
2,416
Methods and apparatus provide acoustic detection for automated devices such as respiratory treatment apparatus. In some embodiments of the technology, acoustic analysis of noise or sound pulses, such as a cepstrum analysis, based on signals of a sound sensor ( 104 ) permits detection of obstruction (O) such as within a patient interface, mask or respiratory conduit ( 108 ) or within patient respiratory system. Some embodiments further permit detection of accessories such as an identification thereof or a condition of use thereof, such as a leak. Still further embodiments of the technology permit the detection of a patient or user who is intended to use the automated device.
1. A method for detecting a respiratory treatment conduit obstruction comprising: determining with a sound sensor a measure of sound of a flow generator within a respiratory treatment conduit; and analyzing the measure of sound from the sound sensor with a processor; and indicating with the processor a presence or absence of obstruction in the respiratory treatment conduit based on the analyzing. 2. The method of claim 1 wherein the analyzing comprises calculating a Fourier transform from data samples representing the measure of sound. 3. The method of claim 2 wherein the analyzing further comprises calculating a logarithm of the transformed data samples representing the measure of sound. 4. The method of claim 3 wherein the analyzing further comprises calculating an inverse transform of the logarithm of the transformed data samples representing the measure of sound. 5. The method of claim 4 wherein the analyzing further comprises calculating a difference between (a) the inverse transform of the logarithm of the transformed data samples representing the measure of sound and (b) an inverse transform of a logarithm of Fourier transformed data samples representing a sound measured from an unobstructed version of the respiratory treatment conduit. 6. The method of claim 5 wherein the indicating comprises displaying a graph of data based on the difference calculating. 7. The method of claim 6 further comprising detecting a location and extent of the presence of obstruction based on data of the difference calculating. 8. The method of claim 7 wherein the extent is determined from an amplitude value of a significant sample of the data of the difference calculating. 9. The method of claim 8 wherein the location is determined from a position of the significant sample in the data of the difference calculating. 10. The method of claim 9 wherein the respiratory treatment conduit comprises an endotracheal tube. 11. The method of claim 10 wherein the flow generator generates the sound within the respiratory treatment conduit by changing the flow generator speed, then generated sound being flow generator noise. 12. The method of claim 1 further comprising pre-measuring sound from an unobstructed version of the respiratory treatment conduit. 13. The method of claim 1 wherein the sound sensor is a single microphone. 14. An apparatus for detecting a respiratory treatment conduit obstruction comprising: a microphone adapted for coupling with a respiratory treatment conduit to generate a measure of sound of a flow generator within the respiratory treatment conduit; and a processor configured to analyze data samples of the measure of sound from the microphone, the processor being further configured to indicate a presence or absence of obstruction in the respiratory treatment conduit based on the analyzed data samples. 15. The apparatus of claim 14 wherein the microphone is adapted with an endotracheal tube coupler, the endotracheal tube coupler comprising an opening to connect with a portion of an endotracheal tube. 16. The apparatus of claim 15 wherein the endotracheal tube coupler further comprises an opening adapted to connect with a portion of a ventilator supply tube. 17. The apparatus of claim 15 wherein the endotracheal tube coupler further comprises a microphone chamber adapted with a membrane to separate the chamber from a gas channel of the coupler. 18. The apparatus of claim 17 wherein the endotracheal tube coupler further comprises a vent adapted to permit the microphone chamber to equalize with ambient pressure. 19. The apparatus of claim 14 further comprising the flow generator, wherein the processor is further configured to control the flow generator to generate a respiratory treatment. 20. The apparatus of claim 14 wherein the processor is configured to calculate a Fourier transform from data samples representing the measure of sound. 21. The apparatus of claim 20 wherein the processor is configured to analyze the data samples by calculating a logarithm of the transformed data samples representing the measure of sound. 22. The apparatus of claim 21 wherein the processor is configured to analyze the data samples by further calculating an inverse transform of the logarithm of the transformed data samples representing the measure of sound. 23. The apparatus of claim 22 wherein the processor is configured to analyze the data samples by further calculating a difference between (a) the inverse transform of the logarithm of the transformed data samples representing the measure of sound and (b) an inverse transform of a logarithm of Fourier transformed data samples representing a measure of sound measured from an unobstructed version of respiratory treatment conduit. 24. The apparatus of claim 23 wherein the processor is configured to indicate the presence of obstruction by displaying a graph of data based on the difference calculating. 25. The apparatus of claim 24 further wherein the processor is configured to detect a location and extent of the presence of obstruction based on data of the difference calculating. 26. The apparatus of claim 25 wherein the extent is determined from an amplitude of a significant sample of the data of the difference calculating. 27. The apparatus of claim 26 wherein the location is determined from a position of the significant sample in the data of the difference calculating. 28. The apparatus of claim 14 wherein the processor is further configured to pre-measure sound from an unobstructed version of the respiratory treatment conduit. 29. The apparatus of claim 14 wherein the respiratory treatment conduit comprises an endotracheal tube. 30. The apparatus of claim 14 wherein the flow generator generates the sound within the respiratory treatment conduit by changing the speed of the flow generator, the sound being flow generator noise. 31. An apparatus for detecting a respiratory treatment conduit obstruction comprising: a sound sensing means to generate a measure of sound of a flow generator within a respiratory treatment conduit; a controller means, coupled with the sound sensing means, the controller means for controlling a determination of a presence of obstruction in the respiratory treatment conduit by analyzing the measure of sound from the sound sensing means. 32. The apparatus of claim 31 further comprising an endotracheal tube coupling means for housing the sound sensing means and for connecting with a portion of an endotracheal tube and a portion of a ventilator supply tube. 33. The apparatus of claim 32 wherein the coupling means further comprises a membrane to separate a ventilator gas channel and the sound sensing means. 34. The apparatus of claim 33 wherein the coupling means further comprises a venting means for equalizing the sound sensing means with ambient pressure. 35. The apparatus of claim 31 further comprising the flow generator, wherein the controller means is further adapted for controlling the flow generator to generate a respiratory treatment. 36. The apparatus of claim 31 further comprising a respiratory treatment conduit, and wherein the respiratory treatment conduit comprises an endotracheal tube. 37. The apparatus of claim 31 further comprising a sound means for generating a sound within the respiratory treatment conduit, the sound means comprising a servo-controlled blower. 38. The apparatus of claim 31 wherein the sound sensing means comprises a single microphone. 39. A method for detecting a respiratory system obstruction comprising: determining with a sound sensor a measure of sound of a flow generator; and analyzing the measure of sound from the sound sensor with a processor by calculation of a cepstrum from the measure of sound; and indicating with the processor a presence or absence of obstruction in the respiratory system of a patient based on the analyzing. 40. The method of claim 39 further comprising detecting an extent of the presence of obstruction based on calculating a difference between the cepstrum from the measure of sound and a cepstrum determined from a prior measure of sound. 41. The method of claim 40 wherein the extent is determined from an amplitude value of a significant sample of the data of the difference calculating. 42. The method of claim 41 wherein a location is determined from a position of the significant sample in the data of the difference calculating, and wherein the position represents a point beyond a known end of a respiratory treatment conduit. 43. An apparatus for detecting a respiratory obstruction comprising: a microphone adapted for coupling with a respiratory treatment conduit to generate a measure of sound of a flow generator; and a processor configured to analyze data samples of the measure of sound from the microphone by calculation of a cepstrum with the data samples of the measure of sound, the processor being further configured to indicate a presence or absence of obstruction in the respiratory system of a patient based on the analyzed data samples. 44. The apparatus of claim 43 further comprising detecting an extent of the presence of obstruction based on calculating a difference between the cepstrum from the measure of sound and a cepstrum determined from a prior measure of sound. 45. The apparatus of claim 44 wherein the extent is determined from an amplitude value of a significant sample of the data of the difference calculating. 46. The apparatus of claim 45 wherein a location is determined from a position of the significant sample in the data of the difference calculating, and wherein the position represents a point beyond a known end of a respiratory treatment conduit. 47. The apparatus of claim 43 further comprising a flow generator, wherein the processor is further adapted for controlling the flow generator to generate a respiratory treatment. 48. A device for use with a flow generator that generates a supply of pressurized air to be provided at an outlet to a patient for treatment, wherein the device comprises: a patient interface attachable to the outlet of the flow generator; an emitter generating a first signal; a sensor to receive the first signal and a second signal reflected from the patient interface; and a controller that processes the first signal and reflected second signal, and wherein the controller detects the connection of a patient interface based on the processed reflected second signals. 49. The device of claim 48, wherein the first signal is either: an acoustic impulse or a continuous acoustic signal. 50. The device of claim 49, wherein the sensor is microphone, pressure sensor, or flow sensor. 51. The device of claim 50, wherein the controller processes the first and second signals by cepstrum analysis. 52. The device of claim 51, wherein the emitter is the flow generator. 53. The device of claim 52, wherein the patient interface includes: a mask and tubing. 54. The device of claim 53, wherein the sensor mounted or encapsulated in or proximal to outlet of flow generator. 55. The device of claim 54, wherein the sensor is: a microphone; pressure; or flow sensor. 56. The device of claim 55, wherein the controller transfers information about the patient interface to a computer. 57. The device of claim 56, wherein the sensor is positioned proximal to the outlet of the flow generator. 58. The device of claim 48 wherein the detection of the connection of a patient interface comprises an identification of a particular mask model. 59. The device of claim 48 wherein the detection of the connection of a patient interface comprises a detection of a leak associated with the patient interface. 60. A device for use with a flow generator that generates a supply of pressurized air to be provided at an outlet to a patient for treatment, wherein the device comprises: a patient interface attachable to the outlet of the flow generator; an emitter generating a first signal; a sensor to receive the first impulse and a second signal reflected from the patient interface; and a controller that processes the first and reflected second signals, and wherein the controller identifies the patient interface based on at least one feature of the reflected second signal being compared to at least one feature of set of predetermined acoustic signals. 61. A device for use with a flow generator that generates a supply of pressurized air to be provided at an outlet to a patient for treatment, wherein the device comprises: a patient interface attachable to the outlet of the flow generator; an emitter generating a first signal; a sensor to receive the first and a second signal reflected from the patient interface; and a controller that processes the impulse and reflected second signals, and wherein the controller identifies a fault in the patient interface based on at least one feature of the reflected second signal being compared at least one feature of set of predetermined acoustic signals. 62. A method for identifying patient interfaces adapted to connect a flow generator, wherein generates a supply of pressurized air from an outlet, wherein the method comprises: emitting an first signal in the airpath; detecting the first signal and a second signal reflected along the airpath; filtering signals to obtain the second signal; comparing second signal to an array of predetermined reflected signals of patient interfaces; and identifying a patient interface connected to the airpath based on a comparison of second signal to said array. 63. A method of identifying a type of mask connected to flow generator by characterizing the acoustic reflection of the mask. 64. A method for detecting or identifying characteristics in the airpath, wherein the method comprises: emitting an first signal in the airpath; detecting the first signal and a second signal reflected along the airpath; filtering signals to obtain the second signal; comparing second signal to an array of predetermined characteristics of airpaths; and identifying characteristics in the airpath based on a comparison of second signal to said array. 65. The method of claim 64, wherein the airpath includes a patient interface 66. The method of claim 64, wherein the airpath includes the respiratory system of a patient. 67. The method of claim 64, wherein the characteristics include one or more selected from the following group: restrictions in airpaths, airpath diameters, airpath lengths, and airpath occlusions. 68. The method of claim 64, wherein the method identifies characteristics of patient interface. 69. The method of claim 64, wherein the characteristics of patient interface are used to adjust a therapy parameter that controls setting of a flow generator. 70. An respiratory treatment apparatus comprising: a microphone adapted for coupling with a respiratory treatment conduit to generate a measure of sound from the conduit, the sound being generated noise of a flow generator; and a processor configured to analyze data samples of the measure of sound from the microphone by comparison of them with previously stored data samples representing a template, the processor being further configured to detect a system or patient characteristic from the comparison. 71. The apparatus of claim 70 wherein the analysis of data samples comprises a calculation of a cepstrum with the data samples of the measure of sound. 72. A method for authenticating a user of a device comprising: determining with a sound sensor a measure of sound of a sound generator within a sound conduit directed to an anatomical cavity of a user of a device; and analyzing the measure of sound from the sound sensor with a processor by calculation of a cepstrum from the measure of sound; and determining with the processor that the user is a pre-authorized user based on the analyzing. 73. The method of claim 72 wherein the determining comprises permitting an operation of the device. 74. The method of claim 72 wherein the sound generator comprises a speaker and the sound sensor comprises a microphone. 75. The method of claim 72 wherein the device comprises a respiratory treatment apparatus, the sound generator comprises a flow generator and the sound conduit comprises a respiratory supply tube. 76. The method of claim 72 wherein the analyzing comprises comparing data of the cepstrum with data of a prior cepstrum determined with a prior measure of sound from a setup process. 77. The method of claim 76 further comprising determining the prior measure of sound taken in a setup process. 78. An apparatus for authenticating a user comprising: a sound conduit adapted to direct an acoustic signal to an anatomical cavity of a user of the apparatus; a sound generator to generate the acoustic signal; a microphone adapted for coupling with the sound conduit to generate a measure of the acoustic signal; and a processor configured to analyze data samples of the measure of the acoustic signal from the microphone by calculation of a cepstrum with the data samples of the measure of sound, the processor being further configured to determine that the user is a pre-authorized user based on the analysis. 79. The apparatus of claim 78 wherein the processor is configured to permit an operation of the apparatus based on the determination. 80. The apparatus of claim 79 wherein the sound generator comprises a speaker. 81. The apparatus of claim 78 wherein the analysis of the processor comprises comparing data of the cepstrum with data of a prior cepstrum determined from a prior measure of sound taken in a setup process. 82. The apparatus of claim 81 wherein the processor is further configured to set the prior measure in a setup process. 83. The apparatus of claim 78 wherein the apparatus comprises a respiratory treatment apparatus, the sound generator comprises a servo-controlled blower and the sound conduit comprises a respiratory supply tube and mask or nasal cannula.
Methods and apparatus provide acoustic detection for automated devices such as respiratory treatment apparatus. In some embodiments of the technology, acoustic analysis of noise or sound pulses, such as a cepstrum analysis, based on signals of a sound sensor ( 104 ) permits detection of obstruction (O) such as within a patient interface, mask or respiratory conduit ( 108 ) or within patient respiratory system. Some embodiments further permit detection of accessories such as an identification thereof or a condition of use thereof, such as a leak. Still further embodiments of the technology permit the detection of a patient or user who is intended to use the automated device.1. A method for detecting a respiratory treatment conduit obstruction comprising: determining with a sound sensor a measure of sound of a flow generator within a respiratory treatment conduit; and analyzing the measure of sound from the sound sensor with a processor; and indicating with the processor a presence or absence of obstruction in the respiratory treatment conduit based on the analyzing. 2. The method of claim 1 wherein the analyzing comprises calculating a Fourier transform from data samples representing the measure of sound. 3. The method of claim 2 wherein the analyzing further comprises calculating a logarithm of the transformed data samples representing the measure of sound. 4. The method of claim 3 wherein the analyzing further comprises calculating an inverse transform of the logarithm of the transformed data samples representing the measure of sound. 5. The method of claim 4 wherein the analyzing further comprises calculating a difference between (a) the inverse transform of the logarithm of the transformed data samples representing the measure of sound and (b) an inverse transform of a logarithm of Fourier transformed data samples representing a sound measured from an unobstructed version of the respiratory treatment conduit. 6. The method of claim 5 wherein the indicating comprises displaying a graph of data based on the difference calculating. 7. The method of claim 6 further comprising detecting a location and extent of the presence of obstruction based on data of the difference calculating. 8. The method of claim 7 wherein the extent is determined from an amplitude value of a significant sample of the data of the difference calculating. 9. The method of claim 8 wherein the location is determined from a position of the significant sample in the data of the difference calculating. 10. The method of claim 9 wherein the respiratory treatment conduit comprises an endotracheal tube. 11. The method of claim 10 wherein the flow generator generates the sound within the respiratory treatment conduit by changing the flow generator speed, then generated sound being flow generator noise. 12. The method of claim 1 further comprising pre-measuring sound from an unobstructed version of the respiratory treatment conduit. 13. The method of claim 1 wherein the sound sensor is a single microphone. 14. An apparatus for detecting a respiratory treatment conduit obstruction comprising: a microphone adapted for coupling with a respiratory treatment conduit to generate a measure of sound of a flow generator within the respiratory treatment conduit; and a processor configured to analyze data samples of the measure of sound from the microphone, the processor being further configured to indicate a presence or absence of obstruction in the respiratory treatment conduit based on the analyzed data samples. 15. The apparatus of claim 14 wherein the microphone is adapted with an endotracheal tube coupler, the endotracheal tube coupler comprising an opening to connect with a portion of an endotracheal tube. 16. The apparatus of claim 15 wherein the endotracheal tube coupler further comprises an opening adapted to connect with a portion of a ventilator supply tube. 17. The apparatus of claim 15 wherein the endotracheal tube coupler further comprises a microphone chamber adapted with a membrane to separate the chamber from a gas channel of the coupler. 18. The apparatus of claim 17 wherein the endotracheal tube coupler further comprises a vent adapted to permit the microphone chamber to equalize with ambient pressure. 19. The apparatus of claim 14 further comprising the flow generator, wherein the processor is further configured to control the flow generator to generate a respiratory treatment. 20. The apparatus of claim 14 wherein the processor is configured to calculate a Fourier transform from data samples representing the measure of sound. 21. The apparatus of claim 20 wherein the processor is configured to analyze the data samples by calculating a logarithm of the transformed data samples representing the measure of sound. 22. The apparatus of claim 21 wherein the processor is configured to analyze the data samples by further calculating an inverse transform of the logarithm of the transformed data samples representing the measure of sound. 23. The apparatus of claim 22 wherein the processor is configured to analyze the data samples by further calculating a difference between (a) the inverse transform of the logarithm of the transformed data samples representing the measure of sound and (b) an inverse transform of a logarithm of Fourier transformed data samples representing a measure of sound measured from an unobstructed version of respiratory treatment conduit. 24. The apparatus of claim 23 wherein the processor is configured to indicate the presence of obstruction by displaying a graph of data based on the difference calculating. 25. The apparatus of claim 24 further wherein the processor is configured to detect a location and extent of the presence of obstruction based on data of the difference calculating. 26. The apparatus of claim 25 wherein the extent is determined from an amplitude of a significant sample of the data of the difference calculating. 27. The apparatus of claim 26 wherein the location is determined from a position of the significant sample in the data of the difference calculating. 28. The apparatus of claim 14 wherein the processor is further configured to pre-measure sound from an unobstructed version of the respiratory treatment conduit. 29. The apparatus of claim 14 wherein the respiratory treatment conduit comprises an endotracheal tube. 30. The apparatus of claim 14 wherein the flow generator generates the sound within the respiratory treatment conduit by changing the speed of the flow generator, the sound being flow generator noise. 31. An apparatus for detecting a respiratory treatment conduit obstruction comprising: a sound sensing means to generate a measure of sound of a flow generator within a respiratory treatment conduit; a controller means, coupled with the sound sensing means, the controller means for controlling a determination of a presence of obstruction in the respiratory treatment conduit by analyzing the measure of sound from the sound sensing means. 32. The apparatus of claim 31 further comprising an endotracheal tube coupling means for housing the sound sensing means and for connecting with a portion of an endotracheal tube and a portion of a ventilator supply tube. 33. The apparatus of claim 32 wherein the coupling means further comprises a membrane to separate a ventilator gas channel and the sound sensing means. 34. The apparatus of claim 33 wherein the coupling means further comprises a venting means for equalizing the sound sensing means with ambient pressure. 35. The apparatus of claim 31 further comprising the flow generator, wherein the controller means is further adapted for controlling the flow generator to generate a respiratory treatment. 36. The apparatus of claim 31 further comprising a respiratory treatment conduit, and wherein the respiratory treatment conduit comprises an endotracheal tube. 37. The apparatus of claim 31 further comprising a sound means for generating a sound within the respiratory treatment conduit, the sound means comprising a servo-controlled blower. 38. The apparatus of claim 31 wherein the sound sensing means comprises a single microphone. 39. A method for detecting a respiratory system obstruction comprising: determining with a sound sensor a measure of sound of a flow generator; and analyzing the measure of sound from the sound sensor with a processor by calculation of a cepstrum from the measure of sound; and indicating with the processor a presence or absence of obstruction in the respiratory system of a patient based on the analyzing. 40. The method of claim 39 further comprising detecting an extent of the presence of obstruction based on calculating a difference between the cepstrum from the measure of sound and a cepstrum determined from a prior measure of sound. 41. The method of claim 40 wherein the extent is determined from an amplitude value of a significant sample of the data of the difference calculating. 42. The method of claim 41 wherein a location is determined from a position of the significant sample in the data of the difference calculating, and wherein the position represents a point beyond a known end of a respiratory treatment conduit. 43. An apparatus for detecting a respiratory obstruction comprising: a microphone adapted for coupling with a respiratory treatment conduit to generate a measure of sound of a flow generator; and a processor configured to analyze data samples of the measure of sound from the microphone by calculation of a cepstrum with the data samples of the measure of sound, the processor being further configured to indicate a presence or absence of obstruction in the respiratory system of a patient based on the analyzed data samples. 44. The apparatus of claim 43 further comprising detecting an extent of the presence of obstruction based on calculating a difference between the cepstrum from the measure of sound and a cepstrum determined from a prior measure of sound. 45. The apparatus of claim 44 wherein the extent is determined from an amplitude value of a significant sample of the data of the difference calculating. 46. The apparatus of claim 45 wherein a location is determined from a position of the significant sample in the data of the difference calculating, and wherein the position represents a point beyond a known end of a respiratory treatment conduit. 47. The apparatus of claim 43 further comprising a flow generator, wherein the processor is further adapted for controlling the flow generator to generate a respiratory treatment. 48. A device for use with a flow generator that generates a supply of pressurized air to be provided at an outlet to a patient for treatment, wherein the device comprises: a patient interface attachable to the outlet of the flow generator; an emitter generating a first signal; a sensor to receive the first signal and a second signal reflected from the patient interface; and a controller that processes the first signal and reflected second signal, and wherein the controller detects the connection of a patient interface based on the processed reflected second signals. 49. The device of claim 48, wherein the first signal is either: an acoustic impulse or a continuous acoustic signal. 50. The device of claim 49, wherein the sensor is microphone, pressure sensor, or flow sensor. 51. The device of claim 50, wherein the controller processes the first and second signals by cepstrum analysis. 52. The device of claim 51, wherein the emitter is the flow generator. 53. The device of claim 52, wherein the patient interface includes: a mask and tubing. 54. The device of claim 53, wherein the sensor mounted or encapsulated in or proximal to outlet of flow generator. 55. The device of claim 54, wherein the sensor is: a microphone; pressure; or flow sensor. 56. The device of claim 55, wherein the controller transfers information about the patient interface to a computer. 57. The device of claim 56, wherein the sensor is positioned proximal to the outlet of the flow generator. 58. The device of claim 48 wherein the detection of the connection of a patient interface comprises an identification of a particular mask model. 59. The device of claim 48 wherein the detection of the connection of a patient interface comprises a detection of a leak associated with the patient interface. 60. A device for use with a flow generator that generates a supply of pressurized air to be provided at an outlet to a patient for treatment, wherein the device comprises: a patient interface attachable to the outlet of the flow generator; an emitter generating a first signal; a sensor to receive the first impulse and a second signal reflected from the patient interface; and a controller that processes the first and reflected second signals, and wherein the controller identifies the patient interface based on at least one feature of the reflected second signal being compared to at least one feature of set of predetermined acoustic signals. 61. A device for use with a flow generator that generates a supply of pressurized air to be provided at an outlet to a patient for treatment, wherein the device comprises: a patient interface attachable to the outlet of the flow generator; an emitter generating a first signal; a sensor to receive the first and a second signal reflected from the patient interface; and a controller that processes the impulse and reflected second signals, and wherein the controller identifies a fault in the patient interface based on at least one feature of the reflected second signal being compared at least one feature of set of predetermined acoustic signals. 62. A method for identifying patient interfaces adapted to connect a flow generator, wherein generates a supply of pressurized air from an outlet, wherein the method comprises: emitting an first signal in the airpath; detecting the first signal and a second signal reflected along the airpath; filtering signals to obtain the second signal; comparing second signal to an array of predetermined reflected signals of patient interfaces; and identifying a patient interface connected to the airpath based on a comparison of second signal to said array. 63. A method of identifying a type of mask connected to flow generator by characterizing the acoustic reflection of the mask. 64. A method for detecting or identifying characteristics in the airpath, wherein the method comprises: emitting an first signal in the airpath; detecting the first signal and a second signal reflected along the airpath; filtering signals to obtain the second signal; comparing second signal to an array of predetermined characteristics of airpaths; and identifying characteristics in the airpath based on a comparison of second signal to said array. 65. The method of claim 64, wherein the airpath includes a patient interface 66. The method of claim 64, wherein the airpath includes the respiratory system of a patient. 67. The method of claim 64, wherein the characteristics include one or more selected from the following group: restrictions in airpaths, airpath diameters, airpath lengths, and airpath occlusions. 68. The method of claim 64, wherein the method identifies characteristics of patient interface. 69. The method of claim 64, wherein the characteristics of patient interface are used to adjust a therapy parameter that controls setting of a flow generator. 70. An respiratory treatment apparatus comprising: a microphone adapted for coupling with a respiratory treatment conduit to generate a measure of sound from the conduit, the sound being generated noise of a flow generator; and a processor configured to analyze data samples of the measure of sound from the microphone by comparison of them with previously stored data samples representing a template, the processor being further configured to detect a system or patient characteristic from the comparison. 71. The apparatus of claim 70 wherein the analysis of data samples comprises a calculation of a cepstrum with the data samples of the measure of sound. 72. A method for authenticating a user of a device comprising: determining with a sound sensor a measure of sound of a sound generator within a sound conduit directed to an anatomical cavity of a user of a device; and analyzing the measure of sound from the sound sensor with a processor by calculation of a cepstrum from the measure of sound; and determining with the processor that the user is a pre-authorized user based on the analyzing. 73. The method of claim 72 wherein the determining comprises permitting an operation of the device. 74. The method of claim 72 wherein the sound generator comprises a speaker and the sound sensor comprises a microphone. 75. The method of claim 72 wherein the device comprises a respiratory treatment apparatus, the sound generator comprises a flow generator and the sound conduit comprises a respiratory supply tube. 76. The method of claim 72 wherein the analyzing comprises comparing data of the cepstrum with data of a prior cepstrum determined with a prior measure of sound from a setup process. 77. The method of claim 76 further comprising determining the prior measure of sound taken in a setup process. 78. An apparatus for authenticating a user comprising: a sound conduit adapted to direct an acoustic signal to an anatomical cavity of a user of the apparatus; a sound generator to generate the acoustic signal; a microphone adapted for coupling with the sound conduit to generate a measure of the acoustic signal; and a processor configured to analyze data samples of the measure of the acoustic signal from the microphone by calculation of a cepstrum with the data samples of the measure of sound, the processor being further configured to determine that the user is a pre-authorized user based on the analysis. 79. The apparatus of claim 78 wherein the processor is configured to permit an operation of the apparatus based on the determination. 80. The apparatus of claim 79 wherein the sound generator comprises a speaker. 81. The apparatus of claim 78 wherein the analysis of the processor comprises comparing data of the cepstrum with data of a prior cepstrum determined from a prior measure of sound taken in a setup process. 82. The apparatus of claim 81 wherein the processor is further configured to set the prior measure in a setup process. 83. The apparatus of claim 78 wherein the apparatus comprises a respiratory treatment apparatus, the sound generator comprises a servo-controlled blower and the sound conduit comprises a respiratory supply tube and mask or nasal cannula.
2,400
7,051
7,051
14,986,504
2,484
In general, embodiments of the invention include methods and apparatuses for securing otherwise unsecured computer audio and video subsystems. Embodiments of the invention perform watermarking of video and/or audio data streams output by a computer system. Additional security features that are included in embodiments of the invention include fingerprinting, snooping, capturing streams for local or remote analytics or archiving, and mixing of secure system content with local audio and video content.
1. A computing device comprising: a host processor subsystem including a CPU and a video subsystem for producing a video output for playback and display on an associated video output device, wherein the video output includes first and second different streams produced by an operating system and application software running on the CPU of the host processor subsystem; and a secure subsystem that receives the video output from the host processor subsystem and controls an actual playback and display of the video output on the associated video output device, wherein the control includes selectively passing the first stream from the host processor to the video output device unchanged, and performing processing on content of the second stream before passing the second stream to the video output device, and wherein the video output further includes video data produced by an associated video input device, and wherein the secure subsystem performs analytics on the video data produced by the associated video input device and output from the host processing subsystem, and wherein the analytics comprise a biometric authentication application. 2. A computing device according to claim 1, wherein the associated video input device comprises a video camera. 3. A computing device according to claim 1, wherein the biometric authentication application comprises face recognition. 4. A computing device according to claim 1, wherein the biometric authentication application comprises retina scans. 5. A computing device according to claim 1, wherein the secure subsystem is implemented by one of a FPGA and ASIC that is separate from the host processor subsystem. 6. A computing device comprising: a host processor subsystem including a CPU and a video subsystem for producing a video output for playback and display on an associated video output device, wherein the video output includes first and second different streams produced by an operating system and application software running on the CPU of the host processor subsystem; and a secure subsystem that receives the video output from the host processor subsystem and controls an actual playback and display of the video output on the associated video output device, wherein the control includes selectively passing the first stream from the host processor to the video output device unchanged, and performing processing on content of the second stream before passing the second stream to the video output device, and wherein the video output further includes video data produced by an associated video input device, and wherein the secure subsystem performs analytics on the video data produced by the associated video input device and output from the host processing subsystem, and wherein the analytics comprise one or more of motion detection, image tracking and scene recognition. 7. A computing device according to claim 6, wherein the associated video input device comprises a video camera. 8. A computing device according to claim 6, wherein the secure subsystem is implemented by one of a FPGA and ASIC that is separate from the host processor subsystem. 9. A method comprising: producing, by a host processor subsystem including a CPU and an audio and video subsystem, audio and video outputs for playback and display on associated audio and video output devices, wherein the audio and video outputs include first and second different streams produced by an operating system and application software running on the CPU of the host processor subsystem; and controlling, by a secure audio and video subsystem that receives the audio and video outputs from the host processor subsystem, an actual playback and display of the audio and video outputs on the associated audio and video output devices, wherein controlling includes passing the first stream from the host processor to one or both of the audio and video output devices unchanged, and performing processing on the content of the second stream before passing the second stream to one or both of the audio and video output devices, and wherein the audio and video outputs further include one or both of audio and video data produced by associated audio and video input devices, respectively, and wherein the associated audio and video input devices include one or more of a microphone, a still camera, a video camera, and an audio Line- In, and wherein performing processing includes performing analytics on one or more of the audio and video outputs from the host processing subsystem, and wherein the analytics comprise a biometric authentication application, and wherein performing processing further includes performing video overly of one or more video streams not produced by the host processor subsystem in the actual display and playback. 10. A method according to claim 9, further comprising receiving, by a networking block coupled to the secure audio and video subsystem, configuration information that specifies how to control the actual display and playback of the first and second different streams from a remote management system. 11. A method according to claim 9, wherein at least one of the one or more video streams is received by the secure audio and video subsystem from a remote management system. 12. A method according to claim 11, wherein the at least one of the one or more video streams is associated with a video conferencing application. 13. A method according to claim 9, wherein performing processing further includes adding watermarking to one or both of the audio and video outputs from the host processor subsystem before the actual display and playback. 14. A method according to claim 13, wherein the watermarking is not perceptible to a person viewing and/or listening to the actual display and playback. 15. A method according to claim 9, wherein the analytics further include one or more of OCR, application recognition, motion detection, image recognition, image tracking and scene recognition. 16. A method according to claim 9, further comprising, by the secure audio and video subsystem, encoding one or more of the audio and video outputs and sending the encoded one or more outputs to a remote system. 17. A method according to claim 16, wherein the encoding includes compression of the one or more audio and video outputs. 18. A method according to claim 16, wherein the remote system includes one or more of a remote assistance application, a video surveillance application, a desktop sharing application and a desktop recording application.
In general, embodiments of the invention include methods and apparatuses for securing otherwise unsecured computer audio and video subsystems. Embodiments of the invention perform watermarking of video and/or audio data streams output by a computer system. Additional security features that are included in embodiments of the invention include fingerprinting, snooping, capturing streams for local or remote analytics or archiving, and mixing of secure system content with local audio and video content.1. A computing device comprising: a host processor subsystem including a CPU and a video subsystem for producing a video output for playback and display on an associated video output device, wherein the video output includes first and second different streams produced by an operating system and application software running on the CPU of the host processor subsystem; and a secure subsystem that receives the video output from the host processor subsystem and controls an actual playback and display of the video output on the associated video output device, wherein the control includes selectively passing the first stream from the host processor to the video output device unchanged, and performing processing on content of the second stream before passing the second stream to the video output device, and wherein the video output further includes video data produced by an associated video input device, and wherein the secure subsystem performs analytics on the video data produced by the associated video input device and output from the host processing subsystem, and wherein the analytics comprise a biometric authentication application. 2. A computing device according to claim 1, wherein the associated video input device comprises a video camera. 3. A computing device according to claim 1, wherein the biometric authentication application comprises face recognition. 4. A computing device according to claim 1, wherein the biometric authentication application comprises retina scans. 5. A computing device according to claim 1, wherein the secure subsystem is implemented by one of a FPGA and ASIC that is separate from the host processor subsystem. 6. A computing device comprising: a host processor subsystem including a CPU and a video subsystem for producing a video output for playback and display on an associated video output device, wherein the video output includes first and second different streams produced by an operating system and application software running on the CPU of the host processor subsystem; and a secure subsystem that receives the video output from the host processor subsystem and controls an actual playback and display of the video output on the associated video output device, wherein the control includes selectively passing the first stream from the host processor to the video output device unchanged, and performing processing on content of the second stream before passing the second stream to the video output device, and wherein the video output further includes video data produced by an associated video input device, and wherein the secure subsystem performs analytics on the video data produced by the associated video input device and output from the host processing subsystem, and wherein the analytics comprise one or more of motion detection, image tracking and scene recognition. 7. A computing device according to claim 6, wherein the associated video input device comprises a video camera. 8. A computing device according to claim 6, wherein the secure subsystem is implemented by one of a FPGA and ASIC that is separate from the host processor subsystem. 9. A method comprising: producing, by a host processor subsystem including a CPU and an audio and video subsystem, audio and video outputs for playback and display on associated audio and video output devices, wherein the audio and video outputs include first and second different streams produced by an operating system and application software running on the CPU of the host processor subsystem; and controlling, by a secure audio and video subsystem that receives the audio and video outputs from the host processor subsystem, an actual playback and display of the audio and video outputs on the associated audio and video output devices, wherein controlling includes passing the first stream from the host processor to one or both of the audio and video output devices unchanged, and performing processing on the content of the second stream before passing the second stream to one or both of the audio and video output devices, and wherein the audio and video outputs further include one or both of audio and video data produced by associated audio and video input devices, respectively, and wherein the associated audio and video input devices include one or more of a microphone, a still camera, a video camera, and an audio Line- In, and wherein performing processing includes performing analytics on one or more of the audio and video outputs from the host processing subsystem, and wherein the analytics comprise a biometric authentication application, and wherein performing processing further includes performing video overly of one or more video streams not produced by the host processor subsystem in the actual display and playback. 10. A method according to claim 9, further comprising receiving, by a networking block coupled to the secure audio and video subsystem, configuration information that specifies how to control the actual display and playback of the first and second different streams from a remote management system. 11. A method according to claim 9, wherein at least one of the one or more video streams is received by the secure audio and video subsystem from a remote management system. 12. A method according to claim 11, wherein the at least one of the one or more video streams is associated with a video conferencing application. 13. A method according to claim 9, wherein performing processing further includes adding watermarking to one or both of the audio and video outputs from the host processor subsystem before the actual display and playback. 14. A method according to claim 13, wherein the watermarking is not perceptible to a person viewing and/or listening to the actual display and playback. 15. A method according to claim 9, wherein the analytics further include one or more of OCR, application recognition, motion detection, image recognition, image tracking and scene recognition. 16. A method according to claim 9, further comprising, by the secure audio and video subsystem, encoding one or more of the audio and video outputs and sending the encoded one or more outputs to a remote system. 17. A method according to claim 16, wherein the encoding includes compression of the one or more audio and video outputs. 18. A method according to claim 16, wherein the remote system includes one or more of a remote assistance application, a video surveillance application, a desktop sharing application and a desktop recording application.
2,400
7,052
7,052
13,924,464
2,486
The subject disclosure is directed towards stereo matching based upon active illumination, including using a patch in a non-actively illuminated image to obtain weights that are used in patch similarity determinations in actively illuminated stereo images. To correlate pixels in actively illuminated stereo images, adaptive support weights computations may be used to determine similarity of patches corresponding to the pixels. In order to obtain meaningful adaptive support weights for the adaptive support weights computations, weights are obtained by processing a non-actively illuminated (“clean”) image.
1. A method comprising: processing a plurality of images, including actively illuminated stereo images, and a non-actively illuminated image; determining weights for a patch in the non-actively illuminated image that corresponds to patches in the actively illuminated stereo images, in which each of the patches is based upon a reference pixel in one of the images; and using the support weights to determine a similarity score between the corresponding patches in the actively illuminated stereo images. 2. The method of claim 1 wherein the images are of a scene actively illuminated with infrared (IR) light, and wherein capturing the non-actively illuminated image includes capturing the scene as a visible spectrum image. 3. The method of claim 1 wherein the images are of a scene actively illuminated with visible spectrum light, and wherein capturing the non-actively illuminated image includes capturing the scene as an infrared image. 4. The method of claim 1 wherein the images are of a scene actively illuminated with infrared light in a part of the infrared spectrum, and wherein capturing the non-actively illuminated image includes using a notch filter to capture the scene with the part of the spectrum that contains the active illumination removed. 5. The method of claim 1 wherein capturing the plurality of images comprises capturing one actively illuminated stereo image and the non-actively illuminated image active via same optical path. 6. The method of claim 1 wherein capturing the plurality of images comprises using one camera to capture the actively illuminated stereo image in one frame and to capture the non-actively illuminated image in another frame. 7. The method of claim 1 further comprising, selecting the reference pixel from the non-actively illuminated image. 8. A system comprising, an image processing component comprising a matching algorithm coupled to an image capturing component that captures a plurality of images including actively illuminated stereo images, and a non-actively illuminated image, the image processing component configured to process the plurality of images including via the matching algorithm, the matching algorithm configured to process a patch in the non-actively illuminated image to determine weights corresponding to pixels in the patch, and to use the weights to determine similarity between corresponding patches in the actively illuminated images. 9. The system of claim 8 wherein the matching algorithm linearly scans pixels in at least one of the actively illuminated images to look for matching pixels based upon patch similarity. 10. The system of claim 8 wherein the matching algorithm is further configured to determine matching pixel data, and wherein the matching algorithm is coupled to or incorporates a depth processing algorithm that processes the matching pixel data to generate a depth map. 11. The system of claim 8 wherein the actively illuminated stereo images comprise infrared (IR) images, and wherein the non-actively illuminated image comprises a red, green and blue (RGB) image. 12. The system of claim 8 wherein the actively illuminated stereo images comprise RGB images, and wherein the non-actively illuminated image comprises an IR image. 13. The system of claim 8 wherein the actively illuminated stereo images comprise IR images, and wherein the non-actively illuminated image comprises an IR image filtered with a notch filter that removed active illumination. 14. The system of claim 8 wherein the image capturing component comprises a device including a plurality of cameras and an active illumination projector. 15. The system of claim 8 wherein the matching algorithm uses the weights to determine similarity via an adaptive support weights algorithm. 16. The system of claim 8 wherein the image capturing component includes two cameras that share an optical path via reflection, wherein one of the two cameras captures one of the actively illuminated stereo images, and the other of the two cameras captures the non-actively illuminated stereo image. 17. The system of claim 8 wherein the image capturing component includes one camera that captures one of the actively illuminated stereo images and the non-actively illuminated stereo image. 18. The system of claim 17 wherein the camera includes a splitter mechanism configured to split incoming light into one of the actively illuminated stereo images and the non-actively illuminated stereo image. 19. The system of claim 17 wherein the camera includes a Bayer pattern on sensed pixels to receive light that includes the active illumination on one subset of pixels and receive light that does not include the active illumination on another subset of pixels. 20. One or more computer-readable storage media or logic having executable instructions, which when executed perform steps, comprising receiving actively illuminated stereo infrared (IR) images, receiving a non-actively illuminated image, obtaining adaptive support weights for a patch in the non-actively illuminated image, and using the adaptive support weights in an active support weights computation to determine similarity of corresponding patches in the actively illuminated stereo IR images.
The subject disclosure is directed towards stereo matching based upon active illumination, including using a patch in a non-actively illuminated image to obtain weights that are used in patch similarity determinations in actively illuminated stereo images. To correlate pixels in actively illuminated stereo images, adaptive support weights computations may be used to determine similarity of patches corresponding to the pixels. In order to obtain meaningful adaptive support weights for the adaptive support weights computations, weights are obtained by processing a non-actively illuminated (“clean”) image.1. A method comprising: processing a plurality of images, including actively illuminated stereo images, and a non-actively illuminated image; determining weights for a patch in the non-actively illuminated image that corresponds to patches in the actively illuminated stereo images, in which each of the patches is based upon a reference pixel in one of the images; and using the support weights to determine a similarity score between the corresponding patches in the actively illuminated stereo images. 2. The method of claim 1 wherein the images are of a scene actively illuminated with infrared (IR) light, and wherein capturing the non-actively illuminated image includes capturing the scene as a visible spectrum image. 3. The method of claim 1 wherein the images are of a scene actively illuminated with visible spectrum light, and wherein capturing the non-actively illuminated image includes capturing the scene as an infrared image. 4. The method of claim 1 wherein the images are of a scene actively illuminated with infrared light in a part of the infrared spectrum, and wherein capturing the non-actively illuminated image includes using a notch filter to capture the scene with the part of the spectrum that contains the active illumination removed. 5. The method of claim 1 wherein capturing the plurality of images comprises capturing one actively illuminated stereo image and the non-actively illuminated image active via same optical path. 6. The method of claim 1 wherein capturing the plurality of images comprises using one camera to capture the actively illuminated stereo image in one frame and to capture the non-actively illuminated image in another frame. 7. The method of claim 1 further comprising, selecting the reference pixel from the non-actively illuminated image. 8. A system comprising, an image processing component comprising a matching algorithm coupled to an image capturing component that captures a plurality of images including actively illuminated stereo images, and a non-actively illuminated image, the image processing component configured to process the plurality of images including via the matching algorithm, the matching algorithm configured to process a patch in the non-actively illuminated image to determine weights corresponding to pixels in the patch, and to use the weights to determine similarity between corresponding patches in the actively illuminated images. 9. The system of claim 8 wherein the matching algorithm linearly scans pixels in at least one of the actively illuminated images to look for matching pixels based upon patch similarity. 10. The system of claim 8 wherein the matching algorithm is further configured to determine matching pixel data, and wherein the matching algorithm is coupled to or incorporates a depth processing algorithm that processes the matching pixel data to generate a depth map. 11. The system of claim 8 wherein the actively illuminated stereo images comprise infrared (IR) images, and wherein the non-actively illuminated image comprises a red, green and blue (RGB) image. 12. The system of claim 8 wherein the actively illuminated stereo images comprise RGB images, and wherein the non-actively illuminated image comprises an IR image. 13. The system of claim 8 wherein the actively illuminated stereo images comprise IR images, and wherein the non-actively illuminated image comprises an IR image filtered with a notch filter that removed active illumination. 14. The system of claim 8 wherein the image capturing component comprises a device including a plurality of cameras and an active illumination projector. 15. The system of claim 8 wherein the matching algorithm uses the weights to determine similarity via an adaptive support weights algorithm. 16. The system of claim 8 wherein the image capturing component includes two cameras that share an optical path via reflection, wherein one of the two cameras captures one of the actively illuminated stereo images, and the other of the two cameras captures the non-actively illuminated stereo image. 17. The system of claim 8 wherein the image capturing component includes one camera that captures one of the actively illuminated stereo images and the non-actively illuminated stereo image. 18. The system of claim 17 wherein the camera includes a splitter mechanism configured to split incoming light into one of the actively illuminated stereo images and the non-actively illuminated stereo image. 19. The system of claim 17 wherein the camera includes a Bayer pattern on sensed pixels to receive light that includes the active illumination on one subset of pixels and receive light that does not include the active illumination on another subset of pixels. 20. One or more computer-readable storage media or logic having executable instructions, which when executed perform steps, comprising receiving actively illuminated stereo infrared (IR) images, receiving a non-actively illuminated image, obtaining adaptive support weights for a patch in the non-actively illuminated image, and using the adaptive support weights in an active support weights computation to determine similarity of corresponding patches in the actively illuminated stereo IR images.
2,400
7,053
7,053
13,806,071
2,465
The present invention concern methods and apparatuses for transporting and using time zone information in an internet protocol multimedia subsystem, IMS, network. When a call session control function, CSCF, node receives a request message related to a user equipment, UE, the CSCF node retrieves and stores time zone information associated with the UE. The time zone information is sent by the CSCF node to at least one other IMS network node, which is then able to support time zone based services and/or charging associated with the UE. The CSCF node may optionally create an Attribute Value Pair, AVP, including the stored time zone information and send a charging message including the AVP to a charging node, to enable usage of the time zone information in charging.
1. A method in a call session control function, CSCF, node for handling time zone information in an internet protocol multimedia subsystem. IMS, network, the method comprising: receiving a request message related to a user equipment, UE; retrieving time zone information in response to reception of said request message, wherein said time zone information specifies a time zone associated with the UE; storing the time zone information in a memory unit of the CSCF node; and, sending at least one message, including the time zone information, to at least one other IMS network node, to enable said at least one other IMS network node to support time zone based services and/or charging associated with the UE. 2. The method according to claim 1, wherein the time zone information comprises User Current Time Zone information that specifies the time zone of a currently visited network of the UE. 3. The method according to claim 1, wherein the time zone information comprises User Home Time Zone information that specifies a home time zone of a user subscription associated with the UE. 4. The method according to claim 1, wherein the CSCF node is a proxy call session control function, P-CSCF, node, the UE is connected to a mobile access network, and the time zone information is retrieved from a policy control and charging rules function, PCRF, node, which stores time zone information received from the mobile access network to which the UE is connected. 5. The method according to claim 4, further comprising: receiving updated time zone information from the PCRF node, when the time zone information, which is stored in the PCRF node and associated with the UE, has changed. 6. The method according to claim 1, wherein the CSCF node is a proxy call session control function, P-CSCF, node, the UE is connected to a fixed access network, and the time zone information of the fixed access network is preconfigured into the P-CSCF node, such that the step of retrieving includes retrieving the time zone information from configuration information of the P-CSCF node. 7. The method according to claim 1, wherein the CSCF node is a serving call session control function, S-CSCF, node, the request message is a registration request message, related to registration of the UE in the IMS network, and received from a proxy call session control function, P-CSCF, node, and the time zone information is retrieved from the received request message. 8. The method according to claim 1, wherein the CSCF node is a serving call session control function, S-CSCF, node, the request message is a terminating request message related to a session to be terminated in the UE, or an originating request message related to a session to be originated from the UE, and the step of retrieving the time zone information includes retrieving the time zone information from stored information in the memory unit of the S-CSCF node or from the originating request message 902). 9. The method according to claim 1, wherein the CSCF node is a serving call session control function, S-CSCF, node, and the time zone information is retrieved from a home subscriber server, HSS, node. 10. The method according to claim 1, wherein the time zone information is included in a p-charging-vector header field of the received request message and/or sent message. 11. The method according to claim 1, further comprising: creating an Attribute Value Pair, AVP, including the stored time zone information, sending a charging message including said AVP to a charging node, to enable usage of the time zone information in charging. 12. A method in a home subscriber server, HSS, node for handling time zone information in an internet protocol multimedia subsystem, IMS, network, the method comprising: receiving, from a serving call session control function, S-CSCF, node, a request message related to a registration of a user equipment, UE, in said IMS network; requesting, from a mobile packet core network associated with a mobile access network to which the UE is connected, time zone information that specifies a time zone associated with the UE, receiving the requested information; storing the time zone information in a memory unit of the HSS node; and, sending a response message, to the S-CSCF node, including the time zone information, to enable the S-CSCF node, to support time zone based services and/or charging associated with the UE. 13. The method according to claim 12, wherein the time zone information comprises User Current Time Zone information that specifies the time zone of a currently visited network of the UE. 14. The method according to claim 12, further comprising: receiving updated time zone information from the mobile packet core network associated with the mobile access network to which the UE is connected, when the time zone information has changed, and sending the updated time zone information to the S-CSCF node. 15. The method according to claim 12, wherein the HSS node is preconfigured with User Home Time Zone information that specifies the time zone of a predefined home network associated with the UE, and the User Home Time Zone information is included in the response message sent to the S-CSCF node. 16. A call session control function, CSCF, node for handling time zone information in an internet protocol multimedia subsystem, IMS, network, the CSCF node comprising: a receiver, a transmitter, a memory unit and processing logic, the processing logic being connected to the receiver, to the transmitter and to the memory unit, wherein the receiver is configured to receive a request message related to a user equipment, UE; the processing logic comprises retrieving logic configured to retrieve time zone information in response to reception of said request message, wherein said time zone information specifies a time zone associated with the UE; the processing logic is further configured to store the time zone information in the memory unit of the CSCF node; and the transmitter is configured to send at least one message, including the time zone information, to at least one other IMS network node, to enable said at least one other IMS network node to support time zone based services and/or charging associated with the UE. 17. The CSCF node according to claim 16, wherein the processing logic is further configured to create an Attribute Value Pair, AVP, including the stored time zone information; and the transmitter is further configured to send a charging message including said AVP to a charging node, to enable usage of the time zone information in charging. 18. A home subscriber server, HSS, node for handling time zone information in an internet protocol multimedia subsystem, IMS, network, the HSS node comprising: a receiver, a transmitter, a memory unit and processing logic, the processing logic being connected to the receiver to the transmitter and to the memory unit, wherein the receiver is configured to receive, from a serving call session control function, S-CSCF, node, a request message related to a registration of a user equipment, UE, in said IMS network; the processing logic comprises requesting logic configured to request, from a mobile packet core network associated with a mobile access network to which the UE is connected, time zone information that specifies a time zone associated with the UE; the receiver is further configured to receive the requested time zone information; the processing logic is further configured to store the time zone information in the memory unit of the HSS node; and the transmitter is configured to send a response message, to the S-CSCF node, including the time zone information, to enable the S-CSCF node, to support time zone based services and/or charging associated with the UE.
The present invention concern methods and apparatuses for transporting and using time zone information in an internet protocol multimedia subsystem, IMS, network. When a call session control function, CSCF, node receives a request message related to a user equipment, UE, the CSCF node retrieves and stores time zone information associated with the UE. The time zone information is sent by the CSCF node to at least one other IMS network node, which is then able to support time zone based services and/or charging associated with the UE. The CSCF node may optionally create an Attribute Value Pair, AVP, including the stored time zone information and send a charging message including the AVP to a charging node, to enable usage of the time zone information in charging.1. A method in a call session control function, CSCF, node for handling time zone information in an internet protocol multimedia subsystem. IMS, network, the method comprising: receiving a request message related to a user equipment, UE; retrieving time zone information in response to reception of said request message, wherein said time zone information specifies a time zone associated with the UE; storing the time zone information in a memory unit of the CSCF node; and, sending at least one message, including the time zone information, to at least one other IMS network node, to enable said at least one other IMS network node to support time zone based services and/or charging associated with the UE. 2. The method according to claim 1, wherein the time zone information comprises User Current Time Zone information that specifies the time zone of a currently visited network of the UE. 3. The method according to claim 1, wherein the time zone information comprises User Home Time Zone information that specifies a home time zone of a user subscription associated with the UE. 4. The method according to claim 1, wherein the CSCF node is a proxy call session control function, P-CSCF, node, the UE is connected to a mobile access network, and the time zone information is retrieved from a policy control and charging rules function, PCRF, node, which stores time zone information received from the mobile access network to which the UE is connected. 5. The method according to claim 4, further comprising: receiving updated time zone information from the PCRF node, when the time zone information, which is stored in the PCRF node and associated with the UE, has changed. 6. The method according to claim 1, wherein the CSCF node is a proxy call session control function, P-CSCF, node, the UE is connected to a fixed access network, and the time zone information of the fixed access network is preconfigured into the P-CSCF node, such that the step of retrieving includes retrieving the time zone information from configuration information of the P-CSCF node. 7. The method according to claim 1, wherein the CSCF node is a serving call session control function, S-CSCF, node, the request message is a registration request message, related to registration of the UE in the IMS network, and received from a proxy call session control function, P-CSCF, node, and the time zone information is retrieved from the received request message. 8. The method according to claim 1, wherein the CSCF node is a serving call session control function, S-CSCF, node, the request message is a terminating request message related to a session to be terminated in the UE, or an originating request message related to a session to be originated from the UE, and the step of retrieving the time zone information includes retrieving the time zone information from stored information in the memory unit of the S-CSCF node or from the originating request message 902). 9. The method according to claim 1, wherein the CSCF node is a serving call session control function, S-CSCF, node, and the time zone information is retrieved from a home subscriber server, HSS, node. 10. The method according to claim 1, wherein the time zone information is included in a p-charging-vector header field of the received request message and/or sent message. 11. The method according to claim 1, further comprising: creating an Attribute Value Pair, AVP, including the stored time zone information, sending a charging message including said AVP to a charging node, to enable usage of the time zone information in charging. 12. A method in a home subscriber server, HSS, node for handling time zone information in an internet protocol multimedia subsystem, IMS, network, the method comprising: receiving, from a serving call session control function, S-CSCF, node, a request message related to a registration of a user equipment, UE, in said IMS network; requesting, from a mobile packet core network associated with a mobile access network to which the UE is connected, time zone information that specifies a time zone associated with the UE, receiving the requested information; storing the time zone information in a memory unit of the HSS node; and, sending a response message, to the S-CSCF node, including the time zone information, to enable the S-CSCF node, to support time zone based services and/or charging associated with the UE. 13. The method according to claim 12, wherein the time zone information comprises User Current Time Zone information that specifies the time zone of a currently visited network of the UE. 14. The method according to claim 12, further comprising: receiving updated time zone information from the mobile packet core network associated with the mobile access network to which the UE is connected, when the time zone information has changed, and sending the updated time zone information to the S-CSCF node. 15. The method according to claim 12, wherein the HSS node is preconfigured with User Home Time Zone information that specifies the time zone of a predefined home network associated with the UE, and the User Home Time Zone information is included in the response message sent to the S-CSCF node. 16. A call session control function, CSCF, node for handling time zone information in an internet protocol multimedia subsystem, IMS, network, the CSCF node comprising: a receiver, a transmitter, a memory unit and processing logic, the processing logic being connected to the receiver, to the transmitter and to the memory unit, wherein the receiver is configured to receive a request message related to a user equipment, UE; the processing logic comprises retrieving logic configured to retrieve time zone information in response to reception of said request message, wherein said time zone information specifies a time zone associated with the UE; the processing logic is further configured to store the time zone information in the memory unit of the CSCF node; and the transmitter is configured to send at least one message, including the time zone information, to at least one other IMS network node, to enable said at least one other IMS network node to support time zone based services and/or charging associated with the UE. 17. The CSCF node according to claim 16, wherein the processing logic is further configured to create an Attribute Value Pair, AVP, including the stored time zone information; and the transmitter is further configured to send a charging message including said AVP to a charging node, to enable usage of the time zone information in charging. 18. A home subscriber server, HSS, node for handling time zone information in an internet protocol multimedia subsystem, IMS, network, the HSS node comprising: a receiver, a transmitter, a memory unit and processing logic, the processing logic being connected to the receiver to the transmitter and to the memory unit, wherein the receiver is configured to receive, from a serving call session control function, S-CSCF, node, a request message related to a registration of a user equipment, UE, in said IMS network; the processing logic comprises requesting logic configured to request, from a mobile packet core network associated with a mobile access network to which the UE is connected, time zone information that specifies a time zone associated with the UE; the receiver is further configured to receive the requested time zone information; the processing logic is further configured to store the time zone information in the memory unit of the HSS node; and the transmitter is configured to send a response message, to the S-CSCF node, including the time zone information, to enable the S-CSCF node, to support time zone based services and/or charging associated with the UE.
2,400
7,054
7,054
13,679,365
2,447
In one embodiment, a method includes extracting, by a computing device, information from an electronic message, where the electronic message has been communicated to or from a user of a social-networking system, cross-referencing, by the computing device, the extracted information with social-networking information associated with one or more nodes or edges of the social-networking system, and determining, by the computing device, an action for execution by the social-networking system based on the cross-referencing.
1. A method comprising: extracting, by a computing device, first information from an electronic message, the electronic message having been communicated to or from a first user of a social-networking system, the social-networking system comprising a social graph that comprises a plurality of nodes and edges connecting the nodes, a first node in the social graph corresponding to the first user; cross-referencing, by the computing device, the first information with second information associated with one or more nodes or edges of the social-networking system; and determining, by the computing device, an action for execution by the social-networking system based on the cross-referencing. 2. The method of claim 1, wherein the electronic message comprises: a Short Message Service (SMS) message; an email message; an instant messaging service (IM) message; a voice-over-IP (VoIP) call; or a cellular-network call. 3. The method of claim 2, wherein the first information is received from a mobile computing device of the first user, an application on the mobile computing device having read at least a portion of the SMS message to determine the first information. 4. The method of claim 2, wherein the first information comprises: the name of a recipient of the electronic message; the phone number of a recipient of the electronic message; the name of a sender of the electronic message; the phone number of a sender of the electronic message; the name of an entity contained in the electronic message; or the phone number of an entity contained in the electronic message. 5. The method of claim 1, wherein: each of the nodes or edges associated with the second information is connected to the first node. 6. The method of claim 5, wherein: each edge in the graph represents a single degree of separation within the graph; and each of the nodes or edges associated with the second information is connected to the first node within a pre-determined threshold number of degrees of separation. 7. The method of claim 1, wherein the cross-referencing, by the computing device, the first information with second information further comprises: comparing respective name text strings of the second information to a name text string of the first information based on approximate string matching. 8. The method of claim 1, wherein the cross-referencing, by the computing device, the first information with second information further comprises: comparing respective name text strings of the second information to a name text string of the first information based on a Levenshtein distance algorithm. 9. The method of claim 1, wherein the action comprises: creating a connection between nodes in the graph; making a recommendation to the first user; contacting one or more users of the social-networking system; or automatically selecting social-networking information to provide to a user. 10. One or more computer-readable non-transitory storage media embodying software that is operable when executed to: extract, by a computing device, first information from an electronic message, the electronic message having been communicated to or from a first user of a social-networking system, the social-networking system comprising a social graph that comprises a plurality of nodes and edges connecting the nodes, a first node in the social graph corresponding to the first user; cross-reference, by the computing device, the first information with second information associated with one or more nodes or edges of the social-networking system; and determine, by the computing device, an action for execution by the social-networking system based on the cross-referencing. 11. The media of claim 10, wherein: each of the nodes or edges associated with the second information is connected to the first node. 12. The media of claim 11, wherein: each edge in the graph represents a single degree of separation within the graph; and each of the nodes or edges associated with the second information is connected to the first node within a pre-determined threshold number of degrees of separation. 13. The media of claim 10, wherein the software is further operable when executed to cross-reference to: compare respective name text strings of the second information to a name text string of the first information based on approximate string matching. 14. The media of claim 10, wherein the software is further operable when executed to cross-reference to: compare respective name text strings of the second information to a name text string of the first information based on a Levenshtein distance algorithm. 15. A system comprising: one or more processors; and a memory coupled to the processors comprising instructions executable by the processors, the processors being operable when executing the instructions to: extract, by a computing device, first information from an electronic message, the electronic message having been communicated to or from a first user of a social-networking system, the social-networking system comprising a social graph that comprises a plurality of nodes and edges connecting the nodes, a first node in the social graph corresponding to the first user; cross-reference, by the computing device, the first information with second information associated with one or more nodes or edges of the social-networking system; and determine, by the computing device, an action for execution by the social-networking system based on the cross-referencing. 16. The system of claim 15, wherein: each of the nodes or edges associated with the second information is connected to the first node. 17. The system of claim 16, wherein: each edge in the graph represents a single degree of separation within the graph; and each of the nodes or edges associated with the second information is connected to the first node within a pre-determined threshold number of degrees of separation. 18. The system of claim 15, wherein the processors are further operable when executing the instructions to cross-reference to: compare respective name text strings of the second information to a name text string of the first information based on approximate string matching. 19. The system of claim 15, wherein the processors are further operable when executing the instructions to cross-reference to: compare respective name text strings of the second information to a name text string of the first information based on a Levenshtein distance algorithm.
In one embodiment, a method includes extracting, by a computing device, information from an electronic message, where the electronic message has been communicated to or from a user of a social-networking system, cross-referencing, by the computing device, the extracted information with social-networking information associated with one or more nodes or edges of the social-networking system, and determining, by the computing device, an action for execution by the social-networking system based on the cross-referencing.1. A method comprising: extracting, by a computing device, first information from an electronic message, the electronic message having been communicated to or from a first user of a social-networking system, the social-networking system comprising a social graph that comprises a plurality of nodes and edges connecting the nodes, a first node in the social graph corresponding to the first user; cross-referencing, by the computing device, the first information with second information associated with one or more nodes or edges of the social-networking system; and determining, by the computing device, an action for execution by the social-networking system based on the cross-referencing. 2. The method of claim 1, wherein the electronic message comprises: a Short Message Service (SMS) message; an email message; an instant messaging service (IM) message; a voice-over-IP (VoIP) call; or a cellular-network call. 3. The method of claim 2, wherein the first information is received from a mobile computing device of the first user, an application on the mobile computing device having read at least a portion of the SMS message to determine the first information. 4. The method of claim 2, wherein the first information comprises: the name of a recipient of the electronic message; the phone number of a recipient of the electronic message; the name of a sender of the electronic message; the phone number of a sender of the electronic message; the name of an entity contained in the electronic message; or the phone number of an entity contained in the electronic message. 5. The method of claim 1, wherein: each of the nodes or edges associated with the second information is connected to the first node. 6. The method of claim 5, wherein: each edge in the graph represents a single degree of separation within the graph; and each of the nodes or edges associated with the second information is connected to the first node within a pre-determined threshold number of degrees of separation. 7. The method of claim 1, wherein the cross-referencing, by the computing device, the first information with second information further comprises: comparing respective name text strings of the second information to a name text string of the first information based on approximate string matching. 8. The method of claim 1, wherein the cross-referencing, by the computing device, the first information with second information further comprises: comparing respective name text strings of the second information to a name text string of the first information based on a Levenshtein distance algorithm. 9. The method of claim 1, wherein the action comprises: creating a connection between nodes in the graph; making a recommendation to the first user; contacting one or more users of the social-networking system; or automatically selecting social-networking information to provide to a user. 10. One or more computer-readable non-transitory storage media embodying software that is operable when executed to: extract, by a computing device, first information from an electronic message, the electronic message having been communicated to or from a first user of a social-networking system, the social-networking system comprising a social graph that comprises a plurality of nodes and edges connecting the nodes, a first node in the social graph corresponding to the first user; cross-reference, by the computing device, the first information with second information associated with one or more nodes or edges of the social-networking system; and determine, by the computing device, an action for execution by the social-networking system based on the cross-referencing. 11. The media of claim 10, wherein: each of the nodes or edges associated with the second information is connected to the first node. 12. The media of claim 11, wherein: each edge in the graph represents a single degree of separation within the graph; and each of the nodes or edges associated with the second information is connected to the first node within a pre-determined threshold number of degrees of separation. 13. The media of claim 10, wherein the software is further operable when executed to cross-reference to: compare respective name text strings of the second information to a name text string of the first information based on approximate string matching. 14. The media of claim 10, wherein the software is further operable when executed to cross-reference to: compare respective name text strings of the second information to a name text string of the first information based on a Levenshtein distance algorithm. 15. A system comprising: one or more processors; and a memory coupled to the processors comprising instructions executable by the processors, the processors being operable when executing the instructions to: extract, by a computing device, first information from an electronic message, the electronic message having been communicated to or from a first user of a social-networking system, the social-networking system comprising a social graph that comprises a plurality of nodes and edges connecting the nodes, a first node in the social graph corresponding to the first user; cross-reference, by the computing device, the first information with second information associated with one or more nodes or edges of the social-networking system; and determine, by the computing device, an action for execution by the social-networking system based on the cross-referencing. 16. The system of claim 15, wherein: each of the nodes or edges associated with the second information is connected to the first node. 17. The system of claim 16, wherein: each edge in the graph represents a single degree of separation within the graph; and each of the nodes or edges associated with the second information is connected to the first node within a pre-determined threshold number of degrees of separation. 18. The system of claim 15, wherein the processors are further operable when executing the instructions to cross-reference to: compare respective name text strings of the second information to a name text string of the first information based on approximate string matching. 19. The system of claim 15, wherein the processors are further operable when executing the instructions to cross-reference to: compare respective name text strings of the second information to a name text string of the first information based on a Levenshtein distance algorithm.
2,400
7,055
7,055
14,297,663
2,481
A vision system for a vehicle includes a camera and a control. The camera is disposed at a vehicle and has a field of view exterior of the vehicle. The camera is operable to capture image data. The control includes an image processor. A single coaxial cable connects the camera with the control. The single coaxial cable carries (i) image data from the camera to the control, (ii) control data from the control to the camera and (iii) electrical voltage for powering the camera. The image processor is operable to process image data captured by the camera and carried to the control by the single coaxial cable. The single coaxial cable carries at least one FBAS signal.
1. A vision system for a vehicle, said vision system comprising: a camera disposed at a vehicle equipped with said vision system, wherein said camera, when disposed at the vehicle, has a field of view exterior of the vehicle, said camera capturing image data; a control comprising an image processor; a single coaxial cable connecting said camera with said control; wherein said single coaxial cable carries (i) image data from said camera to said control, (ii) camera control data from said control to said camera and (iii) electrical voltage for powering said camera; wherein said image processor is operable to process image data captured by said camera and carried to said control via said single coaxial cable; and wherein said single coaxial cable carries at least one FBAS signal. 2. The vision system of claim 1, wherein said vision system is operable to carry camera control data via modulation of a carrier wave of at least one analog signal on said single coaxial cable. 3. The vision system of claim 2, wherein said carrier wave has a frequency that is outside the bandwidth of signals carrying image data. 4. The vision system of claim 1, wherein said electrical voltage comprises a direct current electrical voltage. 5. The vision system of claim 1, wherein said electrical voltage comprises an alternating current electrical voltage. 6. The vision system of claim 1, wherein camera control data is carried on said single coaxial cable by a signal having a frequency outside of the bandwidth of signals carrying image data on said single coaxial cable. 7. The vision system of claim 6, wherein camera control data carried on said single coaxial cable has a frequency that has a sufficient Shannon distance from a frequency of signals carrying image data on said single coaxial cable. 8. The vision system of claim 1, wherein said single coaxial cable carries calibration and response data from said camera to said control. 9. The vision system of claim 1, wherein camera control data carried on said single coaxial cable from said control to said camera comprises initialization data. 10. The vision system of claim 1, comprising a plurality of cameras and respective coaxial cables connecting said cameras with said control. 11. The vision system of claim 10, wherein said plurality of cameras and said control are part of a multi-camera surround view vision system of the vehicle. 12. A vision system for a vehicle, said vision system comprising: a plurality of cameras disposed at a vehicle equipped with said vision system, wherein each of said cameras, when disposed at the vehicle, has a respective field of view exterior of the vehicle, said cameras capturing image data; a control comprising an image processor; wherein said plurality of cameras and said control are part of a multi-camera surround view vision system of the vehicle; a plurality of coaxial cables, each connecting a respective one of said cameras with said control; wherein each of said coaxial cables carries (i) image data from the respective camera to said control, (ii) camera control data from said control to the respective camera and (iii) electrical voltage for powering the respective camera; wherein said image processor is operable to process image data captured by said cameras and carried to said control via said coaxial cables; and wherein at least some of said coaxial cables carry at least one FBAS signal. 13. The vision system of claim 12, wherein said vision system is operable to carry camera control data via modulation of a carrier wave of at least one analog signal. 14. The vision system of claim 13, wherein said carrier wave has a frequency that is outside the bandwidth of signals carrying image data on a respective one of said coaxial cables. 15. The vision system of claim 12, wherein said electrical voltage comprises a direct current electrical voltage. 16. The vision system of claim 12, wherein said electrical voltage comprises an alternating current electrical voltage. 17. The vision system of claim 12, wherein camera control data is carried by a signal having a frequency outside of the bandwidth of signals carrying image data on a respective one of said coaxial cables. 18. A vision system for a vehicle, said vision system comprising: a plurality of cameras disposed at a vehicle equipped with said vision system, wherein each of said cameras, when disposed at the vehicle, has a respective field of view exterior of the vehicle, said cameras capturing image data; a control comprising an image processor; wherein said plurality of cameras and said control are part of a multi-camera surround view vision system of the vehicle; a plurality of coaxial cables, each connecting a respective one of said cameras with said control; wherein at least some of said coaxial cables carry (i) image data from the respective camera to said control, (ii) camera control data from said control to the respective camera and (iii) electrical voltage for powering the respective camera; wherein camera control data is carried by a signal having a frequency outside of the bandwidth of signals carrying image data on a respective one of said at least some of said coaxial cables; wherein said image processor is operable to process image data captured by said cameras; and wherein said at least some of said coaxial cables carry at least one FBAS signal. 19. The vision system of claim 18, wherein said vision system is operable to carry camera control data via modulation of a carrier wave of at least one analog signal, and wherein said carrier wave has a frequency that is outside the bandwidth of signals carrying image data on a respective one of said at least some of said coaxial cables. 20. The vision system of claim 18, wherein said electrical voltage comprises an alternating current electrical voltage.
A vision system for a vehicle includes a camera and a control. The camera is disposed at a vehicle and has a field of view exterior of the vehicle. The camera is operable to capture image data. The control includes an image processor. A single coaxial cable connects the camera with the control. The single coaxial cable carries (i) image data from the camera to the control, (ii) control data from the control to the camera and (iii) electrical voltage for powering the camera. The image processor is operable to process image data captured by the camera and carried to the control by the single coaxial cable. The single coaxial cable carries at least one FBAS signal.1. A vision system for a vehicle, said vision system comprising: a camera disposed at a vehicle equipped with said vision system, wherein said camera, when disposed at the vehicle, has a field of view exterior of the vehicle, said camera capturing image data; a control comprising an image processor; a single coaxial cable connecting said camera with said control; wherein said single coaxial cable carries (i) image data from said camera to said control, (ii) camera control data from said control to said camera and (iii) electrical voltage for powering said camera; wherein said image processor is operable to process image data captured by said camera and carried to said control via said single coaxial cable; and wherein said single coaxial cable carries at least one FBAS signal. 2. The vision system of claim 1, wherein said vision system is operable to carry camera control data via modulation of a carrier wave of at least one analog signal on said single coaxial cable. 3. The vision system of claim 2, wherein said carrier wave has a frequency that is outside the bandwidth of signals carrying image data. 4. The vision system of claim 1, wherein said electrical voltage comprises a direct current electrical voltage. 5. The vision system of claim 1, wherein said electrical voltage comprises an alternating current electrical voltage. 6. The vision system of claim 1, wherein camera control data is carried on said single coaxial cable by a signal having a frequency outside of the bandwidth of signals carrying image data on said single coaxial cable. 7. The vision system of claim 6, wherein camera control data carried on said single coaxial cable has a frequency that has a sufficient Shannon distance from a frequency of signals carrying image data on said single coaxial cable. 8. The vision system of claim 1, wherein said single coaxial cable carries calibration and response data from said camera to said control. 9. The vision system of claim 1, wherein camera control data carried on said single coaxial cable from said control to said camera comprises initialization data. 10. The vision system of claim 1, comprising a plurality of cameras and respective coaxial cables connecting said cameras with said control. 11. The vision system of claim 10, wherein said plurality of cameras and said control are part of a multi-camera surround view vision system of the vehicle. 12. A vision system for a vehicle, said vision system comprising: a plurality of cameras disposed at a vehicle equipped with said vision system, wherein each of said cameras, when disposed at the vehicle, has a respective field of view exterior of the vehicle, said cameras capturing image data; a control comprising an image processor; wherein said plurality of cameras and said control are part of a multi-camera surround view vision system of the vehicle; a plurality of coaxial cables, each connecting a respective one of said cameras with said control; wherein each of said coaxial cables carries (i) image data from the respective camera to said control, (ii) camera control data from said control to the respective camera and (iii) electrical voltage for powering the respective camera; wherein said image processor is operable to process image data captured by said cameras and carried to said control via said coaxial cables; and wherein at least some of said coaxial cables carry at least one FBAS signal. 13. The vision system of claim 12, wherein said vision system is operable to carry camera control data via modulation of a carrier wave of at least one analog signal. 14. The vision system of claim 13, wherein said carrier wave has a frequency that is outside the bandwidth of signals carrying image data on a respective one of said coaxial cables. 15. The vision system of claim 12, wherein said electrical voltage comprises a direct current electrical voltage. 16. The vision system of claim 12, wherein said electrical voltage comprises an alternating current electrical voltage. 17. The vision system of claim 12, wherein camera control data is carried by a signal having a frequency outside of the bandwidth of signals carrying image data on a respective one of said coaxial cables. 18. A vision system for a vehicle, said vision system comprising: a plurality of cameras disposed at a vehicle equipped with said vision system, wherein each of said cameras, when disposed at the vehicle, has a respective field of view exterior of the vehicle, said cameras capturing image data; a control comprising an image processor; wherein said plurality of cameras and said control are part of a multi-camera surround view vision system of the vehicle; a plurality of coaxial cables, each connecting a respective one of said cameras with said control; wherein at least some of said coaxial cables carry (i) image data from the respective camera to said control, (ii) camera control data from said control to the respective camera and (iii) electrical voltage for powering the respective camera; wherein camera control data is carried by a signal having a frequency outside of the bandwidth of signals carrying image data on a respective one of said at least some of said coaxial cables; wherein said image processor is operable to process image data captured by said cameras; and wherein said at least some of said coaxial cables carry at least one FBAS signal. 19. The vision system of claim 18, wherein said vision system is operable to carry camera control data via modulation of a carrier wave of at least one analog signal, and wherein said carrier wave has a frequency that is outside the bandwidth of signals carrying image data on a respective one of said at least some of said coaxial cables. 20. The vision system of claim 18, wherein said electrical voltage comprises an alternating current electrical voltage.
2,400
7,056
7,056
14,861,049
2,487
In a video coding system, a method includes transmitting a first encoded picture from an encoder for reception by a decoder as part of an encoded bitstream. The first encoded picture acts a first reference picture for one or more subsequent pictures in the output encoded bitstream. The method further includes receiving, at the encoder, an indication from the decoder that there was an error in receiving the first encoded picture, and selecting a second reference picture from a buffer of reference pictures at the encoder. The selected second reference picture selected as being earlier than the first reference picture in an encoding order of the encoded bitstream. The method further includes configuring the encoder to encode a set of one or more pictures for the encoded bitstream using the second reference picture and signaling the first reference picture as a non-reference picture.
1. In a video coding system, a method comprising: transmitting a first encoded picture from an encoder for reception by a decoder as part of an encoded bitstream, the first encoded picture being a first reference picture for one or more subsequent pictures in the encoded bitstream; receiving, at the encoder, an indication from the decoder that there was an error in receiving the first encoded picture; selecting a second reference picture from a first buffer of reference pictures at the encoder, the second reference picture being earlier than the first reference picture in an encoding order of the encoded bitstream; and configuring the encoder to encode a current picture for the encoded bitstream using the second reference picture and to signal the first reference picture as non-reference picture in the first buffer of reference pictures. 2. The method of claim 1, wherein: selecting the second reference picture and configuring the encoder comprise selecting the second reference picture and configuring the encoder in response to the first buffer having a reference picture earlier than the first reference picture in the encoding order. 3. The method of claim 2, further comprising: in response to the first buffer not having a reference picture earlier than the first reference picture in the encoding order, configuring the encoder to encode at least one of an instantaneous decoder refresh (IDR) picture or a graduated decoder refresh (GDR) picture for insertion into the encoded bitstream. 4. The method of claim 1, wherein: selecting the second reference picture comprises limiting selection of the second reference picture to one of a set of one or more long-term reference pictures in the first buffer of reference pictures. 5. The method of claim 1, further comprising: receiving the indication from the decoder at the encoder via a feedback channel between the decoder and the encoder in response to detecting the error in receiving the first encoded picture at the decoder. 6. The method of claim 1, further comprising: transmitting the encoded bitstream from the encoder to the decoder via a communication channel comprising at least one network. 7. A device comprising: an interface to a communication channel; and an encoder coupled to the interface, the encoder comprising: a first buffer to store one or more reference pictures; an encoding pathway coupled to the first buffer, the encoding pathway to generate a first encoded picture for an encoded bitstream, wherein the first encoded picture is used as a first reference picture for one or more subsequent pictures; and an error recovery module coupled to the first buffer and to the encoding pathway, the error recovery module to configure the encoder to encode a set of one or more pictures using a second reference picture and signal the first reference picture as non-reference picture in the first buffer in response to receiving an indication from a decoder that there was an error in receiving the first encoded picture, the second reference picture selected from the first buffer as being earlier than the first reference picture in an encoding order. 8. The device of claim 7, wherein: the error recovery module is to select the second reference picture and configure the encoder in response to the first buffer having a reference picture earlier than the first reference picture in the encoding order. 9. The device of claim 8, wherein: in response to the first buffer not having a reference picture earlier than the first reference picture in the encoding order, the error recovery module is to configure the encoder to encode at least one of an instantaneous decoder refresh (IDR) picture or a graduated decoder refresh (GDR) picture for insertion into the encoded bitstream. 10. The device of claim 7, wherein: the first buffer is to store a set of one or more short-term reference pictures and a set of one or more long-term reference pictures; and wherein the error recovery module is to limit selection of the second reference picture to one of the set of one or more long-term reference pictures in the first buffer. 11. A device comprising: a decoder coupleable to an encoder via a feedback channel, wherein the decoder comprises: an input to receive an encoded bitstream having a first encoded picture, wherein the first encoded picture is used as a first reference picture for one or more subsequent pictures; a buffer to buffer reference pictures from the encoded bit stream; and an error detection module to: send to the encoder via a feedback channel an indication that there was an error in receiving the first encoded picture in response to detecting the error in receiving the first encoded picture at the decoder; and to identify the first reference picture as a non-reference picture in the buffer in response to a signal from the encoder indicating the first reference picture is to no longer be used as a reference picture; and a decoding pathway to decode one or more subsequent pictures of the encoded bitstream using a second reference picture from the buffer in place of the first reference picture. 12. The device of claim 11, wherein: the buffer maintains copies of a set of long-term reference pictures stored in a corresponding buffer of the encoder. 13. The device of claim 11, wherein: the decoder further comprises a counter incremented for each picture processed from the encoded bitstream; and the error recovery module further is to include in the indication a count value of the counter that is associated with the first reference picture. 14. In a video coding system, a method comprising: receiving, at a decoder, an encoded bitstream having a first encoded picture, wherein the first encoded picture is used as a first reference picture for one or more subsequent pictures; buffering reference pictures from the encoded bit stream in a buffer of the decoder; sending to the encoder via a feedback channel an indication that there was an error in receiving the first encoded picture in response to detecting the error in receiving the first encoded picture at the decoder; identifying the first reference picture as a non-reference picture in the buffer in response to a signal from the encoder indicating the first reference picture is to no longer be used as a reference picture; and decoding, at the decoder, one or more subsequent pictures of the encoded bitstream using a second reference picture from the buffer in place of the first reference picture. 15. The method of claim 14, further comprising: maintaining in the buffer copies of a set of long-term reference pictures stored in a corresponding buffer of the encoder. 16. The method of claim 14, further comprising: incrementing a counter of the decoder for each picture processed from the encoded bitstream; and including in the indication a count value of the counter that is associated with the first reference picture. 17. A non-transitory computer readable storage medium embodying a set of executable instructions to manipulate at least one processor to provide a first encoded picture for transmission to a decoder as part of an encoded bitstream, the first encoded picture presenting a first reference picture for one or more subsequent pictures in the encoded bitstream; receive an indication from the decoder that there was an error in receiving the first encoded picture; select a second reference picture from a buffer of reference pictures of an encoder, the second reference picture being earlier than the first reference picture in an encoding order of the encoded bitstream; and configure the encoder to encode a set of one or more pictures for the encoded bitstream using the second reference picture and signal the first reference picture as a non-reference picture. 18. The non-transitory computer readable storage medium of claim 17, wherein: the executable instructions to manipulate the processor to select the second reference picture and configure the encoder comprise executable instructions to manipulate the processor to select the second reference picture and configure the encoder in response to the buffer having a reference picture earlier than the first reference picture in the encoding order. 19. The non-transitory computer readable storage medium of claim 18, wherein the set of executable instruction further are to manipulate the processor to: in response to the buffer not having a reference picture earlier than the first reference picture in the encoding order, configure the encoder to encode at least one of an instantaneous decoder refresh (IDR) picture or a graduated decoder refresh (GDR) picture for the encoded bitstream. 20. The non-transitory computer readable storage medium of claim 17, wherein: the executable instructions to manipulate the processor to select the second reference picture comprise executable instructions to manipulate the processor to limit selection of the second reference picture to one of a set of one or more long-term reference pictures in the first buffer of reference pictures.
In a video coding system, a method includes transmitting a first encoded picture from an encoder for reception by a decoder as part of an encoded bitstream. The first encoded picture acts a first reference picture for one or more subsequent pictures in the output encoded bitstream. The method further includes receiving, at the encoder, an indication from the decoder that there was an error in receiving the first encoded picture, and selecting a second reference picture from a buffer of reference pictures at the encoder. The selected second reference picture selected as being earlier than the first reference picture in an encoding order of the encoded bitstream. The method further includes configuring the encoder to encode a set of one or more pictures for the encoded bitstream using the second reference picture and signaling the first reference picture as a non-reference picture.1. In a video coding system, a method comprising: transmitting a first encoded picture from an encoder for reception by a decoder as part of an encoded bitstream, the first encoded picture being a first reference picture for one or more subsequent pictures in the encoded bitstream; receiving, at the encoder, an indication from the decoder that there was an error in receiving the first encoded picture; selecting a second reference picture from a first buffer of reference pictures at the encoder, the second reference picture being earlier than the first reference picture in an encoding order of the encoded bitstream; and configuring the encoder to encode a current picture for the encoded bitstream using the second reference picture and to signal the first reference picture as non-reference picture in the first buffer of reference pictures. 2. The method of claim 1, wherein: selecting the second reference picture and configuring the encoder comprise selecting the second reference picture and configuring the encoder in response to the first buffer having a reference picture earlier than the first reference picture in the encoding order. 3. The method of claim 2, further comprising: in response to the first buffer not having a reference picture earlier than the first reference picture in the encoding order, configuring the encoder to encode at least one of an instantaneous decoder refresh (IDR) picture or a graduated decoder refresh (GDR) picture for insertion into the encoded bitstream. 4. The method of claim 1, wherein: selecting the second reference picture comprises limiting selection of the second reference picture to one of a set of one or more long-term reference pictures in the first buffer of reference pictures. 5. The method of claim 1, further comprising: receiving the indication from the decoder at the encoder via a feedback channel between the decoder and the encoder in response to detecting the error in receiving the first encoded picture at the decoder. 6. The method of claim 1, further comprising: transmitting the encoded bitstream from the encoder to the decoder via a communication channel comprising at least one network. 7. A device comprising: an interface to a communication channel; and an encoder coupled to the interface, the encoder comprising: a first buffer to store one or more reference pictures; an encoding pathway coupled to the first buffer, the encoding pathway to generate a first encoded picture for an encoded bitstream, wherein the first encoded picture is used as a first reference picture for one or more subsequent pictures; and an error recovery module coupled to the first buffer and to the encoding pathway, the error recovery module to configure the encoder to encode a set of one or more pictures using a second reference picture and signal the first reference picture as non-reference picture in the first buffer in response to receiving an indication from a decoder that there was an error in receiving the first encoded picture, the second reference picture selected from the first buffer as being earlier than the first reference picture in an encoding order. 8. The device of claim 7, wherein: the error recovery module is to select the second reference picture and configure the encoder in response to the first buffer having a reference picture earlier than the first reference picture in the encoding order. 9. The device of claim 8, wherein: in response to the first buffer not having a reference picture earlier than the first reference picture in the encoding order, the error recovery module is to configure the encoder to encode at least one of an instantaneous decoder refresh (IDR) picture or a graduated decoder refresh (GDR) picture for insertion into the encoded bitstream. 10. The device of claim 7, wherein: the first buffer is to store a set of one or more short-term reference pictures and a set of one or more long-term reference pictures; and wherein the error recovery module is to limit selection of the second reference picture to one of the set of one or more long-term reference pictures in the first buffer. 11. A device comprising: a decoder coupleable to an encoder via a feedback channel, wherein the decoder comprises: an input to receive an encoded bitstream having a first encoded picture, wherein the first encoded picture is used as a first reference picture for one or more subsequent pictures; a buffer to buffer reference pictures from the encoded bit stream; and an error detection module to: send to the encoder via a feedback channel an indication that there was an error in receiving the first encoded picture in response to detecting the error in receiving the first encoded picture at the decoder; and to identify the first reference picture as a non-reference picture in the buffer in response to a signal from the encoder indicating the first reference picture is to no longer be used as a reference picture; and a decoding pathway to decode one or more subsequent pictures of the encoded bitstream using a second reference picture from the buffer in place of the first reference picture. 12. The device of claim 11, wherein: the buffer maintains copies of a set of long-term reference pictures stored in a corresponding buffer of the encoder. 13. The device of claim 11, wherein: the decoder further comprises a counter incremented for each picture processed from the encoded bitstream; and the error recovery module further is to include in the indication a count value of the counter that is associated with the first reference picture. 14. In a video coding system, a method comprising: receiving, at a decoder, an encoded bitstream having a first encoded picture, wherein the first encoded picture is used as a first reference picture for one or more subsequent pictures; buffering reference pictures from the encoded bit stream in a buffer of the decoder; sending to the encoder via a feedback channel an indication that there was an error in receiving the first encoded picture in response to detecting the error in receiving the first encoded picture at the decoder; identifying the first reference picture as a non-reference picture in the buffer in response to a signal from the encoder indicating the first reference picture is to no longer be used as a reference picture; and decoding, at the decoder, one or more subsequent pictures of the encoded bitstream using a second reference picture from the buffer in place of the first reference picture. 15. The method of claim 14, further comprising: maintaining in the buffer copies of a set of long-term reference pictures stored in a corresponding buffer of the encoder. 16. The method of claim 14, further comprising: incrementing a counter of the decoder for each picture processed from the encoded bitstream; and including in the indication a count value of the counter that is associated with the first reference picture. 17. A non-transitory computer readable storage medium embodying a set of executable instructions to manipulate at least one processor to provide a first encoded picture for transmission to a decoder as part of an encoded bitstream, the first encoded picture presenting a first reference picture for one or more subsequent pictures in the encoded bitstream; receive an indication from the decoder that there was an error in receiving the first encoded picture; select a second reference picture from a buffer of reference pictures of an encoder, the second reference picture being earlier than the first reference picture in an encoding order of the encoded bitstream; and configure the encoder to encode a set of one or more pictures for the encoded bitstream using the second reference picture and signal the first reference picture as a non-reference picture. 18. The non-transitory computer readable storage medium of claim 17, wherein: the executable instructions to manipulate the processor to select the second reference picture and configure the encoder comprise executable instructions to manipulate the processor to select the second reference picture and configure the encoder in response to the buffer having a reference picture earlier than the first reference picture in the encoding order. 19. The non-transitory computer readable storage medium of claim 18, wherein the set of executable instruction further are to manipulate the processor to: in response to the buffer not having a reference picture earlier than the first reference picture in the encoding order, configure the encoder to encode at least one of an instantaneous decoder refresh (IDR) picture or a graduated decoder refresh (GDR) picture for the encoded bitstream. 20. The non-transitory computer readable storage medium of claim 17, wherein: the executable instructions to manipulate the processor to select the second reference picture comprise executable instructions to manipulate the processor to limit selection of the second reference picture to one of a set of one or more long-term reference pictures in the first buffer of reference pictures.
2,400
7,057
7,057
14,465,374
2,416
A delegate wireless terminal can receive and store messages sent to it by a receiving network node. The wireless terminal can identify a message label based on a mapping for the received message. A transmitting network node can transmit a message label to a receiving network node across a backhaul link. The receiving network node can transmit a message label to the wireless terminal. The wireless terminal can identify a stored message that corresponds to the received message label, and send the corresponding message to the receiving network node. The receiving network node can then transmit the message to its intended destination.
1. A method performed in a user equipment in wireless communication with a network node, the method comprising: receiving a message label from the network node; identifying, based on the received message label, a message stored in a memory of the user equipment; transmitting the message to an intended destination. 2. The method of claim 1, wherein the intended destination is another user equipment, and transmitting the message to a destination comprises wirelessly transmitting the message to a network node. 3. The method of claim 1, wherein the intended destination is another user equipment, and transmitting the message to a destination comprises wirelessly transmitting the message directly to the other user equipment. 4. The method of claim 1, wherein the intended destination is the user equipment itself, and transmitting the message to the destination comprises retrieving the message from the memory. 5. The method of claim 1, further comprising: prior to receiving the message label from the network node: receiving the message from the network node; determining a message label for the message based on a predetermined mapping; and storing the message in the memory with the determined message label. 6. The method of claim 5, wherein identifying, based on the received message label, a message stored in a memory of the user equipment comprises: comparing the received message label received from the network node to the determined message label determined at the user equipment and stored in the memory of the user equipment; determining that the received message label is the same as the determined message label; and wherein transmitting the message to an intended destination comprises transmitting the message stored in the memory of the user equipment associated with the determined message label to the intended destination. 7. The method of claim 5, wherein receiving the message from the network node comprising eavesdropping on transmissions between the network node and another user equipment. 8. A user equipment in communication with a network node, the user equipment comprising: a memory; a transceiver; and a processor for executing instructions stored in the memory, user equipment configured to: receive a message label from the network node; identify, based on the received message label, a message stored in a memory of the user equipment; transmit the message to an intended destination. 9. The user equipment of claim 8, wherein the user equipment is further configured to: prior to receiving the message label from the network node: receive the message from the network node; determine a message label for the message based on a predetermined mapping; and store the message in the memory with the determined message label. 10. The user equipment of claim 9, wherein identifying, based on the received message label, a message stored in a memory of the user equipment comprises: comparing the received message label received from the network node to the determined message label determined at the user equipment and stored in the memory of the user equipment; determining that the received message label is the same as the determined message label; and wherein transmitting the message to an intended destination comprises transmitting the message stored in the memory of the user equipment associated with the determined message label to the intended destination. 11. The method of claim 9, wherein receiving the message from the network node comprising eavesdropping on transmissions between the network node and another user equipment. 12. A method at a network node of a wireless communications network, the method comprising: receiving a message label from a transmitting network node across a backhaul link; determining that the message label does not coincide with a message stored at the network node; transmitting the message label to a designated user equipment; receiving a message associated with the message label from the designated user equipment; and transmitting the message to an intended user equipment. 13. The method of claim 12, further comprising: receiving an indication that the designated user equipment has left the wireless communications network; transmitting an indication that the designated user equipment has left the wireless communications network across the backhaul link to the transmitting network node. 14. The method of claim 13, further comprising receiving an indication from the transmitting network node of a new designated user equipment, wherein the network node is in wireless communication with the new designated user equipment. 15. The method of claim 14, further comprising: receiving a message from the transmitting network node across the backhaul link; and wirelessly transmitting the message to the new designated user equipment. 16. The method of claim 12, wherein receiving a message label from a transmitting network node across a backhaul link comprises receiving a first message label, and wherein transmitting the message label to a designated user equipment comprises transmitting the first message label to a first designated user equipment; and wherein the method further comprises: receiving a second message label from the transmitting network node via the backhaul link, the second message label different from the first message label; and transmitting the second message label to a second user equipment. 17. The method of claim 12, further comprising: prior to receiving the message label from the transmitting network node via the backhaul link: receiving a message from the transmitting network node via the backhaul link, the message intended for a target user equipment in wireless communication with the network node; and transmitting the message to the target user equipment and to the designated user equipment. 18. A network node of a wireless communications network, the network node comprising: a memory; a transceiver; and a processor for executing instructions stored on the memory; the network node configured to: receive a message label from a transmitting network node across a backhaul link; determine that the message label does not coincide with a message stored at the network node; transmit the message label to a designated user equipment; receive a message associated with the message label from the designated user equipment; and transmit the message to an intended user equipment. 19. The network node of claim 18, further configured to: receive an indication that the designated user equipment has left the wireless communications network; transmit an indication that the designated user equipment has left the wireless communications network across the backhaul link to the transmitting network node. 20. The network node of claim 19, further configured to receive an indication from the transmitting network node of a new designated user equipment, wherein the network node is in wireless communication with the new designated user equipment. 21. The network node of claim 20, further configured to: receive a message from the transmitting network node across the backhaul link; and wirelessly transmit the message to the new designated user equipment. 20. The network node of claim 18, wherein receiving a message label from a transmitting network node across a backhaul link comprises receiving a first message label, and wherein transmitting the message label to a designated user equipment comprises transmitting the first message label to a first designated user equipment; and wherein the network node is further configured to: receive a second message label from the transmitting network node via the backhaul link, the second message label different from the first message label; and transmit the second message label to a second user equipment. 21. The network node of claim 18, further configured to: prior to receiving the message label from the transmitting network node via the backhaul link: receive a message from the transmitting network node via the backhaul link, the message intended for a target user equipment in wireless communication with the network node; and transmit the message to the target user equipment and to the designated user equipment. 22. A method performed at a network node of a wireless communications network, the method comprising: receiving a message; determining a message label for the message; determining that the determined message label is the same as a stored message label that is stored in a memory of the transmitting network node; comparing the received message to a stored message associated with the stored message label; if the received message is the same as the stored message, then transmitting the determined message label to a second network node via a backhaul link; and if the received message is different than the stored message, then transmitting the received message to the second network node via the backhaul link, and storing the received message with the determined message label. 23. The method of claim 22, further comprising: receiving an indication from the second base station that a first designated user equipment is no longer connected to the second base station; transmitting an identification of a new designated user equipment to the second network node. 24. The method of claim 23, further comprising erasing one or more messages and message labels stored in the memory of the network node that coincide with messages and message labels stored in the first designated user equipment. 25. A network node of a wireless communications network, the network node comprising: a memory; a transceiver; and a processor for executing instructions stored on the memory; the network node configured to: receive a message; determine a message label for the message; determine that the determined message label is the same as a stored message label that is stored in a memory of the transmitting network node; compare the received message to a stored message associated with the stored message label; if the received message is the same as the stored message, then transmit the determined message label to a second network node via a backhaul link; and if the received message is different than the stored message, then transmit the received message to the second network node via the backhaul link, and store the received message with the determined message label. 26. The network node of claim 25, further configured to: receive an indication from the second base station that a first designated user equipment is no longer connected to the second base station; transmit an identification of a new designated user equipment to the second network node. 27. The method of claim 26, further configured to erase one or more messages and message labels stored in the memory of the network node that coincide with messages and message labels stored in the first designated user equipment.
A delegate wireless terminal can receive and store messages sent to it by a receiving network node. The wireless terminal can identify a message label based on a mapping for the received message. A transmitting network node can transmit a message label to a receiving network node across a backhaul link. The receiving network node can transmit a message label to the wireless terminal. The wireless terminal can identify a stored message that corresponds to the received message label, and send the corresponding message to the receiving network node. The receiving network node can then transmit the message to its intended destination.1. A method performed in a user equipment in wireless communication with a network node, the method comprising: receiving a message label from the network node; identifying, based on the received message label, a message stored in a memory of the user equipment; transmitting the message to an intended destination. 2. The method of claim 1, wherein the intended destination is another user equipment, and transmitting the message to a destination comprises wirelessly transmitting the message to a network node. 3. The method of claim 1, wherein the intended destination is another user equipment, and transmitting the message to a destination comprises wirelessly transmitting the message directly to the other user equipment. 4. The method of claim 1, wherein the intended destination is the user equipment itself, and transmitting the message to the destination comprises retrieving the message from the memory. 5. The method of claim 1, further comprising: prior to receiving the message label from the network node: receiving the message from the network node; determining a message label for the message based on a predetermined mapping; and storing the message in the memory with the determined message label. 6. The method of claim 5, wherein identifying, based on the received message label, a message stored in a memory of the user equipment comprises: comparing the received message label received from the network node to the determined message label determined at the user equipment and stored in the memory of the user equipment; determining that the received message label is the same as the determined message label; and wherein transmitting the message to an intended destination comprises transmitting the message stored in the memory of the user equipment associated with the determined message label to the intended destination. 7. The method of claim 5, wherein receiving the message from the network node comprising eavesdropping on transmissions between the network node and another user equipment. 8. A user equipment in communication with a network node, the user equipment comprising: a memory; a transceiver; and a processor for executing instructions stored in the memory, user equipment configured to: receive a message label from the network node; identify, based on the received message label, a message stored in a memory of the user equipment; transmit the message to an intended destination. 9. The user equipment of claim 8, wherein the user equipment is further configured to: prior to receiving the message label from the network node: receive the message from the network node; determine a message label for the message based on a predetermined mapping; and store the message in the memory with the determined message label. 10. The user equipment of claim 9, wherein identifying, based on the received message label, a message stored in a memory of the user equipment comprises: comparing the received message label received from the network node to the determined message label determined at the user equipment and stored in the memory of the user equipment; determining that the received message label is the same as the determined message label; and wherein transmitting the message to an intended destination comprises transmitting the message stored in the memory of the user equipment associated with the determined message label to the intended destination. 11. The method of claim 9, wherein receiving the message from the network node comprising eavesdropping on transmissions between the network node and another user equipment. 12. A method at a network node of a wireless communications network, the method comprising: receiving a message label from a transmitting network node across a backhaul link; determining that the message label does not coincide with a message stored at the network node; transmitting the message label to a designated user equipment; receiving a message associated with the message label from the designated user equipment; and transmitting the message to an intended user equipment. 13. The method of claim 12, further comprising: receiving an indication that the designated user equipment has left the wireless communications network; transmitting an indication that the designated user equipment has left the wireless communications network across the backhaul link to the transmitting network node. 14. The method of claim 13, further comprising receiving an indication from the transmitting network node of a new designated user equipment, wherein the network node is in wireless communication with the new designated user equipment. 15. The method of claim 14, further comprising: receiving a message from the transmitting network node across the backhaul link; and wirelessly transmitting the message to the new designated user equipment. 16. The method of claim 12, wherein receiving a message label from a transmitting network node across a backhaul link comprises receiving a first message label, and wherein transmitting the message label to a designated user equipment comprises transmitting the first message label to a first designated user equipment; and wherein the method further comprises: receiving a second message label from the transmitting network node via the backhaul link, the second message label different from the first message label; and transmitting the second message label to a second user equipment. 17. The method of claim 12, further comprising: prior to receiving the message label from the transmitting network node via the backhaul link: receiving a message from the transmitting network node via the backhaul link, the message intended for a target user equipment in wireless communication with the network node; and transmitting the message to the target user equipment and to the designated user equipment. 18. A network node of a wireless communications network, the network node comprising: a memory; a transceiver; and a processor for executing instructions stored on the memory; the network node configured to: receive a message label from a transmitting network node across a backhaul link; determine that the message label does not coincide with a message stored at the network node; transmit the message label to a designated user equipment; receive a message associated with the message label from the designated user equipment; and transmit the message to an intended user equipment. 19. The network node of claim 18, further configured to: receive an indication that the designated user equipment has left the wireless communications network; transmit an indication that the designated user equipment has left the wireless communications network across the backhaul link to the transmitting network node. 20. The network node of claim 19, further configured to receive an indication from the transmitting network node of a new designated user equipment, wherein the network node is in wireless communication with the new designated user equipment. 21. The network node of claim 20, further configured to: receive a message from the transmitting network node across the backhaul link; and wirelessly transmit the message to the new designated user equipment. 20. The network node of claim 18, wherein receiving a message label from a transmitting network node across a backhaul link comprises receiving a first message label, and wherein transmitting the message label to a designated user equipment comprises transmitting the first message label to a first designated user equipment; and wherein the network node is further configured to: receive a second message label from the transmitting network node via the backhaul link, the second message label different from the first message label; and transmit the second message label to a second user equipment. 21. The network node of claim 18, further configured to: prior to receiving the message label from the transmitting network node via the backhaul link: receive a message from the transmitting network node via the backhaul link, the message intended for a target user equipment in wireless communication with the network node; and transmit the message to the target user equipment and to the designated user equipment. 22. A method performed at a network node of a wireless communications network, the method comprising: receiving a message; determining a message label for the message; determining that the determined message label is the same as a stored message label that is stored in a memory of the transmitting network node; comparing the received message to a stored message associated with the stored message label; if the received message is the same as the stored message, then transmitting the determined message label to a second network node via a backhaul link; and if the received message is different than the stored message, then transmitting the received message to the second network node via the backhaul link, and storing the received message with the determined message label. 23. The method of claim 22, further comprising: receiving an indication from the second base station that a first designated user equipment is no longer connected to the second base station; transmitting an identification of a new designated user equipment to the second network node. 24. The method of claim 23, further comprising erasing one or more messages and message labels stored in the memory of the network node that coincide with messages and message labels stored in the first designated user equipment. 25. A network node of a wireless communications network, the network node comprising: a memory; a transceiver; and a processor for executing instructions stored on the memory; the network node configured to: receive a message; determine a message label for the message; determine that the determined message label is the same as a stored message label that is stored in a memory of the transmitting network node; compare the received message to a stored message associated with the stored message label; if the received message is the same as the stored message, then transmit the determined message label to a second network node via a backhaul link; and if the received message is different than the stored message, then transmit the received message to the second network node via the backhaul link, and store the received message with the determined message label. 26. The network node of claim 25, further configured to: receive an indication from the second base station that a first designated user equipment is no longer connected to the second base station; transmit an identification of a new designated user equipment to the second network node. 27. The method of claim 26, further configured to erase one or more messages and message labels stored in the memory of the network node that coincide with messages and message labels stored in the first designated user equipment.
2,400
7,058
7,058
14,420,173
2,474
Methods and apparatus are disclosed for steering UEs ( 103 ) connected to a first access point ( 102 ) in a WLAN ( 105 ) to either a cellular network ( 106 ) or a second access point in the WLAN network ( 105 ) having a coverage area overlapping the coverage area of the first access point ( 102 ). After determining a need to steer traffic for one or more UEs ( 103 ) to the cellular network ( 106 ) or the second AP, the first AP ( 102 ) lowers the transmit power of frames transmitted by the first AP ( 102 ) to effectively shrink the size of the first AP's coverage area causing the affected UEs ( 103 ) to reselect the cellular network ( 106 ) or the second AP to maintain service.
1-18. (canceled) 19. A method implemented by a first access point in a Wireless Local Area Network (WLAN) for steering traffic for one or more user equipment (UEs) from the first access point to a cellular network or to a second access point in the WLAN with an overlapping coverage area, said method comprising: determining a need to steer traffic for one or more UEs connected to the first access point to a cellular network or second access point in the WLAN; in response to the determining a need to steer traffic, lowering the transmit power of frames sent by the first access point in the WLAN to steer the one or more UEs to connect to the cellular network or to the second access point. 20. The method of claim 19, wherein the WLAN and the cellular network are operated by the same network operator. 21. The method of claim 19, wherein lowering the transmit power of frames sent by the first access point in the WLAN comprise lowering the transmit power of control frames. 22. The method of claim 21, wherein said control frames comprises at least one of beacon frames and probe response frames sent by the first access point. 23. The method of claim 19, wherein lowering the transmit power of frames sent by the first access point in the WLAN comprise lowering the transmit power of user data frames. 24. The method in claim 23, wherein lowering the transmit power of user data frames comprise lowering the transmit power of user data frames sent by the first access point to all UEs connected to the first access point. 25. The method in claim 23, wherein lowering the transmit power of user data frames comprise lowering the transmit power of user data frames sent by the first access point to selected ones of the UE connected to the first access point. 26. The method of claim 19, further comprising dynamically lowering the transmit power of the frames during one time period and increasing the transmit power of the frames during a second time period. 27. The method of claim 19, wherein determining a need to steer traffic for one or more UE connected to the first access point comprises receiving instructions from a network operator to steer traffic for the one or more UE from the WLAN to the cellular network or to the second access point in the WLAN. 28. A first access point (access point) in a Wireless Local Area Network (WLAN) configured to steer traffic for one or more user equipment (UEs) from the first access point to a cellular network or to a second access point in the WLAN with an overlapping coverage area, said first access point comprising: a transceiver circuit configured to communicate with the one or more UEs in the WLAN; a processing circuit configured to: determine a need to steer traffic for one or more UEs connected to the first access point in the WLAN to a cellular network or second access point in the WLAN; lower the transmit power of frames sent by the first access point in the WLAN to steer the one or more UEs to connect to the cellular network or to the second access point in the WLAN. 29. The first access point (access point) of claim 28, wherein the WLAN and the cellular network are operated by the same network operator. 30. The first access point (access point) of claim 28, wherein said frames comprises control frames. 31. The first access point (access point) of claim 30, wherein said control frames comprise at least one of beacon frames and probe response frames sent by the first access point. 32. The first access point (access point) of claim 28, wherein said frames comprises user data frames. 33. The first access point (access point) of claim 32, wherein said processing circuit is further configured to lower the transmit power of user data frames sent by the first access point to all UE connected to the first access point. 34. The first access point (access point) of claim 32, wherein said processing circuit is further configured to lower the transmit power of user data frames sent by the first access point to selected ones of the UEs connected to the first access point. 35. The first access point (access point) of claim 28, wherein said processing circuit is further configured to dynamically lower the transmit power of the frames during one time period and increase the transmit power of the frames during another time period. 36. The first access point (access point) of claim 28, wherein said processing circuit determines a need to steer traffic for or more UEs by receiving instructions from a network operator to steer traffic for the one or more UEs from the WLAN to the cellular network or to the second access point in the WLAN.
Methods and apparatus are disclosed for steering UEs ( 103 ) connected to a first access point ( 102 ) in a WLAN ( 105 ) to either a cellular network ( 106 ) or a second access point in the WLAN network ( 105 ) having a coverage area overlapping the coverage area of the first access point ( 102 ). After determining a need to steer traffic for one or more UEs ( 103 ) to the cellular network ( 106 ) or the second AP, the first AP ( 102 ) lowers the transmit power of frames transmitted by the first AP ( 102 ) to effectively shrink the size of the first AP's coverage area causing the affected UEs ( 103 ) to reselect the cellular network ( 106 ) or the second AP to maintain service.1-18. (canceled) 19. A method implemented by a first access point in a Wireless Local Area Network (WLAN) for steering traffic for one or more user equipment (UEs) from the first access point to a cellular network or to a second access point in the WLAN with an overlapping coverage area, said method comprising: determining a need to steer traffic for one or more UEs connected to the first access point to a cellular network or second access point in the WLAN; in response to the determining a need to steer traffic, lowering the transmit power of frames sent by the first access point in the WLAN to steer the one or more UEs to connect to the cellular network or to the second access point. 20. The method of claim 19, wherein the WLAN and the cellular network are operated by the same network operator. 21. The method of claim 19, wherein lowering the transmit power of frames sent by the first access point in the WLAN comprise lowering the transmit power of control frames. 22. The method of claim 21, wherein said control frames comprises at least one of beacon frames and probe response frames sent by the first access point. 23. The method of claim 19, wherein lowering the transmit power of frames sent by the first access point in the WLAN comprise lowering the transmit power of user data frames. 24. The method in claim 23, wherein lowering the transmit power of user data frames comprise lowering the transmit power of user data frames sent by the first access point to all UEs connected to the first access point. 25. The method in claim 23, wherein lowering the transmit power of user data frames comprise lowering the transmit power of user data frames sent by the first access point to selected ones of the UE connected to the first access point. 26. The method of claim 19, further comprising dynamically lowering the transmit power of the frames during one time period and increasing the transmit power of the frames during a second time period. 27. The method of claim 19, wherein determining a need to steer traffic for one or more UE connected to the first access point comprises receiving instructions from a network operator to steer traffic for the one or more UE from the WLAN to the cellular network or to the second access point in the WLAN. 28. A first access point (access point) in a Wireless Local Area Network (WLAN) configured to steer traffic for one or more user equipment (UEs) from the first access point to a cellular network or to a second access point in the WLAN with an overlapping coverage area, said first access point comprising: a transceiver circuit configured to communicate with the one or more UEs in the WLAN; a processing circuit configured to: determine a need to steer traffic for one or more UEs connected to the first access point in the WLAN to a cellular network or second access point in the WLAN; lower the transmit power of frames sent by the first access point in the WLAN to steer the one or more UEs to connect to the cellular network or to the second access point in the WLAN. 29. The first access point (access point) of claim 28, wherein the WLAN and the cellular network are operated by the same network operator. 30. The first access point (access point) of claim 28, wherein said frames comprises control frames. 31. The first access point (access point) of claim 30, wherein said control frames comprise at least one of beacon frames and probe response frames sent by the first access point. 32. The first access point (access point) of claim 28, wherein said frames comprises user data frames. 33. The first access point (access point) of claim 32, wherein said processing circuit is further configured to lower the transmit power of user data frames sent by the first access point to all UE connected to the first access point. 34. The first access point (access point) of claim 32, wherein said processing circuit is further configured to lower the transmit power of user data frames sent by the first access point to selected ones of the UEs connected to the first access point. 35. The first access point (access point) of claim 28, wherein said processing circuit is further configured to dynamically lower the transmit power of the frames during one time period and increase the transmit power of the frames during another time period. 36. The first access point (access point) of claim 28, wherein said processing circuit determines a need to steer traffic for or more UEs by receiving instructions from a network operator to steer traffic for the one or more UEs from the WLAN to the cellular network or to the second access point in the WLAN.
2,400
7,059
7,059
12,996,033
2,473
The present invention relates to methods and apparatuses for providing selective network access, wherein a cell type indication is provided based on at least one of a preamble and a header portion of a broadcast signal. At the receiving end, it is checked based on at least one of the preamble and the header portion, whether broadcast signals are received from different first and second cell types. The first cell type is selected for network access, if both broadcast signals from the first and second cell types are received with sufficient strength.
1. A method comprising: receiving broadcast signals from a cellular network; checking based at least one of a preamble and a header portion of said broadcast signals whether said broadcast signals are received from different first and second cell types; and selecting said first cell type for network access, if both broadcast signals from said first and second cell types are received with sufficient strength. 2. The method according to claim 1, wherein said first cell type has a cell size smaller than said second cell type. 3. The method according to claim 1, wherein said checking comprises detecting a predetermined cell type specific preamble or a predetermined cell type specific flag or a predetermined cell type specific header repetition pattern. 4. The method according to claim 3, wherein said cell type specific preamble is identified by a predetermined allocated preamble modulation series. 5. The method according to claim 3, wherein said cell type specific flag is provided in a frame control header. 6. The method according to claim 3, wherein said cell type specific header repetition is performed with a frame control header. 7. The method according to claim 3, wherein said cell type specific header repetition involves a predetermined polarity change. 8. A method comprising: providing a cell type indication based at least one of a preamble and a header portion of a broadcast signal; and transmitting said broadcast signal with a cell type indication set in accordance with a cell type of a cell from which said broadcast signal is transmitted. 9. The method according to claim 8, wherein said cell type indication is adapted to indicate first and second cell types, said first cell type having a cell size smaller than said second cell type. 10. The method according to claim 2, wherein said first cell type is a femto cell and said second cell type is a macro cell. 11. The method according to claim 8, wherein said cell type indication is provided by a predetermined cell type specific preamble or a predetermined cell type specific flag or a predetermined cell type specific header repetition pattern. 12. The method according to claim 11, wherein said cell type specific preamble is identified by a predetermined allocated preamble modulation series. 13. The method according to claim 11, wherein said cell type specific flag is provided in a frame control header. 14. The method according to claim 11, wherein said cell type specific header repetition is performed with a frame control header. 15. The method according to claim 11, wherein said cell type specific header repetition involves a predetermined polarity change. 16. An apparatus comprising: a receiver for receiving broadcast signals from a cellular network; a detector for checking based on a preamble or header portion of said broadcast signals whether said broadcast signals are received from different first and second cell types; and a selector for selecting said first cell type for network access, if both broadcast signals from said first and second cell types are received with sufficient strength. 17. The apparatus according to claim 16, wherein said detector is configured to detect a predetermined cell type specific preamble or a predetermined cell type specific flag or a predetermined cell type specific header repetition pattern. 18. A wireless terminal device comprising an apparatus according to claim 16. 19. An apparatus comprising: an indicator for providing cell type indication based on a preamble or header portion of a broadcast signal; and a transmitter for transmitting said broadcast signal with a cell type indication set in accordance with a cell type of a cell from which said broadcast signal is transmitted. 20. The apparatus according to claim 19, wherein said indicator is configured to provide said cell type indication by a predetermined cell type specific preamble or a predetermined cell type specific flag or a predetermined cell type specific header repetition pattern. 21. (canceled) 22. A chip module comprising an apparatus according to claim 16. 23. A computer program product comprising code means for producing the steps of claim 1 when run on a computer device. 24. An apparatus comprising: indication means for providing cell type indication based on a preamble or header portion of a broadcast signal; and transmitting means for transmitting said broadcast signal with a cell type indication set in accordance with a cell type of a cell from which said broadcast signal is transmitted. 25. (canceled)
The present invention relates to methods and apparatuses for providing selective network access, wherein a cell type indication is provided based on at least one of a preamble and a header portion of a broadcast signal. At the receiving end, it is checked based on at least one of the preamble and the header portion, whether broadcast signals are received from different first and second cell types. The first cell type is selected for network access, if both broadcast signals from the first and second cell types are received with sufficient strength.1. A method comprising: receiving broadcast signals from a cellular network; checking based at least one of a preamble and a header portion of said broadcast signals whether said broadcast signals are received from different first and second cell types; and selecting said first cell type for network access, if both broadcast signals from said first and second cell types are received with sufficient strength. 2. The method according to claim 1, wherein said first cell type has a cell size smaller than said second cell type. 3. The method according to claim 1, wherein said checking comprises detecting a predetermined cell type specific preamble or a predetermined cell type specific flag or a predetermined cell type specific header repetition pattern. 4. The method according to claim 3, wherein said cell type specific preamble is identified by a predetermined allocated preamble modulation series. 5. The method according to claim 3, wherein said cell type specific flag is provided in a frame control header. 6. The method according to claim 3, wherein said cell type specific header repetition is performed with a frame control header. 7. The method according to claim 3, wherein said cell type specific header repetition involves a predetermined polarity change. 8. A method comprising: providing a cell type indication based at least one of a preamble and a header portion of a broadcast signal; and transmitting said broadcast signal with a cell type indication set in accordance with a cell type of a cell from which said broadcast signal is transmitted. 9. The method according to claim 8, wherein said cell type indication is adapted to indicate first and second cell types, said first cell type having a cell size smaller than said second cell type. 10. The method according to claim 2, wherein said first cell type is a femto cell and said second cell type is a macro cell. 11. The method according to claim 8, wherein said cell type indication is provided by a predetermined cell type specific preamble or a predetermined cell type specific flag or a predetermined cell type specific header repetition pattern. 12. The method according to claim 11, wherein said cell type specific preamble is identified by a predetermined allocated preamble modulation series. 13. The method according to claim 11, wherein said cell type specific flag is provided in a frame control header. 14. The method according to claim 11, wherein said cell type specific header repetition is performed with a frame control header. 15. The method according to claim 11, wherein said cell type specific header repetition involves a predetermined polarity change. 16. An apparatus comprising: a receiver for receiving broadcast signals from a cellular network; a detector for checking based on a preamble or header portion of said broadcast signals whether said broadcast signals are received from different first and second cell types; and a selector for selecting said first cell type for network access, if both broadcast signals from said first and second cell types are received with sufficient strength. 17. The apparatus according to claim 16, wherein said detector is configured to detect a predetermined cell type specific preamble or a predetermined cell type specific flag or a predetermined cell type specific header repetition pattern. 18. A wireless terminal device comprising an apparatus according to claim 16. 19. An apparatus comprising: an indicator for providing cell type indication based on a preamble or header portion of a broadcast signal; and a transmitter for transmitting said broadcast signal with a cell type indication set in accordance with a cell type of a cell from which said broadcast signal is transmitted. 20. The apparatus according to claim 19, wherein said indicator is configured to provide said cell type indication by a predetermined cell type specific preamble or a predetermined cell type specific flag or a predetermined cell type specific header repetition pattern. 21. (canceled) 22. A chip module comprising an apparatus according to claim 16. 23. A computer program product comprising code means for producing the steps of claim 1 when run on a computer device. 24. An apparatus comprising: indication means for providing cell type indication based on a preamble or header portion of a broadcast signal; and transmitting means for transmitting said broadcast signal with a cell type indication set in accordance with a cell type of a cell from which said broadcast signal is transmitted. 25. (canceled)
2,400
7,060
7,060
14,520,238
2,442
A system and method for observing and controlling a programmable network via higher layer attributes is disclosed. According to one embodiment, the system includes one or more collectors and a remote network manager. The one or more collectors are configured to receive network traffic data from a plurality of network elements in the network. The remote network manager is configured to connect to the one or more collectors over the Internet via a network interface. The one or more collectors extract metadata from the network traffic data and send the metadata to the network manager.
1. A system for monitoring a network comprising: one or more collectors configured to receive network traffic data from a plurality of network elements in the network; and a remote network manager comprising a network interface and configured to connect to the one or more collectors over the Internet via the network interface, wherein the one or more collectors extract metadata from the network traffic data and send the metadata to the network manager. 2. The system of claim 1, further comprising a programmable controller that controls at least some of the plurality of network elements, wherein the remote network manager controls the plurality of network elements via the programmable controller. 3. The system of claim 1, wherein the one or more collectors receive mirror traffic data from the plurality of network elements. 4. The system of claim 1, wherein the remote network manager or the one or more collectors are further configured to index the network enabling efficient search and retrieval of the metadata. 5. The system of claim 1, wherein the remote network manager is disposed in a cloud. 6. The system of claim 1, further comprising a programmable network element, wherein the remote network manager or the one or more collectors program the programmable network element to configure the programmable network element to send filtered network traffic data to the one or more collectors. 7. The system of claim 1, wherein network analysis is performed using the metadata. 8. The system of claim 6, wherein the remote network manager applies a control loop to determine whether a network control objective is met after programming the programmable network element. 9. The system of claim 1, wherein the one or more collectors are programmable, and wherein the remote network manager programs the one or more collectors to collect different type of metadata. 10. The system of claim 1, wherein the one or more collectors are further configured to receive statistics about the network, topology information about the network, input from one or more enterprise systems, or combinations thereof. 11. The system of claim 10, wherein the remote network manager time-aligns the metadata with data received from the one or more enterprise systems. 12. The system of claim 1, further comprising a programmable network element, wherein the remote network manager affects a network policy by programming the programmable network element or a programmable controller with a control primitive. 13. The system of claim 12, wherein the control primitive includes an access control list (ACL), quality of service (QoS), rate limit settings, or combinations thereof. 14. The system of claim 12, wherein the remote network manager maintains a relationship between a network policy and the control primitive in a database. 15. The system of claim 1, wherein the remote network manager de-duplicates the metadata received from the one or more collectors. 16. The system of claim 1, wherein the remote network manager calculates a quality of experience of a user, an application, or a device, based on the metadata received from the one or more collectors. 17. A method for monitoring a network comprising: providing one or more collectors configured to receive network traffic data from a plurality of network elements in the network; providing a remote network manager comprising a network interface and configured to connect to the one or more collectors over the Internet via the network interface; extracting, at the one or more collectors, metadata from the network traffic data; and sending, at the one or more collectors, the metadata to the remote network manager.
A system and method for observing and controlling a programmable network via higher layer attributes is disclosed. According to one embodiment, the system includes one or more collectors and a remote network manager. The one or more collectors are configured to receive network traffic data from a plurality of network elements in the network. The remote network manager is configured to connect to the one or more collectors over the Internet via a network interface. The one or more collectors extract metadata from the network traffic data and send the metadata to the network manager.1. A system for monitoring a network comprising: one or more collectors configured to receive network traffic data from a plurality of network elements in the network; and a remote network manager comprising a network interface and configured to connect to the one or more collectors over the Internet via the network interface, wherein the one or more collectors extract metadata from the network traffic data and send the metadata to the network manager. 2. The system of claim 1, further comprising a programmable controller that controls at least some of the plurality of network elements, wherein the remote network manager controls the plurality of network elements via the programmable controller. 3. The system of claim 1, wherein the one or more collectors receive mirror traffic data from the plurality of network elements. 4. The system of claim 1, wherein the remote network manager or the one or more collectors are further configured to index the network enabling efficient search and retrieval of the metadata. 5. The system of claim 1, wherein the remote network manager is disposed in a cloud. 6. The system of claim 1, further comprising a programmable network element, wherein the remote network manager or the one or more collectors program the programmable network element to configure the programmable network element to send filtered network traffic data to the one or more collectors. 7. The system of claim 1, wherein network analysis is performed using the metadata. 8. The system of claim 6, wherein the remote network manager applies a control loop to determine whether a network control objective is met after programming the programmable network element. 9. The system of claim 1, wherein the one or more collectors are programmable, and wherein the remote network manager programs the one or more collectors to collect different type of metadata. 10. The system of claim 1, wherein the one or more collectors are further configured to receive statistics about the network, topology information about the network, input from one or more enterprise systems, or combinations thereof. 11. The system of claim 10, wherein the remote network manager time-aligns the metadata with data received from the one or more enterprise systems. 12. The system of claim 1, further comprising a programmable network element, wherein the remote network manager affects a network policy by programming the programmable network element or a programmable controller with a control primitive. 13. The system of claim 12, wherein the control primitive includes an access control list (ACL), quality of service (QoS), rate limit settings, or combinations thereof. 14. The system of claim 12, wherein the remote network manager maintains a relationship between a network policy and the control primitive in a database. 15. The system of claim 1, wherein the remote network manager de-duplicates the metadata received from the one or more collectors. 16. The system of claim 1, wherein the remote network manager calculates a quality of experience of a user, an application, or a device, based on the metadata received from the one or more collectors. 17. A method for monitoring a network comprising: providing one or more collectors configured to receive network traffic data from a plurality of network elements in the network; providing a remote network manager comprising a network interface and configured to connect to the one or more collectors over the Internet via the network interface; extracting, at the one or more collectors, metadata from the network traffic data; and sending, at the one or more collectors, the metadata to the remote network manager.
2,400
7,061
7,061
14,088,358
2,454
A computer-implemented method, operable in a system comprising multiple services, the services running on a plurality of devices, includes tracking first information about requests sent from at least one first service in a first collection of services to at least one second service in a second collection of services, the first collection of services being distinct from the second collection of services; tracking second information from the second collection of services about requests supposedly processed by the second collection of services; and reconciling the first information with the second information. The reconciling may be used to verify or audit information reported by the second collection of services.
1. A computer-implemented method, operable in a system comprising multiple services, said services running on a plurality of devices, the method operable on at least one device comprising hardware including memory and at least one processor, the method comprising: (A) tracking first information about requests sent from at least one first service in a first collection of services to at least one second service in a second collection of services, said first collection of services being distinct from said second collection of services; (B) tracking second information from said second collection of services about requests supposedly processed by the second collection of services; and (C) reconciling the first information with the second information. 2. The method of claim 1 wherein the first collection of services comprise a CDN and wherein the second collection of services comprise CDN services of a party distinct from the CDN operator. 3. The method of claim 2 wherein the second collection of services comprise a delegated CDN of the CDN. 4. The method of claim 2 wherein the second collection of services comprise a sub-CDN of the CDN. 5. The method of claim 2 wherein the second collection of services use at least some of the first collection of services for some CDN functionality. 6. The method of claim 1 wherein the first collection of services comprise a first CDN providing a first at least some CDN services, and wherein the second collection of services comprise second CDN providing a second at least some CDN services, said first CDN being distinct from the second CDN. 7. The method of claim 6 wherein said second CDN uses said first CDN for at least some CDN services. 8. The method of claim 7 wherein the second at least some CDN services provided by the second CDN comprise caching/delivery services, and wherein the first at least some CDN services provided by the first CDN comprise rendezvous services, and wherein the second CDN uses the first CDN to provide rendezvous services. 9. The method of claim 2 wherein said reconciling in (C) is used to verify information reported by the second collection of services. 10. The method of claim 2 wherein said reconciling in (C) is used to determine possible failure of services in the second collection. 11. The method of claim 1 wherein the reconciling in (C) is done by at least one service in said first collection of services. 12. The method of claim 1 wherein the first information comprises a first event stream from said first collection of services and said second information comprises a second event stream from said second collection of services. 13. The method of claim 1 wherein said second collection of services comprise CDN caching/delivery services, and wherein said second information comprises a second event stream about content supposedly delivered by said CDN caching/delivery services. 14. The method of claim 13 wherein the first information corresponds to content that services in the second collection of services were requested to deliver, and wherein said reconciling in (C) verifies that the content that was supposedly to delivered by the CDN caching/delivery services corresponds to content that services in the second collection of services were requested to deliver. 15. The method of claim 14 wherein the first information is based on event information provided by at least one rendezvous service in the first collection of services. 16. The method of claim 11 wherein the second information comprises information for use for control or billing. 17. The method of claim 16 wherein the second information comprises information for use by the first collection for control or billing. 18. A computer-implemented method, operable in a system comprising multiple services, said services running on a plurality of devices, the method operable on at least one device comprising hardware including memory and at least one processor, the method comprising: (A) tracking first information about requests sent from at least one first CD service in a first CDN to at least one second CD service in a second CDN, said first CDN being distinct from said second CDN; (B) tracking second information from said second CDN about requests supposedly processed by the second CDN; and (C) reconciling the first information with the second information. 19. The method of claim 18 wherein the at least one second CD service comprises a cache/delivery service. 20. The method of claim 19 wherein the at least one first CD service comprises a rendezvous service. 21. The method of claim 19 wherein the said reconciling in (C) is used to verify information reported by the second CDN about content supposedly delivered by said second CDN. 22. The method of claim 19 wherein the second information comprises information for use for control or billing for content delivered by said second CDN. 23. A system, operable in a network comprising multiple services, said services running on a plurality of devices, the system comprising: (a) hardware including memory and at least one processor, and (b) a service running on said hardware, wherein said service is configured to: (A) track first information about requests sent from at least one first service in a first collection of services to at least one second service in a second collection of services, said first collection of services being distinct from said second collection of services; (B) track second information from said second collection of services about requests supposedly processed by the second collection of services; and (C) reconcile the first information with the second information. 24. A computer program product having computer readable instructions stored on non-transitory computer readable media, the computer readable instructions including instructions for implementing a computer-implemented method, said method operable on a device comprising hardware including memory and at least one processor and running a service on said hardware, said method, operable in a network comprising multiple services, said services running on a plurality of devices, and said method comprising: (A) tracking first information about requests sent from at least one first service in a first collection of services to at least one second service in a second collection of services, said first collection of services being distinct from said second collection of services; (B) tracking second information from said second collection of services about requests supposedly processed by the second collection of services; and (C) reconciling the first information with the second information.
A computer-implemented method, operable in a system comprising multiple services, the services running on a plurality of devices, includes tracking first information about requests sent from at least one first service in a first collection of services to at least one second service in a second collection of services, the first collection of services being distinct from the second collection of services; tracking second information from the second collection of services about requests supposedly processed by the second collection of services; and reconciling the first information with the second information. The reconciling may be used to verify or audit information reported by the second collection of services.1. A computer-implemented method, operable in a system comprising multiple services, said services running on a plurality of devices, the method operable on at least one device comprising hardware including memory and at least one processor, the method comprising: (A) tracking first information about requests sent from at least one first service in a first collection of services to at least one second service in a second collection of services, said first collection of services being distinct from said second collection of services; (B) tracking second information from said second collection of services about requests supposedly processed by the second collection of services; and (C) reconciling the first information with the second information. 2. The method of claim 1 wherein the first collection of services comprise a CDN and wherein the second collection of services comprise CDN services of a party distinct from the CDN operator. 3. The method of claim 2 wherein the second collection of services comprise a delegated CDN of the CDN. 4. The method of claim 2 wherein the second collection of services comprise a sub-CDN of the CDN. 5. The method of claim 2 wherein the second collection of services use at least some of the first collection of services for some CDN functionality. 6. The method of claim 1 wherein the first collection of services comprise a first CDN providing a first at least some CDN services, and wherein the second collection of services comprise second CDN providing a second at least some CDN services, said first CDN being distinct from the second CDN. 7. The method of claim 6 wherein said second CDN uses said first CDN for at least some CDN services. 8. The method of claim 7 wherein the second at least some CDN services provided by the second CDN comprise caching/delivery services, and wherein the first at least some CDN services provided by the first CDN comprise rendezvous services, and wherein the second CDN uses the first CDN to provide rendezvous services. 9. The method of claim 2 wherein said reconciling in (C) is used to verify information reported by the second collection of services. 10. The method of claim 2 wherein said reconciling in (C) is used to determine possible failure of services in the second collection. 11. The method of claim 1 wherein the reconciling in (C) is done by at least one service in said first collection of services. 12. The method of claim 1 wherein the first information comprises a first event stream from said first collection of services and said second information comprises a second event stream from said second collection of services. 13. The method of claim 1 wherein said second collection of services comprise CDN caching/delivery services, and wherein said second information comprises a second event stream about content supposedly delivered by said CDN caching/delivery services. 14. The method of claim 13 wherein the first information corresponds to content that services in the second collection of services were requested to deliver, and wherein said reconciling in (C) verifies that the content that was supposedly to delivered by the CDN caching/delivery services corresponds to content that services in the second collection of services were requested to deliver. 15. The method of claim 14 wherein the first information is based on event information provided by at least one rendezvous service in the first collection of services. 16. The method of claim 11 wherein the second information comprises information for use for control or billing. 17. The method of claim 16 wherein the second information comprises information for use by the first collection for control or billing. 18. A computer-implemented method, operable in a system comprising multiple services, said services running on a plurality of devices, the method operable on at least one device comprising hardware including memory and at least one processor, the method comprising: (A) tracking first information about requests sent from at least one first CD service in a first CDN to at least one second CD service in a second CDN, said first CDN being distinct from said second CDN; (B) tracking second information from said second CDN about requests supposedly processed by the second CDN; and (C) reconciling the first information with the second information. 19. The method of claim 18 wherein the at least one second CD service comprises a cache/delivery service. 20. The method of claim 19 wherein the at least one first CD service comprises a rendezvous service. 21. The method of claim 19 wherein the said reconciling in (C) is used to verify information reported by the second CDN about content supposedly delivered by said second CDN. 22. The method of claim 19 wherein the second information comprises information for use for control or billing for content delivered by said second CDN. 23. A system, operable in a network comprising multiple services, said services running on a plurality of devices, the system comprising: (a) hardware including memory and at least one processor, and (b) a service running on said hardware, wherein said service is configured to: (A) track first information about requests sent from at least one first service in a first collection of services to at least one second service in a second collection of services, said first collection of services being distinct from said second collection of services; (B) track second information from said second collection of services about requests supposedly processed by the second collection of services; and (C) reconcile the first information with the second information. 24. A computer program product having computer readable instructions stored on non-transitory computer readable media, the computer readable instructions including instructions for implementing a computer-implemented method, said method operable on a device comprising hardware including memory and at least one processor and running a service on said hardware, said method, operable in a network comprising multiple services, said services running on a plurality of devices, and said method comprising: (A) tracking first information about requests sent from at least one first service in a first collection of services to at least one second service in a second collection of services, said first collection of services being distinct from said second collection of services; (B) tracking second information from said second collection of services about requests supposedly processed by the second collection of services; and (C) reconciling the first information with the second information.
2,400
7,062
7,062
14,111,386
2,413
A concept for balancing a load in a mobile communication network, comprising receiving 130 receive data from a radio transceiver using a first interface and determining 140 a first receive data packet and a second receive data packet from the receive data, the first receive data packet and the second receive data packet being associated to different services. The concept comprises forwarding 150 the first receive data packet to a first processing unit using a second interface, and forwarding the second receive data packet to a second processing unit using the second interface.
1. An apparatus for balancing a load in a mobile communication network, comprising: a first interface for communicating with a radio transceiver; a second interface for communicating with a first processing unit and for communicating with a second processing unit; means for receiving a baseband receive signal from the radio transceiver using the first interface; means for determining a first receive data packet and a second receive data packet from the baseband receive signal, the first receive data packet and the second receive data packet being associated to different services; and means for forwarding the first receive data packet to the first processing unit using the second interface, and for forwarding the second receive data packet to the second processing unit using the second interface, wherein the radio transceiver corresponds to a remote radio head of the mobile communication network. 2. The apparatus of claim 1, further comprising: means for receiving a first transmit data packet from the first processing unit using the second interface, means for receiving a second transmit data packet from the second processing unit using the second interface, the first transmit data packet and the second transmit data packet being associated to different services, means for composing a baseband transmit signal based on the first transmit data packet and based on the second transmit data packet; and means for forwarding the baseband transmit signal to the radio transceiver using the first interface. 3. The apparatus of claim 1, wherein the means for determining is adapted for demultiplexing the first and the second receive data packet from the received data. 4. The apparatus of claim 2, wherein the means for composing is adapted for composing the baseband transmit signal by multiplexing the first transmit data packet and the second transmit data packet, the first transmit data packet and the second transmit data packet being associated to different services provided by the mobile communication network in a coverage area of the radio transceiver. 5. The apparatus of claim 1, wherein the radio transceiver corresponds to a transceiver for a GSM- (Global System for Mobile communication), an EDGE (Enhanced Data Rates for GSM Evolution), a UMTS (Universal Mobile Telecommunication System), an LTE- (Long Term Evolution), or an LTE-A- (LTE-Advanced) mobile communication system. 6. The apparatus of claim 1, wherein the first interface corresponds to a common public radio interface (CPRI) and/or the first processing unit and the second processing unit corresponds to baseband units of a mobile communication system, a baseband unit being a processing unit for processing baseband signals of radio signals to be transmitted or having been received in a transmission-band. 7. The apparatus of claim 1, wherein the first interface is adapted for exchanging complex valued digital baseband data with the radio transceiver and wherein the second interface is adapted for exchanging complex valued digital baseband data with the first and the second processing unit and/or wherein the apparatus further comprises a third interface for communicating with another apparatus for exchanging control information. 8. The apparatus of claim 1, wherein the first and the second receive or transmit data packets refer to different radio bearers, a radio bearer being a protocol context for a data service of a user. 9. The apparatus of claim 8, wherein the means for forwarding is adapted for forwarding data packets of different radio bearers received from the radio transceiver to at least two different processing units from a plurality of processing units based on a load balancing criterion. 10. The apparatus of claim 1, wherein the first interface corresponds to an optical interface for optical communication with the radio transceiver, and/or wherein the second interface corresponds to an optical interface for optical communication with the first or the second processing unit. 11. The apparatus of claim 1 being further adapted for performing load balancing, routing, O&M (Operation and Maintenance), cell broadcast functions (Layer 3), call processing for the RRC protocol (Radio Resource Control), and/or multi cell packet scheduling. 12. A remote radio head (300) for communicating radio signals, a radio signal being received or transmitted from or to a plurality of transceivers, comprising: means for receiving a receive signal in a transmission-band; means for converting the receive signal from the transmission-band to a baseband to obtain a baseband receive signal; means for determining a first receive data packet and a second receive data packet from the baseband receive signal, the first receive data packet and the second receive data packet being associated to different services; an interface for communicating with a load balancing entity; and means for forwarding the first and the second receive data packet to the load balancing entity using the interface. 13. The remote radio head of claim 12, further comprising: means for obtaining a first transmit data packet and a second transmit data packet from the load balancing entity using the interface; means for composing a baseband transmit signal based on the first transmit data packet and the second transmit data packet; means for converting the transmit baseband signal to a transmit signal in the transmission-band; and means for transmitting the signal in the transmission-band. 14. The remote radio head of claim 12, further comprising a power amplifier for signal transmission and means for antenna processing. 15. A baseband unit for processing a baseband receive signal, the baseband receive signal comprising a plurality of data packets, the baseband unit comprising: an interface for receiving the baseband receive signal from a load balancing entity; means for determining a first receive data packet and a second receive data packet from the baseband receive signal, the first receive data packet and the second receive data packet being associated to different services; and means for processing the first receive data packet and for processing the second receive data packet. 16. The baseband unit of claim 15 further comprising: means for receiving a first transmit data packet; means for receiving a second transmit data packet; means for composing a baseband transmit signal based on the first transmit data packet and based on the second transmit data packet; and means for providing the baseband transmit signal to the load balancing entity using the interface. 17. The baseband unit of claim 15, further being adapted for performing signal processing according to PHY (Physical Layer Protocol), MAC (Medium Access Control protocol), RLC (Radio Link Control protocol) for a radio bearer and/or cell broadcast functions. 18. A method for balancing a load in a mobile communication network, comprising: receiving receive data from a radio transceiver using a first interface; determining a first receive data packet and a second receive data packet from the receive data, the first receive data packet and the second receive data packet being associated to different services; and forwarding the first receive data packet to a first processing unit using a second interface, and forwarding the second receive data packet to a second processing unit using the second interface. 19. The method of claim 18, further comprising: receiving a first transmit data packet from the first processing unit using the second interface, receiving a second transmit data packet from the second processing unit using the second interface, the first transmit data packet and the second transmit data packet being associated to different services, composing baseband transmit signal based on the first transmit data packet and based on the second transmit data packet; and forwarding the baseband transmit signal to the radio transceiver using the first interface. 20. System for cloud computing in a mobile communication network, the system comprising at least one of an apparatus for balancing a load according to claim 1, a remote radio head comprising means for receiving a receive signal in a transmission-band, means for converting the receive signal from the transmission-band to a baseband to obtain a baseband receive signal, means for determining a first receive data packet and a second receive data packet from the baseband receive signal, the first receive data packet and the second receive data packet being associated to different services, an interface for communicating with a load balancing entity, and means for forwarding the first and the second receive data packet to the load balancing entity using the interface, and, a baseband processing unit comprising an interface for receiving the baseband receive signal from a load balancing entity, means for determining a first receive data packet and a second receive data packet from the baseband receive signal, the first receive data packet and the second receive data packet being associated to different services, and means for processing the first receive data packet and for processing the second receive data packet. 21. Method for cloud computing in a mobile communication network, comprising: demultiplexing a signal from a radio cell to obtain demultiplexed packets; and routing the demultiplexed packets to different processing units. 22. A computer program having a program code for performing the method of claim 18 when the computer program is executed on a computer or processor. 23. A computer program having a program code for performing the method of claim 21 when the computer program is executed on a computer or processor.
A concept for balancing a load in a mobile communication network, comprising receiving 130 receive data from a radio transceiver using a first interface and determining 140 a first receive data packet and a second receive data packet from the receive data, the first receive data packet and the second receive data packet being associated to different services. The concept comprises forwarding 150 the first receive data packet to a first processing unit using a second interface, and forwarding the second receive data packet to a second processing unit using the second interface.1. An apparatus for balancing a load in a mobile communication network, comprising: a first interface for communicating with a radio transceiver; a second interface for communicating with a first processing unit and for communicating with a second processing unit; means for receiving a baseband receive signal from the radio transceiver using the first interface; means for determining a first receive data packet and a second receive data packet from the baseband receive signal, the first receive data packet and the second receive data packet being associated to different services; and means for forwarding the first receive data packet to the first processing unit using the second interface, and for forwarding the second receive data packet to the second processing unit using the second interface, wherein the radio transceiver corresponds to a remote radio head of the mobile communication network. 2. The apparatus of claim 1, further comprising: means for receiving a first transmit data packet from the first processing unit using the second interface, means for receiving a second transmit data packet from the second processing unit using the second interface, the first transmit data packet and the second transmit data packet being associated to different services, means for composing a baseband transmit signal based on the first transmit data packet and based on the second transmit data packet; and means for forwarding the baseband transmit signal to the radio transceiver using the first interface. 3. The apparatus of claim 1, wherein the means for determining is adapted for demultiplexing the first and the second receive data packet from the received data. 4. The apparatus of claim 2, wherein the means for composing is adapted for composing the baseband transmit signal by multiplexing the first transmit data packet and the second transmit data packet, the first transmit data packet and the second transmit data packet being associated to different services provided by the mobile communication network in a coverage area of the radio transceiver. 5. The apparatus of claim 1, wherein the radio transceiver corresponds to a transceiver for a GSM- (Global System for Mobile communication), an EDGE (Enhanced Data Rates for GSM Evolution), a UMTS (Universal Mobile Telecommunication System), an LTE- (Long Term Evolution), or an LTE-A- (LTE-Advanced) mobile communication system. 6. The apparatus of claim 1, wherein the first interface corresponds to a common public radio interface (CPRI) and/or the first processing unit and the second processing unit corresponds to baseband units of a mobile communication system, a baseband unit being a processing unit for processing baseband signals of radio signals to be transmitted or having been received in a transmission-band. 7. The apparatus of claim 1, wherein the first interface is adapted for exchanging complex valued digital baseband data with the radio transceiver and wherein the second interface is adapted for exchanging complex valued digital baseband data with the first and the second processing unit and/or wherein the apparatus further comprises a third interface for communicating with another apparatus for exchanging control information. 8. The apparatus of claim 1, wherein the first and the second receive or transmit data packets refer to different radio bearers, a radio bearer being a protocol context for a data service of a user. 9. The apparatus of claim 8, wherein the means for forwarding is adapted for forwarding data packets of different radio bearers received from the radio transceiver to at least two different processing units from a plurality of processing units based on a load balancing criterion. 10. The apparatus of claim 1, wherein the first interface corresponds to an optical interface for optical communication with the radio transceiver, and/or wherein the second interface corresponds to an optical interface for optical communication with the first or the second processing unit. 11. The apparatus of claim 1 being further adapted for performing load balancing, routing, O&M (Operation and Maintenance), cell broadcast functions (Layer 3), call processing for the RRC protocol (Radio Resource Control), and/or multi cell packet scheduling. 12. A remote radio head (300) for communicating radio signals, a radio signal being received or transmitted from or to a plurality of transceivers, comprising: means for receiving a receive signal in a transmission-band; means for converting the receive signal from the transmission-band to a baseband to obtain a baseband receive signal; means for determining a first receive data packet and a second receive data packet from the baseband receive signal, the first receive data packet and the second receive data packet being associated to different services; an interface for communicating with a load balancing entity; and means for forwarding the first and the second receive data packet to the load balancing entity using the interface. 13. The remote radio head of claim 12, further comprising: means for obtaining a first transmit data packet and a second transmit data packet from the load balancing entity using the interface; means for composing a baseband transmit signal based on the first transmit data packet and the second transmit data packet; means for converting the transmit baseband signal to a transmit signal in the transmission-band; and means for transmitting the signal in the transmission-band. 14. The remote radio head of claim 12, further comprising a power amplifier for signal transmission and means for antenna processing. 15. A baseband unit for processing a baseband receive signal, the baseband receive signal comprising a plurality of data packets, the baseband unit comprising: an interface for receiving the baseband receive signal from a load balancing entity; means for determining a first receive data packet and a second receive data packet from the baseband receive signal, the first receive data packet and the second receive data packet being associated to different services; and means for processing the first receive data packet and for processing the second receive data packet. 16. The baseband unit of claim 15 further comprising: means for receiving a first transmit data packet; means for receiving a second transmit data packet; means for composing a baseband transmit signal based on the first transmit data packet and based on the second transmit data packet; and means for providing the baseband transmit signal to the load balancing entity using the interface. 17. The baseband unit of claim 15, further being adapted for performing signal processing according to PHY (Physical Layer Protocol), MAC (Medium Access Control protocol), RLC (Radio Link Control protocol) for a radio bearer and/or cell broadcast functions. 18. A method for balancing a load in a mobile communication network, comprising: receiving receive data from a radio transceiver using a first interface; determining a first receive data packet and a second receive data packet from the receive data, the first receive data packet and the second receive data packet being associated to different services; and forwarding the first receive data packet to a first processing unit using a second interface, and forwarding the second receive data packet to a second processing unit using the second interface. 19. The method of claim 18, further comprising: receiving a first transmit data packet from the first processing unit using the second interface, receiving a second transmit data packet from the second processing unit using the second interface, the first transmit data packet and the second transmit data packet being associated to different services, composing baseband transmit signal based on the first transmit data packet and based on the second transmit data packet; and forwarding the baseband transmit signal to the radio transceiver using the first interface. 20. System for cloud computing in a mobile communication network, the system comprising at least one of an apparatus for balancing a load according to claim 1, a remote radio head comprising means for receiving a receive signal in a transmission-band, means for converting the receive signal from the transmission-band to a baseband to obtain a baseband receive signal, means for determining a first receive data packet and a second receive data packet from the baseband receive signal, the first receive data packet and the second receive data packet being associated to different services, an interface for communicating with a load balancing entity, and means for forwarding the first and the second receive data packet to the load balancing entity using the interface, and, a baseband processing unit comprising an interface for receiving the baseband receive signal from a load balancing entity, means for determining a first receive data packet and a second receive data packet from the baseband receive signal, the first receive data packet and the second receive data packet being associated to different services, and means for processing the first receive data packet and for processing the second receive data packet. 21. Method for cloud computing in a mobile communication network, comprising: demultiplexing a signal from a radio cell to obtain demultiplexed packets; and routing the demultiplexed packets to different processing units. 22. A computer program having a program code for performing the method of claim 18 when the computer program is executed on a computer or processor. 23. A computer program having a program code for performing the method of claim 21 when the computer program is executed on a computer or processor.
2,400
7,063
7,063
14,777,969
2,461
A mobile server for managing the connectivity of a terminal for communicating through one or more communications networks, includes: a terminal communication module to communicate with the terminal; network communication modules to communicate with telecommunications networks; and a storage area, in which connectivity parameter values of the terminal are stored, the values enabling the terminal to be connected to the mobile server. The mobile server is configured to be connected to a plurality of telecommunications networks via the network communication modules, to extract a set of connectivity parameter values of the terminal from the storage area, and to allow or not allow, based on the extracted set of connectivity parameter values, the connection of the terminal via at least one of the terminal communication modules, so that the terminal communicates applicative data through a telecommunications network via the terminal communication module and one of the network communication modules.
1. A mobile server for managing the connectivity of at least one terminal for communicating through one or a plurality of telecommunications networks, the mobile server comprising: at least one terminal communication module configured to communicate with said terminal; a plurality of network communication modules configured to communicate with a plurality of telecommunications networks; a storage area in which are stored connectivity parameter values of the terminal enabling the terminal to connect to the mobile server, the mobile server being configured to: connect to the plurality of telecommunications networks via the plurality of network communication modules, extract a set of connectivity parameter values of the terminal from the storage area, allow or not allow, on the basis of the extracted set of connectivity parameter values, a connection of the terminal via at least one of the terminal communication modules so that the terminal communicates applicative data through at least one of the telecommunications networks via said at least one of the terminal communication modules and at least one of the network communication modules. 2. The mobile server according to claim 1, wherein the connectivity parameters are organised in the storage area in the form of a tree structure including a plurality of hierarchized objects each grouping together one or a plurality of connectivity parameters. 3. The mobile server according to claim 2, wherein the tree structure is based on the Open Mobile Alliance (OMA) model and wherein the objects are manipulated using the Open Mobile Alliance Device Management protocol. 4. The mobile server according to claim 1, wherein said mobile server is configured to establish a connection with a terminal via at least one of the terminal communication modules, to exchange information items enabling the access control of the terminal and/or a network addressing configuration of the terminal. 5. The mobile server according to claim 1, wherein said mobile server is configured to analyse and/or to compare an information item received from a terminal enabling the access control of said terminal from the set of connectivity parameter values extracted from the storage area. 6. The mobile server according to claim 1, wherein said mobile server is configured to determine a network addressing configuration of the terminal from a set of network addressing configuration parameter values extracted from the storage area. 7. The mobile server according to claim 1, wherein said mobile server is configured to enable the authentication of the terminal locally from authentication parameters stored in the storage area or instead remotely while communicating with an authentication server situated in one of the networks. 8. A system for managing the connectivity of at least one terminal to at least one telecommunications network, said system comprising: at least one telecommunications network; a mobile server according to claim 1, at least one terminal configured to: establish a connection via at least one of the terminal communication modules to exchange information items enabling access control of said terminal and/or a network addressing configuration of said terminal and/or, communicate applicative data through at least one of the telecommunications networks via at least one of the terminal communication modules and at least one of the network communication modules. 9. A method, implemented by a mobile server according to claim 1, for managing the connectivity of at least one terminal for the communication of the terminal via the mobile server through one or a plurality of telecommunications networks, the method comprising: connecting to at least one of a plurality of telecommunications networks via at least one of the plurality of network communication modules, extracting a set of connectivity parameter values of the terminal from the storage area, allowing or not allowing, from the extracted set of connectivity parameter values, the connection of the terminal via at least one of the terminal communication modules so that the terminal communicates applicative data through at least one of the telecommunications networks via said at least one of the terminal communication modules and at least one of the network communication modules 10. The method according to claim 9, the method comprising: connecting the terminal via at least one of the terminal communication modules to exchange information items enabling the access control of the terminal and/or a network addressing configuration of the terminal and/or, analysing and/or filtering an information item received enabling the access control of a terminal from the set of connectivity parameter values extracted from the storage area, and/or, determining the network addressing configuration of a terminal from a set of network addressing configuration parameter values extracted from the storage area, and/or supplying to the terminal one or more values of the set of connectivity parameter values extracted from the storage area, and/or, authenticating the terminal, locally from authentication parameters stored in the storage area or instead remotely while communicating with an authentication server situated in one of the networks and/or, communication of a terminal through the network or networks via the terminal communication module and at least one network communication module. 11. A non-transitory machine readable support comprising instructions executable by a computer for the implementation of the method according to claim 9. 12. The mobile server according to claim 4, wherein the at least one of the terminal communication modules is of WLAN or LAN type. 13. The method according to claim 10, wherein authenticating the terminal, locally from authentication parameters stored in the storage area or instead remotely while communicating with an authentication server situated in one of the networks is done using an authentication protocol based on the known norm 802.1x.
A mobile server for managing the connectivity of a terminal for communicating through one or more communications networks, includes: a terminal communication module to communicate with the terminal; network communication modules to communicate with telecommunications networks; and a storage area, in which connectivity parameter values of the terminal are stored, the values enabling the terminal to be connected to the mobile server. The mobile server is configured to be connected to a plurality of telecommunications networks via the network communication modules, to extract a set of connectivity parameter values of the terminal from the storage area, and to allow or not allow, based on the extracted set of connectivity parameter values, the connection of the terminal via at least one of the terminal communication modules, so that the terminal communicates applicative data through a telecommunications network via the terminal communication module and one of the network communication modules.1. A mobile server for managing the connectivity of at least one terminal for communicating through one or a plurality of telecommunications networks, the mobile server comprising: at least one terminal communication module configured to communicate with said terminal; a plurality of network communication modules configured to communicate with a plurality of telecommunications networks; a storage area in which are stored connectivity parameter values of the terminal enabling the terminal to connect to the mobile server, the mobile server being configured to: connect to the plurality of telecommunications networks via the plurality of network communication modules, extract a set of connectivity parameter values of the terminal from the storage area, allow or not allow, on the basis of the extracted set of connectivity parameter values, a connection of the terminal via at least one of the terminal communication modules so that the terminal communicates applicative data through at least one of the telecommunications networks via said at least one of the terminal communication modules and at least one of the network communication modules. 2. The mobile server according to claim 1, wherein the connectivity parameters are organised in the storage area in the form of a tree structure including a plurality of hierarchized objects each grouping together one or a plurality of connectivity parameters. 3. The mobile server according to claim 2, wherein the tree structure is based on the Open Mobile Alliance (OMA) model and wherein the objects are manipulated using the Open Mobile Alliance Device Management protocol. 4. The mobile server according to claim 1, wherein said mobile server is configured to establish a connection with a terminal via at least one of the terminal communication modules, to exchange information items enabling the access control of the terminal and/or a network addressing configuration of the terminal. 5. The mobile server according to claim 1, wherein said mobile server is configured to analyse and/or to compare an information item received from a terminal enabling the access control of said terminal from the set of connectivity parameter values extracted from the storage area. 6. The mobile server according to claim 1, wherein said mobile server is configured to determine a network addressing configuration of the terminal from a set of network addressing configuration parameter values extracted from the storage area. 7. The mobile server according to claim 1, wherein said mobile server is configured to enable the authentication of the terminal locally from authentication parameters stored in the storage area or instead remotely while communicating with an authentication server situated in one of the networks. 8. A system for managing the connectivity of at least one terminal to at least one telecommunications network, said system comprising: at least one telecommunications network; a mobile server according to claim 1, at least one terminal configured to: establish a connection via at least one of the terminal communication modules to exchange information items enabling access control of said terminal and/or a network addressing configuration of said terminal and/or, communicate applicative data through at least one of the telecommunications networks via at least one of the terminal communication modules and at least one of the network communication modules. 9. A method, implemented by a mobile server according to claim 1, for managing the connectivity of at least one terminal for the communication of the terminal via the mobile server through one or a plurality of telecommunications networks, the method comprising: connecting to at least one of a plurality of telecommunications networks via at least one of the plurality of network communication modules, extracting a set of connectivity parameter values of the terminal from the storage area, allowing or not allowing, from the extracted set of connectivity parameter values, the connection of the terminal via at least one of the terminal communication modules so that the terminal communicates applicative data through at least one of the telecommunications networks via said at least one of the terminal communication modules and at least one of the network communication modules 10. The method according to claim 9, the method comprising: connecting the terminal via at least one of the terminal communication modules to exchange information items enabling the access control of the terminal and/or a network addressing configuration of the terminal and/or, analysing and/or filtering an information item received enabling the access control of a terminal from the set of connectivity parameter values extracted from the storage area, and/or, determining the network addressing configuration of a terminal from a set of network addressing configuration parameter values extracted from the storage area, and/or supplying to the terminal one or more values of the set of connectivity parameter values extracted from the storage area, and/or, authenticating the terminal, locally from authentication parameters stored in the storage area or instead remotely while communicating with an authentication server situated in one of the networks and/or, communication of a terminal through the network or networks via the terminal communication module and at least one network communication module. 11. A non-transitory machine readable support comprising instructions executable by a computer for the implementation of the method according to claim 9. 12. The mobile server according to claim 4, wherein the at least one of the terminal communication modules is of WLAN or LAN type. 13. The method according to claim 10, wherein authenticating the terminal, locally from authentication parameters stored in the storage area or instead remotely while communicating with an authentication server situated in one of the networks is done using an authentication protocol based on the known norm 802.1x.
2,400
7,064
7,064
14,564,447
2,449
Embodiments of the invention provide for hybrid Web Storage performing mixed utilization of a localStorage object and remote storage. A method for hybrid Web Storage performing mixed utilization of a hypertext markup language (HTML) version 5 localStorage object and remote storage includes receiving a cache request in a key usage engine of a mobile device by an application executing in the mobile device. The method further includes determining in the key usage engine based upon at least detected network connectivity whether to process the cache request in a localStorage object of the mobile device, or to process the cache request in remote storage external from the mobile device over a computer communications network. Finally, the method includes processing the cache request in the localStorage object of the mobile device responsive to a determination by the key usage engine to process the cache request locally, but otherwise processing the cache request in the remote storage.
1. A method for hybrid Web Storage performing mixed utilization of a localStorage object and remote storage, the method comprising: receiving a cache request in a key usage engine of a mobile device by an application executing in the mobile device; determining in the key usage engine based upon at least detected network connectivity whether to process the cache request in a hypertext markup language (HTML) version 5 localStorage object of the mobile device, or to process the cache request in remote storage external from the mobile device over a computer communications network; and, processing the cache request in the localStorage object of the mobile device responsive to a determination by the key usage engine to process the cache request locally, but otherwise processing the cache request in the remote storage. 2. The method of claim 1, wherein the key usage engine determines whether to process the cache request locally in the localStorage object or remotely in remote storage in reference not only to detected network connectivity, but also in reference to a frequency of receipt of the cache request. 3. The method of claim 1, wherein the key usage engine determines whether to process the cache request locally in the localStorage object or remotely in remote storage in reference not only to detected network connectivity, but also in reference to whether data subject to the cache request is data of interest only to the mobile device or whether data subject to the cache request is data of interest to multiple different applications executing in multiple different mobile devices. 4. The method of claim 1, wherein the cache request is a hypertext transport protocol (HTTP) PUT request for a particular key-value pair. 5. The method of claim 1, wherein the cache request is a hypertext transport protocol (HTTP) GET request for a particular key-value pair. 6. The method of claim 4, wherein the PUT request is processed in the remote storage by way of a store and forward queue. 7. A content retrieval data processing system configured for hybrid Web Storage performing mixed utilization of a localStorage object and remote storage, the system comprising: a mobile device comprising at least one processor and memory; an application executing in the memory of the mobile device; a hypertext markup language (HTML) version 5 localStorage object defined in the memory of the mobile device; and, a key usage engine comprising program code enabled upon execution in the memory of the mobile device to receive a cache request by the application, to determine based upon at least detected network connectivity of the mobile device whether to process the cache request in the localStorage object, or to process the cache request in remote storage external from the mobile device over a computer communications network, and to process the cache request in the localStorage object responsive to a determination to process the cache request locally, but otherwise processing the cache request in the remote storage. 8. The system of claim 7, wherein the key usage engine determines whether to process the cache request locally in the localStorage object or remotely in remote storage in reference not only to detected network connectivity, but also in reference to a frequency of receipt of the cache request. 9. The system of claim 7, wherein the key usage engine determines whether to process the cache request locally in the localStorage object or remotely in remote storage in reference not only to detected network connectivity, but also in reference to whether data subject to the cache request is data of interest only to the mobile device or whether data subject to the cache request is data of interest to multiple different applications executing in multiple different mobile devices. 10. The system of claim 7, wherein the cache request is a hypertext transport protocol (HTTP) PUT request for a particular key-value pair. 11. The system of claim 7, wherein the cache request is a hypertext transport protocol (HTTP) GET request for a particular key-value pair. 12. The system of claim 10, wherein the PUT request is processed in the remote storage by way of a store and forward queue. 13. A computer program product for hybrid Web Storage performing mixed utilization of a localStorage object and remote storage, the computer program product comprising a computer readable storage medium having program instructions embodied therewith, the program instructions executable by a device to cause the device to perform a method comprising: receiving a cache request in a key usage engine of a mobile device by an application executing in the mobile device; determining in the key usage engine based upon at least detected network connectivity whether to process the cache request in a hypertext markup language (HTML) version 5 localStorage object of the mobile device, or to process the cache request in remote storage external from the mobile device over a computer communications network; and, processing the cache request in the localStorage object of the mobile device responsive to a determination by the key usage engine to process the cache request locally, but otherwise processing the cache request in the remote storage. 14. The computer program product of claim 13, wherein the key usage engine determines whether to process the cache request locally in the localStorage object or remotely in remote storage in reference not only to detected network connectivity, but also in reference to a frequency of receipt of the cache request. 15. The computer program product of claim 13, wherein the key usage engine determines whether to process the cache request locally in the localStorage object or remotely in remote storage in reference not only to detected network connectivity, but also in reference to whether data subject to the cache request is data of interest only to the mobile device or whether data subject to the cache request is data of interest to multiple different applications executing in multiple different mobile devices. 16. The computer program product of claim 13, wherein the cache request is a hypertext transport protocol (HTTP) PUT request for a particular key-value pair. 17. The computer program product of claim 13, wherein the cache request is a hypertext transport protocol (HTTP) GET request for a particular key-value pair. 18. The computer program product of claim 16, wherein the PUT request is processed in the remote storage by way of a store and forward queue.
Embodiments of the invention provide for hybrid Web Storage performing mixed utilization of a localStorage object and remote storage. A method for hybrid Web Storage performing mixed utilization of a hypertext markup language (HTML) version 5 localStorage object and remote storage includes receiving a cache request in a key usage engine of a mobile device by an application executing in the mobile device. The method further includes determining in the key usage engine based upon at least detected network connectivity whether to process the cache request in a localStorage object of the mobile device, or to process the cache request in remote storage external from the mobile device over a computer communications network. Finally, the method includes processing the cache request in the localStorage object of the mobile device responsive to a determination by the key usage engine to process the cache request locally, but otherwise processing the cache request in the remote storage.1. A method for hybrid Web Storage performing mixed utilization of a localStorage object and remote storage, the method comprising: receiving a cache request in a key usage engine of a mobile device by an application executing in the mobile device; determining in the key usage engine based upon at least detected network connectivity whether to process the cache request in a hypertext markup language (HTML) version 5 localStorage object of the mobile device, or to process the cache request in remote storage external from the mobile device over a computer communications network; and, processing the cache request in the localStorage object of the mobile device responsive to a determination by the key usage engine to process the cache request locally, but otherwise processing the cache request in the remote storage. 2. The method of claim 1, wherein the key usage engine determines whether to process the cache request locally in the localStorage object or remotely in remote storage in reference not only to detected network connectivity, but also in reference to a frequency of receipt of the cache request. 3. The method of claim 1, wherein the key usage engine determines whether to process the cache request locally in the localStorage object or remotely in remote storage in reference not only to detected network connectivity, but also in reference to whether data subject to the cache request is data of interest only to the mobile device or whether data subject to the cache request is data of interest to multiple different applications executing in multiple different mobile devices. 4. The method of claim 1, wherein the cache request is a hypertext transport protocol (HTTP) PUT request for a particular key-value pair. 5. The method of claim 1, wherein the cache request is a hypertext transport protocol (HTTP) GET request for a particular key-value pair. 6. The method of claim 4, wherein the PUT request is processed in the remote storage by way of a store and forward queue. 7. A content retrieval data processing system configured for hybrid Web Storage performing mixed utilization of a localStorage object and remote storage, the system comprising: a mobile device comprising at least one processor and memory; an application executing in the memory of the mobile device; a hypertext markup language (HTML) version 5 localStorage object defined in the memory of the mobile device; and, a key usage engine comprising program code enabled upon execution in the memory of the mobile device to receive a cache request by the application, to determine based upon at least detected network connectivity of the mobile device whether to process the cache request in the localStorage object, or to process the cache request in remote storage external from the mobile device over a computer communications network, and to process the cache request in the localStorage object responsive to a determination to process the cache request locally, but otherwise processing the cache request in the remote storage. 8. The system of claim 7, wherein the key usage engine determines whether to process the cache request locally in the localStorage object or remotely in remote storage in reference not only to detected network connectivity, but also in reference to a frequency of receipt of the cache request. 9. The system of claim 7, wherein the key usage engine determines whether to process the cache request locally in the localStorage object or remotely in remote storage in reference not only to detected network connectivity, but also in reference to whether data subject to the cache request is data of interest only to the mobile device or whether data subject to the cache request is data of interest to multiple different applications executing in multiple different mobile devices. 10. The system of claim 7, wherein the cache request is a hypertext transport protocol (HTTP) PUT request for a particular key-value pair. 11. The system of claim 7, wherein the cache request is a hypertext transport protocol (HTTP) GET request for a particular key-value pair. 12. The system of claim 10, wherein the PUT request is processed in the remote storage by way of a store and forward queue. 13. A computer program product for hybrid Web Storage performing mixed utilization of a localStorage object and remote storage, the computer program product comprising a computer readable storage medium having program instructions embodied therewith, the program instructions executable by a device to cause the device to perform a method comprising: receiving a cache request in a key usage engine of a mobile device by an application executing in the mobile device; determining in the key usage engine based upon at least detected network connectivity whether to process the cache request in a hypertext markup language (HTML) version 5 localStorage object of the mobile device, or to process the cache request in remote storage external from the mobile device over a computer communications network; and, processing the cache request in the localStorage object of the mobile device responsive to a determination by the key usage engine to process the cache request locally, but otherwise processing the cache request in the remote storage. 14. The computer program product of claim 13, wherein the key usage engine determines whether to process the cache request locally in the localStorage object or remotely in remote storage in reference not only to detected network connectivity, but also in reference to a frequency of receipt of the cache request. 15. The computer program product of claim 13, wherein the key usage engine determines whether to process the cache request locally in the localStorage object or remotely in remote storage in reference not only to detected network connectivity, but also in reference to whether data subject to the cache request is data of interest only to the mobile device or whether data subject to the cache request is data of interest to multiple different applications executing in multiple different mobile devices. 16. The computer program product of claim 13, wherein the cache request is a hypertext transport protocol (HTTP) PUT request for a particular key-value pair. 17. The computer program product of claim 13, wherein the cache request is a hypertext transport protocol (HTTP) GET request for a particular key-value pair. 18. The computer program product of claim 16, wherein the PUT request is processed in the remote storage by way of a store and forward queue.
2,400
7,065
7,065
14,463,488
2,446
Embodiments of the present invention provide improved systems and methods for a programmable portable electronic device for airborne operational communications. In one embodiment, a system for preventing unauthorized access to operational aircraft data comprises a personal electronic device and a plurality of aircraft systems that produce avionic operational data. The system further comprises an airborne server in network communication with the personal electronic device and the plurality of aircraft systems, wherein the airborne server implements security measures to prevent unauthorized electronic devices from accessing the avionic operational data, wherein the airborne server controls the dissemination of avionic operational data to electronic devices.
1. A system for preventing unauthorized access to operational aircraft data, the system comprising: a personal electronic device; a plurality of aircraft systems that produce avionic operational data; and an airborne server in communication with the personal electronic device and the plurality of aircraft systems, wherein the airborne server implements security measures to prevent unauthorized electronic devices from accessing the avionic operational data, wherein the airborne server controls the dissemination of avionic operational data to electronic devices, wherein the airborne server is in unidirectional communication with the plurality of aircraft systems, wherein the plurality of aircraft systems transmit avionic operational data to the airborne server. 2. (canceled) 3. The system of claim 1, wherein the airborne server isolates communication between the airborne server and the personal electronic device from communication with the plurality of aircraft systems. 4. The system of claim 1, wherein the airborne server verifies that the personal electronic device is trusted before initiating communication with the personal electronic device. 5. The system of claim 4, wherein the airborne server determines whether the personal electronic device is trusted by receiving an identification key from the personal electronic device. 6. The system of claim 4, wherein the airborne server determines whether the personal electronic device is trusted through the logging in of a user through the personal electronic device. 7. The system of claim 1, wherein the personal electronic device and the airborne server communicate over at least one wired connection. 8. The system of claim 1, wherein the personal electronic device and the airborne server communicate over at least one wireless connection. 9. The system of claim 1, wherein the airborne server prevents the personal electronic device from establishing communication links with unauthorized electronic devices.
Embodiments of the present invention provide improved systems and methods for a programmable portable electronic device for airborne operational communications. In one embodiment, a system for preventing unauthorized access to operational aircraft data comprises a personal electronic device and a plurality of aircraft systems that produce avionic operational data. The system further comprises an airborne server in network communication with the personal electronic device and the plurality of aircraft systems, wherein the airborne server implements security measures to prevent unauthorized electronic devices from accessing the avionic operational data, wherein the airborne server controls the dissemination of avionic operational data to electronic devices.1. A system for preventing unauthorized access to operational aircraft data, the system comprising: a personal electronic device; a plurality of aircraft systems that produce avionic operational data; and an airborne server in communication with the personal electronic device and the plurality of aircraft systems, wherein the airborne server implements security measures to prevent unauthorized electronic devices from accessing the avionic operational data, wherein the airborne server controls the dissemination of avionic operational data to electronic devices, wherein the airborne server is in unidirectional communication with the plurality of aircraft systems, wherein the plurality of aircraft systems transmit avionic operational data to the airborne server. 2. (canceled) 3. The system of claim 1, wherein the airborne server isolates communication between the airborne server and the personal electronic device from communication with the plurality of aircraft systems. 4. The system of claim 1, wherein the airborne server verifies that the personal electronic device is trusted before initiating communication with the personal electronic device. 5. The system of claim 4, wherein the airborne server determines whether the personal electronic device is trusted by receiving an identification key from the personal electronic device. 6. The system of claim 4, wherein the airborne server determines whether the personal electronic device is trusted through the logging in of a user through the personal electronic device. 7. The system of claim 1, wherein the personal electronic device and the airborne server communicate over at least one wired connection. 8. The system of claim 1, wherein the personal electronic device and the airborne server communicate over at least one wireless connection. 9. The system of claim 1, wherein the airborne server prevents the personal electronic device from establishing communication links with unauthorized electronic devices.
2,400
7,066
7,066
13,270,365
2,488
A method and apparatus for depth-fill algorithm for low-complexity stereo vision. The method includes utilizing right and left images of a stereo camera to estimate depth of the scene, wherein the estimated depth relates to each pixel of the image, and updating a depth model with the current depth utilizing the estimated depth of the scene.
1. A method of a digital processor for depth-fill algorithm for low-complexity stereo vision, comprising: utilizing right and left images of a stereo camera to estimate depth of a scene, wherein the estimated depth relates to each pixel of the image; and updating a depth model with the current depth utilizing the estimated depth of the scene. 2. The method of claim 1 further comprising determining if the depth pixel is valid. 3. The method of claim 1 further comprising a step of initializing the depth model. 4. The method of claim 3, wherein the step of initializing the depth model comprises setting the depth model to the current depth. 5. An apparatus for depth-fill algorithm for low-complexity stereo vision, comprising: means for utilizing right and left images of a stereo camera to estimate depth of the scene, wherein the estimated depth relates to each pixel of the image; and means for updating a depth model with the current depth utilizing the estimated depth of the scene. 6. The apparatus of claim 5 further comprising means for determining if the depth pixel is valid. 7. The apparatus of claim 5 further comprising means for initializing the depth model. 8. The apparatus of claim 7, wherein the means for initializing the depth model comprises means for setting the depth model to the current depth. 9. A non-transitory computer readable medium comprising software that, when executed by a processor, causes the processor to perform a method for depth-fill algorithm for low-complexity stereo vision, the method comprising: utilizing right and left images of a stereo camera to estimate depth of the scene, wherein the estimated depth relates to each pixel of the image; and updating a depth model with the current depth utilizing the estimated depth of the scene. 10. The non-transitory computer readable medium of claim 9 further comprising determining if the depth pixel is valid. 11. The non-transitory computer readable medium of claim 9 further comprising the step of initialized the depth model. 12. The non-transitory computer readable medium of claim 11, wherein the step of initialized the depth model comprises setting the depth model to the current depth.
A method and apparatus for depth-fill algorithm for low-complexity stereo vision. The method includes utilizing right and left images of a stereo camera to estimate depth of the scene, wherein the estimated depth relates to each pixel of the image, and updating a depth model with the current depth utilizing the estimated depth of the scene.1. A method of a digital processor for depth-fill algorithm for low-complexity stereo vision, comprising: utilizing right and left images of a stereo camera to estimate depth of a scene, wherein the estimated depth relates to each pixel of the image; and updating a depth model with the current depth utilizing the estimated depth of the scene. 2. The method of claim 1 further comprising determining if the depth pixel is valid. 3. The method of claim 1 further comprising a step of initializing the depth model. 4. The method of claim 3, wherein the step of initializing the depth model comprises setting the depth model to the current depth. 5. An apparatus for depth-fill algorithm for low-complexity stereo vision, comprising: means for utilizing right and left images of a stereo camera to estimate depth of the scene, wherein the estimated depth relates to each pixel of the image; and means for updating a depth model with the current depth utilizing the estimated depth of the scene. 6. The apparatus of claim 5 further comprising means for determining if the depth pixel is valid. 7. The apparatus of claim 5 further comprising means for initializing the depth model. 8. The apparatus of claim 7, wherein the means for initializing the depth model comprises means for setting the depth model to the current depth. 9. A non-transitory computer readable medium comprising software that, when executed by a processor, causes the processor to perform a method for depth-fill algorithm for low-complexity stereo vision, the method comprising: utilizing right and left images of a stereo camera to estimate depth of the scene, wherein the estimated depth relates to each pixel of the image; and updating a depth model with the current depth utilizing the estimated depth of the scene. 10. The non-transitory computer readable medium of claim 9 further comprising determining if the depth pixel is valid. 11. The non-transitory computer readable medium of claim 9 further comprising the step of initialized the depth model. 12. The non-transitory computer readable medium of claim 11, wherein the step of initialized the depth model comprises setting the depth model to the current depth.
2,400
7,067
7,067
14,631,530
2,454
Techniques are described for managing log data generated by software applications. The techniques can be implemented in a cloud-based infrastructure capable of collecting and analyzing log data generated by software applications through logging and tracing. Logging and tracing are techniques for monitoring the execution of the software applications. The techniques include a processing step where log data is screened before it is saved within log storage and an analyzing step where saved log files are retrieved or analyzed.
1. A computer-implemented method, comprising: receiving, by a processor, a request from a log agent operating on a client device, the log agent being configured to log or trace a vendor application running on the client device; establishing, by the processor, a web-based connection with the log agent; receiving, by the processor and over the web-based connection, log data generated by the log agent, the log data being generated during execution of the vendor application running on the client device; determining, by the processor, a consumer preference setting associated with the client device; and storing, by the processor, the log data in a log storage according to the customer preference setting. 2. The computer-implemented method of claim 1, further comprising: receiving, by the processor, a vendor request for analysis related to the vendor application; identifying, by the processor, at least one log file that is related to the vendor application; and generating, by the processor, log analysis based on the at least one log file. 3. The computer-implemented method of claim 2, wherein the at least one log file includes a first log file and a second log file and wherein the first log file includes data generated during the execution of the vendor application on a first technology platform and the second log file includes data generated during the execution of the vendor application a second technology platform. 4. The computer-implemented method of claim 1, wherein storing the log data in the log storage comprises: identifying, by the processor, a storage mode from the customer preference setting; storing, by the processor, the log data in a row within a table when the storage mode is tableOnly; storing, by the processor, the log data in a log file when the storage mode is fileOnly; and storing, by the processor, metadata associated with the log data in a row within a table and the log data in a log file when the storage mode is tableAndFile. 5. The computer-implemented method of claim 1, wherein storing the log data in the log storage comprises: identifying, by the processor, an identifier associated with a consumer operating the vendor application; and storing, by the processor, the log data in the log storage along with the identifier. 6. The computer-implemented method of claim 1, wherein the web-based connection is maintained during a runtime of the vendor application. 7. The computer-implemented method of claim 1, wherein the log data includes a header containing data describing the source of the log data and a payload that includes a plurality of log entries. 8. A non-transitory computer readable storage medium storing one or more programs, the one or more programs comprising instructions for: receiving a request from a log agent operating on a client device, the log agent being configured to log or trace a vendor application running on the client device; establishing a web-based connection with the log agent; receiving, over the web-based connection, log data generated by the log agent, the log data being generated during execution of the vendor application running on the client device; determining a consumer preference setting associated with the client device; and storing the log data in a log storage according to the customer preference setting. 9. The non-transitory computer readable storage medium of claim 8, further comprising: receiving a vendor request for analysis related to the vendor application; identifying at least one log file that is related to the vendor application; and generating log analysis based on the at least one log file. 10. The non-transitory computer readable storage medium of claim 9, wherein the at least one log file includes a first log file and a second log file and wherein the first log file includes data generated during the execution of the vendor application on a first technology platform and the second log file includes data generated during the execution of the vendor application a second technology platform. 11. The non-transitory computer readable storage medium of claim 8, wherein storing the log data in the log storage comprises: identifying a storage mode from the customer preference setting; storing the log data in a row within a table when the storage mode is tableOnly; storing the log data in a log file when the storage mode is fileOnly; and storing metadata associated with the log data in a row within a table and the log data in a log file when the storage mode is tableAndFile. 12. The non-transitory computer readable storage medium of claim 8, wherein storing the log data in the log storage comprises: identifying an identifier associated with a consumer operating the vendor application; and storing the log data in the log storage along with the identifier. 13. The non-transitory computer readable storage medium of claim 8, wherein the web-based connection is maintained during a runtime of the vendor application. 14. The non-transitory computer readable storage medium of claim 8, wherein the log data includes a header containing data describing the source of the log data and a payload that includes a plurality of log entries. 15. A computer implemented system, comprising: receiving a request from a log agent operating on a client device, the log agent being configured to log or trace a vendor application running on the client device; establishing a web-based connection with the log agent; receiving, over the web-based connection, log data generated by the log agent, the log data being generated during execution of the vendor application running on the client device; determining a consumer preference setting associated with the client device; and storing the log data in a log storage according to the customer preference setting. 16. The computer implemented system of claim 15, further comprising: receiving a vendor request for analysis related to the vendor application; identifying at least one log file that is related to the vendor application; and generating log analysis based on the at least one log file. 17. The computer implemented system of claim 16, wherein the at least one log file includes a first log file and a second log file and wherein the first log file includes data generated during the execution of the vendor application on a first technology platform and the second log file includes data generated during the execution of the vendor application a second technology platform. 18. The computer implemented system of claim 15, wherein storing the log data in the log storage comprises: identifying a storage mode from the customer preference setting; storing the log data in a row within a table when the storage mode is tableOnly; storing the log data in a log file when the storage mode is fileOnly; and storing metadata associated with the log data in a row within a table and the log data in a log file when the storage mode is tableAndFile. 19. The computer implemented system of claim 15, wherein storing the log data in the log storage comprises: identifying an identifier associated with a consumer operating the vendor application; and storing the log data in the log storage along with the identifier. 20. The computer implemented system of claim 15, wherein the web-based connection is maintained during a runtime of the vendor application.
Techniques are described for managing log data generated by software applications. The techniques can be implemented in a cloud-based infrastructure capable of collecting and analyzing log data generated by software applications through logging and tracing. Logging and tracing are techniques for monitoring the execution of the software applications. The techniques include a processing step where log data is screened before it is saved within log storage and an analyzing step where saved log files are retrieved or analyzed.1. A computer-implemented method, comprising: receiving, by a processor, a request from a log agent operating on a client device, the log agent being configured to log or trace a vendor application running on the client device; establishing, by the processor, a web-based connection with the log agent; receiving, by the processor and over the web-based connection, log data generated by the log agent, the log data being generated during execution of the vendor application running on the client device; determining, by the processor, a consumer preference setting associated with the client device; and storing, by the processor, the log data in a log storage according to the customer preference setting. 2. The computer-implemented method of claim 1, further comprising: receiving, by the processor, a vendor request for analysis related to the vendor application; identifying, by the processor, at least one log file that is related to the vendor application; and generating, by the processor, log analysis based on the at least one log file. 3. The computer-implemented method of claim 2, wherein the at least one log file includes a first log file and a second log file and wherein the first log file includes data generated during the execution of the vendor application on a first technology platform and the second log file includes data generated during the execution of the vendor application a second technology platform. 4. The computer-implemented method of claim 1, wherein storing the log data in the log storage comprises: identifying, by the processor, a storage mode from the customer preference setting; storing, by the processor, the log data in a row within a table when the storage mode is tableOnly; storing, by the processor, the log data in a log file when the storage mode is fileOnly; and storing, by the processor, metadata associated with the log data in a row within a table and the log data in a log file when the storage mode is tableAndFile. 5. The computer-implemented method of claim 1, wherein storing the log data in the log storage comprises: identifying, by the processor, an identifier associated with a consumer operating the vendor application; and storing, by the processor, the log data in the log storage along with the identifier. 6. The computer-implemented method of claim 1, wherein the web-based connection is maintained during a runtime of the vendor application. 7. The computer-implemented method of claim 1, wherein the log data includes a header containing data describing the source of the log data and a payload that includes a plurality of log entries. 8. A non-transitory computer readable storage medium storing one or more programs, the one or more programs comprising instructions for: receiving a request from a log agent operating on a client device, the log agent being configured to log or trace a vendor application running on the client device; establishing a web-based connection with the log agent; receiving, over the web-based connection, log data generated by the log agent, the log data being generated during execution of the vendor application running on the client device; determining a consumer preference setting associated with the client device; and storing the log data in a log storage according to the customer preference setting. 9. The non-transitory computer readable storage medium of claim 8, further comprising: receiving a vendor request for analysis related to the vendor application; identifying at least one log file that is related to the vendor application; and generating log analysis based on the at least one log file. 10. The non-transitory computer readable storage medium of claim 9, wherein the at least one log file includes a first log file and a second log file and wherein the first log file includes data generated during the execution of the vendor application on a first technology platform and the second log file includes data generated during the execution of the vendor application a second technology platform. 11. The non-transitory computer readable storage medium of claim 8, wherein storing the log data in the log storage comprises: identifying a storage mode from the customer preference setting; storing the log data in a row within a table when the storage mode is tableOnly; storing the log data in a log file when the storage mode is fileOnly; and storing metadata associated with the log data in a row within a table and the log data in a log file when the storage mode is tableAndFile. 12. The non-transitory computer readable storage medium of claim 8, wherein storing the log data in the log storage comprises: identifying an identifier associated with a consumer operating the vendor application; and storing the log data in the log storage along with the identifier. 13. The non-transitory computer readable storage medium of claim 8, wherein the web-based connection is maintained during a runtime of the vendor application. 14. The non-transitory computer readable storage medium of claim 8, wherein the log data includes a header containing data describing the source of the log data and a payload that includes a plurality of log entries. 15. A computer implemented system, comprising: receiving a request from a log agent operating on a client device, the log agent being configured to log or trace a vendor application running on the client device; establishing a web-based connection with the log agent; receiving, over the web-based connection, log data generated by the log agent, the log data being generated during execution of the vendor application running on the client device; determining a consumer preference setting associated with the client device; and storing the log data in a log storage according to the customer preference setting. 16. The computer implemented system of claim 15, further comprising: receiving a vendor request for analysis related to the vendor application; identifying at least one log file that is related to the vendor application; and generating log analysis based on the at least one log file. 17. The computer implemented system of claim 16, wherein the at least one log file includes a first log file and a second log file and wherein the first log file includes data generated during the execution of the vendor application on a first technology platform and the second log file includes data generated during the execution of the vendor application a second technology platform. 18. The computer implemented system of claim 15, wherein storing the log data in the log storage comprises: identifying a storage mode from the customer preference setting; storing the log data in a row within a table when the storage mode is tableOnly; storing the log data in a log file when the storage mode is fileOnly; and storing metadata associated with the log data in a row within a table and the log data in a log file when the storage mode is tableAndFile. 19. The computer implemented system of claim 15, wherein storing the log data in the log storage comprises: identifying an identifier associated with a consumer operating the vendor application; and storing the log data in the log storage along with the identifier. 20. The computer implemented system of claim 15, wherein the web-based connection is maintained during a runtime of the vendor application.
2,400
7,068
7,068
14,667,256
2,492
Data processing circuitry has a virtual data buffer, with contiguous virtual addresses of the virtual buffer being associated with discontiguous addresses of a physical memory. Cyphering circuitry coupled between the data processing circuitry and the physical memory responds to a command received from the data processing circuitry by determining a key associated with the command based on virtual buffer address information associated with the virtual buffer.
1. A method, comprising: receiving a command associated with a virtual buffer, contiguous virtual addresses of the virtual buffer being associated with discontiguous addresses of a physical memory; determining a key based on virtual buffer address information associated with the virtual buffer; and executing the command using the determined key. 2. The method of claim 1 wherein the command is a write request and the method comprises: receiving first data from a functional block having the virtual buffer, the first data having a first virtual address in the virtual buffer, the virtual buffer having second data, the second data having a second virtual address contiguous with the first virtual address; encrypting the first data using at least one key which is dependent on virtual address information associated with the virtual buffer; and causing the encrypted first data to be written to a location of the physical memory which is non-contiguous to a second location of the second data in the physical memory. 3. The method of claim 2 wherein the received first data is unencrypted data. 4. The method of claim 1, comprising: receiving a read request for first data from a functional block having the virtual buffer, the first data having a virtual address in the virtual buffer, the virtual buffer having second data, the second data having a second virtual address contiguous with the first virtual address; reading first data in an encrypted form from a location of the physical memory which is non-contiguous to a second location of the second data in the physical memory; and decrypting the encrypted first data using at least one key which is dependent on virtual address information associated with the virtual buffer. 5. The method of claim 4, comprising providing the first data in unencrypted form to the functional block. 6. The method of claim 1 wherein the virtual address information comprises a first address range. 7. The method of claim 6, comprising determining if a virtual address associated with the command is within the first address range. 8. The method of claim 7 wherein the command is a request to read encrypted first data associated with the virtual address, comprising only decrypting the encrypted first data if the virtual address is within the first address range. 9. The method of claim 7 wherein the command is a request to write data associated with a first virtual address, comprising only encrypting and writing the first data if the first virtual address is within the first address range. 10. The method of claim 1, comprising receiving a virtual address associated with the command. 11. The method of claim 1, comprising receiving identification information from a functional block associated with the virtual buffer. 12. The method of claim 11 wherein the identification information identifies a type of transaction associated with at least one of data and the functional block. 13. The method of claim 11 wherein the command is a write command and executing the command comprises determining if data is to be encrypted or blocked based on the received identification information. 14. The method of claim 11 wherein the command is a read command and executing the command comprises determining whether to decrypt data based on the received identification information. 15. The method of claim 6, comprising defining a second address range for the virtual buffer and defining at least one key in dependence on address information associated with the second address range. 16. An apparatus, comprising: an interface configured to receive a command associated with an address of a virtual buffer, contiguous virtual addresses of the virtual buffer being associated with discontiguous addresses of a physical memory; and cyphering circuitry coupled to the interface and configured to determine a key associated with the command based on virtual buffer address information associated with the virtual buffer. 17. The apparatus of claim 16 wherein the cyphering circuitry is configured to respond to a received write command by, encrypting data associated with the command using the key; and initiating writing of the encrypted data to a location of the physical memory associated with the address of the virtual buffer. 18. The apparatus of claim 16 wherein the cyphering circuitry is configured to respond to a received read command by, initiating retrieval of encrypted data from a location in the physical memory associated with the address of the virtual buffer; and decrypting the retrieved data using the determined key. 19. The apparatus of claim 16 wherein the interface is configured to couple to a functional block associated with the virtual buffer. 20. The apparatus of claim 16 wherein the cyphering circuitry comprises a windowed cyphering block. 21. The apparatus of claim 16, comprising a memory interface configured to couple to the physical memory. 22. The apparatus of claim 16 wherein the virtual address information comprises a first address range. 23. The apparatus of claim 22 wherein the cyphering circuitry is configured to determine whether the virtual address associated with the command is within the first address range. 24. The apparatus of claim 23 wherein the cyphering circuitry is configured to initiate execution of the command based on the determination of whether the virtual address is within the first address range. 25. The apparatus of claim 16 wherein the interface is configured to receive identification information from a functional block associated with the virtual buffer. 26. The apparatus of claim 25 wherein the cyphering circuitry is configured to initiate execution of the command based on received identification information. 27. A system, comprising: data processing circuitry having a virtual data buffer, contiguous virtual addresses of the virtual buffer being associated with discontiguous addresses of a physical memory; and cyphering circuitry coupled to the data processing circuitry and configured to respond to a command received from the data processing circuitry by determining a key associated with the command based on virtual buffer address information associated with the virtual buffer. 28. The system of claim 27 wherein the cyphering circuitry is configured to respond to a received write command by, encrypting data associated with the command using the key; and initiating writing of the encrypted data to a location of the physical memory associated with the address of the virtual buffer. 29. The system of claim 27 wherein the cyphering circuitry is configured to respond to a received read command by, initiating retrieval of encrpyted data from a location in the physical memory associated with the address of the virtual buffer; and decrypting the retrieved data using the determined key. 30. The system of claim 27 wherein the cyphering circuitry comprises a windowed cyphering block. 31. The system of claim 27, comprising a memory management unit coupled to the cyphering circuitry. 32. The system of claim 27 wherein the virtual address information comprises a first address range. 33. The system of claim 32 wherein the cyphering circuitry is configured to determine whether the virtual address associated with the command is within the first address range. 34. The system of claim 33 wherein the cyphering circuitry is configured to initiate execution of the command based on the determination of whether the virtual address is within the first address range. 35. The system of claim 27 wherein the cyphering circuitry is configured to initiate execution of the command based on identification information received from the data processing circuitry. 36. The system of claim 27, comprising the physical memory and a central processing unit.
Data processing circuitry has a virtual data buffer, with contiguous virtual addresses of the virtual buffer being associated with discontiguous addresses of a physical memory. Cyphering circuitry coupled between the data processing circuitry and the physical memory responds to a command received from the data processing circuitry by determining a key associated with the command based on virtual buffer address information associated with the virtual buffer.1. A method, comprising: receiving a command associated with a virtual buffer, contiguous virtual addresses of the virtual buffer being associated with discontiguous addresses of a physical memory; determining a key based on virtual buffer address information associated with the virtual buffer; and executing the command using the determined key. 2. The method of claim 1 wherein the command is a write request and the method comprises: receiving first data from a functional block having the virtual buffer, the first data having a first virtual address in the virtual buffer, the virtual buffer having second data, the second data having a second virtual address contiguous with the first virtual address; encrypting the first data using at least one key which is dependent on virtual address information associated with the virtual buffer; and causing the encrypted first data to be written to a location of the physical memory which is non-contiguous to a second location of the second data in the physical memory. 3. The method of claim 2 wherein the received first data is unencrypted data. 4. The method of claim 1, comprising: receiving a read request for first data from a functional block having the virtual buffer, the first data having a virtual address in the virtual buffer, the virtual buffer having second data, the second data having a second virtual address contiguous with the first virtual address; reading first data in an encrypted form from a location of the physical memory which is non-contiguous to a second location of the second data in the physical memory; and decrypting the encrypted first data using at least one key which is dependent on virtual address information associated with the virtual buffer. 5. The method of claim 4, comprising providing the first data in unencrypted form to the functional block. 6. The method of claim 1 wherein the virtual address information comprises a first address range. 7. The method of claim 6, comprising determining if a virtual address associated with the command is within the first address range. 8. The method of claim 7 wherein the command is a request to read encrypted first data associated with the virtual address, comprising only decrypting the encrypted first data if the virtual address is within the first address range. 9. The method of claim 7 wherein the command is a request to write data associated with a first virtual address, comprising only encrypting and writing the first data if the first virtual address is within the first address range. 10. The method of claim 1, comprising receiving a virtual address associated with the command. 11. The method of claim 1, comprising receiving identification information from a functional block associated with the virtual buffer. 12. The method of claim 11 wherein the identification information identifies a type of transaction associated with at least one of data and the functional block. 13. The method of claim 11 wherein the command is a write command and executing the command comprises determining if data is to be encrypted or blocked based on the received identification information. 14. The method of claim 11 wherein the command is a read command and executing the command comprises determining whether to decrypt data based on the received identification information. 15. The method of claim 6, comprising defining a second address range for the virtual buffer and defining at least one key in dependence on address information associated with the second address range. 16. An apparatus, comprising: an interface configured to receive a command associated with an address of a virtual buffer, contiguous virtual addresses of the virtual buffer being associated with discontiguous addresses of a physical memory; and cyphering circuitry coupled to the interface and configured to determine a key associated with the command based on virtual buffer address information associated with the virtual buffer. 17. The apparatus of claim 16 wherein the cyphering circuitry is configured to respond to a received write command by, encrypting data associated with the command using the key; and initiating writing of the encrypted data to a location of the physical memory associated with the address of the virtual buffer. 18. The apparatus of claim 16 wherein the cyphering circuitry is configured to respond to a received read command by, initiating retrieval of encrypted data from a location in the physical memory associated with the address of the virtual buffer; and decrypting the retrieved data using the determined key. 19. The apparatus of claim 16 wherein the interface is configured to couple to a functional block associated with the virtual buffer. 20. The apparatus of claim 16 wherein the cyphering circuitry comprises a windowed cyphering block. 21. The apparatus of claim 16, comprising a memory interface configured to couple to the physical memory. 22. The apparatus of claim 16 wherein the virtual address information comprises a first address range. 23. The apparatus of claim 22 wherein the cyphering circuitry is configured to determine whether the virtual address associated with the command is within the first address range. 24. The apparatus of claim 23 wherein the cyphering circuitry is configured to initiate execution of the command based on the determination of whether the virtual address is within the first address range. 25. The apparatus of claim 16 wherein the interface is configured to receive identification information from a functional block associated with the virtual buffer. 26. The apparatus of claim 25 wherein the cyphering circuitry is configured to initiate execution of the command based on received identification information. 27. A system, comprising: data processing circuitry having a virtual data buffer, contiguous virtual addresses of the virtual buffer being associated with discontiguous addresses of a physical memory; and cyphering circuitry coupled to the data processing circuitry and configured to respond to a command received from the data processing circuitry by determining a key associated with the command based on virtual buffer address information associated with the virtual buffer. 28. The system of claim 27 wherein the cyphering circuitry is configured to respond to a received write command by, encrypting data associated with the command using the key; and initiating writing of the encrypted data to a location of the physical memory associated with the address of the virtual buffer. 29. The system of claim 27 wherein the cyphering circuitry is configured to respond to a received read command by, initiating retrieval of encrpyted data from a location in the physical memory associated with the address of the virtual buffer; and decrypting the retrieved data using the determined key. 30. The system of claim 27 wherein the cyphering circuitry comprises a windowed cyphering block. 31. The system of claim 27, comprising a memory management unit coupled to the cyphering circuitry. 32. The system of claim 27 wherein the virtual address information comprises a first address range. 33. The system of claim 32 wherein the cyphering circuitry is configured to determine whether the virtual address associated with the command is within the first address range. 34. The system of claim 33 wherein the cyphering circuitry is configured to initiate execution of the command based on the determination of whether the virtual address is within the first address range. 35. The system of claim 27 wherein the cyphering circuitry is configured to initiate execution of the command based on identification information received from the data processing circuitry. 36. The system of claim 27, comprising the physical memory and a central processing unit.
2,400
7,069
7,069
14,649,237
2,443
There is provided a method of providing cached content in a telecommunications network. The method comprises requesting content from a caching system (S 12.1 ). At a local cache ( 305 ), fragments are associated with the requested content (S 12.5 ) and sent towards a user (S 12.6 ). An identifier for the user and any of an identifier for the requested content and an index of each identified fragment is sent towards a mirror cache upstream of the local cache (S 12.7 ). Prior to the local cache ( 305 ) identifying the fragments associated with the requested content, the mirror cache may identify fragments associated with the requested content (S 12.3 ), and send a key comprising the index of each fragment to the local cache ( 305 ) (S 12.4 ). The fragments will then be identified at the local cache ( 305 ) (S 12.5 ) using the key.
1-40. (canceled) 41. An apparatus configured to operate as a local cache in a telecommunications network, the apparatus comprising: a data storage unit, the data storage unit configured to store fragments of content data, each fragment being associated with an index; an input/output (I/O) assembly, the I/O assembly configured to receive a request for content from a user; a processing circuit, the processing circuit configured to identify fragments associated with the requested content; wherein the I/O assembly is further configured to: send the identified fragments towards the user; send an identifier for the user, and any of an identifier for the requested content and an index of the or each identified fragment, towards a mirror cache upstream of the local cache. 42. The apparatus of claim 41, wherein the I/O assembly is configured to send the index for each fragment to the mirror cache in response to the fragment being sent towards the user. 43. The apparatus of claim 41, wherein: the I/O assembly is configured to receive a key from the mirror cache, the key comprising the indices identifying the requested content; and the processing circuit is configured to identify the or each fragment using the indices. 44. The apparatus of claim 43, wherein: the key comprises checksums for the or each index; the processing circuit is configured to compare the checksum in the key for the or each index with the checksum of the fragment associated with the or each index in the data storage; the I/O assembly is configured to send a request to the mirror cache identifying an index for which a mismatch occurred, and to receive an update fragment from the mirror cache; the data storage unit is configured to replace the fragment associated with the index for which the mismatch occurred with the update fragment. 45. The apparatus of claim 43, wherein the key comprises a secret and the processing circuit is configured to decrypt each fragment using the secret. 46. The apparatus of claim 41, wherein the apparatus is any one of: a radio base station, a Universal Mobile Telecommunications System (UMTS) node B, a mobile station, and a radio network controller. 47. The apparatus of claim 41, wherein the apparatus comprises a user interface assembly; the I/O assembly is configured to send the identified fragments to the user by sending the fragments towards the user interface assembly. 48. The apparatus of claim 41, wherein the I/O assembly is configured to send the identified fragments to the user by sending the fragments towards a client device downstream of the apparatus. 49. An apparatus configured to operate as a mirror cache in a telecommunications network, the apparatus comprising: a data storage unit, the data storage unit configured to store fragments of content data, an index associated with each fragment, and a database for storing a list of content data and associated indices; an input/output (I/O) assembly, the I/O assembly configured to receive a request for content; a processing circuit, the processing circuit configured to: identify indices associated with the requested content; and generate a key comprising the identified indices; and wherein the I/O assembly is further configured to send the key to a local cache. 50. The apparatus of claim 49, wherein: at least one of: the processing circuit is configured to calculate a checksum for a fragment; the data storage unit is configured to store a checksum for each fragment; the processing circuit is configured to include the checksum for the fragment associated with each identified index in the key; the I/O assembly is configured to receive an index for an update fragment from a client device, and in response thereto send the update fragment to the client device. 51. The apparatus of claim 49, wherein the I/O assembly is configured to send the key only in response to receiving authorization from a monitoring node. 52. An apparatus configured to operate as a mirror cache in a telecommunications network, the apparatus comprising: a data storage unit, the data storage unit configured to store fragments of content data, and an index associated with each fragment; an input/output (I/O) assembly, the I/O assembly configured to: receive, from a client device, an index or indices for one or more fragments and an identifier for a client device; and identify, to a monitoring node, the content data identified by the received index or indices and the identifier for the client device. 53. An apparatus configured to act as a monitoring node in a telecommunications network, the apparatus comprising: an input/output (I/O) assembly, the I/O assembly configured to receive an identifier for a client device, and indices for fragments sent to the client device; a database, the database configured to store a list of client devices and the indices of fragments sent to the client devices. 54. The apparatus of claim 53: wherein the I/O assembly is configured to receive a request for content, the request including an identifier for the requesting device; further comprising a processing circuit, the processing circuit configured to determine if the requesting device is authorized to access the content; wherein the I/O assembly is configured to send an authorization message to a mirror cache in response to the processing circuit determining that the requesting device is authorized to access the content. 55. The apparatus of claim 53, wherein the apparatus is a service aware charge and control (SACC) node or a lawful intercept (LI) node. 56. A method of providing cached content in a telecommunications network, the method comprising: requesting content from a caching system; at a local cache: identifying fragments associated with the requested content; sending the identified fragments towards a user; sending an identifier for the user, and any of an identifier for the requested content and an index of each identified fragment, towards a mirror cache upstream of the local cache. 57. The method of claim 56: wherein the mirror cache communicates with or is integrated in a monitoring node; further comprising recording, at the monitoring node, that a client has consumed the requested content and/or the identified fragments. 58. The method of claim 57, further comprising the monitoring node recording the index of each identified fragment. 59. The method of claim 56, wherein the local cache sending the index for each fragment towards the mirror cache is in response to the fragment being sent towards the user. 60. The method of 56, wherein the local cache sending the index of each identified fragment towards the mirror caches comprises the local cache sending the index for each fragment sent towards the user when the user finishes accessing fragments. 61. The method of claim 56, wherein the index for each fragment is a pointer to the location of that fragment in a data storage unit of the mirror cache and/or local cache. 62. The method of claim 56: further comprising, prior to the local cache identifying the fragments associated with the requested content: the mirror cache identifying fragments associated with the requested content; the mirror cache sending a key comprising the index of each fragment to the local cache; further comprising identifying the fragments at the local cache using the key. 63. The method of claim 62, wherein the key comprises a checksum for each fragment, the method further comprising, prior to making the or each fragment available to the client device: at the local cache: detecting a mismatch between the checksum in the key for the or each fragment and the checksum of the fragment associated with the index in the local cache; sending a request to the mirror cache identifying an index for which the mismatch occurred; at the mirror cache, sending the fragment in the mirror cache associated with the index for which the mismatch occurred to the local cache; at the local cache, receiving an update fragment from the mirror cache, and replacing the fragment associated with the index in the local cache for which the mismatch occurred with the update fragment. 64. The method of claim 62: wherein each fragment is encrypted; wherein the key comprises a secret further comprising the local cache decrypting the fragments using the secret. 65. The method of claim 62, further comprising, the mirror cache receiving, from a monitoring node and prior to sending the key to the local cache, an authorization message indicating that the user is authorized to access the requested content. 66. The method of claim 56: wherein the local cache is located at a client device; wherein the sending the identified fragments towards the user includes sending the identified fragments towards a user interface assembly of the client device. 67. The method of claim 56: wherein the local cache is located upstream of a client device; wherein the sending the identified fragments towards the user includes sending the identified fragments towards the client device 68. The method of claim 67, wherein the requesting content from the caching systems comprises the client device requesting content from the caching system by sending an HTTP GET request. 69. The method of claim 56, wherein the content is video content and each of the fragments is a frame of the video content. 70. The method of claim 69, further comprising a monitoring node determining a portion of the video content corresponding to the fragments sent towards the user. 71. A method of storing content in a cache in a network, the method comprising: in a mirror cache: receiving, from a fragmenter, content split into fragments; storing the fragments; associating each fragment with an index; associating the indices with the content. 72. The method of claim 71, wherein the content is video content and each of the fragments is a frame of the video content. 73. The method of claim 71, further comprising the mirror cache: identifying a first fragment of the content which is identical to a second fragment stored in the mirror cache; deleting the first fragment and the index associated with the first fragment; associating an index associated with the second fragment with the content. 74. The method of claim 71, wherein the index for each fragment comprises a pointer to the location of that fragment in data storage of the mirror cache. 75. The method of claim 71, further comprising the mirror cache sending the fragments and the indices towards a local cache. 76. The method of claim 71, wherein the mirror cache also acts as the fragmenter. 77. A computer program product stored in a non-transitory computer readable medium for providing cached content in a telecommunications network, the computer program product comprising software instructions which, when run on one or more processing circuits, causes the one or more processing circuits to: request content from a caching system; cause a local cache to: identify fragments associated with the requested content; send the identified fragments towards a user; send an identifier for the user, and any of an identifier for the requested content and an index of each identified fragment, towards a mirror cache upstream of the local cache. 78. A computer program product stored in a non-transitory computer readable medium for storing content in a cache in a network, the computer program product comprising software instructions which, when run on one or more processing circuits of a mirror cache, causes the mirror cache to: receive, from a fragmenter, content split into fragments; store the fragments; associate each fragment with an index; associate the indices with the content.
There is provided a method of providing cached content in a telecommunications network. The method comprises requesting content from a caching system (S 12.1 ). At a local cache ( 305 ), fragments are associated with the requested content (S 12.5 ) and sent towards a user (S 12.6 ). An identifier for the user and any of an identifier for the requested content and an index of each identified fragment is sent towards a mirror cache upstream of the local cache (S 12.7 ). Prior to the local cache ( 305 ) identifying the fragments associated with the requested content, the mirror cache may identify fragments associated with the requested content (S 12.3 ), and send a key comprising the index of each fragment to the local cache ( 305 ) (S 12.4 ). The fragments will then be identified at the local cache ( 305 ) (S 12.5 ) using the key.1-40. (canceled) 41. An apparatus configured to operate as a local cache in a telecommunications network, the apparatus comprising: a data storage unit, the data storage unit configured to store fragments of content data, each fragment being associated with an index; an input/output (I/O) assembly, the I/O assembly configured to receive a request for content from a user; a processing circuit, the processing circuit configured to identify fragments associated with the requested content; wherein the I/O assembly is further configured to: send the identified fragments towards the user; send an identifier for the user, and any of an identifier for the requested content and an index of the or each identified fragment, towards a mirror cache upstream of the local cache. 42. The apparatus of claim 41, wherein the I/O assembly is configured to send the index for each fragment to the mirror cache in response to the fragment being sent towards the user. 43. The apparatus of claim 41, wherein: the I/O assembly is configured to receive a key from the mirror cache, the key comprising the indices identifying the requested content; and the processing circuit is configured to identify the or each fragment using the indices. 44. The apparatus of claim 43, wherein: the key comprises checksums for the or each index; the processing circuit is configured to compare the checksum in the key for the or each index with the checksum of the fragment associated with the or each index in the data storage; the I/O assembly is configured to send a request to the mirror cache identifying an index for which a mismatch occurred, and to receive an update fragment from the mirror cache; the data storage unit is configured to replace the fragment associated with the index for which the mismatch occurred with the update fragment. 45. The apparatus of claim 43, wherein the key comprises a secret and the processing circuit is configured to decrypt each fragment using the secret. 46. The apparatus of claim 41, wherein the apparatus is any one of: a radio base station, a Universal Mobile Telecommunications System (UMTS) node B, a mobile station, and a radio network controller. 47. The apparatus of claim 41, wherein the apparatus comprises a user interface assembly; the I/O assembly is configured to send the identified fragments to the user by sending the fragments towards the user interface assembly. 48. The apparatus of claim 41, wherein the I/O assembly is configured to send the identified fragments to the user by sending the fragments towards a client device downstream of the apparatus. 49. An apparatus configured to operate as a mirror cache in a telecommunications network, the apparatus comprising: a data storage unit, the data storage unit configured to store fragments of content data, an index associated with each fragment, and a database for storing a list of content data and associated indices; an input/output (I/O) assembly, the I/O assembly configured to receive a request for content; a processing circuit, the processing circuit configured to: identify indices associated with the requested content; and generate a key comprising the identified indices; and wherein the I/O assembly is further configured to send the key to a local cache. 50. The apparatus of claim 49, wherein: at least one of: the processing circuit is configured to calculate a checksum for a fragment; the data storage unit is configured to store a checksum for each fragment; the processing circuit is configured to include the checksum for the fragment associated with each identified index in the key; the I/O assembly is configured to receive an index for an update fragment from a client device, and in response thereto send the update fragment to the client device. 51. The apparatus of claim 49, wherein the I/O assembly is configured to send the key only in response to receiving authorization from a monitoring node. 52. An apparatus configured to operate as a mirror cache in a telecommunications network, the apparatus comprising: a data storage unit, the data storage unit configured to store fragments of content data, and an index associated with each fragment; an input/output (I/O) assembly, the I/O assembly configured to: receive, from a client device, an index or indices for one or more fragments and an identifier for a client device; and identify, to a monitoring node, the content data identified by the received index or indices and the identifier for the client device. 53. An apparatus configured to act as a monitoring node in a telecommunications network, the apparatus comprising: an input/output (I/O) assembly, the I/O assembly configured to receive an identifier for a client device, and indices for fragments sent to the client device; a database, the database configured to store a list of client devices and the indices of fragments sent to the client devices. 54. The apparatus of claim 53: wherein the I/O assembly is configured to receive a request for content, the request including an identifier for the requesting device; further comprising a processing circuit, the processing circuit configured to determine if the requesting device is authorized to access the content; wherein the I/O assembly is configured to send an authorization message to a mirror cache in response to the processing circuit determining that the requesting device is authorized to access the content. 55. The apparatus of claim 53, wherein the apparatus is a service aware charge and control (SACC) node or a lawful intercept (LI) node. 56. A method of providing cached content in a telecommunications network, the method comprising: requesting content from a caching system; at a local cache: identifying fragments associated with the requested content; sending the identified fragments towards a user; sending an identifier for the user, and any of an identifier for the requested content and an index of each identified fragment, towards a mirror cache upstream of the local cache. 57. The method of claim 56: wherein the mirror cache communicates with or is integrated in a monitoring node; further comprising recording, at the monitoring node, that a client has consumed the requested content and/or the identified fragments. 58. The method of claim 57, further comprising the monitoring node recording the index of each identified fragment. 59. The method of claim 56, wherein the local cache sending the index for each fragment towards the mirror cache is in response to the fragment being sent towards the user. 60. The method of 56, wherein the local cache sending the index of each identified fragment towards the mirror caches comprises the local cache sending the index for each fragment sent towards the user when the user finishes accessing fragments. 61. The method of claim 56, wherein the index for each fragment is a pointer to the location of that fragment in a data storage unit of the mirror cache and/or local cache. 62. The method of claim 56: further comprising, prior to the local cache identifying the fragments associated with the requested content: the mirror cache identifying fragments associated with the requested content; the mirror cache sending a key comprising the index of each fragment to the local cache; further comprising identifying the fragments at the local cache using the key. 63. The method of claim 62, wherein the key comprises a checksum for each fragment, the method further comprising, prior to making the or each fragment available to the client device: at the local cache: detecting a mismatch between the checksum in the key for the or each fragment and the checksum of the fragment associated with the index in the local cache; sending a request to the mirror cache identifying an index for which the mismatch occurred; at the mirror cache, sending the fragment in the mirror cache associated with the index for which the mismatch occurred to the local cache; at the local cache, receiving an update fragment from the mirror cache, and replacing the fragment associated with the index in the local cache for which the mismatch occurred with the update fragment. 64. The method of claim 62: wherein each fragment is encrypted; wherein the key comprises a secret further comprising the local cache decrypting the fragments using the secret. 65. The method of claim 62, further comprising, the mirror cache receiving, from a monitoring node and prior to sending the key to the local cache, an authorization message indicating that the user is authorized to access the requested content. 66. The method of claim 56: wherein the local cache is located at a client device; wherein the sending the identified fragments towards the user includes sending the identified fragments towards a user interface assembly of the client device. 67. The method of claim 56: wherein the local cache is located upstream of a client device; wherein the sending the identified fragments towards the user includes sending the identified fragments towards the client device 68. The method of claim 67, wherein the requesting content from the caching systems comprises the client device requesting content from the caching system by sending an HTTP GET request. 69. The method of claim 56, wherein the content is video content and each of the fragments is a frame of the video content. 70. The method of claim 69, further comprising a monitoring node determining a portion of the video content corresponding to the fragments sent towards the user. 71. A method of storing content in a cache in a network, the method comprising: in a mirror cache: receiving, from a fragmenter, content split into fragments; storing the fragments; associating each fragment with an index; associating the indices with the content. 72. The method of claim 71, wherein the content is video content and each of the fragments is a frame of the video content. 73. The method of claim 71, further comprising the mirror cache: identifying a first fragment of the content which is identical to a second fragment stored in the mirror cache; deleting the first fragment and the index associated with the first fragment; associating an index associated with the second fragment with the content. 74. The method of claim 71, wherein the index for each fragment comprises a pointer to the location of that fragment in data storage of the mirror cache. 75. The method of claim 71, further comprising the mirror cache sending the fragments and the indices towards a local cache. 76. The method of claim 71, wherein the mirror cache also acts as the fragmenter. 77. A computer program product stored in a non-transitory computer readable medium for providing cached content in a telecommunications network, the computer program product comprising software instructions which, when run on one or more processing circuits, causes the one or more processing circuits to: request content from a caching system; cause a local cache to: identify fragments associated with the requested content; send the identified fragments towards a user; send an identifier for the user, and any of an identifier for the requested content and an index of each identified fragment, towards a mirror cache upstream of the local cache. 78. A computer program product stored in a non-transitory computer readable medium for storing content in a cache in a network, the computer program product comprising software instructions which, when run on one or more processing circuits of a mirror cache, causes the mirror cache to: receive, from a fragmenter, content split into fragments; store the fragments; associate each fragment with an index; associate the indices with the content.
2,400
7,070
7,070
14,531,907
2,465
Certain aspects of the present disclosure provide techniques, corresponding apparatus, and program products, for traffic classification (TCLAS) element classifier parameters for short frames. Certain aspects of the present disclosure provide an apparatus for wireless communications. The apparatus generally includes a processing system configured to generate a frame with an element that contains one or more fields, wherein the one or more fields identify at least one medium access control (MAC) packet data unit (MPDU) and identify a type of parameters in the element based, at least in part, on one or more fields in the at least one MPDU and an interface to output the generated frame for transmission.
1. An apparatus for wireless communication, comprising: a processing system configured to generate a frame with an element that contains one or more fields, wherein the one or more fields identify at least one medium access control (MAC) packet data unit (MPDU) and identify a type of parameters in the element based, at least in part, on one or more fields in the at least one MPDU; and an interface to output the generated frame for transmission. 2. The apparatus of claim 1, wherein the element comprises a traffic classification (TCLAS) element. 3. The apparatus of claim 1, wherein: the one or more fields in the at least one MPDU comprise: a protocol version (PV) field, and a Type field; and the one or more fields of the element comprise a frame classifier type field. 4. The apparatus of claim 3, wherein: the PV field has a value set to 1, the Type field has a value set to 3, and the frame classifier type field has a value set to 9. 5. The apparatus of claim 1, wherein the type of parameters comprises protocol version MPDU MAC header parameters. 6. The apparatus of claim 3, wherein: the one or more fields in the at least one MPDU comprise a From Distribution System (DS) field having a value set to 0, the PV field has a value set to 1, and the frame classifier type field has a value set to 8. 7. The apparatus of claim 1, wherein the type of parameters comprises non-down protocol version MPDU MAC header parameters. 8. A method for wireless communication, comprising: generating a frame with an element that contains one or more fields, wherein the one or more fields identify at least one medium access control (MAC) packet data unit (MPDU) and identify a type of parameters in the element based, at least in part, on one or more fields in the at least one MPDU; and outputting the generated frame for transmission. 9. The method of claim 8, wherein the element comprises a traffic classification (TCLAS) element. 10. The method of claim 8, wherein: the one or more fields in the at least one MPDU comprise: a protocol version (PV) field, and a Type field; and the one or more fields of the element comprise a frame classifier type field. 11. The method of claim 10, wherein: the PV field has a value set to 1, the Type field has a value set to 3, and the frame classifier type field has a value set to 9. 12. The method of claim 8, wherein the type of parameters comprises protocol version MPDU MAC header parameters. 13. The method of claim 10, wherein: the one or more fields in the at least one MPDU comprise a From Distribution System (DS) field having a value set to 0, the PV field has a value set to 1, and the frame classifier type field has a value set to 8. 14. The method of claim 8, wherein the type of parameters comprises non-down protocol version MPDU MAC header parameters. 15. An apparatus for wireless communication, comprising: means for generating a frame with an element that contains one or more fields, wherein the one or more fields identify at least one medium access control (MAC) packet data unit (MPDU) and identify a type of parameters in the element based, at least in part, on one or more fields in the at least one MPDU; and means for outputting the generated frame for transmission. 16. The apparatus of claim 15, wherein the element comprises a traffic classification (TCLAS) element. 17. The apparatus of claim 15, wherein: the one or more fields in the at least one MPDU comprise: a protocol version (PV) field, and a Type field; and the one or more fields of the element comprise a frame classifier type field. 18. The apparatus of claim 17, wherein: the PV field has a value set to 1, the Type field has a value set to 3, and the frame classifier type field has a value set to 9. 19. The apparatus of claim 15, wherein the type of parameters comprises protocol version MPDU MAC header parameters. 20. The apparatus of claim 17, wherein: the one or more fields in the at least one MPDU comprise a From Distribution System (DS) field having a value set to 0, the PV field has a value set to 1, and the frame classifier type field has a value set to 8. 21. The apparatus of claim 15, wherein the type of parameters comprises non-down protocol version MPDU MAC header parameters. 22. A station, comprising: at least one antenna; a processing system configured to generate a frame with an element that contains one or more fields, wherein the one or more fields identify at least one medium access control (MAC) packet data unit (MPDU) and identify a type of parameters in the element based, at least in part, on one or more fields in the at least one MPDU; and a transmitter configured to transmit, via the at least one antenna, the generated frame for transmission.
Certain aspects of the present disclosure provide techniques, corresponding apparatus, and program products, for traffic classification (TCLAS) element classifier parameters for short frames. Certain aspects of the present disclosure provide an apparatus for wireless communications. The apparatus generally includes a processing system configured to generate a frame with an element that contains one or more fields, wherein the one or more fields identify at least one medium access control (MAC) packet data unit (MPDU) and identify a type of parameters in the element based, at least in part, on one or more fields in the at least one MPDU and an interface to output the generated frame for transmission.1. An apparatus for wireless communication, comprising: a processing system configured to generate a frame with an element that contains one or more fields, wherein the one or more fields identify at least one medium access control (MAC) packet data unit (MPDU) and identify a type of parameters in the element based, at least in part, on one or more fields in the at least one MPDU; and an interface to output the generated frame for transmission. 2. The apparatus of claim 1, wherein the element comprises a traffic classification (TCLAS) element. 3. The apparatus of claim 1, wherein: the one or more fields in the at least one MPDU comprise: a protocol version (PV) field, and a Type field; and the one or more fields of the element comprise a frame classifier type field. 4. The apparatus of claim 3, wherein: the PV field has a value set to 1, the Type field has a value set to 3, and the frame classifier type field has a value set to 9. 5. The apparatus of claim 1, wherein the type of parameters comprises protocol version MPDU MAC header parameters. 6. The apparatus of claim 3, wherein: the one or more fields in the at least one MPDU comprise a From Distribution System (DS) field having a value set to 0, the PV field has a value set to 1, and the frame classifier type field has a value set to 8. 7. The apparatus of claim 1, wherein the type of parameters comprises non-down protocol version MPDU MAC header parameters. 8. A method for wireless communication, comprising: generating a frame with an element that contains one or more fields, wherein the one or more fields identify at least one medium access control (MAC) packet data unit (MPDU) and identify a type of parameters in the element based, at least in part, on one or more fields in the at least one MPDU; and outputting the generated frame for transmission. 9. The method of claim 8, wherein the element comprises a traffic classification (TCLAS) element. 10. The method of claim 8, wherein: the one or more fields in the at least one MPDU comprise: a protocol version (PV) field, and a Type field; and the one or more fields of the element comprise a frame classifier type field. 11. The method of claim 10, wherein: the PV field has a value set to 1, the Type field has a value set to 3, and the frame classifier type field has a value set to 9. 12. The method of claim 8, wherein the type of parameters comprises protocol version MPDU MAC header parameters. 13. The method of claim 10, wherein: the one or more fields in the at least one MPDU comprise a From Distribution System (DS) field having a value set to 0, the PV field has a value set to 1, and the frame classifier type field has a value set to 8. 14. The method of claim 8, wherein the type of parameters comprises non-down protocol version MPDU MAC header parameters. 15. An apparatus for wireless communication, comprising: means for generating a frame with an element that contains one or more fields, wherein the one or more fields identify at least one medium access control (MAC) packet data unit (MPDU) and identify a type of parameters in the element based, at least in part, on one or more fields in the at least one MPDU; and means for outputting the generated frame for transmission. 16. The apparatus of claim 15, wherein the element comprises a traffic classification (TCLAS) element. 17. The apparatus of claim 15, wherein: the one or more fields in the at least one MPDU comprise: a protocol version (PV) field, and a Type field; and the one or more fields of the element comprise a frame classifier type field. 18. The apparatus of claim 17, wherein: the PV field has a value set to 1, the Type field has a value set to 3, and the frame classifier type field has a value set to 9. 19. The apparatus of claim 15, wherein the type of parameters comprises protocol version MPDU MAC header parameters. 20. The apparatus of claim 17, wherein: the one or more fields in the at least one MPDU comprise a From Distribution System (DS) field having a value set to 0, the PV field has a value set to 1, and the frame classifier type field has a value set to 8. 21. The apparatus of claim 15, wherein the type of parameters comprises non-down protocol version MPDU MAC header parameters. 22. A station, comprising: at least one antenna; a processing system configured to generate a frame with an element that contains one or more fields, wherein the one or more fields identify at least one medium access control (MAC) packet data unit (MPDU) and identify a type of parameters in the element based, at least in part, on one or more fields in the at least one MPDU; and a transmitter configured to transmit, via the at least one antenna, the generated frame for transmission.
2,400
7,071
7,071
14,605,793
2,415
Methods and systems in which a portable electronic device can be voice activated are disclosed. The portable electronic device can be a multi-function electronic device. The voice activation can be robust and context sensitive. The voice activation can also be utilized without any preparatory user action with respect to the portable electronic device. The portable electronic device can also interact with a media system.
1-20. (canceled) 21. A method for operating a portable electronic device using voice-activated input, the method comprising: at the portable electronic device: receiving a voice command while the portable electronic device is operating in a low power mode; determining, while the portable electronic device is operating in the low power mode, whether the voice command is one of a set of voice commands supported by the portable electronic device, and in response to determining that the voice command is one of the set of voice commands supported by the portable electronic device: changing an operational state of the portable electronic device from the low power mode to a normal power mode; and executing a function associated with the voice command once the portable electronic device is in the normal power mode. 22. The method of claim 21, wherein one or more of the set of voice commands pertain to a macro, each of the macros including a plurality of commands. 23. The method of claim 22, wherein when the executing operates to execute the determined one of the commands which is a macro, the plurality of commands of the macro are sequentially performed. 24. The method of claim 21, wherein determining that the voice command is one of the commands within the set of voice commands comprises determining whether the voice command includes one of a set of key words or phrases that correspond to the set of voice commands. 25. The method of claim 21, further comprising: while operating the portable electronic device in the normal power mode: monitoring an operational state of the portable electronic device; and determining, based on the operational state of the portable electronic device, a second set of voice commands that are authorized for usage with the portable electronic device while the portable electronic device is in the operational state, wherein the second set of commands differs based on the different operational states in which the portable electronic device can operate. 26. The method of claim 25, wherein the operational state of the portable electronic device is a state of graphical user interface, and wherein the second set of voice commands that are authorized for usage are dependent on the state of the graphical user interface. 27. The method of claim 21, further comprising: displaying, on a display device associated with the portable electronic device, information pertaining to the set of voice commands. 28. The method of claim 21, wherein the portable electronic device is a multi-function device supporting a plurality of functions, one of the functions being wireless voice communications and another of the functions being media playback. 29. The method of claim 21, wherein the portable electronic device is a portable multi-function device that supports wireless voice communications, and wherein the portable multi-function device can operatively connect, wirelessly or wired, with at least one other electronic device or system that supports media playback. 30. The method of claim 29, wherein the voice command is executed on the at least one other electronic device or system. 31. A portable electronic device comprising a processor and memory storing one or more programs for execution by the processor, the one or more programs comprising instructions for: receiving a voice command while the portable electronic device is operating in a low power mode; determining, while the portable electronic device is operating in the low power mode, whether the voice command is one of a set of voice commands supported by the portable electronic device, and in response to determining that the voice command is one of the set of voice commands supported by the portable electronic device: changing an operational state of the portable electronic device from the low power mode to a normal power mode; and executing a function associated with the voice command once the portable electronic device is in the normal power mode. 32. The portable electronic device of claim 31, wherein one or more of the set of voice commands pertain to a macro including at least a series of commands to be performed. 33. The portable electronic device of claim 31, wherein the one or more programs further comprise instructions for: while operating the portable electronic device in the normal power mode; monitoring an operational state of the portable electronic device; and determining, based on the operational state of the portable electronic device, a second set of voice commands that are authorized for usage with the portable electronic device while the portable electronic device is in the operational state, wherein the second set of commands differs based on the different operational states in which the portable electronic device can operate. 34. The portable electronic device of claim 33, wherein the operational state of the portable electronic device is dependent on a state of an application program being executed by the processor. 35. The portable electronic device of claim 33, wherein the portable electronic device includes a display device, and wherein the operational state of the portable electronic device is dependent on a state of a graphical user interface provided on the display device. 36. The portable electronic device of claim 31, wherein the portable electronic device is a multi-function device supporting a plurality of functions, one of the functions being wireless voice communications and another of the functions being media playback or media recording. 37. A non-transitory computer readable medium comprising computer-executable instructions for: receiving a voice command at a portable electronic device while the portable electronic device is operating in a low power mode; determining, while the portable electronic device is operating in the low power mode, whether the voice command is one of a set of voice commands supported by the portable electronic device, and in response to determining that the voice command is one of the set of voice commands supported by the portable electronic device: changing an operational state of the portable electronic device from the low power mode to a normal power mode; and executing a function associated with the voice command once the portable electronic device is in the normal power mode. 38. The non-transitory computer readable medium of claim 37, further comprising computer-executable instructions for: while operating the portable electronic device in the normal power mode; monitoring an operational state of the portable electronic device; and determining, based on the operational state of the portable electronic device, a second set of voice commands that are authorized for usage with the portable electronic device while the portable electronic device is in the operational state, wherein the second set of commands differs based on the different operational states in which the portable electronic device can operate. 39. The non-transitory computer readable medium of claim 38, wherein the operational state of the portable electronic device is dependent on a state of an application program being executed by the processor. 40. The non-transitory computer readable medium of claim 38, wherein the portable electronic device includes a display device, and wherein the operational state of the portable electronic device is dependent on a state of a graphical user interface provided on the display device.
Methods and systems in which a portable electronic device can be voice activated are disclosed. The portable electronic device can be a multi-function electronic device. The voice activation can be robust and context sensitive. The voice activation can also be utilized without any preparatory user action with respect to the portable electronic device. The portable electronic device can also interact with a media system.1-20. (canceled) 21. A method for operating a portable electronic device using voice-activated input, the method comprising: at the portable electronic device: receiving a voice command while the portable electronic device is operating in a low power mode; determining, while the portable electronic device is operating in the low power mode, whether the voice command is one of a set of voice commands supported by the portable electronic device, and in response to determining that the voice command is one of the set of voice commands supported by the portable electronic device: changing an operational state of the portable electronic device from the low power mode to a normal power mode; and executing a function associated with the voice command once the portable electronic device is in the normal power mode. 22. The method of claim 21, wherein one or more of the set of voice commands pertain to a macro, each of the macros including a plurality of commands. 23. The method of claim 22, wherein when the executing operates to execute the determined one of the commands which is a macro, the plurality of commands of the macro are sequentially performed. 24. The method of claim 21, wherein determining that the voice command is one of the commands within the set of voice commands comprises determining whether the voice command includes one of a set of key words or phrases that correspond to the set of voice commands. 25. The method of claim 21, further comprising: while operating the portable electronic device in the normal power mode: monitoring an operational state of the portable electronic device; and determining, based on the operational state of the portable electronic device, a second set of voice commands that are authorized for usage with the portable electronic device while the portable electronic device is in the operational state, wherein the second set of commands differs based on the different operational states in which the portable electronic device can operate. 26. The method of claim 25, wherein the operational state of the portable electronic device is a state of graphical user interface, and wherein the second set of voice commands that are authorized for usage are dependent on the state of the graphical user interface. 27. The method of claim 21, further comprising: displaying, on a display device associated with the portable electronic device, information pertaining to the set of voice commands. 28. The method of claim 21, wherein the portable electronic device is a multi-function device supporting a plurality of functions, one of the functions being wireless voice communications and another of the functions being media playback. 29. The method of claim 21, wherein the portable electronic device is a portable multi-function device that supports wireless voice communications, and wherein the portable multi-function device can operatively connect, wirelessly or wired, with at least one other electronic device or system that supports media playback. 30. The method of claim 29, wherein the voice command is executed on the at least one other electronic device or system. 31. A portable electronic device comprising a processor and memory storing one or more programs for execution by the processor, the one or more programs comprising instructions for: receiving a voice command while the portable electronic device is operating in a low power mode; determining, while the portable electronic device is operating in the low power mode, whether the voice command is one of a set of voice commands supported by the portable electronic device, and in response to determining that the voice command is one of the set of voice commands supported by the portable electronic device: changing an operational state of the portable electronic device from the low power mode to a normal power mode; and executing a function associated with the voice command once the portable electronic device is in the normal power mode. 32. The portable electronic device of claim 31, wherein one or more of the set of voice commands pertain to a macro including at least a series of commands to be performed. 33. The portable electronic device of claim 31, wherein the one or more programs further comprise instructions for: while operating the portable electronic device in the normal power mode; monitoring an operational state of the portable electronic device; and determining, based on the operational state of the portable electronic device, a second set of voice commands that are authorized for usage with the portable electronic device while the portable electronic device is in the operational state, wherein the second set of commands differs based on the different operational states in which the portable electronic device can operate. 34. The portable electronic device of claim 33, wherein the operational state of the portable electronic device is dependent on a state of an application program being executed by the processor. 35. The portable electronic device of claim 33, wherein the portable electronic device includes a display device, and wherein the operational state of the portable electronic device is dependent on a state of a graphical user interface provided on the display device. 36. The portable electronic device of claim 31, wherein the portable electronic device is a multi-function device supporting a plurality of functions, one of the functions being wireless voice communications and another of the functions being media playback or media recording. 37. A non-transitory computer readable medium comprising computer-executable instructions for: receiving a voice command at a portable electronic device while the portable electronic device is operating in a low power mode; determining, while the portable electronic device is operating in the low power mode, whether the voice command is one of a set of voice commands supported by the portable electronic device, and in response to determining that the voice command is one of the set of voice commands supported by the portable electronic device: changing an operational state of the portable electronic device from the low power mode to a normal power mode; and executing a function associated with the voice command once the portable electronic device is in the normal power mode. 38. The non-transitory computer readable medium of claim 37, further comprising computer-executable instructions for: while operating the portable electronic device in the normal power mode; monitoring an operational state of the portable electronic device; and determining, based on the operational state of the portable electronic device, a second set of voice commands that are authorized for usage with the portable electronic device while the portable electronic device is in the operational state, wherein the second set of commands differs based on the different operational states in which the portable electronic device can operate. 39. The non-transitory computer readable medium of claim 38, wherein the operational state of the portable electronic device is dependent on a state of an application program being executed by the processor. 40. The non-transitory computer readable medium of claim 38, wherein the portable electronic device includes a display device, and wherein the operational state of the portable electronic device is dependent on a state of a graphical user interface provided on the display device.
2,400
7,072
7,072
14,164,627
2,444
A system and methods are provided for processing Type-Length-Value (TLV) Messages with TLV Engines in any TLV-based protocol by using configuration files associated with the protocol. One method provides for generating a TLV message by receiving output from a sender at a message engine, loading one or more configuration files associated with a TLV-based protocol onto the message engine, wherein the configuration files describe information about one more message elements, generating a TLV message at the message engine by creating and ordering the message elements into a TLV message according to the configurations files, and transmitting the TLV message over a network from the message engine.
1. A method of generating a Type-Length-Value message, comprising: receiving output from a sender at a message engine; loading one or more configuration files associated with a Type-Length-Value (TLV)-based protocol onto said message engine, wherein said one or more configuration files describes information about one or more message elements; generating a TLV message at said message engine by creating and ordering said one or more message elements into a TLV message according to said one or more configurations files; and transmitting said TLV message over a network from said message engine. 2. The method of claim 1, wherein said TLV message is transmitted from said message engine to a second message engine linked to a receiver. 3. The method of claim 1, wherein one of said one or more configuration files is a type definition file that describes information about a type of one of said one or more message elements. 4. The method of claim 3, wherein said information about said type of one of said one or more message elements describes a data type of said one of said one or more message elements. 5. The method of claim 1, wherein one of said one or more configuration files is a layout definition file that describes information about a structural layout of said one or more message elements within said TLV message. 6. The method of claim 5, wherein said information about said structural layout of said one or more message elements within said TLV message comprises identification of nesting relationships of one or more of said one or more message elements within another one or more of said one or more message elements. 7. The method of claim 1, comprising loading one or more alternate configuration files associated with a different protocol other than said protocol onto said message engine, to configure said message engine to generate a new TLV message in said different protocol by using said one or more alternate configuration files. 8. A method of parsing a Type-Length-Value message, comprising: receiving a Type-Length-Value (TLV) message comprising a plurality of message elements at a message engine linked to a receiver, wherein said TLV message was generated according to a protocol; loading a type definition file associated with said protocol onto said message engine, said type definition file describing information about said plurality of message elements; using said type definition file to parse the message elements of said TLV message into parsed data in another format that is compatible with said receiver; and transmitting said parsed data to said receiver. 9. The method of claim 8, wherein said type definition file describes data types of said plurality of message elements. 10. The method of claim 8, comprising loading an alternate type definition file associated with a different protocol other than said protocol onto said message engine, to configure said message engine to parse a new TLV message in said different protocol by using said alternate type definition file. 11. A message engine comprising: a Message Generator and Parser configured to load one or more configuration files associated with a protocol that describe information about a plurality of Type-Length Value (TLV) Elements within a TLV Message; and a Message Data Container configured to process said TLV Message according to said protocol. 12. The message engine of claim 11, wherein said one of said one or more configuration files is a type definition file that describes details of one of said plurality of TLV Elements. 13. The message engine of claim 11, wherein said one of said one or more configuration files is a layout definition file that describes the structural layout of at least some of said plurality of TLV Elements within said TLV Message in relation to at least one other one of said plurality of TLV Elements.
A system and methods are provided for processing Type-Length-Value (TLV) Messages with TLV Engines in any TLV-based protocol by using configuration files associated with the protocol. One method provides for generating a TLV message by receiving output from a sender at a message engine, loading one or more configuration files associated with a TLV-based protocol onto the message engine, wherein the configuration files describe information about one more message elements, generating a TLV message at the message engine by creating and ordering the message elements into a TLV message according to the configurations files, and transmitting the TLV message over a network from the message engine.1. A method of generating a Type-Length-Value message, comprising: receiving output from a sender at a message engine; loading one or more configuration files associated with a Type-Length-Value (TLV)-based protocol onto said message engine, wherein said one or more configuration files describes information about one or more message elements; generating a TLV message at said message engine by creating and ordering said one or more message elements into a TLV message according to said one or more configurations files; and transmitting said TLV message over a network from said message engine. 2. The method of claim 1, wherein said TLV message is transmitted from said message engine to a second message engine linked to a receiver. 3. The method of claim 1, wherein one of said one or more configuration files is a type definition file that describes information about a type of one of said one or more message elements. 4. The method of claim 3, wherein said information about said type of one of said one or more message elements describes a data type of said one of said one or more message elements. 5. The method of claim 1, wherein one of said one or more configuration files is a layout definition file that describes information about a structural layout of said one or more message elements within said TLV message. 6. The method of claim 5, wherein said information about said structural layout of said one or more message elements within said TLV message comprises identification of nesting relationships of one or more of said one or more message elements within another one or more of said one or more message elements. 7. The method of claim 1, comprising loading one or more alternate configuration files associated with a different protocol other than said protocol onto said message engine, to configure said message engine to generate a new TLV message in said different protocol by using said one or more alternate configuration files. 8. A method of parsing a Type-Length-Value message, comprising: receiving a Type-Length-Value (TLV) message comprising a plurality of message elements at a message engine linked to a receiver, wherein said TLV message was generated according to a protocol; loading a type definition file associated with said protocol onto said message engine, said type definition file describing information about said plurality of message elements; using said type definition file to parse the message elements of said TLV message into parsed data in another format that is compatible with said receiver; and transmitting said parsed data to said receiver. 9. The method of claim 8, wherein said type definition file describes data types of said plurality of message elements. 10. The method of claim 8, comprising loading an alternate type definition file associated with a different protocol other than said protocol onto said message engine, to configure said message engine to parse a new TLV message in said different protocol by using said alternate type definition file. 11. A message engine comprising: a Message Generator and Parser configured to load one or more configuration files associated with a protocol that describe information about a plurality of Type-Length Value (TLV) Elements within a TLV Message; and a Message Data Container configured to process said TLV Message according to said protocol. 12. The message engine of claim 11, wherein said one of said one or more configuration files is a type definition file that describes details of one of said plurality of TLV Elements. 13. The message engine of claim 11, wherein said one of said one or more configuration files is a layout definition file that describes the structural layout of at least some of said plurality of TLV Elements within said TLV Message in relation to at least one other one of said plurality of TLV Elements.
2,400
7,073
7,073
14,729,705
2,443
A social networking system provides relevant third-party content objects to users by matching user location, interests, and other social information with the content, location, and timing associated with the content objects. Content objects are provided based on relevance scores specific to a user. Relevance scores may be calculated based on the user's previous interactions with content object notifications, or based on interests that are common between the user and his or her connections in the social network. Context search is also provided for a user, wherein a list of search of results is ranked according to the relevance score of content object associated with the search results. Notifications may also be priced and distributed to users based on their relevance. In this way, the system can provide notifications that are relevant to user's interests and current circumstances, increasing the likelihood that they will find content objects of interest.
1. A computer-implemented method comprising: maintaining connections between users of a social networking system; identifying a second user connected to a first user in the social networking system; identifying an interest of the second user; determining a relevance score for a third-party content object associated with the interest of the second user, the relevance score comprising a measure of likelihood that the second user would be interested in the third-party content object; calculating a weighted relevance score for the third-party content object based on the determined relevance score and a type of connection between the first user and the second user maintained by the social networking system, the weighted relevance score comprising a measure of likelihood that the first user would be interested in the third-party content object associated with the second user; and storing the weighted relevance score for the third-party content object associated with the interest of the second user in an account associated with the first user. 2. The computer-implemented method of claim 1, further comprising: providing the third-party content object to a user device of the first user based at least in part on the weighted relevance score for the third-party content object. 3. The computer-implemented method of claim 1, wherein the third-party content object comprises an informational content object describing one of movie show times, movie reviews, restaurant menus, restaurant reviews, product information, or product reviews associated with the common interest. 4. The computer-implemented method of claim 1, wherein the third-party content object comprises an incentive content object describing one of coupons, discounts, promotions, or gift certificates associated with the common interest. 5. The computer-implemented method of claim 1, wherein determining the relevance score for the third-party content object comprises: calculating a relevance score for the third-party content object relative to the second user, the relevance score based on a combination of one or more of the following: a location value for the third-party content object, the location value based on a proximity between the location assigned to the third-party content object and a location associated with the second user; an interest value for the third-party content object, the interest value based on whether a category assigned to the third-party content object is included in one or more categories associated with affinity information for the second user; a time value for the third-party content object, the time value based on whether a current time is within the delivery time range assigned to the third-party content object; and a connection value for the third-party content object, the connection value based on a number of the second user's plurality of connections associated with the third-party content object. 6. The computer-implemented method of claim 1, further comprising: varying a weight applied to the relevance score based on the type of separation between the first user and the second user. 7. The computer-implemented method of claim 6, wherein the type of separation further describes one or more degrees of separation between the first user and the second user in the social networking system. 8. The computer-implemented method of claim 3, wherein providing the identified third-party content object to the first user comprises: providing the third-party content object in a search result responsive to a query from a client device of the first user or automatically providing the third-party content object to the client device of the first user. 9. The computer-implemented method of claim 1, further comprising: determining a list of third-party content objects for the first user based on interests of the first user and based on a common interest between the first user and the second user, the list comprising the third-party content object associated with the common interest. 10. The computer-implemented method of claim 9, further comprising: ranking a list of third-party content objects to provide to the first user to include the third-party content object associated with the common interest based at least in part on the weighted relevance score. 11. The computer-implemented method of claim 9, further comprising: identifying an interest of the second user that is related to the common interest; and calculating a relevance score for a second third-party content object associated with the interest of the second user; and determining whether to provide the second third-party content object associated with the interest of the second user based on the relevance score. 12. A computer-program product comprising a non-transitory computer-readable storage medium including executable code, the code when executed by at least one computer processor causes the computer processor to perform steps comprising: maintaining connections between users of a social networking system; identifying a second user connected to a first user in the social networking system; identifying an interest of the second user; determining a relevance score for a third-party content object associated with the interest of the second user, the relevance score comprising a measure of likelihood that the second user would be interested in the third-party content object; calculating a weighted relevance score for the third-party content object based on the determined relevance score and a type of connection between the first user and the second user maintained by the social networking system, the weighted relevance score comprising a measure of likelihood that the first user would be interested in the third-party content object associated with the second user; and storing the weighted relevance score for the third-party content object associated with the interest of the second user in an account associated with the first user. 13. The computer-program product of claim 12, wherein the code further causes the computer processor to perform steps comprising: providing the third-party content object to a user device of the first user based at least in part on the weighted relevance score for the third-party content object. 14. The computer-program product of claim 12, wherein the third-party content object comprises an informational content object describing one of movie show times, movie reviews, restaurant menus, restaurant reviews, product information, or product reviews associated with the common interest. 15. The computer-program product of claim 12, wherein the third-party content object comprises an incentive content object describing one of coupons, discounts, promotions, or gift certificates associated with the common interest. 16. The computer-program product of claim 12, wherein calculating the relevance score for the third-party content object comprises: calculating a relevance score for the third-party content object relative to the second user, the relevance score based on a combination of one or more of the following: a location value for the third-party content object, the location value based on a proximity between the location assigned to the third-party content object and a location associated with the second user; an interest value for the third-party content object, the interest value based on whether a category assigned to the third-party content object is included in one or more categories associated with affinity information for the second user; a time value for the third-party content object, the time value based on whether a current time is within the delivery time range assigned to the third-party content object; and a connection value for the third-party content object, the connection value based on a number of the second user's plurality of connections associated with the third-party content object. 17. The computer-program product of claim 12, wherein the code further causes the computer processor to perform steps comprising: varying a weight applied to the relevance score based on the type of separation between the first user and the second user. 18. The computer-program product of claim 12, wherein the type of separation further describes one or more degrees of separation between the first user and the second user in the social networking system. 19. The computer-program product of claim 12, wherein the code further causes the computer processor to perform steps comprising: ranking a list of third-party content objects to provide to the first user to include the third-party content object associated with a common interest based at least in part on the weighted relevance score. 20. The computer-program product of claim 19, wherein the code further causes the computer processor to perform steps comprising: identifying an interest of the second user that is related to the common interest; calculating a relevance score for a second third-party content object associated with the interest of the second user; and determining whether to provide the second third-party content object associated with the interest of the second user based on the relevance score.
A social networking system provides relevant third-party content objects to users by matching user location, interests, and other social information with the content, location, and timing associated with the content objects. Content objects are provided based on relevance scores specific to a user. Relevance scores may be calculated based on the user's previous interactions with content object notifications, or based on interests that are common between the user and his or her connections in the social network. Context search is also provided for a user, wherein a list of search of results is ranked according to the relevance score of content object associated with the search results. Notifications may also be priced and distributed to users based on their relevance. In this way, the system can provide notifications that are relevant to user's interests and current circumstances, increasing the likelihood that they will find content objects of interest.1. A computer-implemented method comprising: maintaining connections between users of a social networking system; identifying a second user connected to a first user in the social networking system; identifying an interest of the second user; determining a relevance score for a third-party content object associated with the interest of the second user, the relevance score comprising a measure of likelihood that the second user would be interested in the third-party content object; calculating a weighted relevance score for the third-party content object based on the determined relevance score and a type of connection between the first user and the second user maintained by the social networking system, the weighted relevance score comprising a measure of likelihood that the first user would be interested in the third-party content object associated with the second user; and storing the weighted relevance score for the third-party content object associated with the interest of the second user in an account associated with the first user. 2. The computer-implemented method of claim 1, further comprising: providing the third-party content object to a user device of the first user based at least in part on the weighted relevance score for the third-party content object. 3. The computer-implemented method of claim 1, wherein the third-party content object comprises an informational content object describing one of movie show times, movie reviews, restaurant menus, restaurant reviews, product information, or product reviews associated with the common interest. 4. The computer-implemented method of claim 1, wherein the third-party content object comprises an incentive content object describing one of coupons, discounts, promotions, or gift certificates associated with the common interest. 5. The computer-implemented method of claim 1, wherein determining the relevance score for the third-party content object comprises: calculating a relevance score for the third-party content object relative to the second user, the relevance score based on a combination of one or more of the following: a location value for the third-party content object, the location value based on a proximity between the location assigned to the third-party content object and a location associated with the second user; an interest value for the third-party content object, the interest value based on whether a category assigned to the third-party content object is included in one or more categories associated with affinity information for the second user; a time value for the third-party content object, the time value based on whether a current time is within the delivery time range assigned to the third-party content object; and a connection value for the third-party content object, the connection value based on a number of the second user's plurality of connections associated with the third-party content object. 6. The computer-implemented method of claim 1, further comprising: varying a weight applied to the relevance score based on the type of separation between the first user and the second user. 7. The computer-implemented method of claim 6, wherein the type of separation further describes one or more degrees of separation between the first user and the second user in the social networking system. 8. The computer-implemented method of claim 3, wherein providing the identified third-party content object to the first user comprises: providing the third-party content object in a search result responsive to a query from a client device of the first user or automatically providing the third-party content object to the client device of the first user. 9. The computer-implemented method of claim 1, further comprising: determining a list of third-party content objects for the first user based on interests of the first user and based on a common interest between the first user and the second user, the list comprising the third-party content object associated with the common interest. 10. The computer-implemented method of claim 9, further comprising: ranking a list of third-party content objects to provide to the first user to include the third-party content object associated with the common interest based at least in part on the weighted relevance score. 11. The computer-implemented method of claim 9, further comprising: identifying an interest of the second user that is related to the common interest; and calculating a relevance score for a second third-party content object associated with the interest of the second user; and determining whether to provide the second third-party content object associated with the interest of the second user based on the relevance score. 12. A computer-program product comprising a non-transitory computer-readable storage medium including executable code, the code when executed by at least one computer processor causes the computer processor to perform steps comprising: maintaining connections between users of a social networking system; identifying a second user connected to a first user in the social networking system; identifying an interest of the second user; determining a relevance score for a third-party content object associated with the interest of the second user, the relevance score comprising a measure of likelihood that the second user would be interested in the third-party content object; calculating a weighted relevance score for the third-party content object based on the determined relevance score and a type of connection between the first user and the second user maintained by the social networking system, the weighted relevance score comprising a measure of likelihood that the first user would be interested in the third-party content object associated with the second user; and storing the weighted relevance score for the third-party content object associated with the interest of the second user in an account associated with the first user. 13. The computer-program product of claim 12, wherein the code further causes the computer processor to perform steps comprising: providing the third-party content object to a user device of the first user based at least in part on the weighted relevance score for the third-party content object. 14. The computer-program product of claim 12, wherein the third-party content object comprises an informational content object describing one of movie show times, movie reviews, restaurant menus, restaurant reviews, product information, or product reviews associated with the common interest. 15. The computer-program product of claim 12, wherein the third-party content object comprises an incentive content object describing one of coupons, discounts, promotions, or gift certificates associated with the common interest. 16. The computer-program product of claim 12, wherein calculating the relevance score for the third-party content object comprises: calculating a relevance score for the third-party content object relative to the second user, the relevance score based on a combination of one or more of the following: a location value for the third-party content object, the location value based on a proximity between the location assigned to the third-party content object and a location associated with the second user; an interest value for the third-party content object, the interest value based on whether a category assigned to the third-party content object is included in one or more categories associated with affinity information for the second user; a time value for the third-party content object, the time value based on whether a current time is within the delivery time range assigned to the third-party content object; and a connection value for the third-party content object, the connection value based on a number of the second user's plurality of connections associated with the third-party content object. 17. The computer-program product of claim 12, wherein the code further causes the computer processor to perform steps comprising: varying a weight applied to the relevance score based on the type of separation between the first user and the second user. 18. The computer-program product of claim 12, wherein the type of separation further describes one or more degrees of separation between the first user and the second user in the social networking system. 19. The computer-program product of claim 12, wherein the code further causes the computer processor to perform steps comprising: ranking a list of third-party content objects to provide to the first user to include the third-party content object associated with a common interest based at least in part on the weighted relevance score. 20. The computer-program product of claim 19, wherein the code further causes the computer processor to perform steps comprising: identifying an interest of the second user that is related to the common interest; calculating a relevance score for a second third-party content object associated with the interest of the second user; and determining whether to provide the second third-party content object associated with the interest of the second user based on the relevance score.
2,400
7,074
7,074
14,307,389
2,449
A computer-implemented method is operable in a content delivery network (CDN). The method includes, at a content source external to the CDN, wherein the CDN serves content from the content source via content delivery (CD) services in the CDN, monitoring configuration information associated with content to be delivered by the CDN on behalf of the content source. In response to at least one change in the configuration information being determined by the monitoring, the content source provides the CDN an indication of a change in the configuration information.
1. A computer-implemented method operable in a content delivery network (CDN), the method operable on one or more devices comprising hardware including memory and at least one processor, the method comprising: (A) at a content source external to the CDN, wherein the CDN serves content from the content source via content delivery (CD) services in the CDN, monitoring configuration information associated with content to be delivered by the CDN on behalf of the content source; and, (B) in response to at least one change in the configuration information being determined by the monitoring, the content source providing to the CDN an indication of a change in the configuration information. 2. The method of claim 1 wherein the content source comprises one or more origin servers. 3. The method of claim 2 wherein the configuration information relates to configuration for substantially all content associated with the one or more origin servers. 4. The method of claim 1 wherein content from the content source comprises one or more resources. 5. The method of claim 4 wherein the one or more resources comprise one or more properties and the configuration information relates to configuration per property of the one or more properties. 6. The method of claim 4 wherein the configuration information relates to configuration per resource of the one or more resources. 7. The method of claim 1 wherein the providing of an indication in (B) may include providing at least some of the configuration information to the CDN. 8. The method of claim 7 wherein the at least some of the configuration information may be provided by the content source to one or more CD services in the CDN. 9. The method of claim 8 wherein at least some of the configuration information may be pushed by the content source to one or more CD services in the CDN. 10. The method of claim 1 further comprising: (C) in response to the content source providing the indication in (B), the CDN obtaining at least some of the configuration information. 11. The method of claim 10 wherein the CDN obtains at least some of the configuration information from the content source. 12. The method of claim 11 wherein the CDN pulls the at least some of the configuration information from the content source. 13. The method of claim 10 wherein the CDN obtains at least some of the configuration information from a source distinct from the content source. 14. The method of claim 1 wherein the indication comprises at least some of the configuration information. 15. The method of claim 1 wherein the monitoring is performed by a software routine associated with the content source. 16. The method of claim 15 wherein the software routine is authenticated by the CDN. 17. The method of claim 15 wherein the software routine comprises a plugin running on the content source. 18. The method of claim 15 wherein the software routine is at least partially co-located with the content source. 19. The method of claim 15 wherein the software routine is at a location distinct from the content source. 20. The method of claim 1 wherein the indication is provided to the CDN via a channel between the content source and the CDN. 21. The method of claim 18 wherein the channel comprises a secure channel. 22. The method of claim 21 wherein the secure channel is encrypted. 23. The method of claim 1 wherein the CDN comprises one or more configuration services, and wherein the content source provides the indication to the one or more configuration services. 24. The method of claim 1 further comprising: in response to the providing in (B), the CDN modifying configuration information associated with content from the content source. 25. A computer-implemented method operable in a content delivery network (CDN), the method operable on one or more devices comprising hardware including memory and at least one processor, the method comprising: (A) a software routine associated with a particular content source monitoring configuration information associated with content to be delivered by the CDN on behalf of the content source; and (B) providing the CDN an indication of a change in the configuration information as determined by the software routine. 26. The method of claim 25 wherein the software routine is co-located with said content source. 27. The method of claim 25 wherein the content source is external the CDN, and wherein the CDN serves content from and on behalf of the content source. 28. The method of claim 25 wherein the configuration information relates to configuration for substantially all content associated with the content source. 29. The method of claim 25 wherein content from the content source comprises one or more resources. 30. The method of claim 29 wherein the one or more resources comprise one or more properties and the configuration information relates to configuration per property of the one or more properties. 31. The method of claim 25 wherein the particular content source comprises at least one origin server and wherein the software routine comprises at least one software routine running on said at least one origin server. 32. A system, operable in a network comprising multiple service endpoints, said service endpoints running on a plurality of devices, the system comprising: (a) hardware including memory and at least one processor, and (b) one or more services running on said hardware, wherein said one or more services are configured to: (A) at a content source external to the CDN, wherein the CDN serves content from the content source via content delivery (CD) services in the CDN, monitor configuration information associated with content to be delivered by the CDN on behalf of the content source; and, (B) in response to at least one change in the configuration information being determined by the monitoring, provide to the CDN an indication of a change in the configuration information. 33. A computer program product having computer readable instructions stored on non-transitory computer readable media, the computer readable instructions including instructions for implementing a computer-implemented method, said method operable on one or more devices comprising hardware including memory and at least one processor and running one or more services on said hardware, said method operable in a network comprising multiple service endpoints, said service endpoints running on a plurality of devices, and said method comprising: (A) at a content source external to the CDN, wherein the CDN serves content from the content source via content delivery (CD) services in the CDN, monitoring configuration information associated with content to be delivered by the CDN on behalf of the content source; and, (B) in response to at least one change in the configuration information being determined by the monitoring, the content source providing to the CDN an indication of a change in the configuration information.
A computer-implemented method is operable in a content delivery network (CDN). The method includes, at a content source external to the CDN, wherein the CDN serves content from the content source via content delivery (CD) services in the CDN, monitoring configuration information associated with content to be delivered by the CDN on behalf of the content source. In response to at least one change in the configuration information being determined by the monitoring, the content source provides the CDN an indication of a change in the configuration information.1. A computer-implemented method operable in a content delivery network (CDN), the method operable on one or more devices comprising hardware including memory and at least one processor, the method comprising: (A) at a content source external to the CDN, wherein the CDN serves content from the content source via content delivery (CD) services in the CDN, monitoring configuration information associated with content to be delivered by the CDN on behalf of the content source; and, (B) in response to at least one change in the configuration information being determined by the monitoring, the content source providing to the CDN an indication of a change in the configuration information. 2. The method of claim 1 wherein the content source comprises one or more origin servers. 3. The method of claim 2 wherein the configuration information relates to configuration for substantially all content associated with the one or more origin servers. 4. The method of claim 1 wherein content from the content source comprises one or more resources. 5. The method of claim 4 wherein the one or more resources comprise one or more properties and the configuration information relates to configuration per property of the one or more properties. 6. The method of claim 4 wherein the configuration information relates to configuration per resource of the one or more resources. 7. The method of claim 1 wherein the providing of an indication in (B) may include providing at least some of the configuration information to the CDN. 8. The method of claim 7 wherein the at least some of the configuration information may be provided by the content source to one or more CD services in the CDN. 9. The method of claim 8 wherein at least some of the configuration information may be pushed by the content source to one or more CD services in the CDN. 10. The method of claim 1 further comprising: (C) in response to the content source providing the indication in (B), the CDN obtaining at least some of the configuration information. 11. The method of claim 10 wherein the CDN obtains at least some of the configuration information from the content source. 12. The method of claim 11 wherein the CDN pulls the at least some of the configuration information from the content source. 13. The method of claim 10 wherein the CDN obtains at least some of the configuration information from a source distinct from the content source. 14. The method of claim 1 wherein the indication comprises at least some of the configuration information. 15. The method of claim 1 wherein the monitoring is performed by a software routine associated with the content source. 16. The method of claim 15 wherein the software routine is authenticated by the CDN. 17. The method of claim 15 wherein the software routine comprises a plugin running on the content source. 18. The method of claim 15 wherein the software routine is at least partially co-located with the content source. 19. The method of claim 15 wherein the software routine is at a location distinct from the content source. 20. The method of claim 1 wherein the indication is provided to the CDN via a channel between the content source and the CDN. 21. The method of claim 18 wherein the channel comprises a secure channel. 22. The method of claim 21 wherein the secure channel is encrypted. 23. The method of claim 1 wherein the CDN comprises one or more configuration services, and wherein the content source provides the indication to the one or more configuration services. 24. The method of claim 1 further comprising: in response to the providing in (B), the CDN modifying configuration information associated with content from the content source. 25. A computer-implemented method operable in a content delivery network (CDN), the method operable on one or more devices comprising hardware including memory and at least one processor, the method comprising: (A) a software routine associated with a particular content source monitoring configuration information associated with content to be delivered by the CDN on behalf of the content source; and (B) providing the CDN an indication of a change in the configuration information as determined by the software routine. 26. The method of claim 25 wherein the software routine is co-located with said content source. 27. The method of claim 25 wherein the content source is external the CDN, and wherein the CDN serves content from and on behalf of the content source. 28. The method of claim 25 wherein the configuration information relates to configuration for substantially all content associated with the content source. 29. The method of claim 25 wherein content from the content source comprises one or more resources. 30. The method of claim 29 wherein the one or more resources comprise one or more properties and the configuration information relates to configuration per property of the one or more properties. 31. The method of claim 25 wherein the particular content source comprises at least one origin server and wherein the software routine comprises at least one software routine running on said at least one origin server. 32. A system, operable in a network comprising multiple service endpoints, said service endpoints running on a plurality of devices, the system comprising: (a) hardware including memory and at least one processor, and (b) one or more services running on said hardware, wherein said one or more services are configured to: (A) at a content source external to the CDN, wherein the CDN serves content from the content source via content delivery (CD) services in the CDN, monitor configuration information associated with content to be delivered by the CDN on behalf of the content source; and, (B) in response to at least one change in the configuration information being determined by the monitoring, provide to the CDN an indication of a change in the configuration information. 33. A computer program product having computer readable instructions stored on non-transitory computer readable media, the computer readable instructions including instructions for implementing a computer-implemented method, said method operable on one or more devices comprising hardware including memory and at least one processor and running one or more services on said hardware, said method operable in a network comprising multiple service endpoints, said service endpoints running on a plurality of devices, and said method comprising: (A) at a content source external to the CDN, wherein the CDN serves content from the content source via content delivery (CD) services in the CDN, monitoring configuration information associated with content to be delivered by the CDN on behalf of the content source; and, (B) in response to at least one change in the configuration information being determined by the monitoring, the content source providing to the CDN an indication of a change in the configuration information.
2,400
7,075
7,075
14,256,040
2,457
A method includes forwarding one or more packets from a first addressable computing element to at least a second addressable computing element based on a topology-aware address assigned to the second addressable computing element. The topology-aware address includes a set of identifiers representing one or more topology attributes associated with the second addressable computing element.
1. A method comprising, forwarding one or more packets from a first addressable computing element to at least a second addressable computing element based on a topology-aware address assigned to the second addressable computing element, wherein the topology-aware address comprises a set of identifiers representing one or more topology attributes associated with the second addressable computing element; wherein the method is performed by at least one processing device comprising a processor coupled to a memory. 2. The method of claim 1, wherein the one or more packets from the first addressable computing element are also forwarded to one or more other addressable computing elements having at least one topology attribute in common with the second addressable computing element. 3. The method of claim 1, wherein the set of identifiers representing the one or more topology attributes comprise one or more of a data center location identifier, a rack identifier, a server identifier, a socket identifier, a core identifier, and a hyper-thread identifier. 4. The method of claim 1, further comprising applying a filter to the one or more packets to determine whether or not a match exists for the topology-aware address. 5. The method of claim 4, wherein the filter determines whether or not a match exists in a decreasing order of locality. 6. The method of claim 4, wherein the filter is applied by the second addressable computing element. 7. The method of claim 4, wherein the filter is applied by a switch in the network. 8. The method of claim 4, wherein the filter is applied by a virtual routing and switching module in the network. 9. The method of claim 8, wherein the virtual routing and switching module replaces a topology-aware destination address with the address of a target server. 10. The method of claim 1, wherein the topology-aware address comprises a topology-aware Media Access Control (MAC) address. 11. The method of claim 1, wherein the topology-aware address comprises a topology-aware Internet Protocol (IP) address. 12. The method of claim 1, wherein the topology-aware address comprises at least one bit that is configured to restrict forwarding of the one or more packets to at most n addressable computing elements having a different given topology attribute. 13. The method of claim 1, wherein the topology-aware address comprises at least one bit that is configured to prevent delivery of the one or more packets to an addressable computing element not residing on a given server. 14. The method of claim 1, wherein the first addressable computing element and the second addressable computing element comprise a first virtual machine and a second virtual machine, respectively, and wherein the first virtual machine is in a different data center location than the second virtual machine. 15. The method of claim 1, wherein the first addressable computing element and the second addressable computing element comprise a first virtual machine and a second virtual machine, respectively, and wherein the first virtual machine is resident on the same server as the second virtual machine. 16. An article of manufacture comprising a processor-readable storage medium having embodied therein executable program code that when executed performs the method of claim 1. 17. An apparatus comprising: a memory; and a processor operatively coupled to the memory and configured to forward one or more packets from a first addressable computing element to at least a second addressable computing element based on a topology-aware address assigned to the second addressable computing element, wherein the topology-aware address comprises a set of identifiers representing one or more topology attributes associated with the second addressable computing element. 18. The apparatus of claim 17, wherein the one or more packets from the first addressable computing element are also forwarded to one or more other addressable computing elements having at least one topology attribute in common with the second addressable computing element. 19. The apparatus of claim 17, wherein the set of identifiers representing the one or more topology attributes comprise one or more of a data center location identifier, a rack identifier, a server identifier, a socket identifier, a core identifier, and a hyper-thread identifier. 20. A method comprising: generating an instruction from an application program to instantiate an addressable computing element at a designated topological location in a computing system; wherein the method is performed by at least one processing device comprising a processor coupled to a memory. 21. The method of claim 20, wherein the instruction identifies a specific topological location in the computing system at which to instantiate the addressable computing element. 22. The method of claim 20, wherein the instruction specifies a topological location relative to another topological location at which to instantiate the addressable computing element. 23. The method of claim 20, wherein the instruction comprise a structured Media Access Control (MAC) address which serves as a parameter to an application programming interface call to start one or more VM instances at the designated topological locations. 24. A network comprising: a plurality of virtual machines; and physical infrastructure upon which the plurality of virtual machines are instantiated; wherein one or more packets are forwarded from a first virtual machine to at least a second virtual machine based on a topology-aware address assigned to the second virtual machine, wherein the topology-aware address comprises a set of identifiers representing one or more topology attributes associated with the second virtual machine.
A method includes forwarding one or more packets from a first addressable computing element to at least a second addressable computing element based on a topology-aware address assigned to the second addressable computing element. The topology-aware address includes a set of identifiers representing one or more topology attributes associated with the second addressable computing element.1. A method comprising, forwarding one or more packets from a first addressable computing element to at least a second addressable computing element based on a topology-aware address assigned to the second addressable computing element, wherein the topology-aware address comprises a set of identifiers representing one or more topology attributes associated with the second addressable computing element; wherein the method is performed by at least one processing device comprising a processor coupled to a memory. 2. The method of claim 1, wherein the one or more packets from the first addressable computing element are also forwarded to one or more other addressable computing elements having at least one topology attribute in common with the second addressable computing element. 3. The method of claim 1, wherein the set of identifiers representing the one or more topology attributes comprise one or more of a data center location identifier, a rack identifier, a server identifier, a socket identifier, a core identifier, and a hyper-thread identifier. 4. The method of claim 1, further comprising applying a filter to the one or more packets to determine whether or not a match exists for the topology-aware address. 5. The method of claim 4, wherein the filter determines whether or not a match exists in a decreasing order of locality. 6. The method of claim 4, wherein the filter is applied by the second addressable computing element. 7. The method of claim 4, wherein the filter is applied by a switch in the network. 8. The method of claim 4, wherein the filter is applied by a virtual routing and switching module in the network. 9. The method of claim 8, wherein the virtual routing and switching module replaces a topology-aware destination address with the address of a target server. 10. The method of claim 1, wherein the topology-aware address comprises a topology-aware Media Access Control (MAC) address. 11. The method of claim 1, wherein the topology-aware address comprises a topology-aware Internet Protocol (IP) address. 12. The method of claim 1, wherein the topology-aware address comprises at least one bit that is configured to restrict forwarding of the one or more packets to at most n addressable computing elements having a different given topology attribute. 13. The method of claim 1, wherein the topology-aware address comprises at least one bit that is configured to prevent delivery of the one or more packets to an addressable computing element not residing on a given server. 14. The method of claim 1, wherein the first addressable computing element and the second addressable computing element comprise a first virtual machine and a second virtual machine, respectively, and wherein the first virtual machine is in a different data center location than the second virtual machine. 15. The method of claim 1, wherein the first addressable computing element and the second addressable computing element comprise a first virtual machine and a second virtual machine, respectively, and wherein the first virtual machine is resident on the same server as the second virtual machine. 16. An article of manufacture comprising a processor-readable storage medium having embodied therein executable program code that when executed performs the method of claim 1. 17. An apparatus comprising: a memory; and a processor operatively coupled to the memory and configured to forward one or more packets from a first addressable computing element to at least a second addressable computing element based on a topology-aware address assigned to the second addressable computing element, wherein the topology-aware address comprises a set of identifiers representing one or more topology attributes associated with the second addressable computing element. 18. The apparatus of claim 17, wherein the one or more packets from the first addressable computing element are also forwarded to one or more other addressable computing elements having at least one topology attribute in common with the second addressable computing element. 19. The apparatus of claim 17, wherein the set of identifiers representing the one or more topology attributes comprise one or more of a data center location identifier, a rack identifier, a server identifier, a socket identifier, a core identifier, and a hyper-thread identifier. 20. A method comprising: generating an instruction from an application program to instantiate an addressable computing element at a designated topological location in a computing system; wherein the method is performed by at least one processing device comprising a processor coupled to a memory. 21. The method of claim 20, wherein the instruction identifies a specific topological location in the computing system at which to instantiate the addressable computing element. 22. The method of claim 20, wherein the instruction specifies a topological location relative to another topological location at which to instantiate the addressable computing element. 23. The method of claim 20, wherein the instruction comprise a structured Media Access Control (MAC) address which serves as a parameter to an application programming interface call to start one or more VM instances at the designated topological locations. 24. A network comprising: a plurality of virtual machines; and physical infrastructure upon which the plurality of virtual machines are instantiated; wherein one or more packets are forwarded from a first virtual machine to at least a second virtual machine based on a topology-aware address assigned to the second virtual machine, wherein the topology-aware address comprises a set of identifiers representing one or more topology attributes associated with the second virtual machine.
2,400
7,076
7,076
14,264,132
2,454
Systems, methods, and devices of the various embodiments enable HTTP redirect messages to indicate content access policy information. In this manner, policy rules may be implemented based on the policy information in the HTTP redirect messages to control network congestion and/or quality of service (“QOS”).
1. A method for providing a resource from a Hypertext Transfer Protocol (HTTP) server to an HTTP client, comprising: receiving, in a processor, an HTTP redirect message including two or more alternate resource IDs and access policy information; and selecting, in the processor, one of the two or more alternate resource IDs based at least in part on the access policy information. 2. The method of claim 1, wherein: receiving, in the processor, an HTTP redirect message including two or more alternate resource IDs and access policy information comprises receiving, in the processor, an HTTP redirect message including two or more alternate resource IDs and access policy information in an HTTP proxy; and selecting, in the processor, one of the two or more alternate resource IDs based at least in part on the access policy information comprises selecting, in the processor, one of the two or more alternate resource IDs in the HTTP proxy based at least in part on the access policy information, the method further comprising sending a second HTTP redirect message including the selected alternate resource ID without the access policy information to the HTTP client. 3. The method claim 2, further comprising receiving network information in the HTTP proxy, wherein selecting one of the two or more alternate resource IDs in the HTTP proxy based at least in part on the access policy information comprises selecting one of the two or more alternate resource IDs in the HTTP proxy based at least in part on the access policy information and received network information. 4. The method of claim 3, wherein the network information is one or more of network congestion information, access speed information, time information, quality of service information, location information, cost information, and subscriber information. 5. The method of claim 2, wherein the HTTP redirect message is an HTTP 300 redirect message and the second HTTP redirect message is an HTTP 303 redirect message. 6. The method of claim 1, wherein selecting, in the processor, one of the two or more alternate resource IDs based at least in part on the access policy information comprises selecting, in the processor, one of the two or more alternate resource IDs based at least in part on the access policy information and a redirect handling rule. 7. The method of claim 1, wherein the access policy information is one or more of a priority indication, a validity time indication, a location rule, a guaranteed bit rate indication, a maximum bit rate indication, and a cost indication. 8. The method of claim 1, wherein the HTTP client is a Dynamic Adaptive Streaming Over Hypertext Transfer Protocol (DASH) client application and the received HTTP redirect message includes a Media Presentation Description (MPD) update indication. 9. A device, comprising a processor configured with processor-executable instructions to perform operations comprising: receiving a Hypertext Transfer Protocol (HTTP) redirect message including two or more alternate resource IDs and access policy information; and selecting one of the two or more alternate resource IDs based at least in part on the access policy information. 10. The device of claim 9, wherein the processor is configured with processor-executable instructions to perform operations such that: receiving an HTTP redirect message including two or more alternate resource IDs and access policy information comprises receiving an HTTP redirect message including two or more alternate resource IDs and access policy information in an HTTP proxy; and selecting one of the two or more alternate resource IDs based at least in part on the access policy information comprises selecting one of the two or more alternate resource IDs in the HTTP proxy based at least in part on the access policy information, and wherein the processor is configured with processor-executable instructions to perform operations further comprising sending a second HTTP redirect message including the selected alternate resource ID without the access policy information from the HTTP proxy to an HTTP client. 11. The device of claim 10, wherein the processor is configured with processor-executable instructions to perform operations further comprising receiving network information in the HTTP proxy, and wherein the processor is configured with processor-executable instructions to perform operations such that selecting one of the two or more alternate resource IDs in the HTTP proxy based at least in part on the access policy information comprises selecting one of the two or more alternate resource IDs in the HTTP proxy based at least in part on the access policy information and received network information. 12. The device of claim 11, wherein the processor is configured with processor-executable instructions to perform operations such that the network information is one or more of network congestion information, access speed information, time information, quality of service information, location information, cost information, and subscriber information. 13. The device of claim 10, wherein the processor is configured with processor-executable instructions to perform operations such that the HTTP redirect message is an HTTP 300 redirect message and the second HTTP redirect message is an HTTP 303 redirect message. 14. The device of claim 9, wherein the processor is configured with processor-executable instructions to perform operations such that selecting one of the two or more alternate resource IDs based at least in part on the access policy information comprises selecting one of the two or more alternate resource IDs based at least in part on the access policy information and a redirect handling rule. 15. The device of claim 9, wherein the processor is configured with processor-executable instructions to perform operations such that the access policy information is one or more of a priority indication, a validity time indication, a location rule, a guaranteed bit rate indication, a maximum bit rate indication, and a cost indication. 16. The device of claim 9, wherein the processor is configured with processor-executable instructions to perform operations further comprising providing a resource corresponding to the selected one of the two or more alternate resource IDs to an a Dynamic Adaptive Streaming Over Hypertext Transfer Protocol (DASH) client, and wherein the processor is configured with processor-executable instructions to perform operations such that the received HTTP redirect message includes a Media Presentation Description (MPD) update indication. 17. A non-transitory processor readable medium having stored thereon processor-executable instructions configured to cause a processor to perform operations, comprising: receiving a Hypertext Transfer Protocol (HTTP) redirect message including two or more alternate resource IDs and access policy information; and selecting one of the two or more alternate resource IDs based at least in part on the access policy information. 18. The non-transitory processor readable medium of claim 17, wherein the stored processor-executable instructions are configured to cause a processor to perform operations such that: receiving an HTTP redirect message including two or more alternate resource IDs and access policy information comprises receiving an HTTP redirect message including two or more alternate resource IDs and access policy information in an HTTP proxy; and selecting one of the two or more alternate resource IDs based at least in part on the access policy information comprises selecting one of the two or more alternate resource IDs in the HTTP proxy based at least in part on the access policy information, and wherein the stored processor-executable instructions are configured to cause a processor to perform operations further comprising sending a second HTTP redirect message including the selected alternate resource ID without the access policy information to an HTTP client. 19. The non-transitory processor readable medium of claim 18, wherein the stored processor-executable instructions are configured to cause a processor to perform operations such that the HTTP redirect message is an HTTP 300 redirect message and the second HTTP redirect message is an HTTP 303 redirect message. 20. The non-transitory processor readable medium of claim 16, wherein the stored processor-executable instructions are configured to cause a processor to perform operations such that selecting one of the two or more alternate resource IDs based at least in part on the access policy information comprises selecting one of the two or more alternate resource IDs based at least in part on the access policy information and a redirect handling rule.
Systems, methods, and devices of the various embodiments enable HTTP redirect messages to indicate content access policy information. In this manner, policy rules may be implemented based on the policy information in the HTTP redirect messages to control network congestion and/or quality of service (“QOS”).1. A method for providing a resource from a Hypertext Transfer Protocol (HTTP) server to an HTTP client, comprising: receiving, in a processor, an HTTP redirect message including two or more alternate resource IDs and access policy information; and selecting, in the processor, one of the two or more alternate resource IDs based at least in part on the access policy information. 2. The method of claim 1, wherein: receiving, in the processor, an HTTP redirect message including two or more alternate resource IDs and access policy information comprises receiving, in the processor, an HTTP redirect message including two or more alternate resource IDs and access policy information in an HTTP proxy; and selecting, in the processor, one of the two or more alternate resource IDs based at least in part on the access policy information comprises selecting, in the processor, one of the two or more alternate resource IDs in the HTTP proxy based at least in part on the access policy information, the method further comprising sending a second HTTP redirect message including the selected alternate resource ID without the access policy information to the HTTP client. 3. The method claim 2, further comprising receiving network information in the HTTP proxy, wherein selecting one of the two or more alternate resource IDs in the HTTP proxy based at least in part on the access policy information comprises selecting one of the two or more alternate resource IDs in the HTTP proxy based at least in part on the access policy information and received network information. 4. The method of claim 3, wherein the network information is one or more of network congestion information, access speed information, time information, quality of service information, location information, cost information, and subscriber information. 5. The method of claim 2, wherein the HTTP redirect message is an HTTP 300 redirect message and the second HTTP redirect message is an HTTP 303 redirect message. 6. The method of claim 1, wherein selecting, in the processor, one of the two or more alternate resource IDs based at least in part on the access policy information comprises selecting, in the processor, one of the two or more alternate resource IDs based at least in part on the access policy information and a redirect handling rule. 7. The method of claim 1, wherein the access policy information is one or more of a priority indication, a validity time indication, a location rule, a guaranteed bit rate indication, a maximum bit rate indication, and a cost indication. 8. The method of claim 1, wherein the HTTP client is a Dynamic Adaptive Streaming Over Hypertext Transfer Protocol (DASH) client application and the received HTTP redirect message includes a Media Presentation Description (MPD) update indication. 9. A device, comprising a processor configured with processor-executable instructions to perform operations comprising: receiving a Hypertext Transfer Protocol (HTTP) redirect message including two or more alternate resource IDs and access policy information; and selecting one of the two or more alternate resource IDs based at least in part on the access policy information. 10. The device of claim 9, wherein the processor is configured with processor-executable instructions to perform operations such that: receiving an HTTP redirect message including two or more alternate resource IDs and access policy information comprises receiving an HTTP redirect message including two or more alternate resource IDs and access policy information in an HTTP proxy; and selecting one of the two or more alternate resource IDs based at least in part on the access policy information comprises selecting one of the two or more alternate resource IDs in the HTTP proxy based at least in part on the access policy information, and wherein the processor is configured with processor-executable instructions to perform operations further comprising sending a second HTTP redirect message including the selected alternate resource ID without the access policy information from the HTTP proxy to an HTTP client. 11. The device of claim 10, wherein the processor is configured with processor-executable instructions to perform operations further comprising receiving network information in the HTTP proxy, and wherein the processor is configured with processor-executable instructions to perform operations such that selecting one of the two or more alternate resource IDs in the HTTP proxy based at least in part on the access policy information comprises selecting one of the two or more alternate resource IDs in the HTTP proxy based at least in part on the access policy information and received network information. 12. The device of claim 11, wherein the processor is configured with processor-executable instructions to perform operations such that the network information is one or more of network congestion information, access speed information, time information, quality of service information, location information, cost information, and subscriber information. 13. The device of claim 10, wherein the processor is configured with processor-executable instructions to perform operations such that the HTTP redirect message is an HTTP 300 redirect message and the second HTTP redirect message is an HTTP 303 redirect message. 14. The device of claim 9, wherein the processor is configured with processor-executable instructions to perform operations such that selecting one of the two or more alternate resource IDs based at least in part on the access policy information comprises selecting one of the two or more alternate resource IDs based at least in part on the access policy information and a redirect handling rule. 15. The device of claim 9, wherein the processor is configured with processor-executable instructions to perform operations such that the access policy information is one or more of a priority indication, a validity time indication, a location rule, a guaranteed bit rate indication, a maximum bit rate indication, and a cost indication. 16. The device of claim 9, wherein the processor is configured with processor-executable instructions to perform operations further comprising providing a resource corresponding to the selected one of the two or more alternate resource IDs to an a Dynamic Adaptive Streaming Over Hypertext Transfer Protocol (DASH) client, and wherein the processor is configured with processor-executable instructions to perform operations such that the received HTTP redirect message includes a Media Presentation Description (MPD) update indication. 17. A non-transitory processor readable medium having stored thereon processor-executable instructions configured to cause a processor to perform operations, comprising: receiving a Hypertext Transfer Protocol (HTTP) redirect message including two or more alternate resource IDs and access policy information; and selecting one of the two or more alternate resource IDs based at least in part on the access policy information. 18. The non-transitory processor readable medium of claim 17, wherein the stored processor-executable instructions are configured to cause a processor to perform operations such that: receiving an HTTP redirect message including two or more alternate resource IDs and access policy information comprises receiving an HTTP redirect message including two or more alternate resource IDs and access policy information in an HTTP proxy; and selecting one of the two or more alternate resource IDs based at least in part on the access policy information comprises selecting one of the two or more alternate resource IDs in the HTTP proxy based at least in part on the access policy information, and wherein the stored processor-executable instructions are configured to cause a processor to perform operations further comprising sending a second HTTP redirect message including the selected alternate resource ID without the access policy information to an HTTP client. 19. The non-transitory processor readable medium of claim 18, wherein the stored processor-executable instructions are configured to cause a processor to perform operations such that the HTTP redirect message is an HTTP 300 redirect message and the second HTTP redirect message is an HTTP 303 redirect message. 20. The non-transitory processor readable medium of claim 16, wherein the stored processor-executable instructions are configured to cause a processor to perform operations such that selecting one of the two or more alternate resource IDs based at least in part on the access policy information comprises selecting one of the two or more alternate resource IDs based at least in part on the access policy information and a redirect handling rule.
2,400
7,077
7,077
14,337,560
2,466
A mobile communication device generates a respective request (such as a wireless communication) to access a network. An access point supporting communications over multiple carrier frequency bands receives the request from the mobile communication device to establish a wireless connection. A connection manager associated with the access point analyzes current load conditions associated with other mobile communication devices communicating with the access point over the multiple carrier frequency bands. Based at least in part on the current load conditions, the connection manager selects a carrier frequency band from the multiple carrier frequency bands. The connection manager initiates notification to the mobile communication device to connect to the access point using the selected carrier frequency band.
1. A method comprising: receiving a request from a mobile communication device to establish a connection with an access point in a network, the access point supporting wireless communications over multiple carrier frequency bands, the request received in a wireless communication; analyzing current load conditions associated with other mobile communication devices communicating with the access point over the multiple carrier frequency bands; selecting a carrier frequency band from the multiple carrier frequency bands based at least in part on the current load conditions; and notifying the mobile communication device to connect to the access point using the selected carrier frequency band. 2. The method as in claim 1, wherein the mobile communication device supports communications over each of the multiple frequency bands, the multiple frequency bands including a first carrier frequency band and a second carrier frequency band. 3. The method as in claim 2, wherein the first carrier frequency band supports substantially longer wireless communication distances between the access point and the mobile communication device than the second carrier frequency band. 4. The method as in claim 3, wherein selecting the carrier frequency band further comprises: comparing a signal strength of receiving the request at the access point to a signal strength threshold value; and responsive to detecting that the signal strength is greater than the signal strength threshold value and that current load conditions of the other communication devices communicating with the access point over the second carrier frequency band is below a load threshold value, selecting the second carrier frequency band of the multiple carrier frequency bands for the mobile communication device to communicate with the access point. 5. The method as in claim 3, wherein selecting the carrier frequency band further comprises: comparing a signal strength of receiving the request at the access point to a signal strength threshold value; and responsive to detecting that the received signal strength of the request is less than the signal strength threshold value, selecting the first carrier frequency band of the multiple carrier frequency bands for the mobile communication device to communicate with the access point. 6. The method as in claim 1 further comprising: receiving the request at multiple access points in the network; selecting an access point from the multiple access points; and notifying the mobile communication device to establish a respective wireless connection with the selected access point using the selected carrier frequency band. 7. The method as in claim 1 further comprising: utilizing a round-trip time of communications between the access point and the mobile communication device to estimate a distance of the mobile communication device with respect to the access point; and selecting the carrier frequency band based at least in part on the estimated distance. 8. The method as in claim 1, wherein the network is a WiFi™ network and the access point supports communications in accordance with the WiFi™ communication protocol. 9. The method as in claim 1, wherein the mobile communication device supports communications over each of the multiple carrier frequency bands, the multiple carrier frequency bands including a first carrier frequency band and a second carrier frequency band; wherein the first carrier frequency band supports a first region of wireless communication coverage with respect to the access point, the second carrier frequency band supporting a second region of wireless coverage with respect to the access point, the second region of wireless coverage residing within and being substantially smaller than the first region of wireless coverage. 10. The method as in claim 9, wherein the selected carrier frequency band is the second carrier frequency band, the method further comprising: subsequent to communicating between the access point and the mobile communication device over the second carrier frequency band, detecting movement of the mobile communication device outside the second region of wireless coverage into the first region of wireless coverage; and responsive to detecting the movement, notifying the mobile communication device to terminate communications with the access point using the second carrier frequency band and continue communications with the access point over the first carrier frequency band. 11. The method as in claim 10, wherein detecting the movement further comprises: detecting a signal strength of communications received from the mobile communication device over the second carrier frequency band; comparing the signal strength of the communications to a signal strength threshold value; and detecting that the signal strength of the communications is less than the signal strength threshold value. 12. The method as in claim 10, wherein detecting the movement further comprises: detecting that the distance from the access point to the mobile communication device is greater than a distance threshold value. 13. The method as in claim 9, wherein the selected carrier frequency band is the first carrier frequency band, the method further comprising: subsequent to communicating between the access point and the mobile communication device over the first carrier frequency band, detecting movement of the mobile communication device from outside to inside the second region of wireless coverage; and responsive to detecting the movement, notifying the mobile communication device to terminate communications with the access point using the first carrier frequency band and continue communications with the access point over the second carrier frequency band. 14. The method as in claim 13, wherein detecting the movement further comprises: communicating a beacon signal over the second carrier frequency band to the mobile communication device, the mobile communication device measuring a strength of receiving the beacon signal; receiving a communication from the mobile communication device indicating a signal strength of the mobile communication device receiving the beacon signal; comparing the signal strength to a signal strength threshold value; and detecting that the signal strength is less than the signal strength threshold value. 15. The method as in claim 13, wherein detecting the movement further comprises: detecting that the distance of the mobile communication device from the access point falls below a distance threshold value. 16. The method as in claim 1, wherein the mobile communication device supports communications over each of the multiple frequency bands, the multiple frequency bands including a 2.4 GHz first carrier frequency band and a 5 GHz carrier frequency band. 17. The method as in claim 9, wherein the selected carrier frequency band is the second carrier frequency band, the method further comprising: subsequent to communicating between the access point and the mobile communication device over the second carrier frequency band, detecting that a rate of movement of the mobile communication device is above a rate threshold value; and responsive to detecting that the rate of the movement is above the rate threshold value, notifying the mobile communication device to terminate communications with the access point using the second carrier frequency band and continue communications with the access point over the first carrier frequency band. 18. A method comprising: receiving a request from a mobile communication device to establish a connection with an access point in a network, the access point supporting wireless communications over multiple carrier frequency bands; selecting a carrier frequency band from multiple carrier frequency bands based at least in part on an estimated distance of the mobile communication device from the access point; and notifying the mobile communication device to connect to the access point using the selected carrier frequency band. 19. The method as in claim 18 further comprising: detecting the distance of the mobile communication device with the access point using round-trip time measurements of communications between the access point in the mobile communication device. 20. The method as in claim 18, wherein the multiple carrier frequency bands includes a first carrier frequency band and a second carrier frequency band; and wherein the first carrier frequency band supports a first region of wireless communication coverage with respect to the access point, the second carrier frequency band supporting a second region of wireless coverage with respect to the access point, the second region of wireless coverage residing within and being substantially smaller than the first region of wireless coverage. 21. The method as in claim 20, wherein selecting the carrier frequency band further comprises: comparing the estimated distance with a distance threshold value associated with the second region of wireless coverage, the distance threshold value defining an edge of the second region of wireless coverage; and detecting that the estimated distance is less than the distance threshold value. 22. A computer system comprising: computer processor hardware; and a hardware storage resource coupled to the computer processor hardware, the hardware storage resource storing instructions that, when executed by the computer processor hardware, causes the computer processor hardware to perform operations of: receiving a request from a mobile communication device to establish a connection with an access point in a network, the access point supporting wireless communications over multiple carrier frequency bands, the request received in a wireless communication; analyzing current load conditions associated with other mobile communication devices communicating with the access point over the multiple carrier frequency bands; selecting a carrier frequency band from the multiple carrier frequency bands based at least in part on the current load conditions; and notifying the mobile communication device to connect to the access point using the selected carrier frequency band. 23. The computer system as in claim 22, wherein the mobile communication device supports communications over each of the multiple frequency bands, the multiple frequency bands including a first carrier frequency band and a second carrier frequency band. 24. The computer system as in claim 23, wherein the first carrier frequency band supports substantially longer wireless communication distances between the access point and the mobile communication device than the second carrier frequency band. 25. The computer system as in claim 24, wherein selecting the carrier frequency band further comprises: comparing a signal strength of receiving the request at the access point to a signal strength threshold value; and responsive to detecting that the signal strength is greater than the signal strength threshold value and that current load conditions of the other communication devices communicating with the access point over the second carrier frequency band is below a load threshold value, selecting the second carrier frequency band of the multiple carrier frequency bands for the mobile communication device to communicate with the access point. 26. The computer system as in claim 24, wherein selecting the carrier frequency band further comprises: comparing a signal strength of receiving the request at the access point to a signal strength threshold value; and responsive to detecting that the received signal strength of the request is less than the signal strength threshold value, selecting the first carrier frequency band of the multiple carrier frequency bands for the mobile communication device to communicate with the access point. 27. The computer system as in claim 22, wherein the computer processor hardware further performs operations of: receiving the request at multiple access points in the network; selecting an access point from the multiple access points; and notifying the mobile communication device to establish a respective wireless connection with the selected access point using the selected carrier frequency band. 28. The computer system as in claim 22, wherein the computer processor hardware further performs operations of: utilizing a round-trip time of communications between the access point and the mobile communication device to estimate a distance of the mobile communication device with respect to the access point; and selecting the carrier frequency band based at least in part on the estimated distance. 29. The computer system as in claim 22, wherein the network is a WiFi™ network and the access point supports communications in accordance with the WiFi™ communication protocol. 30. The computer system as in claim 22, wherein the mobile communication device supports communications over each of the multiple carrier frequency bands, the multiple carrier frequency bands including a first carrier frequency band and a second carrier frequency band; wherein the first carrier frequency band supports a first region of wireless communication coverage with respect to the access point, the second carrier frequency band supporting a second region of wireless coverage with respect to the access point, the second region of wireless coverage residing within and being substantially smaller than the first region of wireless coverage. 31. Computer-readable hardware storage having instructions stored thereon, the instructions, when carried out by computer processor hardware, causes the computer processor hardware to perform operations of: receiving a request from a mobile communication device to establish a connection with an access point in a network, the access point supporting wireless communications over multiple carrier frequency bands, the request received in a wireless communication; analyzing current load conditions associated with other mobile communication devices communicating with the access point over the multiple carrier frequency bands; selecting a carrier frequency band from the multiple carrier frequency bands based at least in part on the current load conditions; and notifying the mobile communication device to connect to the access point using the selected carrier frequency band. 32. The method as in claim 18, wherein the multiple carrier frequency bands includes a first carrier frequency band, a second carrier frequency band, and a third carrier frequency band, the first carrier frequency band supporting a first region of wireless communication coverage with respect to the access point, the second carrier frequency band supporting a second region of wireless coverage with respect to the access point, the third carrier frequency band supporting a third region of wireless coverage with respect to the access point; and the method further comprising: assigning priority information to each of the multiple available carrier frequency bands; and wherein the selected carrier frequency band is a carrier frequency band assigned highest priority as indicated by the assigned priority information.
A mobile communication device generates a respective request (such as a wireless communication) to access a network. An access point supporting communications over multiple carrier frequency bands receives the request from the mobile communication device to establish a wireless connection. A connection manager associated with the access point analyzes current load conditions associated with other mobile communication devices communicating with the access point over the multiple carrier frequency bands. Based at least in part on the current load conditions, the connection manager selects a carrier frequency band from the multiple carrier frequency bands. The connection manager initiates notification to the mobile communication device to connect to the access point using the selected carrier frequency band.1. A method comprising: receiving a request from a mobile communication device to establish a connection with an access point in a network, the access point supporting wireless communications over multiple carrier frequency bands, the request received in a wireless communication; analyzing current load conditions associated with other mobile communication devices communicating with the access point over the multiple carrier frequency bands; selecting a carrier frequency band from the multiple carrier frequency bands based at least in part on the current load conditions; and notifying the mobile communication device to connect to the access point using the selected carrier frequency band. 2. The method as in claim 1, wherein the mobile communication device supports communications over each of the multiple frequency bands, the multiple frequency bands including a first carrier frequency band and a second carrier frequency band. 3. The method as in claim 2, wherein the first carrier frequency band supports substantially longer wireless communication distances between the access point and the mobile communication device than the second carrier frequency band. 4. The method as in claim 3, wherein selecting the carrier frequency band further comprises: comparing a signal strength of receiving the request at the access point to a signal strength threshold value; and responsive to detecting that the signal strength is greater than the signal strength threshold value and that current load conditions of the other communication devices communicating with the access point over the second carrier frequency band is below a load threshold value, selecting the second carrier frequency band of the multiple carrier frequency bands for the mobile communication device to communicate with the access point. 5. The method as in claim 3, wherein selecting the carrier frequency band further comprises: comparing a signal strength of receiving the request at the access point to a signal strength threshold value; and responsive to detecting that the received signal strength of the request is less than the signal strength threshold value, selecting the first carrier frequency band of the multiple carrier frequency bands for the mobile communication device to communicate with the access point. 6. The method as in claim 1 further comprising: receiving the request at multiple access points in the network; selecting an access point from the multiple access points; and notifying the mobile communication device to establish a respective wireless connection with the selected access point using the selected carrier frequency band. 7. The method as in claim 1 further comprising: utilizing a round-trip time of communications between the access point and the mobile communication device to estimate a distance of the mobile communication device with respect to the access point; and selecting the carrier frequency band based at least in part on the estimated distance. 8. The method as in claim 1, wherein the network is a WiFi™ network and the access point supports communications in accordance with the WiFi™ communication protocol. 9. The method as in claim 1, wherein the mobile communication device supports communications over each of the multiple carrier frequency bands, the multiple carrier frequency bands including a first carrier frequency band and a second carrier frequency band; wherein the first carrier frequency band supports a first region of wireless communication coverage with respect to the access point, the second carrier frequency band supporting a second region of wireless coverage with respect to the access point, the second region of wireless coverage residing within and being substantially smaller than the first region of wireless coverage. 10. The method as in claim 9, wherein the selected carrier frequency band is the second carrier frequency band, the method further comprising: subsequent to communicating between the access point and the mobile communication device over the second carrier frequency band, detecting movement of the mobile communication device outside the second region of wireless coverage into the first region of wireless coverage; and responsive to detecting the movement, notifying the mobile communication device to terminate communications with the access point using the second carrier frequency band and continue communications with the access point over the first carrier frequency band. 11. The method as in claim 10, wherein detecting the movement further comprises: detecting a signal strength of communications received from the mobile communication device over the second carrier frequency band; comparing the signal strength of the communications to a signal strength threshold value; and detecting that the signal strength of the communications is less than the signal strength threshold value. 12. The method as in claim 10, wherein detecting the movement further comprises: detecting that the distance from the access point to the mobile communication device is greater than a distance threshold value. 13. The method as in claim 9, wherein the selected carrier frequency band is the first carrier frequency band, the method further comprising: subsequent to communicating between the access point and the mobile communication device over the first carrier frequency band, detecting movement of the mobile communication device from outside to inside the second region of wireless coverage; and responsive to detecting the movement, notifying the mobile communication device to terminate communications with the access point using the first carrier frequency band and continue communications with the access point over the second carrier frequency band. 14. The method as in claim 13, wherein detecting the movement further comprises: communicating a beacon signal over the second carrier frequency band to the mobile communication device, the mobile communication device measuring a strength of receiving the beacon signal; receiving a communication from the mobile communication device indicating a signal strength of the mobile communication device receiving the beacon signal; comparing the signal strength to a signal strength threshold value; and detecting that the signal strength is less than the signal strength threshold value. 15. The method as in claim 13, wherein detecting the movement further comprises: detecting that the distance of the mobile communication device from the access point falls below a distance threshold value. 16. The method as in claim 1, wherein the mobile communication device supports communications over each of the multiple frequency bands, the multiple frequency bands including a 2.4 GHz first carrier frequency band and a 5 GHz carrier frequency band. 17. The method as in claim 9, wherein the selected carrier frequency band is the second carrier frequency band, the method further comprising: subsequent to communicating between the access point and the mobile communication device over the second carrier frequency band, detecting that a rate of movement of the mobile communication device is above a rate threshold value; and responsive to detecting that the rate of the movement is above the rate threshold value, notifying the mobile communication device to terminate communications with the access point using the second carrier frequency band and continue communications with the access point over the first carrier frequency band. 18. A method comprising: receiving a request from a mobile communication device to establish a connection with an access point in a network, the access point supporting wireless communications over multiple carrier frequency bands; selecting a carrier frequency band from multiple carrier frequency bands based at least in part on an estimated distance of the mobile communication device from the access point; and notifying the mobile communication device to connect to the access point using the selected carrier frequency band. 19. The method as in claim 18 further comprising: detecting the distance of the mobile communication device with the access point using round-trip time measurements of communications between the access point in the mobile communication device. 20. The method as in claim 18, wherein the multiple carrier frequency bands includes a first carrier frequency band and a second carrier frequency band; and wherein the first carrier frequency band supports a first region of wireless communication coverage with respect to the access point, the second carrier frequency band supporting a second region of wireless coverage with respect to the access point, the second region of wireless coverage residing within and being substantially smaller than the first region of wireless coverage. 21. The method as in claim 20, wherein selecting the carrier frequency band further comprises: comparing the estimated distance with a distance threshold value associated with the second region of wireless coverage, the distance threshold value defining an edge of the second region of wireless coverage; and detecting that the estimated distance is less than the distance threshold value. 22. A computer system comprising: computer processor hardware; and a hardware storage resource coupled to the computer processor hardware, the hardware storage resource storing instructions that, when executed by the computer processor hardware, causes the computer processor hardware to perform operations of: receiving a request from a mobile communication device to establish a connection with an access point in a network, the access point supporting wireless communications over multiple carrier frequency bands, the request received in a wireless communication; analyzing current load conditions associated with other mobile communication devices communicating with the access point over the multiple carrier frequency bands; selecting a carrier frequency band from the multiple carrier frequency bands based at least in part on the current load conditions; and notifying the mobile communication device to connect to the access point using the selected carrier frequency band. 23. The computer system as in claim 22, wherein the mobile communication device supports communications over each of the multiple frequency bands, the multiple frequency bands including a first carrier frequency band and a second carrier frequency band. 24. The computer system as in claim 23, wherein the first carrier frequency band supports substantially longer wireless communication distances between the access point and the mobile communication device than the second carrier frequency band. 25. The computer system as in claim 24, wherein selecting the carrier frequency band further comprises: comparing a signal strength of receiving the request at the access point to a signal strength threshold value; and responsive to detecting that the signal strength is greater than the signal strength threshold value and that current load conditions of the other communication devices communicating with the access point over the second carrier frequency band is below a load threshold value, selecting the second carrier frequency band of the multiple carrier frequency bands for the mobile communication device to communicate with the access point. 26. The computer system as in claim 24, wherein selecting the carrier frequency band further comprises: comparing a signal strength of receiving the request at the access point to a signal strength threshold value; and responsive to detecting that the received signal strength of the request is less than the signal strength threshold value, selecting the first carrier frequency band of the multiple carrier frequency bands for the mobile communication device to communicate with the access point. 27. The computer system as in claim 22, wherein the computer processor hardware further performs operations of: receiving the request at multiple access points in the network; selecting an access point from the multiple access points; and notifying the mobile communication device to establish a respective wireless connection with the selected access point using the selected carrier frequency band. 28. The computer system as in claim 22, wherein the computer processor hardware further performs operations of: utilizing a round-trip time of communications between the access point and the mobile communication device to estimate a distance of the mobile communication device with respect to the access point; and selecting the carrier frequency band based at least in part on the estimated distance. 29. The computer system as in claim 22, wherein the network is a WiFi™ network and the access point supports communications in accordance with the WiFi™ communication protocol. 30. The computer system as in claim 22, wherein the mobile communication device supports communications over each of the multiple carrier frequency bands, the multiple carrier frequency bands including a first carrier frequency band and a second carrier frequency band; wherein the first carrier frequency band supports a first region of wireless communication coverage with respect to the access point, the second carrier frequency band supporting a second region of wireless coverage with respect to the access point, the second region of wireless coverage residing within and being substantially smaller than the first region of wireless coverage. 31. Computer-readable hardware storage having instructions stored thereon, the instructions, when carried out by computer processor hardware, causes the computer processor hardware to perform operations of: receiving a request from a mobile communication device to establish a connection with an access point in a network, the access point supporting wireless communications over multiple carrier frequency bands, the request received in a wireless communication; analyzing current load conditions associated with other mobile communication devices communicating with the access point over the multiple carrier frequency bands; selecting a carrier frequency band from the multiple carrier frequency bands based at least in part on the current load conditions; and notifying the mobile communication device to connect to the access point using the selected carrier frequency band. 32. The method as in claim 18, wherein the multiple carrier frequency bands includes a first carrier frequency band, a second carrier frequency band, and a third carrier frequency band, the first carrier frequency band supporting a first region of wireless communication coverage with respect to the access point, the second carrier frequency band supporting a second region of wireless coverage with respect to the access point, the third carrier frequency band supporting a third region of wireless coverage with respect to the access point; and the method further comprising: assigning priority information to each of the multiple available carrier frequency bands; and wherein the selected carrier frequency band is a carrier frequency band assigned highest priority as indicated by the assigned priority information.
2,400
7,078
7,078
14,925,418
2,472
A high-power point and one or more low-power points transmit signals that are associated with the same cell-identifier in a heterogeneous cell deployment. The coverage areas corresponding to the low-power points fall at least partly within the coverage area for the high-power point, so that mobile stations within range of a low-power point are also within range of the high-power point, from a downlink perspective. The same CRS signals are transmitted by both the high-power (macro) point and some or all of the low-power (pico) points. At the same time, the network transmits CRS-based PDSCH for a particular UE on both the high-power point as well as on some or all of the low-power points. In some embodiments only a subset of the points, e.g., those points that the UE hears sufficiently well, participate in the PDSCH transmission using CRS for channel estimation.
1. A method for transmitting data to a mobile station, the method comprising transmitting cell-specific reference symbol (CRS) signals from a primary, high-power, transmitting node having a first coverage area; transmitting the same CRS signals from each of two or more secondary, low-power, transmitting nodes, each of the secondary transmitting nodes having a coverage area that is within or substantially within the first coverage area; and simultaneously transmitting a physical downlink data channel to a mobile station from the primary, high-power, transmitting node and from at least one of but fewer than all of the two or more secondary, low-power, transmitting nodes, wherein said at least one but fewer than all of the two or more secondary, low-power, transmitting nodes is selected based on a determination of whether the physical downlink data channel transmissions from each secondary transmitting node could be received by the mobile station with adequate signal strength. 2. The method of claim 1, wherein said determination is made by measuring uplink transmissions from the mobile station at one or more of the secondary transmitting nodes. 3. The method of claim 1, further comprising transmitting the same synchronization channel from all of said secondary transmitting nodes. 4. A system of transmitting nodes in a wireless network, the system comprising: a primary, high-power, transmitting node configured to transmit cell-specific reference symbol (CRS) signals over a first coverage area, and; two or more secondary, low-power, transmitting nodes, each configured to transmit the same CRS signals over a coverage area that is within or substantially within the first coverage area; wherein said primary transmitting node and at least one of but fewer than all of said two or more secondary transmitting nodes are configured to simultaneously transmit a physical downlink data channel to a first mobile station; wherein the system further comprises a control element configured to select said at least one but fewer than all of the two or more secondary transmitting nodes for transmitting the physical downlink data channel to the mobile station, based on whether physical downlink data channel transmissions from each secondary transmitting node could be received by the mobile station with adequate signal strength. 5. The system of claim 4, wherein the control element is configured to select said at least one but fewer than all of the two or more secondary transmitting nodes based on measurements of uplink transmissions from the mobile station at one or more of the secondary transmitting nodes. 6. The system of claim 4, wherein all of said two or more secondary transmitting nodes are configured to transmit the same synchronization signal. 7. A control unit for use in a wireless network having a primary, high-power, transmitting node with a first coverage area and a plurality of secondary, low-power, transmitting nodes, each having a coverage area that is within or substantially within the first coverage area, the control unit comprising: a network communication circuit configured to transmit and receive control information to and from said secondary transmitting nodes; and a processing circuit configured to configure said primary transmitting node to transmit cell-specific reference symbol (CRS) signals over the first coverage area; wherein the processing circuit is further configured to: configure two or more of said secondary transmitting nodes to transmit the same CRS signals; and configure said primary transmitting node and at least one of but fewer than all of said two or more secondary transmitting nodes to simultaneously transmit a physical downlink data channel to a mobile station, wherein the processing circuit is further configured to select said at least one but fewer than all of said two or more secondary transmitting nodes based on a determination of whether physical downlink data channel transmissions from each secondary transmitting node could be received by the mobile station with adequate signal strength. 8. The control unit of claim 7, wherein the processing circuit is configured to configure all of said secondary transmitting nodes in the first coverage area to transmit the same CRS signals. 9. The control unit of claim 7, wherein the processing circuit is configured to select said at least one but fewer than all of said two or more secondary transmitting nodes based on measurements of uplink transmissions from the mobile station at one or more of the secondary transmitting nodes. 10. The control unit of claim 7, wherein the control unit is part of the primary transmitting node. 11. The control unit of claim 7, wherein the control unit is part of one of the secondary transmitting nodes, and wherein the network communication circuit is further configured to transmit and receive control information to and from the primary transmitting node. 12. A method implemented by a control unit for use in a wireless network comprising a primary, high-power, transmitting node having a first coverage area and a plurality of secondary, low-power, transmitting nodes, each having a coverage area that is within or substantially within the first coverage area, the method comprising: configuring said primary transmitting node to transmit cell-specific reference symbol (CRS) signals over the first coverage area; configuring two or more of said secondary transmitting nodes to transmit the same CRS signals; configuring the primary transmitting node and at least one of but fewer than all of the two or more secondary transmitting nodes to simultaneously transmit a physical downlink data channel to a mobile station; selecting said at least one but fewer than all of the two or more secondary transmitting nodes based on a determination of whether physical downlink data channel transmissions from each secondary transmitting node could be received by the mobile station with adequate signal strength.
A high-power point and one or more low-power points transmit signals that are associated with the same cell-identifier in a heterogeneous cell deployment. The coverage areas corresponding to the low-power points fall at least partly within the coverage area for the high-power point, so that mobile stations within range of a low-power point are also within range of the high-power point, from a downlink perspective. The same CRS signals are transmitted by both the high-power (macro) point and some or all of the low-power (pico) points. At the same time, the network transmits CRS-based PDSCH for a particular UE on both the high-power point as well as on some or all of the low-power points. In some embodiments only a subset of the points, e.g., those points that the UE hears sufficiently well, participate in the PDSCH transmission using CRS for channel estimation.1. A method for transmitting data to a mobile station, the method comprising transmitting cell-specific reference symbol (CRS) signals from a primary, high-power, transmitting node having a first coverage area; transmitting the same CRS signals from each of two or more secondary, low-power, transmitting nodes, each of the secondary transmitting nodes having a coverage area that is within or substantially within the first coverage area; and simultaneously transmitting a physical downlink data channel to a mobile station from the primary, high-power, transmitting node and from at least one of but fewer than all of the two or more secondary, low-power, transmitting nodes, wherein said at least one but fewer than all of the two or more secondary, low-power, transmitting nodes is selected based on a determination of whether the physical downlink data channel transmissions from each secondary transmitting node could be received by the mobile station with adequate signal strength. 2. The method of claim 1, wherein said determination is made by measuring uplink transmissions from the mobile station at one or more of the secondary transmitting nodes. 3. The method of claim 1, further comprising transmitting the same synchronization channel from all of said secondary transmitting nodes. 4. A system of transmitting nodes in a wireless network, the system comprising: a primary, high-power, transmitting node configured to transmit cell-specific reference symbol (CRS) signals over a first coverage area, and; two or more secondary, low-power, transmitting nodes, each configured to transmit the same CRS signals over a coverage area that is within or substantially within the first coverage area; wherein said primary transmitting node and at least one of but fewer than all of said two or more secondary transmitting nodes are configured to simultaneously transmit a physical downlink data channel to a first mobile station; wherein the system further comprises a control element configured to select said at least one but fewer than all of the two or more secondary transmitting nodes for transmitting the physical downlink data channel to the mobile station, based on whether physical downlink data channel transmissions from each secondary transmitting node could be received by the mobile station with adequate signal strength. 5. The system of claim 4, wherein the control element is configured to select said at least one but fewer than all of the two or more secondary transmitting nodes based on measurements of uplink transmissions from the mobile station at one or more of the secondary transmitting nodes. 6. The system of claim 4, wherein all of said two or more secondary transmitting nodes are configured to transmit the same synchronization signal. 7. A control unit for use in a wireless network having a primary, high-power, transmitting node with a first coverage area and a plurality of secondary, low-power, transmitting nodes, each having a coverage area that is within or substantially within the first coverage area, the control unit comprising: a network communication circuit configured to transmit and receive control information to and from said secondary transmitting nodes; and a processing circuit configured to configure said primary transmitting node to transmit cell-specific reference symbol (CRS) signals over the first coverage area; wherein the processing circuit is further configured to: configure two or more of said secondary transmitting nodes to transmit the same CRS signals; and configure said primary transmitting node and at least one of but fewer than all of said two or more secondary transmitting nodes to simultaneously transmit a physical downlink data channel to a mobile station, wherein the processing circuit is further configured to select said at least one but fewer than all of said two or more secondary transmitting nodes based on a determination of whether physical downlink data channel transmissions from each secondary transmitting node could be received by the mobile station with adequate signal strength. 8. The control unit of claim 7, wherein the processing circuit is configured to configure all of said secondary transmitting nodes in the first coverage area to transmit the same CRS signals. 9. The control unit of claim 7, wherein the processing circuit is configured to select said at least one but fewer than all of said two or more secondary transmitting nodes based on measurements of uplink transmissions from the mobile station at one or more of the secondary transmitting nodes. 10. The control unit of claim 7, wherein the control unit is part of the primary transmitting node. 11. The control unit of claim 7, wherein the control unit is part of one of the secondary transmitting nodes, and wherein the network communication circuit is further configured to transmit and receive control information to and from the primary transmitting node. 12. A method implemented by a control unit for use in a wireless network comprising a primary, high-power, transmitting node having a first coverage area and a plurality of secondary, low-power, transmitting nodes, each having a coverage area that is within or substantially within the first coverage area, the method comprising: configuring said primary transmitting node to transmit cell-specific reference symbol (CRS) signals over the first coverage area; configuring two or more of said secondary transmitting nodes to transmit the same CRS signals; configuring the primary transmitting node and at least one of but fewer than all of the two or more secondary transmitting nodes to simultaneously transmit a physical downlink data channel to a mobile station; selecting said at least one but fewer than all of the two or more secondary transmitting nodes based on a determination of whether physical downlink data channel transmissions from each secondary transmitting node could be received by the mobile station with adequate signal strength.
2,400
7,079
7,079
14,525,125
2,488
An imaging sensor device includes pixel array processing functions that allow time-of-flight (TOF) analysis to be performed on selected portions of the pixel array, while two-dimensional imaging analysis is performed on the remaining portions of the array, reducing processing load and response time relative to performing TOF analysis for all pixels of the array. The portion of the pixel array designated for TOF analysis can be pre-defined through configuration of the imaging sensor device. Alternatively, the imaging sensor device can dynamically select the portions of the pixel array on which TOF analysis is to be performed based on object detection and classification by the two-dimensional imaging analysis. Embodiments of the imaging sensor device can also implement a number of safety and redundancy functions to achieve a high degree of safety integrity, making the sensor suitable for use in various types of safety monitoring applications.
1. An imaging sensor device, comprising: a memory that stores computer-executable components; a processor, operatively coupled to the memory, that executes the computer-executable components, the computer-executable components comprising: a pixel array component configured to, for a pixel array of an image captured by the imaging sensor device, group pixels of the pixel array to yield a first subset of the pixels on which two-dimensional (2D) analysis is to be performed and a second subset of the pixels on which three-dimensional (3D) analysis is to be performed; an image analysis component configured to perform 2D analysis on the first subset of the pixels; and a distance determination component configured to perform 3D analysis on the second subset of the pixels. 2. The imaging sensor device of claim 1, wherein the image analysis component is further configured to identify an object within the image and determine a classification and a location of the object based on the 2D analysis. 3. The imaging sensor device of claim 1, wherein the distance determination component is further configured to generate distance information for respective pixels of the second subset of the pixels based on the 3D analysis. 4. The imaging sensor device of claim 1, further comprising an illumination component configured to emit a beam of light pulses to a viewing space monitored by the imaging sensor device. 5. The imaging sensor device of claim 4, further comprising a waveform reconstruction component configured to, for a pixel of the second subset of the pixels, generate waveform data representing a reflected light pulse corresponding to the pixel, wherein the distance determination component is configured to generate the distance information based on the waveform data. 6. The imaging sensor device of claim 1, further comprising a safety component configured to perform monitor one or more internal components of the imaging sensor device a fault condition, and to generate a safety output in response to detection of the fault condition based on one or more safety algorithms. 7. The imaging sensor device of claim 6, further comprising a hazardous analysis and decision component configured to generate at least one of a control output or a message output based on a correlation between a first result of the 2D analysis, a second result of the 3D analysis, and the safety output. 8. The imaging sensor device of claim 7, wherein the hazardous analysis and decision component is further configured to generate correlated data comprising at least one of three-dimensional location data, three-dimensional velocity data, three-dimensional acceleration data, or three-dimensional trajectory data for an object detected within the image based on the correlation between the first result and the second result, and to generate at least one of the control output or the message output based on the correlated data. 9. The imaging sensor device of claim 8, wherein the hazardous analysis and decision component is further configure to predict a future location of the object within the viewing space based on at least one of the three-dimensional location data, the three-dimensional velocity data, the three-dimensional acceleration data, or the three-dimensional trajectory data, and to generate at least one of the control output or the message output based on the future location. 10. The imaging sensor device of claim 1, wherein the pixel array component is further configured to identify the second subset of the pixels based on a configuration profile that defines one or more portions of the pixel array on which the 3D analysis is to be performed, and wherein the second subset of the pixels comprises one of a single contiguous group of pixels or multiple non-contiguous groups of pixels. 11. The imaging sensor device of claim 2, wherein the pixel array component is further configured to select the second subset of the pixels based on the classification and the location of the object determined by the image analysis component, and wherein the second subset of the pixels comprises one of a single contiguous group of pixels or multiple non-contiguous groups of pixels. 12. A method for monitoring image data, comprising: collecting image data by an imaging sensor device comprising at least one processor; generating a pixel array based on the image data; grouping pixels of the pixel array into at least one first pixel group and at least one second pixel group; performing two-dimensional (2D) imaging analysis on the at least one first pixel group; and performing time-of-flight (TOF) analysis on the at least one second pixel group. 13. The method of claim 12, wherein the performing the 2D imaging analysis comprises: identifying an object within the image data; and determining a location of the object within the image data. 14. The method of claim 12, wherein the performing the TOF analysis yields distance information for respective pixels of the at least one second pixel group. 15. The method of claim 13, wherein the grouping comprises modifying at least one of a shape of the second pixel group or a location of the second pixel group within the pixel array based on the location and classification of the object. 16. The method of claim 13, further comprising: correlating a result of the 2D analysis and a second result of the TOF analysis to yield correlated information for the object; determining a classification for the object based on the correlated information; and controlling an output based on the correlated information and the classification for the object. 17. The method of claim 16, wherein the correlating comprises determining, as the correlated information, at least one of a location of the object within a viewing space represented by the image data, a velocity of the object within the viewing space, or a trajectory of the object within the viewing space. 18. A non-transitory computer-readable medium having stored thereon instructions that, in response to execution, cause an imaging sensor device comprising a processor to perform operations, the operations comprising: receiving image data representing an image of a viewing space; determining values of respective pixels of a pixel array based on the image data; identifying a first subset of the pixels on which two-dimensional (2D) analysis is to be performed; identifying a second subset of the pixels on which time-of-flight (TOF) analysis is to be performed; performing the 2D analysis on the first subset of the pixels; and performing the TOF analysis on the second subset of the pixels. 19. The non-transitory computer-readable medium of claim 18, further comprising identifying an object within the viewing space and a classification of the object based on the 2D analysis. 20. The non-transitory computer-readable medium of claim 18, wherein the identifying the second subset of the pixels comprises identifying the second subset of the pixels based on identification of the object and the classification of the object.
An imaging sensor device includes pixel array processing functions that allow time-of-flight (TOF) analysis to be performed on selected portions of the pixel array, while two-dimensional imaging analysis is performed on the remaining portions of the array, reducing processing load and response time relative to performing TOF analysis for all pixels of the array. The portion of the pixel array designated for TOF analysis can be pre-defined through configuration of the imaging sensor device. Alternatively, the imaging sensor device can dynamically select the portions of the pixel array on which TOF analysis is to be performed based on object detection and classification by the two-dimensional imaging analysis. Embodiments of the imaging sensor device can also implement a number of safety and redundancy functions to achieve a high degree of safety integrity, making the sensor suitable for use in various types of safety monitoring applications.1. An imaging sensor device, comprising: a memory that stores computer-executable components; a processor, operatively coupled to the memory, that executes the computer-executable components, the computer-executable components comprising: a pixel array component configured to, for a pixel array of an image captured by the imaging sensor device, group pixels of the pixel array to yield a first subset of the pixels on which two-dimensional (2D) analysis is to be performed and a second subset of the pixels on which three-dimensional (3D) analysis is to be performed; an image analysis component configured to perform 2D analysis on the first subset of the pixels; and a distance determination component configured to perform 3D analysis on the second subset of the pixels. 2. The imaging sensor device of claim 1, wherein the image analysis component is further configured to identify an object within the image and determine a classification and a location of the object based on the 2D analysis. 3. The imaging sensor device of claim 1, wherein the distance determination component is further configured to generate distance information for respective pixels of the second subset of the pixels based on the 3D analysis. 4. The imaging sensor device of claim 1, further comprising an illumination component configured to emit a beam of light pulses to a viewing space monitored by the imaging sensor device. 5. The imaging sensor device of claim 4, further comprising a waveform reconstruction component configured to, for a pixel of the second subset of the pixels, generate waveform data representing a reflected light pulse corresponding to the pixel, wherein the distance determination component is configured to generate the distance information based on the waveform data. 6. The imaging sensor device of claim 1, further comprising a safety component configured to perform monitor one or more internal components of the imaging sensor device a fault condition, and to generate a safety output in response to detection of the fault condition based on one or more safety algorithms. 7. The imaging sensor device of claim 6, further comprising a hazardous analysis and decision component configured to generate at least one of a control output or a message output based on a correlation between a first result of the 2D analysis, a second result of the 3D analysis, and the safety output. 8. The imaging sensor device of claim 7, wherein the hazardous analysis and decision component is further configured to generate correlated data comprising at least one of three-dimensional location data, three-dimensional velocity data, three-dimensional acceleration data, or three-dimensional trajectory data for an object detected within the image based on the correlation between the first result and the second result, and to generate at least one of the control output or the message output based on the correlated data. 9. The imaging sensor device of claim 8, wherein the hazardous analysis and decision component is further configure to predict a future location of the object within the viewing space based on at least one of the three-dimensional location data, the three-dimensional velocity data, the three-dimensional acceleration data, or the three-dimensional trajectory data, and to generate at least one of the control output or the message output based on the future location. 10. The imaging sensor device of claim 1, wherein the pixel array component is further configured to identify the second subset of the pixels based on a configuration profile that defines one or more portions of the pixel array on which the 3D analysis is to be performed, and wherein the second subset of the pixels comprises one of a single contiguous group of pixels or multiple non-contiguous groups of pixels. 11. The imaging sensor device of claim 2, wherein the pixel array component is further configured to select the second subset of the pixels based on the classification and the location of the object determined by the image analysis component, and wherein the second subset of the pixels comprises one of a single contiguous group of pixels or multiple non-contiguous groups of pixels. 12. A method for monitoring image data, comprising: collecting image data by an imaging sensor device comprising at least one processor; generating a pixel array based on the image data; grouping pixels of the pixel array into at least one first pixel group and at least one second pixel group; performing two-dimensional (2D) imaging analysis on the at least one first pixel group; and performing time-of-flight (TOF) analysis on the at least one second pixel group. 13. The method of claim 12, wherein the performing the 2D imaging analysis comprises: identifying an object within the image data; and determining a location of the object within the image data. 14. The method of claim 12, wherein the performing the TOF analysis yields distance information for respective pixels of the at least one second pixel group. 15. The method of claim 13, wherein the grouping comprises modifying at least one of a shape of the second pixel group or a location of the second pixel group within the pixel array based on the location and classification of the object. 16. The method of claim 13, further comprising: correlating a result of the 2D analysis and a second result of the TOF analysis to yield correlated information for the object; determining a classification for the object based on the correlated information; and controlling an output based on the correlated information and the classification for the object. 17. The method of claim 16, wherein the correlating comprises determining, as the correlated information, at least one of a location of the object within a viewing space represented by the image data, a velocity of the object within the viewing space, or a trajectory of the object within the viewing space. 18. A non-transitory computer-readable medium having stored thereon instructions that, in response to execution, cause an imaging sensor device comprising a processor to perform operations, the operations comprising: receiving image data representing an image of a viewing space; determining values of respective pixels of a pixel array based on the image data; identifying a first subset of the pixels on which two-dimensional (2D) analysis is to be performed; identifying a second subset of the pixels on which time-of-flight (TOF) analysis is to be performed; performing the 2D analysis on the first subset of the pixels; and performing the TOF analysis on the second subset of the pixels. 19. The non-transitory computer-readable medium of claim 18, further comprising identifying an object within the viewing space and a classification of the object based on the 2D analysis. 20. The non-transitory computer-readable medium of claim 18, wherein the identifying the second subset of the pixels comprises identifying the second subset of the pixels based on identification of the object and the classification of the object.
2,400
7,080
7,080
14,520,245
2,442
A system and method for observing and controlling a programmable network via higher layer attributes is disclosed. According to one embodiment, the system includes one or more collectors and a programmable network element. The one or more collectors are configured to receive network traffic data from a plurality of network elements in the network and extract metadata from the network traffic data. The programmable network element is programmed based on the metadata received from the plurality of network elements in the network.
1. A system for monitoring a network comprising: one or more collectors configured to receive network traffic data from a plurality of network elements in the network; and a programmable network element; wherein the one or more collectors extracts metadata from the network traffic data, and wherein the programmable network element is programmed based on the metadata received from the plurality of network elements in the network. 2. The system of claim 1, further comprising a programmable controller that controls at least some of the plurality of network elements. 3. The system of claim 1, wherein the one or more collectors receive mirror traffic data from the plurality of network elements. 4. The system of claim 1, wherein the one or more collectors are further configured to index the network enabling efficient search and retrieval of the metadata. 5. The system of claim 1, wherein the one or more collectors program the programmable network element to configure the programmable network element to send filtered network traffic data to the one or more collectors. 6. The system of claim 5, wherein network analysis is performed using the metadata. 7. The system of claim 1, wherein a control loop is applied to determine whether a network control objective is met after programming the programmable network element. 8. The system of claim 1, wherein the one or more collectors are further configured to receive statistics about the network, topology information about the network, input from one or more enterprise systems, or combinations thereof. 9. The system of claim 8, wherein the metadata received from the network traffic data is time-aligned with data received from the one or more enterprise systems. 10. The system of claim 1, further comprising a network manager, wherein the network manager programs the programmable network element to configure the programmable network element to send filtered network traffic data to the one or more collectors. 11. The system of claim 10, wherein the network manager affects a network policy by programming a programmable network element or a programmable controller with a control primitive. 12. The system of claim 11, wherein the control primitive includes an access control list (ACL), quality of service (QoS), rate limit settings, or combinations thereof. 13. The system of claim 10, wherein the network manager maintains a relationship between a network policy and the control primitive in a database. 14. The system of claim 10, wherein the one or more collectors are programmable, and wherein the network manager programs the one or more collectors to collect different type of metadata. 15. The system of claim 10, wherein the network manager de-duplicates the metadata received from the one or more collectors. 16. The system of claim 10, wherein the network manager calculates a quality of experience of a user, an application, or a device, based on the metadata received from the one or more collectors. 17. A method for monitoring a network comprising: providing one or more collectors configured to receive network traffic data from a plurality of network elements in the network; providing a programmable network element; extracting, at the one or more collectors, metadata from the network traffic data; and programming the programmable network element based on the metadata received from the plurality of network elements in the network.
A system and method for observing and controlling a programmable network via higher layer attributes is disclosed. According to one embodiment, the system includes one or more collectors and a programmable network element. The one or more collectors are configured to receive network traffic data from a plurality of network elements in the network and extract metadata from the network traffic data. The programmable network element is programmed based on the metadata received from the plurality of network elements in the network.1. A system for monitoring a network comprising: one or more collectors configured to receive network traffic data from a plurality of network elements in the network; and a programmable network element; wherein the one or more collectors extracts metadata from the network traffic data, and wherein the programmable network element is programmed based on the metadata received from the plurality of network elements in the network. 2. The system of claim 1, further comprising a programmable controller that controls at least some of the plurality of network elements. 3. The system of claim 1, wherein the one or more collectors receive mirror traffic data from the plurality of network elements. 4. The system of claim 1, wherein the one or more collectors are further configured to index the network enabling efficient search and retrieval of the metadata. 5. The system of claim 1, wherein the one or more collectors program the programmable network element to configure the programmable network element to send filtered network traffic data to the one or more collectors. 6. The system of claim 5, wherein network analysis is performed using the metadata. 7. The system of claim 1, wherein a control loop is applied to determine whether a network control objective is met after programming the programmable network element. 8. The system of claim 1, wherein the one or more collectors are further configured to receive statistics about the network, topology information about the network, input from one or more enterprise systems, or combinations thereof. 9. The system of claim 8, wherein the metadata received from the network traffic data is time-aligned with data received from the one or more enterprise systems. 10. The system of claim 1, further comprising a network manager, wherein the network manager programs the programmable network element to configure the programmable network element to send filtered network traffic data to the one or more collectors. 11. The system of claim 10, wherein the network manager affects a network policy by programming a programmable network element or a programmable controller with a control primitive. 12. The system of claim 11, wherein the control primitive includes an access control list (ACL), quality of service (QoS), rate limit settings, or combinations thereof. 13. The system of claim 10, wherein the network manager maintains a relationship between a network policy and the control primitive in a database. 14. The system of claim 10, wherein the one or more collectors are programmable, and wherein the network manager programs the one or more collectors to collect different type of metadata. 15. The system of claim 10, wherein the network manager de-duplicates the metadata received from the one or more collectors. 16. The system of claim 10, wherein the network manager calculates a quality of experience of a user, an application, or a device, based on the metadata received from the one or more collectors. 17. A method for monitoring a network comprising: providing one or more collectors configured to receive network traffic data from a plurality of network elements in the network; providing a programmable network element; extracting, at the one or more collectors, metadata from the network traffic data; and programming the programmable network element based on the metadata received from the plurality of network elements in the network.
2,400
7,081
7,081
14,520,257
2,442
A system and method for observing and controlling a programmable network via higher layer attributes is disclosed. According to one embodiment, the system includes a plurality of network systems, and a remote network manager. The remote network manager is configured to connect over the Internet to the plurality of enterprise systems, a plurality of collectors, or combinations thereof. The remote network manager simultaneously and centrally analyzes a network condition of a plurality of network systems, learns a network pattern from a first network system of the plurality of network systems, and predicts a network behavior of a second network system of the plurality of network systems.
1. A system for monitoring a network comprising: a plurality of network systems; and a remote network manager comprising a network interface and configured to connect over the Internet to the plurality of enterprise systems, a plurality of collectors, or combinations thereof; and wherein the remote network manager simultaneously and centrally analyzes a network condition of a plurality of network systems, learns a network pattern from a first network system of the plurality of network systems, and predicts a network behavior of a second network system of the plurality of network systems. 2. The system of claim 1, wherein the remote network manager is configured to predict performance of an application, a user, or a device based on observed characteristics of the network using network protocol level metrics and metadata. 3. The system of claim 1, wherein the network pattern is a protocol level metric of the network and metadata of network traffic data. 4. The system of claim 1, further comprising a programmable controller that controls at least some of the plurality of network elements, wherein the remote network manager controls the plurality of network elements via the programmable controller. 5. The system of claim 1, further comprising one or more collectors that are disposed in a network system of the plurality of network systems and configured to receive network traffic data from a plurality of network elements in the network system. 6. The system of claim 1, wherein network analysis is performed using metadata. 7. The system of claim 5, wherein the remote network manager or the one or more collectors are further configured to index the network enabling efficient search and retrieval of the metadata and learned network patterns. 8. The system of claim 5, wherein the one or more collectors are further configured to receive statistics about the network, topology information about the network, input from one or more enterprise systems, or combinations thereof. 9. The system of claim 1, wherein the remote network manager is disposed in a cloud and connected to the one or more collectors over the Internet. 10. The system of claim 5, further comprising a programmable network element disposed in the network system, wherein the remote network manager programs the programmable network element to configure the programmable network element to send filtered network traffic data to the one or more collectors. 11. The system of claim 5, further comprising a programmable network element disposed in the network system, wherein the one or more collectors program the programmable network element to configure the programmable network element to send filtered network traffic data to the one or more collectors. 12. The system of claim 10, wherein the remote network manager applies a control loop to determine whether a network control objective is met after programming the programmable network element. 13. The system of claim 1, wherein metadata is time-aligned with data received from one or more enterprise systems. 14. The system of claim 10, wherein the remote network manager affects a network policy by programming a programmable network element or a programmable controller with a control primitive. 15. The system of claim 14, wherein the control primitive includes an access control list (ACL), quality of service (QoS), rate limit settings, or combinations thereof. 16. The system of claim 14, wherein the remote network manager maintains a relationship between a network policy and the control primitive in a database. 17. The system of claim 1, wherein the one or more collectors are programmable, and wherein the remote network manager programs the one or more collectors to collect different type of metadata. 18. The system of claim 1, wherein the remote network manager de-duplicates the metadata received from the one or more collectors. 19. The system of claim 1, wherein the remote network manager calculates a quality of experience of a user, an application, or a device, based on the metadata received from the one or more collectors. 20. A system for monitoring a network comprising: a plurality of network systems; and a remote network manager comprising a network interface and configured to connect over the Internet to the plurality of enterprise systems, a plurality of collectors, or combinations thereof; and wherein the remote network manager simultaneously and centrally analyzes a network condition of a plurality of network systems, learns a network pattern from a first network system of the plurality of network systems, and applies a network policy to a second network system of the plurality of network systems. 21. The system of claim 20, wherein the network policy is controlling one or more of applications, users, or devices of the network. 22. A method for monitoring a network comprising: providing a plurality of network systems; providing a remote network manager comprising a network interface and configured to connect over the Internet to the plurality of enterprise systems, a plurality of collectors, or combinations thereof; simultaneously and centrally analyzing a network condition of a plurality of network systems; learning a network pattern from a first network system of the plurality of network systems; and applying a network policy to a second network system of the plurality of network systems.
A system and method for observing and controlling a programmable network via higher layer attributes is disclosed. According to one embodiment, the system includes a plurality of network systems, and a remote network manager. The remote network manager is configured to connect over the Internet to the plurality of enterprise systems, a plurality of collectors, or combinations thereof. The remote network manager simultaneously and centrally analyzes a network condition of a plurality of network systems, learns a network pattern from a first network system of the plurality of network systems, and predicts a network behavior of a second network system of the plurality of network systems.1. A system for monitoring a network comprising: a plurality of network systems; and a remote network manager comprising a network interface and configured to connect over the Internet to the plurality of enterprise systems, a plurality of collectors, or combinations thereof; and wherein the remote network manager simultaneously and centrally analyzes a network condition of a plurality of network systems, learns a network pattern from a first network system of the plurality of network systems, and predicts a network behavior of a second network system of the plurality of network systems. 2. The system of claim 1, wherein the remote network manager is configured to predict performance of an application, a user, or a device based on observed characteristics of the network using network protocol level metrics and metadata. 3. The system of claim 1, wherein the network pattern is a protocol level metric of the network and metadata of network traffic data. 4. The system of claim 1, further comprising a programmable controller that controls at least some of the plurality of network elements, wherein the remote network manager controls the plurality of network elements via the programmable controller. 5. The system of claim 1, further comprising one or more collectors that are disposed in a network system of the plurality of network systems and configured to receive network traffic data from a plurality of network elements in the network system. 6. The system of claim 1, wherein network analysis is performed using metadata. 7. The system of claim 5, wherein the remote network manager or the one or more collectors are further configured to index the network enabling efficient search and retrieval of the metadata and learned network patterns. 8. The system of claim 5, wherein the one or more collectors are further configured to receive statistics about the network, topology information about the network, input from one or more enterprise systems, or combinations thereof. 9. The system of claim 1, wherein the remote network manager is disposed in a cloud and connected to the one or more collectors over the Internet. 10. The system of claim 5, further comprising a programmable network element disposed in the network system, wherein the remote network manager programs the programmable network element to configure the programmable network element to send filtered network traffic data to the one or more collectors. 11. The system of claim 5, further comprising a programmable network element disposed in the network system, wherein the one or more collectors program the programmable network element to configure the programmable network element to send filtered network traffic data to the one or more collectors. 12. The system of claim 10, wherein the remote network manager applies a control loop to determine whether a network control objective is met after programming the programmable network element. 13. The system of claim 1, wherein metadata is time-aligned with data received from one or more enterprise systems. 14. The system of claim 10, wherein the remote network manager affects a network policy by programming a programmable network element or a programmable controller with a control primitive. 15. The system of claim 14, wherein the control primitive includes an access control list (ACL), quality of service (QoS), rate limit settings, or combinations thereof. 16. The system of claim 14, wherein the remote network manager maintains a relationship between a network policy and the control primitive in a database. 17. The system of claim 1, wherein the one or more collectors are programmable, and wherein the remote network manager programs the one or more collectors to collect different type of metadata. 18. The system of claim 1, wherein the remote network manager de-duplicates the metadata received from the one or more collectors. 19. The system of claim 1, wherein the remote network manager calculates a quality of experience of a user, an application, or a device, based on the metadata received from the one or more collectors. 20. A system for monitoring a network comprising: a plurality of network systems; and a remote network manager comprising a network interface and configured to connect over the Internet to the plurality of enterprise systems, a plurality of collectors, or combinations thereof; and wherein the remote network manager simultaneously and centrally analyzes a network condition of a plurality of network systems, learns a network pattern from a first network system of the plurality of network systems, and applies a network policy to a second network system of the plurality of network systems. 21. The system of claim 20, wherein the network policy is controlling one or more of applications, users, or devices of the network. 22. A method for monitoring a network comprising: providing a plurality of network systems; providing a remote network manager comprising a network interface and configured to connect over the Internet to the plurality of enterprise systems, a plurality of collectors, or combinations thereof; simultaneously and centrally analyzing a network condition of a plurality of network systems; learning a network pattern from a first network system of the plurality of network systems; and applying a network policy to a second network system of the plurality of network systems.
2,400
7,082
7,082
14,520,262
2,442
A system and method for observing and controlling a programmable network via higher layer attributes is disclosed. According to one embodiment, the system includes one or more collectors, a network manager, and a programmable network element. The one or more collectors are configured to receive network traffic data from a plurality of network elements and extract metadata from the network traffic data. The network manager is configured to receive metadata from the one or more collectors. The network manager identifies a network control objective for the network, identifies a programmable parameter of the programmable network element to achieve the network control objective, and programs the programmable network element. The network manager further determines whether the network control objective is met after programming the programmable network element and applies a control loop based on the network control objective to program the programmable network element.
1. A system for monitoring a network comprising: one or more collectors configured to receive network traffic data from a plurality of network elements and extract metadata from the network traffic data; a network manager configured to receive metadata from the one or more collectors; and a programmable network element, wherein the network manager identifies a network control objective for the network, identifies a programmable parameter of the programmable network element to achieve the network control objective, and programs the programmable network element, and wherein the network manager further determines whether the network control objective is met after programming the programmable network element and applies a control loop based on the network control objective to program the programmable network element. 2. The system of claim 1, further comprising a programmable controller that controls at least some of the plurality of network elements, wherein the network manager controls the plurality of network elements via the programmable controller. 3. The system of claim 1, wherein the one or more collectors receive mirror traffic data from the plurality of network elements. 4. The system of claim 1, wherein the remote network manager or the one or more collectors are further configured to index the network enabling efficient search and retrieval of the metadata. 5. The system of claim 1, wherein the network manager is disposed in a cloud and connected to the one or more collectors over the Internet. 6. The system of claim 1, wherein the network manager or the one or more collectors program the programmable network element to configure the programmable network element to send filtered network traffic data to the one or more collectors. 7. The system of claim 1, wherein network analysis is performed using the metadata. 8. The system of claim 1, wherein the one or more collectors are further configured to receive statistics about the network, topology information about the network, input from one or more enterprise systems, or combinations thereof. 9. The system of claim 1, wherein the network manager time-aligns the metadata with data received from one or more enterprise systems. 10. The system of claim 1, wherein the network manager affects a network policy by programming a programmable network element or a programmable controller with a control primitive. 11. The system of claim 10, wherein the control primitive includes an access control list (ACL), quality of service (QoS), rate limit settings, or combinations thereof. 12. The system of claim 10, wherein the network manager maintains a relationship between a network policy and the control primitive in a database. 13. The system of claim 1, wherein the one or more collectors are programmable, and wherein the network manager programs the one or more collectors to collect different type of metadata. 14. The system of claim 1, wherein the network manager de-duplicates the metadata received from the one or more collectors. 15. The system of claim 1, wherein the network manager calculates a quality of experience of a user, an application, or a device, based on the metadata received from the one or more collectors. 16. The system of claim 1, wherein an applied network policy is derived from network patterns and behaviors learned from centrally analyzing a plurality of network systems. 17. A method for monitoring a network comprising: providing a collector configured to receive network traffic data from a plurality of network elements and extract metadata from the network traffic data; providing a network manager configured to receive metadata from the collector; providing a programmable network element; identifying a network control objective for the network; identifying a programmable parameter of the programmable network element to achieve the network control objective; programming the programmable parameter of the programmable network element; determining whether the network control objective is met after programming the programmable network element; and applying a control loop based on the network control objective to program the programmable network element.
A system and method for observing and controlling a programmable network via higher layer attributes is disclosed. According to one embodiment, the system includes one or more collectors, a network manager, and a programmable network element. The one or more collectors are configured to receive network traffic data from a plurality of network elements and extract metadata from the network traffic data. The network manager is configured to receive metadata from the one or more collectors. The network manager identifies a network control objective for the network, identifies a programmable parameter of the programmable network element to achieve the network control objective, and programs the programmable network element. The network manager further determines whether the network control objective is met after programming the programmable network element and applies a control loop based on the network control objective to program the programmable network element.1. A system for monitoring a network comprising: one or more collectors configured to receive network traffic data from a plurality of network elements and extract metadata from the network traffic data; a network manager configured to receive metadata from the one or more collectors; and a programmable network element, wherein the network manager identifies a network control objective for the network, identifies a programmable parameter of the programmable network element to achieve the network control objective, and programs the programmable network element, and wherein the network manager further determines whether the network control objective is met after programming the programmable network element and applies a control loop based on the network control objective to program the programmable network element. 2. The system of claim 1, further comprising a programmable controller that controls at least some of the plurality of network elements, wherein the network manager controls the plurality of network elements via the programmable controller. 3. The system of claim 1, wherein the one or more collectors receive mirror traffic data from the plurality of network elements. 4. The system of claim 1, wherein the remote network manager or the one or more collectors are further configured to index the network enabling efficient search and retrieval of the metadata. 5. The system of claim 1, wherein the network manager is disposed in a cloud and connected to the one or more collectors over the Internet. 6. The system of claim 1, wherein the network manager or the one or more collectors program the programmable network element to configure the programmable network element to send filtered network traffic data to the one or more collectors. 7. The system of claim 1, wherein network analysis is performed using the metadata. 8. The system of claim 1, wherein the one or more collectors are further configured to receive statistics about the network, topology information about the network, input from one or more enterprise systems, or combinations thereof. 9. The system of claim 1, wherein the network manager time-aligns the metadata with data received from one or more enterprise systems. 10. The system of claim 1, wherein the network manager affects a network policy by programming a programmable network element or a programmable controller with a control primitive. 11. The system of claim 10, wherein the control primitive includes an access control list (ACL), quality of service (QoS), rate limit settings, or combinations thereof. 12. The system of claim 10, wherein the network manager maintains a relationship between a network policy and the control primitive in a database. 13. The system of claim 1, wherein the one or more collectors are programmable, and wherein the network manager programs the one or more collectors to collect different type of metadata. 14. The system of claim 1, wherein the network manager de-duplicates the metadata received from the one or more collectors. 15. The system of claim 1, wherein the network manager calculates a quality of experience of a user, an application, or a device, based on the metadata received from the one or more collectors. 16. The system of claim 1, wherein an applied network policy is derived from network patterns and behaviors learned from centrally analyzing a plurality of network systems. 17. A method for monitoring a network comprising: providing a collector configured to receive network traffic data from a plurality of network elements and extract metadata from the network traffic data; providing a network manager configured to receive metadata from the collector; providing a programmable network element; identifying a network control objective for the network; identifying a programmable parameter of the programmable network element to achieve the network control objective; programming the programmable parameter of the programmable network element; determining whether the network control objective is met after programming the programmable network element; and applying a control loop based on the network control objective to program the programmable network element.
2,400
7,083
7,083
14,226,492
2,441
Perception of a personalization item in an instant messaging communications session may be enabled by perceiving an identifier corresponding to an intended instant message recipient designated by an instant message sender system, accessing personalization items corresponding to the perceived identifier, and making perceivable the personalization items corresponding to the received identifier to the instant messaging sender system for rendering in an instant messaging application running on the instant messaging sender system, where the personalization items are made perceivable prior to communication with the intended instant message recipient.
1-40. (canceled) 41. A computer-implemented method comprising: receiving selection of an intended instant message recipient from a plurality of potential instant message recipients; identifying a first personalization item associated with the intended instant message recipient, the first personalization item being specific to a presence state of the intended instant message recipient; and rendering, in a user interface of an instant messaging application associated with an instant message sender: the first personalization item; a second personalization item of the instant message sender; and instant message text exchanged between the intended instant message recipient and the instant message sender wherein the rendering includes rendering the first personalization item, the second personalization item, and the instant message text within a separate display area, without rendering, in the separate display area, names of other potential instant message recipients in the plurality of instant message recipients. 42. The method of claim 41, wherein the rendering includes displaying an input text field for inputting a text message by the instant message sender for delivery to the intended instant message recipient in an instant message, and wherein the rendering causes the first personalization item and the input text field to be displayed to the instant message sender prior to communication with the intended instant message recipient. 43. The method of claim 41 further comprising causing the first and second personalization items to be stored on a host system. 44. The method of claim 41 wherein identifying the first personalization item comprises causing the first personalization item to be accessed on a host system. 45. The method of claim 44 further comprising receiving the first and second personalization items from the host system. 46. The method of claim 41 wherein the first and second personalization items are rendered prior to communication of an instant message between the instant message sender and the intended instant message recipient. 47. The method of claim 41 wherein the first and second personalization items are rendered before a communications session is established between the instant message sender and the intended instant message recipient. 48. The method of claim 41 wherein the first and second personalization items are rendered before the instant message sender sends a message to the intended instant message recipient. 49. The method of claim 41 wherein the first and second personalization items are rendered before the instant message sender receives a message from the intended instant message recipient. 50. The method of claim 41, further comprising: receiving identities of the potential instant message recipients; and accessing an identifier associated with each of the individual potential instant message recipients based upon the received identity, wherein the first personalization item is identified based on an identifier associated with the intended instant message recipient. 51. The method of claim 41 further comprising accessing a user identifier for the intended instant message recipient, wherein the identifier provides a location of the first personalization item. 52. The method of claim 51 wherein the location of the first personalization item comprises a location on a host system. 53. A computer readable storage medium including instructions that, when executed by a processor, perform a method for enabling perception of a personalization item associated with an instant messaging communications session, the method comprising: receiving selection of an intended instant message recipient from a plurality of potential instant message recipients; identifying a first personalization item associated with the intended instant message recipient, the first personalization item being specific to a presence state of the intended instant message recipient; and rendering, in a user interface of an instant messaging application associated with an instant message sender: the first personalization item; a second personalization item of the instant message sender; and instant message text exchanged between the intended instant message recipient and the instant message sender wherein the rendering includes rendering the first personalization item, the second personalization item, and the instant message text within a separate display area, without rendering, in the separate display area, names of other potential instant message recipients in the plurality of instant message recipients. 54. The computer readable storage medium of claim 53, wherein the rendering includes displaying an input text field for inputting a text message by the instant message sender for delivery to the intended instant message recipient in an instant message, and wherein the rendering causes the first personalization item and the input text field to be displayed to the instant message sender prior to communication with the intended instant message recipient. 55. The computer readable storage medium of claim 53 wherein the first and second personalization items are rendered before the instant message sender sends a message to the intended instant message recipient. 56. The computer readable storage medium of claim 53 further comprising, prior to identifying the first personalization item, accessing a user identifier for the intended instant message recipient, wherein the identifier provides a location of the first personalization item, and wherein the location of the first personalization item comprises a location on a host system. 57. A system for enabling perception of a personalization item associated with an instant messaging communications session comprising: at least one processor; a memory communicatively coupled to the at least one processor and including instructions that, when executed by the at least one processor, perform a method, the method comprising: receiving selection of an intended instant message recipient from a plurality of potential instant message recipients; identifying a first personalization item associated with the intended instant message recipient, the first personalization item being specific to a presence state of the intended instant message recipient; and rendering, in a user interface of an instant messaging application associated with an instant message sender: the first personalization item; a second personalization item of the instant message sender; and instant message text exchanged between the intended instant message recipient and the instant message sender wherein the rendering includes rendering the first personalization item, the second personalization item, and the instant message text within a separate display area, without rendering, in the separate display area, names of other potential instant message recipients in the plurality of instant message recipients. 58. The system of claim 57, wherein the rendering includes displaying an input text field for inputting a text message by the instant message sender for delivery to the intended instant message recipient in an instant message, and wherein the rendering causes the first personalization item and the input text field to be displayed to the instant message sender prior to communication with the intended instant message recipient. 59. The system of claim 57 wherein the first and second personalization items are rendered before the instant message sender sends a message to the intended instant message recipient. 60. The system of claim 57, the method further comprising, prior to identifying the first personalization item, accessing a user identifier for the intended instant message recipient, wherein the identifier provides a location of the first personalization item, and wherein the location of the first personalization item comprises a location on a host system.
Perception of a personalization item in an instant messaging communications session may be enabled by perceiving an identifier corresponding to an intended instant message recipient designated by an instant message sender system, accessing personalization items corresponding to the perceived identifier, and making perceivable the personalization items corresponding to the received identifier to the instant messaging sender system for rendering in an instant messaging application running on the instant messaging sender system, where the personalization items are made perceivable prior to communication with the intended instant message recipient.1-40. (canceled) 41. A computer-implemented method comprising: receiving selection of an intended instant message recipient from a plurality of potential instant message recipients; identifying a first personalization item associated with the intended instant message recipient, the first personalization item being specific to a presence state of the intended instant message recipient; and rendering, in a user interface of an instant messaging application associated with an instant message sender: the first personalization item; a second personalization item of the instant message sender; and instant message text exchanged between the intended instant message recipient and the instant message sender wherein the rendering includes rendering the first personalization item, the second personalization item, and the instant message text within a separate display area, without rendering, in the separate display area, names of other potential instant message recipients in the plurality of instant message recipients. 42. The method of claim 41, wherein the rendering includes displaying an input text field for inputting a text message by the instant message sender for delivery to the intended instant message recipient in an instant message, and wherein the rendering causes the first personalization item and the input text field to be displayed to the instant message sender prior to communication with the intended instant message recipient. 43. The method of claim 41 further comprising causing the first and second personalization items to be stored on a host system. 44. The method of claim 41 wherein identifying the first personalization item comprises causing the first personalization item to be accessed on a host system. 45. The method of claim 44 further comprising receiving the first and second personalization items from the host system. 46. The method of claim 41 wherein the first and second personalization items are rendered prior to communication of an instant message between the instant message sender and the intended instant message recipient. 47. The method of claim 41 wherein the first and second personalization items are rendered before a communications session is established between the instant message sender and the intended instant message recipient. 48. The method of claim 41 wherein the first and second personalization items are rendered before the instant message sender sends a message to the intended instant message recipient. 49. The method of claim 41 wherein the first and second personalization items are rendered before the instant message sender receives a message from the intended instant message recipient. 50. The method of claim 41, further comprising: receiving identities of the potential instant message recipients; and accessing an identifier associated with each of the individual potential instant message recipients based upon the received identity, wherein the first personalization item is identified based on an identifier associated with the intended instant message recipient. 51. The method of claim 41 further comprising accessing a user identifier for the intended instant message recipient, wherein the identifier provides a location of the first personalization item. 52. The method of claim 51 wherein the location of the first personalization item comprises a location on a host system. 53. A computer readable storage medium including instructions that, when executed by a processor, perform a method for enabling perception of a personalization item associated with an instant messaging communications session, the method comprising: receiving selection of an intended instant message recipient from a plurality of potential instant message recipients; identifying a first personalization item associated with the intended instant message recipient, the first personalization item being specific to a presence state of the intended instant message recipient; and rendering, in a user interface of an instant messaging application associated with an instant message sender: the first personalization item; a second personalization item of the instant message sender; and instant message text exchanged between the intended instant message recipient and the instant message sender wherein the rendering includes rendering the first personalization item, the second personalization item, and the instant message text within a separate display area, without rendering, in the separate display area, names of other potential instant message recipients in the plurality of instant message recipients. 54. The computer readable storage medium of claim 53, wherein the rendering includes displaying an input text field for inputting a text message by the instant message sender for delivery to the intended instant message recipient in an instant message, and wherein the rendering causes the first personalization item and the input text field to be displayed to the instant message sender prior to communication with the intended instant message recipient. 55. The computer readable storage medium of claim 53 wherein the first and second personalization items are rendered before the instant message sender sends a message to the intended instant message recipient. 56. The computer readable storage medium of claim 53 further comprising, prior to identifying the first personalization item, accessing a user identifier for the intended instant message recipient, wherein the identifier provides a location of the first personalization item, and wherein the location of the first personalization item comprises a location on a host system. 57. A system for enabling perception of a personalization item associated with an instant messaging communications session comprising: at least one processor; a memory communicatively coupled to the at least one processor and including instructions that, when executed by the at least one processor, perform a method, the method comprising: receiving selection of an intended instant message recipient from a plurality of potential instant message recipients; identifying a first personalization item associated with the intended instant message recipient, the first personalization item being specific to a presence state of the intended instant message recipient; and rendering, in a user interface of an instant messaging application associated with an instant message sender: the first personalization item; a second personalization item of the instant message sender; and instant message text exchanged between the intended instant message recipient and the instant message sender wherein the rendering includes rendering the first personalization item, the second personalization item, and the instant message text within a separate display area, without rendering, in the separate display area, names of other potential instant message recipients in the plurality of instant message recipients. 58. The system of claim 57, wherein the rendering includes displaying an input text field for inputting a text message by the instant message sender for delivery to the intended instant message recipient in an instant message, and wherein the rendering causes the first personalization item and the input text field to be displayed to the instant message sender prior to communication with the intended instant message recipient. 59. The system of claim 57 wherein the first and second personalization items are rendered before the instant message sender sends a message to the intended instant message recipient. 60. The system of claim 57, the method further comprising, prior to identifying the first personalization item, accessing a user identifier for the intended instant message recipient, wherein the identifier provides a location of the first personalization item, and wherein the location of the first personalization item comprises a location on a host system.
2,400
7,084
7,084
14,522,177
2,438
Aspects of the present disclosure involve systems, methods, computer program products, and the like, for collaboration conferencing with multiple participants over a communications network, and more specifically for a conferencing controller in the network configured to control certain aspects of establishing a collaboration conference. In one particular embodiment, the user of the network may access the control system application to provide one or more conferencing parameters or settings the user wishes to be present during a collaboration conference session. The parameters may then be established by the control system and associated with the conferencing session involving the user. In one embodiment, such information may be associated with the identification token. In yet a further embodiment, a user to the collaboration control system may subscribe to receive a notification when another user of the system accesses a portion of a collaboration of the system.
1. A method for operating a collaboration conference, the method comprising: receiving credential information from a participant to a collaboration conference hosted by a telecommunications network; accessing a subscriber database to authenticate the credential information from the participant with at least one entry in the subscriber database; generating an authentication token associated with the at least one entry in the subscriber database; and transmitting the authentication token to a user's device associated with the participant to the collaboration conference utilizing the telecommunications network. 2. The method of claim 1 wherein the credential information is received from the user's device through a web host server. 3. The method of claim 2 wherein the web host server is configured to provide an interface to the user's device to receive the credential information. 4. The method of claim 1 further comprising: retaining a copy of the authenticated token in a token repository. 5. The method of claim 4 further comprising: receiving the authentication token from the user's device. 6. The method of claim 5 wherein the authentication token received from the user's device is included in a Session Internet Protocol (SIP) request message from the user's device. 7. The method of claim 6 wherein the user's device is a communication device configured to connect to the telecommunications network. 8. The method of claim 7 further comprising: associating the received authentication token received from the user's device to at least one entry in the token repository. 9. The method of claim 8 further comprising: connecting the user's device to the collaboration conference after the authentication token is associated with the at least one entry in the token repository. 10. The method of claim 9 further comprising: transmitting a SIP refer message to the user's device to connect the user's device to the collaboration conference. 11. A system for operating a collaboration conference on a telecommunications network, the system comprising: a network interface unit configured to receive a communication from a user device to establish a collaboration conference on the telecommunications network, the user device associated with a participant to the collaboration conference; a processing device in communication with the network interface unit; and a computer-readable medium connected to the processing device configured to store information and instructions that, when executed by the processing device, performs the operations of: receiving credential information from the participant to the collaboration conference hosted by the telecommunications network; accessing a subscriber database to authenticate the credential information from the participant with at least one entry in the subscriber database; generating an authentication token associated with the at least one entry in the subscriber database; and transmitting the authentication token to the user device associated with the participant to the collaboration conference utilizing the telecommunications network. 12. The system of claim 11 further comprising: a web host server configured to provide the credential information from the participant to the collaboration conference. 13. The system of claim 12 wherein the web host server is further configured to provide an interface to the user device to receive the credential information. 14. The system of claim 11 further comprising a token repository configured to retain a copy of the authenticated token and wherein the instructions, when executed by the processing device, further perform the operation of: retaining a copy of the authenticated token in the token repository. 15. The system of claim 14 wherein the instructions, when executed by the processing device, further perform the operation of: receiving the authentication token from the user device. 16. The system of claim 15 wherein the authentication token received from the user device is included in a Session Internet Protocol (SIP) request message from the user device. 17. The system of claim 16 wherein the user device is a communication device configured to connect to the telecommunications network. 18. The system of claim 17 wherein the instructions, when executed by the processing device, further perform the operation of: associating the received authentication token received from the user device to at least one entry in the token repository. 19. The system of claim 18 wherein the instructions, when executed by the processing device, further perform the operation of: connecting the user device to the collaboration conference after the authentication token is associated with the at least one entry in the token repository. 20. The system of claim 19 wherein the instructions, when executed by the processing device, further perform the operation of: transmitting a SIP refer message to the user device to connect the user device to the collaboration conference.
Aspects of the present disclosure involve systems, methods, computer program products, and the like, for collaboration conferencing with multiple participants over a communications network, and more specifically for a conferencing controller in the network configured to control certain aspects of establishing a collaboration conference. In one particular embodiment, the user of the network may access the control system application to provide one or more conferencing parameters or settings the user wishes to be present during a collaboration conference session. The parameters may then be established by the control system and associated with the conferencing session involving the user. In one embodiment, such information may be associated with the identification token. In yet a further embodiment, a user to the collaboration control system may subscribe to receive a notification when another user of the system accesses a portion of a collaboration of the system.1. A method for operating a collaboration conference, the method comprising: receiving credential information from a participant to a collaboration conference hosted by a telecommunications network; accessing a subscriber database to authenticate the credential information from the participant with at least one entry in the subscriber database; generating an authentication token associated with the at least one entry in the subscriber database; and transmitting the authentication token to a user's device associated with the participant to the collaboration conference utilizing the telecommunications network. 2. The method of claim 1 wherein the credential information is received from the user's device through a web host server. 3. The method of claim 2 wherein the web host server is configured to provide an interface to the user's device to receive the credential information. 4. The method of claim 1 further comprising: retaining a copy of the authenticated token in a token repository. 5. The method of claim 4 further comprising: receiving the authentication token from the user's device. 6. The method of claim 5 wherein the authentication token received from the user's device is included in a Session Internet Protocol (SIP) request message from the user's device. 7. The method of claim 6 wherein the user's device is a communication device configured to connect to the telecommunications network. 8. The method of claim 7 further comprising: associating the received authentication token received from the user's device to at least one entry in the token repository. 9. The method of claim 8 further comprising: connecting the user's device to the collaboration conference after the authentication token is associated with the at least one entry in the token repository. 10. The method of claim 9 further comprising: transmitting a SIP refer message to the user's device to connect the user's device to the collaboration conference. 11. A system for operating a collaboration conference on a telecommunications network, the system comprising: a network interface unit configured to receive a communication from a user device to establish a collaboration conference on the telecommunications network, the user device associated with a participant to the collaboration conference; a processing device in communication with the network interface unit; and a computer-readable medium connected to the processing device configured to store information and instructions that, when executed by the processing device, performs the operations of: receiving credential information from the participant to the collaboration conference hosted by the telecommunications network; accessing a subscriber database to authenticate the credential information from the participant with at least one entry in the subscriber database; generating an authentication token associated with the at least one entry in the subscriber database; and transmitting the authentication token to the user device associated with the participant to the collaboration conference utilizing the telecommunications network. 12. The system of claim 11 further comprising: a web host server configured to provide the credential information from the participant to the collaboration conference. 13. The system of claim 12 wherein the web host server is further configured to provide an interface to the user device to receive the credential information. 14. The system of claim 11 further comprising a token repository configured to retain a copy of the authenticated token and wherein the instructions, when executed by the processing device, further perform the operation of: retaining a copy of the authenticated token in the token repository. 15. The system of claim 14 wherein the instructions, when executed by the processing device, further perform the operation of: receiving the authentication token from the user device. 16. The system of claim 15 wherein the authentication token received from the user device is included in a Session Internet Protocol (SIP) request message from the user device. 17. The system of claim 16 wherein the user device is a communication device configured to connect to the telecommunications network. 18. The system of claim 17 wherein the instructions, when executed by the processing device, further perform the operation of: associating the received authentication token received from the user device to at least one entry in the token repository. 19. The system of claim 18 wherein the instructions, when executed by the processing device, further perform the operation of: connecting the user device to the collaboration conference after the authentication token is associated with the at least one entry in the token repository. 20. The system of claim 19 wherein the instructions, when executed by the processing device, further perform the operation of: transmitting a SIP refer message to the user device to connect the user device to the collaboration conference.
2,400
7,085
7,085
13,775,920
2,431
The technology includes processes, computer program products, and systems for encrypted data processing. In a system of the technology, an arithmetic logic unit is arranged to receive encrypted data presented at said inputs, generate encrypted data based upon data presented at said inputs and provide said generated encrypted data to said output. The arithmetic logic unit performs operations on encrypted data and the processor does not require encryption or decryption to be carried out within it.
1. A processor comprising: a plurality of inputs; an output; and an arithmetic logic unit arranged to receive encrypted data presented at said inputs, generate encrypted data based upon data presented at said inputs and provide said generated encrypted data to said output. 2. A processor according to claim 1, wherein said arithmetic logic unit defines a plurality of relationships between encrypted data values presented at said inputs and generated data to be provided to said output, said relationships being based upon at least one arithmetic or logical operation to be performed on values represented by said encrypted data. 3. A processor according to claim 2, wherein said encrypted data comprises a plurality of bits, and said at least one arithmetic or logical operation comprises a first operation arranged to operate on a first plurality of said plurality of bits to generate a first output and a second operation arranged to operate on a second plurality of said plurality of bits to generate a second output, and a third operation arranged to combine said first and second outputs. 4. A processor according to claim 2, wherein an output of said at least one arithmetic or logical operation is based upon modification of an output of a corresponding standard arithmetic or logical operation. 5. A processor according to claim 4, wherein said standard arithmetic or logical operation is selected from the group consisting of: addition, subtraction, multiplication, division, shift left, logical and, logical or and equivalence. 6. A processor according to claim 1, further comprising a program counter register, wherein said program counter register stores unencrypted data. 7. A processor according to claim 6, further comprising a fetch arithmetic logic unit arranged to update said program counter register. 8. A processor according to claim 5, further comprising a branch arithmetic logic unit arranged to update said program counter register if a conditional test evaluates to true. 9. A processor according to claim 1, wherein said plurality of inputs is a register, and wherein said register is arranged to store encrypted data based upon said output. 10. A processor according to claim 1, wherein said output comprises redundant data. 11. A processor according to claim 1, wherein said encrypted data has an associated type of a plurality of types. 12. A processor according to claim 11, wherein said encrypted data is generated based upon at least one type associated with said encrypted data presented at said inputs. 13. A processor according to claim 1, wherein said encrypted data presented at said inputs includes encrypted values and an encrypted instruction. 14. A processor according to claim 13, wherein said generated encrypted data is generated by processing said encrypted values based upon said encrypted instruction. 15. A computer-implemented method of processing encrypted data encoding information, the method comprising: receiving said encrypted data; processing said encrypted data to generate output encrypted data, said processing comprising applying an encrypted operation to said encrypted data, said encrypted operation generating encrypted output corresponding to output generated by applying a corresponding arithmetic or logical operation to said information encoded by said encrypted data; and outputting said generated encrypted data. 16. A computer-implemented method according to claim 10, further comprising receiving an instruction, said instruction indicating an encrypted operation to be applied to said encrypted data. 17. A computer-implemented method according to claim 16, further comprising storing a matrix, and wherein applying arithmetic encrypted operations to said encrypted data comprises: determining a part of said matrix indexed by said received instruction; and performing matrix multiplication with said part of said matrix and said received encrypted data. 18. A computer-implemented method of processing encrypted data, comprising: receiving a first encrypted input of a first type; receiving a second encrypted input of a second type; receiving an instruction indicating an operation to be performed on said at least one encrypted input; and performing said operation on said first and second encrypted inputs based upon said first and second types.
The technology includes processes, computer program products, and systems for encrypted data processing. In a system of the technology, an arithmetic logic unit is arranged to receive encrypted data presented at said inputs, generate encrypted data based upon data presented at said inputs and provide said generated encrypted data to said output. The arithmetic logic unit performs operations on encrypted data and the processor does not require encryption or decryption to be carried out within it.1. A processor comprising: a plurality of inputs; an output; and an arithmetic logic unit arranged to receive encrypted data presented at said inputs, generate encrypted data based upon data presented at said inputs and provide said generated encrypted data to said output. 2. A processor according to claim 1, wherein said arithmetic logic unit defines a plurality of relationships between encrypted data values presented at said inputs and generated data to be provided to said output, said relationships being based upon at least one arithmetic or logical operation to be performed on values represented by said encrypted data. 3. A processor according to claim 2, wherein said encrypted data comprises a plurality of bits, and said at least one arithmetic or logical operation comprises a first operation arranged to operate on a first plurality of said plurality of bits to generate a first output and a second operation arranged to operate on a second plurality of said plurality of bits to generate a second output, and a third operation arranged to combine said first and second outputs. 4. A processor according to claim 2, wherein an output of said at least one arithmetic or logical operation is based upon modification of an output of a corresponding standard arithmetic or logical operation. 5. A processor according to claim 4, wherein said standard arithmetic or logical operation is selected from the group consisting of: addition, subtraction, multiplication, division, shift left, logical and, logical or and equivalence. 6. A processor according to claim 1, further comprising a program counter register, wherein said program counter register stores unencrypted data. 7. A processor according to claim 6, further comprising a fetch arithmetic logic unit arranged to update said program counter register. 8. A processor according to claim 5, further comprising a branch arithmetic logic unit arranged to update said program counter register if a conditional test evaluates to true. 9. A processor according to claim 1, wherein said plurality of inputs is a register, and wherein said register is arranged to store encrypted data based upon said output. 10. A processor according to claim 1, wherein said output comprises redundant data. 11. A processor according to claim 1, wherein said encrypted data has an associated type of a plurality of types. 12. A processor according to claim 11, wherein said encrypted data is generated based upon at least one type associated with said encrypted data presented at said inputs. 13. A processor according to claim 1, wherein said encrypted data presented at said inputs includes encrypted values and an encrypted instruction. 14. A processor according to claim 13, wherein said generated encrypted data is generated by processing said encrypted values based upon said encrypted instruction. 15. A computer-implemented method of processing encrypted data encoding information, the method comprising: receiving said encrypted data; processing said encrypted data to generate output encrypted data, said processing comprising applying an encrypted operation to said encrypted data, said encrypted operation generating encrypted output corresponding to output generated by applying a corresponding arithmetic or logical operation to said information encoded by said encrypted data; and outputting said generated encrypted data. 16. A computer-implemented method according to claim 10, further comprising receiving an instruction, said instruction indicating an encrypted operation to be applied to said encrypted data. 17. A computer-implemented method according to claim 16, further comprising storing a matrix, and wherein applying arithmetic encrypted operations to said encrypted data comprises: determining a part of said matrix indexed by said received instruction; and performing matrix multiplication with said part of said matrix and said received encrypted data. 18. A computer-implemented method of processing encrypted data, comprising: receiving a first encrypted input of a first type; receiving a second encrypted input of a second type; receiving an instruction indicating an operation to be performed on said at least one encrypted input; and performing said operation on said first and second encrypted inputs based upon said first and second types.
2,400
7,086
7,086
15,146,659
2,413
Forming a group of users for a conversation includes determining when users are accessing information associated with each other, maintaining a group of the users, the group of the users representing a transitive closure over a viewing relationship of the information, displaying, via a display of a user device, digital representations of the users in the group accessing the information, and initiating, based on an action of at least one of the users in the group of users, a conversation.
1. A method for forming a group of users for a conversation, the method comprising: determining when users are accessing information associated with each other; maintaining a group of the users, the group of the users representing a transitive closure over a viewing relationship of the information; displaying, via a display of a user device, digital representations of the users in the group accessing the information; and initiating, based on an action of at least one of the users in the group of the users, a conversation. 2. The method of claim 1, in which the digital representations comprises a live video of each of the users in the group of the users, a name for each of the users in the group of the users, an avatar for each of the users in the group of the users, an image for each of the users in the group of the users, or combinations thereof. 3. The method of claim 1, in which the information comprises a profile associated with at least one of the users, a document associated with at least one of the users, a profile card associated with at least one of the users, or combinations thereof. 4. The method of claim 1, in which the viewing relationship of the information for the group of the users is tracked via a graph data structure, the graph data structure comprising nodes and edges. 5. The method of claim 1, in which initiating, based on the action of the at least one user in the group of the users, the conversation comprises initiating the conversation in public space or initiating the conversation in private space. 6. The method of claim 1, further comprising determining user preferences for each of the users. 7. The method of claim 1, in which the conversation is initiated as an instant message (IM), an electronic mail (email), a live video, audio, a short message service (SMS), or combinations thereof. 8. The method of claim 1, further comprising detecting when each of the users is in front of an audio-video device, the audio-video device being in communication with the user device.
Forming a group of users for a conversation includes determining when users are accessing information associated with each other, maintaining a group of the users, the group of the users representing a transitive closure over a viewing relationship of the information, displaying, via a display of a user device, digital representations of the users in the group accessing the information, and initiating, based on an action of at least one of the users in the group of users, a conversation.1. A method for forming a group of users for a conversation, the method comprising: determining when users are accessing information associated with each other; maintaining a group of the users, the group of the users representing a transitive closure over a viewing relationship of the information; displaying, via a display of a user device, digital representations of the users in the group accessing the information; and initiating, based on an action of at least one of the users in the group of the users, a conversation. 2. The method of claim 1, in which the digital representations comprises a live video of each of the users in the group of the users, a name for each of the users in the group of the users, an avatar for each of the users in the group of the users, an image for each of the users in the group of the users, or combinations thereof. 3. The method of claim 1, in which the information comprises a profile associated with at least one of the users, a document associated with at least one of the users, a profile card associated with at least one of the users, or combinations thereof. 4. The method of claim 1, in which the viewing relationship of the information for the group of the users is tracked via a graph data structure, the graph data structure comprising nodes and edges. 5. The method of claim 1, in which initiating, based on the action of the at least one user in the group of the users, the conversation comprises initiating the conversation in public space or initiating the conversation in private space. 6. The method of claim 1, further comprising determining user preferences for each of the users. 7. The method of claim 1, in which the conversation is initiated as an instant message (IM), an electronic mail (email), a live video, audio, a short message service (SMS), or combinations thereof. 8. The method of claim 1, further comprising detecting when each of the users is in front of an audio-video device, the audio-video device being in communication with the user device.
2,400
7,087
7,087
14,135,982
2,457
Defining a scalable cluster for high volume message delivery and delivering messages between actors is described. Actors are mapped to virtual nodes and virtual nodes to nodes using mathematical algorithms. The mathematical algorithms are further used to determine address information of actors for message delivery.
1. A method comprising: obtaining a message containing an actorID identifying, at least partly, an actor; utilizing the actorID in at least one mathematical algorithm to determine address information for the actor; delivering the message to the actor using the address information. 2. A method according to claim 1, wherein the at least one mathematical algorithm is a deterministic algorithm. 3. A method according to claim 1, wherein the address information comprises address information of a node. 4. A method according to claim 3, wherein the node has a virtual node associated with it. 5. A method according to claim 4, wherein a first mathematical algorithm is usable to determine the address information of a virtual node and a second mathematical algorithm is usable to determine the address information of a physical node associated with the virtual node. 6. A method according to claim 5 wherein the first algorithm is a hashing algorithms and the second algorithm is a consistent hashing algorithm. 7. A method according to claim 1 further comprising delivering the message first to a segment in a buffer associated with the virtual node. 8. A non-transitory computer-readable memory that contains computer readable instructions which, when executed by at least one data processor cause: obtaining a message containing an actorID identifying, at least partly, an actor; utilizing the actorID in at least one mathematical algorithm to determine address information for the actor; delivering the message to the actor using the address information. 9. A non-transitory computer-readable memory according to claim 8, wherein the at least one mathematical algorithm is a deterministic algorithm. 10. A non-transitory computer-readable memory according to claim 8, wherein the address information comprises address information of a physical node. 11. A non-transitory computer-readable memory according to claim 10, wherein the node has a virtual node associated with it. 12. A non-transitory computer-readable memory according to claim 11, wherein a first mathematical algorithm is usable to determine the address information of a virtual node and a second mathematical algorithm is usable to determine the address information of a physical node associated with the virtual node. 13. A non-transitory computer-readable memory according to claim 12 wherein the first algorithm is a hashing algorithm and the second algorithm is a consistent hashing algorithm. 14. A non-transitory computer-readable memory according to claim 8 further comprising delivering the message first to a segment in a buffer associated with the virtual node. 15. A computer program product including one or more sequences of one or more instructions which, when executed by one or more processors, cause an apparatus to at least perform the steps of at least: obtaining a message containing an actorID identifying, at least partly, an actor; utilizing the actorID in at least one mathematical algorithm to determine address information for the actor; delivering the message to the actor using the address information. 16-22. (canceled) 23. An apparatus comprising at least one processor, an interface unit and at least one memory including computer program code configured to, with the at least one processor, cause the apparatus to perform at least the following, obtain a message containing an actorID identifying, at least partly, an actor; utilize the actorID in at least one mathematical algorithm to determine address information for the actor; deliver the message to the actor using the address information. 24. An apparatus comprising: means for obtaining a message containing an actorID identifying, at least partly, an actor; means for utilizing the actorID in at least one mathematical algorithm to determine address information for the actor; means for delivering the message to the actor using the address information. 25. (canceled)
Defining a scalable cluster for high volume message delivery and delivering messages between actors is described. Actors are mapped to virtual nodes and virtual nodes to nodes using mathematical algorithms. The mathematical algorithms are further used to determine address information of actors for message delivery.1. A method comprising: obtaining a message containing an actorID identifying, at least partly, an actor; utilizing the actorID in at least one mathematical algorithm to determine address information for the actor; delivering the message to the actor using the address information. 2. A method according to claim 1, wherein the at least one mathematical algorithm is a deterministic algorithm. 3. A method according to claim 1, wherein the address information comprises address information of a node. 4. A method according to claim 3, wherein the node has a virtual node associated with it. 5. A method according to claim 4, wherein a first mathematical algorithm is usable to determine the address information of a virtual node and a second mathematical algorithm is usable to determine the address information of a physical node associated with the virtual node. 6. A method according to claim 5 wherein the first algorithm is a hashing algorithms and the second algorithm is a consistent hashing algorithm. 7. A method according to claim 1 further comprising delivering the message first to a segment in a buffer associated with the virtual node. 8. A non-transitory computer-readable memory that contains computer readable instructions which, when executed by at least one data processor cause: obtaining a message containing an actorID identifying, at least partly, an actor; utilizing the actorID in at least one mathematical algorithm to determine address information for the actor; delivering the message to the actor using the address information. 9. A non-transitory computer-readable memory according to claim 8, wherein the at least one mathematical algorithm is a deterministic algorithm. 10. A non-transitory computer-readable memory according to claim 8, wherein the address information comprises address information of a physical node. 11. A non-transitory computer-readable memory according to claim 10, wherein the node has a virtual node associated with it. 12. A non-transitory computer-readable memory according to claim 11, wherein a first mathematical algorithm is usable to determine the address information of a virtual node and a second mathematical algorithm is usable to determine the address information of a physical node associated with the virtual node. 13. A non-transitory computer-readable memory according to claim 12 wherein the first algorithm is a hashing algorithm and the second algorithm is a consistent hashing algorithm. 14. A non-transitory computer-readable memory according to claim 8 further comprising delivering the message first to a segment in a buffer associated with the virtual node. 15. A computer program product including one or more sequences of one or more instructions which, when executed by one or more processors, cause an apparatus to at least perform the steps of at least: obtaining a message containing an actorID identifying, at least partly, an actor; utilizing the actorID in at least one mathematical algorithm to determine address information for the actor; delivering the message to the actor using the address information. 16-22. (canceled) 23. An apparatus comprising at least one processor, an interface unit and at least one memory including computer program code configured to, with the at least one processor, cause the apparatus to perform at least the following, obtain a message containing an actorID identifying, at least partly, an actor; utilize the actorID in at least one mathematical algorithm to determine address information for the actor; deliver the message to the actor using the address information. 24. An apparatus comprising: means for obtaining a message containing an actorID identifying, at least partly, an actor; means for utilizing the actorID in at least one mathematical algorithm to determine address information for the actor; means for delivering the message to the actor using the address information. 25. (canceled)
2,400
7,088
7,088
14,364,125
2,424
The present invention relates to system of inserting locally stored content into satellite broadcast programs and electronic program guides. In particular, the system teaches a method of receiving satellite tuning parameters from a set top box, determine a request for locally stored content, and transmitting a multicast address in response to said reception of satellite tuning parameters. The locally stored content is then transmitted to the receiver over a network using the multicast address.
1. A method comprising the steps of: storing a frequency index map for local AV programs; receiving a request for an audio video program according to said frequency index map and PIDS in a range reserved for local AV programs; determining that the request is for local programming based on the reserved PID range determining a multicast address corresponding to said audio video program base on the frequency index and PIDs; and transmitting said multicast address. 2. The method of claim 1 wherein said frequency index map includes at least one of satellite transponder information, frequency information, and polarity information. 3. The method of claim 1 wherein said frequency index map is associated with a satellite broadcast. 4. The method of claim 1 wherein said frequency index map can be manually updated. 5. The method of claim 1 further comprising the step of parsing and storing an updated frequency index map in response to receiving a new frequency index map. 6. The method of claim 1 wherein said multicast address multicast address is a logical identifier for a host of locally stored content. 7. The method of claim 1 further comprising the step of streaming said audio video program. 8. The method of claim 1 wherein said frequency index map is received via a satellite signal. 9. An apparatus comprising; a first input for receiving a frequency index map; a second input for receiving a request for an audio video program according to said frequency index map; a processor for determining a multicast address corresponding to said audio video program; and a transmitter for transmitting said multicast address. 10. The apparatus according to claim 9 wherein said frequency index map includes at least one of satellite transponder information, frequency information, and polarity information. 11. The apparatus according to claim 9 wherein said processor is further operative to store a transponder frequency index map for local AV programs associated with the reserved local AV network ID and send an RTSP request for local AV content that includes the frequency index from said stored frequency index map. 12. The apparatus according to claim 9 wherein said audio video program is locally stored content. 13. The apparatus according to claim 9 wherein said multicast address multicast address is a logical identifier for a host of locally stored content. 14. The apparatus according to claim 9 further comprising the step of streaming said audio video program. 15. The apparatus according to claim 9 wherein said frequency index map is received via a satellite signal. 16. A satellite signal head end comprising; storing a transponder frequency index map for local AV programs; receiving a request for an audio video program according to a reserved network ID and frequency index from said frequency index map; determining that the request is for local programming based on the said reserved network ID in the request. determining a multicast address corresponding to said audio video program based on frequency index and PIDs; and transmitting AV program on said multicast address. transmit response to said request that includes the multicast address carrying the local AV program. 17. The satellite signal head end according to claim 17 wherein said frequency index map includes at least one of satellite transponder information, frequency information, and polarity information. 18. The satellite signal head end according to claim 17 further comprising the steps of: sending an RTSP request for local AV content that includes the frequency index from said stored frequency index map and wherein said storing a transponder frequency index map for local AV programs is associated with the reserved local AV network ID; 19. The apparatus according to claim 9 wherein said multicast address is stored in a table and is a logical identifier for a host of locally stored content.
The present invention relates to system of inserting locally stored content into satellite broadcast programs and electronic program guides. In particular, the system teaches a method of receiving satellite tuning parameters from a set top box, determine a request for locally stored content, and transmitting a multicast address in response to said reception of satellite tuning parameters. The locally stored content is then transmitted to the receiver over a network using the multicast address.1. A method comprising the steps of: storing a frequency index map for local AV programs; receiving a request for an audio video program according to said frequency index map and PIDS in a range reserved for local AV programs; determining that the request is for local programming based on the reserved PID range determining a multicast address corresponding to said audio video program base on the frequency index and PIDs; and transmitting said multicast address. 2. The method of claim 1 wherein said frequency index map includes at least one of satellite transponder information, frequency information, and polarity information. 3. The method of claim 1 wherein said frequency index map is associated with a satellite broadcast. 4. The method of claim 1 wherein said frequency index map can be manually updated. 5. The method of claim 1 further comprising the step of parsing and storing an updated frequency index map in response to receiving a new frequency index map. 6. The method of claim 1 wherein said multicast address multicast address is a logical identifier for a host of locally stored content. 7. The method of claim 1 further comprising the step of streaming said audio video program. 8. The method of claim 1 wherein said frequency index map is received via a satellite signal. 9. An apparatus comprising; a first input for receiving a frequency index map; a second input for receiving a request for an audio video program according to said frequency index map; a processor for determining a multicast address corresponding to said audio video program; and a transmitter for transmitting said multicast address. 10. The apparatus according to claim 9 wherein said frequency index map includes at least one of satellite transponder information, frequency information, and polarity information. 11. The apparatus according to claim 9 wherein said processor is further operative to store a transponder frequency index map for local AV programs associated with the reserved local AV network ID and send an RTSP request for local AV content that includes the frequency index from said stored frequency index map. 12. The apparatus according to claim 9 wherein said audio video program is locally stored content. 13. The apparatus according to claim 9 wherein said multicast address multicast address is a logical identifier for a host of locally stored content. 14. The apparatus according to claim 9 further comprising the step of streaming said audio video program. 15. The apparatus according to claim 9 wherein said frequency index map is received via a satellite signal. 16. A satellite signal head end comprising; storing a transponder frequency index map for local AV programs; receiving a request for an audio video program according to a reserved network ID and frequency index from said frequency index map; determining that the request is for local programming based on the said reserved network ID in the request. determining a multicast address corresponding to said audio video program based on frequency index and PIDs; and transmitting AV program on said multicast address. transmit response to said request that includes the multicast address carrying the local AV program. 17. The satellite signal head end according to claim 17 wherein said frequency index map includes at least one of satellite transponder information, frequency information, and polarity information. 18. The satellite signal head end according to claim 17 further comprising the steps of: sending an RTSP request for local AV content that includes the frequency index from said stored frequency index map and wherein said storing a transponder frequency index map for local AV programs is associated with the reserved local AV network ID; 19. The apparatus according to claim 9 wherein said multicast address is stored in a table and is a logical identifier for a host of locally stored content.
2,400
7,089
7,089
14,712,200
2,482
A visor assembly for a vehicle includes a visor element configured to pivotally attach at an interior portion of a vehicle so as to be pivotable between a non-use position, where the visor is disposed along a roof of the vehicle, and a use position, where the visor element is disposed at least partially along a windshield of the vehicle. A vanity mirror reflective element includes a glass mirror substrate and a mirror reflector coating. The vanity mirror reflective element is disposed at the visor element so as to be viewable by a driver of the vehicle when the visor element is pivoted to the use position. The mirror substrate has a rounded perimeter edge that is exposed at the visor element and is viewable by the driver of the vehicle when the visor element is pivotally attached at the interior portion of the vehicle and in the use position.
1. A visor assembly for a vehicle, said visor assembly comprising: a visor element configured to pivotally attach at an interior portion of a vehicle, wherein said visor element, when attached at the interior portion of the vehicle, is pivotable between a non-use position, where the visor is disposed along a roof of the vehicle, and a use position, where the visor element is disposed at least partially along the windshield of the vehicle; a vanity mirror reflective element comprising a glass mirror substrate and a mirror reflector coating established at a surface of said vanity mirror reflective element; wherein said vanity mirror reflective element is disposed at said visor element of the vehicle so as to be viewable by a driver of the vehicle when said visor element is pivoted to the use position; and wherein said glass mirror substrate has a rounded perimeter edge that is exposed at said visor element and is viewable by the driver of the vehicle when said visor element is pivotally attached at the interior portion of the vehicle and in the use position. 2. The visor assembly of claim 1, comprising at least one illumination source disposed behind said vanity mirror reflective element and, when said at least one illumination source is activated, illumination emitted by said at least one illumination source is viewable through said vanity mirror reflective element. 3. The visor assembly of claim 2, comprising a user input for controlling said at least one illumination source. 4. The visor assembly of claim 3, wherein said user input comprises a touch sensor disposed behind said glass mirror substrate and operable to sense a touch or proximity of a user's finger at said glass mirror substrate. 5. The visor assembly of claim 4, wherein said user input is operable to adjust an intensity of said at least one illumination source responsive to a determined movement of the user's finger across a portion of said glass mirror substrate. 6. The visor assembly of claim 1, wherein said glass mirror substrate is partially recessed at said visor element. 7. The visor assembly of claim 1, wherein said rounded perimeter edge protrudes at least partially from a surface of said visor element. 8. The visor assembly of claim 1, wherein said rounded perimeter edge of said glass mirror substrate has a polished water-clear surface finish. 9. The visor assembly of claim 1, wherein said rounded perimeter edge of said glass mirror substrate has a frosted or non-water-clear surface finish. 10. An interior rearview mirror assembly for a vehicle, said interior rearview mirror assembly comprising: a mirror mount configured to attach at an interior portion of a vehicle equipped with said interior rearview mirror assembly; a mirror head pivotally mounted at a pivot element of said mirror mount, said mirror head comprising a mirror casing and a mirror reflective element; wherein said mirror head comprises a reduced profile mirror casing having a thickness dimension between a front generally planar surface of said mirror reflective element and a rear surface of a generally central region of said mirror casing, and wherein said thickness dimension is less than about 20 mm; a circuit board having circuitry associated with at least one accessory of said mirror head of interior rearview mirror assembly; and wherein said circuit board is disposed in said mirror mount and wherein wiring passes through said pivot element to electrically connect said at least one accessory to said circuitry. 11. The interior rearview mirror assembly of claim 10, wherein said thickness dimension is less than about 15 mm. 12. The interior rearview mirror assembly of claim 10, wherein said accessory comprises a camera having a field of view through said mirror casing and through a windshield of the equipped vehicle. 13. The interior rearview mirror assembly of claim 10, wherein said accessory comprises a camera having a field of view through said reflective element and in a rearward direction with respect to the equipped vehicle. 14. The interior rearview mirror assembly of claim 10, wherein said reflective element comprises a variable reflectance electro-optic reflective element and wherein said accessory comprises an electro-optic mirror dimming feature, and wherein said circuitry includes circuit elements for controlling said electro-optic mirror dimming feature of said variable reflectance electro-optic reflective element. 15. The interior rearview mirror assembly of claim 10, wherein a camera is disposed at said circuit board and has a field of view through a windshield of the equipped vehicle. 16. The interior rearview mirror assembly of claim 10, wherein said mirror mount is configured to attach at an in-cabin surface of a windshield of the equipped vehicle. 17. The interior rearview mirror assembly of claim 10, wherein said mirror mount is configured to attach at a header portion of the equipped vehicle. 18. An interior rearview mirror assembly for a vehicle, said interior rearview mirror assembly comprising: a mirror mount configured to attach at an interior portion of a vehicle equipped with said interior rearview mirror assembly; a mirror head pivotally mounted at a pivot element of said mirror mount, said mirror head comprising a mirror casing and a variable reflectance electro-optic mirror reflective element; wherein said mirror head comprises a reduced profile mirror casing having a thickness dimension between a front generally planar surface of said variable reflectance electro-optic mirror reflective element and a rear surface of a generally central region of said mirror casing, and wherein said thickness dimension is less than about 25 mm; a circuit board disposed in said mirror mount; wherein said circuit board includes circuitry and wherein said circuitry is associated with said variable reflectance electro-optic mirror reflective element; wherein wiring passes through said pivot element to electrically connect said circuitry to terminals of said variable reflectance electro-optic mirror reflective element; and wherein said circuitry is associated with a camera disposed at said mirror mount. 19. The interior rearview mirror assembly of claim 18, wherein one of (i) said camera has a field of view through a windshield of the equipped vehicle and (ii) said camera has a field of view rearward and views over an upper portion of said mirror head. 20. The interior rearview mirror assembly of claim 18, wherein said thickness dimension is less than about 20 mm.
A visor assembly for a vehicle includes a visor element configured to pivotally attach at an interior portion of a vehicle so as to be pivotable between a non-use position, where the visor is disposed along a roof of the vehicle, and a use position, where the visor element is disposed at least partially along a windshield of the vehicle. A vanity mirror reflective element includes a glass mirror substrate and a mirror reflector coating. The vanity mirror reflective element is disposed at the visor element so as to be viewable by a driver of the vehicle when the visor element is pivoted to the use position. The mirror substrate has a rounded perimeter edge that is exposed at the visor element and is viewable by the driver of the vehicle when the visor element is pivotally attached at the interior portion of the vehicle and in the use position.1. A visor assembly for a vehicle, said visor assembly comprising: a visor element configured to pivotally attach at an interior portion of a vehicle, wherein said visor element, when attached at the interior portion of the vehicle, is pivotable between a non-use position, where the visor is disposed along a roof of the vehicle, and a use position, where the visor element is disposed at least partially along the windshield of the vehicle; a vanity mirror reflective element comprising a glass mirror substrate and a mirror reflector coating established at a surface of said vanity mirror reflective element; wherein said vanity mirror reflective element is disposed at said visor element of the vehicle so as to be viewable by a driver of the vehicle when said visor element is pivoted to the use position; and wherein said glass mirror substrate has a rounded perimeter edge that is exposed at said visor element and is viewable by the driver of the vehicle when said visor element is pivotally attached at the interior portion of the vehicle and in the use position. 2. The visor assembly of claim 1, comprising at least one illumination source disposed behind said vanity mirror reflective element and, when said at least one illumination source is activated, illumination emitted by said at least one illumination source is viewable through said vanity mirror reflective element. 3. The visor assembly of claim 2, comprising a user input for controlling said at least one illumination source. 4. The visor assembly of claim 3, wherein said user input comprises a touch sensor disposed behind said glass mirror substrate and operable to sense a touch or proximity of a user's finger at said glass mirror substrate. 5. The visor assembly of claim 4, wherein said user input is operable to adjust an intensity of said at least one illumination source responsive to a determined movement of the user's finger across a portion of said glass mirror substrate. 6. The visor assembly of claim 1, wherein said glass mirror substrate is partially recessed at said visor element. 7. The visor assembly of claim 1, wherein said rounded perimeter edge protrudes at least partially from a surface of said visor element. 8. The visor assembly of claim 1, wherein said rounded perimeter edge of said glass mirror substrate has a polished water-clear surface finish. 9. The visor assembly of claim 1, wherein said rounded perimeter edge of said glass mirror substrate has a frosted or non-water-clear surface finish. 10. An interior rearview mirror assembly for a vehicle, said interior rearview mirror assembly comprising: a mirror mount configured to attach at an interior portion of a vehicle equipped with said interior rearview mirror assembly; a mirror head pivotally mounted at a pivot element of said mirror mount, said mirror head comprising a mirror casing and a mirror reflective element; wherein said mirror head comprises a reduced profile mirror casing having a thickness dimension between a front generally planar surface of said mirror reflective element and a rear surface of a generally central region of said mirror casing, and wherein said thickness dimension is less than about 20 mm; a circuit board having circuitry associated with at least one accessory of said mirror head of interior rearview mirror assembly; and wherein said circuit board is disposed in said mirror mount and wherein wiring passes through said pivot element to electrically connect said at least one accessory to said circuitry. 11. The interior rearview mirror assembly of claim 10, wherein said thickness dimension is less than about 15 mm. 12. The interior rearview mirror assembly of claim 10, wherein said accessory comprises a camera having a field of view through said mirror casing and through a windshield of the equipped vehicle. 13. The interior rearview mirror assembly of claim 10, wherein said accessory comprises a camera having a field of view through said reflective element and in a rearward direction with respect to the equipped vehicle. 14. The interior rearview mirror assembly of claim 10, wherein said reflective element comprises a variable reflectance electro-optic reflective element and wherein said accessory comprises an electro-optic mirror dimming feature, and wherein said circuitry includes circuit elements for controlling said electro-optic mirror dimming feature of said variable reflectance electro-optic reflective element. 15. The interior rearview mirror assembly of claim 10, wherein a camera is disposed at said circuit board and has a field of view through a windshield of the equipped vehicle. 16. The interior rearview mirror assembly of claim 10, wherein said mirror mount is configured to attach at an in-cabin surface of a windshield of the equipped vehicle. 17. The interior rearview mirror assembly of claim 10, wherein said mirror mount is configured to attach at a header portion of the equipped vehicle. 18. An interior rearview mirror assembly for a vehicle, said interior rearview mirror assembly comprising: a mirror mount configured to attach at an interior portion of a vehicle equipped with said interior rearview mirror assembly; a mirror head pivotally mounted at a pivot element of said mirror mount, said mirror head comprising a mirror casing and a variable reflectance electro-optic mirror reflective element; wherein said mirror head comprises a reduced profile mirror casing having a thickness dimension between a front generally planar surface of said variable reflectance electro-optic mirror reflective element and a rear surface of a generally central region of said mirror casing, and wherein said thickness dimension is less than about 25 mm; a circuit board disposed in said mirror mount; wherein said circuit board includes circuitry and wherein said circuitry is associated with said variable reflectance electro-optic mirror reflective element; wherein wiring passes through said pivot element to electrically connect said circuitry to terminals of said variable reflectance electro-optic mirror reflective element; and wherein said circuitry is associated with a camera disposed at said mirror mount. 19. The interior rearview mirror assembly of claim 18, wherein one of (i) said camera has a field of view through a windshield of the equipped vehicle and (ii) said camera has a field of view rearward and views over an upper portion of said mirror head. 20. The interior rearview mirror assembly of claim 18, wherein said thickness dimension is less than about 20 mm.
2,400
7,090
7,090
14,083,423
2,481
A method for determining coding unit (CU) partitioning of a largest coding unit (LCU) of a picture is provided that includes computing a first statistical measure and a second statistical measure for the LCU, selecting the LCU as the CU partitioning when the first statistical measure does not exceed a first threshold and the second statistical measure does not exceed a second threshold, and selecting CUs in one or more lower layers of a CU hierarchy of the LCU to form the CU partitioning when the first statistical measure exceeds the first threshold and/or the second statistical measure exceeds the second threshold.
1. A computer implemented method for determining coding unit (CU) partitioning of a largest coding unit (LCU) of a picture, the method comprising: computing a first statistical measure and a second statistical measure for the LCU; selecting the LCU as the CU partitioning when the first statistical measure does not exceed a first threshold and the second statistical measure does not exceed a second threshold; and selecting CUs in one or more lower layers of a CU hierarchy of the LCU to form the CU partitioning when the first statistical measure exceeds the first threshold and/or the second statistical measure exceeds the second threshold. 2. The method of claim 1, wherein selecting CUs in one or more lower layers comprises: computing the first statistical measure and the second statistical measure for a parent CU comprised in the LCU; and selecting the parent CU as a partition of the CU partitioning when the first statistical measure of the parent CU does not exceed a third threshold and the second statistical measure of the parent CU does not exceed a fourth threshold. 3. The method of claim 2, further comprising: selecting child CUs of the parent CU in at least one lower layer of the CU hierarchy as part of the CU partitioning when the first statistical measure of the parent CU exceeds the third threshold and/or the second statistical measure of the parent CU exceeds the fourth threshold. 4. The method of claim 1, wherein the first statistical measure is variance and the second statistical measure is gradient. 5. The method of claim 1, wherein the first statistical measure is a sum of absolute differences between pixel values and an average pixel value and the second statistical measure is gradient. 6. An apparatus configured to determine coding unit (CU) partitioning of a largest coding unit (LCU) of a picture, the apparatus comprising: means for computing a first statistical measure and a second statistical measure for the LCU; means for selecting the LCU as the CU partitioning when the first statistical measure does not exceed a first threshold and the second statistical measure does not exceed a second threshold; and means for selecting CUs in one or more lower layers of a CU hierarchy of the LCU to form the CU partitioning when the first statistical measure exceeds the first threshold and/or the second statistical measure exceeds the second threshold. 7. The apparatus of claim 6, wherein the means for selecting CUs in one or more lower layers comprises: means for computing the first statistical measure and the second statistical measure for a parent CU comprised in the LCU; and means for selecting the parent CU as a partition of the CU partitioning when the first statistical measure of the parent CU does not exceed a third threshold and the second statistical measure of the parent CU does not exceed a fourth threshold. 8. The apparatus of claim 7, further comprising: means for selecting child CUs of the parent CU in at least one lower layer of the CU hierarchy as part of the CU partitioning when the first statistical measure of the parent CU exceeds the third threshold and/or the second statistical measure of the parent CU exceeds the fourth threshold. 9. The apparatus of claim 6, wherein the first statistical measure is variance and the second statistical measure is gradient. 10. The apparatus of claim 6, wherein the first statistical measure is a sum of absolute differences between pixel values and an average pixel value and the second statistical measure is gradient. 11. A computer readable medium storing software instructions that, when executed by at least one processor, cause a method for determining coding unit (CU) partitioning of a largest coding unit (LCU) of a picture to be performed, the method comprising: computing a first statistical measure and a second statistical measure for the LCU; selecting the LCU as the CU partitioning when the first statistical measure does not exceed a first threshold and the second statistical measure does not exceed a second threshold; and selecting CUs in one or more lower layers of a CU hierarchy of the LCU to form the CU partitioning when the first statistical measure exceeds the first threshold and/or the second statistical measure exceeds the second threshold. 12. The computer readable medium of claim 11, wherein selecting CUs in one or more lower layers comprises: computing the first statistical measure and the second statistical measure for a parent CU comprised in the LCU; and selecting the parent CU as a partition of the CU partitioning when the first statistical measure of the parent CU does not exceed a third threshold and the second statistical measure of the parent CU does not exceed a fourth threshold. 13. The computer readable medium of claim 12, wherein the method further comprises: selecting child CUs of the parent CU in at least one lower layer of the CU hierarchy as part of the CU partitioning when the first statistical measure of the parent CU exceeds the third threshold and/or the second statistical measure of the parent CU exceeds the fourth threshold. 14. The computer readable medium of claim 11, wherein the first statistical measure is variance and the second statistical measure is gradient. 15. The computer readable medium of claim 11, wherein the first statistical measure is a sum of absolute differences between pixel values and an average pixel value and the second statistical measure is gradient.
A method for determining coding unit (CU) partitioning of a largest coding unit (LCU) of a picture is provided that includes computing a first statistical measure and a second statistical measure for the LCU, selecting the LCU as the CU partitioning when the first statistical measure does not exceed a first threshold and the second statistical measure does not exceed a second threshold, and selecting CUs in one or more lower layers of a CU hierarchy of the LCU to form the CU partitioning when the first statistical measure exceeds the first threshold and/or the second statistical measure exceeds the second threshold.1. A computer implemented method for determining coding unit (CU) partitioning of a largest coding unit (LCU) of a picture, the method comprising: computing a first statistical measure and a second statistical measure for the LCU; selecting the LCU as the CU partitioning when the first statistical measure does not exceed a first threshold and the second statistical measure does not exceed a second threshold; and selecting CUs in one or more lower layers of a CU hierarchy of the LCU to form the CU partitioning when the first statistical measure exceeds the first threshold and/or the second statistical measure exceeds the second threshold. 2. The method of claim 1, wherein selecting CUs in one or more lower layers comprises: computing the first statistical measure and the second statistical measure for a parent CU comprised in the LCU; and selecting the parent CU as a partition of the CU partitioning when the first statistical measure of the parent CU does not exceed a third threshold and the second statistical measure of the parent CU does not exceed a fourth threshold. 3. The method of claim 2, further comprising: selecting child CUs of the parent CU in at least one lower layer of the CU hierarchy as part of the CU partitioning when the first statistical measure of the parent CU exceeds the third threshold and/or the second statistical measure of the parent CU exceeds the fourth threshold. 4. The method of claim 1, wherein the first statistical measure is variance and the second statistical measure is gradient. 5. The method of claim 1, wherein the first statistical measure is a sum of absolute differences between pixel values and an average pixel value and the second statistical measure is gradient. 6. An apparatus configured to determine coding unit (CU) partitioning of a largest coding unit (LCU) of a picture, the apparatus comprising: means for computing a first statistical measure and a second statistical measure for the LCU; means for selecting the LCU as the CU partitioning when the first statistical measure does not exceed a first threshold and the second statistical measure does not exceed a second threshold; and means for selecting CUs in one or more lower layers of a CU hierarchy of the LCU to form the CU partitioning when the first statistical measure exceeds the first threshold and/or the second statistical measure exceeds the second threshold. 7. The apparatus of claim 6, wherein the means for selecting CUs in one or more lower layers comprises: means for computing the first statistical measure and the second statistical measure for a parent CU comprised in the LCU; and means for selecting the parent CU as a partition of the CU partitioning when the first statistical measure of the parent CU does not exceed a third threshold and the second statistical measure of the parent CU does not exceed a fourth threshold. 8. The apparatus of claim 7, further comprising: means for selecting child CUs of the parent CU in at least one lower layer of the CU hierarchy as part of the CU partitioning when the first statistical measure of the parent CU exceeds the third threshold and/or the second statistical measure of the parent CU exceeds the fourth threshold. 9. The apparatus of claim 6, wherein the first statistical measure is variance and the second statistical measure is gradient. 10. The apparatus of claim 6, wherein the first statistical measure is a sum of absolute differences between pixel values and an average pixel value and the second statistical measure is gradient. 11. A computer readable medium storing software instructions that, when executed by at least one processor, cause a method for determining coding unit (CU) partitioning of a largest coding unit (LCU) of a picture to be performed, the method comprising: computing a first statistical measure and a second statistical measure for the LCU; selecting the LCU as the CU partitioning when the first statistical measure does not exceed a first threshold and the second statistical measure does not exceed a second threshold; and selecting CUs in one or more lower layers of a CU hierarchy of the LCU to form the CU partitioning when the first statistical measure exceeds the first threshold and/or the second statistical measure exceeds the second threshold. 12. The computer readable medium of claim 11, wherein selecting CUs in one or more lower layers comprises: computing the first statistical measure and the second statistical measure for a parent CU comprised in the LCU; and selecting the parent CU as a partition of the CU partitioning when the first statistical measure of the parent CU does not exceed a third threshold and the second statistical measure of the parent CU does not exceed a fourth threshold. 13. The computer readable medium of claim 12, wherein the method further comprises: selecting child CUs of the parent CU in at least one lower layer of the CU hierarchy as part of the CU partitioning when the first statistical measure of the parent CU exceeds the third threshold and/or the second statistical measure of the parent CU exceeds the fourth threshold. 14. The computer readable medium of claim 11, wherein the first statistical measure is variance and the second statistical measure is gradient. 15. The computer readable medium of claim 11, wherein the first statistical measure is a sum of absolute differences between pixel values and an average pixel value and the second statistical measure is gradient.
2,400
7,091
7,091
14,432,976
2,434
There is provided a mechanisms for associating a node device with a network domain. The method is performed by a node manager. A method comprises acquiring an identity of a node device, wherein the identity is indicative of a public key of the node device. A method comprises at least temporarily storing the public key of the node device. A method comprises broadcasting a nonce challenge and a public key of the node manager. A method comprises receiving, from the node device, the nonce challenge and the public key of the node manager, both of which being signed by a private key of the node device.
1-33. (canceled) 34. A method for associating a node device with a network domain, the method being performed by a node manager, the method comprising: acquiring an identity of a node device, wherein the identity is indicative of a public key of the node device; at least temporarily storing the public key of the node device; broadcasting a nonce challenge and a public key of the node manager; and receiving, from the node device, the nonce challenge and the public key of the node manager, both of which being signed by a private key of the node device. 35. The method of claim 34, wherein the identity is provided as a Quick Response code, a barcode, or a personal identification number code. 36. The method of claim 34, further comprising verifying the signature of the signed nonce challenge and the public key of the node manager. 37. The method of claim 36, wherein said verifying comprises verifying that the signed nonce challenge and the public key of the node manager was transmitted in response to said nonce challenge. 38. The method of claim 36, wherein said verifying comprises verifying that the signed nonce challenge and the public key of the node manager was signed by the public key of the node device. 39. The method of claim 36, further comprising continuing storing the public key of the node device. 40. The method of claim 34, further comprising sending instructions to the node device to start a verification sequence. 41. The method of claim 34, further comprising signing the public key of the node device using a private key of the node manager. 42. The method of claim 41, wherein the private key of the node manager has been encrypted by the node manager. 43. The method of claim 42, wherein symmetric encryption is used for encrypting the private key of the node manager. 44. The method of claim 34, wherein the public key of the node device is stored together with its signature in a distributed hash table. 45. The method of claim 44, wherein the distributed hash table comprises public keys and signatures of a plurality of node devices. 46. The method of claim 44, further comprising receiving a request from the node device to access the distributed hash table so as to populate a local distributed hash table, wherein the request is encrypted by the public key of the node manager. 47. The method of claim 46, further comprising: verifying the request; and, in response thereto, allowing the node device access to the distributed hash table. 48. The method of claim 34, wherein the network is a wireless network. 49. The method of claim 34, wherein the node device is a Bluetooth low-energy device. 50. A method for associating a node device with a network domain, the method being performed by the node device, the method comprising: receiving a nonce challenge and a public key of a node manager being broadcasted by the node manager; signing the nonce challenge and the public key of the node manager using a private key of the node device; and sending, to the node manager, the signed nonce challenge and public key of the node manager. 51. The method of claim 50, further comprising: sending an identity of the node device to the node manager; and wherein the nonce challenge and the public key are received in response thereto. 52. The method of claim 51, wherein the identity is provided as a Quick Response code, a barcode, or a personal identification number code. 53. The method of claim 50, further comprising: receiving instructions from the node manager to start a verification sequence; and starting the verification sequence in response thereto. 54. The method of claim 53, wherein the verification sequence involves the node device emitting output through a user interface. 55. The method of claim 50, further comprising storing the public key of the node manager. 56. The method of claim 50, further comprising sending a request to the node manager to access a distributed hash table so as to populate a local distributed hash table, wherein the request is encrypted by the public key of the node manager, and wherein the distributed hash table comprises public keys and signatures of a plurality of node devices. 57. The method of claim 56, further comprising receiving a notification of allowed access to the distributed hash table from the node manager. 58. The method of claim 57, further comprising populating said local distributed hash table by accessing the distributed hash table of the node manager in response to having received said notification. 59. The method of claim 58, further comprising accessing said local distributed hash table to acquire a public key of one node device of said plurality of node devices. 60. The method of claim 59, further comprising: verifying a signature of said one node device using the public key of the node manager; and sending a message to said one node device, wherein the message is encrypted using the public key of said one node device and signed by the private key of the node device. 61. The method of claim 58, further comprising: receiving a request from another node device to access said local distributed hash table; and allowing said another node device access to the local distributed hash table only if an identity of said another node device is encrypted by the public key of the node manager and the public key of said another node device is provided in the distributed hash table. 62. A node manager for associating a node device with a network domain, the node manager comprising a processing circuit, the processing circuit being configured to cause the node manager to: acquire an identity of a node device, wherein the identity is indicative of a public key of the node device; at least temporarily store the public key of the node device; broadcast a nonce challenge and a public key of the node manager; and receive, from the node device, the nonce challenge and the public key of the node manager, both of which being signed by a private key of the node device. 63. A node device for associating the node device with a network domain, the node device comprising a processing circuit, the processing circuit being configured to cause the node device to: receive a nonce challenge and a public key of a node manager being broadcasted by the node manager; sign the nonce challenge and the public key of the node manager using a private key of the node device; and send, to the node manager, the signed nonce challenge and public key of the node manager. 64. A non-transitory computer-readable medium comprising, stored thereupon, a computer program for associating a node device with a network domain, the computer program comprising computer code that, when run on a processing circuit of a node manager, causes the node manager to: acquire an identity of a node device, wherein the identity is indicative of a public key of the node device; at least temporarily store the public key of the node device; broadcast a nonce challenge and a public key of the node manager; and receive, from the node device, the nonce challenge and the public key of the node manager, both of which being signed by a private key of the node device. 65. A non-transitory computer-readable medium comprising, stored thereupon, a computer program for associating a node device with a network domain, the computer program comprising computer code that, when run on a processing circuit of the node device, causes the node device to: receive a nonce challenge and a public key of a node manager being broadcasted by the node manager; sign the nonce challenge and the public key of the node manager using a private key of the node device; and send, to the node manager, the signed nonce challenge and public key of the node manager.
There is provided a mechanisms for associating a node device with a network domain. The method is performed by a node manager. A method comprises acquiring an identity of a node device, wherein the identity is indicative of a public key of the node device. A method comprises at least temporarily storing the public key of the node device. A method comprises broadcasting a nonce challenge and a public key of the node manager. A method comprises receiving, from the node device, the nonce challenge and the public key of the node manager, both of which being signed by a private key of the node device.1-33. (canceled) 34. A method for associating a node device with a network domain, the method being performed by a node manager, the method comprising: acquiring an identity of a node device, wherein the identity is indicative of a public key of the node device; at least temporarily storing the public key of the node device; broadcasting a nonce challenge and a public key of the node manager; and receiving, from the node device, the nonce challenge and the public key of the node manager, both of which being signed by a private key of the node device. 35. The method of claim 34, wherein the identity is provided as a Quick Response code, a barcode, or a personal identification number code. 36. The method of claim 34, further comprising verifying the signature of the signed nonce challenge and the public key of the node manager. 37. The method of claim 36, wherein said verifying comprises verifying that the signed nonce challenge and the public key of the node manager was transmitted in response to said nonce challenge. 38. The method of claim 36, wherein said verifying comprises verifying that the signed nonce challenge and the public key of the node manager was signed by the public key of the node device. 39. The method of claim 36, further comprising continuing storing the public key of the node device. 40. The method of claim 34, further comprising sending instructions to the node device to start a verification sequence. 41. The method of claim 34, further comprising signing the public key of the node device using a private key of the node manager. 42. The method of claim 41, wherein the private key of the node manager has been encrypted by the node manager. 43. The method of claim 42, wherein symmetric encryption is used for encrypting the private key of the node manager. 44. The method of claim 34, wherein the public key of the node device is stored together with its signature in a distributed hash table. 45. The method of claim 44, wherein the distributed hash table comprises public keys and signatures of a plurality of node devices. 46. The method of claim 44, further comprising receiving a request from the node device to access the distributed hash table so as to populate a local distributed hash table, wherein the request is encrypted by the public key of the node manager. 47. The method of claim 46, further comprising: verifying the request; and, in response thereto, allowing the node device access to the distributed hash table. 48. The method of claim 34, wherein the network is a wireless network. 49. The method of claim 34, wherein the node device is a Bluetooth low-energy device. 50. A method for associating a node device with a network domain, the method being performed by the node device, the method comprising: receiving a nonce challenge and a public key of a node manager being broadcasted by the node manager; signing the nonce challenge and the public key of the node manager using a private key of the node device; and sending, to the node manager, the signed nonce challenge and public key of the node manager. 51. The method of claim 50, further comprising: sending an identity of the node device to the node manager; and wherein the nonce challenge and the public key are received in response thereto. 52. The method of claim 51, wherein the identity is provided as a Quick Response code, a barcode, or a personal identification number code. 53. The method of claim 50, further comprising: receiving instructions from the node manager to start a verification sequence; and starting the verification sequence in response thereto. 54. The method of claim 53, wherein the verification sequence involves the node device emitting output through a user interface. 55. The method of claim 50, further comprising storing the public key of the node manager. 56. The method of claim 50, further comprising sending a request to the node manager to access a distributed hash table so as to populate a local distributed hash table, wherein the request is encrypted by the public key of the node manager, and wherein the distributed hash table comprises public keys and signatures of a plurality of node devices. 57. The method of claim 56, further comprising receiving a notification of allowed access to the distributed hash table from the node manager. 58. The method of claim 57, further comprising populating said local distributed hash table by accessing the distributed hash table of the node manager in response to having received said notification. 59. The method of claim 58, further comprising accessing said local distributed hash table to acquire a public key of one node device of said plurality of node devices. 60. The method of claim 59, further comprising: verifying a signature of said one node device using the public key of the node manager; and sending a message to said one node device, wherein the message is encrypted using the public key of said one node device and signed by the private key of the node device. 61. The method of claim 58, further comprising: receiving a request from another node device to access said local distributed hash table; and allowing said another node device access to the local distributed hash table only if an identity of said another node device is encrypted by the public key of the node manager and the public key of said another node device is provided in the distributed hash table. 62. A node manager for associating a node device with a network domain, the node manager comprising a processing circuit, the processing circuit being configured to cause the node manager to: acquire an identity of a node device, wherein the identity is indicative of a public key of the node device; at least temporarily store the public key of the node device; broadcast a nonce challenge and a public key of the node manager; and receive, from the node device, the nonce challenge and the public key of the node manager, both of which being signed by a private key of the node device. 63. A node device for associating the node device with a network domain, the node device comprising a processing circuit, the processing circuit being configured to cause the node device to: receive a nonce challenge and a public key of a node manager being broadcasted by the node manager; sign the nonce challenge and the public key of the node manager using a private key of the node device; and send, to the node manager, the signed nonce challenge and public key of the node manager. 64. A non-transitory computer-readable medium comprising, stored thereupon, a computer program for associating a node device with a network domain, the computer program comprising computer code that, when run on a processing circuit of a node manager, causes the node manager to: acquire an identity of a node device, wherein the identity is indicative of a public key of the node device; at least temporarily store the public key of the node device; broadcast a nonce challenge and a public key of the node manager; and receive, from the node device, the nonce challenge and the public key of the node manager, both of which being signed by a private key of the node device. 65. A non-transitory computer-readable medium comprising, stored thereupon, a computer program for associating a node device with a network domain, the computer program comprising computer code that, when run on a processing circuit of the node device, causes the node device to: receive a nonce challenge and a public key of a node manager being broadcasted by the node manager; sign the nonce challenge and the public key of the node manager using a private key of the node device; and send, to the node manager, the signed nonce challenge and public key of the node manager.
2,400
7,092
7,092
14,581,387
2,413
Methods and system for automating conferencing in a communication session are provided herein. In some embodiments, a method for automating conferencing in a communication session includes detecting an established communication session between a first end-user device and a second end-user device, notifying a third end-user device associated with the first user device that the established communication session is available to be joined, receiving a request from the third end-user device to join the communication session, and establishing a conference session with the first end-user device, the second-end user device, and the third end-user device.
1. A method for handling calls between associated devices of a shared telephony account, comprising: establishing a communication session between a first end-user device and a second end-user device; receiving a first notification message from the first end-user device indicating that the communication session is at least one of visible or joinable by one or more devices associated with the first end-user device; and sending a second notification message to the one or more devices associated with the first end-user device. 2. The method of claim 1, wherein the first notification message designates the communication session as one of (a) visible and joinable by one or more devices associated with the first end-user device, (b) visible but not joinable by one or more devices associated with the first end-user device, or (c) joinable in listen only mode by one or more devices associated with the first end-user device. 3. The method of claim 1, further comprising: receiving a request from at least one of the one or more devices associated with the first end-user device to join the communication session; and establishing a conference session with the first end-user device, the second end-user device, and the at least one of the one or more devices associated with the first end-user device that requested to join the communication session. 4. The method of claim 3, further comprising: receiving a request to establish a private line between the first end-user device and the at least one of the one or more devices associated with the first end-user device participating in the conference session. 5. The method of claim 4, further comprising: establishing the private line between the first end-user device and the at least one of the one or more devices associated with the first end-user device participating in the conference session while the conference session is active. 6. The method of claim 3, wherein establishing the conference session includes sending an invitation message to one or more devices associated with the first end-user device for a conference session; and sending a re-invitation message to the first end-user device and second-end user device for the conference session. 7. The method of claim 3, wherein the communication session is established via a proxy server, and wherein establishing the conference session includes routing the communication session to a conference server hosting the conference session. 8. The method of claim 3, wherein data streams from each end-user device are coordinated in the conference session via a media relay. 9. The method of claim 1, further comprising: receiving a request to share screen images related to the communication session displayed on the first user device with the one or more devices associated with the first end-user device. 10. A method for automating conferencing in a communication session, comprising: receiving a request to establish a communication session between a first end-user device and a second end-user device; determining one or more third end-user devices associated with the first end-user device that should be notified of the communication session based on configuration settings stored in association with the first end-user device; and sending a notification message to each of the determined one or more third end-user devices that should be notified to join the established communication session. 11. The method of claim 10, further comprising: receiving a request from at least one of the one or more third end-user devices associated with the first end-user device to join the communication session; and establishing a conference session with the first end-user device, the second end-user device, and the at least one of the one or more third end-user devices associated with the first end-user device that requested to join the communication session. 12. The method of claim 10, wherein determining one or more third end-user devices associated with the first end-user device that should be notified of the communication session based on configuration settings includes: determining the one or more third end-user devices that are authorized in the configuration settings to participate in communication sessions associated with a communication identifier of the second end-user device. 13. The method of claim 10, wherein determining one or more third end-user devices associated with the first end-user device that should be notified of the communication session based on configuration settings includes: determining the one or more third end-user devices that include a communication identifier of the second end-user device in their address book. 14. The method of claim 10, wherein determining one or more third end-user devices associated with the first end-user device that should be notified of the communication session based on configuration settings includes: determining the one or more third end-user devices that have participated in previous calls with the second end-user device. 15. The method of claim 10, wherein determining one or more third end-user devices associated with the first end-user device that should be notified of the communication session based on configuration settings includes: monitoring a communication session established between the first end-user device and the second end-user device; determining that one or more words spoken during the communication session is similar to one or more predefined keywords; and determining the one or more third end-user devices configured to be notified when a keyword similarity match is identified. 16. A method for automating conferencing in a communication session, comprising: receiving, at a third end-user device associated with a first end-user device, a notification of an established communication session between the first end-user and a second end-user device; displaying an indication of the communication session and whether the communication session may be joined based on the notification received; sending a request to join the established communication session; and establishing a conference session with the first end-user device, the second end-user device, and the third end-user device. 17. The method of claim 16, wherein the received notification indicates that the communication session is one of joinable with full participation or joinable in listen only mode.
Methods and system for automating conferencing in a communication session are provided herein. In some embodiments, a method for automating conferencing in a communication session includes detecting an established communication session between a first end-user device and a second end-user device, notifying a third end-user device associated with the first user device that the established communication session is available to be joined, receiving a request from the third end-user device to join the communication session, and establishing a conference session with the first end-user device, the second-end user device, and the third end-user device.1. A method for handling calls between associated devices of a shared telephony account, comprising: establishing a communication session between a first end-user device and a second end-user device; receiving a first notification message from the first end-user device indicating that the communication session is at least one of visible or joinable by one or more devices associated with the first end-user device; and sending a second notification message to the one or more devices associated with the first end-user device. 2. The method of claim 1, wherein the first notification message designates the communication session as one of (a) visible and joinable by one or more devices associated with the first end-user device, (b) visible but not joinable by one or more devices associated with the first end-user device, or (c) joinable in listen only mode by one or more devices associated with the first end-user device. 3. The method of claim 1, further comprising: receiving a request from at least one of the one or more devices associated with the first end-user device to join the communication session; and establishing a conference session with the first end-user device, the second end-user device, and the at least one of the one or more devices associated with the first end-user device that requested to join the communication session. 4. The method of claim 3, further comprising: receiving a request to establish a private line between the first end-user device and the at least one of the one or more devices associated with the first end-user device participating in the conference session. 5. The method of claim 4, further comprising: establishing the private line between the first end-user device and the at least one of the one or more devices associated with the first end-user device participating in the conference session while the conference session is active. 6. The method of claim 3, wherein establishing the conference session includes sending an invitation message to one or more devices associated with the first end-user device for a conference session; and sending a re-invitation message to the first end-user device and second-end user device for the conference session. 7. The method of claim 3, wherein the communication session is established via a proxy server, and wherein establishing the conference session includes routing the communication session to a conference server hosting the conference session. 8. The method of claim 3, wherein data streams from each end-user device are coordinated in the conference session via a media relay. 9. The method of claim 1, further comprising: receiving a request to share screen images related to the communication session displayed on the first user device with the one or more devices associated with the first end-user device. 10. A method for automating conferencing in a communication session, comprising: receiving a request to establish a communication session between a first end-user device and a second end-user device; determining one or more third end-user devices associated with the first end-user device that should be notified of the communication session based on configuration settings stored in association with the first end-user device; and sending a notification message to each of the determined one or more third end-user devices that should be notified to join the established communication session. 11. The method of claim 10, further comprising: receiving a request from at least one of the one or more third end-user devices associated with the first end-user device to join the communication session; and establishing a conference session with the first end-user device, the second end-user device, and the at least one of the one or more third end-user devices associated with the first end-user device that requested to join the communication session. 12. The method of claim 10, wherein determining one or more third end-user devices associated with the first end-user device that should be notified of the communication session based on configuration settings includes: determining the one or more third end-user devices that are authorized in the configuration settings to participate in communication sessions associated with a communication identifier of the second end-user device. 13. The method of claim 10, wherein determining one or more third end-user devices associated with the first end-user device that should be notified of the communication session based on configuration settings includes: determining the one or more third end-user devices that include a communication identifier of the second end-user device in their address book. 14. The method of claim 10, wherein determining one or more third end-user devices associated with the first end-user device that should be notified of the communication session based on configuration settings includes: determining the one or more third end-user devices that have participated in previous calls with the second end-user device. 15. The method of claim 10, wherein determining one or more third end-user devices associated with the first end-user device that should be notified of the communication session based on configuration settings includes: monitoring a communication session established between the first end-user device and the second end-user device; determining that one or more words spoken during the communication session is similar to one or more predefined keywords; and determining the one or more third end-user devices configured to be notified when a keyword similarity match is identified. 16. A method for automating conferencing in a communication session, comprising: receiving, at a third end-user device associated with a first end-user device, a notification of an established communication session between the first end-user and a second end-user device; displaying an indication of the communication session and whether the communication session may be joined based on the notification received; sending a request to join the established communication session; and establishing a conference session with the first end-user device, the second end-user device, and the third end-user device. 17. The method of claim 16, wherein the received notification indicates that the communication session is one of joinable with full participation or joinable in listen only mode.
2,400
7,093
7,093
13,794,785
2,497
Systems, methods, and devices are provided which may enable a communication device to respond to a caller based on an intent of the caller as determined by an intent engine and the caller's privilege level. In an aspect, the caller may be engaged, the caller's privilege level may be determined, an intent engine may determine the caller's intent, and based on the caller's intent and privilege level the caller may be provided with information and/or a set of configurable follow-up actions may be taken in the absence of the intended communication recipient.
1. A method for responding to a call from a caller placed to a communication device, comprising: determining an intent of the caller using an intent engine; determining a privilege level of the caller; and taking an action in response to the determined intent and the determined privilege level. 2. The method of claim 1, wherein determining a privilege level of the caller comprises: determining an identity of the caller; and comparing the identity of the caller to a privilege list. 3. The method of claim 2, wherein determining an identity of the caller is based at least in part on one or more of a phone number, voice recognition, facial recognition, customizable question responses, biometric information, and location information. 4. The method of claim 1, further comprising comparing the privilege level of the caller to a privilege threshold, wherein taking an action in response to the determined intent and the determined privilege level comprises taking an action in response to the determined intent when the privilege level of the caller is determined to be above the privilege threshold. 5. The method of claim 1, wherein determining an intent of the caller using an intent engine comprises: receiving a communication input from the caller; identifying an attribute of the communication input; and associating the identified attribute with an intent. 6. The method of claim 5, wherein: the communication input from the caller is speech; and identifying an attribute of the communication input comprises applying natural language processing to the speech to identify an attribute of the speech. 7. The method of claim 5, wherein: the communication input from the caller is a text formatted communication input; and identifying an attribute of the communication input comprises applying natural language processing to the text formatted communication input to identify an attribute of the text. 8. The method of claim 7, wherein the text formatted communication input is a emoticon formatted communication input. 9. The method of claim 5, wherein: the communication input from the caller is video data; and identifying an attribute of the communication input comprises applying facial recognition to the video data to identify an attribute of the video data. 10. The method of claim 5, wherein: the communication input from the caller is video data; and identifying an attribute of the communication input comprises identifying an attribute of an audio component of the video data. 11. The method of claim 10, wherein identifying an attribute of an audio component of the video data comprises applying natural language processing to a speech component of an audio component of the video data to identify an attribute of the speech component. 12. The method of claim 5, wherein: the communication input from the caller is video data; and identifying an attribute of the communication input comprises identifying an emotion, mood, or gesture included in the video data as an attribute of the video data. 13. The method of claim 5, wherein: the communication input from the caller is sensor data; and identifying an attribute of the communication input comprises identifying an attribute of the sensor data. 14. The method of claim 5, further comprising: determining whether the identified attribute corresponds to a request for information; identifying one or more relevant information sources when the identified attribute corresponds to a request for information; and extracting information associated with the request for information from the one or more relevant information sources, wherein taking an action in response to the determined intent comprises providing the extracted information to the caller. 15. The method of claim 14, wherein identifying one or more relevant information sources when the identified attribute corresponds to a request for information comprises identifying one or more relevant information sources based at least in part on the determined privilege level when the communication input is a request for information. 16. The method of claim 15, wherein the one or more relevant information sources are one or more of a calendar application, a social network application, an email mailbox, a contact list, a voice mailbox, a position location application, user's communication device memory, and user's communication device settings. 17. The method of claim 5, further comprising determining whether the identified attribute corresponds to an action indication, wherein taking an action in response to the determined intent comprises taking an action corresponding to the action indication. 18. The method of claim 5, wherein: identifying an attribute of the communication input comprises identifying a plurality of attributes of the communication input; and associating the identified attribute with an intent comprises: comparing a combination of the plurality of attributes to a dictionary of intent descriptors to determine a correlation between the combination of the plurality of attributes and the intent descriptors; and associating an intent descriptor with a highest correlation with an intent. 19. The method of claim 1, further comprising: determining whether the call is urgent; and connecting the call to another device in response to determining that the call is urgent and based at least in part on the determined privilege level. 20. The method of claim 19, wherein the another device is a device associated with a third party. 21. The method of claim 1, wherein determining an intent of the caller using an intent engine comprises automatically determining an intent of the caller using an intent engine without additional human involvement. 22. The method of claim 1, wherein determining an intent of the caller using an intent engine comprises determining an intent of the caller using an intent engine based at least in part on a past intent determination associated with the caller. 23. A method for responding to a call from a caller placed to a communication device, comprising: receiving an input from the caller; determining a privilege level of the caller; determining whether the input from the caller is a request for information; identifying one or more relevant information sources when the input is a request for information; extracting information associated with the request for information from the one or more relevant information sources based at least in part on the privilege level of the caller; and providing the extracted information to the caller. 24. The method of claim 23, wherein determining a privilege level of the caller comprises: determining an identity of the caller; and comparing the identity of the caller to a privilege list. 25. The method of claim 24, wherein determining an identity of the caller is based at least in part on one or more of a phone number, voice recognition, facial recognition, customizable question responses, biometric information, and location information. 26. The method of claim 23, further comprising comparing the privilege level of the caller to a privilege threshold, wherein extracting information associated with the request for information from the one or more relevant information sources is based at least in part on the privilege level of the caller comprises extracting information associated with the request for information from the one or more relevant information sources when the privilege level of the caller is above the privilege threshold. 27. The method of claim 23, wherein the input is one or more of a verbal data, video data, image data, graphics data, text data, location information, calendar data, and sensor data. 28. The method of claim 23, wherein the one or more relevant information sources are one or more of a calendar application, a social network application, an email mailbox, a contact list, a voice mailbox, a position location application, user's communication device memory, and user's communication device settings. 29. The method of claim 23, wherein identifying one or more relevant information sources when the input is a request for information comprises identifying one or more relevant information sources based at least in part on a past identification of one or more relevant information sources when the input is a request for information. 30. The method of claim 23, wherein identifying one or more relevant information sources when the input is a request for information comprises automatically identifying one or more relevant information sources without additional human involvement when the input is a request for information. 31. A communication device, comprising: means for determining an intent of a caller using an intent engine; means for determining a privilege level of the caller; and means for taking an action in response to the determined intent and the determined privilege level. 32. The communication device of claim 31, wherein means for determining a privilege level of the caller comprises: means for determining an identity of the caller; and means for comparing the identity of the caller to a privilege list. 33. The communication device of claim 32, wherein means for determining an identity of the caller comprises means for determining an identity of the caller based at least in part on one or more of a phone number, voice recognition, facial recognition, customizable question responses, biometric information, and location information. 34. The communication device of claim 31, further comprising means for comparing the privilege level of the caller to a privilege threshold, wherein means for taking an action in response to the determined intent and the determined privilege level comprises means for taking an action in response to the determined intent when the privilege level of the caller is determined to be above the privilege threshold. 35. The communication device of claim 31, wherein means for determining an intent of the caller using an intent engine comprises: means for receiving a communication input from the caller; means for identifying an attribute of the communication input; and means for associating the identified attribute with an intent. 36. The communication device of claim 35, wherein: the communication input from the caller is speech; and means for identifying an attribute of the communication input comprises means for applying natural language processing to the speech to identify an attribute of the speech. 37. The communication device of claim 35, wherein: the communication input from the caller is a text formatted communication input; and means for identifying an attribute of the communication input comprises means for applying natural language processing to the text formatted communication input to identify an attribute of the text. 38. The communication device of claim 37, wherein the text formatted communication input is a emoticon formatted communication input. 39. The communication device of claim 35, wherein: the communication input from the caller is video data; and means for identifying an attribute of the communication input comprises means for applying facial recognition to the video data to identify an attribute of the video data. 40. The communication device of claim 35, wherein: the communication input from the caller is video data; and means for identifying an attribute of the communication input comprises means for identifying an attribute of an audio component of the video data. 41. The communication device of claim 40, wherein means for identifying an attribute of an audio component of the video data comprises means for applying natural language processing to a speech component of an audio component of the video data to identify an attribute of the speech component. 42. The communication device of claim 35, wherein: the communication input from the caller is video data; and means for identifying an attribute of the communication input comprises means for identifying an emotion, mood, or gesture included in the video data as an attribute of the video data. 43. The communication device of claim 35, wherein: the communication input from the caller is sensor data; and means for identifying an attribute of the communication input comprises means for identifying an attribute of the sensor data. 44. The communication device of claim 35, further comprising: means for determining whether the identified attribute corresponds to a request for information; means for identifying one or more relevant information sources when the identified attribute corresponds to a request for information; and means for extracting information associated with the request for information from the one or more relevant information sources, wherein means for taking an action in response to the determined intent comprises means for providing the extracted information to the caller. 45. The communication device of claim 44, wherein means for identifying one or more relevant information sources when the identified attribute corresponds to a request for information comprises means for identifying one or more relevant information sources based at least in part on the determined privilege level when the communication input is a request for information. 46. The communication device of claim 45, wherein the one or more relevant information sources are one or more of a calendar application, a social network application, an email mailbox, a contact list, a voice mailbox, a position location application, user's communication device memory, and user's communication device settings. 47. The communication device of claim 35, further comprising means for determining whether the identified attribute corresponds to an action indication, wherein means for taking an action in response to the determined intent comprises means for taking an action corresponding to the action indication. 48. The communication device of claim 35, wherein: means for identifying an attribute of the communication input comprises means for identifying a plurality of attributes of the communication input; and means for associating the identified attribute with an intent comprises: means for comparing a combination of the plurality of attributes to a dictionary of intent descriptors to determine a correlation between the combination of the plurality of attributes and the intent descriptors; and means for associating an intent descriptor with a highest correlation with an intent. 49. The communication device of claim 31, further comprising: means for determining whether the call is urgent; and means for connecting the call to another device in response to determining that the call is urgent and based at least in part on the determined privilege level. 50. The communication device of claim 49, wherein the another device is a device associated with a third party. 51. The communication device of claim 31, wherein means for determining an intent of the caller using an intent engine comprises means for automatically determining an intent of the caller using an intent engine without additional human involvement. 52. The communication device of claim 31, wherein means for determining an intent of the caller using an intent engine comprises means for determining an intent of the caller using an intent engine based at least in part on a past intent determination associated with the caller. 53. A communication device, comprising: means for receiving an input from a caller; means for determining a privilege level of the caller; means for determining whether the input from the caller is a request for information; means for identifying one or more relevant information sources when the input is a request for information; means for extracting information associated with the request for information from the one or more relevant information sources based at least in part on the privilege level of the caller; and means for providing the extracted information to the caller. 54. The communication device of claim 53, wherein means for determining a privilege level of the caller comprises: means for determining an identity of the caller; and means for comparing the identity of the caller to a privilege list. 55. The communication device of claim 54, wherein means for determining an identity of the caller comprises means for determining an identity of the caller based at least in part on one or more of a phone number, voice recognition, facial recognition, customizable question responses, biometric information, and location information. 56. The communication device of claim 53, further comprising means for comparing the privilege level of the caller to a privilege threshold, wherein means for extracting information associated with the request for information from the one or more relevant information sources based at least in part on the privilege level of the caller comprises means for extracting information associated with the request for information from the one or more relevant information sources when the privilege level of the caller is above the privilege threshold. 57. The communication device of claim 53, wherein the input is one or more of a verbal data, video data, image data, graphics data, text data, location information, calendar data, and sensor data. 58. The communication device of claim 53, wherein the one or more relevant information sources are one or more of a calendar application, a social network application, an email mailbox, a contact list, a voice mailbox, a position location application, user's communication device memory, and user's communication device settings. 59. The communication device of claim 53, wherein means for identifying one or more relevant information sources when the input is a request for information comprises means for identifying one or more relevant information sources based at least in part on a past identification of one or more relevant information sources when the input is a request for information. 60. The communication device of claim 53, wherein means for identifying one or more relevant information sources when the input is a request for information comprises means for automatically identifying one or more relevant information sources without additional human involvement when the input is a request for information. 61. A communication device, comprising: a transceiver configured to communicate with a communication network; and a processor coupled to the transceiver, wherein the processor is configured with processor-executable instructions to perform operations comprising: determining an intent of a caller using an intent engine; determining a privilege level of the caller; and taking an action in response to the determined intent and the determined privilege level. 62. The communication device of claim 61, wherein the processor is configured with processor-executable instructions to perform operations such that determining a privilege level of the caller comprises: determining an identity of the caller; and comparing the identity of the caller to a privilege list. 63. The communication device of claim 62, wherein the processor is configured with processor-executable instructions to perform operations such that determining an identity of the caller is based at least in part on one or more of a phone number, voice recognition, facial recognition, customizable question responses, biometric information, and location information. 64. The communication device of claim 61, wherein the processor is configured with processor-executable instructions to perform operations further comprising comparing the privilege level of the caller to a privilege threshold, and wherein the processor is configured with processor-executable instructions to perform operations such that taking an action in response to the determined intent and the determined privilege level comprises taking an action in response to the determined intent when the privilege level of the caller is determined to be above the privilege threshold. 65. The communication device of claim 61, wherein the processor is configured with processor-executable instructions to perform operations such that determining an intent of the caller using an intent engine comprises: receiving a communication input from the caller; identifying an attribute of the communication input; and associating the identified attribute with an intent. 66. The communication device of claim 65, wherein the processor is configured with processor-executable instructions to perform operations such that: the communication input from the caller is speech; and identifying an attribute of the communication input comprises applying natural language processing to the speech to identify an attribute of the speech. 67. The communication device of claim 65, wherein the processor is configured with processor-executable instructions to perform operations such that: the communication input from the caller is a text formatted communication input; and identifying an attribute of the communication input comprises applying natural language processing to the text formatted communication input to identify an attribute of the text. 68. The communication device of claim 67, wherein the processor is configured with processor-executable instructions to perform operations such that the text formatted communication input is a emoticon formatted communication input. 69. The communication device of claim 65, wherein the processor is configured with processor-executable instructions to perform operations such that: the communication input from the caller is video data; and identifying an attribute of the communication input comprises applying facial recognition to the video data to identify an attribute of the video data. 70. The communication device of claim 65, wherein the processor is configured with processor-executable instructions to perform operations such that: the communication input from the caller is video data; and identifying an attribute of the communication input comprises identifying an attribute of an audio component of the video data. 71. The communication device of claim 70, wherein the processor is configured with processor-executable instructions to perform operations such that identifying an attribute of an audio component of the video data comprises applying natural language processing to a speech component of an audio component of the video data to identify an attribute of the speech component. 72. The communication device of claim 65, wherein the processor is configured with processor-executable instructions to perform operations such that: the communication input from the caller is video data; and identifying an attribute of the communication input comprises identifying an emotion, mood, or gesture included in the video data as an attribute of the video data. 73. The communication device of claim 65, wherein the processor is configured with processor-executable instructions to perform operations such that: the communication input from the caller is sensor data; and identifying an attribute of the communication input comprises identifying an attribute of the sensor data. 74. The communication device of claim 65, wherein the processor is configured with processor-executable instructions to perform operations further comprising: determining whether the identified attribute corresponds to a request for information; identifying one or more relevant information sources when the identified attribute corresponds to a request for information; and extracting information associated with the request for information from the one or more relevant information sources, and wherein the processor is configured with processor-executable instructions to perform operations such that taking an action in response to the determined intent comprises providing the extracted information to the caller. 75. The communication device of claim 74, wherein the processor is configured with processor-executable instructions to perform operations such that identifying one or more relevant information sources when the identified attribute corresponds to a request for information comprises identifying one or more relevant information sources based at least in part on the determined privilege level when the communication input is a request for information. 76. The communication device of claim 75, wherein the processor is configured with processor-executable instructions to perform operations such that the one or more relevant information sources are one or more of a calendar application, a social network application, an email mailbox, a contact list, a voice mailbox, a position location application, user's communication device memory, and user's communication device settings. 77. The communication device of claim 65, wherein the processor is configured with processor-executable instructions to perform operations further comprising determining whether the identified attribute corresponds to an action indication, and wherein the processor is configured with processor-executable instructions to perform operations such that taking an action in response to the determined intent comprises taking an action corresponding to the action indication. 78. The communication device of claim 65, wherein the processor is configured with processor-executable instructions to perform operations such that: identifying an attribute of the communication input comprises identifying a plurality of attributes of the communication input; and associating the identified attribute with an intent comprises: comparing a combination of the plurality of attributes to a dictionary of intent descriptors to determine a correlation between the combination of the plurality of attributes and the intent descriptors; and associating an intent descriptor with a highest correlation with an intent. 79. The communication device of claim 61, wherein the processor is configured with processor-executable instructions to perform operations further comprising: determining whether the call is urgent; and connecting the call to another device in response to determining that the call is urgent and based at least in part on the determined privilege level. 80. The communication device of claim 79, wherein the processor is configured with processor-executable instructions to perform operations such that the another device is a device associated with a third party. 81. The communication device of claim 61, wherein the processor is configured with processor-executable instructions to perform operations such that determining an intent of the caller using an intent engine comprises automatically determining an intent of the caller using an intent engine without additional human involvement. 82. The communication device of claim 61, wherein the processor is configured with processor-executable instructions to perform operations such that determining an intent of the caller using an intent engine comprises determining an intent of the caller using an intent engine based at least in part on a past intent determination associated with the caller. 83. A communication device, comprising: a transceiver configured to communicate with a communication network; and a processor coupled to the transceiver, wherein the processor is configured with processor-executable instructions to perform operations comprising: receiving an input from a caller; determining a privilege level of the caller; determining whether the input from the caller is a request for information; identifying one or more relevant information sources when the input is a request for information; extracting information associated with the request for information from the one or more relevant information sources based at least in part on the privilege level of the caller; and providing the extracted information to the caller. 84. The communication device of claim 83, wherein the processor is configured with processor-executable instructions to perform operations such that determining a privilege level of the caller comprises: determining an identity of the caller; and comparing the identity of the caller to a privilege list. 85. The communication device of claim 84, wherein the processor is configured with processor-executable instructions to perform operations such that determining an identity of the caller is based at least in part on one or more of a phone number, voice recognition, facial recognition, customizable question responses, biometric information, and location information. 86. The communication device of claim 83, wherein the processor is configured with processor-executable instructions to perform operations further comprising comparing the privilege level of the caller to a privilege threshold, and wherein the processor is configured with processor-executable instructions to perform operations such that extracting information associated with the request for information from the one or more relevant information sources based at least in part on the privilege level of the caller comprises extracting information associated with the request for information from the one or more relevant information sources when the privilege level of the caller is above the privilege threshold. 87. The communication device of claim 83, wherein the processor is configured with processor-executable instructions to perform operations such that the input is one or more of a verbal data, video data, image data, graphics data, text data, location information, calendar data, and sensor data. 88. The communication device of claim 83, wherein the processor is configured with processor-executable instructions to perform operations such that the one or more relevant information sources are one or more of a calendar application, a social network application, an email mailbox, a contact list, a voice mailbox, a position location application, user's communication device memory, and user's communication device settings. 89. The communication device of claim 83, wherein the processor is configured with processor-executable instructions to perform operations such that identifying one or more relevant information sources when the input is a request for information comprises identifying one or more relevant information sources based at least in part on a past identification of one or more relevant information sources when the input is a request for information. 90. The communication device of claim 83, wherein the processor is configured with processor-executable instructions to perform operations such that identifying one or more relevant information sources when the input is a request for information comprises automatically identifying one or more relevant information sources without additional human involvement when the input is a request for information. 91. A non-transitory computer-readable medium having stored thereon processor-executable instructions configured to cause a processor of a communication device to perform operations comprising: determining an intent of a caller using an intent engine; determining a privilege level of the caller; and taking an action in response to the determined intent and the determined privilege level. 92. The non-transitory computer-readable storage medium of claim 91, wherein the stored processor-executable instructions are configured to cause a processor of a communication device to perform operations such that determining a privilege level of the caller comprises: determining an identity of the caller; and comparing the identity of the caller to a privilege list. 93. The non-transitory computer-readable storage medium of claim 92, wherein the stored processor-executable instructions are configured to cause a processor of a communication device to perform operations such that determining an identity of the caller is based at least in part on one or more of a phone number, voice recognition, facial recognition, customizable question responses, biometric information, and location information. 94. The non-transitory computer-readable storage medium of claim 91, wherein the stored processor-executable instructions are configured to cause a processor of a communication device to perform operations further comprising comparing the privilege level of the caller to a privilege threshold, and wherein the stored processor-executable instructions are configured to cause a processor of a communication device to perform operations such that taking an action in response to the determined intent and the determined privilege level comprises taking an action in response to the determined intent when the privilege level of the caller is determined to be above the privilege threshold. 95. The non-transitory computer-readable storage medium of claim 91, wherein the stored processor-executable instructions are configured to cause a processor of a communication device to perform operations such that determining an intent of the caller using an intent engine comprises: receiving a communication input from the caller; identifying an attribute of the communication input; and associating the identified attribute with an intent. 96. The non-transitory computer-readable storage medium of claim 95, wherein the stored processor-executable instructions are configured to cause a processor of a communication device to perform operations such that: the communication input from the caller is speech; and identifying an attribute of the communication input comprises applying natural language processing to the speech to identify an attribute of the speech. 97. The non-transitory computer-readable storage medium of claim 95, wherein the stored processor-executable instructions are configured to cause a processor of a communication device to perform operations such that: the communication input from the caller is a text formatted communication input; and identifying an attribute of the communication input comprises applying natural language processing to the text formatted communication input to identify an attribute of the text. 98. The non-transitory computer-readable storage medium of claim 97, wherein the stored processor-executable instructions are configured to cause a processor of a communication device to perform operations such that the text formatted communication input is a emoticon formatted communication input. 99. The non-transitory computer-readable storage medium of claim 95, wherein the stored processor-executable instructions are configured to cause a processor of a communication device to perform operations such that: the communication input from the caller is video data; and identifying an attribute of the communication input comprises applying facial recognition to the video data to identify an attribute of the video data. 100. The non-transitory computer-readable storage medium of claim 95, wherein the stored processor-executable instructions are configured to cause a processor of a communication device to perform operations such that: the communication input from the caller is video data; and identifying an attribute of the communication input comprises identifying an attribute of an audio component of the video data. 101. The non-transitory computer-readable storage medium of claim 100, wherein the stored processor-executable instructions are configured to cause a processor of a communication device to perform operations such that identifying an attribute of an audio component of the video data comprises applying natural language processing to a speech component of an audio component of the video data to identify an attribute of the speech component. 102. The non-transitory computer-readable storage medium of claim 95, wherein the stored processor-executable instructions are configured to cause a processor of a communication device to perform operations such that: the communication input from the caller is video data; and identifying an attribute of the communication input comprises identifying an emotion, mood, or gesture included in the video data as an attribute of the video data. 103. The non-transitory computer-readable storage medium of claim 95, wherein the stored processor-executable instructions are configured to cause a processor of a communication device to perform operations such that: the communication input from the caller is sensor data; and identifying an attribute of the communication input comprises identifying an attribute of the sensor data. 104. The non-transitory computer-readable storage medium of claim 95, wherein the stored processor-executable instructions are configured to cause a processor of a communication device to perform operations further comprising: determining whether the identified attribute corresponds to a request for information; identifying one or more relevant information sources when the identified attribute corresponds to a request for information; and extracting information associated with the request for information from the one or more relevant information sources, and wherein the stored processor-executable instructions are configured to cause a processor of a communication device to perform operations such that taking an action in response to the determined intent comprises providing the extracted information to the caller. 105. The non-transitory computer-readable storage medium of claim 104, wherein the stored processor-executable instructions are configured to cause a processor of a communication device to perform operations such that: identifying one or more relevant information sources when the identified attribute corresponds to a request for information comprises identifying one or more relevant information sources based at least in part on the determined privilege level when the communication input is a request for information. 106. The non-transitory computer-readable storage medium of claim 105, wherein the stored processor-executable instructions are configured to cause a processor of a communication device to perform operations such that: the one or more relevant information sources are one or more of a calendar application, a social network application, an email mailbox, a contact list, a voice mailbox, a position location application, user's communication device memory, and user's communication device settings. 107. The non-transitory computer-readable storage medium of claim 95, wherein the stored processor-executable instructions are configured to cause a processor of a communication device to perform operations further comprising determining whether the identified attribute corresponds to an action indication, and wherein the stored processor-executable instructions are configured to cause a processor to perform operations such that taking an action in response to the determined intent comprises taking an action corresponding to the action indication. 108. The non-transitory computer-readable storage medium of claim 95, wherein the stored processor-executable instructions are configured to cause a processor of a communication device to perform operations such that: identifying an attribute of the communication input comprises identifying a plurality of attributes of the communication input; and associating the identified attribute with an intent comprises: comparing a combination of the plurality of attributes to a dictionary of intent descriptors to determine a correlation between the combination of the plurality of attributes and the intent descriptors; and associating an intent descriptor with a highest correlation with an intent. 109. The non-transitory computer-readable storage medium of claim 91, wherein the stored processor-executable instructions are configured to cause a processor of a communication device to perform operations further comprising: determining whether the call is urgent; and connecting the call to another device in response to determining that the call is urgent and based at least in part on the determined privilege level. 110. The non-transitory computer-readable storage medium of claim 109, wherein the stored processor-executable instructions are configured to cause a processor of a communication device to perform operations such that the another device is a device associated with a third party. 111. The non-transitory computer-readable storage medium of claim 91, wherein the stored processor-executable instructions are configured to cause a processor of a communication device to perform operations such that determining an intent of the caller using an intent engine comprises automatically determining an intent of the caller using an intent engine without additional human involvement. 112. The non-transitory computer-readable storage medium of claim 91, wherein the stored processor-executable instructions are configured to cause a processor of a communication device to perform operations such that determining an intent of the caller using an intent engine comprises determining an intent of the caller using an intent engine based at least in part on a past intent determination associated with the caller. 113. A non-transitory computer-readable medium having stored thereon processor-executable instructions configured to cause a processor of a communication device to perform operations comprising: receiving an input from a caller; determining a privilege level of the caller; determining whether the input from the caller is a request for information; identifying one or more relevant information sources when the input is a request for information; extracting information associated with the request for information from the one or more relevant information sources based at least in part on the privilege level of the caller; and providing the extracted information to the caller. 114. The non-transitory computer-readable storage medium of claim 113, wherein the stored processor-executable instructions are configured to cause a processor of a communication device to perform operations such that determining a privilege level of the caller comprises: determining an identity of the caller; and comparing the identity of the caller to a privilege list. 115. The non-transitory computer-readable storage medium of claim 114, wherein the stored processor-executable instructions are configured to cause a processor of a communication device to perform operations such that determining an identity of the caller is based at least in part on one or more of a phone number, voice recognition, facial recognition, customizable question responses, biometric information, and location information. 116. The non-transitory computer-readable storage medium of claim 113, wherein the stored processor-executable instructions are configured to cause a processor of a communication device to perform operations further comprising comparing the privilege level of the caller to a privilege threshold, and wherein the stored processor-executable instructions are configured to cause a processor of a communication device to perform operations such that extracting information associated with the request for information from the one or more relevant information sources based at least in part on the privilege level of the caller comprises extracting information associated with the request for information from the one or more relevant information sources when the privilege level of the caller is above the privilege threshold. 117. The non-transitory computer-readable storage medium of claim 113, wherein the stored processor-executable instructions are configured to cause a processor of a communication device to perform operations such that the input is one or more of a verbal data, video data, image data, graphics data, text data, location information, calendar data, and sensor data. 118. The non-transitory computer-readable storage medium of claim 113, wherein the stored processor-executable instructions are configured to cause a processor of a communication device to perform operations such that the one or more relevant information sources are one or more of a calendar application, a social network application, an email mailbox, a contact list, a voice mailbox, a position location application, user's communication device memory, and user's communication device settings. 119. The non-transitory computer-readable storage medium of claim 113, wherein the stored processor-executable instructions are configured to cause a processor of a communication device to perform operations such that identifying one or more relevant information sources when the input is a request for information comprises identifying one or more relevant information sources based at least in part on a past identification of one or more relevant information sources when the input is a request for information. 120. The non-transitory computer-readable storage medium of claim 113, wherein the stored processor-executable instructions are configured to cause a processor of a communication device to perform operations such that identifying one or more relevant information sources when the input is a request for information comprises automatically identifying one or more relevant information sources without additional human involvement when the input is a request for information. 121. A server, comprising: a network interface configured to communication with a communication network; and a processor coupled to the network interface and configured with processor-executable instructions to perform operations comprising: receiving a communication input message from a communication device, the communication input message including an identified attribute of a communication input from a caller and a privilege level of the caller; associating the identified attribute with an intent; and sending an indication to the communication device based on the associated intent and the privilege level. 122. The server of claim 121, wherein the processor is configured with processor-executable instructions to perform operations further comprising: determining whether the identified attribute corresponds to a request for information; identifying one or more relevant information sources when the identified attribute corresponds to a request for information; and extracting information associated with the request for information from the one or more relevant information sources, and wherein the processor is configured with processor-executable instructions to perform operations such that sending an indication to the communication device based on the associated intent and the privilege level comprises sending the extracted information to the communication device. 123. The server of claim 122, wherein the processor is configured with processor-executable instructions to perform operations such that identifying one or more relevant information sources when the identified attribute corresponds to a request for information comprises identifying one or more relevant information sources based at least in part on the privilege level when the communication input is a request for information. 124. The server of claim 123, wherein the processor is configured with processor-executable instructions to perform operations such that the one or more relevant information sources are one or more of a calendar application, a social network application, an email mailbox, a contact list, a voice mailbox, a position location application, user's communication device memory, and user's communication device settings. 125. The server of claim 122, wherein the processor is configured with processor-executable instructions to perform operations such that identifying one or more relevant information sources when the identified attribute corresponds to a request for information comprises identifying one or more relevant information sources based at least in part on a past identification of one or more relevant information sources when the input is a request for information. 126. The server of claim 121, wherein the processor is configured with processor-executable instructions to perform operations further comprising determining whether the identified attribute corresponds to an action indication, and wherein the processor is configured with processor-executable instructions to perform operations such that sending an indication to the communication device based on the associated intent and the privilege level comprises sending an indication of an action to the communication device corresponding to the action indication. 127. The server of claim 121, wherein the processor is configured with processor-executable instructions to perform operations further comprising: determining whether the call is urgent; identifying another device to connect the call to in response to determining that the call is urgent and based at least in part on the determined privilege level; and sending an indication of the identified another device to the communication device. 128. The server of claim 127, wherein the processor is configured with processor-executable instructions to perform operations such that the identified another device is a device associated with a third party different from the caller. 129. A server, comprising: means for receiving a communication input message from a communication device, the communication input message including an identified attribute of a communication input from a caller and a privilege level of the caller; means for associating the identified attribute with an intent; and means for sending an indication to the communication device based on the associated intent and the privilege level. 130. The server of claim 129, further comprising: means for determining whether the identified attribute corresponds to a request for information; means for identifying one or more relevant information sources when the identified attribute corresponds to a request for information; and means for extracting information associated with the request for information from the one or more relevant information sources, and wherein means for sending an indication to the communication device based on the associated intent and the privilege level comprises means for sending the extracted information to the communication device. 131. The server of claim 130, wherein means for identifying one or more relevant information sources when the identified attribute corresponds to a request for information comprises means for identifying one or more relevant information sources based at least in part on the privilege level when the communication input is a request for information. 132. The server of claim 131, wherein the one or more relevant information sources are one or more of a calendar application, a social network application, an email mailbox, a contact list, a voice mailbox, a position location application, user's communication device memory, and user's communication device settings. 133. The server of claim 130, wherein means for identifying one or more relevant information sources when the identified attribute corresponds to a request for information comprises means for identifying one or more relevant information sources based at least in part on a past identification of one or more relevant information sources when the input is a request for information. 134. The server of claim 129, further comprising means for determining whether the identified attribute corresponds to an action indication, wherein means for sending an indication to the communication device based on the associated intent and the privilege level comprises means for sending an indication of an action to the communication device corresponding to the action indication. 135. The server of claim 129, further comprising: means for determining whether the call is urgent; means for identifying another device to connect the call to in response to determining that the call is urgent and based at least in part on the determined privilege level; and means for sending an indication of the identified another device to the communication device. 136. The server of claim 135, wherein the identified another device is a device associated with a third party different from the caller. 137. A non-transitory server-readable storage medium having stored thereon processor-executable instructions configured to cause a server to perform operations comprising: receiving a communication input message from a communication device, the communication input message including an identified attribute of a communication input from a caller and a privilege level of the caller; associating the identified attribute with an intent; and sending an indication to the communication device based on the associated intent and the privilege level. 138. The non-transitory server-readable storage medium of claim 137, wherein the stored processor-executable instructions are configured to cause a server to perform operations further comprising: determining whether the identified attribute corresponds to a request for information; identifying one or more relevant information sources when the identified attribute corresponds to a request for information; and extracting information associated with the request for information from the one or more relevant information sources, and wherein the stored processor-executable instructions are configured to cause a server to perform operations such that sending an indication to the communication device based on the associated intent and the privilege level comprises sending the extracted information to the communication device. 139. The non-transitory server-readable storage medium of claim 138, wherein the stored processor-executable instructions are configured to cause a server to perform operations such that identifying one or more relevant information sources when the identified attribute corresponds to a request for information comprises identifying one or more relevant information sources based at least in part on the privilege level when the communication input is a request for information. 140. The non-transitory server-readable storage medium of claim 139, wherein the stored processor-executable instructions are configured to cause a server to perform operations such that the one or more relevant information sources are one or more of a calendar application, a social network application, an email mailbox, a contact list, a voice mailbox, a position location application, user's communication device memory, and user's communication device settings. 141. The non-transitory server-readable storage medium of claim 138, wherein the stored processor-executable instructions are configured to cause a server to perform operations such that identifying one or more relevant information sources when the identified attribute corresponds to a request for information comprises identifying one or more relevant information sources based at least in part on a past identification of one or more relevant information sources when the input is a request for information. 142. The non-transitory server-readable storage medium of claim 137, wherein the stored processor-executable instructions are configured to cause a server to perform operations further comprising determining whether the identified attribute corresponds to an action indication, and wherein the stored processor-executable instructions are configured to cause a server to perform operations such that sending an indication to the communication device based on the associated intent and the privilege level comprises sending an indication of an action to the communication device corresponding to the action indication. 143. The non-transitory server-readable storage medium of claim 137, wherein the stored processor-executable instructions are configured to cause a server to perform operations further comprising: determining whether the call is urgent; identifying another device to connect the call to in response to determining that the call is urgent and based at least in part on the determined privilege level; and sending an indication of the identified another device to the communication device. 144. The non-transitory server-readable storage medium of claim 143, wherein the stored processor-executable instructions are configured to cause a server to perform operations such that the identified another device is a device associated with a third party different from the caller. 145. A system, comprising: a communication device, comprising: a communication device transceiver configured to communicate with a communication network; and a communication device processor coupled to the communication device transceiver; and a server, comprising: a server transceiver configured to communicate with the communication network; and a server processor coupled to the server transceiver, wherein the communication device processor is configured with processor-executable instructions to perform operations comprising: receiving a communication input from a caller; determining a privilege level of the caller; identifying an attribute of the communication input; and sending a communication input message to the server, the communication input message including the identified attribute of the communication input and a privilege level of the caller, wherein the server processor is configured with processor-executable instructions to perform operations comprising: receiving the communication input message from the communication device; determining whether the identified attribute corresponds to a request for information; identifying one or more relevant information sources based at least in part on the privilege level when the identified attribute corresponds to a request for information; extracting information associated with the request for information from the one or more relevant information sources; and sending the extracted information to the communication device, and wherein the communication device processor is configured with processor-executable instructions to perform operations further comprising: receiving the extracted information from the server; and providing the extracted information to the caller. 146. A system, comprising: a server; and a communication device, comprising: means for receiving a communication input from a caller; means for determining a privilege level of the caller; means for identifying an attribute of the communication input; and means for sending a communication input message to the server, the communication input message including the identified attribute of the communication input and a privilege level of the caller, wherein the server comprises: means for receiving the communication input message from the communication device; means for determining whether the identified attribute corresponds to a request for information; means for identifying one or more relevant information sources based at least in part on the privilege level when the identified attribute corresponds to a request for information; means for extracting information associated with the request for information from the one or more relevant information sources; and means for sending the extracted information to the communication device, and wherein the communication device further comprises: means for receiving the extracted information from the server; and means for providing the extracted information to the caller.
Systems, methods, and devices are provided which may enable a communication device to respond to a caller based on an intent of the caller as determined by an intent engine and the caller's privilege level. In an aspect, the caller may be engaged, the caller's privilege level may be determined, an intent engine may determine the caller's intent, and based on the caller's intent and privilege level the caller may be provided with information and/or a set of configurable follow-up actions may be taken in the absence of the intended communication recipient.1. A method for responding to a call from a caller placed to a communication device, comprising: determining an intent of the caller using an intent engine; determining a privilege level of the caller; and taking an action in response to the determined intent and the determined privilege level. 2. The method of claim 1, wherein determining a privilege level of the caller comprises: determining an identity of the caller; and comparing the identity of the caller to a privilege list. 3. The method of claim 2, wherein determining an identity of the caller is based at least in part on one or more of a phone number, voice recognition, facial recognition, customizable question responses, biometric information, and location information. 4. The method of claim 1, further comprising comparing the privilege level of the caller to a privilege threshold, wherein taking an action in response to the determined intent and the determined privilege level comprises taking an action in response to the determined intent when the privilege level of the caller is determined to be above the privilege threshold. 5. The method of claim 1, wherein determining an intent of the caller using an intent engine comprises: receiving a communication input from the caller; identifying an attribute of the communication input; and associating the identified attribute with an intent. 6. The method of claim 5, wherein: the communication input from the caller is speech; and identifying an attribute of the communication input comprises applying natural language processing to the speech to identify an attribute of the speech. 7. The method of claim 5, wherein: the communication input from the caller is a text formatted communication input; and identifying an attribute of the communication input comprises applying natural language processing to the text formatted communication input to identify an attribute of the text. 8. The method of claim 7, wherein the text formatted communication input is a emoticon formatted communication input. 9. The method of claim 5, wherein: the communication input from the caller is video data; and identifying an attribute of the communication input comprises applying facial recognition to the video data to identify an attribute of the video data. 10. The method of claim 5, wherein: the communication input from the caller is video data; and identifying an attribute of the communication input comprises identifying an attribute of an audio component of the video data. 11. The method of claim 10, wherein identifying an attribute of an audio component of the video data comprises applying natural language processing to a speech component of an audio component of the video data to identify an attribute of the speech component. 12. The method of claim 5, wherein: the communication input from the caller is video data; and identifying an attribute of the communication input comprises identifying an emotion, mood, or gesture included in the video data as an attribute of the video data. 13. The method of claim 5, wherein: the communication input from the caller is sensor data; and identifying an attribute of the communication input comprises identifying an attribute of the sensor data. 14. The method of claim 5, further comprising: determining whether the identified attribute corresponds to a request for information; identifying one or more relevant information sources when the identified attribute corresponds to a request for information; and extracting information associated with the request for information from the one or more relevant information sources, wherein taking an action in response to the determined intent comprises providing the extracted information to the caller. 15. The method of claim 14, wherein identifying one or more relevant information sources when the identified attribute corresponds to a request for information comprises identifying one or more relevant information sources based at least in part on the determined privilege level when the communication input is a request for information. 16. The method of claim 15, wherein the one or more relevant information sources are one or more of a calendar application, a social network application, an email mailbox, a contact list, a voice mailbox, a position location application, user's communication device memory, and user's communication device settings. 17. The method of claim 5, further comprising determining whether the identified attribute corresponds to an action indication, wherein taking an action in response to the determined intent comprises taking an action corresponding to the action indication. 18. The method of claim 5, wherein: identifying an attribute of the communication input comprises identifying a plurality of attributes of the communication input; and associating the identified attribute with an intent comprises: comparing a combination of the plurality of attributes to a dictionary of intent descriptors to determine a correlation between the combination of the plurality of attributes and the intent descriptors; and associating an intent descriptor with a highest correlation with an intent. 19. The method of claim 1, further comprising: determining whether the call is urgent; and connecting the call to another device in response to determining that the call is urgent and based at least in part on the determined privilege level. 20. The method of claim 19, wherein the another device is a device associated with a third party. 21. The method of claim 1, wherein determining an intent of the caller using an intent engine comprises automatically determining an intent of the caller using an intent engine without additional human involvement. 22. The method of claim 1, wherein determining an intent of the caller using an intent engine comprises determining an intent of the caller using an intent engine based at least in part on a past intent determination associated with the caller. 23. A method for responding to a call from a caller placed to a communication device, comprising: receiving an input from the caller; determining a privilege level of the caller; determining whether the input from the caller is a request for information; identifying one or more relevant information sources when the input is a request for information; extracting information associated with the request for information from the one or more relevant information sources based at least in part on the privilege level of the caller; and providing the extracted information to the caller. 24. The method of claim 23, wherein determining a privilege level of the caller comprises: determining an identity of the caller; and comparing the identity of the caller to a privilege list. 25. The method of claim 24, wherein determining an identity of the caller is based at least in part on one or more of a phone number, voice recognition, facial recognition, customizable question responses, biometric information, and location information. 26. The method of claim 23, further comprising comparing the privilege level of the caller to a privilege threshold, wherein extracting information associated with the request for information from the one or more relevant information sources is based at least in part on the privilege level of the caller comprises extracting information associated with the request for information from the one or more relevant information sources when the privilege level of the caller is above the privilege threshold. 27. The method of claim 23, wherein the input is one or more of a verbal data, video data, image data, graphics data, text data, location information, calendar data, and sensor data. 28. The method of claim 23, wherein the one or more relevant information sources are one or more of a calendar application, a social network application, an email mailbox, a contact list, a voice mailbox, a position location application, user's communication device memory, and user's communication device settings. 29. The method of claim 23, wherein identifying one or more relevant information sources when the input is a request for information comprises identifying one or more relevant information sources based at least in part on a past identification of one or more relevant information sources when the input is a request for information. 30. The method of claim 23, wherein identifying one or more relevant information sources when the input is a request for information comprises automatically identifying one or more relevant information sources without additional human involvement when the input is a request for information. 31. A communication device, comprising: means for determining an intent of a caller using an intent engine; means for determining a privilege level of the caller; and means for taking an action in response to the determined intent and the determined privilege level. 32. The communication device of claim 31, wherein means for determining a privilege level of the caller comprises: means for determining an identity of the caller; and means for comparing the identity of the caller to a privilege list. 33. The communication device of claim 32, wherein means for determining an identity of the caller comprises means for determining an identity of the caller based at least in part on one or more of a phone number, voice recognition, facial recognition, customizable question responses, biometric information, and location information. 34. The communication device of claim 31, further comprising means for comparing the privilege level of the caller to a privilege threshold, wherein means for taking an action in response to the determined intent and the determined privilege level comprises means for taking an action in response to the determined intent when the privilege level of the caller is determined to be above the privilege threshold. 35. The communication device of claim 31, wherein means for determining an intent of the caller using an intent engine comprises: means for receiving a communication input from the caller; means for identifying an attribute of the communication input; and means for associating the identified attribute with an intent. 36. The communication device of claim 35, wherein: the communication input from the caller is speech; and means for identifying an attribute of the communication input comprises means for applying natural language processing to the speech to identify an attribute of the speech. 37. The communication device of claim 35, wherein: the communication input from the caller is a text formatted communication input; and means for identifying an attribute of the communication input comprises means for applying natural language processing to the text formatted communication input to identify an attribute of the text. 38. The communication device of claim 37, wherein the text formatted communication input is a emoticon formatted communication input. 39. The communication device of claim 35, wherein: the communication input from the caller is video data; and means for identifying an attribute of the communication input comprises means for applying facial recognition to the video data to identify an attribute of the video data. 40. The communication device of claim 35, wherein: the communication input from the caller is video data; and means for identifying an attribute of the communication input comprises means for identifying an attribute of an audio component of the video data. 41. The communication device of claim 40, wherein means for identifying an attribute of an audio component of the video data comprises means for applying natural language processing to a speech component of an audio component of the video data to identify an attribute of the speech component. 42. The communication device of claim 35, wherein: the communication input from the caller is video data; and means for identifying an attribute of the communication input comprises means for identifying an emotion, mood, or gesture included in the video data as an attribute of the video data. 43. The communication device of claim 35, wherein: the communication input from the caller is sensor data; and means for identifying an attribute of the communication input comprises means for identifying an attribute of the sensor data. 44. The communication device of claim 35, further comprising: means for determining whether the identified attribute corresponds to a request for information; means for identifying one or more relevant information sources when the identified attribute corresponds to a request for information; and means for extracting information associated with the request for information from the one or more relevant information sources, wherein means for taking an action in response to the determined intent comprises means for providing the extracted information to the caller. 45. The communication device of claim 44, wherein means for identifying one or more relevant information sources when the identified attribute corresponds to a request for information comprises means for identifying one or more relevant information sources based at least in part on the determined privilege level when the communication input is a request for information. 46. The communication device of claim 45, wherein the one or more relevant information sources are one or more of a calendar application, a social network application, an email mailbox, a contact list, a voice mailbox, a position location application, user's communication device memory, and user's communication device settings. 47. The communication device of claim 35, further comprising means for determining whether the identified attribute corresponds to an action indication, wherein means for taking an action in response to the determined intent comprises means for taking an action corresponding to the action indication. 48. The communication device of claim 35, wherein: means for identifying an attribute of the communication input comprises means for identifying a plurality of attributes of the communication input; and means for associating the identified attribute with an intent comprises: means for comparing a combination of the plurality of attributes to a dictionary of intent descriptors to determine a correlation between the combination of the plurality of attributes and the intent descriptors; and means for associating an intent descriptor with a highest correlation with an intent. 49. The communication device of claim 31, further comprising: means for determining whether the call is urgent; and means for connecting the call to another device in response to determining that the call is urgent and based at least in part on the determined privilege level. 50. The communication device of claim 49, wherein the another device is a device associated with a third party. 51. The communication device of claim 31, wherein means for determining an intent of the caller using an intent engine comprises means for automatically determining an intent of the caller using an intent engine without additional human involvement. 52. The communication device of claim 31, wherein means for determining an intent of the caller using an intent engine comprises means for determining an intent of the caller using an intent engine based at least in part on a past intent determination associated with the caller. 53. A communication device, comprising: means for receiving an input from a caller; means for determining a privilege level of the caller; means for determining whether the input from the caller is a request for information; means for identifying one or more relevant information sources when the input is a request for information; means for extracting information associated with the request for information from the one or more relevant information sources based at least in part on the privilege level of the caller; and means for providing the extracted information to the caller. 54. The communication device of claim 53, wherein means for determining a privilege level of the caller comprises: means for determining an identity of the caller; and means for comparing the identity of the caller to a privilege list. 55. The communication device of claim 54, wherein means for determining an identity of the caller comprises means for determining an identity of the caller based at least in part on one or more of a phone number, voice recognition, facial recognition, customizable question responses, biometric information, and location information. 56. The communication device of claim 53, further comprising means for comparing the privilege level of the caller to a privilege threshold, wherein means for extracting information associated with the request for information from the one or more relevant information sources based at least in part on the privilege level of the caller comprises means for extracting information associated with the request for information from the one or more relevant information sources when the privilege level of the caller is above the privilege threshold. 57. The communication device of claim 53, wherein the input is one or more of a verbal data, video data, image data, graphics data, text data, location information, calendar data, and sensor data. 58. The communication device of claim 53, wherein the one or more relevant information sources are one or more of a calendar application, a social network application, an email mailbox, a contact list, a voice mailbox, a position location application, user's communication device memory, and user's communication device settings. 59. The communication device of claim 53, wherein means for identifying one or more relevant information sources when the input is a request for information comprises means for identifying one or more relevant information sources based at least in part on a past identification of one or more relevant information sources when the input is a request for information. 60. The communication device of claim 53, wherein means for identifying one or more relevant information sources when the input is a request for information comprises means for automatically identifying one or more relevant information sources without additional human involvement when the input is a request for information. 61. A communication device, comprising: a transceiver configured to communicate with a communication network; and a processor coupled to the transceiver, wherein the processor is configured with processor-executable instructions to perform operations comprising: determining an intent of a caller using an intent engine; determining a privilege level of the caller; and taking an action in response to the determined intent and the determined privilege level. 62. The communication device of claim 61, wherein the processor is configured with processor-executable instructions to perform operations such that determining a privilege level of the caller comprises: determining an identity of the caller; and comparing the identity of the caller to a privilege list. 63. The communication device of claim 62, wherein the processor is configured with processor-executable instructions to perform operations such that determining an identity of the caller is based at least in part on one or more of a phone number, voice recognition, facial recognition, customizable question responses, biometric information, and location information. 64. The communication device of claim 61, wherein the processor is configured with processor-executable instructions to perform operations further comprising comparing the privilege level of the caller to a privilege threshold, and wherein the processor is configured with processor-executable instructions to perform operations such that taking an action in response to the determined intent and the determined privilege level comprises taking an action in response to the determined intent when the privilege level of the caller is determined to be above the privilege threshold. 65. The communication device of claim 61, wherein the processor is configured with processor-executable instructions to perform operations such that determining an intent of the caller using an intent engine comprises: receiving a communication input from the caller; identifying an attribute of the communication input; and associating the identified attribute with an intent. 66. The communication device of claim 65, wherein the processor is configured with processor-executable instructions to perform operations such that: the communication input from the caller is speech; and identifying an attribute of the communication input comprises applying natural language processing to the speech to identify an attribute of the speech. 67. The communication device of claim 65, wherein the processor is configured with processor-executable instructions to perform operations such that: the communication input from the caller is a text formatted communication input; and identifying an attribute of the communication input comprises applying natural language processing to the text formatted communication input to identify an attribute of the text. 68. The communication device of claim 67, wherein the processor is configured with processor-executable instructions to perform operations such that the text formatted communication input is a emoticon formatted communication input. 69. The communication device of claim 65, wherein the processor is configured with processor-executable instructions to perform operations such that: the communication input from the caller is video data; and identifying an attribute of the communication input comprises applying facial recognition to the video data to identify an attribute of the video data. 70. The communication device of claim 65, wherein the processor is configured with processor-executable instructions to perform operations such that: the communication input from the caller is video data; and identifying an attribute of the communication input comprises identifying an attribute of an audio component of the video data. 71. The communication device of claim 70, wherein the processor is configured with processor-executable instructions to perform operations such that identifying an attribute of an audio component of the video data comprises applying natural language processing to a speech component of an audio component of the video data to identify an attribute of the speech component. 72. The communication device of claim 65, wherein the processor is configured with processor-executable instructions to perform operations such that: the communication input from the caller is video data; and identifying an attribute of the communication input comprises identifying an emotion, mood, or gesture included in the video data as an attribute of the video data. 73. The communication device of claim 65, wherein the processor is configured with processor-executable instructions to perform operations such that: the communication input from the caller is sensor data; and identifying an attribute of the communication input comprises identifying an attribute of the sensor data. 74. The communication device of claim 65, wherein the processor is configured with processor-executable instructions to perform operations further comprising: determining whether the identified attribute corresponds to a request for information; identifying one or more relevant information sources when the identified attribute corresponds to a request for information; and extracting information associated with the request for information from the one or more relevant information sources, and wherein the processor is configured with processor-executable instructions to perform operations such that taking an action in response to the determined intent comprises providing the extracted information to the caller. 75. The communication device of claim 74, wherein the processor is configured with processor-executable instructions to perform operations such that identifying one or more relevant information sources when the identified attribute corresponds to a request for information comprises identifying one or more relevant information sources based at least in part on the determined privilege level when the communication input is a request for information. 76. The communication device of claim 75, wherein the processor is configured with processor-executable instructions to perform operations such that the one or more relevant information sources are one or more of a calendar application, a social network application, an email mailbox, a contact list, a voice mailbox, a position location application, user's communication device memory, and user's communication device settings. 77. The communication device of claim 65, wherein the processor is configured with processor-executable instructions to perform operations further comprising determining whether the identified attribute corresponds to an action indication, and wherein the processor is configured with processor-executable instructions to perform operations such that taking an action in response to the determined intent comprises taking an action corresponding to the action indication. 78. The communication device of claim 65, wherein the processor is configured with processor-executable instructions to perform operations such that: identifying an attribute of the communication input comprises identifying a plurality of attributes of the communication input; and associating the identified attribute with an intent comprises: comparing a combination of the plurality of attributes to a dictionary of intent descriptors to determine a correlation between the combination of the plurality of attributes and the intent descriptors; and associating an intent descriptor with a highest correlation with an intent. 79. The communication device of claim 61, wherein the processor is configured with processor-executable instructions to perform operations further comprising: determining whether the call is urgent; and connecting the call to another device in response to determining that the call is urgent and based at least in part on the determined privilege level. 80. The communication device of claim 79, wherein the processor is configured with processor-executable instructions to perform operations such that the another device is a device associated with a third party. 81. The communication device of claim 61, wherein the processor is configured with processor-executable instructions to perform operations such that determining an intent of the caller using an intent engine comprises automatically determining an intent of the caller using an intent engine without additional human involvement. 82. The communication device of claim 61, wherein the processor is configured with processor-executable instructions to perform operations such that determining an intent of the caller using an intent engine comprises determining an intent of the caller using an intent engine based at least in part on a past intent determination associated with the caller. 83. A communication device, comprising: a transceiver configured to communicate with a communication network; and a processor coupled to the transceiver, wherein the processor is configured with processor-executable instructions to perform operations comprising: receiving an input from a caller; determining a privilege level of the caller; determining whether the input from the caller is a request for information; identifying one or more relevant information sources when the input is a request for information; extracting information associated with the request for information from the one or more relevant information sources based at least in part on the privilege level of the caller; and providing the extracted information to the caller. 84. The communication device of claim 83, wherein the processor is configured with processor-executable instructions to perform operations such that determining a privilege level of the caller comprises: determining an identity of the caller; and comparing the identity of the caller to a privilege list. 85. The communication device of claim 84, wherein the processor is configured with processor-executable instructions to perform operations such that determining an identity of the caller is based at least in part on one or more of a phone number, voice recognition, facial recognition, customizable question responses, biometric information, and location information. 86. The communication device of claim 83, wherein the processor is configured with processor-executable instructions to perform operations further comprising comparing the privilege level of the caller to a privilege threshold, and wherein the processor is configured with processor-executable instructions to perform operations such that extracting information associated with the request for information from the one or more relevant information sources based at least in part on the privilege level of the caller comprises extracting information associated with the request for information from the one or more relevant information sources when the privilege level of the caller is above the privilege threshold. 87. The communication device of claim 83, wherein the processor is configured with processor-executable instructions to perform operations such that the input is one or more of a verbal data, video data, image data, graphics data, text data, location information, calendar data, and sensor data. 88. The communication device of claim 83, wherein the processor is configured with processor-executable instructions to perform operations such that the one or more relevant information sources are one or more of a calendar application, a social network application, an email mailbox, a contact list, a voice mailbox, a position location application, user's communication device memory, and user's communication device settings. 89. The communication device of claim 83, wherein the processor is configured with processor-executable instructions to perform operations such that identifying one or more relevant information sources when the input is a request for information comprises identifying one or more relevant information sources based at least in part on a past identification of one or more relevant information sources when the input is a request for information. 90. The communication device of claim 83, wherein the processor is configured with processor-executable instructions to perform operations such that identifying one or more relevant information sources when the input is a request for information comprises automatically identifying one or more relevant information sources without additional human involvement when the input is a request for information. 91. A non-transitory computer-readable medium having stored thereon processor-executable instructions configured to cause a processor of a communication device to perform operations comprising: determining an intent of a caller using an intent engine; determining a privilege level of the caller; and taking an action in response to the determined intent and the determined privilege level. 92. The non-transitory computer-readable storage medium of claim 91, wherein the stored processor-executable instructions are configured to cause a processor of a communication device to perform operations such that determining a privilege level of the caller comprises: determining an identity of the caller; and comparing the identity of the caller to a privilege list. 93. The non-transitory computer-readable storage medium of claim 92, wherein the stored processor-executable instructions are configured to cause a processor of a communication device to perform operations such that determining an identity of the caller is based at least in part on one or more of a phone number, voice recognition, facial recognition, customizable question responses, biometric information, and location information. 94. The non-transitory computer-readable storage medium of claim 91, wherein the stored processor-executable instructions are configured to cause a processor of a communication device to perform operations further comprising comparing the privilege level of the caller to a privilege threshold, and wherein the stored processor-executable instructions are configured to cause a processor of a communication device to perform operations such that taking an action in response to the determined intent and the determined privilege level comprises taking an action in response to the determined intent when the privilege level of the caller is determined to be above the privilege threshold. 95. The non-transitory computer-readable storage medium of claim 91, wherein the stored processor-executable instructions are configured to cause a processor of a communication device to perform operations such that determining an intent of the caller using an intent engine comprises: receiving a communication input from the caller; identifying an attribute of the communication input; and associating the identified attribute with an intent. 96. The non-transitory computer-readable storage medium of claim 95, wherein the stored processor-executable instructions are configured to cause a processor of a communication device to perform operations such that: the communication input from the caller is speech; and identifying an attribute of the communication input comprises applying natural language processing to the speech to identify an attribute of the speech. 97. The non-transitory computer-readable storage medium of claim 95, wherein the stored processor-executable instructions are configured to cause a processor of a communication device to perform operations such that: the communication input from the caller is a text formatted communication input; and identifying an attribute of the communication input comprises applying natural language processing to the text formatted communication input to identify an attribute of the text. 98. The non-transitory computer-readable storage medium of claim 97, wherein the stored processor-executable instructions are configured to cause a processor of a communication device to perform operations such that the text formatted communication input is a emoticon formatted communication input. 99. The non-transitory computer-readable storage medium of claim 95, wherein the stored processor-executable instructions are configured to cause a processor of a communication device to perform operations such that: the communication input from the caller is video data; and identifying an attribute of the communication input comprises applying facial recognition to the video data to identify an attribute of the video data. 100. The non-transitory computer-readable storage medium of claim 95, wherein the stored processor-executable instructions are configured to cause a processor of a communication device to perform operations such that: the communication input from the caller is video data; and identifying an attribute of the communication input comprises identifying an attribute of an audio component of the video data. 101. The non-transitory computer-readable storage medium of claim 100, wherein the stored processor-executable instructions are configured to cause a processor of a communication device to perform operations such that identifying an attribute of an audio component of the video data comprises applying natural language processing to a speech component of an audio component of the video data to identify an attribute of the speech component. 102. The non-transitory computer-readable storage medium of claim 95, wherein the stored processor-executable instructions are configured to cause a processor of a communication device to perform operations such that: the communication input from the caller is video data; and identifying an attribute of the communication input comprises identifying an emotion, mood, or gesture included in the video data as an attribute of the video data. 103. The non-transitory computer-readable storage medium of claim 95, wherein the stored processor-executable instructions are configured to cause a processor of a communication device to perform operations such that: the communication input from the caller is sensor data; and identifying an attribute of the communication input comprises identifying an attribute of the sensor data. 104. The non-transitory computer-readable storage medium of claim 95, wherein the stored processor-executable instructions are configured to cause a processor of a communication device to perform operations further comprising: determining whether the identified attribute corresponds to a request for information; identifying one or more relevant information sources when the identified attribute corresponds to a request for information; and extracting information associated with the request for information from the one or more relevant information sources, and wherein the stored processor-executable instructions are configured to cause a processor of a communication device to perform operations such that taking an action in response to the determined intent comprises providing the extracted information to the caller. 105. The non-transitory computer-readable storage medium of claim 104, wherein the stored processor-executable instructions are configured to cause a processor of a communication device to perform operations such that: identifying one or more relevant information sources when the identified attribute corresponds to a request for information comprises identifying one or more relevant information sources based at least in part on the determined privilege level when the communication input is a request for information. 106. The non-transitory computer-readable storage medium of claim 105, wherein the stored processor-executable instructions are configured to cause a processor of a communication device to perform operations such that: the one or more relevant information sources are one or more of a calendar application, a social network application, an email mailbox, a contact list, a voice mailbox, a position location application, user's communication device memory, and user's communication device settings. 107. The non-transitory computer-readable storage medium of claim 95, wherein the stored processor-executable instructions are configured to cause a processor of a communication device to perform operations further comprising determining whether the identified attribute corresponds to an action indication, and wherein the stored processor-executable instructions are configured to cause a processor to perform operations such that taking an action in response to the determined intent comprises taking an action corresponding to the action indication. 108. The non-transitory computer-readable storage medium of claim 95, wherein the stored processor-executable instructions are configured to cause a processor of a communication device to perform operations such that: identifying an attribute of the communication input comprises identifying a plurality of attributes of the communication input; and associating the identified attribute with an intent comprises: comparing a combination of the plurality of attributes to a dictionary of intent descriptors to determine a correlation between the combination of the plurality of attributes and the intent descriptors; and associating an intent descriptor with a highest correlation with an intent. 109. The non-transitory computer-readable storage medium of claim 91, wherein the stored processor-executable instructions are configured to cause a processor of a communication device to perform operations further comprising: determining whether the call is urgent; and connecting the call to another device in response to determining that the call is urgent and based at least in part on the determined privilege level. 110. The non-transitory computer-readable storage medium of claim 109, wherein the stored processor-executable instructions are configured to cause a processor of a communication device to perform operations such that the another device is a device associated with a third party. 111. The non-transitory computer-readable storage medium of claim 91, wherein the stored processor-executable instructions are configured to cause a processor of a communication device to perform operations such that determining an intent of the caller using an intent engine comprises automatically determining an intent of the caller using an intent engine without additional human involvement. 112. The non-transitory computer-readable storage medium of claim 91, wherein the stored processor-executable instructions are configured to cause a processor of a communication device to perform operations such that determining an intent of the caller using an intent engine comprises determining an intent of the caller using an intent engine based at least in part on a past intent determination associated with the caller. 113. A non-transitory computer-readable medium having stored thereon processor-executable instructions configured to cause a processor of a communication device to perform operations comprising: receiving an input from a caller; determining a privilege level of the caller; determining whether the input from the caller is a request for information; identifying one or more relevant information sources when the input is a request for information; extracting information associated with the request for information from the one or more relevant information sources based at least in part on the privilege level of the caller; and providing the extracted information to the caller. 114. The non-transitory computer-readable storage medium of claim 113, wherein the stored processor-executable instructions are configured to cause a processor of a communication device to perform operations such that determining a privilege level of the caller comprises: determining an identity of the caller; and comparing the identity of the caller to a privilege list. 115. The non-transitory computer-readable storage medium of claim 114, wherein the stored processor-executable instructions are configured to cause a processor of a communication device to perform operations such that determining an identity of the caller is based at least in part on one or more of a phone number, voice recognition, facial recognition, customizable question responses, biometric information, and location information. 116. The non-transitory computer-readable storage medium of claim 113, wherein the stored processor-executable instructions are configured to cause a processor of a communication device to perform operations further comprising comparing the privilege level of the caller to a privilege threshold, and wherein the stored processor-executable instructions are configured to cause a processor of a communication device to perform operations such that extracting information associated with the request for information from the one or more relevant information sources based at least in part on the privilege level of the caller comprises extracting information associated with the request for information from the one or more relevant information sources when the privilege level of the caller is above the privilege threshold. 117. The non-transitory computer-readable storage medium of claim 113, wherein the stored processor-executable instructions are configured to cause a processor of a communication device to perform operations such that the input is one or more of a verbal data, video data, image data, graphics data, text data, location information, calendar data, and sensor data. 118. The non-transitory computer-readable storage medium of claim 113, wherein the stored processor-executable instructions are configured to cause a processor of a communication device to perform operations such that the one or more relevant information sources are one or more of a calendar application, a social network application, an email mailbox, a contact list, a voice mailbox, a position location application, user's communication device memory, and user's communication device settings. 119. The non-transitory computer-readable storage medium of claim 113, wherein the stored processor-executable instructions are configured to cause a processor of a communication device to perform operations such that identifying one or more relevant information sources when the input is a request for information comprises identifying one or more relevant information sources based at least in part on a past identification of one or more relevant information sources when the input is a request for information. 120. The non-transitory computer-readable storage medium of claim 113, wherein the stored processor-executable instructions are configured to cause a processor of a communication device to perform operations such that identifying one or more relevant information sources when the input is a request for information comprises automatically identifying one or more relevant information sources without additional human involvement when the input is a request for information. 121. A server, comprising: a network interface configured to communication with a communication network; and a processor coupled to the network interface and configured with processor-executable instructions to perform operations comprising: receiving a communication input message from a communication device, the communication input message including an identified attribute of a communication input from a caller and a privilege level of the caller; associating the identified attribute with an intent; and sending an indication to the communication device based on the associated intent and the privilege level. 122. The server of claim 121, wherein the processor is configured with processor-executable instructions to perform operations further comprising: determining whether the identified attribute corresponds to a request for information; identifying one or more relevant information sources when the identified attribute corresponds to a request for information; and extracting information associated with the request for information from the one or more relevant information sources, and wherein the processor is configured with processor-executable instructions to perform operations such that sending an indication to the communication device based on the associated intent and the privilege level comprises sending the extracted information to the communication device. 123. The server of claim 122, wherein the processor is configured with processor-executable instructions to perform operations such that identifying one or more relevant information sources when the identified attribute corresponds to a request for information comprises identifying one or more relevant information sources based at least in part on the privilege level when the communication input is a request for information. 124. The server of claim 123, wherein the processor is configured with processor-executable instructions to perform operations such that the one or more relevant information sources are one or more of a calendar application, a social network application, an email mailbox, a contact list, a voice mailbox, a position location application, user's communication device memory, and user's communication device settings. 125. The server of claim 122, wherein the processor is configured with processor-executable instructions to perform operations such that identifying one or more relevant information sources when the identified attribute corresponds to a request for information comprises identifying one or more relevant information sources based at least in part on a past identification of one or more relevant information sources when the input is a request for information. 126. The server of claim 121, wherein the processor is configured with processor-executable instructions to perform operations further comprising determining whether the identified attribute corresponds to an action indication, and wherein the processor is configured with processor-executable instructions to perform operations such that sending an indication to the communication device based on the associated intent and the privilege level comprises sending an indication of an action to the communication device corresponding to the action indication. 127. The server of claim 121, wherein the processor is configured with processor-executable instructions to perform operations further comprising: determining whether the call is urgent; identifying another device to connect the call to in response to determining that the call is urgent and based at least in part on the determined privilege level; and sending an indication of the identified another device to the communication device. 128. The server of claim 127, wherein the processor is configured with processor-executable instructions to perform operations such that the identified another device is a device associated with a third party different from the caller. 129. A server, comprising: means for receiving a communication input message from a communication device, the communication input message including an identified attribute of a communication input from a caller and a privilege level of the caller; means for associating the identified attribute with an intent; and means for sending an indication to the communication device based on the associated intent and the privilege level. 130. The server of claim 129, further comprising: means for determining whether the identified attribute corresponds to a request for information; means for identifying one or more relevant information sources when the identified attribute corresponds to a request for information; and means for extracting information associated with the request for information from the one or more relevant information sources, and wherein means for sending an indication to the communication device based on the associated intent and the privilege level comprises means for sending the extracted information to the communication device. 131. The server of claim 130, wherein means for identifying one or more relevant information sources when the identified attribute corresponds to a request for information comprises means for identifying one or more relevant information sources based at least in part on the privilege level when the communication input is a request for information. 132. The server of claim 131, wherein the one or more relevant information sources are one or more of a calendar application, a social network application, an email mailbox, a contact list, a voice mailbox, a position location application, user's communication device memory, and user's communication device settings. 133. The server of claim 130, wherein means for identifying one or more relevant information sources when the identified attribute corresponds to a request for information comprises means for identifying one or more relevant information sources based at least in part on a past identification of one or more relevant information sources when the input is a request for information. 134. The server of claim 129, further comprising means for determining whether the identified attribute corresponds to an action indication, wherein means for sending an indication to the communication device based on the associated intent and the privilege level comprises means for sending an indication of an action to the communication device corresponding to the action indication. 135. The server of claim 129, further comprising: means for determining whether the call is urgent; means for identifying another device to connect the call to in response to determining that the call is urgent and based at least in part on the determined privilege level; and means for sending an indication of the identified another device to the communication device. 136. The server of claim 135, wherein the identified another device is a device associated with a third party different from the caller. 137. A non-transitory server-readable storage medium having stored thereon processor-executable instructions configured to cause a server to perform operations comprising: receiving a communication input message from a communication device, the communication input message including an identified attribute of a communication input from a caller and a privilege level of the caller; associating the identified attribute with an intent; and sending an indication to the communication device based on the associated intent and the privilege level. 138. The non-transitory server-readable storage medium of claim 137, wherein the stored processor-executable instructions are configured to cause a server to perform operations further comprising: determining whether the identified attribute corresponds to a request for information; identifying one or more relevant information sources when the identified attribute corresponds to a request for information; and extracting information associated with the request for information from the one or more relevant information sources, and wherein the stored processor-executable instructions are configured to cause a server to perform operations such that sending an indication to the communication device based on the associated intent and the privilege level comprises sending the extracted information to the communication device. 139. The non-transitory server-readable storage medium of claim 138, wherein the stored processor-executable instructions are configured to cause a server to perform operations such that identifying one or more relevant information sources when the identified attribute corresponds to a request for information comprises identifying one or more relevant information sources based at least in part on the privilege level when the communication input is a request for information. 140. The non-transitory server-readable storage medium of claim 139, wherein the stored processor-executable instructions are configured to cause a server to perform operations such that the one or more relevant information sources are one or more of a calendar application, a social network application, an email mailbox, a contact list, a voice mailbox, a position location application, user's communication device memory, and user's communication device settings. 141. The non-transitory server-readable storage medium of claim 138, wherein the stored processor-executable instructions are configured to cause a server to perform operations such that identifying one or more relevant information sources when the identified attribute corresponds to a request for information comprises identifying one or more relevant information sources based at least in part on a past identification of one or more relevant information sources when the input is a request for information. 142. The non-transitory server-readable storage medium of claim 137, wherein the stored processor-executable instructions are configured to cause a server to perform operations further comprising determining whether the identified attribute corresponds to an action indication, and wherein the stored processor-executable instructions are configured to cause a server to perform operations such that sending an indication to the communication device based on the associated intent and the privilege level comprises sending an indication of an action to the communication device corresponding to the action indication. 143. The non-transitory server-readable storage medium of claim 137, wherein the stored processor-executable instructions are configured to cause a server to perform operations further comprising: determining whether the call is urgent; identifying another device to connect the call to in response to determining that the call is urgent and based at least in part on the determined privilege level; and sending an indication of the identified another device to the communication device. 144. The non-transitory server-readable storage medium of claim 143, wherein the stored processor-executable instructions are configured to cause a server to perform operations such that the identified another device is a device associated with a third party different from the caller. 145. A system, comprising: a communication device, comprising: a communication device transceiver configured to communicate with a communication network; and a communication device processor coupled to the communication device transceiver; and a server, comprising: a server transceiver configured to communicate with the communication network; and a server processor coupled to the server transceiver, wherein the communication device processor is configured with processor-executable instructions to perform operations comprising: receiving a communication input from a caller; determining a privilege level of the caller; identifying an attribute of the communication input; and sending a communication input message to the server, the communication input message including the identified attribute of the communication input and a privilege level of the caller, wherein the server processor is configured with processor-executable instructions to perform operations comprising: receiving the communication input message from the communication device; determining whether the identified attribute corresponds to a request for information; identifying one or more relevant information sources based at least in part on the privilege level when the identified attribute corresponds to a request for information; extracting information associated with the request for information from the one or more relevant information sources; and sending the extracted information to the communication device, and wherein the communication device processor is configured with processor-executable instructions to perform operations further comprising: receiving the extracted information from the server; and providing the extracted information to the caller. 146. A system, comprising: a server; and a communication device, comprising: means for receiving a communication input from a caller; means for determining a privilege level of the caller; means for identifying an attribute of the communication input; and means for sending a communication input message to the server, the communication input message including the identified attribute of the communication input and a privilege level of the caller, wherein the server comprises: means for receiving the communication input message from the communication device; means for determining whether the identified attribute corresponds to a request for information; means for identifying one or more relevant information sources based at least in part on the privilege level when the identified attribute corresponds to a request for information; means for extracting information associated with the request for information from the one or more relevant information sources; and means for sending the extracted information to the communication device, and wherein the communication device further comprises: means for receiving the extracted information from the server; and means for providing the extracted information to the caller.
2,400
7,094
7,094
14,825,558
2,485
A vehicle includes an interface that displays an image of objects in a vicinity of the vehicle, and a controller that alters a depth of field of the image based on a focal point associated with a direction of driver eye gaze relative to the image to alter blurriness of the image away from the focal point.
1. A vehicle comprising: an interface configured to display an image of objects in a vicinity of the vehicle; and at least one controller programmed to alter a depth of field of the image based on a focal point associated with a direction of driver eye gaze relative to the image to alter blurriness of the image away from the focal point. 2. The vehicle of claim 1, wherein the at least one controller is further programmed to, in response to a driver eye gaze away from the image, maximize a depth of field of the image, and in response to the driver eye gaze being directed at a particular portion of the image for a predetermined period of time, identify the focal point associated with a physical location represented by the image at the particular portion and decrease the depth of field of the image based on a distance between the vehicle and the physical location. 3. The vehicle of claim 2, wherein the at least one controller is further programmed to alter the depth of field by adjusting a size of an aperture of a camera used to capture the image. 4. The vehicle of claim 2, wherein the at least one controller is further programmed to alter the depth of field by adjusting a parallax used to blend images of at least two cameras used to capture the image. 5. The vehicle of claim 4, wherein the at least one controller is further programmed to adjust a size of an aperture of each of the at least two cameras used to capture the image. 6. The vehicle of claim 1, wherein the at least one controller is further programmed to identify pedestrians in the vicinity, and in response to identification of a pedestrian in the vicinity intersecting a current travel path of the vehicle, output an alert signal. 7. The vehicle of claim 1, wherein the at least one controller is further programmed to identify a vehicle in the vicinity and a trajectory of the vehicle, and in response to a trajectory of the vehicle in the vicinity intersecting a current travel path of the vehicle, output an alert signal. 8. The vehicle of claim 1, wherein the interface is an instrument cluster, an infotainment system, or a heads up display. 9. A method of enhancing a digital image in a vehicle comprising: identifying a focal point on a display screen associated with a gaze of a driver at an image; and altering a depth of field associated with the image based on a distance between the vehicle and a physical location of an object represented by the image at the focal point to blur other objects in the image away from the focal point. 10. The method of claim 9 further including, in response to a driver eye gaze away from the image, maximizing a depth of field of the image, and in response to a driver eye gaze being directed at a particular portion of the image for a predetermined period of time, locating a focal point associated with a physical location represented by the image at the particular portion and decreasing the depth of field of the image based on a distance between the vehicle and the physical location associated with the particular portion of the image. 11. The method of claim 10, wherein altering the depth of field includes adjusting a size of an aperture of a camera used to capture the image. 12. The method of claim 10, wherein altering the depth of field includes adjusting a parallax used to blend images of at least two cameras used to capture the image. 13. The method of claim 12, wherein altering the depth of field includes adjusting a size of an aperture of each of the at least two cameras used to capture the image. 14. The method of claim 9, further comprising outputting an alert based on a classification of an object at the focal point as a pedestrian. 15. A vehicle comprising: a camera having an aperture and configured to output a signal indicative of a field of view; a display configured to convert the signal to an image; a driver camera assembly configured to output a focal point associated with a gaze of a driver relative to the display; and at least one controller programmed to adjust a size of the aperture to alter a depth of field to blur objects outside of the depth of field around the focal point. 16. The vehicle of claim 15, wherein the at least one controller is further programmed to, in response to the gaze being away from the image, maximize the depth of field, and in response to the gaze being directed at a particular portion of the image for a predetermined period of time, identify the focal point associated with a physical location represented by the image at the particular portion and decrease the depth of field based on a distance between the vehicle and the physical location. 17. The vehicle of claim 16 further including a second camera having a second aperture and configured to output a second signal indicative of the field of view, wherein the at least one controller is further programmed to alter the depth of field by adjusting a parallax used to blend the signal and the second signal. 18. The vehicle of claim 17, wherein the at least one controller is further programmed to identify pedestrians in the field of view, and in response to identification of a pedestrian intersecting a current travel path of the vehicle, output an alert signal. 19. The vehicle of claim 18, wherein the display is in an instrument cluster, an infotainment system, or a heads up display system.
A vehicle includes an interface that displays an image of objects in a vicinity of the vehicle, and a controller that alters a depth of field of the image based on a focal point associated with a direction of driver eye gaze relative to the image to alter blurriness of the image away from the focal point.1. A vehicle comprising: an interface configured to display an image of objects in a vicinity of the vehicle; and at least one controller programmed to alter a depth of field of the image based on a focal point associated with a direction of driver eye gaze relative to the image to alter blurriness of the image away from the focal point. 2. The vehicle of claim 1, wherein the at least one controller is further programmed to, in response to a driver eye gaze away from the image, maximize a depth of field of the image, and in response to the driver eye gaze being directed at a particular portion of the image for a predetermined period of time, identify the focal point associated with a physical location represented by the image at the particular portion and decrease the depth of field of the image based on a distance between the vehicle and the physical location. 3. The vehicle of claim 2, wherein the at least one controller is further programmed to alter the depth of field by adjusting a size of an aperture of a camera used to capture the image. 4. The vehicle of claim 2, wherein the at least one controller is further programmed to alter the depth of field by adjusting a parallax used to blend images of at least two cameras used to capture the image. 5. The vehicle of claim 4, wherein the at least one controller is further programmed to adjust a size of an aperture of each of the at least two cameras used to capture the image. 6. The vehicle of claim 1, wherein the at least one controller is further programmed to identify pedestrians in the vicinity, and in response to identification of a pedestrian in the vicinity intersecting a current travel path of the vehicle, output an alert signal. 7. The vehicle of claim 1, wherein the at least one controller is further programmed to identify a vehicle in the vicinity and a trajectory of the vehicle, and in response to a trajectory of the vehicle in the vicinity intersecting a current travel path of the vehicle, output an alert signal. 8. The vehicle of claim 1, wherein the interface is an instrument cluster, an infotainment system, or a heads up display. 9. A method of enhancing a digital image in a vehicle comprising: identifying a focal point on a display screen associated with a gaze of a driver at an image; and altering a depth of field associated with the image based on a distance between the vehicle and a physical location of an object represented by the image at the focal point to blur other objects in the image away from the focal point. 10. The method of claim 9 further including, in response to a driver eye gaze away from the image, maximizing a depth of field of the image, and in response to a driver eye gaze being directed at a particular portion of the image for a predetermined period of time, locating a focal point associated with a physical location represented by the image at the particular portion and decreasing the depth of field of the image based on a distance between the vehicle and the physical location associated with the particular portion of the image. 11. The method of claim 10, wherein altering the depth of field includes adjusting a size of an aperture of a camera used to capture the image. 12. The method of claim 10, wherein altering the depth of field includes adjusting a parallax used to blend images of at least two cameras used to capture the image. 13. The method of claim 12, wherein altering the depth of field includes adjusting a size of an aperture of each of the at least two cameras used to capture the image. 14. The method of claim 9, further comprising outputting an alert based on a classification of an object at the focal point as a pedestrian. 15. A vehicle comprising: a camera having an aperture and configured to output a signal indicative of a field of view; a display configured to convert the signal to an image; a driver camera assembly configured to output a focal point associated with a gaze of a driver relative to the display; and at least one controller programmed to adjust a size of the aperture to alter a depth of field to blur objects outside of the depth of field around the focal point. 16. The vehicle of claim 15, wherein the at least one controller is further programmed to, in response to the gaze being away from the image, maximize the depth of field, and in response to the gaze being directed at a particular portion of the image for a predetermined period of time, identify the focal point associated with a physical location represented by the image at the particular portion and decrease the depth of field based on a distance between the vehicle and the physical location. 17. The vehicle of claim 16 further including a second camera having a second aperture and configured to output a second signal indicative of the field of view, wherein the at least one controller is further programmed to alter the depth of field by adjusting a parallax used to blend the signal and the second signal. 18. The vehicle of claim 17, wherein the at least one controller is further programmed to identify pedestrians in the field of view, and in response to identification of a pedestrian intersecting a current travel path of the vehicle, output an alert signal. 19. The vehicle of claim 18, wherein the display is in an instrument cluster, an infotainment system, or a heads up display system.
2,400
7,095
7,095
14,882,586
2,483
Methods and systems for improving coding efficiency of video.
1. A method for trimming a candidate set of motion vectors used to at least one of encode and decode a selected one of said candidate set, said method comprising: (a) identifying a subset of motion vectors in said candidate set comprising duplicates of a motion vector outside of said subset; (b) removing at least one motion vector from said subset; and (c) thereafter trimming said motion vectors in said subset from said candidate set.
Methods and systems for improving coding efficiency of video.1. A method for trimming a candidate set of motion vectors used to at least one of encode and decode a selected one of said candidate set, said method comprising: (a) identifying a subset of motion vectors in said candidate set comprising duplicates of a motion vector outside of said subset; (b) removing at least one motion vector from said subset; and (c) thereafter trimming said motion vectors in said subset from said candidate set.
2,400
7,096
7,096
14,982,737
2,488
A multi-headed camera assembly includes a base comprising a plurality of tracks, a plurality of image sensor assemblies each comprising a support mechanism configured to allow a quick and efficient assembly of a lens assembly within a housing and each removably coupled to the base by a corresponding support frame among a plurality of support frames. Each support frame comprises a guide member for guiding tilt movement of a corresponding image sensor assembly and a support base movably coupled to a corresponding track so as to accomplish pan movement of the corresponding image sensor assembly. The multi-headed camera assembly further includes a surface mount mechanism, an in-ceiling mount mechanism, or a pendant mount mechanism so that the multi-headed camera assembly can be removably mounted to a surface, mounted into a ceiling, or connected to a pendant base.
1. A multi-headed camera assembly, comprising: a base comprising a plurality of tracks; a plurality of support frames; and a plurality of image sensor assemblies, each image sensor assembly comprising a housing, a lens assembly, and a support mechanism configured to allow a quick and efficient assembly of the lens assembly within the housing, wherein each image sensor assembly is removably coupled to the base by a support frame among the plurality of support frames, each support frame including: a guide member for guiding tilt movement of each image sensor assembly, and a support base movably coupled to a track among the plurality of tracks so as to enable pan movement of each image sensor assembly. 2. The assembly of claim 1, further comprising a surface mount mechanism, an in-ceiling mount mechanism, or a pendant mount mechanism. 3. The assembly of claim 1, wherein a first set of tracks among the plurality of tracks is longer than a second set of tracks among the plurality of tracks. 4. The assembly of claim 1, wherein each support frame further includes a release member for releasing the support base to allow the support base to move along a corresponding track and locking the support base at a desired position on the corresponding track. 5. The assembly of claim 4, wherein the release member is configured to move between a backwardly disposed release position and a forwardly disposed locked position. 6. The assembly of claim 5, wherein the release member includes a plurality of first teeth configured to engage with a plurality of second teeth of the corresponding track. 7. The assembly of claim 1, wherein the guide member comprises a guide groove for guiding tilt movement of a corresponding image sensor assembly. 8. The assembly of claim 7, wherein the support frame further includes a first connecting member capable of movably connecting the corresponding image sensor assembly to the guide member. 9. The assembly of claim 8, wherein the support frame further includes a second connecting member for connecting the first connecting member and the guide member to the corresponding image sensor assembly. 10. The assembly of claim 9, wherein the support frame further comprises a pair of gimbals, the pair of gimbals configured to rotatably receive a ball joint of the corresponding image sensor assembly. 11. The assembly of claim 1, wherein at least an image sensor assembly among the plurality of image sensor assemblies tilts up to 90° from the horizon. 12. An image sensor assembly support apparatus, comprising: a support base capable of moving along a track so as to enable pan movement of an image sensor assembly; a release member capable of releasing the support base to allow the support base to move along the track and locking the support base at a desired position on the track; a pair of gimbals for rotatably receiving a ball joint of the image sensor assembly; and a guide member configured to guide tilt movement of the image sensor assembly. 13. The apparatus of claim 12, wherein the release member is configured to move between a backwardly disposed release position and a forwardly disposed locked position. 14. The apparatus of claim 13, wherein the release member includes a plurality of first teeth configured to engage with a plurality of second teeth of the track. 15. The apparatus of claim 14, further comprising a first connecting member for movably connecting the image sensor assembly to the guide member. 16. An image sensor assembly, comprising: a housing cover for receiving a lens assembly; and a support mechanism configured to allow a quick and efficient assembly of the lens assembly within the housing cover. 17. The assembly of claim 16, wherein the housing cover comprises a front cover, a ring member, a middle cover, and a back cover, the ring member rotatably attached to the back end of the front cover and the front end of the middle cover, the back cover coupled to the middle cover by connecting to the support mechanism. 18. The assembly of claim 17, wherein the support mechanism is configured to rotatably receive the lens assembly, and the support mechanism is coupled to the front cover, the middle cover, and the back cover. 19. The assembly of claim 16, further comprising: a self-applying pressure mechanism configured to hold the lens assembly in the support mechanism. 20. A method of adjusting an image sensor apparatus of a multi-headed camera assembly, comprising: panning an image sensor apparatus among a plurality of image sensor apparatus along a track among a plurality of tracks, further comprising: disengaging a release member of a support frame from the track, moving the image sensor apparatus along the track to a desired position, and locking the image sensor apparatus at the desired position by engaging the release member with the track; and tilting the image sensor apparatus along a guide member of the support frame, further comprising: loosening a connecting member of the support frame from the image sensor apparatus, moving the image sensor apparatus along a guide groove formed in the guide member to a desired position, and locking the image sensor apparatus at the desired position by tightening the connecting member to the image sensor apparatus.
A multi-headed camera assembly includes a base comprising a plurality of tracks, a plurality of image sensor assemblies each comprising a support mechanism configured to allow a quick and efficient assembly of a lens assembly within a housing and each removably coupled to the base by a corresponding support frame among a plurality of support frames. Each support frame comprises a guide member for guiding tilt movement of a corresponding image sensor assembly and a support base movably coupled to a corresponding track so as to accomplish pan movement of the corresponding image sensor assembly. The multi-headed camera assembly further includes a surface mount mechanism, an in-ceiling mount mechanism, or a pendant mount mechanism so that the multi-headed camera assembly can be removably mounted to a surface, mounted into a ceiling, or connected to a pendant base.1. A multi-headed camera assembly, comprising: a base comprising a plurality of tracks; a plurality of support frames; and a plurality of image sensor assemblies, each image sensor assembly comprising a housing, a lens assembly, and a support mechanism configured to allow a quick and efficient assembly of the lens assembly within the housing, wherein each image sensor assembly is removably coupled to the base by a support frame among the plurality of support frames, each support frame including: a guide member for guiding tilt movement of each image sensor assembly, and a support base movably coupled to a track among the plurality of tracks so as to enable pan movement of each image sensor assembly. 2. The assembly of claim 1, further comprising a surface mount mechanism, an in-ceiling mount mechanism, or a pendant mount mechanism. 3. The assembly of claim 1, wherein a first set of tracks among the plurality of tracks is longer than a second set of tracks among the plurality of tracks. 4. The assembly of claim 1, wherein each support frame further includes a release member for releasing the support base to allow the support base to move along a corresponding track and locking the support base at a desired position on the corresponding track. 5. The assembly of claim 4, wherein the release member is configured to move between a backwardly disposed release position and a forwardly disposed locked position. 6. The assembly of claim 5, wherein the release member includes a plurality of first teeth configured to engage with a plurality of second teeth of the corresponding track. 7. The assembly of claim 1, wherein the guide member comprises a guide groove for guiding tilt movement of a corresponding image sensor assembly. 8. The assembly of claim 7, wherein the support frame further includes a first connecting member capable of movably connecting the corresponding image sensor assembly to the guide member. 9. The assembly of claim 8, wherein the support frame further includes a second connecting member for connecting the first connecting member and the guide member to the corresponding image sensor assembly. 10. The assembly of claim 9, wherein the support frame further comprises a pair of gimbals, the pair of gimbals configured to rotatably receive a ball joint of the corresponding image sensor assembly. 11. The assembly of claim 1, wherein at least an image sensor assembly among the plurality of image sensor assemblies tilts up to 90° from the horizon. 12. An image sensor assembly support apparatus, comprising: a support base capable of moving along a track so as to enable pan movement of an image sensor assembly; a release member capable of releasing the support base to allow the support base to move along the track and locking the support base at a desired position on the track; a pair of gimbals for rotatably receiving a ball joint of the image sensor assembly; and a guide member configured to guide tilt movement of the image sensor assembly. 13. The apparatus of claim 12, wherein the release member is configured to move between a backwardly disposed release position and a forwardly disposed locked position. 14. The apparatus of claim 13, wherein the release member includes a plurality of first teeth configured to engage with a plurality of second teeth of the track. 15. The apparatus of claim 14, further comprising a first connecting member for movably connecting the image sensor assembly to the guide member. 16. An image sensor assembly, comprising: a housing cover for receiving a lens assembly; and a support mechanism configured to allow a quick and efficient assembly of the lens assembly within the housing cover. 17. The assembly of claim 16, wherein the housing cover comprises a front cover, a ring member, a middle cover, and a back cover, the ring member rotatably attached to the back end of the front cover and the front end of the middle cover, the back cover coupled to the middle cover by connecting to the support mechanism. 18. The assembly of claim 17, wherein the support mechanism is configured to rotatably receive the lens assembly, and the support mechanism is coupled to the front cover, the middle cover, and the back cover. 19. The assembly of claim 16, further comprising: a self-applying pressure mechanism configured to hold the lens assembly in the support mechanism. 20. A method of adjusting an image sensor apparatus of a multi-headed camera assembly, comprising: panning an image sensor apparatus among a plurality of image sensor apparatus along a track among a plurality of tracks, further comprising: disengaging a release member of a support frame from the track, moving the image sensor apparatus along the track to a desired position, and locking the image sensor apparatus at the desired position by engaging the release member with the track; and tilting the image sensor apparatus along a guide member of the support frame, further comprising: loosening a connecting member of the support frame from the image sensor apparatus, moving the image sensor apparatus along a guide groove formed in the guide member to a desired position, and locking the image sensor apparatus at the desired position by tightening the connecting member to the image sensor apparatus.
2,400
7,097
7,097
14,704,241
2,456
A method to transfer control is presented. The method includes receiving a request to transfer control of a collaborative session from a first user equipment (UE). The method includes sending a request for the transfer of control of the collaborative session in response to the received request to a second UE, and receiving, in response to the sent request to the second UE, an indication of acceptance of the transfer of control of the collaborative session. The method includes sending a notification of status to the first UE of the control of the collaborative session in response to receiving, from the second UE, the indication of acceptance.
1. A method to transfer control, comprising: receiving a request to transfer control of a collaborative session from a first user equipment (UE); sending a request for the transfer of control of the collaborative session in response to the received request to a second UE; receiving, in response to the sent request to the second UE, an indication of acceptance of the transfer of control of the collaborative session; sending a notification of status to the first UE of the control of the collaborative session in response to receiving, from the second UE, the indication of acceptance. 2. The method of claim 1, wherein the received response is encoded as session initiation protocol (SIP). 3. The method of claim 2, wherein the SIP message is a SIP REFER message. 4. The method of claim 1, further comprising sending a NOTIFY message indicating success in response to receiving the request to transfer control. 5. The method of claim 1, wherein the message requesting transfer of control of a collaborative session also comprises a request for media transfer. 6. A network node, comprising: a processor, the processor being configured to: receive a request to transfer control of a collaborative session from a first user equipment (UE); send a request for the transfer of control of the collaborative session in response to the received request to a second UE; receive, in response to the sent request to the second UE, an indication of acceptance of the transfer of control of the collaborative session; send a notification of status to the first UE of the control of the collaborative session in response to receiving, from the second UE, the indication of acceptance. 7. The network node of claim 6, wherein the received response is encoded as SIP. 8. The network node of claim 7, wherein the SIP message is a SIP REFER message. 9. The network node of claim 6, further comprising sending a NOTIFY message indicating success in response to receiving the request to transfer control. 10. The network node of claim 6, wherein the message requesting transfer of control of a collaborative session also comprises a request for media transfer. 11. The network node of claim 6, wherein the network node includes a service consistency and continuity application server (SCC AS). 12. A user equipment (UE), comprising: a processor, the processor being configured to: transmit a request to transfer control of a collaborative session from a first user equipment (UE); receive a notification of status of the control of the collaborative session. 13. The UE of claim 12, wherein the notification of status includes a NOTIFY message. 14. The UE of claim 12, wherein the message requesting transfer of control of a collaborative session also comprises a request for media transfer.
A method to transfer control is presented. The method includes receiving a request to transfer control of a collaborative session from a first user equipment (UE). The method includes sending a request for the transfer of control of the collaborative session in response to the received request to a second UE, and receiving, in response to the sent request to the second UE, an indication of acceptance of the transfer of control of the collaborative session. The method includes sending a notification of status to the first UE of the control of the collaborative session in response to receiving, from the second UE, the indication of acceptance.1. A method to transfer control, comprising: receiving a request to transfer control of a collaborative session from a first user equipment (UE); sending a request for the transfer of control of the collaborative session in response to the received request to a second UE; receiving, in response to the sent request to the second UE, an indication of acceptance of the transfer of control of the collaborative session; sending a notification of status to the first UE of the control of the collaborative session in response to receiving, from the second UE, the indication of acceptance. 2. The method of claim 1, wherein the received response is encoded as session initiation protocol (SIP). 3. The method of claim 2, wherein the SIP message is a SIP REFER message. 4. The method of claim 1, further comprising sending a NOTIFY message indicating success in response to receiving the request to transfer control. 5. The method of claim 1, wherein the message requesting transfer of control of a collaborative session also comprises a request for media transfer. 6. A network node, comprising: a processor, the processor being configured to: receive a request to transfer control of a collaborative session from a first user equipment (UE); send a request for the transfer of control of the collaborative session in response to the received request to a second UE; receive, in response to the sent request to the second UE, an indication of acceptance of the transfer of control of the collaborative session; send a notification of status to the first UE of the control of the collaborative session in response to receiving, from the second UE, the indication of acceptance. 7. The network node of claim 6, wherein the received response is encoded as SIP. 8. The network node of claim 7, wherein the SIP message is a SIP REFER message. 9. The network node of claim 6, further comprising sending a NOTIFY message indicating success in response to receiving the request to transfer control. 10. The network node of claim 6, wherein the message requesting transfer of control of a collaborative session also comprises a request for media transfer. 11. The network node of claim 6, wherein the network node includes a service consistency and continuity application server (SCC AS). 12. A user equipment (UE), comprising: a processor, the processor being configured to: transmit a request to transfer control of a collaborative session from a first user equipment (UE); receive a notification of status of the control of the collaborative session. 13. The UE of claim 12, wherein the notification of status includes a NOTIFY message. 14. The UE of claim 12, wherein the message requesting transfer of control of a collaborative session also comprises a request for media transfer.
2,400
7,098
7,098
13,943,265
2,466
A method for scheduling data by a new master Base Station (BS) in a cloud cell communication system is provided. The method includes detecting that a master BS for a specific Mobile Station (MS) is changed from an old master BS to a new master BS, before a tunnel which is established between the new master BS and an access gateway is activated, receiving MS data which the old master BS receives through the tunnel which is established between the old master BS and the access gateway and buffers from the old master BS, and scheduling the received MS data.
1. A method for scheduling data by a new master Base Station (BS) in a cloud cell communication system, the method comprising: detecting that a master BS for a specific Mobile Station (MS) is changed from an old master BS to a new master BS; before a tunnel which is established between the new master BS and an access gateway is activated, receiving MS data which the old master BS receives through the tunnel which is established between the old master BS and the access gateway and buffers from the old master BS; and scheduling the received MS data. 2. The method of claim 1, further comprising: before the tunnel which is established between the new master BS and the access gateway is activated, scheduling MS data buffered in the new master BS if scheduling for the MS data buffered in the old master BS is completed. 3. The method of claim 2, further comprising: after the tunnel which is established between the new master BS and the access gateway is activated, receiving MS data from the access gateway; and scheduling the MS data received from the access gateway. 4. The method of claim 2, further comprising: transmitting scheduling control information for the MS data buffered in the old master BS to all cloud cell member BSs included in a cloud cell for the MS or a part of the cloud cell member BSs included in the cloud cell through a front haul link. 5. The method of claim 4, wherein the part of the cloud cell member BSs included in the cloud cell is selected using various parameters including a reference signal measurement result received from the MS, and a load of a related cloud cell member BS. 6. The method of claim 1, further comprising: if the scheduling of the MS data buffered in the old master BS is completed, scheduling MS data buffered in the new master BS regardless of whether the tunnel which is established between the new master BS and the access gateway is activated. 7. The method of claim 6, further comprising: transmitting scheduling control information for the MS data buffered in the old master BS to all cloud cell member BSs included in a cloud cell for the MS or a part of the cloud cell member BSs included in the cloud cell through a front haul link. 8. The method of claim 7, wherein the part of the cloud cell member BSs included in the cloud cell is selected using various parameters including a reference signal measurement result received from the MS, and a load of a related cloud cell member BS. 9. The method of claim 1, further comprising: before the tunnel which is established between the new master BS and the access gateway is activated, detecting that there is no MS data buffered in the old master BS; and transmitting a signal requesting activation for the tunnel which is established between the new master BS and the access gateway of the access gateway in order to receive MS data targeting the MS. 10. The method of claim 9, wherein the transmitting of the signal requesting the activation for the tunnel which is established between the new master BS and the access gateway of the access gateway comprises transmitting a tunnel switch request message to the access gateway. 11. The method of claim 10, wherein the MS data which the old master BS receives through the tunnel which is established between the old master BS and the access gateway and buffers comprises MS data which the old master BS receives from the access gateway after detecting that the master BS is changed and buffers. 12. A method for scheduling data by an old master Base Station (BS) in a cloud cell communication system, the method comprising: detecting that a master BS for a specific Mobile Station (MS) is changed from an old master BS to a new master BS; and before a tunnel which is established between the new master BS and an access gateway is activated, transmitting MS data which the old master BS receives through a tunnel which is established between the old master BS and the access gateway and buffers to the new master BS. 13. The method of claim 12, wherein the MS data which the old master BS receives through the tunnel which is established between the old master BS and the access gateway and buffers comprises MS data which the old master BS receives from the access gateway after detecting that the master BS is changed and buffers. 14. A method for transmitting/receiving data by a Mobile Station (MS) in a cloud cell communication system, the method comprising: detecting that a master Base Station (BS) for an MS is changed from an old master BS to a new master BS; transmitting data to the new master BS; and receiving data from the new master BS, wherein the data which the MS transmits to the new master BS and receives from the new master BS comprises data which is generated by the new master BS, and the new master BS generates the data by scheduling MS data received through a tunnel which is established between the old master BS and an access gateway and buffered in the old master BS which the new master BS receives from the old master BS before a tunnel which is established between the new master BS and the access gateway is activated. 15. The method of claim 14, wherein the data which the MS transmits to the new master BS and receives from the new master BS comprises data which is generated by the new master BS, and the new master BS generates the data by scheduling MS data buffered in the new master BS if scheduling of the MS data buffered in the old master BS is completed before the tunnel which is established between the new master BS and the access gateway is activated. 16. The method of claim 15, wherein the data which the MS transmits to the new master BS and receives from the new master BS comprises data which is generated by the new master BS, and the new master BS generates the data by scheduling MS data received from the access gateway after the tunnel which is established between the new master BS and the access gateway is activated. 17. A method for scheduling data by a new master Base Station (BS) in a cloud cell communication system, the method comprising: detecting that a master BS for a specific Mobile Station (MS) is changed from an old master BS to a new master BS; detecting that a tunnel which is established between the new master BS and an access gateway is activated; receiving MS data from the tunnel which is established between the new master BS and the access gateway; and scheduling the received MS data. 18. The method of claim 17, wherein the detecting that the tunnel which is established between the new master BS and the access gateway is activated comprises transmitting a signal requesting activation for the tunnel which is established between the new master BS and the access gateway of the access gateway in order to receive the MS data. 19. The method of claim 18, wherein the transmitting of the signal requesting the activation for the tunnel which is established between the new master BS and the access gateway of the access gateway comprises transmitting a tunnel switch request message to the access gateway. 20. A method for scheduling data by an old master Base Station (BS) in a cloud cell communication system, the method comprising: detecting that a master BS for a specific Mobile Station (MS) is changed from an old master BS to a new master BS; and before a tunnel which is established between the new master BS and an access gateway is activated, scheduling MS data which the old master BS receives through a tunnel which is established between the old master BS and the access gateway and buffers to the new master BS. 21. The method of claim 20, wherein the MS data which the old master BS receives through the tunnel which is established between the old master BS and the access gateway and buffers comprises MS data which the old master BS receives from the access gateway from a timing point at which the old master BS detects that the master BS is changed to a timing point until the tunnel which is established between the new master BS and the access gateway and buffers. 22. A method for transmitting/receiving data by a Mobile Station (MS) in a cloud cell communication system, the method comprising: detecting that a master Base Station (BS) for an MS is changed from an old master BS to a new master BS; transmitting data to the new master BS; and receiving data from the new master BS, wherein the data which the MS transmits to the new master BS and receives from the new master BS comprises data which is generated by the new master BS, and the new master BS generates the data by scheduling MS data received through a tunnel which is established between the new master BS and an access gateway after a tunnel which is established between the new master BS and the access gateway is activated. 23. A method for scheduling data by an access gateway in a cloud cell communication system, the method comprising: receiving a signal requesting activation for a tunnel which is established between a new master Base Station (BS) and an access gateway from the new master BS; and activating the tunnel which is established between the new master BS and the access gateway by switching a tunnel which is established between an old master BS and the access gateway to the tunnel which is established between the new master BS and the access gateway. 24. The method of claim 23, wherein the receiving of the signal requesting activation for the tunnel which is established between the new master BS and the access gateway from the new master BS comprises receiving a tunnel switch request message from the new master BS. 25. The method of claim 23, wherein the signal requesting activation for the tunnel which is established between the new master BS and the access gateway is transmitted by the new master BS in order that the new master BS may receive MS data targeting the MS according to detecting that there is no MS data buffered in the old master BS before the tunnel which is established between the new master BS and the access gateway is activated. 26. A new master Base Station (BS) in a cloud cell communication system, the new master BS comprising: a controller configured to detect that a master BS for a specific Mobile Station (MS) is changed from an old master BS to a new master BS; a receiver configured to receive MS data which the old master BS receives through a tunnel which is established between the old master BS and an access gateway and buffers from the old master BS before the tunnel which is established between the new master BS and the access gateway is activated, wherein the controller schedules the received MS data. 27. The new master BS of claim 26, wherein the controller is configured to schedule MS data buffered in the new master BS if scheduling for the MS data buffered in the old master BS is completed before the tunnel which is established between the new master BS and the access gateway is activated. 28. The new master BS of claim 27, wherein the receiver is configured to receive MS data from the access gateway after the tunnel which is established between the new master BS and the access gateway is activated, and wherein the controller is configured to schedule the MS data received from the access gateway. 29. The new master BS of claim 27, further comprising: a transmitter configured to transmit scheduling control information for the MS data buffered in the old master BS to all cloud cell member BSs included in a cloud cell for the MS or a part of the cloud cell member BSs included in the cloud cell through a front haul link. 30. The new master BS of claim 29, wherein the part of the cloud cell member BSs included in the cloud cell is selected using various parameters including a reference signal measurement result received from the MS, and a load of a related cloud cell member BS. 31. The new master BS of claim 26, wherein the controller is configured to schedule MS data buffered in the new master BS regardless of whether the tunnel which is established between the new master BS and the access gateway is activated if the scheduling of the MS data buffered in the old master BS is completed. 32. The new master BS of claim 31, further comprising: a transmitter configured to transmit scheduling control information for the MS data buffered in the old master BS to all cloud cell member BSs included in a cloud cell for the MS or a part of the cloud cell member BSs included in the cloud cell through a front haul link. 33. The new master BS of claim 32, wherein the part of the cloud cell member BSs included in the cloud cell is selected using various parameters including a reference signal measurement result received from the MS, and a load of a related cloud cell member BS. 34. The new master BS of claim 26, further comprising: a transmitter, wherein the controller is configured to detect that there is no MS data buffered in the old master BS before the tunnel which is established between the new master BS and the access gateway is activated, and wherein the transmitter is configured to transmit a signal requesting activation for the tunnel which is established between the new master BS and the access gateway of the access gateway in order to receive MS data targeting the MS. 35. The new master BS of claim 34, wherein the transmitter is configured to transmit a tunnel switch request message to the access gateway. 36. The new master BS of claim 35, wherein the MS data which the old master BS receives through the tunnel which is established between the old master BS and the access gateway and buffers comprises MS data which the old master BS receives from the access gateway after detecting that the master BS is changed and buffers. 37. An old master Base Station (BS) in a cloud cell communication system, the old master BS comprising: a controller configured to detect that a master BS for a specific Mobile Station (MS) is changed from an old master BS to a new master BS; and a transmitter configured to transmit MS data which the old master BS receives through a tunnel which is established between the old master BS and an access gateway and buffers to the new master BS before a tunnel which is established between the new master BS and the access gateway is activated. 38. The old master BS of claim 37, wherein the MS data which the old master BS receives through the tunnel which is established between the old master BS and the access gateway and buffers comprises MS data which the old master BS receives from the access gateway after detecting that the master BS is changed and buffers. 39. A Mobile Station (MS) in a cloud cell communication system, the MS comprising: a controller configured to detect that a master Base Station (BS) for an MS is changed from an old master BS to a new master BS; a transmitter configured to transmit data to the new master BS; and a receiver configured to receive data from the new master BS, wherein the data which the MS transmits to the new master BS and receives from the new master BS comprises data which is generated by the new master BS, and the new master BS generates the data by scheduling MS data received through a tunnel which is established between the old master BS and an access gateway and buffered in the old master BS which the new master BS receives from the old master BS before a tunnel which is established between the new master BS and the access gateway is activated. 40. The MS of claim 39, wherein the data which the MS transmits to the new master BS and receives from the new master BS comprises data which is generated by the new master BS, and the new master BS generates the data by scheduling MS data buffered in the new master BS if scheduling of the MS data buffered in the old master BS is completed before the tunnel which is established between the new master BS and the access gateway is activated. 41. The MS of claim 40, wherein the data which the MS transmits to the new master BS and receives from the new master BS comprises data which is generated by the new master BS, and the new master BS generates the data by scheduling MS data received from the access gateway after the tunnel which is established between the new master BS and the access gateway is activated. 42. A new master Base Station (BS) in a cloud cell communication system, the new master BS comprising: a controller configured to detect that a master BS for a specific Mobile Station (MS) is changed from an old master BS to a new master BS and to detect that a tunnel which is established between the new master BS and an access gateway is activated; and a receiver configured to receive MS data from the tunnel which is established between the new master BS and the access gateway, wherein the controller schedules the received MS data. 43. The new master BS of claim 42, further comprising: a transmitter configured to transmit a signal requesting activation for the tunnel which is established between the new master BS and the access gateway of the access gateway in order to receive the MS data. 44. The new master BS of claim 43, wherein the transmitter is configured to transmit a tunnel switch request message to the access gateway. 45. An old master Base Station (BS) in a cloud cell communication system, the old master BS comprising: a controller configured to detect that a master BS for a specific Mobile Station (MS) is changed from an old master BS to a new master BS and to schedule MS data which the old master BS receives through a tunnel which is established between the old master BS and an access gateway and buffers to the new master BS before a tunnel which is established between the new master BS and the access gateway is activated. 46. The old master BS of claim 45, wherein the MS data which the old master BS receives through the tunnel which is established between the old master BS and the access gateway and buffers comprises MS data which the old master BS receives from the access gateway from a timing point at which the old master BS detects that the master BS is changed to a timing point until the tunnel which is established between the new master BS and the access gateway and buffers. 47. A Mobile Station (MS) in a cloud cell communication system, the MS comprising: a controller configured to detect that a master Base Station (BS) for an MS is changed from an old master BS to a new master BS; a transmitter configured to transmit data to the new master BS; and a receiver is configured to receive data from the new master BS, wherein the data which the MS transmits to the new master BS and receives from the new master BS comprises data which is generated by the new master BS, and the new master BS generates the data by scheduling MS data received through a tunnel which is established between the new master BS and an access gateway after a tunnel which is established between the new master BS and the access gateway is activated. 48. An access gateway in a cloud cell communication system, the access gateway comprising: a receiver configured to receive a signal requesting activation for a tunnel which is established between a new master Base Station (BS) and an access gateway from the new master BS; and a controller configured to activate the tunnel which is established between the new master BS and the access gateway by switching a tunnel which is established between an old master BS and the access gateway to the tunnel which is established between the new master BS and the access gateway. 49. The access gateway of claim 48, wherein the receiver is configured to receive a tunnel switch request message from the new master BS. 50. The access gateway of claim 48, wherein the signal requesting activation for the tunnel which is established between the new master BS and the access gateway is transmitted by the new master BS in order that the new master BS may receive MS data targeting the MS according to detecting that there is no MS data buffered in the old master BS before the tunnel which is established between the new master BS and the access gateway is activated.
A method for scheduling data by a new master Base Station (BS) in a cloud cell communication system is provided. The method includes detecting that a master BS for a specific Mobile Station (MS) is changed from an old master BS to a new master BS, before a tunnel which is established between the new master BS and an access gateway is activated, receiving MS data which the old master BS receives through the tunnel which is established between the old master BS and the access gateway and buffers from the old master BS, and scheduling the received MS data.1. A method for scheduling data by a new master Base Station (BS) in a cloud cell communication system, the method comprising: detecting that a master BS for a specific Mobile Station (MS) is changed from an old master BS to a new master BS; before a tunnel which is established between the new master BS and an access gateway is activated, receiving MS data which the old master BS receives through the tunnel which is established between the old master BS and the access gateway and buffers from the old master BS; and scheduling the received MS data. 2. The method of claim 1, further comprising: before the tunnel which is established between the new master BS and the access gateway is activated, scheduling MS data buffered in the new master BS if scheduling for the MS data buffered in the old master BS is completed. 3. The method of claim 2, further comprising: after the tunnel which is established between the new master BS and the access gateway is activated, receiving MS data from the access gateway; and scheduling the MS data received from the access gateway. 4. The method of claim 2, further comprising: transmitting scheduling control information for the MS data buffered in the old master BS to all cloud cell member BSs included in a cloud cell for the MS or a part of the cloud cell member BSs included in the cloud cell through a front haul link. 5. The method of claim 4, wherein the part of the cloud cell member BSs included in the cloud cell is selected using various parameters including a reference signal measurement result received from the MS, and a load of a related cloud cell member BS. 6. The method of claim 1, further comprising: if the scheduling of the MS data buffered in the old master BS is completed, scheduling MS data buffered in the new master BS regardless of whether the tunnel which is established between the new master BS and the access gateway is activated. 7. The method of claim 6, further comprising: transmitting scheduling control information for the MS data buffered in the old master BS to all cloud cell member BSs included in a cloud cell for the MS or a part of the cloud cell member BSs included in the cloud cell through a front haul link. 8. The method of claim 7, wherein the part of the cloud cell member BSs included in the cloud cell is selected using various parameters including a reference signal measurement result received from the MS, and a load of a related cloud cell member BS. 9. The method of claim 1, further comprising: before the tunnel which is established between the new master BS and the access gateway is activated, detecting that there is no MS data buffered in the old master BS; and transmitting a signal requesting activation for the tunnel which is established between the new master BS and the access gateway of the access gateway in order to receive MS data targeting the MS. 10. The method of claim 9, wherein the transmitting of the signal requesting the activation for the tunnel which is established between the new master BS and the access gateway of the access gateway comprises transmitting a tunnel switch request message to the access gateway. 11. The method of claim 10, wherein the MS data which the old master BS receives through the tunnel which is established between the old master BS and the access gateway and buffers comprises MS data which the old master BS receives from the access gateway after detecting that the master BS is changed and buffers. 12. A method for scheduling data by an old master Base Station (BS) in a cloud cell communication system, the method comprising: detecting that a master BS for a specific Mobile Station (MS) is changed from an old master BS to a new master BS; and before a tunnel which is established between the new master BS and an access gateway is activated, transmitting MS data which the old master BS receives through a tunnel which is established between the old master BS and the access gateway and buffers to the new master BS. 13. The method of claim 12, wherein the MS data which the old master BS receives through the tunnel which is established between the old master BS and the access gateway and buffers comprises MS data which the old master BS receives from the access gateway after detecting that the master BS is changed and buffers. 14. A method for transmitting/receiving data by a Mobile Station (MS) in a cloud cell communication system, the method comprising: detecting that a master Base Station (BS) for an MS is changed from an old master BS to a new master BS; transmitting data to the new master BS; and receiving data from the new master BS, wherein the data which the MS transmits to the new master BS and receives from the new master BS comprises data which is generated by the new master BS, and the new master BS generates the data by scheduling MS data received through a tunnel which is established between the old master BS and an access gateway and buffered in the old master BS which the new master BS receives from the old master BS before a tunnel which is established between the new master BS and the access gateway is activated. 15. The method of claim 14, wherein the data which the MS transmits to the new master BS and receives from the new master BS comprises data which is generated by the new master BS, and the new master BS generates the data by scheduling MS data buffered in the new master BS if scheduling of the MS data buffered in the old master BS is completed before the tunnel which is established between the new master BS and the access gateway is activated. 16. The method of claim 15, wherein the data which the MS transmits to the new master BS and receives from the new master BS comprises data which is generated by the new master BS, and the new master BS generates the data by scheduling MS data received from the access gateway after the tunnel which is established between the new master BS and the access gateway is activated. 17. A method for scheduling data by a new master Base Station (BS) in a cloud cell communication system, the method comprising: detecting that a master BS for a specific Mobile Station (MS) is changed from an old master BS to a new master BS; detecting that a tunnel which is established between the new master BS and an access gateway is activated; receiving MS data from the tunnel which is established between the new master BS and the access gateway; and scheduling the received MS data. 18. The method of claim 17, wherein the detecting that the tunnel which is established between the new master BS and the access gateway is activated comprises transmitting a signal requesting activation for the tunnel which is established between the new master BS and the access gateway of the access gateway in order to receive the MS data. 19. The method of claim 18, wherein the transmitting of the signal requesting the activation for the tunnel which is established between the new master BS and the access gateway of the access gateway comprises transmitting a tunnel switch request message to the access gateway. 20. A method for scheduling data by an old master Base Station (BS) in a cloud cell communication system, the method comprising: detecting that a master BS for a specific Mobile Station (MS) is changed from an old master BS to a new master BS; and before a tunnel which is established between the new master BS and an access gateway is activated, scheduling MS data which the old master BS receives through a tunnel which is established between the old master BS and the access gateway and buffers to the new master BS. 21. The method of claim 20, wherein the MS data which the old master BS receives through the tunnel which is established between the old master BS and the access gateway and buffers comprises MS data which the old master BS receives from the access gateway from a timing point at which the old master BS detects that the master BS is changed to a timing point until the tunnel which is established between the new master BS and the access gateway and buffers. 22. A method for transmitting/receiving data by a Mobile Station (MS) in a cloud cell communication system, the method comprising: detecting that a master Base Station (BS) for an MS is changed from an old master BS to a new master BS; transmitting data to the new master BS; and receiving data from the new master BS, wherein the data which the MS transmits to the new master BS and receives from the new master BS comprises data which is generated by the new master BS, and the new master BS generates the data by scheduling MS data received through a tunnel which is established between the new master BS and an access gateway after a tunnel which is established between the new master BS and the access gateway is activated. 23. A method for scheduling data by an access gateway in a cloud cell communication system, the method comprising: receiving a signal requesting activation for a tunnel which is established between a new master Base Station (BS) and an access gateway from the new master BS; and activating the tunnel which is established between the new master BS and the access gateway by switching a tunnel which is established between an old master BS and the access gateway to the tunnel which is established between the new master BS and the access gateway. 24. The method of claim 23, wherein the receiving of the signal requesting activation for the tunnel which is established between the new master BS and the access gateway from the new master BS comprises receiving a tunnel switch request message from the new master BS. 25. The method of claim 23, wherein the signal requesting activation for the tunnel which is established between the new master BS and the access gateway is transmitted by the new master BS in order that the new master BS may receive MS data targeting the MS according to detecting that there is no MS data buffered in the old master BS before the tunnel which is established between the new master BS and the access gateway is activated. 26. A new master Base Station (BS) in a cloud cell communication system, the new master BS comprising: a controller configured to detect that a master BS for a specific Mobile Station (MS) is changed from an old master BS to a new master BS; a receiver configured to receive MS data which the old master BS receives through a tunnel which is established between the old master BS and an access gateway and buffers from the old master BS before the tunnel which is established between the new master BS and the access gateway is activated, wherein the controller schedules the received MS data. 27. The new master BS of claim 26, wherein the controller is configured to schedule MS data buffered in the new master BS if scheduling for the MS data buffered in the old master BS is completed before the tunnel which is established between the new master BS and the access gateway is activated. 28. The new master BS of claim 27, wherein the receiver is configured to receive MS data from the access gateway after the tunnel which is established between the new master BS and the access gateway is activated, and wherein the controller is configured to schedule the MS data received from the access gateway. 29. The new master BS of claim 27, further comprising: a transmitter configured to transmit scheduling control information for the MS data buffered in the old master BS to all cloud cell member BSs included in a cloud cell for the MS or a part of the cloud cell member BSs included in the cloud cell through a front haul link. 30. The new master BS of claim 29, wherein the part of the cloud cell member BSs included in the cloud cell is selected using various parameters including a reference signal measurement result received from the MS, and a load of a related cloud cell member BS. 31. The new master BS of claim 26, wherein the controller is configured to schedule MS data buffered in the new master BS regardless of whether the tunnel which is established between the new master BS and the access gateway is activated if the scheduling of the MS data buffered in the old master BS is completed. 32. The new master BS of claim 31, further comprising: a transmitter configured to transmit scheduling control information for the MS data buffered in the old master BS to all cloud cell member BSs included in a cloud cell for the MS or a part of the cloud cell member BSs included in the cloud cell through a front haul link. 33. The new master BS of claim 32, wherein the part of the cloud cell member BSs included in the cloud cell is selected using various parameters including a reference signal measurement result received from the MS, and a load of a related cloud cell member BS. 34. The new master BS of claim 26, further comprising: a transmitter, wherein the controller is configured to detect that there is no MS data buffered in the old master BS before the tunnel which is established between the new master BS and the access gateway is activated, and wherein the transmitter is configured to transmit a signal requesting activation for the tunnel which is established between the new master BS and the access gateway of the access gateway in order to receive MS data targeting the MS. 35. The new master BS of claim 34, wherein the transmitter is configured to transmit a tunnel switch request message to the access gateway. 36. The new master BS of claim 35, wherein the MS data which the old master BS receives through the tunnel which is established between the old master BS and the access gateway and buffers comprises MS data which the old master BS receives from the access gateway after detecting that the master BS is changed and buffers. 37. An old master Base Station (BS) in a cloud cell communication system, the old master BS comprising: a controller configured to detect that a master BS for a specific Mobile Station (MS) is changed from an old master BS to a new master BS; and a transmitter configured to transmit MS data which the old master BS receives through a tunnel which is established between the old master BS and an access gateway and buffers to the new master BS before a tunnel which is established between the new master BS and the access gateway is activated. 38. The old master BS of claim 37, wherein the MS data which the old master BS receives through the tunnel which is established between the old master BS and the access gateway and buffers comprises MS data which the old master BS receives from the access gateway after detecting that the master BS is changed and buffers. 39. A Mobile Station (MS) in a cloud cell communication system, the MS comprising: a controller configured to detect that a master Base Station (BS) for an MS is changed from an old master BS to a new master BS; a transmitter configured to transmit data to the new master BS; and a receiver configured to receive data from the new master BS, wherein the data which the MS transmits to the new master BS and receives from the new master BS comprises data which is generated by the new master BS, and the new master BS generates the data by scheduling MS data received through a tunnel which is established between the old master BS and an access gateway and buffered in the old master BS which the new master BS receives from the old master BS before a tunnel which is established between the new master BS and the access gateway is activated. 40. The MS of claim 39, wherein the data which the MS transmits to the new master BS and receives from the new master BS comprises data which is generated by the new master BS, and the new master BS generates the data by scheduling MS data buffered in the new master BS if scheduling of the MS data buffered in the old master BS is completed before the tunnel which is established between the new master BS and the access gateway is activated. 41. The MS of claim 40, wherein the data which the MS transmits to the new master BS and receives from the new master BS comprises data which is generated by the new master BS, and the new master BS generates the data by scheduling MS data received from the access gateway after the tunnel which is established between the new master BS and the access gateway is activated. 42. A new master Base Station (BS) in a cloud cell communication system, the new master BS comprising: a controller configured to detect that a master BS for a specific Mobile Station (MS) is changed from an old master BS to a new master BS and to detect that a tunnel which is established between the new master BS and an access gateway is activated; and a receiver configured to receive MS data from the tunnel which is established between the new master BS and the access gateway, wherein the controller schedules the received MS data. 43. The new master BS of claim 42, further comprising: a transmitter configured to transmit a signal requesting activation for the tunnel which is established between the new master BS and the access gateway of the access gateway in order to receive the MS data. 44. The new master BS of claim 43, wherein the transmitter is configured to transmit a tunnel switch request message to the access gateway. 45. An old master Base Station (BS) in a cloud cell communication system, the old master BS comprising: a controller configured to detect that a master BS for a specific Mobile Station (MS) is changed from an old master BS to a new master BS and to schedule MS data which the old master BS receives through a tunnel which is established between the old master BS and an access gateway and buffers to the new master BS before a tunnel which is established between the new master BS and the access gateway is activated. 46. The old master BS of claim 45, wherein the MS data which the old master BS receives through the tunnel which is established between the old master BS and the access gateway and buffers comprises MS data which the old master BS receives from the access gateway from a timing point at which the old master BS detects that the master BS is changed to a timing point until the tunnel which is established between the new master BS and the access gateway and buffers. 47. A Mobile Station (MS) in a cloud cell communication system, the MS comprising: a controller configured to detect that a master Base Station (BS) for an MS is changed from an old master BS to a new master BS; a transmitter configured to transmit data to the new master BS; and a receiver is configured to receive data from the new master BS, wherein the data which the MS transmits to the new master BS and receives from the new master BS comprises data which is generated by the new master BS, and the new master BS generates the data by scheduling MS data received through a tunnel which is established between the new master BS and an access gateway after a tunnel which is established between the new master BS and the access gateway is activated. 48. An access gateway in a cloud cell communication system, the access gateway comprising: a receiver configured to receive a signal requesting activation for a tunnel which is established between a new master Base Station (BS) and an access gateway from the new master BS; and a controller configured to activate the tunnel which is established between the new master BS and the access gateway by switching a tunnel which is established between an old master BS and the access gateway to the tunnel which is established between the new master BS and the access gateway. 49. The access gateway of claim 48, wherein the receiver is configured to receive a tunnel switch request message from the new master BS. 50. The access gateway of claim 48, wherein the signal requesting activation for the tunnel which is established between the new master BS and the access gateway is transmitted by the new master BS in order that the new master BS may receive MS data targeting the MS according to detecting that there is no MS data buffered in the old master BS before the tunnel which is established between the new master BS and the access gateway is activated.
2,400
7,099
7,099
14,481,222
2,452
A system and method are provided for offline access to content accessible over a network. The method comprises identifying a grant of access to at least one data source respective of the network, wherein the access is granted to a client node; identifying a data element of one of the at least one data source; determining if the data element is suitable for offline viewing; and upon determining that the data element is suitable to be viewed offline, storing the data element in a storage unit that is accessible to the client node while operating offline.
1. A computerized method for providing offline access to content accessible over a network, comprising: identifying a grant of access to at least one data source respective of the network, wherein the access is granted to a client node; identifying a data element of one of the at least one data source; determining if the data element is suitable for offline viewing; and upon determining that the data element is suitable to be viewed offline, storing the data element in a storage unit that is accessible to the client node while operating offline. 2. The computerized method of claim 1, wherein the network is any of: a wireless network, a cellular network, a wired network, a local area network (LAN), a wide area network (WAN), a metro area network (MAN), the Internet, the worldwide web (WWW), and a combination thereof. 3. The computerized method of claim 1, wherein the client node is any of: a tablet computer, a laptop computer, a smart phone, and a personal computer. 4. The computerized method of claim 1, further comprising: identifying a reconnection to the network; matching the suitable data element that is stored in the storage unit to a data element that exists over the web; and upon identifying a change in the data element that exists over the web, generating a notification. 5. The computerized method of claim 1, wherein determining if the data element is suitable for offline viewing further comprises: determining a parameter respective of the data element; comparing the determined parameter to a threshold parameter; and based on the comparison results determining if the data element is suitable for offline viewing. 6. The computerized method of claim 1, wherein the parameter is at least one of: a time pointer, a size of the data element, and a user behavior. 7. A non-transitory computer readable medium having stored thereon instructions for causing one or more processing units to execute the method according to claim 1. 8. A system for providing offline access to content accessible over a network, comprising: a processor; and a memory, the memory containing instructions that, when executed by the processor, configure the system to: identify a grant of access to at least one data source respective of the network, wherein the access is granted to a client node; identify a data element of one of the at least one data source that has been viewed; determine if the data element is suitable to be viewed offline; and upon determining that the data element is suitable to be viewed offline, store the suitable data element in a storage unit that is accessible to the client node while operating offline. 9. The system of claim 8, wherein the network is any of: a wireless network, a cellular network, a wired network, a local area network (LAN), a wide area network (WAN), a metro area network (MAN), the Internet, the worldwide web (WWW), and a combination thereof. 10. The system of claim 8, wherein the system is further configured to: identify a reconnection to the network; match the suitable data element that is stored in the storage unit to a data element that exists over the web; and upon identifying a change in the data element that exists over the web, generate a notification. 11. The system of claim 8, wherein the system is further configured to: determine a parameter respective of the data element; compare the determined parameter to a threshold parameter; and based on the comparison results determining if the data element is suitable for offline viewing. 12. The system of claim 11, wherein the determined parameter is at least one of: a time pointer, a size of the data element, and a user behavior.
A system and method are provided for offline access to content accessible over a network. The method comprises identifying a grant of access to at least one data source respective of the network, wherein the access is granted to a client node; identifying a data element of one of the at least one data source; determining if the data element is suitable for offline viewing; and upon determining that the data element is suitable to be viewed offline, storing the data element in a storage unit that is accessible to the client node while operating offline.1. A computerized method for providing offline access to content accessible over a network, comprising: identifying a grant of access to at least one data source respective of the network, wherein the access is granted to a client node; identifying a data element of one of the at least one data source; determining if the data element is suitable for offline viewing; and upon determining that the data element is suitable to be viewed offline, storing the data element in a storage unit that is accessible to the client node while operating offline. 2. The computerized method of claim 1, wherein the network is any of: a wireless network, a cellular network, a wired network, a local area network (LAN), a wide area network (WAN), a metro area network (MAN), the Internet, the worldwide web (WWW), and a combination thereof. 3. The computerized method of claim 1, wherein the client node is any of: a tablet computer, a laptop computer, a smart phone, and a personal computer. 4. The computerized method of claim 1, further comprising: identifying a reconnection to the network; matching the suitable data element that is stored in the storage unit to a data element that exists over the web; and upon identifying a change in the data element that exists over the web, generating a notification. 5. The computerized method of claim 1, wherein determining if the data element is suitable for offline viewing further comprises: determining a parameter respective of the data element; comparing the determined parameter to a threshold parameter; and based on the comparison results determining if the data element is suitable for offline viewing. 6. The computerized method of claim 1, wherein the parameter is at least one of: a time pointer, a size of the data element, and a user behavior. 7. A non-transitory computer readable medium having stored thereon instructions for causing one or more processing units to execute the method according to claim 1. 8. A system for providing offline access to content accessible over a network, comprising: a processor; and a memory, the memory containing instructions that, when executed by the processor, configure the system to: identify a grant of access to at least one data source respective of the network, wherein the access is granted to a client node; identify a data element of one of the at least one data source that has been viewed; determine if the data element is suitable to be viewed offline; and upon determining that the data element is suitable to be viewed offline, store the suitable data element in a storage unit that is accessible to the client node while operating offline. 9. The system of claim 8, wherein the network is any of: a wireless network, a cellular network, a wired network, a local area network (LAN), a wide area network (WAN), a metro area network (MAN), the Internet, the worldwide web (WWW), and a combination thereof. 10. The system of claim 8, wherein the system is further configured to: identify a reconnection to the network; match the suitable data element that is stored in the storage unit to a data element that exists over the web; and upon identifying a change in the data element that exists over the web, generate a notification. 11. The system of claim 8, wherein the system is further configured to: determine a parameter respective of the data element; compare the determined parameter to a threshold parameter; and based on the comparison results determining if the data element is suitable for offline viewing. 12. The system of claim 11, wherein the determined parameter is at least one of: a time pointer, a size of the data element, and a user behavior.
2,400